0% found this document useful (0 votes)
65 views74 pages

CSE - 2018-2019 Summer Mid Term

IUT important questions to pass in the exams

Uploaded by

Amina 200041155
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
65 views74 pages

CSE - 2018-2019 Summer Mid Term

IUT important questions to pass in the exams

Uploaded by

Amina 200041155
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 74
1 B.Sc. Engg. SWE 2" Semester MID SEMESTER EXAMINATION DURATION: 1 Hour 30 Minutes (43 ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) SWE 4201: Object Oriented Concepts - I Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them including Question no. 1 and 4. Figures in the right margin indicate marks. [Mandatory] a) b) a) b) a) b) Identify 10 objects from the paragraph below. For each of the objects, mention to which type the object belongs to. You may identify multiple objects of same type. Note that, the type of object may or may not be mentioned in the paragraph. “The Battle of Uhud was a baitle between the early Muslims and the Qurayshis of Makkah. The battle took place near Mount Uhud, (0 the north of Medina. The Qurayshi army was led by Abu Sufian, Khalid Ibn Walid, ‘Amr Ibn al-‘As. Interestingly, all three of them later converted to Islam and played significant role in Muslim army. The Battle of Uhud resulted in a lot of loss to ‘Muslims, including death of Hamza (R). The grave of Hamza (R) and many other Martyrs of Uhud are near the mountain.” Give the object oriented terminology for each of the following features: i. Pattern or blueprint for creating an object. ii, Characteristics that describe an object iii, Actions that objects perform or operations which are performed to an object iv. Hiding the internal details of an object from the user v. Capability of creating a new class from an existing class vi. class from which another class inherits its attributes and behaviors vii. A newly created class, derived from another which inherits all of the attributes and behaviors, but may have additional attributes and behaviors associated with it viii, Multiple forms of the same method, where the exact same method name can be used in different classes, or the same method name can be used in the same class with different parameters ‘What are the uses of a constructor? Sometimes there is a need of initializing an object in different ways. How can we do that? Explain the order of execution of constructors in multilevel inheritance? Explain the followings with suitable example using an object oriented programming language. i. Overloading vs Overriding ii, Multilevel Inheritance What is abstraction? Give two examples of abstraction. How do we implement abstraction in Java’? Differentiate between static and dynamic polymorphism. Define the following terms: class variable, instance variable, argument variable and local variable. Also mention the scope/lifetime of each of them. Briefly comment on the following statements from Java language point of view: i. Inrespective of the presence of any constructor in a class, the compiler will provide a default constructor Methods and fields of an interface Page | of 2 26 August 2019 (Morning) SUMMER SEMESTER, 2018-2019 FULL MARKS: 75 10 243 aa. 10 +6 A class can extend a final class iv. Abstract constructor V. A child class that extends an abstract class needs to implement the abstract methods of its parent class vi. In method overloading, we can create an overloaded method by changing the retumn type of the method. [Mandatory] ) Organize the following classes into inheritance hierarchies and where appropriate create new classes: Building, StoryBook, — FootballTournament, Bedroom, Kitchen, AcademicBuilding, Classroom, Helicopter, ThesisBook, AdministrativeBuilding, CricketTournament, SportsTournament, Rocket. 15 b) Write down the output of the listing I and listing 2. Explain the steps of execution of the 4+6 listings to get the output. class A { int 45 AQ i= 19; y } class B extends A { a) ¢ i= 29; y } public class MainClass { Public static void main(string[] args) { Aa = new B(); System.out.println(a.i)5 Listing 1: Code snippet (in Java) for Question 4.6. class Printer { void print() { System. out .printIn(“Printing normal papers.” , } Class LaserPrinter extends Printer {} class DotMatrixPrinter extends Printer { void print() { system. out .printIn(“Printing for special purpose.”); } y public class MainClass { public static void main(String[] args) { Printer p = new Printer(); P-print(); p= new LaserPrinter(); P-print(); P = new DotMatrixPrinter(); p.print(); Listing 2: Code snippet (in Java) for Question 4.b, Page 2 of 2 ILS B.Sc. Engg. SWE 2" Semester 29 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4205: Digital Logic Design Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them Figures in the right margin indicate marks. a) Convert the followings: i (41.687)i0 ii, — (DADAB)e = (210 ili. (153.513)10 iv. (198)i2 = (20 Hints: Calculate maximum upto 3 digits after the decimal point where necesssary. You have to show the procedures, only values produced by the calculator will not suffice. b) Describe odd parity and even parity with example. 2 5x4 5 ©) i, What is radix complement and diminished radix complement? aed ii, By ’s complement perform: (-9286)10 + (+801)i0 = (210 iii. By (t-1)'s complement perform: (1000100). - (1010100): = (2)2 a) What is parity bit? Define odd parity and even parity with examples. 14242 b) Define BCD. Perform addition after converting the values into BCD: (791)i0 + (658)10=(2)i0 +4 ©) Simplify the boolean expression using K-map for - 15 Ymm(0,4,6,8,12,13,14,15,16,17,18,21,24,25,26,28,29,31) a) Define followings with example: 2x5 i. Grey Code ji, Checker Board Pattern iii, Product of Sum iv. Sum of Product v. Universal Gate b) Draw the circuits and write the boolean expressions for the following gates using nand gate: 2x6 i AND ii, OR iii, XOR Repeat the instruction for i-iii but this time using nor gate. ©) What will be the simplified boolean expression for this K-map? oy gy 44 49 142 Prove the expression using a truth table. + ; ooftlolt 1/1[ojtlo Figure 1: K-map . a) Define combinatorial & sequential circuit with example. 15x2 b) What is full adder? For sum and carry of a I-bit full adder, give boolean expression, truth 1+6 table and circuit diagram ©) Simplify the boolean expression using Tabular method for 2m(2,3,4,5,6,7.9,13,15) Is 347 BSc. Engg. CSE/SWE 2" Semester 22 August, 2019 ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hours 30 Minutes FULL MARKS:100 Math 4241: Integral Calculus and Differential equations Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4(four) questions. Answer any 3(three) of them. Use separate answer scripts for each sections Figures in the right margin indicate marks Section-A a) What is indefinite integral? Explain with examples, why it is necessary to add the integral 08 constant to the result in indefinite integral? b) Suppose that T months from now, the population P(I) of Gazipur City will be changing at 13.33 the rate of (550+2T)3/2 people per month. If the current population is approximately 1850000 then what will be the populations after 6 years from now? ©) Evaluate the followings (any three) 12 » - " fn a + Inet i) [ 3x5VxF +7 dx, ii) J Sin(Inx) dx, ili) { 8 cos*x sin*x dx , iv) J, 5 ®) Obtain the reduction formula forf cos"x dx and then evaluate J-"* cosSx dx 10 b) Express the integrand as a sum of partial fractions and then evaluate the following: 2 pp eth vey feorszetiet Fong’ _ iS ee ©) Evaluate f", Vr? — x? dx. Also graph the integrand and then verify your result using 11.33 appropriate formula from geometry. Section-B a) Define Degree and Order of a Differential Equation with an example. Find the Differential 10 equation of all straight lines at a unit distance from the origin. b) Define Exact Differential Equation. Find the necessary and sufficient condition fora 15 Differential equation to be exact. ©) Solve the following Differential Equations: 833 (ye! +20" + y?)de—(e" +2xy)dy=0, (0) =6 a) What do you know about integrating factor? Show that for first Order Linear Differential 09 Equation integrating factor, ILF = e!*** b) Find the family of curves which satisfy the following Differential equations: 16 i) (2x? + y)de + (x? y—x)dy =0 ii) (x? + y? yx? + y? ede — (ayy) x? + y? dy = 0 c) pee 1 » Two 9 volt batteries are connected in series in which the inductance is qbenry ane 8.33 resistance is 8 ohms. Determine the currenti, if the initial current is zero. ies B.Sc. Engg. CSE 2! Semester 23 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE. MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hours 30 Minutes FULL MARKS:75 Chem 4241: Chemistry Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. a) Define Colligative properties. Why are they so called? Name them. 6 b) Deduce an expression relating the molecular weight of a solute with the lowering of vapour 10 pressure of a dilute solution. Define vapour pressure and boiling point ©) Suppose 36.4 gm urea is dissolved in 200gm of water at 50°C. The lowering of vapour 9 pressure is 15mm of Hg. Caleulate the molecular weight (MW) of urea when the vapour pressure of water at 50°C is 92mm of Hg. a) State and discuss Henry’s law in the dissolution of gases in liquids. Show the effect of 8 temperature on dissolution of gases in liquid through equation. b) Show the importance of Critical Solution Temperature (CST) in the dissolution of liquid in 9 liquid. Draw and explain CST diagram of Triethylamine- water system. ©) Determine the molarity (m) of a solution containing 86.53g of NaxCOs per litre of the 8 solution in water at 20°C. The density of the solution at this temperature is 1.0816gm.ml. Calculate also the molality (m) of the solution. a) What are the fundamental particles of an atom? Briefly describe them. 6 b) Discuss Bohr’s theory of hydrogen atom. What modifications were proposed by 10 Sommerfeld and why? ©) Derive the equation for calculating the Energy of electron in the orbit of hydrogen atom and 9 calculate energy calculate energy of the electron in the 4" Orbit. Write short notes on the following (any four): 4x65 a) Henry's law b) AUFBAU principle ©) Hybridization 4) Boiling Point and Vapour Pressure ©) Isotopes and Isobars Page 1 of 1 169 B.Sc. Engg. SWE 2™ Semester 27 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) = ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 Hum 4247: Accounting Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) “Pacioli described a unique system to ensure that financial information was recorded 3 efficiently and accurately”- Explain it. ws b) Answer each of the following questions by using expanded accounting equation: 4 i. The liabilities of Mark Company are $90,000. John Mark's capital account is $150,000; drawings are $40,000; revenues, $450,000; and expenses, $320,000. What is the amount of Mark Company's total assets? ii, The total assets of Barone Company are $57,000. Nancy Barone’s capital account is $25,000; drawings are $7,000; revenues, $50,000; and expenses, $35,000, What is the amount of the company's total liabilities? ©) Miller's Repair Shop was started on May 1, 2018 by Mark Miller. A summary of May 18 transactions is presented below: Invested $10,000 cash to start the repair shop. Purchased equipment for $5,000 cash. Paid $400 cash for May office rent. Paid $500 cash for supplies. Incurred $250 of advertising costs in the Beacon News on account. Received $5,100 in cash from customers for repair service, Withdrew $1,000 cash for personal use. Paid part-time employee salaries $2,000. Paid utility bills $140 Provided repair service on account to customers $750. Collected cash of $120 for services billed in transaction (x). Required: Prepare a tabular analysis of the transactions, using the following column headings: Cash, Accounts Receivable, Supplies, Equipment, Accounts Payable, M.Miller,Capital; Miller, Drawings; Revenues, and Expenses. 2. a) Draw the chart of Golden Rules of Accounting. 6 b) Mary Jansen is a licensed CPA. During the first month of operations of her business, 19 the following events and transactions occurred May 1: Mary invested $25,000 cash in her business. May 2: Hired a secretary-receptionist at a salary of $2,000 per month. May 3: Purchased $2,500 of supplies on account from Barry Supply Company. May 7: Paid office rent of $900 cash for the month. Completed a tax assignment and billed client $2,100 for services provided. Received $3,500 advanee on a management consulting engagement. ‘eceived cash of $1,200 for services completed for Max Company. Page 1 of 3 a) b) 470 May 31: Paid secretary-receptionist $2,000 salary for the month. May 31: Paid 40% of balance due Barry Supply Company. Mary uses the following chart of accounts: No. 101 Cash, No. 112 Accounts Receivable, No. 126 Supplies, No. 201 Accounts Payable, No. 205 Unearned Revenue, No. 301 Mary Jansen, Capital; No. 400 Service Revenue, No. 726 Salaries Expense, and No. 729 Rent Expense. Required: Joumalize the transactions. ji, Post to the ledger accounts. iii, Prepare a trial balance on May 31, 2018. ‘A Mobile Phone shop makes a sale of mobile phones for $1,000 on June 30. The customer is sent a statement on July 5 and a cheque is received on July 10. The Mobile Phone shop follows Revenue Recognition Principle. When is the $1,000 considered to be earned? Explain the reason. Which items are included in Deferrals and Accruals? ‘Sara Woods started his own consulting firm, Woods Consulting, on May 1, 2017. The trial balance at May 31 is as follows. WOODS CONSULTING Trial Balance May 31,2017 ‘Accounts Title Debit Credit Cash $5,700 ‘Accounts Receivable 6,000 Supplies 1,900 Prepaid Insurance 3,600 Office Furniture 10,200 ‘Accounts Payable 34,500 ‘Unearned Service Revenue 2,000 S.Woods, Capital 17,700 Service Revenue 7,500 Salaries Expense 3.400 Rent Expense 900 $31,200 $31,700 In addition to those accounts listed on the trial balance, the chart of accounts for Woods Consulting also contains the following accounts and account numbers: No. 150 Accumulated Depreciation—Office Furniture, No. 212 Salaries Payable, No. 229 Travel Payable, No. 631 Supplies Expense, No. 717 Depreciation Expense, No. 722 Insurance Expense, and No. 736 Travel Expense. Other data: $900 of supplies have been used during the month. Travel expense incurred but not paid on May 31, 2017, $250. The insurance policy is for 2 years $400 of the balance in the unearned service revenue account remains unearned at the end of the month. eeee Page 2 of 3 | * May 31 is a Wednesday, and employees are paid on Fridays. Woods Consulting has two employees, who are paid $800 each for a S-day work week. * The office furniture has a S-year life with no salvage value. It is being depreciated at $170 per month for 60 months. © Invoices representing $1,200 of services performed during the month have not been recorded as of May 31 Prepare the adjusting entries for the month of May, 2017. ii, Prepare an adjusted trial balance at May 31, 2017. 4. a) Your friend Natasha is confused about the accounts that are closed and the accounts that 5 are not closed. Which chart will you show him? b) The trial balance columns of the worksheet for Goode Company at March 31,2018, are 20 as follows. GOODE COMPANY Worksheet For the Month Ended March 31, 2018 Account Titles Trial Balance Dr. Cr. Cash $4,500 ‘Accounts Receivable 3,200 Supplies 2,000 Equipment 11,000 Accumulated Depreciation-Equipment $1,250 Accounts Payable 2,500 Unearned Revenue 550 T.Goode, Capital 12,900 T.Goode, Drawing 1,100 Service Revenue 6,300 Salaries Expense 1,300 Miscellaneous Expense 400 323,500 323,500 Other data: * Aphysical count reveals only $650 of supplies on hand. © Depreciation for March is $250. © Uneamed revenue amounted to $170 at March 31. © Accrued salaries are $600. Required: i, Enter the trial balance on a worksheet and complete the worksheet. ii, Joumnalize the closing entries from the financial statement columns of the worksheet. Page 3 of 3 IT B.Sc. Engg. SWE 2" Semester 23 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 HUM 4249: Business Psychology and Communication Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) Why do you think business communication skills are so important for IT professionals? If 9 ‘you want to launch a new software in the market, what kinds of communication challenges might you face? Discuss. . b) Think of English words that probably do not have precise equivalent in some other culture. 8 What do you think are the reasons behind those language equivalency problems? How ‘would you attempt to solve such language equivalency problems? ©) Describe the formal network of communication in an organization with which you are 8 familiar. Discuss why you think the communication network has taken this form and how successfully it seems to meet the business’s needs. 2. a) “Using precise language with the right shades of meaning, is essential for generating clear 9 and right emotional tone.” - Explain the statement with relevant examples. b) Explain how you would apply the basic principles of adaptation to your choice of words 10 for each of the following writing tasks. i An article in a company newsletter. ii, _A-message to company executives requesting approval to purchase new computer hardware. iii, A message to employees explaining a change in pension benefits. iv. A progress report to the chief engineer explaining how the development of a new software is going v. A letter to company stockholders explaining a change in company reporting dates. ©) Discuss the statement: “long, involved sentence tend to be difficult to understand. 6 Therefore, the shorter, the better.” 3. a) Skillful paragraphing is very important for clear communication. Composing paragraphs 12 that are short and unified, use topic sentences effectively and communicate coherently. How would you take care of your paragraph design to ensure clear and skillful ‘communication? b) “Using short words makes the writing sound too simple and non-professional and using & the short sentences too much creates choppy and elementary sounding effect.” Discuss the statement with relevant examples. ©) What is “rubber stamps”? How can the rubber stamps convey negative impressions to your 5 readers? Page 1 of 2 a) b) AT 3, Write short notes for the following terms: i, You-viewpoint ii, Readable formatting Strategic buffer External operational communication Imagine you are a vice president of ABC Computer ltd. Early in the moming today you received an e-mail from the director of AB bank limited, a new customer whom ABC computer limited has been trying to attract for months. He placed an order of 500 PCs for his Bank. You usually acknowledge orders with routine messages, but this case is different. You feel the need to welcome this new customer and to cultivate him for future sales. After checking your current inventory and making certain that the goods will be on the way to the Mr. Abdur Rahim, director of AB Bank limited, today. Write an email to the Mr. Abdur Rahim with a special acknowledgement and thanking him for his business Page 2 of 2 tay DTE 2™ Semester 29 August 2019 (Morning) MID SEMESTER EXAMINATION ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) SUMMER SEMESTER, 2018-19 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4277: Data Structures and Algorithms Programmable calculators are not allowed. Do not write anything on the question paper. a) b) °) b) Oo} a) b) °) a) LO) °) ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. ‘What do you understand by data structure? Explain the criteria to select the data structure for an application. What are the main categories of data structures? Explain their hierarchical classification with appropriate diagram. Write short notes on the following data structures mentioning their uses: i Stack ii, Queue iii, Graph iv. Tree ‘What do you understand by Abstract Data Types (ADT)? Explain ADT with Linear List, Matrix and Tree. Describe how an application program interacts with the data stored in the memory in Abstract Data Type Model. Use figure if necessary. Suppose a dataset S contains n elements. i, Compare the running time T, of the linear search algorithm with the running time T, of the binary search algorithm when the value of n is 10,000 and 1,000,000 ii, Discuss searching for a given item in dataset § when S is stored in a linked list. Consider the following algebraic expression: (2x + y)(a- 7)? Using a vertical arrow (1) for exponentiation and an asterisk (*) for multiplication, represent the expression by a tree. Traverse the tree in Infix, Prefix and Postfix order. Explain the advantages and disadvantages of using Array and Linked list. ‘An employee personnel record may contain the following data items: Social Security Number, Name, Address, Age, Salary, and Dependencies. However, Name may be a group item with the subitems Last, First and MI (middle initial). Also, Address may be a group item with the subitems Street address and Area address, where Area itself may be a group item having subitems City, State and ZIP code number. Draw the hierarchical representation of an employee instance. Write down the pseudo code for binary search and then represent the same pseudo code in a flowchart. What do you understand by asymptotic notation? Define the following with necessary figures. i. Omega Notation () ii, Big O Notation (O) iii, Theta Notation (0) Write down the pseudo codes to perform following operation on a linked list. i. Insert an element ii, Delete an element 12 10 12 Ped (7s », B.Se. Engg. SWE 4% Semester 30 August 2019 (Afternoon) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 SWE 4401: Software Requirement and Specifications Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer 3 (three) of them including question 1 and 2. Figures in the right margin indicate marks. “i, [Mandatory] “The Serpents”, a software company, will soon start to work on a Management Information System (MIS) project - “Dengue Data” or D2. A cross-functional team has been built for the project where Munir is a senior developer and Afreen is the team lead. Afreen no longer write code regularly but has very good team management skill. D2 management has appointed Shekh, one of their officers, to work with the team. Here is his description of the project: There are 50 field stations in 50 upazillas to collect dengue patients information. Each field station has «a field officer and 5 to 10 field operators. The field operators collect the data and submit them to field officer. Field officer scrutinize everyone's data and then approve or reject them. The data that are collected includes Patient's name, Patient's age, Patient's sex etc. All the operations are done through web interface and the operations must be authenticated. Some field operators may not be expert computer users, therefore the software should have built in tutorials The project manager (PM) works in the head office and will usually generate reports once in a week The reports will usually give some insights of which age group are more vulnerable to dengue, which area are more affected etc. Based on those reports, PM should be able to send Upazilla wise decisions to the field officers that need to be taken through the MIS software. = The data generated through this software is also made available to researchers. Any researcher can request for a data and the PM can approve or disapprove the request. The data will be provided as Spreadsheet. Afreen has convinced Shekh to participate in the story writing workshop with rest of the team. He has also agreed to regularly collaborate with Afreen. But being a very busy person, he will only meet the development team biweekly. Shekh believes he has a clear vision about the project, therefore his priorities of the requirements will remain somewhat stable. Also, he is OK with checking the progress biweekly or even monthly. Afreen decides to do Scrum for the D2 project, even though many of the teams at The Serpents follow Kanban. a) i. Explain why Afreen has chosen Scrum over Kanban. Stl ii, Mention what Scrum roles suite best for Shekh and Afreen, b) Clearly, PM is a potential user role for the D2 project. 4t5 i. Identify 4 more user roles. ii, Write description of the PM user role. ©) Between Munir, Afreen and Shekh - a4 e i, Who should usually write the stories? Why? ii, Who should identify technical risks about requirements? Why? a 176 d) Write the card of 7 user stories for D2. You can consider that the stories are generated in the story writing workshop. Use this template for the stories: Asa (role), I want (function) s0 that (business value) [Mandatory] a) The following stories are in descending order of priority. Assume that the team is doing Scrum. Story A[B[C|DJE|F|[G|H|T[J[K[LIMIN StoryPoint [| 515/8{[3[sl2}s{z7{el3lij3{2]1 Story C can be split into C1 (point 3) and C2 (point 5) and story E can be split into El (point 5) and E2 (point 3). H cannot be estimated because the team do not have knowledge about the required technology. Assume that a spike H1 (point 3) was conducted and the team estimated that the actual task H2 will have story point 3. Priorities of the broken down stories are same as the original story. Do an iteration plan with the stories considering velocity of 15. b) The following table below shows some stories’ entrance date in different columns in Kanban board. For the sake of simplicity, assume that the dates are from July 2018 and all the entrance times are 8 in the morning Q R g T u Vv W x ToDo Leesa Eee 1 1 5 3 5 3 Developing | 2 1 1 8 6 8 7 3 Testing 3 2 4 10 8 12 9 7 Done a 3 8 Toes] ee |e [eee 8 Calculate Lead Time (LT) and Cycle Time (CT) for each of the stories. Calculate Average LT and Average CT. ‘What is your comment about story T in terms of its LT and CT? a) Elaborate the term INVEST. b) Two junior developers were discussing during a story writing workshop that why a certain story is not good because it is too big and will be hard to estimate. A senior developer politely asked them to stop the discussion. Why ©) During a user role consolidation, a role was discarded although there were not any roles significantly overlapping that role. What can be the reason behind the role being discarded? 4) You find several bug reports and some change requests which are urgent but too small to estimate, What do you do with them? ©) Assume that you are working for a medical service software. You find that you cannot estimate a story because there are some medical terms used which you do not understand. i, Is the story necessarily a bad one? Justify your answer. ii, What should you do to properly estimate the story? a) Draw a low fidelity prototype of the system described in Question 1 b) Explain feature freeze and triage in terms of Scrumban. Can the two happen at the same time? Justify. ©) Describe the steps of user role modeling. 10 442 443 445 1a SWE # Ses 277 inputs anew ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4403: Algorithms Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) If f(m) = O(g(n)) and g(n) = O(h(n)), prove that f(n) = O(h(n)) a b) A polygon is convex if all ofits internal angles are less than 180° (and none of the edges cross 102 cach other). We represent a convex polygon as an array V(1...n] where each element of the array represents a vertex of the polygon in the form of a coordinate pair (x,y). V[1] is the vertex with minimum x coordinate and the vertices V[1....n] are ordered counterclockwise, Assume that the x coordinates of the vertices are all distinct, as are the y coordinates of the vertices. vie) vw vel va * vis} Ribs Figure 1: An example convex polygon with n = 9 vertices i, Give an algorithm to find the vertex with the maximum z coordinate in O(log)(n)) time. ii, Give an algorithm to find the vertex with the maximum y coordinate in O(log,(n)) time. 2. a) Let A[l....n) be an array with n distinct numbers. If i < j and Ali] > Alj], then the pair (i,j) 644 is called an inversion of A. Here, 1 < i,j 2. You have to merge & lists which can be accomplished in O(n logy(k)) time (Assume). Write the recurrence relation for your algorithm and find the running time of the algorithm. ©) Argue why it is impossible to find a comparison-based sorting algorithm that sorts 5 numbers 5 using at most 6 comparisons in the worst case. 4) Suppose a binary max-heap contains 80 distinct keys. How many distinct positions might contain 5 the smallest element? In which level from the top will they reside in? 47 a) You have a hash table with m slots, with simple uniform hashing assumption. Collisions are resolved by chaining. What is the probability that the first slot ends up empty after n insertions? b) In a hash table where collisions are resolved using chaining, we can replace the linked list with balanced BSTs. Give one reason why it might be useful. Give one reason why it might not be useful. ©) Consider using a hash table with m = 11 slots for integer values and collision resolving using ‘open addressing. Our hash function is: h(k, i) = (f(k) + i x g(k))%m, where f(k) = k%m and g(k) — (k® + 1)%m. ‘The table is initially empty. We perform the following operations sequentially: © Insert 3 Insert 14 © Insert 90 © Insert 2 Delete 14 Now answer the following questions: i. Show the contents of the table with values and flags. ii, If we search for 13, what is the sequence of slots that we check? 1) Give reasonably simplified equation using Newton's Method to find ¢/a. Will the algorithm always correctly converge regardless of the choice of the initial guess 0 b) You came up with a modified version of Karatsuba Multiplication where you divide the number in 3 parts. You reduced the total number of multiplications to 6. Is your algorithm better than that of Karatsuba?” ) While calculating the complexity of High Precision Division (?), we only considered the com- plexity of calculating (2) ignoring the fact that we still need to find (a x &) which requires High Precision Multiplication. How does that affect the running time of Newton’s Method for finding square roots?” 4n4 6+5 6+6 = Art B.Sc. Engg. / HD CSE 4" Semester 26 August 2019 (Afternoon) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4403: Algorithms Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Question no 3 & 4 are Mandatory to answer. ‘Answer any 1 (one) from the remaining. Figures in the right margin indicate marks. a) INSERTION_SORT (A) 13 1 1. for =2to A. length 2. key=AUi) 3. //insert A[j] into sorted sequence A [1...j- 1] 4 t=j-1 5. whille i> 0 and Afi] > key 6. Afi+ I= Ald ft imi-t 8 Ali+1]=key By showing proper mathematical steps, find out the running time of the above-mentioned algorithm in the following cases: i. Input array(A) has ‘n” elements in Ascending order. ii, Input array(A) has ‘n’ elements in Descending order. b) Insert the following elements in a Red-Black tree. 12 {25, 15, 20, 18, 10, 16, 29, 19, 27,17} Design a sorting algorithm which will show all the elements stored of this tree in Descending order. What will be the time complexity of the process? a) Show that, ‘Merge-Sort algorithm requires O(7) auxiliary space to sort an array of size n.” b) Write the steps to develop any Divide-and-Conquer algorithm. Explain those steps in the context of Merge-Sort algorithm. ©) Use a recursion tree to determine a good asymptotic upper bound on the recurrence: 10 T(n) = 8T 6) +n? on [Mandatory] 3 a) i f(n) = O(g(n)) and g(n) = O(h(n)).Thus f(n) = __(h(n)). (Fill in the blank 3~6 with justification.) ii, If the input data is almost sorted, Merge sort will perform better than Insertion sort. (True or False? Justify.) iii, Given an unsorted array of size n, “I-D peak finding algorithm’ can find the Global- peak in O(log(n)) time. (True or False? Justify.) iv. Will the following algorithm. successfully Build a Max-heap from a given array? Justify your answer BUILD_Max_HEAP(A) A, heap_size = A. length for i= 1 upto (A. length / 2) MAX-HEAPIFY (4, i) v. Binary Search Trees guarantees to find the maximum clement of the tree in Page 1 of 2 Teo O(__) time. (Fill in the blank with justification.) vi. Determine the average processing time 7(n) of the following algorithm: int myTest (int ») { if (n <= 0) retum 0; else { return myTest (n - 1); } } b) Design a function which will take a node of a Binary Search Tree as input and show all of it's Ancestors. The algorithm should be able to produce output even if the node doesn’t have any ancestor or the node is not present in the tree. [Mandatory] 4. Lately, Bill Gates is thinking of opening a restaurant! Being one of the smartest guys on the planet, obviously he is planning to digitalize it. Each customer will have a membership card which will have information about him/her along with the transactions made so far. Based on that information, a rating is given to the customers. Whenever a customer enters the restaurant, s/he needs to scan the membership card by which the authority tracks who are present at the moment. A big screen is placed in front of the counter where the information is being shown about the current customer being served, the next customer to be served and the total number of customers present at the moment. While choosing the next customer to be served, the system looks for the highest rated customer present at that moment. As this is Bill Gate's restaurant, a huge number of customers are expected to come every day! To handle the data, he wants to store it in the best possible way! His employees came up with different solutions to store the information so that the information on the big screen can be shown efficiently. Some of the proposed ways are i Amay ii, Linked list iii, Heap iv. Binary Search Tree v. AVL Tree vi. Red Black Tree Provide Argon shuts Scan complexity for each of the solutions to perform the required operations and choose the best one. Justify your choice. Page 2 of 2 25 ASL BSc. Engg. / HD CSE 4" Semester 29 August 2019 (Afternoon) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 100 CSE 4405: Data and Telecommunications Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) What is data communication? Identify the five components of a data communication 2+3+5 system. Describe the three criteria necessary for an effective and efficient network. b) Write short notes on the followings 3x3 i, Network topology ii, Protocol iii, Process-to-process delivery ©) What is the difference between a port address, a logical address and a physical address? 3.33 d) How OSI and ISO are related to each other? Write down the functionalities of bottom three 3+8 layers of TCP/IP protocol suite. 2. a) Define the followings with example: 3x3 i, Jitter ii, Latency iii, Bandwidth-Delay Product b) Briefly explain the concept of digital signal as a composite analog signal. Explain the 4+9.33 baseband transmission of digital signal. ©) State the Nyquist bit rate formula, How does Nyquist bit rate formula differ from Shannon 2+2+4 capacity formula? Consider a channel having SNR 127 and bandwidth 2 MHz. What will be the approximate signal level and bit rate? d) Name different causes of transmission impairments, 3 3. a) Write short notes on any two of the followings: 4x2, i, DC Component ii, Transmission Modes iii, POM b) Give the taxonomy of line coding schemes and name one scheme from each category. ©) Consider a bit stream: 0110001001, Draw corresponding digital signal for following line 10 coding schemes and also comment on the bandwidth requirement of each of the scheme. i, AMI ii, NRZ-I iii, MLT-3 iv. Manchester v. polar RZ 4) What do you mean by scrambling? How does scrambling differ from block coding? Briefly 4+6.33 explain the HDB3 scrambling technique. 4, a) Distinguish between synchronous and statistical time division multiplexing (TDM). Briefly 5+6 explain the strategies used when the input lines of a multiplexer have different data rates? b) Give the taxonomy of digital-to-analog conversion techniques. Briefly explain the 3+5 Quadrature PSK (QPSK) technique. ©) Write short note on any one of the followings: 5 i. Constellation Diagram ii, Frequency Modulation (FM) 4) Briefly explain the Frequency Hopping Spread Spectrum (FHSS) technique? How does the 6+3.33 FHSS technique differ from the Direct Sequence Spread Spectrum (DSSS) technique? se B.Sc. Engg. CSE 4" Semester 22 August 2019 (Afternoon) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 50 CSE 4407: System Analysis and Design Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) TUTech is an E-commerce website for computer accessories. Customers place orders by 8 telephone, by mailing an order form included with each catalog, or through the Web site. A summary of the Business Activities in IUTech: * When customer orders come in, the item master and the customer master files are both updated. Ifan item is out of stock. the inventory control department is notified. If the order is from a new customer, a new record is created in the customer master file. * Picking slips are produced for the customer order and sent to the warehouse. A shipping statement is prepared. © The process of shipping a customer order involves getting the goods from the warehouse and matching up the customer shipping statement, getting the correct customer address, and shipping it all to the customer. ‘* The customer statement is generated and a billing statement is sent to a customer once a month, ‘* An accounts receivable report is sent to the accounting department. Based on the given information, draw the following diagrams for [UTech E-commerce. i Context Diagram ii, Diagram 0 b) What is SDLC? Describe the actions the system analyst takes in each step of SDLC 6 ©) Differentiate between Probes and Bipolar questions. 2.66 2. a) What is JAD (Joint Application Design)? Discuss the people who are involved and their 7 respective roles in JAD. b) Catherine’s Catering is a small business that caters meals, receptions, and banquets for 7 business and social occasions such as birthdays and weddings etc. At first it was a small company. Catherine talked to the customers over the phone to determine the number of people, the type of meals, and other information necessary to cater an event. Catherine was able to manage the business using spreadsheets and word processing but found difficulty in keeping up with endless phone calls about what types of meals were available, changes to the number of guests attending the event, scheduling part time employees etc. Create a formal problem definition from the above scenario. The problem definition should contain Problem statement, Issues with proper weight, objectives, requirements and constraints. cc) What are the different ways of arranging questionnaires? 2.66 3. a) b) °° 4. a) b) 48> What are the alternative choices of software for a system analyst? Give advantages and 5 disadvantages for each alternative. Write short notes on the following: 3x2 Miracle and Black hole. Logical and physical Data Flow Diagrams. ‘What is feasibility study? Explain the main areas of feasibility, 5.66 Draw an ER diagram to model the application with the following assumptions: a © We have a set of teams, each team has an ID (unique identifier), name, main stadium, and to which city this team belongs. * Each team has many players, and each player belongs to one team. Each player has a number (unique identifier), name, Date of Birth, start year, and shirt number that he uses. ‘© Teams play matches, in each match there is # host team and a guest team. The match takes place in the stadium of the host team. + For each match we need to keep track of the following: * The date on which the game is played. * The final result of the match. + The players participated in the match. For each player, how many goals he scored, whether or not he took yellow card, and whether or not he took red card. * During the match, one player may substitute another player. We want to capture this substitution and the time at which it took place. ‘+ Each match has exactly three referees. For each referee we have an ID (unique identifier), name, Date of Birth, years of experience. One referee is the main referee and the other two are assistant referee. Design an ER diagram to capture the above requirements. State any assumptions you have ‘made that affects your design. Make sure cardinalities and primary keys are indicated, Define the following terms and mention how to solve them: 2x3 i. Lenieney ji, Average tendeney iii, Halo effect Differentiate between the nominal and interval measurement scale with examples. 3.66 B.Sc. Engg. (SWE) 4"* Semester IB MID SEMESTER EXAMINATION DURATION: 1 Hour 30 Minutes 22 August 2019 (Afternoon) Islamic University of Technology Organisation of Islamic Cooperation (OIC) Department of Computer Science and Engineering (CSE) CSE 4409: Database Management System IT Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Question no. 3 is compulsory. Answer any 2 (two) from the remaining questions. Figures in the right margin indicate marks, SUMMER SEMESTER, 2018-2019 FULL MARKS: 50 1 2 (a) Prior to the introduction of database management systems data was processed using file pro- cessing systems. Cite one real-life example where traditional file processing is preferable to database management systems. Justify your choice with logical arguments. Now suppose you are going to automate a very large banking systems, establish the fact that traditional file pro- cessing system is not an ideal solution in this context. Also briefly explain 3 major properties that must exist in todays modern database system for large scale system development such as banking, (b) Suppose you are going to appoint a Database Administrator (DBA) for a large company. Briefly explain how you should select a candidate for this position (c) Mention two important purposes of foreign key. Place suitable example with data to explain them. Explian the guidelines to select a primary key. (a) Consider the following 2 entities (pk stands for primary key, fk{x] indicates foreign key refer- encing entity x) DEPT (deptid,name,establishdate, EMP(empid (pk) ,name,hiredate, salary, commission,managerid(tk(EMP]), deptid(fk [DEPT] , location) Write the SQL statements for the following queries i, Find the list of employees id, name, mananger’s name, his salary status. Salary status is determined as follows: If salary is above 100000 then it gets the status high. If it is between 50000 and 100000 then it is moderate, else it is low. ii, Find the list of department name, establishdate along with its total number of employees. iii, Remember the salary in the table indicates basic salary for the employee. Total salary for a particular employee is calculated as follows: ¢ House rent is 40% of the basic ¢ Transport allowance is 10% of the basic ‘* Excellence bonus is 150% of the COMMISSION (if any value exists). Remember there may be some null values. Total Salary = House rent + Transport allowance + Excellence bonus Now write an SQL to list all employees along with their first name and total salary (in decreasing order of the salary) (b) Consider the EMP table of Question 2.(a). Write a function getstatus as directed below: Input: ID Output: status Algorithm: If total yearly salary is below 500000 then the status is POOR. If it is between 500000 and 800000 then it is ORDINARY, otherwise it is GOOD. (Remember the salary given in table EMP is the salary per month and total salary is calculated as mentioned in Question 2.(a)). Page 1 of 3 [6.66] 6] (6.66) (6 iss” (c) Consider the EMP table as described in Question 2.(a). ‘The programmer designed the ID such that it conveys some useful information. So the format of ID’ becomes DESIGNA- TION.DOB.NNN, where DOB is the date of birth and NNN is the sequential increment number. Your task is to criticize this design with appropriate arguments. 3. (Compulsory) Consider the following scenario ABC is a large bank with few hundreds of branches located at different parts of the country. Cus- tomers must provide their profile information such as Name, Date of Birth, Address before opening any account. Once @ customer's profile is available he/she can open multiple accounts reusing the profile information. After opening account regular transactions are made. There are two types of transactions such as withdraw and deposit. Apart from personal account, any organization can open account. For an organization only one person (existing customer) must be attached to the account who will be the operating person on behalf of the organization. Bank offers loans. Only existing customers who have velid accounts are primarily eligible for getting a loan. There are 3 types of loan schemes such as Platinum, Gold and Silver . Each loan has its own properties as described in table 1 Table 1: Properties of loan schemes for Question No. 3 Loan Scheme | No. of Instal- | Interest Rate | Eligibility ment. (per year) Platinum 60 5 Total Transaction (Le. add both types of transactions) in the last 12 months must be > 2000000 Gold 36 8 Total Transaction in the last 12 months must be between 2000000 and 1500000 Silver uw 12 Total Transaction in the last 12 months must be between 1500000 and 1000000 Your tasks are: (a) Design the ER diagram and write the required DDLs to reflect your design. (b) Write a function to assign a customer to a specific category of loans as mentioned. (assume that each customer makes regular transactions such as deposit and withdraw). Input: Account No. Output: Rejected or Accepted, if Accepted it should also show which type of loan can be granted based on the Eligibility parameter as described in table. (c) Once a customer is assigned to a specific loan scheme, write a procedure to schedule the loan. Assume each installment must be paid after 1 month interval (ie Monthly payment). ‘This procedure may have additional procedure or function, Input: Account No, Loan Scheme, Total Amount, Starting Date of Payment Note: After approving a loan the Customer receives an amount of Total Amount but in return he/she must pay back a Total Payback Amount of (Total Amount + x) where z is the total interest amount to be paid over the entire period. Output: It will schedule n number of equal installments based on Total Payback Amount and No. of Instalment of that particular loan scheme. The schedule information should include: account no, loan scheme, Instalment no.(starts from 1 to n),[nstalment amount (ie. Total Payback Amount will be equally distributed), Payment Date (i.e. after every 6 months from Page 2 of 3 i) 4) a [8.66] 1&6 the Starting Date), Payment Status. All fields except Payment Status should be initialised by the procedure. Payment Status should be set to null. 4, (a) Consider the table citizens(id, name, dob, salary). The Government of Bangladesh (GOB) has created one fund of total BDT total_aid_amount. GOB wants to ensure (but can not guarantee) each citizen receives an amount gob-allownace such that after receiving it his/her total earning (i.e. salary + gob-allownace) is equal to the average income of the country (average is computed before any goballownace is given). The citizens having more than the average salary of the country are not eligible for this scheme. For this purpose GOB invites applications from needy and interested people. The applica- tions are stored in applied(citizenid,date of application) table (assume only the valid persons apply). The citizens who have not applied will not be considered even his/her salary is very low. (8.66) ‘The citizen (who applied) with the lowest salary will get the highest priority to receive gob.allownace and gob.allownace amount is determined by the difference of his/her salary and average salary of the citizen. GOB can not ensure sufficient fund for all needy citizens. So the process termi- nates whenever the fund is exhausted (j.¢. total.aid_amount=0 or totalaid_amount is less than the difference of the average salary and the salary of the particular citizen), When a citizen receives goballownace an appropriate update of citizens table should be made. © Your task is to write a procedure distribute.allowance satisfying the above requirements. The procedure will take only one IN parameter i.e. total.aid.amount(Hint: use explicit cursor, pay special attention to define the cursor as per the description] (b) Present the formal definition of data warehouse. Highlight the key features from the definition. (c) What are the differences between operational database system and data warehouse? Also explain why people should separate data warehouse from its operational database. Page 3 of 3 (4 4 ee eee eee eee ee eee ae 187 B.Sc, Engg. SWE 4" Semester 29 August 2019 (Afternoon) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANI )F ISLAMIC COOPERATION (OIC) Department of Computer Science and Enginee! (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75, CSE 4411: Data Communication and Networking Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) What is data communication? Describe the components and fundamental characteristics of effective data communication system. b) Write short notes on the followings: i, DC Component ii, Self-Synchronization iii, Baseline Wandering ©) Distinguish the four levels of addresses (used in internet) based on their roles. d) Suppose we have a channel with a 5-MH7z bandwidth. The SNR of the channel is 123. What is the appropriate bitrate and signal level. (Explain any assumption in your calculation and mention the form 2. a) Assume that a voice channel occupies a bandwidth of 4-kHz. We need to combine three voice ‘channels into a link with a bandwidth of 12 KHz. from 64 to 76 kHz. Show the configuration using Block Diagram (both multiplexing and demultiplexing) using frequency domain (assume that no guard band is present) ___¥) Find out the bit sequence forthe given digital signals from the following figures. For the Figure- 1, consider NRZ and NRZ-I coding, And for the Figure-2, consider Manchester and Differential Manchester coding schemes. ‘4 HP Figure 1: sample graph for Question 2. (b) Figure 2: sample graph for Question 2. (b) ©) Show the hierarchical organization of the Internet using figure with clear notation. 4) How many bits can bit can fit on a link with a 3-ms delay if the bandwidth of the link is: i, 2Mbps ii, 10 kBps iii, 150 Mbps 3. a) Briefly explain the three processes of Pulse Code Modulation (PCM) technique for digitization. Include Block diagrams to show different components of PCM encoder. Sb), Consider a bitstream: 0110001001, Dra corresponding digital signal for following line coding schemes and also comment on the bandwidth requirement of each of the scheme. i, AMI ii, Polar RZ ii, MLT-3 ©) Write down the advantages and disadvantages of optical fiber technology. 4. a) Describe the three Analog-to-Analog conversion techniques in brief. Your answer should contain the block diagram representing the conceptual implementation of each technique. b) In Figure 3 the Physical Address is represented with English leter and Logical Address is represented with numerical value. Example: Top-Left PC (sender) has physical address P and Logical Address 11. Only write the Datagram and Frame with *?” sign mentioning the numbers. 10 a... 7 Toanotner {C3871 network ae ey edi hanged LAN? Data tink ayer Figure 3: sample diagram for Question 4, (b) c) Write down the differences between Synchronous TDM and Statistical TDM. 139 B.Sc. Engg. / HD CSE 4" Semester 23 August 2019 (Afternoon) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75, Math 4441: Probability and Statistics Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (Four) questions. Answer any 3 (Three) them. Figures in the right margin indicate marks. Programmable calculators are not allowed. Do not write on this question paper. The symbols used have their usual meaning. a) Define Sample, Population, Sample Space and Event Space 5 b) Monitor three consecutive phone calls going through a telephone switching office. 12 Classify each one as a voice call (v) if someone is speaking, or a data call (d) if the call is carrying a modem or fax signal, Your observation is a sequence of three letters (each letter is either v or d). For example, two voice calls followed by one data call corresponds to vd. Write the elements of the following sets {first call is a voice call) (2) Bi = {first call is a data call} = {second call is a voice call} (4) B» = {second call is a data call} {all calls are the same} (6) {voice and data alternate} For each pair of events A; and Bi, Az and Bo, and so on, identify whether the pair of events is either mutually exclusive or collectively exhaustive or both. ©) The odds against 'A' solving a problem are 13 to 7 and the odds in favour of B solving 8 the problem are 15 to 8. What is the probability that if both of them try, the problem will be solved? a) A circuit system is given below. Assume the components fail independently. 10 (i) What is the probability that the entire system works? (ii) Given that the system works, what is the probability that the component A is not working? Figure 1: Figure for question 2.2 b) °) a) b) b) °) i90 One prominent physician claims that 80% of those with lung cancer are chain smokers. If his assertion is correct, find the probability that of 20 such patients recently admitted toa hospital fewer than half are chain smokers? ‘A wholesale gift shop supplies gift items to the customers. The manager has the standing instruction to the sales person to remove the price tag while wrapping the gift boxes. It is observed that the sales persons inadvertently forgot to remove the tag in 2 cases out of every 1000. The gift boxes are supplied in bundles of 10. Calculate the number of bundles containing boxes with (i) no price tag, (ii) one price tag, (iii) at most 2 price tag in a consignment of 10,000 bundles. The Random Variable X has the CDF: 0, if xb @ rina P(x < ast). (i) If a=-1, b=3 find a(\xie3) ‘Suppose that the number of cars X that pass through a car wash between 4:00 P.M. and 5:00 P.M. on any sunny Friday has the following probability distribution: x 4 Be 8 PA=n[2 Vi2 4 V4 6 116 | Let g(X) = 2X-1 represent the amount of money, in dollars, paid to the attendant by the manager. Find the attendant’s expected eamings for this particular time period. The 1Q’s of 7 years old is assumed to be normal random variable. It is known that 15% of the children have IQ’s under 90 and 2% exceed 135, what percentage of children have 1Q’s between 100 and 120? (Necessary chart 1 is attached). Roll two fair four-sided dice, Let X; and X2 denote the number of dots that appear on. die | and die 2, respectively. Let A be the event Xi > 2. What is P(A]? Let B denote the event X2> Xi. What is P[B]? What is P[AB]? Continuous random variable X has PDF 1 =, -Isx<3 SeQ)=54 0, otherwise Define the random variable Y by Y = h(X) = X°. (i Find E[X] , Var[X], (ii) Find h(E[X)) and Var }. 7 15 10 10 7 jerk B.Sc. Engg. HDICSE 4" Semester 27 August 2019 (Afternoon) B.Sc. SWE 4" Semester ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 Hum 4441; Engineering Ethics Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. a) What is engineering ethics? Analyze the concept “Great power brings great responsibility”. b) What is trade secret? Explain obligation of confidentiality of an engineer with a generic case study where you used to work for Galactic motors and working now for Ford as an Auto design engineer. ©) Evaluate the concepts with a proper example that, “Some facts are ethical but illegal whereas some facts are unethical but legal.” 4) Samuels worked as a programmer and Matthews worked as robot operator at cybernetics Inc. Matthews was crushed into death when the robot started his wave hand violently. Samuel was charged the cause of death of Matthews due to the malfunction of the robot where a particular piece of robot program written by Samuels responsible for this malfunction. What is the ethical misconduct occurred in this situation? Analyze your thoughts. a) What is the definition of professionalism? State their characteristics. b) Why do professional have special ethical responsibility? ©) Therac-25 machines was built by Canada Atomic Commission Itd. What was various responsibility for the accident occurred in 1985-87 by this machine? a) What is conflict of interest? Why does a conflict of interest seem unethical? b) What can you do to avoid a conflict of interest? ©) How will you maintain ethical behavior as aresearch students? 4) Imagine that you and your friend Kevin are in “examining engineer” job position for the last 10 years. You noticed that an increasing lack of interest from Kevin in his job and he is not taking sufficient care in the execution of his role of examining engineer, and that this breach of duty may be impacting the safety of rail bridges. You know that you and he both have a duty to ensure that work is conducted with care and competence, but you must decide firstly what such a duty requires in this case, and secondly whether any breach is the fault of your colleague or the system in which you are both working. On top of this, you must also contend with conflicts that might arise between your professional duties and your loyalty to your friend. What should you do? Discuss this case with appropriate summery a) What are statements of ethical principles? Explain their categories. b) What is organizational behavior? Why organizational behavior matters. ©) What is the Skill Survival Kit? Can you consider Journaling as a developmental tool? Explain. 4) a software engineer who is asked to give an opinion in court as to the level of security offered by a company’s data protection procedures. Bill suspects that the system may not be completely secure, though he has not had the opportunity to inspect it as thoroughly as he would like. Should Bill accept the request to appear as an expert witness? If so, how should he phrase his testimony? euus & Ll. BBA (TM) 4" Semester MID SEMESTER EXAMINATION DURATION: | Hour 30 Minutes. 447- ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) artment of Computer Science and Engineering (CSE CSE 4461: Computer Science and Technology IT Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. ‘Consider the following database schema: Actor (act_id, act firstname, act lastname, act _gender) Director (dir_id, dir_name, salary) Movie (mov_id, title, year, release date, budget) Casts (act_id, mov_id, role) Direction (dir_id, mov_id) Reviewer (rev_id, rev name) Rating (mov_id, rev id, stars) ‘The underlined attributes are keys. Actor, Director and Movie table stores information about different actors/actresses, directors and movies. Casts table portrays which actor/actress acted in which movie. Direction table shows which director directed which movie. Reviewer and Rating tables store information about the reviewers and how many stars they gave to a movie. a) Suppose all the tables have been created except Movie, Casts and Direction. Write DDL statements to create these tables. Make sure to include proper integrity constraints and references. b) Write SQL statements to perform the following operations: i, Find the year when the movie ‘Avengers’ was released. ii, List all movie titles and their director names. iii, Find all information of actors/actresses who have not acted in a movie. (Hint: ‘Not In’ clause) iv. Find the names of the movies having “The” in its title v. Find the title of the movie that has the maximum budget. vi. Find the names of all directors who have a higher salary than at least one director. vii. Find the title of the movies that got average rating of more than 7 stars. Sort the result in alphabetical order of titles. viii. Delete all directors with salary less than 10,000. a) Define super key, candidate key and primary key. Provide examples of each key using a single table. b) What is the difference between writing SQL queries with “natural join” and “inner join. ...on” keywords? ©) From the database schema in Question 1, write an SQL statement to create a view MovieDirector which will include every director id along with the movies they directed. If any director did not direct any movie, include them in the list too. What is the difference between this view and a materialized version of it? 4) Write appropriate SQL statements ‘0 create the following authorization graph shown in Figure 1. For each statement, identiy which user will execute the command. Assume that you are only granting the SELECT privilege on Movie table based on the database schema 23 August 2019 (Afternoon) SUMMER SEMESTER, 2018-2019 FULL MARKS: 75 2.5x8 6 5 343 62 Page 1 of 3 alo in question 1. Explain what happens in the context of Oracle Database when DBA revokes privilege from U1 BBA ——— U1 -——— U2 sl U3 Figure 1: Authorization Graph It is the year 2050. Due to massive advancement in technology, helicopters have become very cheap and accessible. Helicopter-pooling is accepted and promoted by people around the globe. In this system, pilots create a ride from one city to another based on the request of the users. As a young entrepreneur, you are on the verge of launching a helicopter-pooling app called Uthao. To create the app database, you need to model it. The initial requirements are as follows: b) a) ‘¢ The app Uthao will record its app identity number, name of the CEO and budget. «The users need to register on the app providing name, contact no. and email. One user can have multiple phone numbers. The pilots also need to register providing similar attributes as user. The pilots can be of two types: ‘Captain’ or ‘First Officer’. In the beginning, Uthao may not have any users but to start the business it must have at least one pilot. © Uthao bas helicopters in its stock. Each helicopter has its own model no, color and year of built. The company must have at least one helicopter in its stock. ‘* Each pilot is assigned a helicopter. A pilot can have from no helicopter up to at most one helicopter assigned to him/her. © The user rides with a pilot by requesting rides on the app. Ride information such as destination city, fare etc are recorded in the relation. © Every user will have preferences. For example, what type of music he/she likes, does he/she like to chitchat with the pilot, are pets allowed etc. These preferences can be same for different users. (Hint: preferences will have discriminators) Create an ER model based on the above mentioned specifications. Your ER model must be neat, concise and legible. Reduce the ER model that you have designed into a set of relations with proper justification. Identify the appropriate primary key for each relation. What are the drawbacks of using file systems? Explain with examples. Whaat is the difference between (a) and (b) in Figure 2? Z (a) ) Figure 2: Figure for the question no. 4 (b) 15 10 wo Page 2 of 3 ©) d) a4 Classify the constraints on generalization or specialization based on: i, Attribute of higher-level entity determines lower-level entity membership ii, Completeness Describe appropriate scenarios where you can demonstrate the application of the following cardinalities: i One-to-many ii, Many-to-many BTM 17, as brilliant and as creative they are, have been the best students, They are thinking of opening a buy and sell website where IUTians can buy or sell different items. They have decided that they will call the website GOOD BUY. They will need a database to store all the information. To store product information, they will need a table named “GoodBuy” which will store product id, product names, expiry dates, product type and a “Students” table which will store student id, name, department, batch, contact no ete. Write appropriate DDL statements to create the tables. Make sure to include proper integrity constraints. 2x2 Page 3 of 3 Aes B.Se, Engg. / HD CSE 6% Semester 23 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 50 CSE 4615: Wireless Networks Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) Howare collisions handled in Back2F (back to frequency) protocol? Explain with appropriate contention diagrams. b) Explain in brief a proposed channel access mechanism which is most similar to CSMA/CA and uses deterministic back-off. ©) What is the difference between partial ordering and total ordering? 2. a) Illustrate a timeline diagram of a successful retransmission (a collision and then a successful transmission) in the current WLAN protocol (802.11) when 3 stations are trying to access the channel at the same time. Usage of RTS and CTS is optional. b) From the given Figure 1, identify which of the nodes are “exposed” and which are “hidden”. Figure 1: Figure for question 2 (b) ©) Does 802.11 (WLAN) solve the problems of Hidden and Exposed Terminal? Give appropriate reason. How does CSMA/CN contribute to solve these problems? 3. a) What is HiBo? How does it minimize traditional contention time? b) PC protocols have two phases — Learning phase and Transmission phase. What happens in cach phase? Provide necessary figures. 4. a) What is standardization? “Making any change to the current network protocol is a lengthy process without any certainty of approval” - Explain. b) “The building blocks of wireless networks may or may not have centralized control. However, the presence of such a control is paramount to maintain Quality of Service (QoS).” — Express in terms of networking terminologies. ©) The backbone network of an ESS can be a variety of protocols, The distribution system (DS) connects several BSS together. Can the backbone network (or part of it) be compared to the Internet (a service view)? If so, how? 3+ 4.66 443 9.66 1.66 +3 BSc. Engg, /HD CSE 6% Semester MID SEMESTER EXAMINATION DURATION: I Hour 30 Minutes a) b) b) °) 116 ISLAMIC UNIVERSITY OF TECHNOLOGY (UT) ORGANISATION OF ISLAMIC COOPERATION (OIC) rtment of Computer Science and Engineering (CSE) CSE 4617: Artificial Intelligence Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them Figures in the right margin indicate marks. Briefly describe the Turing Test for artificial intelligence. Di with and without AI. Why rationality is different from omniscient? Explain the following properties of environment in respect to a chess game with a clock: observability, determinism, episodic, static, and discrete ‘What is uninformed search? Stepwise show the uniform cost search applied over the following weighted graph (where S and G represent start and goal nodes respectively). Does this search guarantee optimal and complete solution? Justify your answer, inguish between programming Considering the following initial and goal states of an 8-puzzle problem: i. Write two admissible heuristic functions that can be considered here. Which heuristic is better than the other, and why? Perform a greedy best first (state space) search to find the goal state. Stop the search as soon as the search expands a state at level three. Use the Manhattan distance (not including the blank) as a heuristic to guide the search. Start State Goal State How SMA‘® search can overcome the drawbacks of recursive best-first search (RBFS)? Explain with necessary examples. Consider the graph shown below where the numbers on the links are link costs and the numbers next to the states are heuristic estimates. Note that the arcs are undirected. Let A be the start 26 August 2019 (Morning) SUMMER SEMESTER, 2018-2019 FULL MARKS: 75 10 Page 1 of 2 LT state and G be the goal state. Simulate A* search with a strict expanded list on this graph, Explain, whether the given heuristic is admissible and/or consistent. @) “A local search can solve a n-queens problem (or get stuck in a local minima) in almost 8 constant time for arbitrary n with high probability in solving a CSP problem” — Justify the statement by performing a local search of a 4-queens (Qi, Qo, Qs, Qa] problem starting from the following initial configuration [1, 2, 1, 2], as shown in the following figure. Here, the queens Q), Qo, Qs, and Qe are dedicated to the columns 1, 2, 3, and 4 respectively, and one single (usually the most aggressive) queen can be moved at a time. 4 b) How can you overcome the difficulties caused by ridges in hill climbing search? Briefly 8 explain the working principle of simulated annealing process. ©) How a local search can be applied to a travelling salesman problem using two-opt 9 neighbourhood? Explain with an example. ) What is arithmetic crossover? Why is it important to have mutation operator in a genetic 6 algorithms (GA)? 'b) What is higher order constraint in a constraint satisfaction problem (CSP)? Explain, which 12 variable should be assigned next, and in what order should its values be tried for improving the backtracking speed in solving the following cryptarithmetic problem, where each letter of the problem has to be substituted with a digit within 0 to 9, with no repeating values. Two + Two FOUR ©) How can you detect inevitable failure early using Are Consistency for improving backtracking 7 efficiency? Explain with a relevant example. Page 2 of 2 1918 Engg. / HD CSE 6" Semester 30 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE MID SEMESTER EXAMINATIO! SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4619: Peripherals and Interfacing Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) Write short note on ATmegal6 Microcontroller. 10 b) Differentiate between Microcontroller and Microprocessor. 10 ©) Suppose, it is given Via = 0.7 volt, Vrer= 1 volt and 8-bit of resolution for a Successive $ Approximation A/D conW verter. Find an 8-bit digital output for the given Vin 2. a) What are the steps involved in Analog-to-Digital (A/D) data conversion? Briefly explain 10 the conditions to ensure accurate and precise A/D data conversion. b) Write the pros and cons of Delta-Sigma and Flash A/D converter. Suppose, you are 10 given an analog quantization size of 2.50 volt, where Vmin=0 volt and Viwx=10 Volt. Calculate the desired number of bits for an A/D converter. ©) Write short notes on: 5 i. Microprocessor controlled data transfer ii, Peripheral controlled data transfer 3. a) Distinguish between One-shot Mode and Software-triggered mode of 8254 PIT. 10 b) Suppose, an 8086 microprocessor is asked to address the 15" 8255 and to write acontrol 10 word at the control register of that 8255. Consider, Port-A is in Mode-2, Port-B is in Mode-1 as an output port and Port-C is working for handshaking signals. Now, derive the binary values of A7 — AO pins and draw the control word format for 8255. ¢) Draw the sequential timing diagram for Port-B considering the handshaking and data S signals (consider the scenario of Question 3.b). 4. a) Write down the features of 8255 PPI. 10 b) Consider that an 8-bit control word is to be written to an 8254 PIT, where the control 10 command asks for a 16-bit binary-counting from Counter # 2 using a square-wave generator. Now, derive the Control Logic pin values and draw the control word parameters. ©) Write a short note on output handshake signals of 8155 Programmable Peripheral Interface. 144 B.Sc. Engg. CSE 6" Semester 29 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (TUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of ter Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4631: Digital Signal Processing Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1. a) Name four key contribution areas of Digital Signal Processing. Which one among them is 2+4 your favorite? Why? b) Determine if each of the following signals is periodic or not. If the signal is periodic, 9 determine its fundamental period. iy) setae ii, x2(n) = un) + u(-n) iii, x3(n) = cos n )cosn) ©) A discrete-time signal x(n) is shown in Figure I. Sketch and label each of the following 10 signals: i, x(-n) i, x(3-n) x(n - 1)6(n - 2) * 3 8 x(n) eye wn 1n : . ‘ oo 24 a0 2 fa ws n . ar Figure i: x(n) a) Echoes are added to audio signals to make the listener "feel" that they are in a particular size 8 of room. Assume that an audio signal is sampled at 44 kHz, and that sound propagates at 332 meters/second, In a "small" room, a person stands about 3 meters from the walls. i. Ina small room, how long is the delay between a person making a sound and its echo from the walls? How many samples does this correspond to in the digital signal? What is the impulse response of a digital system simulating this echo, if the amplitude of the echo is 20%? b) Why would you use Polar notation instead of Rectangular notation? What are the nuisances 3+7 associated with polar notation? Page 1 of 2 °) a) b) °) b) ©) 10° Why is decomposition important? Determine and sketch the even and odd parts of the signal 3+4 depicted below: Figure 2: Signal ‘Two signals, x(n) and h(n), are defined as follows: 8 x(n): 1,0, 2, 3, 2, -2,-1, 0,2, 3, 3,2, 1, 1 (samples 0-15) hin): 1,2, 3,-3-2,-1 (samples 0-5) If y(n) = x(n)*h(n), i. Use the input side algorithm to determine the contribution to y(n) from x(4). Use the output side algorithm to determine the value of y(10) From calculus, you know that the derivative and integral are inverse operations; one undoes 7 the effect of the other. Prove that the first difference and the running sum are also inverse operations. That is, show that the cascade of these two systems is identical to the delta function Why is correlation important? Compute the correlation of the following signals. (Bold 3+7 signals denote origin] x(n) = (1,2,3,4,5,6} ; h(n) = (2,3,4} You have taken a 256 point DFT of a sinusoid and in the DFT, a peak appears at index 10 number 19. i, What is the frequency of the peak expressed as a fraction of the sampling rate? Whaat is the frequency of the peak expressed as a natural frequency? ‘What is the sampling rate if the peak corresponds to 21.5 kHz in the analog signal?” Describe a real time use of Spectral Analysis. Why is Hamming Window used in spectral 4+4 analysis? A signal containing 1000 points is to be convolved with a signal containing 128 points. 7 i, What is the length of the resulting signal? ii, If frequency domain convolution is used, what length of DFT is appropriate? iii, If a 1024 point DFT is used, how many samples are correct, and how many are corrupted by circular convolution? Page 2 of 2 204 B.Sc. Engg. / HD CSE 6" Semester 29 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4635: Web Architecture Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. 1a) Consider an application in which the results of football games are to be represented 6x3 in XML For each game: We want to be able to represent the two teams involved. The final score of the game. Which team was playing at home and which team was playing away. Which players scored goals (some of which may have been penalties) and the time when each goal was scored. * Which players were shown yellow or red cards. ‘+ All the referees of the match (minimum of 3 and a maximum of 6) You might use some attributes, i, Write the DTD suitable for defining a document in the above format. ii. Suppose the details of two games are as follows: [Home Team | Away Team | Score | Scorers | Time Messi 31:20 | Barcelona | Real Madrid | 2-1 Messi 62:17 Marcelo _ | 75:41 Arsenal PSG 00 Produce the XML for the games above. It should be in conformity with the DTD defined earlier. (Note: You can assume other information that are not provided but you deem necessary), iii, _ Use XSLT elements to convert the XML to XHTML and the output should show only the matches of Barcelona. b) What is Servlet Filter? Give examples. Draw the directory structure of a java web 7 application containing servlets, Static pages, JSPs, images and configuration files 2 a) With the help of a diagram, explain the life cycle of a JSP. 10 20m 10 b) What is STL? What are the main JSTL tag Librar “ntmi> <

Count Using Scriplets

t <% int n = Integer, oS getParameter("number")); Figure 1 Given the count,jsp in Figure 1 above, write a JSP file that will perform the same function using only JSTL and no Scriplets. c) When an HTTP request is sent to a servlet container, how does the container choses which 5 servlet to invoke a) Given the Login jsp in Figure 2 below, 12

Login: |
} Name:
t Password:
| voy Figure 2 Write a serviet having URL, *“LoginServlet’, which will check for user authentication, then will set the name and password in the session scope and write another servlet ‘WelcomeServlet’, which will get the value from session scope and display the name. ) Explain the mechanisms of sendRedirect and forward methods. Give examples 8 c) What are the differences between HTML and SGML 5 1a) What are Listeners in java web application? Give examples. s b) Assume that you are asked to develop a web application that would count the number 10 of active sessions. And one of the requirements is that the total number of active sessions should be kept to a maximum of 30, When the number of sessions is 30, no new session can be created. If a new user attempts to create a new session, an error ‘message should be sent to him that no more than 30 users can access the server at the same time. (Hint: Use listeners). ©) With the help of diagrams, explain the Model-2 web architecture with real world 10 scenario implementation and advantages. MID SEMESTER EXAMINATION 263 ~ BSc. Engg/HD CSE 6" Semester 27 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 3 2. Hum 4641: Accounting Programmable calculators are not allowed. Do not write anything on the question paper. a) a) bd) ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. “Pacioli described a unique system to ensure that financial information was recorded 3 efficiently and accurately”- Explain it. Answer each of the following questions by using expanded accounting equation: 4a i. The liabilities of Mark Company are $90,000. John Mark’s capital account is _ ¢ $150,000; drawings are $40,000; revenues, $450,000; and expenses, $320,000. 17” Whit is the amount of Mark Company’s total assets? ms ii, The total assets of Barone Company are $57,000. Nancy Barone’s capital account is $25,000; drawings are $7,000; revenues, $50,000; and expenses, $35,000. What is the amount of the company’s total liabilities? Miller's Repair Shop was started on May 1, 2018 by Mark Miller. A summary of May 18 transactions is presented below. Invested $10,000 cash to start the repair shop. Purchased equipment for $5,000 cash. Paid $400 cash for May office rent. Paid $500 cash for supplies. Incurred $250 of advertising costs in the Beacon News on account. Received $5,100 in cash from customers for repair service. Withdrew $1,000 cash for personal use. Paid part-time employee salaries $2,000. Paid utility bills $140. Provided repair service on account to customers $750. Collected cash of $120 for services billed in transaction (x). Prepare a tabular analysis of the transactions, using the following column headings: Cash, Accounts Receivable, Supplies, Equipment, Accounts Payable, M.Miller,Capital; M.Miiller, Drawings; Revenues, and Expenses. Draw the chart of Golden Rules of Accounting. 6 Mary Jansen is a licensed CPA. During the first month of operations of her business, 19 the following events and transactions occurred. May 1: Mary invested $25,000 cash in her business. May 2: Hired a secretary-receptionist at a salary of $2,000 per month. urchased $2,500 of supplies on account from Barry Supply Company. aid office rent of $900 cash for the month. Mayl1: Completed a tax assignment and billed client $2,100 for services provided. May 12: Received $3,500 advance on a management consulting engagement. May 17: Received cash of $1,200 for services completed for Max Company. Page 1 of 3 a) b) °) eC SC Srnec May 31: Paid secretary-receptionist $2,000 salary for the month. May 31: Paid 40% of balance due Barry Supply Company. Mary uses the following chart of accounts: No. 101 Cash, No. 112 Accounts Receivable, No. 126 Supplies, No. 201 Accounts Payable, No. 205 Uneamed Revenue, No. 301 Mary Jansen, Capital; No. 400 Service Revenue, No. 726 Salaries Expense, and No. 729 Rent Expense. Required: Jourmalize the transactions. fi, Post to the ledger accounts. iii, Prepare a trial balance on May 31, 2018. ‘A Mobile Phone shop makes a sale of mobile phones for $1,000 on June 30. The customer is sent a statement on July 5 and a cheque is received on July 10. The Mobile Phone shop follows Revenue Recognition Principle. When is the $1,000 considered to be earned? Explain the reason. Which items are included in Deferrals and Accruals? Sara Woods started his own consulting firm, Woods Consulting, on May 1, 2017. The ‘trial balance at May 31 is as follows. WOODS CONSULTING Trial Balance May 31, 2017 ‘Accounts Title Debit Credit Cash $5,700 ‘Accounts Receivable 6,000 Supplies 1,900 Prepaid Insurance 3,600 Office Furniture 10,200 ‘Accounts Payable $4,500 Unearned Service Revenue 2,000 S.Woods, Capital _ 17,700 Service Revenue 7,500 | Salaries Expense 3,400 Rent Expense 900 SBL700 $31,200 In addition to those accounts listed on the trial balance, the chart of accounts for Woods Consulting also contains the following accounts and account numbers: No. 150 Accumulated Depreciation—Office Furniture, No. 212 Salaries Payable, No. 229 Travel Payable, No. 631 Supplies Expense, No. 717 Depreciation Expense, No. 722 Insurance Expense, and No. 736 Travel Expense. Other data: $900 of supplies have been used during the month. Travel expense incurred but not paid on May 31, 2017, $250. ‘The insurance policy is for 2 years. $400 of the balance in the unearned service revenue account remains unearned at the end of the month. Page 2 of 3 25 * May 31 is a Wednesday, and employees are paid on Fridays. Woods Consulting has two employees, who are paid $800 each for a 5-day work week. ‘+ The office furniture has a S-year life with no salvage value. It is being depreciated at $170 per month for 60 months. * Invoices representing $1,200 of services performed during the month have not been recorded as of May 31. Required: i. Prepare the adjusting entries for the month of May, 2017. ii, Prepare an adjusted trial balance at May 31, 2017, ‘Your friend Natasha is confused about the accounts that are closed and the accounts that are not closed. Which chart will you show him? ‘The trial balance columns of the worksheet for Goode Company at March 31, 2018, are as follows. GOODE COMPANY Worksheet For the Month Ended March 31, 2018 ‘Account Titles Trial Balance Dr. Cr. Cash $4,500 Accounts Receivable 3,200 ‘Supplies 2,000 Equipment 11,000 | Accumulated Depreciation-Equipment $1,250 Accounts Payable 2,500 Unearned Revenue 350 T.Goode, Capital 12,900 T.Goode, Drawing 1,100 Service Revenue 6300 Salaries Expense 1,300 ‘Miscellaneous Expense 400 I tes $23,500 $23,500 Other data: ‘© A physical count reveals only $650 of supplies on hand. © Depreciation for March is $250. © Uneamed revenue amounted to $170 at March 31 * Accrued salaries are $600, Required: i, Enter the trial balance on a worksheet and complete the worksheet. ii. Journalize the closing entries from the financial statement columns of the worksheet. Page 3 of 3 20 B.Sc. Engg. / HD CSE 6” Semester MID SEMESTER EXAMINATION DURATION: 1 Hour 30 Minutes a) b) °) a) b) °) a) b) °) a) b) °) 20k ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Enginee! CSE CSE 4643: Mobile Application Development Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. Discuss on different types of mobile applications along with theit pros and cons. Discuss on various SDK versions. State the relationship between the SDK versions in development environment. What is AVD? Discuss its importance in Mobile Application Development platform. ‘What are the meanings of version number, code name, and API level of android applications? List various components of an Android Project. Explain various internal components of res folder of an Android Project. What are the functions of a Manifest file? What is the function of Gradle? How Dangerous Permissions ate needed to be managed from API Level 23? How is it needed to manage prior of API Level 23? Name five Dangerous permission name. List data storage options for android applications. With example show how data can be saved to and retrieved from shared preferences. Discuss the uses of ContentValues in android with example. By using a Block Diagram show the steps of producing an android app. What is Dalvik Debug Monitor Server (DDMS)? Draw Activity Life Cycle flow chart and discuss key blocks. Write down the basic code to implement a SQLite database with a table named zoo having following schema: 200( id integer primary key autoincrement, name text, description text, file_path text) 22 August 2019 (Morning) SUMMER SEMESTER, 2018-2019 FULL MARKS: 75 10 10 10 248, B Sc.TE 2 Semester (2 Year) MID SEMESTER EXAMINATION DURATION: 1 Hour 30 Minutes 27 ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) CSE 4673: Operating System and System Programming Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. With the help of figures explain user-mode and kernel mode. Show what happens in the background when a standard C code contains call to a built-in function such as printf (). Include the entire process from the function call within the code to all the possible system calls that happens. ‘What are the differences between a multicore and a multiprocessor system? ‘What are the differences between Virtualization and Emulation? Explain why one can use a Virtual machine when trying to use Linux in a Windows system but would have f use an ‘emulator when they need to use Android in said Windows system. With figures show the various processes of interprocess communication. Also, differentiate between them. Write short notes on: i. Remote Procedure call ii, Peer to peer architecture With figures describe the cloud computing architecture. With the help of queuing diagram show a representation of process scheduling, Also, justify when one might add a mid-term scheduler in process scheduling. What are ordinary pipes? Explain briefly with figures. What is a process control block? Show the structure of a process control block. What is the producer-consumer problem? Write code snippets for the producer and consumer process when a bounder buffer is being used as a shared memory. Write the differences between direct and indirect communication. What is non-blocking send? 27 August 2019 (Afternoon) SUMMER SEMESTER, 2018-2019 FULL MARKS: 75 10 10 442 20% B.Sc. Engg. CSE 8" Semester 26 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4801: Compiler Design Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them Figures in the right margin indicate marks. 1. a) What is a translator? What is the difference between compiler and interpreter? b) What are the various phases of compilation process? ©) Discuss the roll of lexical analyzer in a compiler. What are the benefits of implementing lexical analyzer as a separate layer? 4) Show that the following grammar is ambiguous: S— if (E) then S else S Sif (E) then S Sox E— true E— false a) A grammar is given below: GoL L>E;L LE E>E+T ET Tid Tid() Tid) i Derive a leftmost derivation for the string x + y ; z (y ()) and show the corresponding parse tree Modify the grammar (if necessary) to implement predictive parsing. iii, Find the set of FIRST and FOLLOW for each of the non-terminal. 3. a) Discuss in brief about Left Recursion, elimination of Left Recursion and Left Factoring with examples. b) Consider the following grammar G: S > Ea|| bE¢ |de | bda E>d i. Find the canonical collection of LR(0) items (transition diagram for SLR parsing). ii, Build SLR parse table and discuss your observations. 4. a) ») 229 ‘Youneed to generate a calculator program using both lex and yace. The calculator should support division, multiplication, addition, subtraction, and power operations in proper precedence and associativity. The calculator should also support first bracket within the expression. Write down the lex and yace file. Afterwards explain how to build the calculator program from the lex and yace source file. Use block diagram if necessary. Write short notes on the followings- Jotext, yylex(), yyparse(), yywrap), yyleng, yylval. 15 10 210 B.Se. Engg. CSE 8" Semester 30 August 2019 (Morning) MID SEMESTER EXAMINATION ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 a) a) b) ©) a) b) °) CSE 4803: Graph Theory Programmable calculators are not allowed. Do not write anything on the question paper. There are 4 (four) questions. Answer any 3 (three) of them. Figures in the right margin indicate marks. Define with example (figure if necessary) i. Eccentricity ii, Rank iii, Semi-Eulerian Graph iv. Cut-Vertex v. Bipartite Graph Use Cayley’s theorem to draw the labeled tree represented by the sequence (1,5,5,1,2). After drawing the graph interchage the labels 1 and 5. Then, recalculate the labeled sequence. Prove that there are at lesat two pendant vertices in any tree with two or more vertices. How many vertices and edges does each of the following graphs have? i Kno ii, Cy iii. Wa iv. Qu v. Ka Define Hamiltonian Cycle. Prove that a complete bipartite graph Kas does not have a Hamiltonian Cycle. Let G be a simple graph on n vertices and m edges. If G has k components, thén prove that G satisfies: n-k 1 Prove that if f(n)=O(n power (log) for some constant ¢ >0 then T(n)=0 (n power log’) a) Show the results of inserting the keys F,S,Q,K,C, L,H,T, V, W,M,R,N,P, A,B, X, Y, D, Z,E with minimum degree 3. b) Prove the correctness of Dijkstra’s algorithm for finding single source shortest paths. a) Write down the recursive equations for all-pair shortest path problems including the formulation given by Floyd-Warshall. b) Briefly explain the path-relaxation property for shortest path problems. ©) Why does Bellman-Ford algorithm for negative weight cycle relax all the edges several times? How many times does the algorithm relax the edges? a) Comment on the hardness of the problem of “data mining’ b) What is Apriori property? Why does every data mining algorithm uses Apriori property? ©) How does FP-Tree/ FP-Growth algorithm improve over Apriori algorithm for association pattern mining? oe DAB BSc. Eng. CSE 8% Semester 29 August 2019 (Morning) ISLAMIC UNIVERSITY OF TECHNOLOGY (IUT) ORGANISATION OF ISLAMIC COOPERATION (OIC) Department of Computer Science and Engineering (CSE) MID SEMESTER EXAMINATION SUMMER SEMESTER, 2018-2019 DURATION: 1 Hour 30 Minutes FULL MARKS: 75 CSE 4839: Internetworking Protocols Programmable calculators are not allowed. Do not write anything on the question paper. ‘There are 4 (four) questions. Answer any 3 (three) of them, Figures in the right margin indicate marks. 1, a) Whats the difference between routing and forwarding? b) Write short note on forwarding process in a router when used in following networks, i Connection less Packet Switched Network ii, Virtual-cireuit network ©) Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three 7 links, of rates R1 = 500 kbps, R2 = 2 Mbps, and R3 = 1 Mbps. i. Assuming no other traffic in the network, what is the throughput for the file transfer? ii. Suppose the file is 4 million bytes. Roughly how long will it take to transfer the file to Host B? 4) What is the key difference between a tier-1 and tier-2 ISP? 4 wou 2. a) How does a newly arriving host in a subnet get an IP address automatically? Describe the 7 procedure with appropriate diagram, b) An organization is granted the block 130.56.0.0/16. The administrator wants to create total of 8 1024 subnets i. Find the subnet masks. ii, Find the number of address in each subnet. iii, _ Find the first and last address in the first subnet, ©) Consider the network shown in Figure 1, and assume that each node initially knows the costs to. 5 each of its neighbors. Consider the distance-vector algorithm and show the distance table entries at node z. Figure 1: network for Question 2.(c) 4) Describe the role of Intemet Group Management Protocol (IGMP) and multicast routing 5 protocol in multicast routing. 3. a) Suppose you purchased a wireless router and connected it to your cable modem. Also that your 7 ISP dynamically assigns your connected device (that is, your wireless router) one IP address. Also suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. How are IP addresses assigned to the five PCs? Does the wireless router use NAT? Why or why not? b) Compare and contrast the delays in connectionless and connection-oriented services. 6 °) d) b) ©) et A multicast address for a group is 232.24.60.9. What is its 48-bit Ethernet address for a LAN using TCP/IP? Does Reverse Path Broadcasting (RPB) in Distance Vector Multicast Routing Protocol (DVMRP) actually create a shortest path tree? Explain. What are the leaves of the tree? Consider an autonomous system named 4S/, where RIP is utilized as its interior routing protocol. The routing table in a particular router R/ of AS/ has 20 entries. It does not receive information about five routers for 150s. How many R/P timers are running at this time? Briefly describe the services provided by Network Layer at the source computer. A router D using RIP (Routing Information Protocol) has the routing table shown in Table 1. Table 1: Routing table for router D in Question 4. (c) Destination Cost ‘Next Router | Netl 4 B Net2 2 c Net3 1 E Nets 7 G i. Show the RIP response message sent by this router. ii, Consider router D receives a RIP response message from router C, which is summarized as: (Netl, 2), (Net2, 1), (Net3, 3), (Net4, 7). Show the updated routing table for router D. 9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy