M.SC (Computer Science) 2008 2011 Pattern
M.SC (Computer Science) 2008 2011 Pattern
[5440]-102
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 102 : Advanced Networking
(2011 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) Draw a diagram wherever necessary.
3) Figures to the right indicate full marks.
P.T.O.
Q3) Attempt any four from the following : [4 × 4 = 16]
a) With example explain how encryption works.
b) Why there is a need of SSL?
c) What is passive attack? Explain two types of attack.
d) Differentiate between IPV4 and IPV6.
e) Explain silly window syndrome in TCP.
[5440]-102 2
Total No. of Questions : 5] SEAT No. :
[5440] - 11
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 101: Principles of Programming Languages
(2008 Pattern)
Time :3 Hours] [Max. Marks :80
Instructions to the candidates:
1) All questions are compulsory.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right indicate full marks.
4) Assume suitable data, if necessary.
P.T.O.
e) Consider the following pseudocode:
a : integer -- global
procedure set_a (n: integer)
a: = n
procedure print_a
write _ integer (a)
procedure one
Set_a (1)
print_a
procedure two
a : integer
set_a (2)
print_a
set_a (0)
one ( )
print_a
two ( )
print_a
i) What does this program print if the language uses static scoping?
ii) What does it print with dynamic scoping? Why?
M M M
[5440] - 11 3
Total No. of Questions : 4] SEAT No. :
[5440] - 12
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS- 102 : Object Oriented Software Engineering
(2008 Pattern)
Time :3 hours] [Max. Marks :80
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
P.T.O.
Q3) Attempt any four. [4 × 8 = 32]
a) Draw a class diagram and usecase diagram for placement agency.
b) Draw a collaboration diagram for banking transitions.
c) Write note on
i) Component diagram
ii) Deployment diagram
d) Consider the case Mr. X. gives a telephonic call to Mr. Y. consider
various scenarios and draw continuous state chart diagram for telephone
object.
e) Draw an activity diagram and object diagram for 'www.amazon.com.'
M M M
[5440] - 12 2
Total No. of Questions : 5] SEAT No. :
[5440] - 13
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS- 103 : Distributed Database Concepts
(2008 & 2011 Pattern)
A1 A 2 A 3 S1 S2
q1 1 1 0¯ q1 40 2 ¯
¡ ° ¡ °
q 2 ¡ 0 1 0° q 2 ¡30 10 °
¡ ° ¡ °
q 3 ¢1 0 1°±
¡ q 3 ¢ 0 25°±
¡
[5440] - 13 2
d) Consider the relations.
Emp (Eno, Ename, Designation, Age, Pno) Proj (Pno, Pname, location,
Budget) Apply INGRES algorithm to the following query and illustrate
successive detachment and substitutions by giving mono- relational
queries.
Select Ename
From Emp, Proj
Where Emp, Pno = Proj, Pno
and Designation = "Manager"
and Budget > 500000
e) Consider a data items X and Y, with
RTS (X) = 3, WTS (X) = 3
RTS (Y) = 6, WTS (X) = 4
Let the pair < Ri (X), Ts > denotes read request of transaction Ti with
timestamp TS on data item X and the pair < Wi (X), TS > denotes write
request of transaction Ti with time stamp Ts on dataitem X. Indicate the
behaviour of the basic timestamp method with following sequence of
request.
< R3 (X), 5 >, < R4 (Y),7 > < R5 (X), 8 >
< W3 (X), 5 >, < R3 (Y),5 > < W5 (X), 8 >
[5440] - 13 3
Q5) Attempt any four of the following. [4 × 4 = 16]
a) With a proper diagram explain message transfer that takes place in 2
phase commit protocol.
b) Discuss deadlock avoidance algorithms in DDBMS
c) What are the rules for checking the correctness of fragmentation? Discuss
the correctness rules with respect to primary horizontal fragmentation.
d) List all the eight characteristics of query processor and explain any one
in details.
e) Write note on
- Optimistic concurrency control protocol.
M M M
[5440] - 13 4
Total No. of Questions : 5] SEAT No. :
[5440] - 14
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS- 104 : Design & Analysis of Algorithms
(2008 & 2011 Pattern)
Time :3 hours] [Max. Marks :80
Instructions to the candidates:
1) Figures to the right indicate full marks.
2) Neat diagrams must be drawn wherever necessary.
P.T.O.
c) Find an optimal solution to the knapsack instance n = 7, m = 15
(P1, P2 ...... , P7) = (10,5,15,7,6,18,3)
(W1,W2 .... W7) = (2,3,5,7,1,4,1)
d) Find the minimum cost of computing product of chain of matrices having
dimensions 20×5, 5×10, 10×10, 10×5 using dynamic programming.
e) Explain BFS method for a graph and draw BFS tree for G by starting at
vertex S.
d) Draw the portion of state space tree generated by LCBB for the knapsack
problem with fixed tuple where
W = (2,4,6,9) P = (10,10,12,18) n = 4, m = 15
e) Find all pairs shortest path for the following graph using dynamic
programming.
[5440] - 14 2
b) What is sum of subset problem? Find out the solution for sum of subsets
using fixed tuple size state space tree.
n = 5 m = 30 w = {5,7,10,13,15}
c) What is minimum spanning tree. Apply prim's & kruskal's algorithm to
obtain minimum spanning tree for the following graph.
M M M
[5440] - 14 3
Total No. of Questions : 8] SEAT No. :
[5440]-201
M.Sc. (Semester - II)
COMPUTER SCIENCE
CS - 201 : Digital Image Processing
(2011 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) Question No. 1 is compulsory.
2) Attempt any four from the reamaining.
3) Neat diagrams must be drawn wherever necessary.
4) Figures to the right indicate full marks.
Q2) a) Explain Erosion and Dilation with the help of diagrams, show that erosion
and Dilation are duals of each other. [8]
b) Write a short note on low pass filter for image processing. [4]
c) Write equations for obtaining 2D forward and inverse DFT. Give meaning
of each variable in the equation. [4]
P.T.O.
Q3) a) Give three different ways of acquiring image and explain any one in
detail. Mention an application of each method. [8]
b) Explain the process of harmonic filtering. Mention it’s application. [4]
c) Give the orientation of the lines which will be detected using following
four mask. [4]
–1 –1 –1 2 –1 –1 –1 2 –1 –1 –1 2
2 2 2 –1 2 –1 –1 2 –1 –1 2 –1
–1 –1 –1 –1 –1 2 –1 2 –1 2 –1 –1
Q4) a) Write a short note on Idial High Pass filter. Butterworth High Pass Filter.
[8]
b) What are the fundamental steps in edge detection. [4]
c) What is ‘Gamma Correction’? How is it implemented using power low
transformation. [4]
Q6) a) Describe the fundamental steps in digital image processing with the help
of a block diagram. 8]
b) Explain bit plane slicing. [4]
c) Define mixed adjacency. Explain how it eliminates ambiguity that often
arises with 8 - adjacency. [4]
Q7) a) Define ‘Opening’ and ‘closing’ operation. In what way do they differ
from each other. [8]
b) Explain what is meant by unsharp masking and highboost filtering. [4]
c) One dimensional image strip represented by {1 2 5 9 4 3} is to be
convolved with a filter kernel given by {–1 0 1}. Give the step-by-step
procedure of finding the answer. [4]
[5440]-201 2
Q8) a) A 32 × 32 pixel image has intensity distribution as shown in the table
given below. The intensity levels are in the range 0.7. Apply histogram
equalization technique and find the transfer function that relates output
image. Intensity level Sk with input image intensity level Vk. [8]
Intensity level No. of Pixels
V0 = 0 211
V1 = 1 344
V2 = 2 103
V3 = 3 127
V4 = 4 76
V5 = 5 57
V6 = 6 47
V7 = 7 59
b) Write the iterative algorithm for global thresholding. [4]
c) Write a short note on constrast streching. [4]
[5440]-201 3
Total No. of Questions : 5] SEAT No. :
[5440]-202
M.Sc. (Semester - II)
COMPUTER SCIENCE
CS - 202 : Advanced Operating Systems
(2011 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) All questions carry equal marks.
3) Neat diagrams must be drawn wherever necessary.
4) Assume suitable data if necessary.
5) Figures to the right indicate full marks.
Q2) State whether the following statements are true or false. Justify (any eight) :
[8 × 2 = 16]
a) At the Kernel level, support for protected process is two fold.
b) In linux the files are usually accessed via file names.
c) Symbolic links incur more overhead than hard links.
d) Kernel keeps the inode locked across the execution of the system call.
e) We can set only one of the two times values with the utime function.
f) No process can preempt another process executing in the Kernel.
g) Kernel allows context switch only when process is about to go to sleep.
h) Signal system call is used to send signal to a process.
i) A process sleeping and waiting for completion of disk I/O has a higher
priority than a process waiting for the free buffer.
P.T.O.
Q3) Attempt any four of the following : [4 × 4 = 16]
a) Explain thread scheduling scenarios in windows operating system.
b) What do you mean by unreliable signals?
c) Explain structure of executive thread block and kernel thread block.
d) Discuss various anomalies in the treatment of signals.
e) Write in brief about memory alignment.
[5440]-202 2
printf (“uid = % d euid = %d”, euid, euid);
fdmjb = open (“mjb”, O_RDONLY);
printf (“fdmjb = % d fdmaury = %d”, fdmjb,
fdmaury);
setuid (uid);
printf (“after setuid (%d) : uid = %d
euid = % d ln”, uid, getuid ( ), geteuid ());
setuid (euid);
printf (“after setuid (%d) : uid = %d
euid = % d ln”, euid, getuid (),
geteuid ());
}
c) Explain the behaviour of the following program
# include signal.h
sigcatcher ()
{
Printf (“PID = % d Caught one ln”, getpid ());
signal (SIGINT, Sigcatcher);
}
main ()
{
int pid;
Signal (SIGINT, Sigcatcher);
if (fork () = = 0)
{
Sleep (5);
ppid = getppid ();
for (; ;)
if (Kill (ppid, SIGINT) = = –1)
exit ();
}
nice (10);
for (; ;)
}
d) Explain the behaviour of following program.
main ( )
{
Char * endpt;
Char * sbrk;
[5440]-202 3
int brk ( );
endpt = sbrk (0);
Printf (“endpt = % ud after sbrk ln”, (int) endpt);
while (endpt – –)
{
if (brk (endpt = = –1))
{
Printf (“brk of % ud failed ln”, endpt);
exit ( );
}
}
}
e) Explain the behaviour of following program.
main ( )
{
int f;
char s [1024];
f = creat (“sample.dat”, 0666);
lseek (f, 2000 L, 2);
write (f, “hello world”, 11);
Close (f);
f = open (“sample . dat”, O_RDONLY);
read (f, s, 1024);
read (f, s, 1024);
read (f, s, 1024);
}
[5440]-202 4
Total No. of Questions : 5] SEAT No. :
[5440]-203
M.Sc. (Semester - II)
COMPUTER SCIENCE
CS - 203 : Data Mining and Data Warehousing
(2011 Pattern)
Time : 3 Hours] [Max. Marks :80
Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat diagrams wherever necessary.
3) Figures to the right indicate full marks.
[5440]-203 2
c) Suppose that the data mining task is to cluster points (with (x, y)
representing location) into three clusters, where the points are
A1 (2, 10), A2 (2, 5), A3 (8, 4), B1 (5, 8), B2 (7, 5), B3 (6, 4), C1 (1, 2),
C2 (4, 9)
The distance function is Euclidean function Suppose initially we assign
A1, B1 and C1 as the center of each cluster respectively. Use the
k-means algorithm to show.
i) the three cluster centers after the first round of execution.
ii) the final three clusters.
[5440]-203 3
Total No. of Questions : 5] SEAT No. :
[5440] - 21
M.Sc. (Semester - II)
COMPUTER SCIENCE
CS - 201 : Advanced Networking Concepts
(2008 Pattern)
Time :3 hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) Draw a neat diagram wherever necessary.
3) Figures to the right indicate full marks.
Q1) Attempt all of the following. [8 × 2 = 16]
a) What is protocol? State its elements.
b) Define any two functions of physical layer.
c) What is ICMP? and state its two categories of messages.
d) Define LAN and Ethernet.
e) Define Unicast address.
f) What are the service primitives of transport layer?
g) What are the port-numbers of FTP for data connection and control
connection?
h) Which protocol works for connection - oriented application and for
connection - less application?
P.T.O.
Q3) Attempt any four of the following. [4 × 4 = 16]
a) What are the advantages of frame relay over ×. 25?
b) What are basic requirement of an Internet? Discuss these requirement
with reference to an IP.
c) Explain any four BOOTP message format.
d) Explain the concept and need of metric in network.
e) Explain the fields of user datagram format.
M M M
[5440] - 21 2
Total No. of Questions : 5] SEAT No. :
[5440]-22
M.Sc. - I (Semester - II)
COMPUTER SCIENCE
CS - 202 : Unix Internals
(2008 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) All questions carry equal marks.
3) Neat diagrams must be drawn whenever necessary.
4) Figures to the right indicate full marks.
5) Assume suitable data, if necessary.
Q2) State whether the following statements are true or false. Justify your answer
(any four) : [4 × 4 = 16]
a) Terminal state of process denotes that process has finished its execution.
b) The kernel releases the inode while unmounting the file system.
c) Shell in an interface between user and operating system.
d) Open operation will fail if an attempt is made for creating a file which
already exists.
e) Idle process means its pid O.
P.T.O.
Q3) Attempt any four of the following : [4 × 4 = 16]
a) Explain UNIX system architecture.
b) Explain scenario for retrival of buffer.
c) Explain read and write operations of pipes.
d) How to save context of process in UNIX?
e) Explain create () system call in detail.
[5440]-22 2
Q5) Attempt any four of the following : [4 × 4 = 16]
a) Under which circumstances the process is swapped out.
b) What are the reasons for creating a process in UNIX?
c) Explain unlink file system call in brief.
d) Explain process states with neat diagram.
e) Write a short note on disk driver.
[5440]-22 3
Total No. of Questions : 5] SEAT No. :
[5440]-23
M.Sc. (Semester - II)
COMPUTER SCIENCE
CS - 203 : Software Architecture
(2008 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) All questions carry equal marks.
3) Figures to the right indicate full marks.
4) Neat diagrams must be drawn whenever necessary.
5) Assume suitable data, if necessary.
Q1) Attempt all of the following : [8 × 2 = 16]
a) What is UML?
b) State any one reason why software architecture is important.
c) Define Architectural styles.
d) What is Pattern?
e) What are different forms of coupling?
f) What are the types of responsibilities?
g) Write the characteristics of framework.
h) Define component.
Q2) Attempt any four of the following : [4 × 4 = 16]
a) Explain with example how to select specific architectural style.
b) What are the varying degrees of functional cohesion?
c) Explain with example the advantages of components.
d) What are the duties performed by MVC model and MVC view in a web
Tier Application?
e) Viewers evaluate contestants in a singing competition on voice quality
attributes by rating them. Evaluation data updates as more and more
viewers evaluate online. The result is displayed in variety of display formats
including bar chart, pie chart and tabular form.
Select the most appropriate design pattern to use to address the problem
and how it is applied give an appropriate class diagram containing relevant
classes to illustrate use of the pattern.
P.T.O.
Q3) Attempt any four of the following : [4 × 4 = 16]
a) Explain component Reuse.
b) Explain the criterias to classify design pattern.
c) Write short note on Homogeneous Architectures.
d) What are protected variations of GRASP?
e) State and explain scope of resources defined by struts application.
[5440]-23 2
Total No. of Questions : 5] SEAT No. :
[5440]-301
M.Sc. (Semester - III)
COMPUTER SCIENCE
CS - 301 : Software Metrics and Project Management
(2011 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) All questions carry equal marks.
3) Figures to the right indicate full marks.
P.T.O.
Q3) Attempt any four of the following : [4 × 4 = 16]
a) Explain Mccall’s software quality model in detail.
b) Differentiate between software reliability and Hardware reliability.
c) Discuss major problems faced in estimation of cost of IT project.
d) What are the different aspects of size in measuring internal project attribute
of software metrics?
e) Explain critical path Analysis method.
[5440]-301 2
Total No. of Questions : 5] SEAT No. :
[5440]-302
M.Sc. (Semester - III)
COMPUTER SCIENCE
CS - 302 : Mobile Computing
(2011 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) All questions carry equal marks.
3) Neat diagrams must be drawn wherever necessary.
4) Figures to the right indicate full marks.
P.T.O.
Q3) Attempt any four of the following : [4 × 4 = 16]
a) What are various strengths of SMS? Explain.
b) Explain GSM system architecture.
c) Explain Mobile Originated call with neat diagram in GSM.
d) What is the difference between GPS and GPRS?
e) Explain IP6 in Mobile IP.
[5440]-302 2
Total No. of Questions : 5] SEAT No. :
[5440]-303
M.Sc. (Semester - III)
COMPUTER SCIENCE
CS - 303 : Soft Computing
(2011 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right indicate full marks.
4) All questions carry equal marks.
5) Use of electronic pocket calculator is allowed.
P.T.O.
Q2) Attempt any four : [4 × 4 = 16]
a) What is defuzzification? Explain the centroid and weighted average methods.
b) Explain concept of convex fuzzy sets. What is fuzzy number.
c) Explain any four properties of GA.
d) Briefly outline the procedure of gradient descent based learning.
e) State the important properties of TLN’S.
a b c d
a ⎡ 1 0.3 0.6 0.8⎤
⎢ ⎥
b ⎢ 0.3 1 0.2 0.7⎥
R = ⎢ ⎥
c ⎢0.6 0.2 1 0.2⎥
⎢ ⎥
d ⎢ 0.8 0.7 0.2 1 ⎥
⎣ ⎦
[5440]-303 2
d) Determine the proposition “If L then M” for the fuzzy sets given
⎧⎪ 0.8 1 0.6 ⎫
⎪ ⎧
⎪⎪ 1 0.4 0.2 ⎫
⎪⎪
L= ⎨ + + ⎬ M= ⎨ + + ⎬
⎪⎩⎪ a b c ⎪
⎪
⎭ ⎪
⎩⎪ d e f ⎪⎪
⎭
e) Given the following two fuzzy sets.
⎧
⎪ 0 0.2 0.5 0.8 1 ⎫
Cold = C = ⎨ + + + + ⎪⎬
⎪
⎪a
⎩ b c d e⎪⎪
⎭
⎧
⎪ 1 0.9 0.5 0.3 0 ⎫
Hot = H = ⎨ + + + + ⎪⎬
⎪
⎪a
⎩ b c d e⎪⎪
⎭
Find membership functions for
i) Not very cold C & not very hot H
ii) Slightly cold C or not hot H
⎧ 0.4 0.8 1 ⎪
⎪ ⎫ ⎪⎧ 0.2 0.6 1 0.8 ⎪⎫⎪
P=⎪
⎨ + + ⎪ ⎬ Q = ⎪⎨ + + + ⎬
⎪
⎪
⎩ x1 x2 x3
⎪
⎪
⎭ ⎪⎪⎩ y1 y2 y3 y4 ⎪⎪⎭
Find
i) S=P×Q ii) T=Q×C
iii) U1 = S O T iv) V1 = S i T
[5440]-303 3
Q5) Attempt any two : [2 × 8 = 16]
a) Simulate the execution of perceptron learning algorithm for each epoch
on given inputs -
(1, 1, 1) (1, 1, –1) (1, 0, –1) (–1, 1, 1) (–1, 1, 1) (–1, 0, –1) with weight
vector (0, 1, 0) and η = 1. What is final weight vector.
b) Let X = {1, 2, 3, 4} and Y = {a, b, c, d} &
⎧ 0 .3 1 0.8 0 ⎪⎫
⎪
M=⎨ + + + ⎬
⎪
⎪
⎩ a b c d ⎪⎭⎪
⎧
⎪ 0 .5 1 0.7 ⎫
N = ⎨ + + + ⎪⎬
⎪
⎪a b c
⎩ d ⎪⎭⎪
Determine the implication relations
i) If x is in L then y is in M
ii) If x is in L then y is in M else y is in N .
c) Explain the basic genetic algorithm, Maximize F(x) = 2x over
{0, 1, 2, 3, ......... 31} with initial x values of (12, 23, 8, 16).
[5440]-303 4
Total No. of Questions : 5] SEAT No. :
[5440]-31
M.Sc. (Semester - III)
COMPUTER SCIENCE
CS - 301 : Software Metrics & Project Management
(2008 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
P.T.O.
Q3) Attempt any four of the following : [4 × 4 = 16]
a) What are steps involved in planning of data collection?
b) Define Risk identification. What are categories of Risk?
c) Describe project execution tools & techniques.
d) Write a short note on PSP.
e) Explain in detail project charter statement.
[5440]-31 2
Total No. of Questions : 5] SEAT No. :
[5440]-32
M.Sc. (Semester - III)
COMPUTER SCIENCE
CS - 302 : Mobile Computing
(2008 Pattern) (Credit System)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) Attempt all the questions.
2) Figures to the right indicate full marks.
P.T.O.
Q4) Attempt any four : [4 × 4 = 16]
a) What is the need of mobile ad-hoc network?
b) What are various components & interfaces of WAP architecture?
c) Write a note on agent discovery in mobile IP.
d) What are the different types of services defined in GSM.
e) What are important features of windows CE & Symbian operating system?
[5440]-32 2
Total No. of Questions : 5] SEAT No. :
[5440]-33
M.Sc. (Semester - III)
COMPUTER SCIENCE
CS - 23 - 303 : Information Systems Security
(2008 Pattern)
Time : 3 Hours] [Max. Marks : 80
Instructions to the candidates:
1) All questions are compulsory.
2) All questions carry equal marks.
3) Neat diagrams must be drawn wherever necessary.
P.T.O.
Q3) Attempt any four of the following : [4 × 4 = 16]
a) What is a firewall? Briefly explain its types.
b) Explain Kerberos.
c) List the steps involved in working of MD5. Explain process blocks in
detail.
d) Arya meets Riya and says zewfidrkzfejpjkvd.jjvtlizxp. If she is using
modified ceaser ciphar, What does she want to convey?
e) What is the real crux of RSA?
[5440]-33 2