i
#
_léegc
[This Questio Oo Paper PNtaing ¢
Printed pages. |
Your Roll No...
Sr. No. of Question Paper . 1045 Cc
Unique Pape; Vode 32341109
Name of the Paper Computer rchitecture
€ Of the Course > BSc,
(H) Computer Science
4 Semeste: I
m2 3 Hours Maxannim Marks : 75
Ss for Candidates ;
‘our Roll No. on the top. immediar
ely on Teceipt
question eRe1024 z
{b) How can a D flip-flop be ;
5K firp-flop? Explaim with the help of 2 block
> ¢)How meny 1288 memorn chi
| provide a memory capacity of 209615" (2
L control unit? . @
Program Counter and
@)
1 25 a floating
The hormalized
exponent has= as
2342011102
: B.Sc. (H) COMP
gore
Your Roll Noses"
1039
: Computer System Archit
SCIENCE (NEP-UGCI
2022)(i) Instruction from memory wil]
to this register,
The address part of the memory-refer
tion is transferred to this
Tegister contains the addres i
lion that will be executed (3
e-reference instruction? Give
ame the addressing mode used
ns? (G3)
© Operation (-5) + (-6) af
Mplement and 4-bit register1039 3
de
; . and deo?
(g) Write the microinstructions for fetch and ontrol
rith ©
phase of the instruction cycle along with (4)
Signals,
: w is it
(h) Briefly explain the working of encoder? Ho (4)
different from decoder?
: data
(i) Explain control command, status commanes tion
input command, data output command in (4)
to I/O communication.
2. (a) Draw the logie diagram of a 8-to-1 line nultiP ee
Explain its working with the help of func 2)
table. §
(b) Simplify the following Boolean function F, together
with the don’t-care condition d in SOP form and
draw the logic diagram for the simplified F.
F(A, B, C, D) = E(4, 5,7, 12, 13, 14)
d(A, B, cep) = 20.9,11, 15) (5)
(c) An instruction at address 021 in the basic
computer has 1=0, an operation code specifyin
the AND operation, and an address part equal g
083 (all numbers are in hexadecimal), The me be
word at address 083 contains the operand oy
and the content of AC is A937. Go oy aF2
a instruction cycle and determine the cont er the
acs hy the following registers: PC, AR, DR os of
at the end of each timing signal starti and IR
to the end of execute cycle, ing from rr.
(6)~ "tex
4
(a) Perform the following conversions -
(i) Convert the decimal numbe, 24
hexadecimal. 5.25 t)
- (ii) Convert (101101.11), to decimay (
4)
How many 2-to-4-line decoders wil] p.
construct a 4-to-16-line decoder? Give ;,
diagram of the same.
Used to
© block
(3)
insider the bus system shown below: (6)1039 5
n in
4 , . ; tive !
(i) The following control inputs ar¢ 4
the given bus system
ansfer
For each case, specify the register f cloc
that will be executed during the ne
transition.
a. Linea TR Read 5
b, 0 1 «0 AR i q
c L © ay DR Write :
ESOC OMMOMEEAC | 005 Add See
(i) Write the microinstruction to set the flip-
flop R to | including the control conditions.
4.
(a) Write the excitation tables for the JK flip flop.
How can you derive D flip-flop from a JK flip-
flop? Show with the help of a block diagram.
(4)
(b) The memory unit of a computer has 256K words
of 32 bits each. The computer has an instruction
format with four fields: an operation code field, a
mode field to specify one of seven addressing
modes, a register field to
processor registers
‘ pecify one of the 56
» and a memory aq :
Specify the instructi ess.
on format and the numb
bits in each field if the instruction is a
in One memory,
word. pemory
(3)
(c) Assuming the time delay of the four’ .
a pipeline are as follows - ‘Ur Segments in
(, = 50 ns, t, = 30 ng, t, = 95 :
- 2. 3 : \
interface registers delay time | = ore 386
would it take tO execute an Instruction over 109
‘airs of data in the Pipeline? What Will be the
eedup ratio if the time taken {o ex
a ene “cute same
instruction in a Hon-pipelined system is
300 ns,
(6)
List any four characteristics of GPU (4)
hat is DMA? How cycle stealing js different
burst transfer, (6)
w the diagram
fa 4-bit binary adder-
tor. Explain its
working with the help of an
(6)
the fourteen-bit control word for the basic
er that must be applied to the processor to
the following micro-operation, given the
ode for the operations are as follows :
B S-bit registers R,, R,,
e the following unsigned
©0031, R,=001! 1010,1039
7
i ; aa er
Determine the 8-bit values in each register afte
the
i the f : ad jons in
€Xecution of the following micro-operations
Sequential manner:
T
Ty Ry OR AR.
i Ry —(RyvR, Jar, (5)
(c) Consider the fragment of memory as shown below -
the addresses and register /
sen eeend are in decimal. A two-word
eon sol is stored at an address 600 with address
a ae at address 601. The first word consists
‘mode bit’ and the op-code for ADD to AC
es oni instruction, whereas second word of the
struction contains the value 840. Further, the
P,T.O,8
content of Memory gy
shown in the figure ab
counter register with val
purpose register with
Index register with valu
register with content 160.
address and the content |
Operation is performed for
modes:
Addresses is as
. iS a
a eae
Blue 904, xR ig an
200. BR is the Base
ermine the effective
AC register after the
¢ following addressing
(i) Direct Addcoesianl ,
(ii) Indirect Addressing
iii) Relative 3
(iv) Indexed
(6)
(4)
AB'C’ + A’BC + ABC’
ible of the function.
ebraic expression.
agram of the simplified
NAND gates only.
G)
th the help of a
m Interrupt driven.
; (6)
(500)
te[This
Westio
3 ™ Paper Contains 6 printed pages.)
Sr. No, of Question Paper ;
Unique Paper Code
Name of the Paper
Name of the Course
Semester
Duration : 3 Hours
o
Your Roll No.0"
1058 D
: 2342011103
Mathematics for Computing
: BSc. (H) Computer Science
a
Maximum Marks : 90
Instructions for Candidates
of this question paper.
Write your Roll No, on the top immediately on receipt
2. The paper has two sections. Section A is compulsory.
Each question is of 5 marks.
‘Attempt any four questions from Section B. Each
tion is of 15 marks.2
x, + 3%, + x, = 1
—4x, — 9x, + 2x, = -1
=3x, — 6x, = -3
ine a convex set. Show if C = {Xi 2x, + 3x,
= 7} & R? is a convex set. (5)
(c) Show that the transformation defined by T(x,. x,)
i" = (2x, — 3x,, x, + 4, 5x,) is not linear. (5)
(d) Find the characteristic polynomial of the following
matrix (5)
14+2)+3k be two
lot product of these
ihe vectors (4, |, -°
’ basis of R’.1058 3 i
Section B
2, (8) For what values of and p do the following system
Of equations is consistent. o
fF xty+z=6
x + 2y + 3z = 10
K+ 2y+hiz=p4
Apply Gram Schmidt orthonormal,
‘Allo
» obtain an orthonormal basis fo, the .. Process
ue ‘
“ generated by the vectors, (1, | 01,4, a of
0, 0),
(8)
1)
Space? Let Y be the set of vectors
rm [a,0, b, 0]. Prove that ¥ isa
(8)
and divergence for the following
(7)
+x727k
trix? Is the following
(8)1058 5
SG) Let a=(1,1,0), 6 = (3,2,1] and ¢ = [1% 2h
Find the angle between: a, b and b, ©. (3)
() If $(x,y,2) = 3x2y — y%2?, find Vo(gradd) at the
Point (1, -2,-1), (4)
(c) Diagonalize the matrix (8)
20 0
A=|1 4 4
3-4 4
7.
ct space, then show that
i> + b where6
Beousity to Banks B and c.
However,
two-thirds of its investors, with the
hing equally to Banks A anq C.
keeps half of its investors, With
itching equally to Banks A and
bution of investors after two
(8): inted pages.]
Abe sven, paper contains 4 psi"
St. No. of Question Paper: 1295
Unique Paper Coge + 32343306
Name of the Paper
Name of the Course
. Web Design and Development
B.Sc. (H) Computer Science
Semester : I
Duration ; 2 Hours
Maximum Marks : 25
HStructions for Candidate
Instructions for Candidates
Write your Roll No. on the top immediately on receipt
of this question paper.
The Question paper consists of two sections.
Section A is compulsory,
Attempt any three questions from Section B.
SECTION A
(a) Differentiate between GET and pogy method?
(2)
(b) What are container tags? Explain with examples?
(2)
P.T.0.1295 2
(c) Explain printr statement and foreach loop? (2)
‘to use css externally. Give syntax
@)
(ce) Give the output of the following code : (1)
string is ‘No problem’.
”;
String with the help of an
qa)
create the following
(3)that displays ty, text b,
= The first text 4,
‘OXC§
the double value of ,
first text box.
ton is checked, the second
the square of the number
(3)Your Roll Now
f Question Paper ; 1374 Cc
per Code © : 32341301
+ Data Structures
: B.Sc. (Hons.) Computer
Science
+ OT
Maximum Marks : 75
the top immediately on receipt
is compulsory.
om Q, No. 2 to Q. No.tents of the queue with position of
Rear after each of the following
in sequence.
alculati ng
thematical3
* (B-C) +D) $F+E) t
ng device upon receiving the
start converting it into a parenthesis,
yA step by step using some algorithm’
it, Which data structure the
would use in the algorithm.
the Algorithm used by the
and give the parenthesis free
calculating device “would have
(5)
word's is to be
searching is quick :
ip,yogart,wolf,1374 j
_. (ii) Show diagrammatically, the dictionary
created using your suggested data structure.
a.
_ (iii) Give the number of comparisons that would
be done to search the word xor in the
above dictionary. (3):
the following member functions for a vector
rt (i, €) to insert a new element ¢ into
V at index i.
move the element at index i
(5)
trick to store some numbers
9999] in a crate of size 20.
te are numbered from 0 to
decides where to put the number
digits of the number. If
is already occupied,
in the next available a1374 ¢
asked to pick up any number, the magician 1s able
to pick up number without much searching. Devise
- the trick used by magician and find out the locations
- where the following numbers would have been
Mere i226, 7242, 6867, $220, 1161, 4444, 6221,
; ? 65)
H using following data :
49, 11, 22, 65, 30.
sh insertion. - (5)
@ 2D array A of
2 bytes of memory
; 2005. Write6
der some students, seated randomly in , Ee
$ udents are required to perform OM stage i
. st ing order of their heights, such that e
s dent is called on stage, the teacher ¢,)),
‘i tudent out of-all the remaining
i, stage. ‘show, ae Steps of the
= follows if the heights (jn
the first 10 chairs
seated on
students i.‘the. ‘output of the below function fund if
is invoked as funel (p) where Pisa
he
function func?;
Void fun2(node *s)
if(6==NULL)
return;
cout<< s->data;
if(s->next!=NULL)
fun2(s->next->next)
cout<< s->data;
ite functions for the following ;
1ove an element x from a doubly linked
‘list of integers.
Gi) ‘ata singly linked lists: of j integer
intowone list,
(6
peHoe MB Tccursive function - (s- Double cale(int x, int n)
wh
_— iffin=0)
return i
> else L
3 ieticn x*cale(x,n-1);1374 10
Iraverse(p->left);
traverse(p->right);
visit(p);
’ 5
Write NON-recursive/ iterative tree traveryn}
tion to find in-order predecessor of a
ry search tree. (5)
n nting double ended queue (deque)
ways using Array, singly linked
list. Give running time
below operations for all the
i (5)1
integers
3,8, 11, 13,5, 9,15, 18, 21, 1
of tree after each insertion.
id show the tree after deletion.
at (6)
inary search tree (BST):by question paper contains 8 printed pages.)
Your Roll Nov.csssseereree
Sr. No. of Question Paper: 1402 Cc
Unique Paper Code + 32341303
Name of the Paper : BHCS12 - Computer Networks
: B.Sc. (A) Computer Science
Name of the Course
(CBCS-LOCF)
dul
Semester
Duration : 3 Hours
Maximum Marks : 75
Roll No. on the top immediately on receipt
question paper.
n A is compulsory and carries 35 marks.
- questions from Section B.
carry equal marks.
¢ repeat sliding window protocol
ae KB to send data on a
. atency of 50 msec.
of 60%, what is the
to represent the
G3)
P.T.O.2
(b) Give any one difference between port address,
physical address and logical address? (3)
(c) Suppose the following character encoding is used
f in a data link protocol : (2)
Bi A: 11010111; B: 11101101; FLAG: 01111110; Esc:
' 10100011.
Consider the character frame: A B ESC B ESC
ESC FLAG
Show the bit sequence transmitted (in binary) for
ve character frame when Flag bytes with
stuffing framing methods is used.
‘significance of the following special
2)
(3)
es resolved from a given
(3)
th a 100 KHz bandwidth
| together. What is the
e link if there is a need
KHz bandwidth channels
(2): 3
ee
J FLA) Bias.
fl “3 — (h) In @ given modulation scheme, there are 4
% . eopbiide levels and 16 phase levels and the bit
) is 72 Kbps. Calculate the following:
a G) Number of bits per baud (r)
_ (ii) Baud rate (8) (2)
True or False for each of the following :
8 in circuit-switched networks
connection establishment and
release,
in circuit-switched networks do
any information about the network
to function correctly. (2)
efit of “twisting” in twisted-pair
(2)
of PSH and SYN flag bits
header? (2)
mn by well-known ports?
ned to HTTP and
(@)
‘anged in a mesh
needed for each
Q)
P.T.O,
OE I1402 :
ws (a) Which of the four digital to analog mody|
techniques (ASK, FSK, PSK) is most Susce
to noise? Justify your answer,
Allon
Puble
(2)
(0) Map the following to a suitable layer of the Os]
model :
(@) Route determination
Interface to transmission media
li) Provides access to the end user @)
SECTION B
coding scheme with two legal
01010 and 10101.
Hamming distance.
bit errors can be detected by
it errors can be corrected by
(3)
ode whose binary
= at a@ receiver
of the message?
it is in error.§
Explain and discuss the Yarious
fields of Ip
Header with the help
Of a diagram (4)
) HyperTeat Transfer Protocol (HTTP) is a
MMLGICKS Protocol, Justify.
Q)
ler has the following (CIDR) entries in its
ig table : Q)
Next hop
Interface 0
Interface |
Router |
Router 2
lowing IP addresses, find the
y the router?
are each trying to
After cach frame6
Compare and contrast Transmission Con
: protocol (TCP) and User Datagram Protoco)
+ 0
(UDP) with respect to the following Paramete
A TS.
tro]
Connection
ence of Data packets at the receive,
Acknowledgement of the received packers
(3)
Nyquist Sampling rate for a signal
idth of 200 KHz if the lowest
100 KHz. (2)
en static and dynamic routing
01101 is transmitted using
The generator polynomial is
(342)
itted bit string which
e and CRC.
bit from the left is
ion. Show that this
Teceiver’s end.
1 iwcan a machine with a single DNS name
Multiple IP addresses? (2)
ider the IP address 184.86.92.182,
the class of the given IP address, if
‘we are using class-based addressing.
‘twork in part (a) is to be divided
lifferent subnets, what would be the
network address of the subnet
address would be attached?
» find the length of
network in part (c).
(1424241)
nee of flow control in the
ion? Suggest any
the issue of flow
(6)
7 PTO,i zo 8
i
fe between Time Division and
ion Multiplexing. Q)
‘ork shown below and assume
ially knows the costs to each
msider the distance vector
d show the distance table entries at
(4)
m of an IP packet
) from source to
(2)
. DNS packet
ery. Does thisArr question paper contains 8 printed pages-]
Your Roll NoOvcececnertree’”
Sr, No. of Question Paper: 1402 c
Unique Paper Code + 32341302
Name of the Paper + Operating Systems
Name of the Course : B.Se. (H) Computer Science
Semester :
Maximum Marks : 75
your Roll No. on the top immediately on receipt
this question paper.
88 is Working
ql)
PT.2
What is ‘Dirty bit’ in Demand paging? Where
this bit is stored by the Operating System?
(2)
iv) Why command interpreter is usually placed
separate from the kernel? (2)
fv) Write any two problems that may occur in
multiprogramming environment? (2)
How degree of multiprogramming affects CPU
: (2)
type of fragmentation that occurs in
(2)
, how can we achieve the
statement ‘a’ of process Pil
*b’ condition of process1402
3
mle | ce
(xii) Write the bit vector representation for free spa
list for a disk (10 blocks) where blocks 1+ and
$ are free and rest of the blocks are allocated:
Give one advantage of this representation. (2)
(xii) Determine whether the deadlock occur in the
given resource 3 allocation graph of three
processes as P,, P, and P, and four resources
as R, (one instance), R, (two instance), R, (one
instance) and R, (3 instances)? Justify your
answer, G)
(xiv) How many child processes are created in the
following fragment of code assuming essential
header files are included? Explain the output with
justification.
int main()
{
for (int i=0;i<4;i++)
fork();
return 0}
}
P.T.O4
Consider a system of five Tesources (assuming
every resource is having one instance only) and
four processes where every process Tequires two
tesources to Complete its work. Is there any
‘chance of deadlock in this scenario? Justify your
answer after applying all the necessary
conditions of deadlock. (3)
Consider a logical address space of 512 pages
h 4-KB page size, mapped onto a physical
of 128 frames.
many bits are required in the logical
S are required in the physical
(2+2)
esses, with
il time givenDraw the Gantt chart illustrating the
“execution of these processes using Shortest
Remaining Time First (SRTF) algorithm?
- (3)
Based on the above obtained Gantt chart,
culate the average turnaround time and
average waiting time for the given
Processes. (3)
with an example if the wait and signal
it executed atomically, then
violated? (4)
PEO,
| ama6
(c) Monolithic and Microkernel approach to
P Operating system design (32)
: (ii) Consider the following page reference string :
7,0,3,1,5,2,3.4,0,7,2,1,0,4,2,0,1,7
Assuming demand paging with three frames, how
y page faults would occur for the following
page replacement algorithms :
)ptimal replacement
replacement (4)
g segment table:
Length{a) 0,230 ..,
(3)
Paged system, Translation Lookaside
(TLB) hit ratio is 80%. Let RAM access’
20 ns and TLB buffer access time, T
Find out
G)
requirement of logical and physical
ating system? (2)
plain it with an example.
(4)
of 5000 cylinders, numbered
(6)
currently serving a request at
PTO,(C-SCAN)
mediate calculations,
st the following : (4)
iputing and Client-Server
Task parallelism
alization in cloud
(4)
time for a user
Swapping memory
store has 2
(2)Gs question paper contains 8 printed pages.]
Your Roll No.......-0+0+
4 Sr. No. of Question Paper: 1006 Cc
Unique Paper Code : 32341501
Name of the Paper : Internet Technologies
ae : Name of the Course + BSc. (H) Computer Science
; 0 W
Maximum Marks : 75
Networking Protocols with
(4)
P.T.O1006 2
{b) Write the network address, broadcast address,
valid host addresses and subnet mask for the [p
address, 198.2245 173/26 (4)
{e) What do you understand by Proxy Server? Write
any two advantages of using it. (4)
(d) Explain setTimeout() and setInterval() functions
with examples. (4)
(e) Write any four differences between Forum and
Blog. (4)
(® Given the ISON object: (2)
myJson = { “name” : “nested”,
“marks” : 45,
“Item” : [“food” , “clothes” , {*g” ; true}]
}
alue of a.
Program to Greet the user based
(3)
e between static routing and
(3)0 You need to subnet a network that has 5 subnets,
‘each with at least 16 hosts. Which of the following
subnet masks are valid in the above situation?
(2)
lain Sessions in a cookie.
(3)
and JSON.parse()
(2)
(10)4
JQuery to Perform the
d “Damon” in the above
it list appears as foll5
mes to the names in the list such that
nt list appears as follows ;
lame” to each of the list
to the list.
should change its
oH6
(b) What is a JSON object? Write the 8yntz
i : ax t
a JSON object to define a student having q 0 adq
Cla
i name of the student, university rol] Iiuinber, ils:
co.
Utse
(5)
‘name, mobile number and email,
following Bootstrap elements : (5)
Server using Node.js which
port 8000. Create auser.html
ister and Login. On clicking
ist search for credentials of
ase. On successful login,
displayed. On clicking
ust insert the user's
On successful
urn to the user.htm!
(3)Create an HTML page with one input field, one
io button and a text field for display. The first
input field will take a mathematical expression as
in the text field. 6)
that takes data about a customer.
FirstName, LastName, Age,
odPreferences. At the submission
components of an email?
‘format of SMTP. Also
alities of any TWO mail access
(5)
nTNnCd. question paper contains 8 printed pages.]
Your Roll Novssessecerree
Sr. No. of Question Paper: 1042 €
Unique Paper Code —-:-32341502
Name of the Paper + Theory of Computation
me of the Course » B.Sc. (Hons.) Computer
Science
» V (Admissions 2019-2021)
Maximum Marks : 75
answered together.
all the questions unless2
‘Consider the following Context Free Grammar
the language generated by given CFG.
‘two words of the language. (3)
languages :
{words in which a appears tripled (in
of 3) if at all}
with a and does not contain the
(4)
defined by each of the
word in the language.
(4)
ts the language
(4)2
t (CFG)
lowing finitelowing language of all the words
‘ing © = {a,b} comprising only
empty string 2. Build a finite
iccepts the given language and
ie, (FA) *. (6)
| non-deterministic finite
finite automaton: (4)5
ne Millewing pairs of FAs, build a finite
pages are closed
closure ‘using non-" where n=1, 2, 3,4, 5....} is non-context
language. (4)
Down Automata shown below :
ribe the language accepted by it.
the given PDA deterministic or non-
a
(4)7
iruct a PDA for the language a"b%a" where
and q=m+tn. (6)
the following context free grammar :
valent CFG by eliminating all %
ert the resultant grammar into
(4)
,
language containing all
lindromes excluding the
tree for the word
(4)
is ambiguous: (2)8
initial configuration to be &LJw (if the INPUL jx b| j
the output should be OL)’, where w' is the a,
complement of w). Show the trace of above luring .
‘machine M on the string &10110, (5)
that if a language is recursive, it is aleo
ely enumerable,
(2)
the Turing Machine M =(K, ¥, 6, s, {h}),
tation of Universal Turing
(3)
ie)i. paper contains § printed pages.]
4
: 1
1 Your Roll No......-....+.«
Sr. No. of Question Paper: 1096 Cc
rai . 494 2
Unique Paper Code , 32347508
Name of the Paper > Combinatorial Optimization
of the Course : B.Sc. (H) Computer Science
Vv
Maximum Marks : 75
Roll No. on the top immediately on receipt
paper.
stion 1 (Part A) are compulsory.
uestions from Part B.
Part B carry equal marks.
ar Program and an
elp of an example.2
How is infeasible solution detected in the simplex
method? (3)
(c) Let G be an arbitrary flow network, with source
' S, sink 1, and positive “integer” capacity c(e) fo,
Vedge ¢. Consider a minimum s-t cut (S, T)
G. Now construct G’ as the same graph a
With capacity c'(e) = 2*c(c) (for each
Now consider the cut (S,T) for G’. Is
| minimum cut for G'? Explain with an
é (3)
feasible solution x of a linear program
nal form is basic if and only if columns
Mk are linearly independent where
2)... D}: xj> 0] (4)
lowing linear program into
(4)
intersectiontwo depots A and B with
7000L. and 4000L respectively. The
suppl il to three petrol pumps
yse requirements are 4500L,
tively. The distance (in
, lepots and the petrol pump
on cost of 10L of
uld the delivery1096 4
(i) Delete the best set of edges to disconnect 1 ftom
$, where best set is defined as the set of edges
a with total minimum capacity. (5)
Section B
id max-flow theorem. (3)
with distances as shown in
vork. Find the
Djikstra‘s
(7)1096 5
3. Solve the following Linear Programming problem using
2-phase simplex method. (10)
Maximize Z = 2X, + 2X, + 4X,
Subject to
Ox, + X, + X, <= 2
3X, + 4X, + 2X, >= 8
Ke X20
late an Integer Program to determine a
n independent set of the following graph
relaxation condition also.
(5)
solved in the standard form and
timal solution for the primal and
have been determined. The
rs have been listed next to eachm 6
The Primal objective is given by x, and the yy, i]
‘objective is given by y, + y, + 2y,. Which of the
following statements regarding the missing Dart:a
we the above LPP graphically and find the
al solution using the method of iso-profit line
(7)
nsider the following flow graph. Let the
ity and current flow of edge e be denoted
(€) and f(c) respectively. Further, let c(e,)=5,
c(e,)=3, f(e,)=2, o(e,)=2, f(e,)=0, c(e,)=4,
}=2, fle,)=2. Determine the max flow
cut, (5)
or disprove that
i] solution by using the
G)
PTO.pare it with fractional solution. Cg
i » Can
integral optimal solution by solving
2 Justify your answer. (5)
sible solutions of a
rm, Then, show that
for a point v < P are
yhedron if
ion of the linear\hni Westion Paper
“Ontaings 12 printed pages.]
Your Roll No......0 avec
Sr.No. of
; ii
Question Paper: 1920 D
Unique P.
a 7
in 2342011101
N
ame of the Paper Programming using Python
(DSC-1)
Name of the Course : BSc. (H) Computer Science
‘ Semester A
Duration ; 3 Hours
Maximum Marks : 90
Write your Roll No. on the top immediately on receipt
of this question paper.
ion A is compulsory.
yt any 4 questions from Section B.2
i ec »{n) i
function ch ckPrime(n) t0 check whether
number 18 prime or n
not. The functj n
m 1 if the t ; l
4 Number n js Prime else
jon in main( ) t0 check the number
Ee -5
mary groupDict representing
group. (4)
as follows :
: { ‘name’: 'Mike'’,
: { physics’: 70, history’: 80 }10
1020 :
G) Access the value of the subject Chemistry.
(i) Extract the value of the key group: and
Use the defautt value as -1 if key is not
found,
(ii) Create g copy of a groupDict into a
dictionary object newGroup.
(iv) print the dictionary newGroup after
removing the element with the key section.
efine a class Rectangle having the following
eure: (6)
ibutes: length, breadth
: _init_()) for initializing the attributes.
getLength() which retums the length of the
rectangle.1020 5
(iv) monthDeys = (Janrays3lsPebmany 2 Mast 91
Month = monthDays
Month{' February’) =!
print('monthDays before clear", monthDays)
print("Month before clear->’, Month)
Month.clear()
print(‘monthDays after clear—>’, month Days)
print(Month after clear—>', Month)
SECTION B
Write a program that accepts x and n as input to
compute the following series. (6)
ame x? ce
x at aa nterms
ider the following code snippetWesday’, 'Wednesday')
Wunction swapTuple(T1, 12) :
values of Ti and T2
ited output is as follows
nday’, ‘Tuesday’, Wednesday’)
300)
on mergeTuple(T1, 12) to
uples containing the
t from tuples Tl and
at is as follows :
(Tuesday’, 200),7
der }i51 Li
(9)
as follows
€ code Snippets to create the following lists :
i OT? a, shallow copy of Li
G4) 13 3 2 deep copy of Li.
mStrate the effect of the following
Weations in 11, L2 and L3:
@ L1[2] = 999
Gi) 1113}(0) = 790
: uNnction doubleDict() that creates the
Dict! where the keys are numbers
1 and 5 and values are twice the keys.
if the key is 5, its value is 10. The
ould return Dict1.1020 4
(b) Consider iwo lists Lst! nd Lt? declared
follows
Latl © ['green’, ‘bluc’)
Lst2 = ["blue’, yellow’)
Write a python Script to do the following
(i) Convert list Lst! as set SI
set $2.
and Lst2 as
(ii) Add the elements of the list {"black'
to $2,
yan’
d the symmetric dj fference t
| and §2.
bel Ween sets
set newSet USIng ser
©) containing elements of $1
Gded at the end of each element,
ould appear as:
‘greens'}
e(marks, total)
marks for
(6)ry:
Percent = (marks/total) * 100
except ValueError:
Print('Value Error’)
Pt TypeError:
Print("Type Error’)
) xcept ZeroDivisionError:10
(iii) percentage ('200.0°, 200.0)
the following functions to
Perform the
On a String.
(9)
mtVowel(Str1) to Count the vowels in a
© Call these functions and Provide
ine given String Str].
G3)1020 ri
(6) Explain the typo of exeeption mised in the following
statements )
(i) x=0
Print(S/x)
(i) print(’Phe amount for the day is s+ 300)
(il) int(‘Morning)
(iv) Li = [11,22,33,44,38]
print(Lt[5))
Desoribe the following methods for the class
objects with suitable examples, (8)
@ init12
(10)
rint the total number of lines in the file.
y even lines of the file to a file named
odd lines to another file namedstion paper contains § printed pages.|
Your Roll Noss
p Paper: 1193 Cc
Code : 32347504
: Microprocessor
: B.Sc. (H) Computer Science:
DSE
OV
Maximum Marks : 75
No. on the top immediately on receipt
ions from Section-A.
lestions from Section-B.
nce between a program visible
ter set? Give examples of at
visible registers. (3)
P.T.O.J — (b) What is the difference between 8086 and gogs
ae i
4 microprocessors? rey
i
) Are the following instructions valid?
(i) PUSH 1234H
(ii) MOV DS, AX
MOV DS:(BX], 10H (3)
*@ memory device of 400H. It has base
the size of the memory device in
starting address location and
location? (3)
G)3
Explain direct data addressing mode with the help
of an example.
lain BOUND interrupt instruction. (2)
Memory device with 10 address pins
pins. What will be the size of the
2 G)
JMP instruction (short, near, ‘or
les for the following : @)
istance is 0160H bytes
istance is 10000H bytes
), DI = O1FFH, $1 = 0100H,
value of SI and DI after
instruction? Explain.
(3)
it pins of 8284A clock
ral.0);(i) CLK
(ii) PCLK
(ili) OSC (3)
Explain the concept of two memory banks in 8036
(3)
SECTION B
r a memory device, 256K X 8 DRAM.
the number of data pins, address
(243)5
fer the following questions — (2)
What happens in 8086/8088 when TEST
‘input is at logic 12
W many address pins are there in a 4K
ry device?
tween NMI pin and INTR pin.
(3)
nm Command Words (OCWI,
) of 8259A programmable interrupt
(5)
d mode of memory. If
| descriptor table entry
ill be the privilege
(3)
sembly language6
EAX = 00000200, EBX = 00000250,
DS = g300H, SS = 0440H, BP=0110H and
‘0010H. (3)
the address accessed by each of the
Fnstructions, assuming real mode
ECX, [BP - 200H]
DL, [BP +SI-10H]
[SI + 100H]
| [BAX + 2*EBX + 10]
+ 4*EBX], AL
nce between far and near
mptINTO. (3+2)
ing pins of 8086PPNOW eee eave Y
Prediction Logic of Pentium
Q)
gical assembly instructions(5)
Operation of Programmable
ce 82055 with help of a diagram.
(5){This quebti
QueHIbN Paper contains 12 printed pages]
Your Roll NOs"
Sr. No. of Question Paper; 1127 P
Unique Paper Code : 2342571101
Name of the Paper : Programming Fundamentals
Using C++
Name of the Course ; B.Sc. (Multidisciplinary
Courses of Study with Three
Core Disciplines under
UGCF 2022)
Semester : First (1)
cs : 3 Hours
¥
Maximum Marks : 90
for Candidates
Write your Roll No. on the top immediately on receipt
his question paper.
_A is compulsory.
any four questions from Section B.
question must be answered together.
ogram statements in C++ language.
?.T.0.2
Section A
{a) Which of the following is a valid identifier in C+
Give reason, (
(i) protected
(ii) 8years
(iii) _myname
© an assignment statement using a sing
itional expression for the following co:127 3 £
GOU<< "hn is yero"<
using namespace std;
2 y! : main()
int a = 20;
int &n = a;
= n=at+;
a=nt+;
cout<=y);
= couts2)
arr{i]=2*arr[i}-arr[i-1 ];
65
ntify the type of the following progran,
ents.
C¥+ program to'print the sum of odd
ween | to 50 using a while loop
(5)
e the output of the following code
(5)1133 7
{c) Write & C++ program to create an array
Studentmarks. Input total marks for 5 students and
caleulate the average marks of all the students.
(5)
4 program to create a class Arithmetic with
ate data member numl and num2. Add the
wing public member functions A default
these functions will be called
ain function, (10)
al operator to set ticket to
is greater than 55, and to 0(iv) Set an integer constant to a value of
{y) initialize 9m array of type double win, «
values.
n 10,000 then the employee gets an extra
on salary. Calculate the bonus
to the employee and display the sa
loyee will get
tween do..while and while loops
an example. G
d variable names and correct them
(1000)K.. question paper contains 8 printed P ages)
your Roll NOssesreesrerees
‘Sr. No. of Question Paper: 1140 »
‘Unique Paper Code : 7342201102
Name of the Paper : ‘Ale Programming Fundamentals
using Python
of the Course : B.A. Program
v8
Maximum Marks : 90
Write your Roll No. on the top immediately on receipt
of this question paper.
Section A is compulsory.
Attempt any four questions from Section B.
Parts of a question must be answered together
()
oe ia PhBelow code. im case of1140 3
: the
Take the number of rows © 3 an input — (5)
user.
*
oe 8 @
eee © ©
*“e*e*et ee @ @ &
“ee e+ ee
ee ©
-*
! (d) Write three differences between list and -"
data structure used in python.
(e) Write a python function findMax(), that take two
integer parameters and return the maximum of
the both numbers. GB
( With the help of suitable examples, explain the
use of try and except blocks used in python for
error handling. @)
(g) Explain the use of following strings module
functions using suitable example (3)
(i) isdigit 0
(ii) swapease ()
(iii) split Q
(a) What are mutable and immutable objects in python?
Create a dictionary data type object 1
“why it is mutable? ? and pie
Pre.ei
7 Section B
USE Set data st
‘ 7 Tucture? Show
in functions use
d for set data
(5)
mee, 11, 88, 55, 23, 60, 70),
code to perform following task -
; (0
list L1 in descending order
lent “55° from the list L1
print alternate elements of
mn list Ll in reverse order
m of all element present in the
[ suitable examples define a
d explain the purpose of
methods used for dictionary
will be produced a
n id ments, identify
ng code seg (6)1140
5
if y>2:
z= Xx * 7
print("Z is: "» 2)
else:
print("x is: ", %)
Gi) for i in range (1, aie
j=0° '
while j
: (a) HelloWorld
eo (b) Hello, World
(c) HelloWorld
(d) None of the above
‘What will be the output of the following program?a
(a) Hii ®veryone
(b) Hello World
(©) Hello World Hii everyone
(4) None of the above
r PHP
What will be the output of the following
code?6
2113
(x) If $a = 12 what Will be returned when ($a
& ses is executed?
al @Xxpressions in PHP for
€ following conditions - (3)
ater than 40,000 and less than
le and Age is greater than 65
i variable $text] is greater than
T Ea of the following PHP
slep execution. (2)ee
indexed arrays in PHP with the help of an
(Q)
function minimam(Snum1, Snum2) to
St of the two numbers. Use this
ind smallest of three numbers in PHP
(3)
ing language that generates
web pay G)
rogram to ulate the sum of
(2)
PTO.8
ider the followin 8FAY where name, co,
of various items 35 listed Fespectively
de and
{3)
pray ("Printer",001,18000),
atray(Monitor",002,10000),
paTray(Laptop".003,40000),
array("Mouse" 004.500)
)
pents for each of the following :
fer of products
al cost of all the products
e of Mouse to 700
logical and conditional operators
(5)
Ph (1500)question paper contains 4 printed pages.]
Your Roll Nove
i ‘Sr. No. of Question Paper: 2130 c
; ‘Unique ‘Paper Code + 62344330
¢ of the Paper : Computer Network And
HTML
Course + B.A. Programme (LOCF)
: I
Maximum Marks : 75
Fiye Questions from Section B.
A (Total 25 marks)
yy used in a computer
es and disadvantages
3)
A
P.7.02130 2
(©) Which connecting device is known as the three-
layer connecting device. List the functions
Performed by this device? G)
(4) Differentiate between LAN, MAN and WAN.
3)
(e) Explain simplex data flow. How is it different from
half duplex communication. (3)
(f) What is the purpose of COLSPAN option in
HTML? Explain with an example. (2)
(g) Explain the address depletion problem of IPv4
classful addressing. (2)
(h) What are the data objects exchanged at the data
link layer and the network layer of the TCP/IP
protocol suite. (2)
Explain the purpose of anchor tag? (2)
lat is attenuation? (2)
.3
a IML code to design 4, 22139
4
I ywser-
®) Explain the different parts of your bro
: URL
“MEY and explain the different parts of sei/
“http://www collegedekho.com/comP
6
Main html”, °
= in its
(8) What is transmission impairment? Explain (4)
'ypes,
. Sadie
(b) Differentiate between wired and wireles
Media, Why should we use optical fibre for a
. transmission? (6)
6.
(a) Differentiate between IPv4 and IPv6 addressing.
Convert the IPv4 address 130.24.24.18 into IPv6
address. (5)
(b) What is a wireless LAN. How is it different from
a wired LAN? (3)
7. (a) Explain the essential tial crite
network must meet?
a which a computer
i (5)
datate fresn paper contains 12 printed pages.)
Your Roll Na...
Sr. No. of Question Paper: 2060 Cc
Unique Paper Code 62347502
| Name of the Paper : Programming with Python
of the Course B.A. Programme (LOCF)
f V Year of Admission 2019
onwards)
Maximum Marks ; 75
your Roll No. on the top immediately on receipt
lis question paper.
on No. 1 is compulsory.
t any 5 of Question Nos, 2 to 8
“question must be answered together
identifier(s). Justify your answer :
(4)
P10:2
(iv) Total_Marks
(¥) Dob
(vi) else
(vii) Address 99
Construct logical expressions for representing the
following conditions : (3)
@) Salary is greater than 35000 and less
than 45000.
ender is female or Age is less than
fable name is greater than2060 3
(@) Differentiate between syntax errors and semantic
errors with the help of an example of each. (4)
(e) Find the output in each of the following code
L (5)
A. Consider the given list:
; Listl= [80,75,83]
Listl=List1+[85]
‘print (List1)
List=Listl
List1[1]=90
print (List)
der the given tuple:
4, 6, 8)
t=(5,) #t{1:]
print (t)
print (t*2)
P10.2060 4
(p Write a python function named as Wordscoun: 6s)
that take a string s as an argument and return +
he
number of words in that string. (3)
(g) Given the following recursive function : (4)
def foo(n):
if (n<0):
return -1
af (n==0);
return 1
(n*foo(n-1))
by step execution of the function call
will be the output of fo0 (6)?
sh is defined as : (5)
Web':28, 'March':30,5
At (month, get ('Feb', 0) )
At (list (month. keys ()))
ist (month.values ()))
Program to calculate the grade of
Ask user to enter marks and
ling grade.
following rules for grading system:
Grade
A (5)
) that takes a list
the first and last
list. For eg.
, 80, the function
314,15]. The
(5)
P.T.O.6
(b) Write a program using for loop to print the
following pattern of n rows: (5)
For example: ifn is 5, following 5 lines of
pattern will be printed:
the output of the following string functions
tring colors: (5)
green, blue, Red, Red, green’
lors.find (‘red’) )
a7...
\¢ whether it is prime number or
is divisible only by itself and
(5)
of the following code snippet:
1
(2)
that will be
yw; (Justifyif it4==0:
add=add+i
i=i+2
print (ada): va
(c) Evaluate the following expressions: (4)
@12 6 22
(ii) 5$10+10-25+8//5
>'héllo! or ‘bye '<' Bye'
alues andsquares given
(3)
‘python operator to
OF squares.8 is subset of values.
is superset of squares.10
7. (a) What output will be produced on execution of tt
following code segment? (
(i) class Area:
def init (self
self.rad=10
self.a=0
def cal(self):
a-self.rad*self.rad
return aet
ne line python code for- Q)
ig {Wo numbers without using a third
9
the series 7, 14, 21,..., 70
‘the range function.
cimum (x, y) tocalculate
f the two numbers x and y.
(4)
* that keeps tracks of
;in a school. (10)
following data members:
idering 500 as
'$': Science
- Marks\
1
hie. for initializing the data members —
Mame, marks & stream
eam for displaying the stream of the
@ for computing and printing the
centage for the student.
S$ to print the details of the student
Num, name, marks and stream
of class Student with the
and name="Archit',
Stream as ‘A’. Call
d to calculate the percentagequestion paper contains § printed pages.]
Your Roll No..
Question Paper: 1499 Cc
Code : 42347501
Paper : Data Structure
: B.Se. (P) LOCF (DSE)
2 V
Maximum Marks : 75
for merging
k for large1499 2
{b) Consider the linear array 4 (8:
(a) = 300 and w * 4 words per memory cell for
j a, Find the address of a [15], a (35) (2)
50). Suppose base
yin operations on a
(c) Explain briefly the two ma
stack. (2)
ifferentiate between an array and a linked
(2)
a diagram fora complete binary tree having
(2)
e is more efficient, binary search or
eee
: Justify your answer. (2)
the following code perform
Explain (2)4
H viroulay queue of capacity n elements
nied With an ariay of W elements
(the inadrtion avd deletion oparation
fed Out Uning VIRB and LANT a» array
en, respectively, Initially, VIMST =
V. Write the vonditions to detect if the
and the queue is empty, (4)
‘MOPH Of A stack While adding 679
(A)
Or fh recursive function to
of 4 number, (4)4
(i) Insert A, B,C. D, E to the “CQueue
(ii) Delete A, B from the “CQueuc”
-. iii) Insert F
Delete C, D, E, F
the following arithmetic expression P
postfix notation where
|) D=2, E=1, F=5:
into its equivalent infix
expression (show the
(6)
fo large numbers
(4)5
ap the queue and stack in the
fragment?
w become push and vice
‘now becomes dequeue and vice
can oceur in an array
€? Give examples to
error be avoided?
id of a circular
(6)1499 6
6. (a) Consider the following sequence of operations
performed on an initially empty doubly linked
list :
(i) addtohead (25),
(i) addtohead (28),
(ili) addtotail (23),
addtotail (20),
fromhead ( ),
AIL, content of the list. and
es after each operation.
(6)
Mode at the end of a
(4)reorder, postorder
) give the height of
a complete binary(2*mul(x-5)+7);
ill be returned by function when mul
ach step of recursion. (10)
unction to calculate the GCD
(4)