Post on 29-Nov-2014
PGDCA / MCA (I Yr) I BcA
Term-End Examination
June, 2006
CS-O1 : COMPUTER FUNDAMENTALS
Time: 3 hours Maximum Mqrks : 75
Note : Question number 7 is compulsory. Answer any
three questions from the rest.
1. (a) Simplify the following expression using Karnaugh's
map in product-of-sum form.
F (A , B , C, D) - ) (0 , 2 , 8 , 9 , 10 , 11 , 14 , 15)
Also, draw the logic circuit for the simplified
exnression.
(b) What is a vector instruction ? Explain briefly the
need of an array processor in the execution of a
vector instruciion. 5
(c) Construct an 8 x 1 multiplexer, using two 4 x 1I t t t - -multiplexers and a decoder. Make assumptions, it
required.
cs-01 P . T . O .
(d) What is cache coherence ? Why is it important for
shared-memory multi-processor systems ?. ' ' . . , : , : ; . . , ' . - . . ' . . : ; : ] . , .
('e) Write an 8086 adsembly laflguage program to find
the total number of occurrences of the characters
"a" and "t" in an array of characters stored in the
memory.
(f) Explain, with an example, one instruction of each of
the following types :
(i) Conversion
(ii) Input-output
(iii) Transfer of control
(iv) Arithmetic
2. (a) Write a program to evaluate the following expression
using an evaluation-stack architecture machine :
A x . B / D + E x F - G
Assume that the machine contains instructions for
PUSH, POP, ADD, SUBTRACT, MULTIPLY
and DIVIDE
(b) Construct a full-adder circuit using one or more
decoders.
(c) What is the set-associative mapping scheme for
memory ? Explain this with the help of a diagram. 4
cs-01
3. Give at least three differences between each of the
following : 75
(i) Instruction pipeline vs' Floating point pipeline'
(ii) Horizontal microinstruction vs' Vertical
microinstruction.
(ii| Access methods of secondary storage vs' Access
methods of main memory.
(iv) Loosely coupled microprocessors vs' Tighily coupled
microprocessors.
(v) Flash memories vs. PROMs.
4. (a) Design a single precision floating point number
having the following characteristics :* The base of the number is 2'
o The mantissa can represent at least 5 decimal
digits correctlY.
* The exponent range is 10i 50'
Make suitable assumptions, if required' 5
(b) Write a program in 8086 assembly language that
adds two two-digit unpacked BCD numbers' 5
(c) What is the purpose of data-flow machines ? List at
least two advantages and two disadvantages of these
machines. 5
5. (a) Explain the role of the segment registers in 8086
microprocessors, with the help of an example for
each.
cs-01 P . T . O .
(b) What are thabasic characteristics of RISC ?'Explainbriefly the reasons that make RISC based designsmore popular.
(c) An 8-bit register contains the binarv value11001011. Perform the following opnrufion, onthis :
(i) Mask the upper nibble of the register. (A nibbleis a 4-bit sequence.)
(ii) Insert a value 1101 at the upper nibble.
(iii) Perform circular shift right.
(iv) Perform arithmetic shift left.
(v) Perform logical shift right.
Make assumptions, if required.
4cs-01 12,000
PGDCA / MCA (I Yr) / BCA
Term-End Examination
June, 2006
CS-02 : INTRODUCTION TO SOFTWARE
Time : 2 hours Maximum Mqrks : 60
Note : Question no. I is compulsciry. Attempt any
three questions from the rest.
l. (a) Write an algorithm and draw a flow chart to calculate
the factorial of a given number.
(b) What is a process ? Explain the various process
states with the help of a state diagram. Why is a
PCB required, and what is the information that a
PCB contains ?
(c) Write a shell program to convert an integer to its
binary equivalent.
(d) How is a client-server model different from the
stand-alone model ? Explain this with the help of a
suitable example of each.
(e) Explain the various phases of systems investigation,
with the help of a suitable example.
cs-02 P . T . O .
2. (a) Construct context free grammar for the following 'C'
statements :
( i ) D o . . W h i l e
(ii) incrementoperator
(b) What is a project control system ? With the help of
an example of each, explain the Gantt chart and the
PERT chart scheduling techniques.
3. (a) Explain the CPU scheduling and memory
management in a UNIX operating system. 5
(b) Five jobs arrive in a system in the order given
below : 5
Process CPU time Priority
P 1 1 0 3
P 2 6 5
P 3 b z
P 4 4 1
P 5 8 4
5 is given the highest priority. Calculate thetumaround and waiting time for each process for thefollowing scheduling algorithms :
' (i) Shortest Job First
(ii) Round Robin (quantum 2)
cs-02
4. (a) What are the main advantages of distributed OS ?
How are the file system and protection supported in
distributed OS ?
(b) Write UNIX commands for the following :
(i) To print how many users are working on thesystem.
(ii) To run a process in the background.
(iii) To print the file names and their file sizes in thecurrent directory.
(iv) To print a long listing of the directory.
(v) To print content of the "passwd" file.
5. (a) List the major activities performed in thedevelopment of a software product. Also mentionthe limitations of the development cycle.
(b) What is the significance of thrashing ? Write downthe steps performed in demand paging.
cs-02 4,000
PGDCA / MCA (I Yr) / BcA
Term-End Examination
June, ?OOG
CS-03 : FILE STRUCTURE ANDPROGRAMMING IN COBOL
Time : 2 hours Mqximum Mqrks:60
Note : Question number 1 is compulsory. Answer any
three ouestions from the rest.
1. (a) Write a program in COBOL, giving all the divisions,
to compute the total marks, average and the grade
as per the following record format :
7 - 6 R o l l N o .
7 - 30 Name of the student
31 - 33 Marks in English
34 - 36 Marks in Mathematics
37 - 39 Marks in Physics
40 - 42 Marks in Chemistry
43 - 45 Marks in Computer Science
46 - 48 Total marks
49 -57 Average
52 - 57 Grade
cs-03 P . T . O .
If a student scores less than 40 in any subject, then printFAIL as the grade. Otherwise print the grade as per thefollowing conditions :
Average Grade
5 0 < m a r k s < 6 0 A
4 0 < m a r k s < 5 0 B
(b) Explain the use of the following with the help of oneexample of each i .
( i ) DIVIDE
(iD USAGE clause
(i i i ) REDEFTNES
(c) Write a COBOL program to simulate the billingapplication for a grocery store.
Note : Make suitable assumptions, if needed andmention them.
(d) Mention the purpose of using the RENAMESclause. Wrjte the format. Also, list some importantprecautions to keep in mind while using theRENAMES clause.
2. Write a program in COBOL to simulate a simple calculatorwhich performs the basic arithmetic operations likeaddition, subtraction, multiplication, and division. 10
1 0
1 0
cs-03
3 . Write a COBOL program that converts a given date(specified as the values of DAY and MONTH) to the Juliandate and stores it in the data name Julian. Assume 28 davsin the February month.
Note z The value of DAY is the date of the month and' the value of MONTH is a value between 1 and72. A Julian date is a 3-digit date representingthe number of days counted from the first ofJanuary.
Write a COBOL program to calculate the equal instalmentamount to be paid to a nationalized bank every monthtaking the {ollowing points into consideration :
(i) Flat 60/o interest if the loan amount is to be clearedwithin one year.
(ii) Flat 7.2o/o interest if the loan amount is to be clearedwithin 18 months.
(iii) Flat 72o/o interest if the loan amount is to be clearedwithin 36 months.
Explain the use and syntax formats of the followingCOBOL statements,/clauses, with the help of an examplefor each '
( i ) REWRTTE
( i i ) TNSPECT . . . . TALLYTNG
(i i i ) STRING
(iv) SET
(v) GO TO
7 0
4 .
1 0
5 .
1 0
cs-03 6,000
PGDCA / MCA (I Yr)
Term-End Examination
June, 2006
CS-04 : DATA STRUCTURES THROUGH,,C' ' & , ,PASCAL"
Time : 2 hours Maximum Mqrks: 60
Note : Question number 7 is compulsory. Answer anythree questions from the rest. All algorithmsshould be written nearer to C or PASCALIanguage.
l. (a) Suppose the input to a stack is 7, 2, 3, 4, 5 in thisorder, i.e., 1 comes first, then 2, and so on. Whichof the following rearrangements can be obtained inthe output order ? For those that can, explain how,giving the sequence of operations. For those outputsthat cannot be so obtained, explain why, 6
( i ) r 2 4 5 3( i 0 2 r 4 3 5( i i i ) 2 7 5 3 4
( i v ) 3 1 2 4 5
cs-04 P . T . O .
(b)
(c)
(d)
What is a circular queue ? Explain how it is
implemented, using an array.
Write functions to "insert" and "delete" for the
queue above.
Construct the binary tree whose Pre-order traversal
is ABCDEFGH and In-order traversal is
CBDAFEGH, where each letter stands for the
information stored in some node of the tree. Show
all the steps involved.
Write an algorithm to implement "insertion sort".
Explain how the algorithm works in sorting the input
l i s t 2 6 4 9 8 5 .
Distinguish between a graph and a tree.
Write a function, with appropriate type declaration,
to read the powers and co-efficients of different
terms of a polynomial and create the linkedlist.
(i) What is a Binary Search Tree ?
(ii) Write an algorithm to create a Binary Search
. Tree from an input list of integers.
(i) What is a linked list ?
(ii) Explain how linked lists can bepolynomials of arbitrary degree.
Explain, with an example, the
height-balancing while constructing a
Tree.
used to store
usefulness of
Binary Search
I
2(e)
2. (a)
(b)
3. (a)
(b)
2
cs-04
(c) Construct an AVL tree from the following input list :6 4 2 12 10 3, applying appropriate rotation.
(i) Define the terms "lnternal path length" and"External path length" for a binary tree.
(ii) Prove that for any binary tree of n nodes theExternal path length : Internal path length + 2n.
What is a heap ? Write an algorithm for inserting anew element into a heap.
In C, how does 'union' differ from 'structure' in itsworking ?
Explain what an indexed sequential file organisationis. Also give two advantages each of sequential andindexed sequential file organisations.
What is meant by "Depth First Search" of a graph ?Consider the following graph :
Explain how a Depth First Search Scheme willtraverse the graph starting at node 1.
4. (a)
5. (a)
(b)
(b)
(c)
cs-04 7.000
PGDCA / MCA (I Yr)
Term-End Examination
June, 2OOG
CS-OS : ELEMENTS OF SYSTEMS" ANALYSIS & DESIGN
Time : 3 hours Mqximum Mqrks :75
Note : Question no, I is compulsory, Answer any three
questions from the rest.
1. (a) With the help of an example application, explain the
use of a data dictionary. 3
(b) Explain the use of requirement analysis in system
design. Make an SRS document for "School
6Management System".
(c) Briefly describe five types of documentation5techniques.
(d) Briefly explain five components of muliimedia. 5
(e) What is an MIS ? Give four features of a typical
MIS. Explain the steps followed in the development
of an MIS. 8
(f) Why is it essential to use systems analysis and design
methodologies to build a system ? Give three
reasoRs. 3
cs-05 P . T . O .
2. (a) Design a EFD for a Banking Management System,
uPto' level 2- ' - ' ' ' l
(b) Explain the various types of files in which records are
rnaintained in a system. 6
(c) Describe three types of computer graphics software. 3
3. (a) Define the following : 6
(i) Peak load testing
(ii) Storage testing
(iii) Recovery testing
(b) Give two differences between DSS and KBS. 2
(c) How will you prepare a project request form ? What
are the techniques used to review these requests ?
Explain with an example. 7
4. (a) Give two symbols used in DFD, along with their
purpose.
(b) List four factors considered while designing a form.
Also give {our characteristics and two examples of
forms.
(c) Give, with justification, three different events that can
be considered as comnuter crimes. 3
(d) Explain two differences between unit and integration
testing. What is the use of procedure testing ? 4
cs-05
5. (a) Describe the structure of a feasibility repori' 3
(b) List six considerations on which output to be
produced usuallY dePends. 3
(c) What is structured design ? Explain this with an'
example. 3
(d) What is the role played by user interface of the
software in system development ? Also explain four
steps of GUI develoPment. 6
cs-05 1 5 , 0 0 0
PGDCA / MCA (I Yr)
Term-End Examination
June, 2006
CS-O6 : DATABASE MANAGEMENTSYSTEM
Time :3 hours Maximum Mqrks : 75
Note : Question no. 1 is compulsory' Attempt any
three questions from the rest.
l. (a) With the help of a suitable example, explain a
hierarchical database model.
(b) Whai are the advantages of index-sequential file
organisation ? With the help of an example explain
the structure of index sequential file'
(c) Why are remote procedure calls used ? Why is a set
of DDE mainiained at application level ?
(d) Design an ER diagram for any of IGNOU's study
centres. Clearly indicate the entities, attributes,
relationships and the key constraints.
(e) With the help of two examples for each, explain the
use of multimedia databases and knowledge
databases.
CS-06 P . T . O .
2. (a) Consider an employee file with the details givenbelow : -
Record
A
B
cD ,
E# Name Occup.DegreeSe> Location Salary
80cMilind Prog. M.E. M Delhi 10,00c510{dwet Analyst B.E. M Mumbai 15,00c200 Darronrl Analyst B.E. M Delhi 72,OOC
300 Vlukesh Prog. M.E. M Chennai 9,000
(i) Make a multi list representation of thisemployee Iile.
(ii) Write a query to retrieve the record ofSalary > 12,000, Degree = M.E.,Location = Delhi, Occupation = Analyst,Sex = M.
(b) What are the main features of client-server model ?Explain the stages involved in the developrnent of anapplication using this model.
3. (a) Why is the administration of a database systemrequired ? What are the various functions associatedwith database administration ?
(b) Define a data manipulation language. Write a.syntaxfor the following'and give an example for each :(i) Select statement
(ii) Update statement
. (iii) Delete statement
(iv) Insert statement
7 0
cs-06
4. (a) With the help of an example relation and the
dependency diagram, explain ihe concept of
functional dependency.
(b) Explain the following tools with respect to
client-server environment :
(i) Dynamic data exchange
(ii) Object linking and embedding
Also mention the usage of these with an example
for each.
5. (a) Consider the schema given below :
Branch-scheme (Branch-name, asset, Branch-city)
Customer-scheme (Customer name, street,
customer-city)
Deposit-scheme (Branch-name, account-number,
customer-name, balance)
Borrow-scheme (Branch-name. loan-number,
customer-name, amount)
Client-scheme (Customer-name, banker-name)
Write the SQL statements for the following : 8
(i) Find all customers who have a balance of over
Rs. 1000.
(ii) Write the query to find the clients of banker
Patel, and the city they live in.
(iii) Write a statement to find all the customers who
have a loan amount of more than Rs. 1200'
CS-06 P . T . O .
(iv) Write a statement to find all the customers
whose name starts with "R" and who have a
balance of more than Rs. 10,000.
(b) With the help of an example, explain the properties
of a Balanced sort tree.
CS-06 20.000
ADCA / NICA (II Yr)
Term-End Examination
June, 2006
CS-07 : DISCRETE MATHEMATTCS
Time : 3 hours t ,I v rcXImUm lVarKS: /5
Note : Question number 7 is compulsory. Attempt anythree questions t 'rom the rest.
l. (a) Find the conjunctive normal form for the followinqformula :
l ( ( P ^ l e ) v ( p n e ) ) v l p
(b) Consider the following graph. Write down. itsadjacency matrix :
CS-07 P . T . O .
(c) Let A = l\, 2, 3,4, 5). A ielation R is defined on A
s u c h t h a t a R b i f f a + b < 6 .
(i) Write the relation matrix R.
(ii) Make a digraph of the relation.
(iii) Check if R is reflexive.
(iv) Check if R is symmetric.
Make the figure of Konigsberg's 7-bridge problem,
and draw the corresponding multigraph.
Establish the following equivalence, using a truth
table :
P + Q v R = ( P = Q ) v ( P + R )
Construct a Hasse diagram for the poset ({a, b, cl, c ).Does it represent a lattice ? Give reasons for your
answer.
Find the boolean expression for the following gating
network (write the output of each gate).
(d)
(e)
(f)
G)
xl x2 x3 x4
cs-07
(h) For the Fuzzy Set A of X :{7,2,3, 4, 5l given by
^ 10.2 03 0.4 0.2 07]^ : t t
' 2 ' i ' n ' TJ ' f ind the u-cut o f A
f o r each s e { 0 .1 , 0 ' 3 , 0 .7 } .
Find the minimum spanning tree for the followinggraph using Kruskal's algorithm :
(i) Express P v Q using f only.
(ii) Express P n Q using ,t only
Let g : R * R, where R is the set of real numbers,be defined by g(x) = x2 + 2. Check if g is
(i) one-one
(ii) onto
Check whether the following formulas are tautologiesor not :
( i ) ( P + Q ) = [ P v ( Q n n 1 < + e ^ p v R ) ]
( i i ) ( P v Q ) + ( Q = p )
2. (a)
3. (a)
(b)
(c)
CS.O7 P . T . O .
(b)
(c)
In a single Venn diagram, show three sets A, B, C
a n d B \ C , A n C , A U ( B c ) .
Use the rules of inference to check the consistency
of the following argument. At each stage, mention
the rule you are applying
lf you send me sn e-mail message, then I will
finish writing the program. If you do not send me
sn e-mail message, then I will go to sleep early'
If I sleep early, then I wilt wqke up t'eeling
ret'reshed. Therefore, il I wqke up feeling
refreshed, then I haue t'inished writing the
progrqm.
Let R be a relation from the set A to A, where
A : {1, 2, 3, 41and a R b i l f a > b.
Find (i) R2, (ii) F, (iii) R-1.
Find the shortest path from a to f for the following
graph, using Dijkstra's algorithm. Show all the
intermediate steps.
Minimise the following function, using K-map :
f (w, x, y, z) : > (0, 4, 6, 7, 8, 70, 1 '2, 74)
Express I (=x flx)) using universal quantifiers' Justify
your answer.
(d)
4. (a)
(b)
(c)
cs-07
5. (a) Construct a weighted connected graph on five
vertices that has exactly five minimum spanningtrees. Justify your answer.
(b) Express the number -87 using (i) 1's complementform, (ii) two's complement form, (ii i) sign magnituderepresentation. Use 8-bit representation.
(c) Draw the logic diagram of HA (Half Adder) anciusing HA construct FA (Full Adder).
(d) Define Well Formed Formula (WFF).
5
3
cs-07 1 5 , 0 0 0
ADCA / MCA (II Year)
Term-End Examination
Jurie, 2006
CS-08 : NUMERICAL & STATISTICALCOMPUTING
T)' i^" ,3 hours Maximum Marks: 75
Note : Question 7 is compulsory. Attempt any three
questions lrom the rest. Use of calculators is not
ql lowed.
1. (a) Write a FORTRAN 90 statement for each of the3following :
"*2 , in *
\'' ' J2""
/1 * r) '* l,r - 3)'( i i ) , = [ o
+ r ) + [ ' - b J
r M ) (., _ "' _ o'l( i i i ) 0 = [ ^ * j l t - ; " - e )
cs-08 P . T . O .
(b) Which of the following are acceptable names ofinteger variables, real variables and unacceptable
names and why ?-
(i) 457.5
(ii) SUMMER
(iiil rNDrA
(iv) .ABC2
(c) Point out the errors in each of the following
statements, and correct them.
(i) Y/6.35 : Q
(ii) TEMP :.5 (TA - T2)/Z
( i i i ) Y : ( - 6 . 3 2 ) 5 ' 0 + X
(d) Write a FORTRAN program to compute the
equivalent resistance R for given 100 sets of values,
where you enter R, and R, from the key board. The
resistances R, and R, are connected in parallel andthe formula for the equivalent resistance is given
below :
1 1 1R R 1 R 2
cs-08
(eJ An air foil is to be plotted with a "camber". Themean line of the foil js given by :
y = + e p x - x z ) f o r x < pp-
v = : o ( 1 + 2 p x - 2 p - * 2 ) f o r x > pI - p -
Write a program that reads 100 sets of data, of m,x and p each, and which computes and prints thevalues of y.
A town has two doctors, X and Y operatingindependently. If the probability that Doctor X isavailable is 0.9 and that Dr. Y is available is 0.8,then find the probability that at least one of them isavailable when needed.
Find the regression line of y on x for the given data :
(h) Fill in the blanks :
(i) Mr. Shiv Kumar calculated the mean of twentydifferent numbers. The calculated mean is72'14. But, while calculating, by mistake hetook the number 91., 75 and 82 instead of thecorrected value of \9, 57 and 28 respectively.The correct mean of twentv numbers is
(f)
(s)
X 2 4 5 6 8 1 1
v 1 B 7 2 1 0 8 .1 (
CS-08 P . T . O .
(ii) If two regression coefficients are, --.- 0'1 and- O'9, the value of r is
(iii) The size of the variable which occurs most
frequently is known as -
(iv) The probabilities of occurring of two events E,
F are 0'25 and 0'5, respectively, and of both
occurring simultaneously is 0'14. Then the
probability of the occurrence of neither event is
equal to
2. (a) Two one-dimensional arrays C and D have 25
elements each. Write a computer program to
compute and print the quantities
25A = t ( c + d )
/ - t l I 'i.- 1
25B = > ( c - d i ) z
. i = 1
(b) Use the method of least squares to fii the curve
f(x) : c.x + .rfi fot the following data : 6
25P = I c ,d,
i = 1
X A 1 6 251
f(x) 14 7 2 1 0I 6
cs-08
(c) Write a program segment to read formatted values ofA and B from a file, and to compute
S = A B
T = A + B
ST- x - = _
S + T
Also write the formatted values of S, T and X intoa file.
3. (a) Given a triangle with sides a, b, c, write a FORTRANprogram to find whether it is an isosceles triangle. 4
(b) Find the correlation coefficient between x and v fromthe given data : 6
x 1 3 4 6 8 9 1 1 7 4
v 1 2 4 4 5 8 9
(c) The ratio of relativistic to classical momentum as afunction of the speed of light is given by the formula
ratio = J==
I t - (Write a program that will compute and print a tableof the ratio for
f = 0 1 to 0.9 in steps of 0.1
f = 0191 to 0 .99 in s teps o f 0 .01 .
cs-08 P . T . O .
4. (a) The ideal compressor outlet temperature and
efficiency for a gas turbine are given by
rp r *r = ro tfl , and
r o, )t;e f f i c i encY (e ) = 1 - l t l
\ ' 2 /
where To is the inlet temperature, P, the inlet
pressure, Prthe outlet pressure, and y, the ratio of
specific heats.
Write a program to compute and output T and e for
To = 450, P , = 10 , Pz= 55 , and Y = 1 '5 . 5
(b) For the following frequency distribution, compute the
mean, standard deviation and coefficient of variation' 5
Weight (in kS) 2 3 - 2 72 8 - 3 2 3 3 - 3 7 38-42
No. of persons 10 35 40 1 5
Wriie a program to calculate and print the value of
n !c ( n , k ) =
k ( n _ k ) l
Write a subroutine to calculate the factorial and call
it in the main program.
(c)
cs-08
5. (a)
(b)
f n l
Identify errors, if any, in the following FORTRANstatements :
( i ) D o 8 . I = 1 , 3
(ii) Do 33 L = M, N(3), I
( i i i ) GIDAN = XYL + -N(3.2)
( iv) DO 44 K : 1. M+2, N
(v) C(1e) : B(- 4) + F13
Three machines, I, II, and III manufacturer e s p e c t i v e l y , 0 . 4 , 0 . 5 , a n d 0 . 1 o f t h e t o t a lproduction. The percentage of defective itemsproduced by I, II, and III is 2o/0, 4o/o and lo/orespectively. For an item chosen at random, what isthe probability that it is defective ?
An enquiry into the budget of the middle classfamilies in a certain city of India gave the followinginformation :
Expenses Price in 1998(in Rs.)
Price in 2000(in Rs.)
Food 40o/o 140 165
Fuel 10% 20 23
Clothing 20% 60 70
Rent 20o/o D U BO
Miscellaneous 1070 30 5 5
Compute the cost of living index number for 2000taking 1998 as the base vear.
CS-08 P . T . O .
Assume that your stock of sales merchandise is
maintained based on the forecast demand' If the
distributor's sales personnel call on the first day of
each month, compute your forecast sales from the
given historical data.
Month Actual Demand
June
July
August
140
180
770
Using a simple three-month moving average'
what is the forecast for SePtember ?
Using a weighted moving average, with weights
of 0'20, 0'30, and 0'50 for June, July, and
August, respectively, what is the forecast for
September ?
cs-08 13 ,000
ADCA / MCA (II Yr)
Term-End Examination
June, 2006
CS-O9 : DATA COMMUNICATION ANDNETWORKS
Time : 3 hours Msximum Marks , 75
Note : Question number 7 is compulsory. Answer any
three questions Jrom the rest.
1. (a) An analog signal is limited to 4 kHz. It is converted
to a PCM signal using 8 bitlsample. What is the bii
rate on the transmission line I 3
(b) Make a timing diagram and show the differences
between manchester encoding and differential
manchester encoding for the bit stream
1 0 0 0 1 0 1 1 0 1 1 .
(c) '
Calculate the number of networks that can exist in
Class A, B and C IP addresses. Also, calculate the
number of hosts a network in each class can have'
(d) What happens in a token bus network if a station
accepts the token and then crashes immediately ?
How does protocol handle this situation ?
CS-09 P . T . O .
(e) Answer the following questions with respect to aTCP header :
(i) Why is the TCP header length required ?Explain this.
(ii) What is the need of a variable size slidingwindow ?
(0 What is a subnet ? How is subnetting implemented ?Explain this with the help of an example.
2. (a) Explairl the TCp connection establishmentprocedures both in the normal case and in thecall-collision case, with the help of a diagram each. s
(b) Explain two important reasons for having aminimum frame length in CSMA/CD. Explain this
5diagrammatically.
(c) Derive the throughput expressions for ALOHA andSlotted ALOHA. s
3. (a) Sketch a Network Address Translation (NAT) Box,and explain its operations. s
(b) Why is there a need for compression ? Differentiatebetween JPEG and MPEG standards. 4
(c) Give at least three functions of a modem 3
(d) How does UDP handle flow control, error control orretransmission upon receipt of a bad segment ? s
cs-09
4.. (a) Explain the operation of an FDDI token ring, with
the help of a diagram. Also, list the two key
differences between FDDI and IEEE 802'5. 7
(b) Explain the functioning of the HDLC protocol for
the following : I
(i) Busy condition
- (ii) Error recovery using RFJ command
(iii) Two-way data exchange
(iv) Link setup and disconnection
5. Write any three differences between the following'pairs ' 75
(il Circuit switching and Packet switching
(ii) Connection oriented and Connectionless services
(iii) ARP and RARP
(iv) Upward multiplexing and Downward multiplexing
(v) X'25 and Frame relay
cs-09 20,000
ADCA / McA (II Yr)
Term-End Examination
June, 2006
CS-10 : SOFTWARE ENGINEERING
Time :3 hours Maximum Mqrks : 75
Note : Question no. I is compulsory. Answer any threequestions from the rest.
l. (a) A library of a University wants to automate lending
of books. The main objectives of the s/w are :
. On-line record of valid borrowers.
o Online record of books issued.
o Online reservation of books.
For the above mentioned system
(i) Develop a Software Requirement Specification.
(iil Design DFD upto two levels.
(iii) Construct the structure chart for this system.
(iv) Suggest a testing strategy for any two s/wmodules in (iii) above. 20
(b) Explain any five software quality parameters. s
cs-10 P . T . O .
(c) Why is there often tension between a software
engineering group and an independent software
quality assurance group ? Is this healthy ? Justify your
answer.
User interfaces can be made effective by following
three important principles. Elaborate these
principles.
Differentiate between top down and bottom up
integration testing. Give one example of each.
What are the advantages and disadvantages of size
oriented metrics ?
What is cyclomatic complexity ? How can you relate
it to independent paths ? Explain with suitable
example.
What is risk estimation ? How is a risk table
prepared ?
Why is reliability a better measure of quality ? How
is it measured ?
Develop a use case diagram for an ATM system
where the withdrawal and deposit operations are
allowed.
What is Software Configuration Management(SCM) ? Explain the elements of a SCM system.
2. (a)
3. (a)
4. (a)
(b)
(c)
(b)
(c)
1 0
(b)
cs -10
5. (a)
(b)
(c,
Develop a procedural design for an interactive user
interface that queries for basic "lncome Tax"
information. Derive your own requirements and
assume that all tax computations are performed by
other modules.
List and explain any three situations where dynamic
testing tools are better than the static testing tools'
Differentiate between an object used in OOA and an
object used during data modelling.
c s - 1 0 1 8 , 0 0 0
ADCA / MCA (III Year)
Term-End Examination
June, 2006
CS-12 : COMPUTER ARCHITECTURE
Time : 3 hours Maximum Mqrks : 75
Note : Question number 7 is compulsory. Answer any
three questions t'rom the rest.
1. (a) Explain a distributed memory multicomputer system,
with the help of an appropriate diagram.
(b) Consider the following two interleaved memory
organization for a main memory system with 16
memory modules. Each module is assumed to have a
c a p a c i t y o f l M b y t e .
Design 1 : 16-way interleaving with one memory
bank.
Design 2 : 8-way interleaving with two memory
banks.
For this system calculate the following :
(i) address format for each organization.
(ii) maximum memory bandwidth.
1 0
C S - 1 2 P.T.O.
(c) Show the numerical analysis demonstrating the
perf.ormance degradation caused by branching in an
instruction pipeline. State all the assumptions and
explain each notation used. 8
(d) Derive the equations representing the following w.r.t.
superpipelined processors :
o Time required to exeiute N instructions
. The relationship between Speedup and Base
machine
Explicitly state the assumptions and explain each
7notation used.
2. (a) Explain any one directory-based protocol fof
network-connected multiprocessors, with the help of
a diagram.
(b) Explain five salient features of data flow computers. 5
(c) Consider the following pipeline reservation table :
1 2 3 4
Calculate forbidden latencies and greedy cycles for this
pipeline processor.
S1
s2
S3
X X
X
X
cs-12
3. (a) List two differences between each of the following : 6(i) Crossbar versus multistage switches
(ii) Virtual channel vs. physical channel
(iii) Buffer deadlock vs. channel deadlock
(b) A computer system has a 12g byte cache. It uses a4-way set associative mapping with B bytes in eachblock. The physical address size is 32 btts. and thesmallest addressable unit is 1 byte. Answer thefollowing for this system :
. '(i) Show the mapping between physical addressesand cache addresses.
(ii) To what block frame of cache address will000010AF1u be assigned ?
(iii) If the addresses 00001OAFru and FFFFTAxyruare assigned to the same set, find the values ofx and y.
4. (a) Perform a data dependency analysis on the followingcode segment :
51 : Load R1, M(100)
52 : MOVE R2, R1
53 : Inc Rl
54 : Add R2, R1
55 : Store M(100), R1
Also draw the corresponding data dependencygraph.
cs-12 P.T.O.
(b) Differentiate between a VLIW processor and a
superscalar processor' Also, explain the pipelining in
VLIW architecture, with the help of a diagram' I
5. (a) Explain the concept of overlapping register windows
in the SPARC architecture, with the help of 'a
diagram.
(b) What does 'context' mean with respect to a
multithreaded system ? With the help of a diagram'
explain multiple context prQcessors'
cs-12 25,000
@lADCA / MCA (lll Year)
Term-End Examination
June, 2OOG
CS-l3 : OPERATING SYSTEMS
Time : 3 hours Mqximum Msrks: 75
Nofe : Question number 7 is compulsory. Answer anythree questions from the rest.
1. (a) What are the factors to be considered for an
effective disk space allocation strategy ? Also, explain
the indexing strategy for non-contiguous allocation of
disk space.
(b) Write and explain, Belady's Anomaly. Give an
example illustrating the anomalous behaviour of
FIFO.
(c) Explain the concurrent reader's and writer's
problem. Write an algorithm to solve it.
(d) Write and explain, Ricart and Agrawala's algorithm
for mutual exclusion in distributed svstems.
(e) Compare the LINUX opnruting system with
WINDOWS o/s with respect to features of open
source software.
cs -13 P . T . O .
:
2. (a) Explain processor synchronization issues in a
Multiprocessor system with shared memory. 6
(b) Define process scheduling. What is the role of thescheduler ? List all the schedulers available, along
9with their working principles.
3. (a) Explain protection and sharing for the following : 8
(i) Paging system
(ii) Segmented system
(b) Write and explain an algorithm for deadlockprevention. 7
4. (a) Write and explain the Lamport's Bakery algorithm
Bfor inter-process synchronization.
(b) What is a digital signature ? Explain the method forgeneration and verification of digital signatures. 7
5. (a) Explain the Bell and La-Padula model of protection,
with an example.
(b) Explain the architecture of a Distributed File system,with special relerence to a client-server division oflabour.
c s - 1 3 20,000
MCA (IIl Year)
Term-End Examination
June, 2006
CS-14 : INTELLIGENT SYSTEMS
Time : 3 hours Mqximum Marks : 75
Note : Question number 7 is compulsory. Attempt any
three questions lrom the rest.
1. (a) Define cognitive systems. Mention three differences
between cognitive systems and expert systems' 4
(b) Transform each of the following sentences into
disjunctive normal form ' 4
( i ) - ( P & Q ) & ( P v Q )
( i i l - P v - Q ) & ( R + S )
(c) Write three differences between Inductive Inference
and Abductive Inference mechanisms. Give one
application of each type of inferencing technique. 4
(d) Define the three Jechniques for indexing and retrieval
of knowledge from memorY. 3
(e) Explain 'script' in the context of knowledge
representation. Cteate a 'movie script'. Make
necessary assumptions. 5
cs-14 P . T . O .
(f) How does the use of a heuristic function reduce thesearch space ? Suggest a good heuristic function foreach of the following : 6
(i) TravellingSalespersonproblem
(ii) 8 puzzle problem.
(S) Write an algorithm for matching substrings. 4
2. (a) Write a LISP code for finding roots of a quadratic
equation, ax2 + bx + c = 0, a # 0, a, b, c e R. 5
(b) Transform the following FOPL statements intoequivalent conceptual graphs : 5
(i) Vx Normal (x) & Grown (x) + Walk (x)'
(ii) Vy Haswings (y) & Layseggs (y) -+ Isbird (y).
(c) Explain the five levels of knowledge representation. 5
3. (a) Define objects and messages. Also give one examplefor each. 3
(b) Write a LISP function that will reverse the elements
of a list.
[eg. input l ist ((ab) (c(de))) , output l ist (((ed)c)(ba)) 5
(c) Name any four arc-relations used in an associativenetwork. Give an example displaying the three
4arc-relations.
(d) Apply the unification algorithm to the following set
of clauses :
l P ( X , Y ) n Q f i , j o e ) n R ( Y , Z ) ,
P (john, mary) n Q (john, A) n R (mary, A) ) 3
cs-14
4. (a) Write and explain the various steps of the branch
and bound search technique. 5
(b) Define the following terms w.r't' heuristic search
algorithms ' 6
(i) Admissibility condition
(ii) Completenesscondition
(iii) Dominance property
(c) Give any four functions performed by a
comprehensive memory management system' 4
5. (a) What is a Distance Matrix ? How is it different from
the probabilistic'measures for matching ? 4
(b) Give ihe variable bindings, if any, which will make
each of the following pairs of lists match i 4
( i l ( .x ab(cd) .x), ((ef)ab .Y ef)
( i i ) (abc (da) f ) , (?x bc (d ?y) ?z)
(c) Consider the following problem :
You are given two jugs of capacity 4 gallons and
3 gallons. Neither has any measuring mark on it'
How can you get exactly 2 gallons of water into the
4 gallon jug ? Write production rules for the
problem and obtain the solution of this problem. 7
c s - 1 4 1 9 , 0 0 0
MCA (III Year)
Term-End Examination
June, ?OOG
CS-15 : RELATIONAL DATABASEMANAGEMENT SYSTEM
Time : 3 hours Mqximum Mqrks: 75
Note : Question no. I is compulsory. Answer ony threequestions from the rest.
1. (a) An organisation has multiple retail stores. Thesestores have to keep track of products, suppliers,customers and employees. Make an E-R diagram,
. stating the assumptions used, if any. I
(b) Explain multi-valued dependency with the help of anexample. How is it related to normalization ? Explainthis with the help of an example. 7
(c) Explain the major transaction states with a suitablediagram. Describe a suitable method using Locks, forhandling a large number of concurrent transactionsper minute in an online airline reservation svstem. 7
c s - 1 5 P . T . O .
(d) Explain the significance and usage of views in . a
relational database system, with the help of suitable
examples. Explain any four constraints of updating a
fuple in a view.
2. (a) Define indices and their advantages in RDBMS.
Explain the concepts 'of
clustering and hashing
indices, using an example of each.
(b) Consider the relations :
GRADE (stud_id, subject_id, grade)
SUBJECT (subject-id, s-namd, teacher)
(i) Write the relational algebraic query for the
following :
. List the student number, subject names and
grades of the student whose id is 100.
' List the grades of all the students in the
subjects taught by teacher "XYZ".
(ii) Convert the queries above into an optimized
query graPh.
3. (a) Consider the following relations in the context of a
B P O :
Customer (C-code, C-name, C-phone)
Product (P-code, P-desc, P-price)
Call (Ca-id, C-code, P-code, Ca-result, Ca-date)
c s - 1 5
Write the appropriate SQL commands for the
following :
(i) Find the name of customers to whom a call is
not made.
(ii) Find the total number of calls made to the
customer wn'ose name is 'Smith'.
(iii) List C-name and P-desc of the calls made
today.
(iv) Find the product details of those products
whose price is above average.
(b) A university maintains database tables about the
faculty and the students'
FACULTY (f-id, f-name, subject-id )
STUDENT (S-id, S-name, S-course, S-dob)
MARKS (S-id, subject-id, marks)
Constraints ' One faculty teaches only one subject'
(i) Identify suitable access rights for the faculty,
students and database administrator'
(ii) Create the access matrix for (i) above'
(iii) Write the query modification statement for the
students.
4. (a) Explain the three problems of concurrent
transactions in RDBMS, with suitable examples' 5
(b) What is a timestamp ? How does the system
generate timestamps ? Explain the timestamp
ordering protocol for concurrency control' 5
c s - 1 5 P . T . O .
(c)
(d)
Explain the different time components involved inaccessing a disk block.
"The decomposition of a relation into BCNF isalways dependency preserving." Is this statementtrue ? Give reasons for your answer.
Explain the following terms with the help of anexample or diagram :
(i) Data independence
(ii) Security in statistical databases
(iii) Serialisability
(iv) Closure of an FD
Suppose the write ahead Log Scheme is being used.Give the REDO and UNDO processes in the strategyof writing the partial update made by a transactionto the database, as well as in the strategy of delayingall writes to database till the commit.
5. (a)
1 0
(b)
4cs-15 19,000
ADCA / MCA (lll Yr)
Term-End Examination
June, 2OOG
CS-16 : OBJECT ORIENTED SYSTEMS
Time :3 hours Maximum Mqrks: 75
Note : Question no. I is compulsory. Answer any threequestions from the rest.
l. (a) A library in a university is having provision to issue
books to students and staff . It collects different
penalties from both categories in case of late return
of books. The library also manages different registers
which hold information about members, books,
magazines, newspapers, penalties collected, etc.,
manually. The library needs a system to maintain the
registers as well as for performing transactions such
as issue and return of books, etc. Identify classes for
the system and draw the class diagram. Add three
attributes and three operations to the classes. Explain
the classes as well as associations, if any.
Make assumptions, if necessary. 70
c s - 1 6 P . T . O .
(b)
(c)
Identify at least five classes in a Railway ReservationSystem, and show their related associations.
Explain the following terms, with an example ofe a c h :
(i) State Diagrams
(ii) Generalization
(iii) Abstract Classes
Draw an E-R diagram and show the relationshipsbetween various entities like Student, College,Teacher, Hostel, Library of a IJniuersityInformation System. The diagram should alsoinclude attributes.
Make necessary assumptions wherever necessary.
Prepare an object diagram, showing at least fiverelationships among the following object classes :
School, Playground, Principal, Board, Classroom,Book, 'Student, Teacher, Cafeteria, Rest room,Computer, Desk, Chair, Ruler, Door, Swing.
Include associations, aggregations andgeneralizations. Use qualified associations and showmultiplicity balls in your diagrams. You do not needto show attributes of operations. Use associationnames where needed.
What is a Recursive aggregate ? Explain this with anexample.
(d)
2. (a)
1 0
(b)
cs-16
3. (a)
4. (a)
5. (a)
(b)
Define a Scenario. Give an example of a Scenario.
Also, define an Event trace and give an example of
i t .
Draw a Data Flow Diagram for computing the
volume and surface area of a cylinder. Inputs are the
height and radius of the cylinder. Outputs are volume
and surface area. 1 0
(b)
Explain five differences between
methodology and the structured
development approach.
For each of the following systems,
relative importance of the three
modelling :
(i) Telephone Answering machine
(ii) Typewriter
an OMT
software
identify the
aspects of
1 0
What is Overriding ? How is it different from
Overloading of functions ? Explain two situations in
which one would need to use overriding, with an
example of each.
What is encapsulation ? Explain the need for
encapsulation, using an example.
1 0
(b)
c s - 1 6 23,000
ADCA / MCA (II Year)
Term-End Examination
June, 2006
CS-51 : OPERATIONS RESEARCH
Time: 3 hours Maximum Mqrks , 75
Nofe : Question number 7 is compulsory. Attempt any
three more questions from questions numbered
2 t o 5 .
1. (a) 3 items are to be loaded onto a truck whose capacity
is 10 tons. The weighi per unit (w,) and value per
unit (v,) of each item is given in the following table :
Assume that only integral units of the items can be
loaded. The value of the load carried is to be
maximised.
(i) Formulate this situation as an integer
programming problem.
(iil If the problem is to be solved by dynamic
programming, write the general recursion for this
problem. 4
i vi wi
1 5 2
2 6 3
3 4 1
CS-51 P.T.O.
(b) Find the range of values of p and q"which will renderthe entry (2, 2) a saddle point for the game
Player B
81 82 83
A, 12 6 5-l' l lPlayer A O,
lo Z 101t l
A 3 L 6 p 4 )
Are there values for p, q that will make (3, 1) asaddle point ? Justify your answer . 4
(c) Which of the following statements are true ? Givereasons for your answers. j
(i) The feasible region for any Lpp is non-empty.
(ii) If a random variable takes two values 0 and 1
with probabilities 1 =
x und
11", then x can
2 2take any real value.
(iii) The function f, defined by (x) = /n x V x > 0,is a convex function.
(iv) For a two person zero sum game with thepay-off matrix A, max min a.. >* min max a...
i j ' J j i i j
cs-51
(d) My diet requires that all ihe food I eat come
from one of the four "basic food groups" (ice cream,
soda,/cola, biscuits and cake). At present, the
following four food items are available for
consumption : biscuits, chocolate ice cream, cola and
cake. Each biscuit costs 50 p, each scoop of
chocolate ice cream costs Rs. 10, each bottle of cola
costs Rs. 10 and each piece of cake costs Rs. 5.
Each day, I must consume at least 500 calories,
6 grams of chocolate, 10 grams of sugar and
8 grams of fat. These contents per unit of each food
is given below.
Food CaloriesChocolate
(grams)
Sugar(grams)
Fatgrams)
Biscuit (,zunit)
Chocolate icecream (/scoop)
Cola (/bottle)
Cake (/piece)
400
200
150
500
3
2
0
0
2
2
4
4
2
4
1
5
Formulate an LP model that can be used to satisfy
my daily consumption requirement at minimum cost.
(e) Solve the following LPP by simplex method.
Max 4x, + 3x,
subject to x, + *2 . 8,
2 x r + x r > 1 0'
x 1 , x 2 > 0
4
7 0
CS-51 P.T.O.
2. (a) Data are gathered on the sale of TV sets at a retail
shop over 100 days. They are compiled and
presented below.
No. of sets sold Frequency of days
1
2
3
4
5
6
7
5
15
20
30
1 8
9
3
Work out the expected (mean) number of sets sold
per day.
Solve the following LP by graphical method : -
M a x i m i z e z = x 7 + x 2
s.t. 2x, + 3x, < 16
x r + 4 x r > 1 0
x | x r 2 0
CS-51
An average of 10 customers per hour arrive at abank with only one teller. The average service timefor each customer is 4 minutes. Assume that bothinter-arrival times and service times are exponentiallydistributed.
(i) Which category of queuing models does this
situation fall in ?
(ii) What is the probability that the ieller is idle ?
(iii) What is the average number of waitingcustomers ?
List three major limitations of the PERT model.
3. A car rental company is faced with an allocation problem
resulting from rental agreements that allows cars to bereturned to locations other than those at which theyoriginally rented. At the present time, there are twolocations (sources) with 15 and 13 cars surplus,respectively, and four locations (destinations) requiring 9, 6,7 and 9 cars, respectively. The transportation cost (in Rs.)of a car between the locations are as follows :
Formulate the above as an LP (Transportation Problem),
and obtain an initial basic feasible solution. Further,
identify the destination that will receive a supply less than
required, and the amount it receives. 15
(c)
5
3(d)
Destinations
CS-51 P.T.O.
4. (a)
(b)
Four different jobs can be carried out on any of
the four machines. The matrix below gives the cost
(in Rs.) of processing job i on machine j.
How should the jobs be assigned to machines (one
iob to one machine) so that total processing cost is
minimum ?
A machine produces lOo/o defective items. Denote a
good unit by G and a defective unit by B. Carry out
simulation to identify each of the 15 coniecutive
units produced as G or B.
I Use the sequence of random digits :
4076486653 8950826528 4934582003 l
How many G's and B's are produced ?
A shopping plaza is in the shape of a rhombus with
vertices A (- 1, 0), B (0, 1), C (1, 0), D (0, - 1). A
phone booth is to be located at a point P in the
plaza so that the sum of the squares of its distance
from all the vertices is minimum.
(i) Formulate this situation as a quadratic
programming problem.
(ii) Write the Kr-rhn - Tucker conditions for this
problem.
(c)
Machine -+
Job JM 1 M2 M3 M4
J1 5 7 1 1 6
J2 8 5 9 6
J3 4 7 10 7
J4 1 0 4 8 3
CS-51
5. (a)
(c)
The daily demand for a commodity is approximately100 units. Every time an order is placed, a fixed costof Rs. 100 is incurred. The daily holding cost per
unit inventory is Rs. 0.02. Determine the economiclot size.
Write down the dual of the following LP (primal)
problem :
Maximize z = l2xt + 3x, - x,
s. t . 10x, + 2x, + x, > 100
7 x r + 3 x " + 2 x r < 7 7
2 x r + 4 x r + x r < 8 0
* 1 a 0 , x , x r 2 0 .
Two companies A and B are competing for themarket of the same product. Their differentstrategies are given in the following pay-off matrix.
Company B
81 82 83
A1 12 -2 olCompany A | |
A2 L1 2 3l
Determine the best strategies, and find the value of
the game.
(d) Explain three limitations of operations research. 3
CS-51 17 ,000
ADCA / MCA (lI Year)
Term-End Examination
June, 2006
CS-54 : FINANCE & ACCOUNTING ONCOMPUTERS
Time :3 hours Mqximum Mqrks : 75
Note : Question number 5 is compulsory. Attempt any
three questions from the rest.
l. (a) Explain, in detail, the following accounting
concepts :
(i) Cost concept
(ii) Accrual concept
(iii) Consistencyconcept
(b) "Accounting is closely concerned with control"'
Explain the statement. Discuss the role of
accounting feedback in the process of control. 6
cs-54 P . T . O .
2 . From the following balances taken from the books of M/s
Ram Kishore & Co, prepare a Trading and Profit & Loss
account for the year ending December 31tt, 2004 and
balance sheet as on that date. 1 5
ParticularsAmountRs. (Dr)
AmountRs. (Cr)
Stock (1.1.2004)
Debtors & Creditors
Purchases and Sales
Returns
Drawing and Capital
Fire insurance premium
Life insurance premium
Income tax paid
Bills receivable andpayable
Sales tax payable
Wages and Salaries
Telephone expenses
Sales promotionexpenses
Cash & Bank overdraft
Audit fees
17,000
25,000
89,000
17,000
8,000
2,000
5,000
10,000
14,000
18,000
3,000
21,000
5,000
8,000
22,O00
1 ,15 ,000
12,000
1,25,000
16,000
12,000
14,000
cs-54
Particulars AmountRs. (Dr)
AmountRs. (Cr)
Discount
Investments
Interest on investment
Interest on bankoverdraft
Rent paid
Bad debts recovered
4,000
60,000
6,000
12,000
1,000
5,000
2 ,000
Total 3,24,000 3,24,000
Closing Stock as on 31st December. 2004 amounted toRs. 25,000.
3. Explain, in detail, the features of an appropriate capital
structure. Also explain the various factors which determine
and influence the capital structure of a firm. Js
4. (a) Examine different classes of capital projects.
Explain why they are approached differently.
(b) Explain the concept of Zero Base Budgeting, Also
give four of its advantages and three disadvantages.
I
.-'
cs-54 3 - P , T . O .
5. (a) The following figures relate to a company
manufacturing a varied range of products :
ParticularsTotal Sales
(Rs.)Total Cost
(Rs.)
Year ended31't March. 2003
22,23,000 19,83,600
Year3 1' '
endedMarch, 2004
24.51.000 27.43,200
Assuming stability in price with variable costs carefully
controlled to reflect predetermined relationships and
an unvarying fixed cost, calculate
(i) . The Profit Volume ratio
(ii) Fixed Costs
(iii) Fixed Costs percentage to Sales
(iv) Break even Point(v) Margin of Safety for the year 2003 and 2004' 75
(b) XYZ Ltd. manufacturer of industrialvalves provides the
following information for the year ended 3ltt March,
2005.
Particulars Per unit Total
Sales (15,000 valves) (i)
Production Overheads
Variable
Fixed
(ii)
Gross Profit
Administration, selling anddistribution overheads (Fixed)
Net Profit
25 3,75,000
1 5
3
2,25,000
45,000
1 8 2,70,000
L,05,000
32,000
73,000
' 4cs-54
Particulars Quarter Total
II II IV
OpeningStock
2,000 1 ,000 4,000
Production 6,000 4,000 5,000 3,000 18 ,000
Sales 4,000 5,000 2,000 4,000 15 ,000
ClosingStock
2,000 1,000 4,000 3,000 3,000
The actual Sales, Production and Stocks for the yeay are
as under :
You are required to prepare
profitability on the basis of
Marginal Costing.
quarterly
Absorption
statements of
Costing and
1 5
cs-54 18 ,000
MCA (Revised)
Term-End Examination
June, 2006
MCS-O11 : PROBLEM SOLVING AND
PROGRAMMING
Time: 3 hours
Note : Question number 7 is compulsory. Attempt any
three questions from the rest'
1. (a) Design an algorithm, draw a corresponding flow chart
and write a program in C, to print the fibonacci
series.
(b) Write a program that does not use the inbuilt string
functions to perform the following :
(i) To compare two strings
(ii) To'copy a string
(c) Design an algorithm, and write a program to find ihe
factorial of a number using recursion.
Maximum Morks : 700
(Weightage 75o/o)
1 0
1 0
1 0
M C S - o 1 1 P . T . O .
(d) A C program contains the following declarations :
int i, j;
long iX;
short S;
float X;
double dX;
char C;
Determine the resultantfollowing expressions :
( i ) i + C
( i i ) X + C
(iii) dX + X
(iv) ((int) dX) + iX
( v ) i + X
( v i ) S + j
(vii) iX + j
(viii) S + C
(ix) iX + C
( x ) i + j
data type of each of the
1 0
2. (a)
(b)
Summarize the purpose of the format strings (likeo/os, o/od, o/oc) that are' comrnonly used within theprintf function, with an example for each.
When can two matrices of order a x b and c x d besubtracted ? Also write a program in C to find thedifference of two such matrices.
1 0
M C S - o 1 1
7 0
3. (a)
4. (a)
5. (a)
(b)
Design an algorithm, draw a corresponding flow
chart and write a C program to check whether agiven string is a palindrome or not.
Explain the meaning of each of the following
functions prototypes and mention the return data
type of each of them :
(i) double f(double a, int b);
(ii) void f(long a, short b, unsigned c);
(iii) unsigned f(unsigned a, unsigned b);
(iv) int (-f) (char*, int);
(v) int * f(charo, int);
What is the difference between a function and a
macro ? Find the largest number among two
numbers using a function definition as well as a
macro. Which is more efficient in terms of execution
time and code size ?
Write a program to sort a list of strings in
alphabetical order, using an array of pointers.
Wiite a program, using 'structures', to calculate the
gross salary and net salary, if the details of an
employee along with the basic pay, attendance and
deductions are given as input.
Write a program to count the number of characters,
number of words and number of lines in a given file.
1 0
7 0
1 t 1I U
1 0
1 nt v
1 n
(b)
(b)
M C S - o 1 1 1 1 , 0 0 0
MCA (Revised)
Term-End Examination
June, 2006
MCS-012 : COMPUTER ORGANISATION &ASSEMBLY LANGUAGE PROGRAMMING
Time : 3 hours Mqximum Mqrks: 700
(Weightage 75o/o)
Alote : Question no. I is compulsory. Attempt anythree questions Jrom the rest.
l . (a) Construct the Karnaugh map for the following
function, and find the function in sum of producl
form. Draw the resultant logic diagram.
F(A, B , C, D) : > (0 , 2 , 4 , 5 , 6 , 7 , 8 , 70 , 13 , 15)
Draw the logic diagram for a 4 x 4 random accessmemory. Assume that the cells of RAM are made ofR - S flip-flop.
Seek time on a hard disk is 50 ms. It rotates at aspeed of 3000 rotations/sec. Each track on the diskhas 100 sectors. Find the average access time forthe disk.
(b)
(c)
MCS-O12 P.T.O
(d) Explain, with an example of each call, any five DOS
function calls supported by INT 21H in the 8086
assembly language. 10
(e) Explain, with an examPle, the
logic-microoperations :
(i) Selective comPlement
(ii) Mask operations
following
(iii) Insert
(iv) Clear
What is the need of master slave flip-flop ? Explain
its functioning with the help of a suitable diagram'
Write a program to evaluate the following expression
using an accumulator machine :
A = B + C " D . E + F
How can ihe subtraction operation on binary numbers
be achieved by using addition operations only ?
Explain this, using a 4-bit binary number.
(0
(g)
2. (a)
(b) Construct a 4-bit right-shift register with serial
input-output using D flip-flops. Describe its
functioning.
(c) What is a micro-instruction ? Explain the three
micro-instruction formats, with the help of suitable
diagrams. 10
5
MCS-012
3. (a)
4. (a)
(b)
5. (a)
(b)
(c)
Explain the process of handling an interrupt thatoccurs during the execution of a program, with thehelp of an example.
Write a program in 8086 assembly language thatchecks an input string against a password stringstored in the memory and outputs an appropriatemessage if the strings are not equal.
What is the significance of FAT ? What are thelimitations of FAT 16 ?
What is the sequence of micro-operations required tofetch an instruction ?
Explain any five addressing modes used in an 8086microprocessor, with the help of an example ofeach.
Assume a computer has 32 word RAM each havinga word of 16 bits and a cache memory of 4 blocks,with each block having 16 bits. Where can we find amain memory address 21 in the cache (if it exists) if
(i) Set associative mapping is used ?
(ii) Direct mapping is used ?
(iii) Associative mapping is used ?
Explain your answers with the help of a diagram ineach case.
Write an 8086 assembly language program that findsthe largest,'and the second largest number from a listof 10 numbers stored in the memorv.
(c)
1 0
MCS-012 P.T.O.
(b) Draw the logic diagram of a full adder. Create a 2-bit
adder-subtractor circuit using the block diagram of
the full adder. 6
(c) Explain the following with the help of an example or
a diagram, whichever is appropriate : I
(i) Parity bit
(ii) Floating point notation
(iii) Refresh rates in video controllers
(iv) An l/O channel
MCS-O12 1 1,000
MCA (Revised)
Term-End Examination
June, 2006
MCS-013 : DISCRETE MATHEMATICS
Time : 2 hours Mqximum Marks: 50
Note : Question number 7 is compulsory. Attempt any
three questions from the rest.
l. (a) Prove (p + q) = (-p v q) using a truth table. 2
(b) Express the following statement using existential
quantifiers : 2
-(vx P(x))
(c) Give a direct proof of the statement "The cube of
an odd integer is odd". 4
(d) Find the logic circuit corresponding to the statement
( (x , v x r ) 'n (x , A x i ) ' ) ' S
(e) Let f and g be functions defined by f(X) = x2,
Sfi) = x * 1. Check whether foS(X) = gof(X). 3
MCS-o13 P.T.O.
(0 In how many different ways can a 7-personcommittee be formed containing 3 women and4 men from amongst a group of 20 women and30 men ?
(g) How many numbers between 1 and 100, both
inclusive, are there which are divisible by 2 or 5 ? 3
2. (a) Let A and B be n x n matrices. Check the truth value
of the following statements : 5
( i ) l B v A 1 ( A + B ) = A l
(ii) lB VA [A + B = 1,.,1
where I,., is the n x n identity matrix.
(b) Let A = 17, 2, 3, 4, 5lr. Let R be a relation defined
on A such that aRb iII a + b. Check if R is a 3
(i) Reflexive relation
(ii) Symmetricrelation
(iii) Transitive relation
(c) For the sets A, B, C represent
. ( i ) A u ( B n C )
( i i ) A A B
using Venn diagrams. 2
3. (a) Prove by mathematical induction that
1 3 + 2 3 + 3 3 + . . . * n 3 _ n 2 ( n + 1 ) 24
MCS-O13
(b) For the boolean algebra
( { 0 , 1 1 , A , V , ' )
evaluate the boolean expression
E(X1, X2, X3) = (X1 v X2) (X i vX;)n(X, vXr) '
f o r X r = 0 , X 2 = 1 , X 3 = 0 .
(c) Four cards are chosen randomly from a pack of
52 cards. What is the probability that all four are
kings ?
4. (a) Using truth tables, check if each of the following is
a tautology or not.,
( i ) ( q n p ) v ( q n - p )
(ii) p ^ -p
(iii) q -+ (q --> p)
(b) Differentiate between a theorem and a conjecture.
Also give an example of a famous conjecture which
is not a theorem.
(c) Use Pascal's triangle to find 7C'
(d) Define a multinomial coefficient.
MCS-013 P.T.O.
5. (a)
(c)
(d)
For the following functions defined in tabular form
below, find the boolean expression in CNF and
DNF.
Show that in a group of 100 people we can alwaysfind 9 people who were bom in September.
Define a partition, and find Pu3.
Find the number of 4-letter words which can beformed using the English alphabet. How many will
begin with a vowel ?
x1 x2 x3 f(x1, x2, x3)
0 0 0 1
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 1I
1 1 0 1
1 1 1 0
MCS-O13 1 1,000
\ MCA (Revised)
Term-End E>ramination
June, 2006
MCS-014 : SYSTEMS ANALYSIS ANDDESIGN
Time: 3 hours Maximum Mqrks : 700
(Weightqge 75o/o)
Note : Question number 7 Is compulsory. Answer any
three questions from the rest.
l. (a) What is a System ? List the various types of systems
and explain each of them in detail.
(b) Explain the role of a system analyst in software
development.
(c) Differentiate between the following :
(i) Coupling and Cohesion
(ii) Decision tree and Decision table
(iii) Alpha Testing and Beta Testing
(iv) Forward Engineering and Reverse Engineering
1 0
7 0
MCS.O14 P.T.O.
(d) Consider the following situation :
A bank offers two types of savings accounts, Type A
and Type B. For the Type A account, the bank pays
a dividend on the account balance at the end of eachquarter. The balance can be insured. The insured
amount gets 8'750/o annual interest. The uninsured
amount gets 5'00o/o annual interest.
For the Type B account, dividends are paid monthly
on an average daily balance for that month. No
dividend is paid for a balance below Rs. 2,000,/-,
otherwise 50lo interest is paid on the first Rs. 5,000/-,
5'5%o on the next Rs. 20,000/- and 7o/o over
Rs. 25,000,/-.
Draw a decision table and a decision tree for this
situation.
What is a feasibility study ? Why is it important for
system design ? How does cost benefit analysis
contribute in it ?
Define logical design of a system. How is it
performed ? Describe the relationship between data
mining and logical design. Also, describe a tool for
data mining
What is a CASE tool ? How are CASE tools
important for an organization ? List the advantages
and disadvantages of CASE tools.
1 5
2. (a)
3. (a)
1 0
(b)
7 0
MCS-O14
(b) What is the importance of studying the maintenanceof a system ? Explain the various types of systemmaintenance in SDLC.
(c) Explain information security architecture, with thehelp of a suitable diagram.
4. (a) What are the risks and threats involved in a systemsecurity ? Also, briefly describe 3 risks and 3 threats. 10
(b) What are the mbthods for gathering the userrequirement ? What problems are encountered whenusing these methods ? 10
5. (a) Explain five components required to construct aDFD.
(b) Construct the zero level and first level DFDs for theproblem of "on line examination".
(c) Explain four reasons for the need of documentationof a system.
MCS-O14 1 1,000
MCA (Revised)
Term-End Examination
June, 2006
MCS-O15 : COMMUNICATION SKILLS
Time : 2 hours Mqximum Marks: 50
Note : Answer sll questions.
l. Read the following passage and answer the questions givenafter it :
Finally, a virus infects a worm and it has nothing to
do with computers. But it does have a lot to do withhumans. Courtney Wilkins, a microbiology andimmunology student at the University of Arkansas,
successfully infected the ... elegans earthworm with themammalian vesicular stomatitis virus and had it replicate.
Others had tried and failed before and Wilkins'
breakthrough will let researchers learn more about howviruses move from one host to another, and whatproteins they attach to in humans. Some cells in Celegans, a microscopic earthworm comrhonly used inbiomedical research, are similar to some human cells.
1 iM C S - o 1 5 P . T . O .
"There were a lot of labs interested in whether this
could work, so it just seemed pretty exciting,l' she said.
Since January 2002, Wilkins began siudying whether she
could infect the worms with a virus and have the virus
spread. She usually worked with muscle or intestinal cells
and eventually settled on using the vesicular stomatitis
virus. The virus is related to rabies and similar to
foot-and-mouth disease and mostly infects livestock,
Wilkins said. It took three to four months to establish the
cell cultures. Khaled Machaca, one of Wilkins' advisers
and a professor of cell biology,. said the experiment
wasn't without its rough spots. He said that there were
points when he had to remind Wilkins that her decision
to undertake the research was a risky one, because it was
unknown whether it would work. And that meant Wilkins'
degree was at stake, because her career could be stopped
if nothing came of the research, he said.
After two years, it was clear that Wilkins was
successful in her experiment. Wilkins remeinbered
discovering about 9 pm, one night in 2004 that the VSV
had replicated inside the worm cell. She immediately
called Marie Chow, a professor of virology and another
advisor. "Courtney gets so excited that she starts to
stutter," Chow-said. "She couldn't get the words out, so
we knew there was something to it," she said.
MCS-o15
(i) How was the research mentioned in the passage a
risky proposition ? 2
(iil Whai was the outcome of the research ? 1
(iii) What was the researcher's.reaction to the outcome
of the research ? Why was it so ? 2+2
(iv) Find out a word from the passage which has similar
meaning as 'spread'. 7
(v) Use 'livestock' and 'rough spots' in a sentence each
of your own to bring out their specific meanings. 2
2. Fill in the blanks choosing the most suitable word from the
choices given : 5
(i) They moved their new house two years
back. (round /on/over /into)
(ii) Be careful. Your gun should not go
accidentaily. (away I oII / ov er / on)
(iii) The Government was determined to push ihe
legislation . (through/in /on/oII)
(iv) I ran an old friend in Amsterdam.
(out/th rough / into / upi
(v) The flight could not take -- in time
because of the fog. (on,/off /up/awag)
3. Write down the text of a group discussion between four
participants on the need for more strict quality control
1 0measures in India. (About 500 words)
MCS-o15 P . T . O .
4.
5 .
You are Nihal Chand, Managing Director, Purifiers IndiaLtd. Write a Memo to all the three Managers (Sales,
Production and Finance) to hold a meeting with them, in aweek's time, for the yearly review of the Company.
Write a letter of application, together with your CurriculumVitae (CV) for the job in response to the followingadvertisement :
"COBOL Programmers, with minimum 2 years'experience required by a well-known Data ProcessingCompany in Delhi. Apply within 10 days to Box 65, NewDelhi - 110068.
1 0
7 5
M C S - o 1 5 1 1 ,000
MCA (Revised)
Term-End Examination
June, 2006
MCS-021 : DATA AND FILE STRUCTURES
Time :3 hours
Note: Question number 7 is compulsory. Attempt any
three questions from the rest. AII algorithms
should be written nearer to 'C language.
1. (a) Calculate the complexity of the following code by
using Big 'O' notation :
1. scanf ("%d", &n);
2. for ( i :1, m=n+66; i<:m; i++)
3. pr int f ("%d\n", i ) ;
4. for (j:n/27, m:n/5; j<:m; j++)
5. printf ("%d\n", j);
Also compute the overall complexity of the given
code.
(b) Derive the expression for computing the height of a
complete binary tree. Also, compute the height of a
complete binary tree of 1024 nodes.
Maximum Marks : 700(Weightase 75%)
7 0
MCS-021 P,T.O.
1 0
1 0
(c)
(d)
(e)
Write a program to delete the leftmost node from a
doubly linked list.
Construct a heap for the list given below. Clearly
indicate the changes in each step.
4 , 2 , 7 , 7 , 6 , 5 , 9 , 3 , 9 9 , I
Show that the lower orderefl terms and the constant
terms do not matter in computing the complexity of
the algorithm in Big 'O' notation.
Write a program to create an AVL binary tree, insert
an element into the tree and display the tree.
Write five differences between :
(i) Sequential file and Index file
(ii) Linear Data structure and
structure
Data
Consider the matrix
l z 3 1 lt tt l
A = 1 1 2 0 lt lL1 3 1Js . s
(i) Write the steps involved in calculating the ranlc
of A.
(ii) Write an algorithm to find the transpose of A.
Write an algorithm to implement binary search.
2. (a)
(b)
3. (a)
(b)
MCS-021
1 0
5+5
Nonlinear
5
5
1 0
4. (a) (i) How does DFS algorithm differ from BFSalgorithm ?
(ii) What are the steps of DFS algorithm ?
(iii) Give two examples each of applications inwhich the BFS and DFS algorithms,respectively, are implemented. 10
(b) Write an algorithm each for PUSH & pop
operations on a stack, implemented using linked list. 10
5. (a) Explain Dijkstra's algorithm with the help of anexample. Which shortest path algorithm is the mostefficient ? And why ?
'
(b) Write the quick sort algorithm. Further, use the inputnumbers given below in the algorithm, and show-each and every step of the algorithm.
7 , 6 , 7 , 0 , g , 72 , 3 , 2 , 5 , 2g
1 0
1 0
MCS-021 5,000
MCA (Revised)
Term-End Examination' June, 2006
MCS-022 : OPERATING SYSTEMCONGEPTS AND NETWORKING
MANAGEMENT
Time : 3 hours Mqximum Marks: 700
Note : Question number f. is compulsory. Answer anythree questions t'rom the rest.
l. (a) Describe the structure of 5 classes of IP addresses. 5
(b) Differentiate between the following concepts : 6
(i) Multiprogramming
(ii) Multitasking
(iii) Multiprocessing
(c) Write a shell script that prints a list of every uniqueword in a file, in reverse alphabetical order. 6
(d) Explain the function of the following : 4
( i ) L S - L
(ii) /etc/shadow Iile
MCS-022 P.T.O.
(e) Define the concepts of domains, workgroups and
trusted relationships in the context of Windows
2000.
(f) What is Kerberos ? Describe Kerberos management
in the Windows operating system.
k) Describe two types of back-ups.
(h) Differentiate between virtual circuit and datagram
approaches to packet switching.
2. (a) Explain four basic design issues in a multimedia
operating system.
(b) Differentiate between theTCP/lP and OSI relerence
models, and map the layers between the two
approaches.
(c) How would you set the IP address of a LAN card in
Lintx ?
3. (a) Describe the various security features in the Windows
2000 operating system. Further, explain the
difference between the security features of an OS and
of a network. 10
(b) Describe the steps needed to configure the network
file sewer in the LINUX operating system; .- 5
(c) Explain the drawback of LINUX. 5
6
5
MCS-022
4. (a) Describe the GUI features of Linux. Also explain the
corresponding GUI features of Windows 2000.
Further, compare the usefulness of these features. 10
(b) Describe two features of the Intrusion Detection
5System (lDS).
(c) What are the requirements for a user to be able to
kill a process in Linux ? Write the necessary
commands. 5
5. Describe the following : 20
(i) Fault tolerant system
(i i ) sNMP
(iii) IPSec
(iv) Architecture of the Windows 2000 operating system
MCS.O22 5,000
MCA (Revised)
Term-End Examination
June, 2006
MCS-023 : DATABASE MANAGEMENTSYSTEMS
Time : 3 hours Maximum Mqrks : 700(Weightage 750/o)
Nofe : Question no. I is compulsory. Attempt anythree questions from the rest.
1. (a) Consider the following requirements of a company :
(i) The company is organized into departments.
Each department has a name, a unique number,
and a particular employee who manages the
department.
(ii) A department controls a number of projects,
each of which has a name, a unique number
and a single location.
(iii) An employee has name, id#, address, salary,
sex, and bdate. An employee is assigned to one
department but may work on several projects.
MCS-023 P.T.O
(b)
(iv) We are keeping track of the dependents of
each employee for insurance purposes. We
keep each dependent's name, sex, birthdate,
relationship to the employee. Draw the E - R
diagram for the company. Make suitable
assumptions, if any. Fxplain all the relationships
in your E - R diagmm w'r-t. relationship
cardinality and participation constraints'
Given the relation (R) shown below, state wh6iher
or not the following functional dependencies are
satisfied by the relation or cannot be determined. Give
reasons for your answers.
A + B, A -+ C, AB -+ C, C + A, BC -+ A,
A C - + B , B - + A
fxplain five differences between the' database
approach and the file based approach'
(c)
r(R)
A B C
1 4 2
3 5 6
J 4 6
7 3 8
9 1 0
MCS-023
i
(d) Consider the following relational schema :
STUDENT (sname, Phone, dob, s-id)
COURSE (1$, c-tame, credit, teacher-id)
RESULT (s-id, c-id, marks)
Formulate the SQL queries for the following : 70
(0 Find the names of the students whose results are
not declared in anY course.
(ii) Find the teachers who are teaching more than
one course.
(iii) Display the name and marks of those students
who were born before '1-1-1985' and have
scored more than 80 mark in any course'
(iv) Find the details of students securing pass marks
(50%) in more than 3 courses.
(v) Find the total number of credits earned by a
student whose id is 10'
(e) What is serializability ? Explain this with the help of
an example. How is it related to concurrency
control ? 5
(fl What are two advantages and one disadvantage of
data replication ? Explain the classification of
replication. 5
2. (a) Consider a relation R with five attributes A, B, C, D
and E, having the following FD's :
A - + B , B C + E , a n d E D - + A .
(il List anY two candidate keYs of R'
(ii) Is R in 3NF ? ExPIain'
(iii) Is R in BCNF ? ExPlain. 10
MCS-023 P.T.O.
(b)
(c)
Describe the 3-tier client-server architecfure. List 4advantages of client-server architecture.
What is data independence ? How can_you achieve
data independence ? Explain this with the help of anexample.
Explain primary, secondary and clustering indices,
with the help of an example each. Give a situationwith justification, in which multi-level indices arerequired.
Write a pseudocode of two different types ofconcurrent transactions that may be executed in aRailway reservation system. What are the concurrency
related problems that may be encountered inconcurrent execution of the transactions above ?
What is a checkpoint ? How is it useful for theprocess of recovery ? Explain this with the help ofsuitable example.
What is an Inverted file organization ? Explain thiswith the help of an example. What are itsadvantages ?
What are the different levels of security for databasesystems ? What is the relationship between securitgrand integrity ?
3. (a)
4. (a)
1 0
(b)
1 0
(b)
(c)
MCS-023
5. Explain the following in the context of DBMS, with thehelp of an example or diagram :
(i) Views
(ii) Referentialintegrityconstraint
(iii) Database manager
(iv) Data dictionary
(v) Strict 2-phase locking
MCS-023 5,000
J
trcs{r-lMCA (Revised)
Term-End Examination
June, 2006
MCS-024 : OBJECT ORIENTEDTECHNOLOGIES AND JAVA
PROGRAMMING
Time : 3 hours Maximum Marks: 700
Note : Question number 7 is compulsory. Attempt any
three questions from the rest.
l. (a) Explain the concept of Polymorphism. Also, give an
example of a Polymorphism. 5
(b) What is an object ? How are objects and classes
associated with each other ? Also give two
advantages of messages passing between objects. 5
(c) When can an object be used as a reference of
another object ? What care should be taken in such
kind of referencing ? Your explanation should be
supported by an example. 5
(d) What is multilevel inheritance ? How does it differ
from multiple inheritance ? Also give an example of
multiple inheritance. 5
MC5-024 P.T.O.
(e)
(f)
What are the five issues that are to be taken care of
while overriding a method ?
Explain the concept of Multithreading with the help
of a diagram. Also, give at least two advantages of
Multithreading.
Give the reasons why the main( ) method in Java is
defined as public and static. Also explain, why the
name of Java class containing the main( ) method
has the same name as the name of the file in which
it is stored.
Where does the Applet class appear in the
hierarchy of Java classes ? Show this through a class
hierarchy diagram.
Explain the eight basic features of Java.
What is a Package ? Explain the process of defining
your own package, with the help of an example.
Write the syntax, and explain, any four constructors
of the String class.
Explain the order of constructor calling in multilevel
inhefitance, with the help of an example
What is this pointer ? Explain its use'with the help
of an example.
What is the method to retrieve the colour of the
text ? Write a program to retrieve RGB values in a
given colour
What is a TCP socket ? Explain how a TCP socket
is different from a UDP socket.
k)
(h)
2- (a)
(b)
(c)
(d)
(e)
3. (a)
(b)
MCS-024
(c) What is 'abstraction' ? Explain two advantages of
abstraction with an examPle.
4. (a) Consider the following definition :
1 public class exam I
2 Public int a = 1;
3 public int b : 2;
4 public void method (final int c)
5 { i n t d = 3 ;
6 class assign I
7 Private void iMethod (int e) {
8 // line 8
e l10 1
1 1 l
1 2 1
Write all the variables among a, b, c, d and e that
can be relerenced at Line 8.
(b) Write a program to compute the factorial of a given
number in Java.
(c) Explain the seven steps that are to be followed to
establish a connection from a Java program to a
database.
(d) Write an Applet in Java that will display the current
date.
MC5-024 P.T.O.
5. (a)
(b)
(c)
(d)
What is a session ? Explain how hidden form fieldsare used for session tracking.
Write a program in Java using the StringBuffer classwhich reverses the string "IGNOU MCA student".
Write five differences between an interface and anabstract class.
What is method overloading ? Explain how a methodis overloaded in Java, with an example.
- MCS-024 5,000
MCA (Revised)
Term-End Examination,
June, 2OOG
MCS-031 : DESIGN AND ANALYS|S OFALGORITHMS
Time :3 hours Maximum Mqrks : 700
Note : Question no. I is compulsory. Attempt anythree questions from the rest. All algorithmsshould be written neqrer to C/C++ Ianguage.
1. (a) (i) Show that for. any real constants a and b,where b > 0.
(n + a)b = @(nb). 6(ii) Give an analysis of the efficiency of ihe Binary
Search and Linear Search methods. 4
(b) What is Randomized euicksort ? Analyse iheexpected running time of Randomized euicksort,with the help of a suitable example. 7
(c) Explain the Greedy Structure algorithm. Give anexample in which the Greedy technique fails todeliver an optimal solution. s
MCS-031 P.T.O.
(d)
(e)
(f)
Describe the two properties that characterise a good
dynamic programming Problem.
Define an NP-complete problem. Give examples of
two such problems.
Why does the complexity of an algorithm need to be
analysed ? Show that the Travelling Salesperson
problem is NP-comPlete.
What is the running time of heapsort on an array of
length n that is already sorted in increasing order ?
What about the time for decreasing order ?
What is the difference between dynamic programming
and the greedy choice approach to solve problems ?
Explain the significance of the notation ro' Consider
function f, defined by
f ( x ) = 5 * 3 + 3 x 2 + 1 0 '
Show that f(x) = trl(x2).
Design a TM to compute the binary function
MONUS, defined as follows.
M O N U S : N x N - - + N
[ m - n i f m > n
such that MONUS (m, n) = {| 0 otherwise
1 0
2. (a)
(b)
(c)
(d)
MCS-031
3. (a) Show how a DFS (Depth First Search) works on the
graph below. Assume that the vertices are
considered in alphabetical order and assume that the
graph is represented using adjacency list
representation in which each adjacency list is ordered
alphabetically.
For each vertex, write the time it is discovered (i.e.,
it becomes known) to its left and the time it is visited
(i.e., its adjacent nodes are generated) to its right in
the diagram below. For each edge, write its
classification next to it in the diagram.
(b) Build regular expressions and corresponding Finite
Automata (FA) for the following languages over the
alphabet ) : {a, b}. 70
(i) Language having words in which total no. of a's
is a multiple of three.
(i0 Language having exactly two b's in any word.
find the ith order
(i.e., Randomized
1 0
4. (a) Write a randomized algorithm to
statistic in a set of n elements
Select). I
MCS-031 P,T.O.
(b)
(c)
Write a recursive procedure to compute the factorial
of a number.
Design a Turing Machine that increments a binary
nurnber which is stored on the input tape.
Consider Best first search technique and Breadth first
search technique. Answer the following with respect
to these techniques. Give justif ication for your
answer in each case.
(i) Which algorithm has some knowledge of
problem space ?
(iil Which algorithm has the property that if a
wrong path is chosen, it can be corrected
afterwards ?
Write Kruskal's algorithm and use it to find a
minimal cost spanning tree of the following graph.
(Show the intermediate steps).
5. (a)
(b)
1 0
(c) How does alpha beta pruning improve the minimax
procedure ?
MCS-031 8.000
MCA (Revised)
Term-End Examination
June, 2006
MCS-032 : OBJECT ORIENTED ANALYS|SAND DESIGN
Time : 3 hours Maximum Msrks : 700
Note : Question number 7 is compulsory. Attempt onythree questions from the rest.
1. (a) A bank has branches in major cities of India. Theemployees working in the offices are categorised asBranch Manager and clerks. If needed, the Branch
Manager also has to work as a clerk. The bank deals
with its customers in terms of opening different typesof accounts, deposits and withdrawal of money. Thebank wishes to develop a system for each of itsbranches. Identify the classes in the system and drawa class diagram. Each class must have at least three
attributes and two operations. Make necessary
assumptions, if any.
(b) What is encapsulation ? Explain two benefits ofencapsulation with an example.
1 0
MCS-032 P.T.O.
(c) What is a state diagrarn ? Explain the different
notations used in state diagram.
(d) What is a'use case ? Explain different components of
a use case.
(e) What is an association ? Explain the differences
between one-way association and two-way
association, with an example for each'
(fl What is an integrity constraint ? Explain 'referential
integrity constraint' with an example.
k) Explain why more emphasis is given on object
structure rather than on operation implementations
in object oriented systems development'
2. (a) Draw, and explain, a state diagram for an ATM
system. 70
(b) Explain the following in the context of a DFD ' 70
(i) Process
(ii) Data Flow
(iii) Actor
(iv) Data Store
Also, illustrate all these components in an example
DFD.
3. (a) What is concurrency in objects ? Explain, with an
example, how concurrency is identified in a dynamic
model.
MCS-032 2 +
(b) Explain how associations are implemented as a class,
with diagrams and code written in C++dava' 10
(c) What is persistency ? Explain, with an example, how
persistent data are identified. 5
4. (a) What is a collaboration diagram ? Draw and explain
a collaboration'diagram for a l ibrary system' Make
necessary assumptions 10
(b) What is composition ? Take an example o{
composition and draw a UML diagram for it ' 5
(c) Explain generalization and specializatio.n, with an
example for each. 5
5. (a) What is an event ? Explain how concurrent events
are handled. 5
(b) With the help of a suitable example, explain how
objeci classes are mapped to tables. 5
(c) What is inheritance ? What is the need for
adjustment of inheritance ? Explain one way of
adjustment of inheritance, with an example. 10
MCS-032 8,000
MCA (Revised)
Term-End Examination
June, 2006
MCS-033 : ADVANCED DISCRETEMATHEMATICS
Time : 2 hours Maximum Msrks: 50
Note : Question no. I is compulsory. Attempt any
hr"" t""ttr""t frt
1. (a) Check whether ," - |
62 - n + 2) is a solution to
the recurrence below or not.
an - 4a,,- 1 + 4an -z = 2n, n > 2.
Also check whether the recurrence is homogeneous. 3
(b) State Euler's formula for a planar graph. Give an
example of a planar graph with 6 vertices and
S-regions, and verify Euler's formula for your
example. 4
MC5-033 P.T.O.
(c) A post office has stamps only in denominations ofRe. 1, Rs. 2 and Rs. 5.
(i) Find the generating function for the number ofways in which you can pay n rupees usingthesL stamps.
(ii) If the post office has only 20 stamps of Re. 1,10 stamps of Rs. 5 and 10 stamps of Rs. 2,find the number of ways in which you can paya postage of Rs. n.
Consider the following graph.
(i) Write down the degree sequence of the graph.
(ii) Draw the complement of the graph.
(iii) How many edges need to be removed to get aspanning tree of the graph ? 4
(e) Using an appropriate substitution, solve therecurrence
n - 1Yn =
n Vr,-1 + n for n t 1, go = 1
(d)
vJ
v4
MCS-033
2. (a)
(b)
3. (a)
4. (a)
(b)
Let an be the number of subsets of l I , 2,3, . . . , nJwith at least two elements, n > 1.
(i) What are the values of. a, a, and a, ?
(ii) Set up a recurrence for an, and solve it.'The Petersen graph is bipartite.' True or false ?whv ?
Find the vertex chromatic and edge chromaticnumber of the following graph :
v4
Let A(x) be the generating function of a sequence{aO, a' uz, . . . l .Find the generat ing funct ion of thesequence {ao , ao * u l ,u1 + a2 , . . . } . Use th is todeduce the identity
C(n , r ) + C(n , r + 1 ) = C(n + 1 , r + 1 ) , r> 1 .
Define the edge connectivitgr ),(G) of a graph G.Give examples of graphs G, and G, such that),(G1) = d(Gr) and ),(G2) < 6(Gr). Is it possible to finda graph G with f(G) > 6(G) ? Justify your answer.
MCS-033 P.T.O.
(b) Find the general form of the soluiion to a recurrence
relation with constant coefficients for which ihe
characteristic roots are 1 with multiplicity 2 and 2
with multiplicity 1. The relation also has a
non-homogeneous. part which is a linear combination
of n2 and 2".
Find the generating function of the sequence {a,.,},where an satisfies ar., - Sar.,_ 1
- 6un_r, Ior n> 2,
a n d a o = 1 , a r = 1 .
State Dirac's and Ore's sufficiency condition for agraph to be Hamiltonian. Which of the conditions is
stronger ? If neither of the conditions apply for a
graph, can you conclude that the graph is
non'Hamiltonian ? Justify your answer with
examples.
5. (a)
(b)
MCS-033 8.000
MCA (Revised)
Term-End Examination
June, 2006
MCS-034 : SOFTWARE ENGINEERING
Time: 3 hours Maximum Marks: 700
Nofe : Question no. I is compulsory. Attempt any
three questions from the rest.
l. (a) Explain the key process areas associated with the five
levels of Capability Maturity Model (CMM). 10
(b) What is the relationship on which estimation models
are based ? Explain the COCOMO model in detail,
with ihe hetp of an example. 70
(c) Define the term Sot'tware Quality. Explain any nine
attributes of software quality. 10
(d) What are CASE tools ? Explain the various categories
of CASE tools. Also, depict the positioning of CASE
tools in a Software Application development, with the
7 0help of an example.
MC5-034 P.T.O.
2. (a)
(b)
3. (a)
(b)
4. (a)
(b)
5. (a)
Write the outline of Software RequirementSpecifications (SRS). With the help of a suitableexample, explain the different sections of an SRSdocument.
Draw, and explain, a risk analysis table.
What is the objective of data design ? What are theattributes that include the description of differentdata items ? Give an example data item indicating itsattributes.
Write any seven challenges faced by CBSE(Component Based Software Engineering).
Define Bqseline. Explain the process of makingchanges to a Baseline, with the help of a diagram.
Define Software Project Management. Explain anyfour elements of it.
What is SoJtware Project Verification ? Write all thetest case selection guidelines for Boundary ValueAnalysis, and illustrate them using an example.
Explain the factors that affect the task set for aproject.
1 2
8
1 3
1 0
1 0
1 2
(b)
MCS-034 8,000
MCA (Revised)
Term-End Examination
June, 2006
MCS-035 : ACCOUNTING AND FINANCIALMANAGEMENT
Time :3 hours Msximum Mqrks : 100
Note : Question 7 is compulsory. Attempt any three
quest ions Jrom the remaining quest ions.
l. (a) From the following Trial Balance, prepare a Trading' Account, Profit and Loss Account for the year ended
37.72.2005 and a Balance Sheet as on that date : 30
Dr. Rs. Cr. Rs.
Investments 1,800 Sales 75,000
Plant and Discount onMachinery 6,000 purchases 1,200
cash 600 lt"yttlol .for bad debts 1,500
Sundry debtors 10,500 Capital 15,000
MCS-035 P.T.O.
Dr. Rs. Cr. Rs.
stock 28.800 Sunlwcreditors 6,990
Wages 9,600 Bills payable 3,500
Railway State Bankcharges 1,500 A/c I ,2OO
Purchases 36,000
Return inward 300
Income tax 150
Insurance 1,500
Discount onsales 1,500
Repairs toplant 48O
Travellingexpense 1,500
Rent paid 600
Interest onoverdraft 60
Drawings 1,500
Advance (Dr) 2,000
MCS-035
Adjustments :
(i) Closing stock Rs. 10,500.
(ii) Wages outstanding Rs. 900.
(iii) Rent is payable @ Rs. 60 per month.
(iv) Commission earned but not received Rs. 1,000.
(v) Write off bad debts Rs. 800 and adjust theprovisions for doubtful debts at 5%.
(vi) Depreciate plant at 10% p.a.
(vii) Interest on capital at 5%o p.a.
(viii) The proprietor introduced an extra Rs. 1,000capital on 1tt December.
(ix) Prepaid insurance amounted to Rs. 500.
(b) Shree Pipes Ltd. uses about 75,000 valves per year
and the usage is fairly cohstant at 6250 per month.
The valves cost Rs. 1.50 per unit when bought inquantities and the carrying cost is estimated to be20o/o of average inventory investment on annualbasis. The cost to place an order and process the
delivery is Rs. 18. It takes 45 days lo receive deliveryfrom the date of an order and a safety stock of3,200 valves is desired. You are required to
determine : 10
(i) The most economical order quantity and
frequency of orders.
(ii) The order point.
(iii) The most economical order quantity if the
valves cost Rs. 4.50 each instead of Rs. 1'50
each.
MCS:035 P.T.O
2. Explain the meaning and significance of the following
accounting concepts, giving suitable examples for each : 20
(i) Business entity
(ii) Money measurement
(iii) Continuity
(iv) Cost
3. (a) Explain the concept of agency relationship, and
elaborate on the problems and cost associated with
it.
(b) Briefly explain the various evaluation criteria used for
evaluating capital projects.
4. What are the various sources of working capital ? Explaingiving suitable examples.
5. Highlight the main components of a credit policy. Briefly
discuss the different credit policy variables giving examples
of each. 20
6. What is treasury management ? What are the main
functions and focus areas of the treasury department ? 20
MCS-035
1 0
1 0
20
8,000