Search This Blog

Showing posts with label University Questions. Show all posts
Showing posts with label University Questions. Show all posts
Tuesday, 7 May 2013

Previous Year Question Paper on COA

0 comments
Anna University Chennai
B.E./B.Tech. DEGREE EXAMINATION, MAY/JUNE 2012
Fourth Semester
Computer Science and Engineering
CS 2253/141403/CS 43/CS1252 A/10144 CS 404/080250011  
COMPUTER ORGANISATION AND ARCHITECTURE
(Regulation 2008)

PART A-(10*2 = 20 MARKS)

1. What is SPEC? Specify the formula for SPEC rating.

     SPEC is a nonprofit consortium of 22 major computer vendors whose common goals are “to provide the industry with a realistic yardstick to measure the performance of advanced computer systems” and to educate consumers about the performance of vendors’ products. SPEC creates, maintains, distributes, and endorses a standardized set of application-oriented programs to be used as benchmarks. The formula for SPEC rating is as follows:

     SPEC rating (ratio) = TR / TC;
     where,
          TR = Running time of the Reference Computer;
          TC = Running time of the Computer under test;

     If the SPEC rating = 50 means that the computer under test is 50 times as fast as the ultra sparc 10. This is repeated for all the programs in the SPEC suit, and the geometric mean of the result is computed.

2. What is relative addressing mode? When is it used?  

     In relative addressing mode, we can specify only a constant (offset) for accessing the address of an operand. The address is calculated by adding the constant to the current value of the PC. On many machines, the target address within the machine code for branch instructions is done this way. The MIPS architecture does this. 

3. Write the register transfer sequence for storing a word in memory.

     The procedure of writing a word into memory location is similar to that for reading one from memory. The only difference is that the data word to be written is first loaded into the MDR, the write command is issued.

     As an example assumes that the data word to be stored in the memory is in register R1 and that the memory address is in register R2. The memory write operation requires the following sequence:
  1. MAR <-- [R2]
  2. MDR <-- [R1]
  3. Write
  4. Wait for MFC
4. What is hard-wired control? How is it different from micro-programmed control? 

     A hardwired control unit has a processor that generates signals or instructions to be implemented in correct sequence. This was the older method of control that works through the use of distinct components, drums, a sequential circuit design, or flip chips. It is implemented using logic gates & flip flops. It is faster, less flexible & limited in complexity

     A micro programmed control unit on the other hand makes use of a micro sequencer from which instruction bits are decoded to be implemented. It acts as the device supervisor that controls the rest of the subsystems including arithmetic and logic units, registers, instruction registers, off-chip input/output, and buses. It is slower, more flexible & greater complexity

5. What is meant by data and control hazards in pipelining?
     Data hazards are also known as data dependency. Data dependency is the condition in which the outcome of the current operation is dependent on the outcome of a previous instruction that has not yet been executed to completion because of the effect of the pipeline.

     Control hazard is caused by uncertainty of execution path, branch taken or
not taken. It is a hazard that arises when an attempt is made to make a decision before condition is evaluated. It results when we branch to a new location in the program, invalidating everything we have loaded in our pipeline.

6. What is meant by speculative execution?

7. What is meant by an interleaved memory?

8. An address space is specified by 24 bits and the corresponding memory space by 16 bits: How mmany words are in the
     (a) virtual memory
     (b) main memory

9. Specify the different I/O transfer mechanisms available.

10. What does isochronous data stream means?


PART B-(5*16 = 80 marks)

11. (a) (i) What are addresing modes? Explain the various addressing modes with examples. (8)
          (ii) Derive and explain an algorithm for adding and substracting 2 floating point binary numbers (8)
Or
(b) (i) Explain instruction sequencing in detail. (10)
    (ii) Differentiate RISC and CISC architectures. (6)


12. (a) (i) With a neat diagram explain the internal organisation of a processor. (6)
          (ii) Explain how control signals are generated using microprogrammed control. (10)
Or
(b) (i) Explain the use of multiple-bus organisation for executing a three-operand instruction. (8)
    (ii) Explain the design of hardwired control unit. (8)


13. (a) (i) Discus the basic concepts of pipelining. (8)
          (ii) Describe the data path and control considerations for pipelining. (8)
Or
      (b) Describe the techniques for handling data and instruction hazards in pipelining. (16)


14. (a) (i) Explain synchronous DRAM technology in detail. (8)
          (ii) In a cache-based memory system using FIFO for cache page replacement, it is found that the cache hit ratio H is low. The following proposals are made for increasing.
            (1) Increase the cache page size.
            (2) Increase the cache storage capacity.
            (3) Increase the main memory capacity.
            (4) Replace the FIFO replacement policy by LRU.
Analyse each proposal to determine its probable impact on H. (8)
Or
(b) (i) Explain the varios mapping techniques associated with cache memories. (10)
    (ii) Explain a method of translating virtual address to physical address. (6)


15. (a) Explain the following:
          (i) Interrupt priority schemes. (8)
         (ii) DMA. (8)
Or
      (b) Write an elaborated note on PCI, SCSI and USB bus standards. (16)
Continue reading →
Monday, 6 May 2013

Previous Year Question Paper on Open Source Software

0 comments

B.E. / B.Tech. DEGREE EXAMINATION, MAY/JUNE 2012
Sixth Semester
080230027 – OPEN SOURCE SOFTWARE
(Regulation 2008)

Answer ALL Questions

PART A (10 X 2 = 20 marks)

  1. List the advantages of open source software. 
    Key Advantages of OSS are listed below: 
    • No cost or a lower cost for licensing "open source" solutions
    • Flexibility: A programmer can take a standard software package and modify it to better suit business needs. 
    • Continuing software enhancements available through the open source community 
    • Reliability and Quality: Mature open source software is generally viewed to be of good quality and reliability.
    • Reduces “Vendor Lock-in”: If we are using proprietary software we may be restricted to using certain vendors. Switching vendors in this case usually involves significant costs. 
    • Availability of External Support: We can usually hire a programmer to add a particular function to open source software. Some vendors offer support contracts and there are service providers that install, configure and maintain an OSS system. Many open source products also have active online community support that may be able to answer your questions through online blogs.
  2. What is the differentce between kernel mode and user mode? 
            In Kernel mode, the executing code has complete and unrestricted access to the underlying hardware. It can execute any CPU instruction and reference any memory address. Kernel mode is generally reserved for the lowest-level, most trusted functions of the operating system. Crashes in kernel mode are catastrophic; they will halt the entire PC.
            In User mode, the executing code has no ability to directly access hardware or reference memory. Code running in user mode must delegate to system APIs to access hardware or memory. Due to the protection afforded by this sort of isolation, crashes in user mode are always recoverable. Most of the code running on your computer will execute in user mode.
  3. How to create a table in MySQL when it does not exist?
            This is the sql syntax for create table. Utilise the IF NOT EXISTS clause to create a table when it does not exist:

            CREATE [TEMPORARY] TABLE [IF NOT EXISTS] tbl_name [(create_definition,...)] 
  4. How to create a new user in MySQL database server?  
           The user creation process continues with inserting the new user's values such as host, username and password into the user table in the MySQL database, containing the log-in details of everyone who has any level of access to the database. 
           This is done with the help of CREATE USER command, which is available only in MySQL 5 (5.0.2) and newer releases, and it follows this syntax:
                CREATE USER user [IDENTIFIED BY [PASSWORD] 'password']
           For instance, creating a user 'michael' with a password 'mypassword123' is done by establishing a connection to the MySQL server as root and executing the following query:
              CREATE USER michael IDENTIFIED BY PASSWORD 'mypassword123';
  5. List the different data types supported in PHP.
  6. Using while loop write a php code to display 1 to 5.
  7. List the dictionaries operations in Python.
  8. What is the difference between tuple and list in Python?
  9. Highlight the features of Perl.
  10. What is the use of ARGV in Perl?

PART B (5 X 16 = 80 marks)

11. (a) (i) List any eight file related commands in Linux and explain their features. (8)
          (ii) Discuss the different types of file systems in Linux. (8)
Or
(b) (i) List any eight Linux signals and highlight their features. (8)
    (ii) Explain the scheduling mechanisms in Linux. (8)


12. (a) (i) List any four string related functions in MySQL and explain its syntax. (8)
          (ii) How to use MySQL Left join to select data from multiple tables? Explain. (8)
Or
(b) (i) What is metadata in MySQL? How to obtain it and use it? Explain. (8)
     (ii) Explain the process of sorting the Query results in MySQL. (8)


13. (a) (i) Explain the process of uploading files to the server in PHP. (8)
          (ii) How will you use PHP to access data from MySQL? (8)
Or
(b) (i) Explain the process of sending an e-mail with PHP. (8)
    (ii) Explain debugging and error handling process in PHP. (8)


14. (a) (i) Write a Python program to print Fibonacci series. (8)
          (ii) How to use Python as a Calculator? Explain with any to examples. (8)
Or
(b) (i) Explain the error and exception handling mechanisms in Python. (8)
     (ii) Write Python code to create an account object with two functions. (8)


15. (a) (i) List and explain the control structures in Perl. (8)
          (ii) List and explain the various file operations in Perl. (8)
Or
(b) Explain the data manipulation functionalities provided by Perl. (16)
Continue reading →
Thursday, 3 November 2011

University Exam in 2011 on Web Technology!

1 comments
ANNA UNIVERSITY OF TECHNOLOGY, COIMBATORE
B.E/B.TECT. DEGREE EXAMINATION : NOV/DEC 2011

REGULATIONS : 2008

SEVENTH SEMESTER : INFORMATION TECHNOLOGY

080250042 - WEB TECHNOLOGY

Time : 3 Hours                                                            Max. Marks : 100

PART - A

(10 x 2 = 20 MARKS)

Answer All Questions:
 
1.  State the goals to design the web service.

2.  Define WSDL.

3.  What is XML Parser?

4.  Write short note on XML namespace.

5.  Define JAX-RPC.

6.  Differentiate Client-side scripting and Server-side scripting.

7.  What are the different types of J2EE Container?  Briefly explain their purpose.

8.  Develop a VBScript program to perform arithmetic operations.

9.  What are the characteristics of C#?

10.List out the services provided by CLR.


PART-B (5*16=80 marks)


11. (a) i) Explain three tier Web-based Architecture with diagram.  (10)
            ii) Briefly explain the benefits of Web Services.  (6)

(or)

      (b) i) Explain in detail about SOA.  (10)
             ii) Elucidate the Architecture of Web Service with suitable diagram.  (6)

12. (a) i) Create an XML document for Library Management System and apply styles using CSS (10)
            ii) Write short note on Components of XML document.  (6)

(or)

b) Explain in detail about different types of Style Sheets used with XML document and give an example for every type. (16)

13. (a) i) Explain in detail about Servlet Life Cycle.  (10)
            ii) Develop a servlet program to explain the client-server communication by writing "Hello World" servlet.  (6)
(or)

b) i) What are the Components of JSP?  Explain it in detail.  (10)
    ii) Devlop an application to perform result analysis for an Education Institution using JSP. (6)

14. (a) Explain about ASP Objects with suitable example.  (16)


(or)

b) i) Create a web page for on-line Money Transfer using HTML and VBScript.  (10)
    ii) Write short note on Cookies with example.  (6)

15. a) Explain in detail about .NET framework Architecture and Components with suitable diagram (16)
(or)

b) i) Create an application for Payroll processing using C#.Net.  (10)
    ii)  Write a C# program to sort an array of integers.  (6)
Continue reading →
Tuesday, 1 November 2011

Model Questions for PCD

0 comments
ANNA UNIVERSITY :: CHENNAI – 600 025

MODEL QUESTION PAPER

B.E. COMPUTER SCIENCE AND ENIGNEERING

CS337 - PRINCIPLES OF COMPLIER DESIGN
Time: Three Hours Maximum: 100 Marks

Answer All The Questions


PART – A (10 x 2 = 20 Marks)

1. List any two complier construction tools, indicating their inputs and outputs.
2. Briefly explain any two language conventions that impact the difficulty of lexical analysis.
3. Write regular definition for the following language over {0,1} A string of 0’s and 1’s, which has 0 at the third position when counted from night.
4. Formally define a nondeterministic finite automation (NFA)
5. Prove that the following grammar is ambiguous: S→ aSbS │bSaS│ Є
6. Write down the predictive parsing algorithm.
7. Give the algorithm for generating the closure of a set of LR (0) items.
8. Translate the expression : - (a+b) * (a+b+c) into quadruples and indirect triples.
9. Give the grammar for generating binary numbers. Add semantic rules to the above grammar to compute the decimal equivalent of the binary number, generated.
10. Write down the algorithm that partitions the given sequence of three-address statements into basic books.

Part – B (5 x 16 = 80 Marks)

11. Draw the transition diagram for the lexical analyzer that recognize the following tokens.
Identifiers, relational operators. Use the following rules to form the identifier
    • begins with an alphabet
    • consists of alphabets, digits and hyphen
    • should not end with an hyphen
    • not two hyphens appear together

12.a) Draw the NFA for the following regular expression using Thompson’s Construction and then convert it into an equivalent DFA.
(a/b) * (a/c) * b
(or)
12.b)i) List the tasks performed by a lexical analyzer
ii) Give the complete algorithm that takes a NFA and converts it into an equivalent DFA.

13.a) Remove left recursion from the following grammar and build the predictive parsing table.
S → (L) │a
L → (L, S) │S
(or)
13.b) Build LR(1) parsing table for the grammar:
S → Aa │bAc │Bc │bBa
A → d
B → d

14.a) Write down the translation scheme for generating three address code for evaluating Boolean expressions using back patching. Explain the attributes used. Use the above and generate three address code for:

While ( (a<b) and (c>d) ) do
begin
if(p=q) then p = 1
else p = 2
While (p>q) do
Begin
P: = x+y
q: = x-y
end
end
(or)
14.b) Explain how declarations are processed by the computer. Take into consideration nested procedures also. Explain clearly the attributes used. Show with an example how the symbol tables are formed.
15.a)i) Explain how ‘next use’ information about names in basic blocks can be collected.
ii) Discuss about the actions performed by a simple code generator while generating code for a typical three-address statement of a form x: = y op z.
(or)
15.b)i) Write the syntax directed definition that computers and prints the post-fix equivalent of the given infix expression.
ii) Write down the unambiguous CFG for generating Boolean expressions.
Continue reading →
Monday, 31 October 2011

Year 2008 Questions on Internet Programming

0 comments
B.E DEGREE EXAMINATION, APRIL/MAY 2008
CS1401 - INTERNET PROGRAMMING


Part – A

1. List out the devices used to form internet work and specify each one of its purpose.
2. What Is The Use Of MIME
3. What is meant by serialization of objects in Java.
4. Write a java program to load and display an image.
5. State about the different usage of HTML flames.
6. List out the objects involved in java script with its purpose.
7. Define DHTML event bubbling
8. Write down the DHTML syntax for bind an image to the data and sort the data.
9. Write about servlet life cycle.
10. Define servlet cookies.

Part – B

11. a) Explain the steps involved in making the communication using TCP/IP with neat diagram.

Or

b) write a program using CGI and explain how CGI WORKS.

12. a) Explain java networking using sockets with your own examples program.

Or

b) write a java program for creating email client and protocol handling .

13. a) write a HTML program for the registration of new customer to the online banking system. ( customer data collected using a form , after submitting account number and type of account and username , password is displayed as output.)

Or

b)i. write a java script to print a marklist for 10 student s in a HTML table.

ii. Write a javascript that inputs a telephone number as a string in the form of (555) 555-5555. The script should use string method split to extract the area code as a token. The first 3 digits of the phone number as a token , the last 4 digits of the phone number as a token. Display the area code in one text field and seven digit phone number in another text field.

14. a) apply DHTML chroma and flip filter and reveal trans transition for an image.

Or

b) write a DHTML program to handle any three mouse events.

15). a) explain how servlet deals HTTP get and post requests with an example program.

Or

b) Write a program for banking application using JDBC (consider 5 customer create a/c no and type, set some minimum balance do credit and debit operation and print consolidated report for month wise transaction.)


Continue reading →

Year 2006 Questions on Internet Programming

0 comments
B.E/B.TECT. DEGREE EXAMINATION, APRIL/MAY-2006

Seventh semester
INTERNET PROGRAMMING

(Common to B.E(part-time/sixth semester regulation 2005)

Time:three hours Maximum:100 Marks

Answer all questions

PART-A (10*2=20 MARKS)

1.List out the devices used to form Internet work and specify each one of its purpose.

2.What is the use of MIME?

3. what is mean by serialization of objects in java?

4. write a java program to load and display a image

5.state about the different usage of HTML frames

6. List out the objects involved in java script with its purpose.

7.Define DHTML event bubbling.

8.write down the DHTML syntax for bind an image to the data and sort the data in the data source.

9. write about servlet life cycle.

10. Define servlet cookies.

PART-B (5*16=80 marks)

11.a). Explain the steps involved in making the communication using TCP/IP with neat diagram. (16)

(or)

b) write a program using CGI and explain how CGI works. (16)

12.a). Explain java networking using Sockets with your own example program. (16)

(or)

b) write a java program for creating Email client and protocol handling(using URL Connection) (16)

13. a) write a HTML program for the registration of new customer to the Online Banking System.(Customer data collected using a form,after submitting account number and type of account and username ,password is displayed as output) (16)

(or)

b) i) write a javascript to print a marklist of 10 students in a HTML table

ii)write a javascript that inputs a telephone number as a string in the form of (555)555-5555.the script should use string method split to extract the area code as a token, the first 3 digit of the phone number as a token,the last 4 digits of the phone number as a token.Display the area code in one text field and seven digit phone number in another text field. (8+8 )

14.a).Apply DHTML chroma and flip filters and reveal trans transition for an image.(16)

(or)

b).Write a DHTML program to handle any three mouse events. (16)

15. a). Explain how servlet deals HTTP Get and Post requests with an example. (16)

(or)

b).write a program for banking application using JDBC(consider 5 cutomer creates a/c no and type, set some minimum balance do credit and debit operation and print consolidated report for monthwise transaction)
Continue reading →
Sunday, 30 October 2011

Year 2008 Questions on Web Technology

0 comments

B.E DEGREE EXAMINATION, APRIL/MAY 2008
CS432 – WEB TECHNOLOGY


Part –A

1. Distinguish between internet and www.
2. Define protocol. What protocols are used to retrieve data from internet.
3. Distinguish between a HTML hyperlink and anchor.
4. What are the merits and demerits of using CGI.
5. What are multicast sockets.
6. What is remote method invocation.
7. How is the cascaded style sheet linked to the HTML PAGE.
8. Distinguish between DHTML and XML.
9. How can you monitor user events.
10. What are the uses of plugins.


Part –B

11. a)
i. With an example , explain the client – server model indicating all the interactions that take place between the client and the server.

ii. What is FTP. What are its salient features.


Or


b) Design a web calculator that works like a real physical calculator. The calculator must perform atleast 8 different mathematical functions.

12. a) With a suitable example explain the form tag and all the related form elements.

Or

 

b) Give suitable examples and explain CGI client side and server side applets.



13. a) What a program that displays whatever is entered on the server system into the client system.


Or

b) Write a RMI application to access the remote method which computes the sum of squareds of all the non-diagonal elements of a square matrix.


14. a)
i. what is DTD. What are its uses, write the DTD for a given schema.
ii. Explain any one of the objects in JSP.

Or

b)
i. How does HTML differ from DHTML . give suitable examples to justify your statements.
ii. Given the employ code write a java serve let to retrieve the name and designation of an employee from the database.


15). A) With a suitable example, explain the steps involved in establishing a JDBC connectivity.


Or


b). With a suitable example explain the system and software requirements for an online application.

Continue reading →

Year 2008 Questions on Artificial Intelligence

1 comments
B.E DEGREE EXAMINATION, APRIL /MAY 2008
SIXTH SEMESTER
CS 1351 –ARTIFICIAL INTELLIGENCE

Part –A
  1. Define Artificial Intelligence.
  2. What is the use of Heuristic functions.
  3. How to improve the effectiveness of a search based problem solving technique.
  4. What is constraint satisfaction problem.
  5. What is unification algorithm.
  6. How can you represent the resolution in predicate logic.
  7. List out the advantages of non monotonic reasoning.
  8. Differentiate between JTMS and LTMS.
  9. What are framesets and instances?
  10. List out the important components of a script.

Part –B
  1. A)
    i) Give an example of a problem for which breadth first search would work better than depth first search.
    ii) explain the algorithm for steepest hill climbing.
Or
B) Explain the following search strategies
i) best first search
ii) A* search

  1. A) Explain min-max search procedure.

Or

B) Describe alpha-beta pruning and give the other modifications to the minmax procedure to improve its performance.

13. A) Illustrate the use of predicate logic to represent the knowledge with suitable example.

Or

B) Consider the following sentences:
• John likes all kinds of food
• Apples are food
• Chicken is food
• Anything anyone eats and isn’t killed by is food
• Bill eats peanuts and is still alive
• Sue eats everything bill eats

i)   Translate these sentences into formulas in predicate logic.
ii)  Prove that john likes peanuts using backward chaining.
iii) Convert the formulas of a part into clause form.
iv) Prove that John like peanuts using resolution.


14. A) With an example explain the logics for non monotonic reasoning.

Or

B) explain how Bayesian statistics provides reasoning under various kind s of uncertainty.

15) A)
i) Construct semantic net representations for the following .
• Pomepeian (marcus), blacksmith(marcus)
• Mary gave the green flowered vase to her favorite cousin.

ii) Construct partitioned semantic net representations for the following :
• Every batter hit a ball
• All the batters like the pitcher 

Or

B) Illustrate the learning from examples by induction with suitable example.
Continue reading →