0% found this document useful (0 votes)
84 views39 pages

CST 2nd Year EVEN SEM

Uploaded by

chinmoyghorai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
84 views39 pages

CST 2nd Year EVEN SEM

Uploaded by

chinmoyghorai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 39
429(S) June 2019 Computer Network (FoR CST) Time Allowed: 3 Hours Full Marks: 70 Answer to Question No.1 is compulsory and to be answered first. ___ This answer is to be made in separate loose script(s) provided for the purpose. Maximum time allowed is 45 minutes, after which the loose answer scripts will be collected and fresh answer scripts for answering the rem: 1, A. Answer the following questions (any ten) i) ing part of the question will be provided. On early submission of answer scripts of Question No.1, ‘a student will get the remaining script earlier. Answer any five questions from the rest. 10x1 The physical layer concerns with ~ (a) application to application delivery, (b) bit by bit delivery, (c) process to process delivery, (A) none of these. ii) Transport layer involves in — (a) Hop to hop delivery, (b) source to destination delivery, (©) process to process delivery, (d) none of these. iii) Packet discard policy is implemented in ~ (a) physical layer, (b) data link layer, (©) network layer, (d) application layer. iv) IPV6isof length ___ bits ~(a) 16, (b) 32, (c) 64, (@) 128. 'v) When too many packets are present in subnet and performance degrades then it leads to ~ (@) ingestion, (6) congestion, (c) digestion, (4) diffusion. vi) Next hop method is used to reduce contents of a ~ (a) MAC table, (b) routing table, (©) RIP protocol, (d) re-allocated table vil) A local telephone network is an example of network ~ (a) Packet switched, (b) Circuit switched, (c) Message switched, (d) all ofthese viii) In cryptography, what is cipher text? — (a) encrypted message, (b) decrypted messag (6) both a & b, (d) none of these ix) Expansion of SMTP is — (a) simple mail transfer protocol, (b) simple message transfer protocol, (c) simple mail transmission protocol, (d) simple message transmission protocol. x) Which of the following is private IP address? ~ (a) 12.0.01, (b) 168.172.19.39. (0) 112.34.14.90, (4) 192.168.24.43, xi) Which of the following function is used in digital signature? — (a) rand funetion, (b) array function, (c) hash function, (4) security function. xii) Which of the following is an error correction method? ~ (a) CRC, (b) checksum. (©) hamming code, (4) none of these. B. Answer the following questions (any five): sx i) Write full from of HTTP & DNS. ii) What is supernetting? iii) What is port address? iv) Write the advantages of star topology ) Define half duplex and full duplex, 6 Vi) What is MAC address? - vn) Why classless IP addressing is preferred over classful IP addressing Explain OSI model with the responsibilities of every layer. w 2) Explain Go Back N ARQ with proper diagram. : by What is FDMA” Write short notes on - (a) CSMA (b) Checksum ] An ISP ty granted a block of addresses starting with 190,10000/16. The ISP needs te distribute thes: addresses to three groups of customers as follows 1) The first group has 64 customers. each needs 286 addresses. 1) The second group has 128 customers. cach needs 128 addresses. i The third group has 128 customers. each needs 4 addresses. Design the subblocks and find out how many axklresses are still available after these allocations m 2) Explain private and public key cryptography with proper diagram, b) Explain the concept of digital signature i 4) Write the difference of static and dynamic routing b) Explain Leaky bucket algorithm Write short notes on (a) ARP. (b) Flow control 4298) June 2018 Computer Network (For CST) -me Allowed: 3 Hours Full Marks: 70 this aan {2 Ruestion No.t is compulsory and to be answered first. | answer is to be made in separate loose seript(s) provided for the purpose. Se time allowed is 45 minutes, after which the loose answer seripts will be collected and ‘sh answer scripts for answering the remaining part of the question will be provided. On early submission of answer scripts of Question No.1, Answer any five questions from the rest. 1 Answer of the following questions in short (any ten): 10x2 i) What are the advantages and disadvantages of UTP? il) What is a collision? iii) Explain back off. iv) What is the HELLO protocol used for? ¥) What is Protocol Data Unit? vi) What is the ISP? vii) What is Logical link control? viii) What is NY Quist theorem? ix) What is MAC address? x) What is a protocol? xi) What is mesh network? xii) Explain the advantages of UTP. xiii) What is the usefulness of byte stuffing? xiv) What is the purpose of redundancy bit? xv) Explain the usefulness of classless IP address. 2. a)_ Define ‘analogtoanalog’ conversion. Discuss various techniques for ‘analog to analog’ conversion, b) What is multiplexing? In what situations, it can be used? ©) Explain different schemes of TDM with diagram. (QHD a) What is FTP? How the files are transferred using FTP? b) Reliability of CRC is better than other convention methods — justify the statement. ©) Explain cyclic redundaney check, ° 4, Explain with suitable diagram: a) Compare FDMA, TDMA, CDMA b) Explain ARQ protocols (stop and wait, Go back NY 3. a) What is meant by cryptography? b) Explain the categories of cryptography algoritht, 0) Write short notes on Digital Signature, Dea 6. a) What is piggy backing? Explain the use of this, @ekeM) b) What is CSMA/CA? Explain its Working. ‘Compare between Optical Fiber and Coaxial Cable. 2 a esha , nt categories of transmission media b) What are the diffe I 10, ° a b) a) ») ) a) °) ‘Why twisting is necessary in twisted-pair cable? ‘What is the main purpose for creating this OSI model”? Explain the function of Network layer, Transport Layer. Differentiate OSI and TCP/IP model. Explain the Different type of addressing, Explain the function of Session Layer and Transport Layer. ‘What isthe difference between two layer and three-layer switch? ‘What are the different types of routing protocol? Explain each of them. Explain the routing Table. Sy aK 34344) 44343 43343 ABR May 2017 nea) CompuTer NETwork (For CST) {Time Allowed: 3 Hours Choose the correct answer and justify your answer (any fifteen): i) ii) iid) iv) vy vi) vii) viii) ») xi) xii) xiii) xiv) xv) xvi) Full Marks: 70 Answer to Question Nos. 1, 2,3 & 4 are compulsory. Answer any three questions from the rest. 15x A ___isadevice that forwards packets between networks by processing the routing information included in the packet ~ (a) bridge, (b) firewall, (c) router, (d) all of the mentioned In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ~ (a) Added, (b) Removed. (c) Rearranged, (d) Modified Communication between a computer and a keyboard involves transmission (a) Automatic, (b) Half-duplex. (c) Full-duplex, (d) Simplex. Which of this is not a network edge device? — (a) PC, (b) Smartphones, (c) Servers, (d) Switch. ‘Three or more devices share a link in connection ~ (a) Unipoint, (b) Multipoint, (©) Point to point, (d) None of the mentioned, TCP/IP model does not have __ layer but OSI model have this layer ~ (a) session layer, (b) presentation layer, (c) application layer. (4) both (a) and (b), Which address identifies process on a host? ~ (a) physical address. (b) logical address, (c) port address, (d) specific address. Which of the following is not applicable for 1P? — (a) Error reporting, (b) Handle addressing conventions, (c) Datagram format, (d) Packet handling conventions. ‘The data field can carry which of the Following’ messages, (d) None of the mentioned. (a) TCP segment, (b) UDP segment, (¢) ICMP Which field helps to check rearrangement of the fragments? ~ (a) offset, (b) flag, (c) TTL, (4) identifier ‘The default connection type used by HTTP is ~ (a) Persistent, (b) Non-persistent, (c) Either of the mentioned, (4) None of the mentioned. ‘The values GET, POST, HEAD ete are specified in of HTTP message — (a) Request line, (b) Header line, (c) Status line, (d) Entity body. Which of the following is not correct? ~ (a) Web cache doesn’t has its own disk space, (b) Web cache can act both like server and client, (¢) Web cache might reduce the response time (d) Web cache contains copies of recently requested objects. FTP is built on _ of the mentioned. architecture ~ (a) Client-server, (b) P2P. (c) Both of the mentioned. (d) None Most packet switches use this principle ~ (a) Stop and wait, (b) Store and forward, (e) Both of the mentioned, (d) None of the mentioned, fi ve to des o end delay in sending packet P(L- Ir there are N routers from source to destination, total end to end delay in sending pac Sumber of bits in the packet R-> transmission rate) ~ (a) Ns (b) (N#LV/R,(e) QNFLYR. (2) L/R, awitehing, (b) circuit resources are allocated on demand ~ (2) packet xvii) In swwitehing, (o) line switching, (d) frequene: al modulation, alow, signal by ~ (a) digital modi Xviii) Bits can be send over guided and unguided media as analog signa by (b) b) amplitude modulation, (c) frequency modulation, (d) phase m« ion, (b) digital modulation Xin) A single channel is shared by multiple signals by _ (a analog modulation, (P) ¢ (c) multiplexing, (d) none of the mentioned, ed, (d) all of the 8 transmission can be done via ~ (a) radio waves, (b) microwaves, (c) infrared, (d) xx) Wire! mentioned, 7 : Sxl Answer any five of the followings: ') What are the advantages and disadvantages of public key encryption? ii) What is congestion? i) Distinguish between Bus Topology and Ring Topology. iv) Compare UDP with TCP ¥) What are the advantages of using optical fiber? vi) What is Piggybacking? vil) Write different modes of data communication viii) What do you mean by server, client, workstation and host? Distinguish between the followings (any five): 5x3 i) Logical address and Physical address, ii) ‘Twisted Pair and fibre optics. iii) TCP and UDP iv) Class full and classless IP addressing technique. v) WDM and ADM vi) Flow control and Error control mechanism, vii) token bus and token ring FDMA and CDMA techniques. Write short notes on the followings (any one): 5 i) Digital signature ii) Satellite Communication 8) What is the need of Flow control? Describe the mechanism of Go Back n ARQ protocol through Suitable diagram for (a) lost frame and (b) lost acknowledgement, b) Compare Stop and Wait ARQ and Selective Repeat ARQ protocol, ©) Explain eyclic redundancy check, (43); 2+4 Write short notes on the followings: 34443 2) Leaky Bucket algorithm b) Serial and Parallel transmission ©) Repeaters @) Differences between Hub, Switch and Router? b) What is SMTP, how does it work? ©) What is ARP, how does it work? 46343 4) Explain the guided and unguided media with proper diagram, b) Explain the different type of Types of Encryption techniques, ©) Differentiate Differential Manchester and Manchester encoding techniques. 40492 10. Explain the different type o Explain the ICMP protocol. f static and dynamic routing techniques with proper diagram. ‘ 4 Explain the Classification of Cybererimes, Write short notes on - (i) cloud computing, (ii) Firewalls, 34+(344) Describe different wireless propagation techniques. | : Explain different type of circuit switching and packet switching techniques with proper diagram, 347 425) June 2016 Computer NetWork (For CST) sime Allowed: 3 Hours Full Marks: 70 fe ax ttsWer £0 Question No.1 is compulsory and to be answered first. ‘This answer isto be made in separate loose script(s) provided for the purpose. ‘Maximum time allowed is 45 minutes, after which the loose answer seripts will he collected and fresh answer seripts for answering the remaining part ofthe question wll be provided, On early submission of answer scripts of Question No.1, student will get the remaining script earlier. Answer any five questions from the rest. 2x10 1 Answer any ten questions: i) What do you mean by Sliding window protocol? ii) How Gateway is different from Routers? iit) What is attenuation? iv) What is MAC address? ¥) Difference between bit rate and baud rate? vi) Define Multiplexing in context of transmission? vil) What is the difference between Hub and Switch? vill) Explain bus topology. ix) Explain MIME. x) What is a URL? What do you mean by Nyquist rate, Shannon's Capacity? xi) xii) Distinguish between Asynchronous and Synchronous, xiii) Why Repeater is different from Amplifier? xiv) Explain OFDM. xv) What do you mean by Reservation, Polling? 2. a) Distinguish between UTP & STP. 6) What do you mean by CDMA? c) Describe different types of CSMA with proper flow chart. 3. a)_—- What are the advantages & disadvantages of secret key encryption? b) Distinguish between symmetric and asymmetric key cryptography. c) What isa digital signature? 3+3e4 Distinguish between Synchronous and Asynchronous TDM. With proper diagram, 4. a) b) _Explain eyelic redundancy Check (CRC). ; c) Compare FDM, WDM. 34443 Write short note on the followings: a) Cybercrimes b) —_X.25 protocol 6. Write short note on the followings: as a) ARP b) ICMP oH 7. Write short note on the followings: a) Token Ring and Token Bus b) HDLC frame format 8 a) b) a) b) Explain Firewall with proper diagram ; Explain different type of IP addressing techniques with example. : Distinguish between Static and dynamic routing algorithm technique with example. on control? Distinguish Leaky bucket algorithm and ‘Token bucket 5+(243) What is Cong algorithm, Time Allowed: 3.1 430(8) June 2019 RELATIONAL DATABASE MANAGEMENT SYSTEMS (FoR CST) Hours Full Marks: 70 Answer to Question No.1 is compulsory and to be answered first. This answer is to be made in separate loose seript(s) provided for the purpose. Maximum ti time allowed is 45 minutes, after which the loose answer scripts will be collected and fresh answer scripts for answering the remaining part of the question will be provided. 1. A. Answer the following questions (any ten) i) ii) iii) vi) ‘On early submission of answer scripts of Question No.1, 1 student will get the remaining script earlier. ‘Answer any five questions from the rest. 1x10 Select from instructor where dept name= ‘Comp. Sci.’; Which of the following, should be used to find the mean of the salary? ~ (a) Mean (salary), (b) Avg (salary), (©) Sum (salary), (d) Count (salary). What type of join is needed when you wish to include rows that do not have matching values? — (a) Equi-join, (b) Natural join, (c) Outer join, (d) All of the mentioned. How many tables may be included with a join? - (a) One, (b) Two, (c) Three, (4) All of the mentioned. Which of the following is used to denote the selection operation in relational algebra? — (a) Pi (Greek), (b) Sigma (Greek), (c) Lambda (Greek), (4) Omega (Greek), Which of the following is not.a integrity constraint? — (a) Not null, (b) Positive, (©) Unique, (4) Check ‘predicate’. vaue [An entity in’A is associated with’'at most one entity in B, and an entity in B is associated with at most one entity in A. This is called as — (a) One-to-many,: (b) One-to-one, (©) Many-to-many, (2) Many-fo-one. vii) Drop Table cannot be-used to drop a table referenced by a constraint — viii ix) xi) xii) (a) Local Key, (b) Primary Key, (c) Composite Key, (d) Foreign Key. i) Inthe normal form, a composite attribute is converted to individual attributes — (a) First, (b) Second, (c) Third, (d) Fourth. AL consists of a sequence of query and/or update statements. ~ (a) Transaction, (b) Commit, (c) Rollback, (4) Flashback. In order to undo the work of transaction after last commit which one should be used? (a) View, (b) Commit, (c) Rollback, (d) Flashback. Which of the following is used at the end of the view (o reject the tuples which do not satisfy the condition in where clause? ~ (a) With, (b) Check, (c) With check, () All of the mentioned, Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database’ ~ (a) DML (Data Manipulation Language), (b) DDL (Data Definition Language). (c) Query, (d) Relational Schema. B. Answer the following questions (any five) 52 6 i) Define super key and candidate key. ii) What is schema? i What is view? 7 iv) What is index? ¥) Write the advantages of DBMS. ‘ Wi) What is data independence? 2) Explain generalization and aggregation with proper diagram b) Write the role of database administrator, 4r4+2 ©) What is derived attribute? @) What do you mean by E:R modelling? ») Draw an E-R diagram for a database with the following banking scenario, + Banks have customers, Customers are identified by name, custid, phone number and address. Customers can have one or more accounts - Accounts are identified by an account number, account type (savings, current) and a balance Customers can avail loans, Loans are identified by loan id, loan type (car, home, personal) and an amount. Banks are identified by a name, code and the address of the main office Banks have branches. Branches are identified by a branch number, branch name and an address Accounts and loans are related to the banks’ branches. Consider the following relational schema and answer the queries in SQL. Emp (Empno, Ename, Job, MangerID, DOJ, Sal, Comm, Deptno) Dept (Deptt, Dname, Loc) Salgrade (Grade, LowSal, HighSal) ') List the highest paid employee of each department. 1) Show the employee name along with their manager name iit) List employee name, salary and his grade. '¥) List the names of the employees in the department 20 who Set more salary than any one’s salary of department 10, \) List the employee name and his department name for those who ets some commission x2 4) Consider the order form and subsequent relation from it, Order number: 2204 me: ov/os/20r8 emtomer umber: 5 Cemtomer name: Sayan a Hider Cemtomaracroos 23, Convert Road (ry-County tata, b) a) ° a) b) a) b) o Fv tratinte Hn an receaverabte: ae fedtite State the ACID prey Give an example of What ix rigorous two phage focking pritocal? al preatincosl far the teanaty th Discus the tinvextamny ba Write a short nate on Higger Explain primary key and foreign key with an example Write the difference between char and varehat datatypes What is nested query” Give an example 43S) June 2018 RELATIONAL DATABASE MANAGEMENT Systems (For CST) Time Allowed: 3 Hours Full Marks: 70 Answer to Question No.1 is compulsory and to be answered first. ‘This answer is to be made in separate loose script(s) provided for the purpose. ‘Maximum time allowed is 45 minutes, after which the loose answer scripts will be collected and a) b) °) b) °) fresh answer scripts for answering the remaining part of the question will be provided. On early submission of answer scripts of Question No.1, a student will get the remaining script earlier. Answer any five questions from the rest. Write down the answer of the following questions in short (any five): x2 i) Define null vatue ji) Define functional dependency. iii) Define DBA. iv) Distinguish between serial & non-serial scheduling. y What is schema? vi) Define conflict serializability vii) Define Super key viii) Describe data integrity in a database. State whether the following statements are True or False: 0x1 ) A RDBMS is a software system that can support and manage any number of independent Databases, ii) Data dictionary stores metadata iti) Relational Algebra can be used to express data dictionary. iy) In software system data is usually shared among many users, \) ABMS consists of fields and records vi) A query is a miniature program that tells the DEMS what to do. vii) Referential Integrity requires fully normalized tables. vill) Backup and recovery of the database is not the responsibility of the system administrator ix) A candidate key is an attribute that can uniquely identify the rows. X) The degree of a relation is the number attributes in a relation. Differentiate logical and physical data independence. Briefly explain different levels of data abstraction of DBMS with a Diagram, ‘What is cardinality of database? 34542 Define multivalued attribute. Distinguish between weak and strong entity set. Draw an ER diagram of the given database of a Departmental store as defined below: Each employee is represented with attributes employee number, name, address and department number he/she works for. “) Each department is represented with attributes department name, employees, manager and items it sold. Ui) Each item is sold is represented with attributes item name manufacturer, price and model number. \ a) b a) b) ° 4) a) by ° a) a) b facturer name, address, igs, iv) ach manufacturer is reprenented with attributes manu an supplied to the store and their prices. Consider the following tables (wchema): 7 Employee! (Kno, 1. name, Salary, Do, Join Dy Department: (D_n0, J name, Locition) Loan’ (Eno, Lo, L data, Amount) ; Write down the corresponding SQL for the following queries: ') List the name of the employees currently not taking any loan. |i) List the employees whose department are located in ‘Delhi’ and has more than one Joan. li) Find the D_no wise total loan amount taken by employees. Distinguish between aggregation and specialization in a relation. 644 What is the basic difference between hier point of view? ‘What do you understand by procedural and non-procedural DML? Why theta join operation is called an extension of natural join operation? What do you mean by PLISQL? 3434242 ‘chical and network model from record organisation's Distinguish between partial and fully functional dependency, Show that if relational scheme is in BCNF then itis also is in 3 NF but vice versa is not true. What is multi-valued dependency? 3+542 Suppose we have a relation sche Ao BC,CD + Bi ind the closure set of that relation Differentiate between Cursors and Triggers. 143 (A, B,C, D, B) with the fundamental dependencies: A What ate the ACID properties of a transaction’? Consider the following two transaction and T 1, Read (X) Read (X) X-X-500 TEMP X*0.1 * Write (X) "TEMP Read (Y) YY + 500 YoY TEMP }) Show that every serial execution involving 1g these two transact consistency of the database, ictons preserves the Ww 4 concurrent execution of T, & ‘T, schedule, which produces a non-serializahle 44033) ng-baned recovery and recovery with concurre oti Discuss the strategies of query processing ” eee Define Equivalence expression, 344i 43S) June 2016 RELATIONAL DATABASE MANAGEMENT SYSTEMS (FOR CST) Time Allowed: 3 Hours Full Marks: 70 Answer to Question No.1 is compulsory and to be answered first. ‘This answer is to be made in separate loose script(s) provided for the purpose. ‘Maximum time allowed is 45 minutes, after which the loose answer scripts will be collected and fresh answer scripts for answering the remaining part of the question will be provided. 1 Answer any ten of the following questions: i) ii) iin) iv) ” wo vu) vin) mn) x) x) xu) xm) xy) a) b) ° ») a) ») °) 4 ° (On early submission of answer scripts of Question No.1, a student will get the remaining script earlier. Answer any five questions from the rest. ire Define normalization What is temary relationship? Give four examples of DML Why secunty is important for database” What iy data dictionary Define candidate key Describe how strong and weak entity types differ Define data integrity What 1s schema” Is SQL is anon procedural language? How deadlock 1 different trom live lock? Define multi-value functional depeadency Why we need schedule of a set of concurrent transaction? What is the role of DBA Discuss join dependency Pxplain relational date model with suitable example AIL primary keys are the super hey but the converse is not true”, Clarify with example, Define altemative key with example Describe bnefly the role of DBA in the database design ae? What are the differences between Traditional File Management System and Database Managemen System? What do you mean by Dats Dependency” What do you mean by redundant data? Discuss the entity integrity & referential integrity constraint Renee Design ER-Diagram for s Library Management System. Briefly describe the 3-layer architecture of a DBMS. 3 “onsidering following relational database and write down SQL queries for following questions STUDENT PERSONAL {ROLL NO, F_NAME,M_NAME, L_ NAME} STUDENT_OFFICIAL {ROLL_NO, HOUSE_NO, STREET_NAME, LOCATION, PIN CODE; STUDENT MARKS {ROLL_NO, F NAME, M_NAME, L_NAME, TEST_NAME, MARKS_OBTAINED, FULL_MARKS} - Who got highest marks in INTERNAL? Retrieve the ROLL_NO, NAME and MARKS_OBTAINED by the students out of 100. Retrieve the Average marks of INTERNAL and FINAL exam. Retrieve the total marks obtained by a student out of 100, whose 2™ letter of the first name is ‘8 List the Name and PIN_CODE of the students who have internal marks greater than 20. 52 1 b) a) b) b) b) b) i it 4 ial Dependency” and “ Multivalued Explain the terms “Transitive Dependency”, “Full Function: n u Dependency”. Consider the decomposition D={R1(M,Y,P), R2(M,MP,C)}. Is this decomposition lossy or lossless. Explain. od 24243 State Armstrong’s three axioms. Prove Union rule from Armstrong’s axioms. : ‘What is transaction? Explain ACID properties of a transaction. Define 2NF, 3NF and BCNF with example. 446 Given a relational schema Supply (Sn6, City, Status, Pno, Qty) with FD set F= {Sno->City, City>Status, {Sno, Pno} >Oty} Find the Key of the schema, Also reduce it into 3NE. Given relation R(A,B,C,D,E) & Functional dependencies: A>BC CD>E B>D E>A Check whether- 4 i) Decomposition R.= (A, B, C) and R= (A, D, E) is loss less or not ii) Dependencies are preserved or not. Discuss Armstrong's axioms, 44442 T1: Read (A); T2: Read (B); Read (B); Read (A); IfA=0, then B= BH; IfB=0, then A= AH; Write (B) Write (A) ‘Add lock and unlock instructions to transaction TI and T2, so that they observe the two-phase locking protocol. Can the execution of these transactions result in a deadlock? Write short notes on Spurious tuples and Dangling tuples, 44343 Consider the schedule shown below: B % % Wate ¥ Read (¥) Read x) wae) Read (2) Read (0) Wate (2) wate) Wate (¥) Is it Conflict Serializable or not? Explain your answer. What is Serializable schedule? Describe the growing and shrinking phase of two phase locking protocol with an example. 44244) e Allowed: 3 Hours 43(S) June 2019) OBJECT ORIENTED PROGRAMMING Full Marks: 70 Answer to Question No.1 is compulsory and to be answered first, This answer is to be made in separate loose seript(s) provided for the purpose. Maximum time allowed is 45 minutes, after which the loose answer scripts will be collected and fresh answer scripts for answering the remaining part of the question will he provided. (On early submission of answer scripts of Question No.1, a student will get the remaining script earlier, Answer any five questions from the rest. A. Answer the following questions (any ten): lox i) ii) Count stands for ~ (a) class output, (b) object output, c) console output, (d) none of these. iii) Which of the following cannot be declared static? — (a) Class (b) object (c) function @ dotha &b, iv) A function with the same name as the class, but proceeded with a tilde is called of that class ~ (a) Function, (b) Object, (c) constructor, (d) destructor. vy) Which of the following cannot be declared as virtual? — (a) constructor, (b) destructor, (c) data members, (d) both a and ¢. vi) Which feature in OOP allows reusing code? — (a) polymorphism, (b) inheritance, (c) data hiding, (d) encapsulation. vii) An array is accessed using~ _(a) FIFO approach, (b) dot operator, (c) an index name, (@) none of these. viii) How can we achieve run time polymorphism in c++ (a) friend function, (b) virtual function, (c) operator overloading, (d) function overloading, ix) is a sequence of byte ~ (a) stream, (b) input string, (¢) output string, (d) none of these. x) While overloading binary operators using member function, it requires argument/s, ~ (a) zero, (b) one, (c) two, (4) three. xi) Object oriented programming employs ___ programming approach. ~ (a) top-down, (b) procedural, (c) bottom-up, (4) all of these xii) Which of the following is not a file opening mode — (a) ios:ate, (b) ios:nocreate (6) ios:;noreplace, (d) ios:truncate, B. Answer the following questions (any five): we i) What is data hiding? ii) Write down the difference between new and malloc? iii) ‘What is the use of friend function? iv) What is method overriding? Which of the following operators cannot be overloaded? — (a) + (b) (dot) (c) >> (4) none of these. a) yy a) » ay by a) » ay » a) by °) a) » a » 3 YY Uta os cyto aunt oyptiedl type ean eta VAY Whaat is tounge tins! : YW) Wheat isthe oittoroni: Bot wor ata tie aid ti Dattorentiate bouyoon jyroweatniy: vitor prannnsinnige anil alec t What as anwouny ata tab! Hog vitae vA Nap What avy the siftoronves henwoon rotbienee anil patater! Weate pagan to Uthat ioe hb pHHOL Pe pH Ae derive class's object ane aeons the have elise neni ws What are the etuatactovistio at conti te! Wile a progeain tlhe fuctor What is dvnanie vanstitar! Cie an exiiple ao Dittorenee bonveon wvertoating and aver ling Wate a program ty tnyptontent binary: UperitOn avertonting, $+ Desoribe muttipte inbieritanes with propor example Solve Diamond proton inv hybrid inberitanen $5 What is template? Detine thivetion and etsy tomptate with an exaniple Write dower the advantage of using tomplaton 2503 What ave the purpose of exception hanllin? Waite & program of t0 lustiate multiple eateh stutenents 46 What is polynvorphisny? What are the ¢ypes of polymorphs avallabte tne 1 Write an example of run tine potymorphinny 22 6 May 2017 OBJECT ORIENTED PROGRAMMING Time Allowed: 3 Hours Full Marks 74 Answer to Question No.1 is compulsory and to be answered first. This answer is to be made in separate loose seript(s) provided far the purpose. Maximum time allowed is 45 minutes, after which the loose answer scripts will be collected and fresh answer scripts for answering the reriaining part of the question will he provided On early submission of an-wer scripts of Question No.1, 4 student will get the remaining script earlier. Answer any five questions from the rest 1x2 Answer the following questions (any ten) i) What is an abstract class? i) What do you mean by multiple inheritarce? 'i1) What do you mean by implicit conversion? 18) Why member functions are not virtual by default? V) What is reflexive association” Vi) What is reference variable Vit) What are the differences between new and malloc? viii) How are binary files being different from the text files in C++? ix) What are proxy objects? x) What is memory icakage xi) What is Generic Pointer’ xii) Explain default-constructor xili) Why can local class be useful? xiv) How the encapsulation can be implemented in C++? Av) Differentiate between access specifier and access modifier 4) > Explain the concept of object oriented programming, 2 b)/” Describe the salient features of structure oriented and object oriented programming concepts. AM Can the iscrtion operator << and the extraction operator >> be members of a class? Giv ) ) examples to justify your answer +s Explain the ISA and HASA class relationships. How would you implement cach in a class design? What is reference variable? Explain the usefulness of reference variable with example. aM Can a constructor be virtual? Justify the answer Deseribe the main characteristics of static functions. SO How can a‘ operator be used as unary operator? 34 Differentiate between early binding and late binding, with an example explain how late binding can be achieved in C+, ») With an example, explain how virtual functions are hierarchical. ©) What is Pure Virtual Function? Why and when it is used? $F What is the difference between a copy constructor and an overloaded assignment operator? a A a 6) a) ) Can a copy constructor accept an object of the same class as parameter, instead of reference of the object? Justify the answer. . Explain the advantages of call by reference over pointer with example. 31384 1 a) b) ° a) b) °) ve a) b) °) ‘When we write a destructor. do we need to explicitly call the destructors for my member op Justify the answer. |s there any difference between List x; and List x():? How virtual functions are implemented C++? debe What is multiple inheritance{ virtual inheritancey? What are its advantages and disadvantages? When is a template a better solution than a base class? ‘What is the difference between delete and deletef]? GBr2pr2e3 Explain the method Overriding and method overtoading with example ‘What is a nested class? Why can it be use%ul? onere Illustrate classes of File Stream Operatiors using a diagram. (iostream file & fstream tile) Differentiate between inline function and macro with example Explain the usefulness of function Template with example cord June 2016 OBJECT ORIENTED PROGRAMMING Time Allowed: 3 Hours Full Marks: 7¢ Answer to Question No.1 is compulsory and to be answered first, This answer is to be made in separate loose seript(s) provided for the Purpose. Maximum time allowed is 45 minutes, after which the loose answer scripts will be collected and fresh answer scripts for answering the remaining part of the question will he Provided (On early submission of answer scripts of Question No.l, student will get the remaining script earlier. Answer any five questions from the rest. 1 Answer the following questions (any ten): We }) Name the four Operators which cannot be overloaded. +i) Explain the use of Namespace. iii) What do you mean by abstract class? iv) What do you mean by multiple inheritance? ¥) What is function template? vi) What do you mean by ‘this’ pointer? vii) Explain the role of file iostream.h in C++, vili) What do you mean by memory leakage? 2) Differentiate between Object-Oriented Programming and procedure oriented Programming x) What is File handling in C++? xi) What is static variable? xii) How super class constructor is called from derived class constructor? xiii) Explain the function of virtual pointer table? *xiv) What is object cloning? xv) What is compile time Polymorphism? 2 8) What is default argument? Explain the use of the default argument with example. b) Differentiate the inline function and macro with example, ©) What are the three parts of an iostream system? 4133 3. 8) “Copy constructor alway’ pass by const reference”. Why? Explain with example b) i) float a =4.5; const int &i =a; ii) float a =4.5; int &i =a; i) or ii) which one is the valid statement and why? Justify your answer. ©) Differentiate between static and dynamic binding 84344 4 a) How ean we differentiate between a pre and post increment operator while overloading (oper) b) Differentiate between Overloading and Overriding. ©) Explain the advantages of reference variable over pointer variable with example. 5.) Point out the reasons why using new (operator) is a better idea than using malloc()? ») Differentiate between HAS A and IS A relation with example, . ©) What is the use of friend function? Explain with example. We 62) Why destructor are not virtual by default? b) Can we declare a static function as virtual? soe ©) What are virtual basé classes? When should they be used? What is template? Define Function and Class templaté with example. Write down the advantages templates. >) » Wote a program which reads a complex number. Now increment only the real part arid display wt same Write down a program which reads 2 complex number. Now decrement the real and imayuuay yoo and display $a What is exception handler? Write down the uses of exception handler Explain ty, ary aud! vais with example White down the difference between — (1) class member function and the vousitin (1) constructor and destructor ed May,2015 OBJECT ORIENTED PROGRAMMING Time Allowed: 3 Hours Full Mark Answer to Question Not eomy to be answered first. ‘This answer isto be made in separate loose seript(s) provided for the purpose Maximuun time allowed is 45 minutes, af er which the loose answer seripts will be collected au! fresh answer seript 14 part of the question will be provided. (On early subanission of answer seripts of Question No.1, a student will gct the remaining seript earlier. Answer ns from the vest. 1A. Write down the answer ofthe following questions in short (any fivey Define Containership. Distinguish between new and malloc() Define Generic funetion, Define absiract class ‘What do you meen by virtual class? Define Static binding. Define ambiguity in inhecitance. Define Constructor Overtoading. B. State whether the following statements are True or False: { i) Object oriented systems van scale up better from sinall o large. | * T ii) d programming is on algo bs 13 ea _ wy) FY) Constructor doesnot revi a value vi) Friend function can be used to overload operators. © ‘vil) “this pointer points to the object that is currently used to invoke a function. viii) Virtual function allows us to use the same function call to invoke memtr objects of different classes, ix) A stream may be coms x) Wecan add dats to an existing file by oper -d to more than one file at atime. it in “waite” mode af What do you mean by inheritance? QS Briefly explain different categories of inheritance. ©) Distinguish between ‘IS A’ and ‘HAS A” relationship. 3 af What do you mean by default cmstructor? b), Write C+ code to implement copy eonstructor, ‘of Write down three properties of Destructor: (AC af What does Polymorphism means in C44"? bY Briefly explain run time polymorphism with appropriate example. [PF Distinguish between function overloading and oveniing (state atk a for No What do you mean by operator function? Voy Create a class Complex that will encapsulate complex numb type), Implement the addition (), subtraction (-) andi multiplication (*) as uverio. . Complex type objects in a singwe C++ program. W) State at least three operators that cannot be overloaded. ' fat do you mean by friend function? : Arte at least three points 2ach,to describ the merits and demerits of a friend function. Write a program in C+ to implement friend fimetion to access the data of two slifferent classes. Gee) a) What do you mean by exception handling? by State some advantages of using exception handling mechanism in a program. Write a program to implement the following constraints using exception handling: 1) A fisnetion to read two integer {yx numbers from the keyboard. it) A function to caleutate the divisi an of these numbers. mig input data, i A try block ta theon an exesptina for wo iv) Atry block to detect and throw 1 exception if the condition ‘divide by zero” ocours. v) Appropriate catch block to handl: the exceptions thrown. 24245, a) ‘What is generic (template) class? b} Write a program in C++ to create a generi¢ function which can return the larger value when compared with two integers or two floating point numbers or two characters. j State at Ieast three advantages of generic orogramming approach. 24543 Mm ‘What are the different types of modes available for opening a file in CH+? Cheaie a class student with member date as name (String type), roll_nofint type) and marks of tire subjects as Mi, M2 and M3 ( int type) with appropriate member functions to insert and fisplay data, Now prepa Result” fe store n (to be inserted from the keyboard) numbers of student obicet and display them in tabular format, 446 1 Qh Y/ seto4 do you mean type conversion in C++? Aig Vist are te differsnt kinds of "ype convcsions available in CH? ‘ tea program in C+ to cunvert ths Polar ordinate class 19 Cartesian. Gaokisnate clave is tne vf MEME a andy (both loating type). ilian éfloat type) and anal Moat type). +345 syjngul vr system contain 430(8) June 2018 RELATIONAL DATABASE MANAGEMENT Systems (For CST) Time Allowed: 3 Hours Full Marks: 70 °) b) 9 Answer to Question No.1 is compulsory and to be answered first. This answer is to be made in separate loose script(s) provided for the purpose. Maximum time allowed is 45 minutes, after which the loose answer scripts will be collected and fresh answer scripts for answering the remaini part of the question will be provided. On early submission of answer scripts of Question No.1, a student will get the remaining script earlier. Answer any five questions from the rest. Write down the answer of the following questions in short (any five): 5x2 i Define null value. ii) Define functional dependency. iii) Define DBA. iv) Distinguish between serial & non-serial scheduling, y) What is schema? vi) Define conflict serializability vii) Define Super key. viii) Describe data.integrity in a database, State whether the following statements are True or False. 10x! ) A RDBMS js software system that can support and manage any mumber of independent Databases. ii) Data dictionary stores metadata, ii) Relational Algebra can be used to express data dictionary. iv) __ In software system data is usually shared among many users. vy) A DBMS consists of fields and records. vi) A query is a miniature program that tells the DBMS what to do. vii) Referential Integrity requires fully normalized tables, vil) Backup and recovery of the database is not the responsibility of the system administrator. ix) A candidate key is an atribute that can uniquely identify the rows. ¥) The degree of a relation is the number attributes in a relation, Differentiate logical and physical data independence, Briefly explain different levels of data abstracti What is cardinality of a database? Defi ion of DBMS with a Diagram, ine multivalued attribute. Distinguish between weak and strong entity set. i) ii) iti) Draw an ER diagram of the given database of a Departmental store as defined below: Fach employee is represented with attributes employee number, name, address and department number he/she works for Fach department is represented with attributes department name, employees, manager and items it sold. Each item is sold is represented with attributes item name manufacturer, price and mode! number, by 4) b) “ b) ° iv) Each manufacturer is represented with attributes manufacturer name, address... supplied to the store and their prices. Rhee Consider the following tables (schema): Employee: (E_no. E_name, Salary, D_no, Join_Dt) Department: (D_no, D_name, Location) Loan’ (E_no, L-po, L_data, Amount) White down the corresponding SQL for the following queries: ') List the name of the employees currently not taking any loan. i) List the employees whose department are located in “Delhi” and bias more that gus Joan lil) Find the D_no wise total loan amount taken by employees Distinguish between aggregation and specialization in a relation, oe What is the basic difference between hierarchical and network model from record organisations point of view” What do sou understand by procedural and non-peocedural DML? Why theta join operation is called an extension of natural join operation? What do you mean by PL'SQL Distinguish between partial and fully funchonal dependency Show that if a relational scheme ss BCNF then it ts also is in 3 NE but vice versa is not true What 1s mult valued dependency Suppose we have a relation scheme R = (A.B, C.D, £) with the fundamental dependencies A-+BC.CD +f BR sD.E «A Find the closure set of that relation Differentiate between Cursors andelinggers What are the ACID properucs of « transaction? Consider the following two transaction T and T 1 r Read (X) Read (X) XN-S00 TEMP ~ X*01 Write (X) X= X-TEMP Read (Y) Wate (X) Y= = soo Read (Y) Y =Y- TEMP 1) Show that even’ senial execution involving these two transactions presenes the consistency of the datahase ") Show a concurrent execution of T & 1, which produces a non-serializahte schedule 443) Distinguish between Log-based recovery and recovery with concurrent transaction. Discuss the strategies of query processing Define Equivalence expression. 384 432(S) June 2018 Computer Grapuics Time Allowed: 3 Hours Maximum time allowed is 45 minutes, Full Marks: 70 ____ Answer to Question No.1 is compulsory and to be answered first. ‘This answer is to be made in separate loose script(s) provided for the purpose. after which the loose answer scripts will be collected and the remaining part of the question will be provided. On early submission of answer scripts of Question No.1, student will get the remaining script earlier. fresh answer seripts for answering Answer any five questions from the rest. Answer any five questions from the following: 5x2 i) Define shadow masking in CRT. ii) Distinguish between window and viewpor. 4ii) Express mirror matrix in homogeneous coordinate system for a point (x, y) in 2D about y axis, iv) Define view volume. v) Define Shear. vi) What do you mean by Vanishing Point? vii) What is the full form of PHIGS? viii) Define Spline ix) Define staircase effect in DDA algorithm, ‘Choose the correct option for the following statements. 0x1 {) A translation is applied to an object by — (a) Repositioning it along with straight line path, (b) Repositioning it along with circular path, (c) Repositioning it along with zigzag path. (@ None of these, ii) Polygons are translated by adding to the coordinate position of each vertex and the current attribute setting ~ (a) Straight Iie path, (b) Translation vector, (c) Differences, (@) Multiplication iif) To change the position of a circle or ellipse we translate - (a) Centre coordinates, (b) Centre coordinates and redraw the figure in new location, (c) Outline coordinates, (d) All of the mentioned. iv) The basic geometric transformations are ~ (a) Translation, (b) Rotation, (¢) Scaling (@) All of the mentioned, vy) __Incolour raster system, the number of colour choices available depends on ~ (a) colours in frame buffer, (b) Amount of storage provided per pixel in frame buffer, (c) RGB colour, (@ Neither (a) nor (b) vi) The colour code “000” is for ~ (a) White, (b) Black, (c) Blue, (d) Green, vii) Colour information can be stored in ~ (a) Main memory, (b) Secondary memory () Graphics card, (d) Frame buffer. vii) Whenever @ particular colour code is specified in an application program, the corresponding binary value is placed in ~ (a) Colour look-up table, (b) Directly in frame buffer, (c) (a) and (b) both, (A) Video lookup table. 'x) The range that specifies the gray of gray seale levels is (a) The value range from -1 #0 | (b) The value range from 0 to -1, (c) The value range from Oto 1, (d) All ofthe above b) by » tne ane § cs per putet them mt us evade of gray levels’ 64) 18 giay levels 0) ¢ ry hove 66) 26 gray levels ih No codsur Sy) Oe raaace system, Lanes awe piomed wih a) Lanes (BV Dots. 101 Fiacly + memexned Sot Conntamans tefevences a the polybene femctce are seid ax - 14! Bilativs ssaundyists fae Oh) Abwodine commune values, (2) Curent pomition, tal) Real sspurdinate value se) Hehe Neuer 6 efit mt 4 angie oiour aad the algoethin prowl piss! Up gure Pane, Maundurs cet ws encouneered ss cathe — 14) Scan tine fil slgendiqe €, Beam 6 wigoertim. ¢<) Foen 20 sigur dh Parallel curve abgrthv an eres Ge gucture mformucen aw 4 charge shstributiest Dulin hc plays ENTER 1a Carte ran tube. oS) Darect sew storage tube, (c) Mla pic! onlay > (2) 2D swewang device Se Weta! urpamracion of te woke commolier of the Raster Scan Diplay wb + vee! Geagran, Nom are Gifferone shades (ane drmwing sigorshen for m1 Mhwarete Oh aud algurthen Wo pewerats mermedkate poxnty between the ine endpoints (10. 29) mu: aN 80) os for 4 custe with radius ¢ and centre at ($5 Winte down the Madprois Carcie Drew ing sogir utn How cucie symmetry works hw pomcratang poets un the perimeter’ Pracune a tecngue K: wiyemen: mae sae poly gn fling algorithm, Eaplaun the cd-even nite 1 teat nade veanade of 4 poly gon What do you moan ty Homegencuws .-wedinte 9y stem” Implement the compnite mute fu the general prvi posnt rotation in 2D Coordinate vystemn Show that raw sucoreaine scaleng 08 an abject is mulnplicative in 2D Coordinate system D+S3 Foe the compenate matr for reflecaee abut the lise »=1 of an object in 20 Coordmate system Perform 4 scaling wath 5.1. 5.=2 and scalieg direction is 45on a square with screen coordinates (0.0),(1, 01, Tyand (0. 1) Draw the tevaleamt figure also ws What do you mean by clippung? Binefly discuss Cobce ~ Sutherland Lane Chipping technique 4 What do you mean by Comves Hull propernes ut Besser curves? How 1s it satisfied Show that the Dicading fumcbons obtamed with the knot vector (0,0.0,0,1,1,1,1) for cubs 1B Spline curves. comespond to the blending funcuoes for cubic Bezier curves st) 432(S) June 2016 Compurer Grapuics Time Allowed: 3 Hours Full Marks: 70 ve a AuSWer €© Question No.1 is compulsory and to be answered first. imu gs answer is to be made in separate loose seript(s) provided for the purpose. Maximum time allowed is 45 minutes, after which the lose answer seripte will becoligcted and fresh answer scripts for answering the remaining part of the question will be provided. On early submission of answer scripts of Question No.1, 8 student will get the remaining script earlier. Answer any five questions from the rest. 1 A. Answer any five of the following: a i) What is convex hull? ii) What do you mean by frame buffer? iit) Define the term persistence, iv) What is view volume? Y) Differentiate window and viewport. vi) What is panning? vii) Write down the 3x3 shear matrix for y-direction shear, B, Choose the correct altemative (any ten): 10x1 i) Which of the following projection is not affected by view-plane positioning? ) Orthographic b) oblique c) perspective 4) all of the above. i ‘The degree of a Bezier curve segment is determined by the- ) Interpolation of the control points b) number of control points to be fitted ©) position of the control points 4) Geometric continuity of the curve. iii) Random-sean displays are also called as- 8) Raster scan displays ) vector displays c) scalar displays 4) direct view displays. iv) If the line joining any two interior points of the polygon lies completely inside the polygon, such polygon is called as- a) Simple polygon b) convex polygon ) concave polygon 4) regular polygon. v) Disadvantage of LCD is- a) Poor viewing angle ») much power consumption c) Heavy weight 4) All of the above vi) Awindow defines- a) What is to be viewed ') where is to be viewed ©) how is to be viewed 4) none of the above vii) Origin centered Circle is not symmetrical about- a)x: b)x=0 °) vii) Scan line algorithm is used for a) generating straight line) for filling the whole display ) filling the polygon d) none of the above. 1 ix) In scaling if S,2S,, it means: i iform sealing a) no change in object by uniform sea <) Shrinking object 4) Shape distortion x) The plane on which we are taking the projection is called as a - a) Normal plane b) projection center )display planed) view plane xi) The effect of moving a fixed size window across the various objects in a sceite Is howe as. a)Scrolling b) Tapping ¢) Panning —_d) Zooming xii) What is the use of homogeneous coordinate system? a) To treat all three transformation in a consistent way byTosale — c)toraate —d) to reflect a) Wnte down the DA |i drawing algorithm What are its disadvantages?” b) Scan convert a line from (0,0) to )-8. 4) by using Bresenham’s algorithm a4 a) What 1» imteriacing” Discuss is need b) Discuss the working principle of LCD display ©) How much time op spent Sannin across each row of prvels during screen retiess ou taster hyster with 2 resolunor of | 260X024 and a retiesh rate of 60 trames/second? iia 8) White down the fload fill algorate: sting S-connected fill method by Derive the general proc pout reanoe mace on 8) What is line clipping” Dearte Cotes Sutherland line chpping algorithm by uss suitable tigate b) Determine the visible pation of he line p10 4 Lo) and p2(0-4,2.7) clipped by window (£0 yu YM aa AO.) aS A STL) SS ung Cohen- Sutherland algorithin wea 2) Define reflection and shearing 10 cumple and diagram. by) Perform 2 4° rotator of enangie 0.0. BOLT), COS,2)- a) about the origin and b) about prot: no bets 2) Magnity the tangle of problem @ 6/4 rice us size while keeping C(5,2) fixed By Show that « reflectae atoul the bine y—4 9 equivalent to 4 feflection relative to y weiss follow! by a counter clockwise natatio 9 se 4) Descnite cut. Bene cure is details Ale evaluate the Hezier matrix for the same Dy Define ditterent aides at tant Param ily conditions Write short motes (ans nae 0) Pryscnan (i) Sutheriand-Hodgemas algonaten (ui) B-Spline Howr June 2018 Microprocessor & Procramaunc Full Marks 70 Amemer to Question Ne. i compaitory and to be answered first. Thi amomer i te be made im separate nave scripts) provided for the purpose. Mevimum time alowed is 4S minute after which the lao anywer scripts will be collected and B Answer the following guescims am fre inca amewer scripts for amvwering the remaiming part of the questiva will be provided. On carts eebmivaen of ameser scripts of Question No.1. 2 etedemt = get the remaining script cartier Anson ay fine questions from the rest fmm the carvecs amewer tram the pen aermanyes (any fen) to Which processcr erature s pepetimed” (4) all (40 procenwry, (b) all «SS processors, al) 006 porurean of at 4 thewe sures Gat matactenn cowke carrey Deng executed 44) Accumulator, (b) PSW ™ em raceme See emeyranng all the funchon of a CPU of a computer tn WOME sr Ou mihirewe Duss Dit wide (a) 16 bit, (b) # bat, (6) 20 The wun at F + cmning, (0) decanting, (<) processing, (d) none of these The tl pretontics astute om memory and sore them in (a) queue, (b) stack, Be ME Pe of momma La Oe aerated me veyment (4) 1) KB, (by 64 KIS 400 RB or eB The IP hay se nema) 8 Ou 8) $ Ove 1) 16 bu, (dy 6 at to mee om Meg 2 se oes 14) The um iy mote than 16 bit, (b) Signed amber ge oA ve Bie Fangs Aer at aCe. Uperation. ) Carty anu sign flags are Ae 1S) Nant Wicd Owe aw epeam 4) varie (by repster () Lowe omocamen, (5) Duns tamer operation. (d) Branch operation : Wha Moore » bw Hom to calnaiate pirvsucal addons trom loyscal adkdreny? Daflerence hermeee adigress bes ued data ts iv) Write down the function of SP and PC. v) What is interrupt? vi) What is folder memory? vii) What is maskable interrupt? 8) Draw the block diagram of 8237 and explain its function, b) Explain the memory interfacing of 8086 with suitable diagram. 545 a) Differentiate maximum and minimum mode of 8086, b) Describe the functions of all flag registers of 8086. 55 a) Write down the addressing modes of 8086 with suitable example. b) Write a short note on op-code. 842 @) What is macro? What is procedure? b) ‘Write a program to add 5 numbers using loop instruction. 446 a) Differentiate between hardware and software interrupt with suitable example. b) ‘Draw the timing diagram of - i) MOV A, Mii) ADI 0SH. HS Explain the following instructions (any five): 5x2 (a) LEA, (b) SHR, (c) MP, (a) MOV AX, BX, (¢) IMUL, (f) CMP AX, BX a) Write @ program in 8085 to reverse a memory block of 10 bytes starting from EO00H up to location E009H. b) Difference between 8085 and 8086. 545 a) Different between memory mapped /O and peripheral I/O, b) Why segmentation is needed in 80867 S45 428(S) May 2017 MicroPROCESSOR & PROGRAMMING Time Allowed: 3 Hours Full Marks: 70 Answer to Question No.1 is compulsory and to be answered first. This answer is to be made in separate loose seript(s) provided for the purpose. ‘Maximum time allowed is 45 minutes, after which the loose answer seripts will be collected and {fresh answer scripts for answering the remaining part of the question will be provided. (On early submission of answer seripts of Question No.1, 1 student will get the remaining seript earlier. Answer any five questions from the rest. 1. A. Choose the correct answer from the given alternatives (any ten): 10x1 i) Which register pair is by default used for memory addressing ~ (a) BC, (b) DE, (c) HL, (d) PSW, ii) Which instruction is used to selectively mask an interrupt in 8085? — (a) El, (b) Dl, (c) RIM, (d) SIM, iii) For which number system Auxiliary carry is used? ~ (a) BCD, (b) Binary, (c) Decimal. (6) Hexadecimal. iv) Number of software interrupt supported by 8085 microprocessor is — (a) 8, (b) 16, (c) 64, (256. ¥) Which pin is used for demultiplexing of address and data bus? - (a) ALE, (b) HOLD, (©) INTR, (d) READY. vi) Which pin of 8086 is used for memory interfacing? ~ (a) CLK, (b) BHE, (c) TEST. (@) LOCK, vii) The size of each segment of 8086 is — (a) 1024KB, (b) 64KB, (c) IMB, (4) 64Byte. ix) ”) xi) xii) xiii) Which of the following is not true about segment of 8086? ~ (a) Segment can start from any address location on memory, (b) Two or more segment can overlap to each other. (c) Segment register holds the starting address of the segment, (d) Offset address is used to address the location inside a given segment. 16 bit data can be read from memory location of 8086 in two read cycle if ~ (a) data is stored from even address, (b) data is stored from odd address, (c) in both the above cases, (d) always read in one cycle. a “Type 2 interrupt in 8086 is ~ (a) Divide by zero interrupt, (b) Nonmaskable interrupt (c) Single step interrupt, (4) Breakpoint interrupt What is the size of Instruction Queue of 8086 (x) 6 byte, (b) 6 bits, (c) 6KB, (a) OMB. Which flags of 8086 are not present in 8085? ~ (a) OF, (b) DF, (c) TF, (d) all of the above In 8255 there are 10 modes of operation ~ (a) 1, (b) 2. (¢) 3. (4) 4 Draw and describe the internal architecture of 8085, control register, (by D. xiv) The BSR and 10 modes of 8255 are selected by the — (a) 1) eee ter, (by bit of Control register, (c) D, bil of Control register, (d) Ds bit of Cor 1 errupts available are Xv) 182595 are in master slave configuration the maximum number of interrupts availal (a) 8, (b) 16, (€) 32, (d) 64 Xv) Maximum mode of operation of $086 occurs when ~ (a) Pin 33 is connected to Ground (b) Pin 33 is connected to Vez, (c) Pin 34 is connected to Ground, (d) Pin 31 is conn to Ground, Answer the following questions (any five): 5x2, i) What is index addressing? ii) Explain the function of LOOP instruction, iit) Discuss the function of NMI pin, iv) What is the function of index register? Vv) Write down the function of ALE. vi) What is monitor program? vil) What is near jump? 545 a) Explain the register structure of 8086 in details, ») What are the various status flags provided in 80867 Discuss their roles, 73, @) Describe the interrupt structure of 8085 with suitable diagram. b) Explain Type 0-4 interrupt of 8086 in details, 6-4 3) What are the main functions performed by BIU and EU units of 8086 Microprocessor? Explain with suitable diagram, b) How is pipelining is achieved in 8086- explain. 64 ) __Pescrbe the segmentation of $086 in details with example, Why segmentation is important? 5) Explain the memory bank interfacing in 8086 with suitable diagram, 5 2) Explain the function of an assembler. What is assembler directives? >) Explain the function ofthe following assembler directives: ORG. USING, EQU, MACRO-MEND, Dw. 26 ) Explain at least four services provided by BIOS interrupt INT21 with example, >) Differentiate maximum and minimum mode of 8086 sed ‘Write short notes on the followings (any two): 5+5 ®) Block Diagram and function of 8259 b) DMA controller ©) Mode 1 of 8255 428(S) June 2016 MICROPROCESSOR & PROGRAMMING Full Marks: 70 Time Allowed: 3 Hours ‘Maximum time allowed is 45 minutes, after which the loose answer sc Answer to Question No.1 is compulsory and to be answered first. This answer is to be made in separate loose script(s) provided for the purpose. ipts will be collected and fresh answer scripts for answering the remaining part of the question will be provided. 1. Choose the correct answer from the given alternatives (any twenty): i vi) vii) vii) ix) xi) xii) xiii) xiv) ‘On early submission of answer scripts of Question No.1, a student will get the remaining script earlier. Answer any five questions from the rest, 20x1 Which register pair directly points memory location by default is 8085? — (a) B-C, (b) D-E, (¢) H- L@AF. Which interrupt has the highest priority? — (a) INTR, (b) TRAP, (c) RST6.5, (d) RST7.5. In 8085 name the 16 bit registers? — (a) Stack pointer, (b) Program counter, (¢) PSW, (d) All of these. ‘What are software interrupts? ~ (a) RST 0 ~ 7, (b) RST 5.5~7.5, (c) INTR, TRAP, (4) all of these. Which one of the following is not a flag of 8085? — (a) Overflow flag, (b) Carry flag, (¢) Zero flag, (@) Sign flag, Which processor structure is pipelined? — (a) all x80 processors, (b) all x85 processors, (c) all x86 processors, (d) All of these. In 8086 the overflow flag is set when — (a) The sum is more than 16 bits, (b) Signed numbers go. out of their range after an arithmetic operation, (c) Carry and sign flags are set, (d) none of these. BHE] of 8086 microprocessor signal is used to interface the — (a) Even bank memory, (b) Odd bank memory, (c) I/O, (d) DMA. In 8086 microprocessor one of the following statements is not true ~ (a) Coprocessor is interfaced in MAX mode, (b) Coprocessor is interfaced in MIN mode, (c) 1/0 can be interfaced in MAX ‘MIN mode, (4) Supports pipelining. Which of the following is not @ valid segment base address in 8086 — (a) 201004, (b) 5 (©) FIA20H, (4) 300008. 2 on 8259 in cascade mode supports total ‘number of interrupt ~ (a) 8, (b) 16, (€) 32, (d) 64. In 8086 size of each segment will be ~ (a) 16 KB, (b) 32 KB, (c) 64 KB, (d) 4 GB. stores the instruction code currently being executed ~ (a) A¢ , aOR 1g (a) Accumulator, (b) PSW. ‘The address where control retums afler the execution of subroutine is — (a) Retum address (b) Main address, (c) Effective address, (d) current address. a 10. 3) SP holds the address of the of the Stach ~ (4) TOP. tb) START. (6) 2AWY, 46) Gite vt bs AY) Which of the fotiowang ot a 16 bet process” - (4) 8045. (0) MAK, cc) BYI2H (0) DU Ae wii) Which processor cam addres |Q24KB of memory? - (a) MI8S, (9) HI8E (5) Bune (@) GOES s wine xviti) MIOL will be dermg 1 operamon — (4) HIGH. (b) LOW. 4c) Wo aia a) vue vt these Xin) CPU releases the rye en 20 DMA comeller by wing magna! (4) HLDA. (0) HULD () READY. (@) ALE my Which sre the part of erchinacnare of 8088 — (a) The bus sntartace wi {b) Tic exec utan ut {€) Bot and & (4) Nome of these Si) Which ore the categories of BRK vepaters — (4) General purpose copter. 1d) Power «we: Pepmen. (c) Segment epee. (4) of these wai) St ond DI regener os cated a (6) meme of shame 8) lapet Repater () inden segiaer (6) ties tne ogni: Anu) The offees of « pascular segment varies from (2) O00H to FPPH. (>) YOUUE Ww HA), go) BF to FFM. (4) 990008 wo PPPFFM. AAV) Addressing made ed ot matractom MOV CX, 50451) (a) Inebenerd adn, (0) eee: dremsing. (c) Rane indieat adresang (4) Nowe of hese Drew the oct diagram of BURY and wre dows the function of each part + 0) Dancy tae cameras nacre of WS b) Deencrite segmenatie ut Se + Winte dow the addressing moies (a cast $) of WN with suitable example w 0) Difleresate maton aad memes mode of 5086, 1b) Wine down me ditterent pes” of B86 imtemragt et, Draw the utemai bioct diagram of 6 macrpecemwr and describe us pyle axchutecum 1, deals ~ 2) Wane dows tte comet ward format of 1255 bth for 1O mode and BSR mode >) Duscum te hanchtake mode Lc Made! of 1255 with sable dingram Write down; the tat. ‘word format alse ste 8) What are Amemier Deectves” Explam the function of any two assembler directven D) —Explass Macro used os assembly language with sustable example $e 4) Draw the block agree of #299 and explase as fanctom >) Explas the memory imeriacing of W086 with mitable diagram, se Wie short notes os the foliowsngs (any two} ’ (2) Different Types of Instruction of 8046, (b) DOS mterragt services, (c) DMA controller 6 10. ), (4) none oF ties Xv) _ SP holds the address of the oftthe Stack - (a) TOP, (b) START, (¢) MID, (6) nou 80186 xvi) Which of the following is not a 16 bit processor? — (a) 8085, (b) 8086, (c) 80286, (4) xvii) Which processor can address 1024KB of memory? — (a) 8085, (b) 8086, (c) 8088, (4) both b une « istrue, xviii) M/O0 will be during 10 operation - (a) HIGH, (b) LOW, (c) tri stated, (4) none of these. xix) CPU releases the system bus to DMA controller by issuing _ signal ~ (a) HLDA, (b) HOLD (c) READY, (d) ALE. x») Which are the part of architecture of 8086 ~ (a) The bus interface unit, (b) The execution unit (©) Both a and b, (d) None of these. xxi) Which are the categories of 8086 registers - (a) General purpose register, (b) Pointer or inties registers, (c) Segment registers, (d) All of these. xxii) SI and DI register is called as - (a) Input Register, (b) index register, (c) Index base register (@) none of these xxiii) The offset of a particular segment varies from - (a) OOOH to FFFH, (b) 0000H to FFFFH, (c) 00! ‘o FFH, (¢) 00000H to FFFFFH. xiv) Addressing mode used in instruction MOV CX, S0{SI] is ~ (a) Indexed addressing, (b) indirect addressing, (c) Base Indexed addressing, (d) None of these. Drew the block diagram of 8085 and write down the function of each part, a) Discuss the interrupt structure of 8085 b) Describe segmentation of 8086 Write down the addressing modes (at least 8) of 8086 with suitable example. 8) Differentiate maximum and minimum mode of 8086. ©) Write down the different “types’ of 8086 interrupt. an6 Draw the intemal block diagram of 8086 microprocessor and describe its pipeline architecture in details. “4 8) Write down the control word format of 8255 both for IO mode and BSR mode. ©) iseuss the handshake mode ie. Model of 8255 with suitable diagram. Write down the statue word format also. 44g) @) What are Assembler Directives? Explain the function of any two assembler directives, ©) Explain Macro used in assembly language with suitable example. 545 8) Draw the block diagram of 8259 and explain its function, ©) Explain the memory interfacing of 8086 with suitable diagram. 345 Write short notes on the followings (any two): (s) Different Types of Instruction of 8086, (b) DOS interrupt services, (c) DMA controller ca 5ai(s) December 2018 Microprocessor & MICROCONTROLLER Time Allowed: 3 Hours Full Marks: 70 Maximum time allowed is 45 minut fresh answer scripts for answering the remai Answer to Question No.1 is compulsory and to be answered first. ‘This answer is to be made in separate loose seript(s) provided for the purpose. after which the loose answer scripts will be collected and 1g part of the question will be provided. On early submission of answer scripts of Question No.1, a student will get the remaining script earlier. Answer any five questions from Group-A & B, taking at least two from each group. 1. Choose the correct answer from the given alternatives (any twenty): 1x20 i) ii) iii) iv) vy) vi) vii) viii) ix) x) xi) xii) xii) xiv) xv) INTEL 8085 is a— (a) 4-bit (b) 8-bit (c) 16-bit (d) intemally 16-bit & externally 32-bit. Machine language program is developed using — (a) I's and 0's (b) mnemonics (c) English language (4) none. Full scale output of an 8-bit DAC for 0-12V, the input will be ~ (a) 12V (b) 11.953V (©) 11.906 @ILSY. What is the size of the internal RAM memory of 8051 controller? ~ (a) 32 bytes (b) 64 bytes (©) 128 bytes (d) 256 byte. Which of the following instmction perfgrm move indirect RAM to accumulator? — (a) MOV A, Rn (b) MOV @Rn, A (c) MOV A, @Rn (d) MOV Rn,A. For an interrupt to be successfully served it should have duration of ~ (a) one machine cycle (b) two machine cycle (¢) three machine eyele (4) four machine cycle. Maximum memory which can be connected with 8085 is ~ (a) 32KB (b) 64KB (c) 128KB (a) 256KB, Which of the following instruction is one byte instruction? ~ (a) MOV D, B (b) IMP (c) PUSH (6) OUT, IC-8255 is also known as ~ (a) keyboard and display controller (b) programmable counte: (©) Programmable Peripheral Interface (d) programmable DMA controller. An alternate function of port pin P3.0 in the 8051 is — (a) RXD (b) TXD (c) Timer 0 (4) Timer The only memory which can be accessed using indexed addressing mode is ~ (a) RAM (6) ROM (c) main memory (d) program memory.” ‘What is the counting rate of a machine cycle in relation to the oscillator frequency for timers of 8051? —(a) 1/12 (b) 1/10 (c) 1/20 (4) 1/15. ale The term PSW Program Status word refers ~ (a) Accumulator & Flag register register (©) Accumulator & Instruction register (d) B and C register. ee Which interrupt has highest priority? — (a) TRAP (b) INTR (c) RST 7.5 (d) RST 65. ‘The Ready signal of 8085 microprocessor is ~ (a) control signal (b) status signal (c) externath, initiated signal, (d) serial V/O signal 10 avid avi) wm) b bo a) bb is made up of ~ ee An instruction cycle is made up of ~ (a) One of more execute <¥' pled . Os Gra or tate opcode & one execute cycle (d) One opcode & one if ee =e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy