0% found this document useful (1 vote)
149 views58 pages

2023 Oct Paper

question paper

Uploaded by

runebankai7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
149 views58 pages

2023 Oct Paper

question paper

Uploaded by

runebankai7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

Total No. of Questions : 4] SEAT No.

:
P-6445 [Total No. of Pages : 4

[6158]-31
S.Y. B.C.A. (Science)
BCA-231 : DATA STRUCTURES
(2019 Pattern) (Semester - III)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates :
1) Figures to the right indicate full marks.
2) Draw diagram wherever necessary.

Q1) Attempt the following. [5×1=5]


A) Choose the correct options :
a) ________ is the worst case time complexity of linear search.
i) O(1) ii) O(log n)
iii) O(n) iv) O(n2)
b) A stack follows ________ principal.
i) LIFO ii) FIFO
iii) FFIO iv) LFIO
c) In singly linked list of integer, each node contains data and second
field is ________
i) Integer ii) Pointer to integer
iii) Pointer to node iv) Node
d) The total number of nodes in complete binary tree having depth 'd'
is _________.
i) 2*d ii) 2d
iii) 2d–1 iv) 2d–1
e) ________ Data structure is used in DFS traversal
i) Array ii) Stack
iii) Queue iv) Tree
P.T.O.
B) Answer the following : [5×1=5]
a) Define Big oh(O) and Big omega () notation
b) List the types of linked list.
c) Give two application of queue.
d) Define strictly binary tree.
e) Define complete graph.

Q2) Answer the following : (Any five) [5×3=15]


a) State the application of data structure.
b) What is sparse matrix? State it's advantages.
c) Write a node structure of doubly linked list.
d) What is a stack? List two applications of stack.
e) Define terms : i) node
ii) Height of tree
iii) degree of a node
f) Define a graph calculate indegree and outdegree for following graph.

Q3) Answer the following : (Any five) [5×4=20]


a) Define data structure and explain types of data structure.
b) Sort the following data using bubble sort method.
25, 37, 12, 48, 57, 33
c) What is a leaf node? Write a code to count leaf node of tree.
d) What is the result of evaluating the postfix expression AB-CD*/ with
given values : A = 2 B = 10 C = 4 D = 1
e) Create binary search tree for the data.
10, 20, 15, 5, 1, 6, 13

[6158]-31 2
f) Write algorithm for insertion sort.
g) Consider the following graph.

i) Draw the adjacency list


ii) DFS & BFS traversal
iii) Which vertices have maximum indegree?

Q4) Answer the following : (Any five) [5×5=25]


a) Write a C function to search element using binary search method.
b) Differentiate between stack and queue.
c) Show the stack contents and output while converting the following infix
expression to postfix form (A*B*C)/(F*G)–D)
d) Define Binary Tree. Write C structure for Binary tree Traverse the following
binary tree using preorder, Inorder, postorder traversal technique.

e) Consider following Adjacency matrix.

1 2 3 4
1 0 1 0 0
2 0 0 1 0
 
3 0 0 0 1
 
4 1 0 0 0

[6158]-31 3
i) Draw the graph
ii) Draw the Adjacency list
iii) Draw the inverse Adjacency list.
f) Define topological sorting. What will be the topological order of activities
for AOV network as given below?

g) Write a C function to insert and delete node in doubly linked list.



[6158]-31 4
Total No. of Questions: 4] SEAT No. :
P6446 [6158]-32
[Total No. of Pages : 4

S.Y.B.C.A (Science)
BCA 232 : DATABASE MANAGEMENT SYSTEMS-II
(2019 Pattern) (Semester-III)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates:
1) Figures to the right indicate full marks.
2) Draw the diagram wherever necessary.

Q1) Attempt the following. [5×1=5]


A) Choose the correct option:
a) The _____Property assures that once transaction Completes
successfully, all updates that it carried out on database persists,
even if system crashes.
i) atomicity ii) Consistency
iii) Isolation iv) durability

b) _____deadlock detection technique is preemptive.


i) Wait-die ii) Wound-wait
iii) Wound wait wound iv) Wait-die wound

c) No-UNDO, REDO) Policy is also known as _____


i) Deferred update ii) Immediate update
iii) Buffered management iv) Shadow paging

d) Prevention of access to database by unauthorized user is referred


as _____
i) Integrity ii) Consistency
iii) Security iv) Reliability

e) In _____system, each entity is treated as an object


i) Parallel database ii) Object oriented Database
iii) Relational database iv) Distributed database
P.T.O.
B) Answer the following. [5×1=5]

a) What is meaning of variadic function argument type?

b) Define concurrent schedule

c) Show compatibility matrix for shared and exclusive lock

d) What are the contents of log?

e) Give the syntax of GRANT command

Q2) Attempt the following (Any five) [5×3=15]

a) Write structure of PL/PgSQL code block

b) What do you mean by cascadeless, strict and non recoverable schedule?

c) Discuss the variations of two phase locking protocol

d) What are the reasons of transaction failure?

e) Explain the components of clinet server architecture?

f) How DBA is responsible for security of database systems?

Q3) Attempt the following (Any five) [5×4=20]

a) Explain the timestamp ordering protocol for concurrency

b) Write note on shadow paging

c) Explain the mandatory access control for multilevel security.

d) Explain the distributed database management system.

e) Check whether given schedule S is conflict serializable or not


S : R1(A), R2(A), R1(B), R2(B), R3(B), W1(A), W2(B)

[6158]-32 2
f) Following is list of events in an interleaved execution of set T1, T2, and
T3 assuming 2PL. Is there any deadlock? If yes, which transactions are
involved in deadlock?

Time Tansaction Code

t1 T1 Lock (A,X)

t2 T2 Lock (B,S)

t3 T3 Lock (A,S)

t4 T1 Lock (C,X)

t5 T2 Lock (D,X)

t6 T1 Lock (D,S)

t7 T2 Lock (C,S)

g) What is trigger ? Explain the syntax to create trigger along with its
advantages.

Q4) Attempt the following (Any five) [5×5=25]

a) Define transaction. Discuss the properties of transaction

b) Explain the concept of locks with multiple granularity

c) Dicuss the encryption technique for security

d) What are the steps to manage explict cursor? write the cursor which will
accept year and display all movies released in that year for following
table Film (film_id, title, description, release_year, language_id, rental_
duration, rental_rate, length, replacement_cost).
[6158]-32 3
e) Explain the deferred update technique of log based recovery following
are the log entries at time of system crash
[Start_transaction, T1]
[write_item, T1, A, 10]
[Commit T1]
[Start_transaction, T3]
[Write item, T3, B, 15]
[Checkpoint]
[Commit T3]
[Start_Transaction, T2]
[Write_item T2, B, 20]
[Start_transaction, T4]
[Write_item T4, D, 25]
[Write_item T2, C, 30] System crash

If a deferred update technique with check point is used, what will be


recovery procedure?

f) Consider the following transactions. Give two non-serial schedules that


are serializable.
T1 T2
Read (x) Read (z)
X=x+100 Read (x)
Write (x) X=x-z
Read (y) Write (x)
Read (z) Read (y)
y=y+z y=y-100
Write (y) Write (y)

g) What is view? write syntax to create view? How views are useful in
database security?


[6158]-32 4
Total No. of Questions : 4] SEAT No. :
P-6447 [Total No. of Pages : 3

[6158]-33
S.Y. B.C.A. (Science)
BCA - 233 : COMPUTER NETWORKS
(2019 Pattern) (Semester - III)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates :
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw diagram whenever necessary.

Q1) Attempt the following :


A) Choose the correct option from the following : [5 × 1 = 5]
i) ________ of the following is not function of data link layer.
a) Error control b) Signal Representation
c) Flow control d) Framing
ii) A telephone network is an example of ______ network.
a) Circuit switched b) Packet switched
c) Message switched d) Virtual switched
iii) _________ of the following technique does not make efficient use
of channel bandwidth.
a) Piggybacking b) Pipelining
c) Go back n d) Selective repeat
iv) For class A, address, ________ byte are taken as net-id.
a) 1 b) 2
c) 4 d) 8
v) "Total length" field in UDP packet header is the length of the _______.
a) Only UDP header b) Only data
c) Only checksum d) UDP header plus data
P.T.O.
B) Answer the following in one or two sentences : [5 × 1 = 5]
i) PAN is the largest type of network. State True/False and Justify.
ii) List the causes of signal impairment.
iii) What are different frame types in HDLC?
iv) Identify the address class for the following IP address 140.25.1.100.
v) What is maximum size of TCP Header?

Q2) Attempt the following (Any five) : [3 × 5 = 15]


a) Explain the types of data flow with examples.
b) Discuss the different levels of addresses used in networks.
c) Given a channel with intended capacity of 20 mbps. The bandwidth of
channel is 3MHz. What signal to noise ratio is required in order to achieve
this capacity?
d) Differentiate between pure and slotted ALOHA.
e) Write note on classful addressing.
f) Explain the types of DNS server.

Q3) Attempt the following (Any five) : [5 × 4 = 20]


a) Explain the characteristics of Data Communication.
b) Compare & contrast OSI and TCP/IP reference model.
c) Explain the criteria for measuring network performance.
d) Given a 12 bit sequence 100111010000 and divisor of 1001 find CRC.
e) Draw the structure of IPV4 datagram and explain its field.
f) Write note on SMTP.
g) For the given IP address 205.167.37.39/28 in some block of addresses,
calculate
i) Address mask
ii) First address of block.

[6158]-33 2
Q4) Attempt the following (Any five) : [5 × 5 = 25]
a) Define Topology. Explain any two topology with its advantages and
disadvantages.
b) What is classless addressing?
c) Explain serial and parallel transmission modes.
d) Explain the go back n protocol with advantages & disadvantages.
e) Encode data stream 01101001 with the following methods :
Unipolar, NRZ-L - RZ, Manchester, Differential Manchester.
f) Differentiate between FDMA, TDMA and CDMA.
g) Explain UDP operations along with advantages & disadvantages.



[6158]-33 3
Total No. of Questions : 5] SEAT No. :
P6448 [6158]-41
[Total No. of Pages : 5

S.Y. B.C.A. (Science)


BCA-241 : OBJECT ORIENTED PROGRAMMING AND C++
(2019 Pattern) (Semester - IV)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw neat diagrams wherever necessary.

Q1) A) Choose the correct option. [5×1=5]


a) Abstraction is __________.
i) A collection of similar data items.
ii) A combination of similar data items and function.
iii) The combination of data item and function.
iv) A collection of necessary data items and functions.

b) Which of the following language supports top-down design concept


i) Object oriented programming
ii) Object based programming
iii) Procedure oriented programming
iv) Process oriented programming

c) Reusability can be achieved through ________.


i) Class ii) Inheritance
iii) Polymorphism iv) Encapsulation

d) A file in C++ can be opened using ___________.


i) Constructor of the appropriate class
ii) Open ( ) function
iii) append ( ) function
iv) Both (i) and (ii)

[6158]-41 1 P.T.O.
e) Constructor can return _________.

i) void data

ii) Any data of use defined types

iii) Any data of built in type

iv) No value (not even void)

B) Answer the following. [5×1=5]

a) Define constructor.

b) List the operators which cannot be overloaded.

c) Give any two advantages of Inheritance.

d) Give syntax of Exception Handling.

e) List the situations where in line function does not work.

Q2) Answer the following: (Any five) [5×3=15]

a) What is Manipulator? Enlist them with example.

b) Define the following

i) Object

ii) Class

iii) Polymorphism

c) Which operators are used as Memory Management Operators? Write


the syntax.

d) Write a program to print maximum of two numbers using friend function.

e) Explain single Inheritance with example.

[6158]-41 2
f) Read the code carefully and answer the questions below
Class ABC
{
int temp;
Public:
ABC ( )
{
temp = 0;
}
ABC(int t)
{
temp = t;
}
void display ( )
{
cout << temp << endl;
}
};
main ( )
{
ABC a;
___________ statement 1;
___________ statement 2;
}

i) How many member functions are defined in the above code?

ii) How will you write statement 1 to invoke parameterised constructor.

iii) How will you write statement 2 to invoke display function.

[6158]-41 3
Q3) Answer the following (Any five): [5×4=20]
a) Write 4 differences between Procedure oriented programming and object
oriented Programming.
b) What is operator overloading? Explain rules of operator overloading.
c) Write a program to add two complex numbers using binary operator
overloading.
d) Write a C++ program to copy the contents on one file to another.

e) Which are the two ways of defining member function? Explain any one
with example.

f) What is friend function? Write the properties of friend function.

g) Write a program to create 2 base classes Employee (Name, Designation)


and Project (Projectedidid, Title). Derive a class Employee - Project
(Duration) from Employee and Project. Write a menu driven program to
build and display master table.

Q4) Answer the following (Any five): [5×5=25]

a) Explain Virtual Base class with example.

b) What is a file? Explain various file stream classes for file manipulation.

c) Explain Array of objects with example.

d) Write a program to create a class shape with function to find area of the
shape and display name of the shape with essential components. Create
derived classes circle, rectangle and trapeziod having overridden function
area and display. Write a program to illustrate use of virtual function.

e) Write the advantages and Applications of C++.

f) Write a program to create a class which contains single dimensional


array. Define function to display median of given array. (Use Dynamic
constructor to (display) allocate and for deallocation use Destructor.

[6158]-41 4
g) Trace the output and justify
i) # include <iostream.h>
class Base 1
{
Public:
Base 1 ( )
{ cout <<“Base 1’s constructor called”<<endl;}
};
class Base2
{
Public :
Base 2 ( )
{ cout <<“Base 2’s constructor called”<<endl;}
};
class Derived : Public Base 1, Public Base 2
{ Public :
Derived ( )
{
cout << “Derived’s constructor called”<<endl;
}
};
main ( )
{
Derived d;
}
ii) # include < iostream.h>
int x;
main ( )
{
int x = 10;
cout <<“value of x is” << : : x;
cout <<“value of x is: << x;
}

 
[6158]-41 5
Total No. of Questions : 4] SEAT No. :

P-6449 [Total No. of Pages : 3


[6158]-42
S.Y. B.C.A. (Science)
BCA-242 : WEB TECHNOLOGY
(2019 Pattern) (Semester - IV)

Time : 3 Hours] [Max. Marks : 70


Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw neat diagrams wherever necessary.

Q1) A) Choose the correct option. [5 × 1 = 5]


a) ________ are case sensitive in PHP.
i) user defined class ii) user defined function
iii) Built - in constructs iv) All of the above
b) $-SERVER array contains
i) HTTP-HOST ii) SELF-PHP
iii) ACCEPT-HTTP iv) PORT-SERVER
c) ________ operator is used to access data members of a class
using an object.
i)  ii) 
iii)  iv) 
d) How to find out XMLHTTP Request has successfully computed?
i) readystate = 1 ii) readystate = 2
iii) readystate = 3 iv) readystate = 4
e) Consider $S = array (‘P’,‘C’,‘m’); $n=array(‘L’,‘B’); $a =
array_Splice($s, 2, 0, $n);
What will be the contents of $a?
i) (‘P’,‘C’,‘L’,‘M’,‘B’) ii) (‘P’,‘C’,‘L’,‘B’,‘M’)
iii) (‘L’,‘B’,‘P’,‘C’,‘M’) iv) (‘P’,‘C’,‘M’,‘L’,‘B’)

P.T.O.
B) Attempt All of the following : [5 × 1 = 5]
a) List different datatypes supported by PHP.
b) Write any two features of HTTP protocol.
c) What is the advantage of default arguments?
d) List different databases supported by PHP.
e) Write statement to create XMLhttpRequest object as per the brower
support.

Q2) Attempt any FIVE of the following : [5 × 3 = 15]


a) What is Introspection? Explain any three functions of it.
b) What is cookie? Explain function with its syntax to create a cookie.
c) Differentiate between asynchronous and synchronous request in AJAX.
d) Explain any three sinuplexXML functions used in PHD.
e) What is reference variable? Explain with suitable example how parameters
are passed by reference.
f) What is an array? Illustrate with suitable example how to use for each
loop to display array elements.

Q3) Attempt any FIVE of the following. [5 × 4 = 20]


a) Define class ‘Employee’ (id, name, dept, salary) with constructor and
display() function. Create a subclass “Manager” with private member
bonus. Create an object of manager. Accept information and display
using appropriate member functions.
b) Write a PHP script to display a count, how many times a web page is
accessed.
c) Explain $_GET, $_POST, $_GLOBALS, $_REQUEST arrays with
example.
d) What is DOM? Explain any three Dom functions to create XML file.
e) Consider table Hall-Booking (b_id, date, time, duration, eventname) &
customer (c_id, name, phno) with m–1 relationship. Write a PHP script
to print report of all booking details of a given date.

[6158]-42 2
f) Explain following functions :
i) array_chunk ()
ii) explode()
iii) compact()
iv) list()
g) How variable number of arguments are handled in PHP? Illustrate with
suitable example.

Q4) Attempt any FIVE of the following : [5 × 5 = 25]


a) Define a class student (r_no, name, class, percentage) with constructor
and display() function. Create an array of objects to store students details.
Display student details with maximum percentage.
b) Write a PHP script to convert farenheit temperature to celcius using self-
processing form.
c) Explain any four functions of PEAR DB to handle database.
d) What is AJAX? Explain how get and post methods are used in AJAX.
e) Consider Book.xml file with following tags :
<Bookstore>
<Book>
<name>......... </name>
<price>........</price>
<publication>..... </publication>
<!Book>
</Bookstore>
Write AJAX program to display book details. Accept book name from
the uses.
f) Explain iterater functions in PHP.
g) Illustrate with example scope of a variable in PHP.


[6158]-42 3
Total No. of Questions : 4] SEAT No. :
P6450 [6158]-43
[Total No. of Pages : 3

S.Y. B.C.A. (Science)


BCA-243 : SOFTWARE ENGINEERING
(2019 Pattern) (Semester - IV)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw neat diagram wherever necessary.

Q1) Attempt the following: [5×1=5]


A) Choose the correct option.
a) Expert system, Robotics comes under _________.
i) Application software ii) Artificial Intelligence
iii) Embeded software iv) Net sourcing

b) The system which is directly interacting with the environment is


known as _________.
i) Abstract system
ii) Open system
iii) Closed system
iv) Transaction processing system

c) Choose the right sequence of SDLC steps.


i) Design, Requirement analysis, Coding, Testing
ii) Requirement Analysis, Design, Coding, Testing
iii) Requirement Analysis, Desgin, Testing, Coding
iv) Desgin, Requirement Analysis, Testing, Coding

[6158]-43 1 P.T.O.
d) __________ is the technique used to extract information from large
number of people.
i) Record review ii) Questionnaires
iii) Observation iv) None of the above

e) Which is not activity of serum method?


i) Sprint ii) User story
iii) Product master iv) Story points

B) Answer the following. [5×1=5]


a) Define software
b) What is DFD?
c) Define Agility.
d) Explain two advantages of spiral model.
e) What is inception?

Q2) Answer the following: (Any five) [5×3=15]


a) Explain any three characteristics of a system.
b) Explain Mc Call’s quality factors.
c) What are the verification phases of V and V model? Explain.
d) Explain human factors used for agile process.
e) Explain Data Dictionary with its types.
f) Write any three advantages of DFD.

Q3) Answer the following (Any five): [5×4=20]


a) Explain any 4 general Principles of software.
b) Explain waterfall model.
c) What is feasibility study? Explain its types.
d) Write a short note on MIS.

[6158]-43 2
e) Explain XP Model.

f) What is layered Technology? Explain.


g) Explain input design with example.

Q4) Answer the following (Any five): [5×5=25]

a) Consider the following case study & Draw the decision tree.

An insurance company uses the following rule to determine the eligibility


of a driver for insurance. The driver will be insured if:

i) The driver lives in a city with population < 10,000 & he is married.

ii) The driver lives in a city with population < 10,000 and he is married
and his age is above 30 years.

iii) The driver lives in a city with population is 10,000 or more it is


married female.

iv) The driver is male over 30 years.

v) The driver is married and under 30.

b) Draw context level and 1st level DFD for library management system.

c) Explain any five principles of Agile process.

d) What is difference between system analysis and system design.

e) Explain generic process Model.

f) Explain any five requirement engineering task.

g) Differentiate between spiral model and proto type model.

 

[6158]-43 3
Total No. of Questions: 4] SEAT No. :
P6451 [6158]-51
[Total No. of Pages : 3

T.Y.B.C.A. (Science)
BCA 351-DSE-I : PROGRAMMING IN JAVA
(2019 Pattern) (Semester-V)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw the Diagrams wherever necessary.

Q1) Attempt the following. [5×1=5]


A) Choose the correct option:
a) ______of the operator is used to allocate memory for an object.
i) malloc ii) alloc
iii) new iv) give

b) _____this interface handle sequences


i) Set ii) List
iii) Comparator iv) Collection

c) Try, catch, finally are related to _____.


i) Function handling ii) String
iii) Exception iv) Extension

d) MVC stands for _____architecture.


i) Model ii) View
iii) Controller iv) All mentioned

e) ______method is used to perform DML statement.


i) execute () ii) execute Query ()
iii) executeupdate () iv) executeResult ()
P.T.O.
B) Attempt the following. [5×1=5]
a) What is method overriding?
b) Enlist the types of Drivers.
c) What is the use of “this” keyword?
d) Write any three types of layout.
e) State true or false:Java supports multiple catch block (Justify).

Q2) Answer the following: (Any five) [5×3=15]


a) Explain the concept of Garbage collection
b) How to define & Implement interfaces?
c) Explain MVC architecture
d) Define:
i) TYPE-FORWARD-ONLY
ii) TYPE-SCROLL-INSENSITIVE
iii) CONCUR-UPDATABLE
e) What is scripting elements? Explain any two type.
f) Differentiate between string and string Buffer class.

Q3) Answer the following. (Any five) [5×4=20]


a) Explain the life cycle of JSP.
b) Write Java program to calculate the Fibbonacci series.
c) Explain the types of Drivers (JDBC)
d) How to access, create class in package with example?
e) Differentiate between Buffered Reader and Scanner class.
f) Write a program to calculate factorial.
g) Write Java program to create following frame
Male O Female O
Yes O No O
Selected : True or False

[6158]-51 2
Q4) Answer the following (Any five) [5×5=25]
a) Write a Java program that accept number using command line argument
display that the number is perfect or not.
b) Explain Access specifiers in detail.
c) What is overriding? Explain runtime polymorphism with example.
d) Define:
i) Treeset
ii) Hashmap
iii) Treemap
iv) Array List
v) Linked List
e) Explain wrapper class with example.
f) What is Inheritance? Explain types of Inheritance.
g) Explain cookies and Http session.



[6158]-51 3
Total No. of Questions : 4] SEAT No. :
P-6452 [Total No. of Pages : 3

[6158]-52
T.Y. B.C.A. (Science)
BCA 352 : DATA MINING AND DATA SCIENCE (DSE-II)
(2019 Pattern) (Semester - V)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates :
1) Figure to the right indicate full marks.
2) Draw labeled diagram wherever necessary.

Q1) Attempt the following. [5×1=5]


A) Choose the correct options :
a) Which of the following clustering requires merging approach.
i) Partitional ii) Hierarchical
iii) Naive Bayes iv) Divisive
b) ________ type of data contain only numbers.
i) Quantitative ii) Unstructured
iii) Structured iv) Qualitative
c) Which is the following example of sequence data.
i) Weather forecast
ii) Data matrix
iii) Market basket data
iv) Genome and DNA data of an organism
d) What do data warehouse support?
i) OLAP ii) OLTP
iii) OLAP & OLTP iv) Operational databases
e) IQR stands for
i) In quotient Range ii) In quartile Range
iii) Inter quartile Range iv) In quad Range
P.T.O.
B) Attempt the following : [5×1=5]

a) What is data warehouse?

b) What is large item set?

c) What is simulation?

d) What is structured data?

e) What is data Reduction?

Q2) Answer the following : (Any five) [5×3=15]

a) Explain tree pruning with example.

b) Explain outliers with suitable diagram.

c) Explain data transformation methods.

d) Explain dimensionality of data set with example.

e) Write difference between OLTP and OLAP.

f) What is quantitative data? Explain its types.

Q3) Answer the following : (Any five) [5×4=20]

a) What is cluster? Explain its applications.

b) Explain k - Nearest neighbor classifiers with example.

c) Explain data mining Applications.

d) What is data visualization? Explain chart Technique with example.

e) Explain types of regression.

f) What is probability distribution? Explain its types.

g) What is data mart? Explain its category.

[6158]-52 2
Q4) Answer the following : (Any five) [5×5=25]
a) Explain Basic principles of data visualizations.
b) Explain Decision Tree with its advantages and disadvantages.
c) Explain KOD process in details.
d) What is Bayesian classifications? Explain applications of Naive Bayes
Algorithms.
e) Describe component of data science in brief.
f) What is machine learning? explain its type.
g) Explain Aglomerative Hierarchical clustering with it's disadvantages.



[6158]-52 3
Total No. of Questions : 4] SEAT No. :
P6453 [Total No. of Pages : 4
[6158]- 53
T.Y.B.C.A. (Science)
BCA-353 DSE-III : PRINCIPLES OF OPERATING SYSTEMS
(2019 Pattern) (Semester-V)

Time : 3 Hours] [Max. Marks : 70


Instructions to the candidates:
1) All questions are compulsory.
2) Draw neat diagram wherever necessary.
3) Figure to the right indicate full marks.

Q1) Attempt of the following.

A) Choose the correct option: [5×1=5]


a) ______ is heavy weight.
i) Process ii) Thread
iii) Process and thread iv) None of the above
b) Process synchronization can be done on ______.
i) Software level ii) Hardware level
iii) Both (i) and (ii) iv) Critical level
c) Banker’s safety Algorithm is used for _______
i) Deadlock detection ii) Deadlock Prevention
iii) Deadlock Avoidance iv) Recovery
d) External fragmentation can be eliminated by ______ technique.
i) compaction ii) de-allocation
iii) allocation dynamically iv) none of the above
e) File type can be represented by ______
i) file name ii) file identifier
iii) file allocation iv) file extension

P.T.O.
B) Attempt the following: [5×1=5]
a) What is IPC?
b) Write two types of semaphore.
c) Define starvation.
d) Write any two advantages of shared pages.
e) Enlist attributes of file.

Q2) Attempt the following (any Five): [5×3=15]


a) Consider the following snapshot:
Process Burst time Arrival time
P1 4 2
P2 6 0
P3 2 1
Illustrate the execution of these processes using Round Robin (RR)
CPU scheduling. algorithm (quantum=3 millisec). Calculate average
waiting time and average turnaround time.
b) Write a short note on Race condition.
c) Explain necessary conditions for a deadlock.
d) Differentiate between Internal fragmentation and External fragmentation.
e) Explain first fit, best fit and worst fit.
f) Discuss Disk formatting.

Q3) Attempt the following (Any five): [5×4=20]


a) Consider the following snapshot.
Process Burst time Arrival time Priority
P1 5 1 1 (highest)
P2 6 0 2
P3 2 1 1
P4 4 0 3 (lowest)
Illustrate the execution of these processes using preemptive priority and
FCFS scheduling algorithm. calculate average turn around time and
average waiting time.
[6158]-53 2
b) Describe critical section problem in detail.

c) Consider a system with 7 processes A through G and six types of


resources R through W with one resource for each type. Resource
ownership is as follows:

i) A holds R and wants S

ii) B holds nothing but wants T

iii) C holds nothing but wants S

iv) D holds U and wants S and T

v) E holds T and wants V

vi) F holds W and wants S

vii) G holds V and wants U

Is the system dealocked and if so, which processes are involved?

d) Consider the following page reference string, 1,2,3,4,2,1,5,6,2,1,3

How many page faults will occurs for following page replacement
algorithms?

Assum three frames

i) FIFO

ii) LRU

e) Explain tree-structure directory structure.

f) Explain FCFS scheduling algorithm with example.

g) Define following terms:

i) Transfer rate

ii) Seek time

iii) Rotational latency

iv) Access time

[6158]-53 3
Q4) Attempt the following (Any five): [5×5=25]

a) Write short note on “Multilevel feedback queue scheduling”.

b) Explain Recovery from deadlock.

c) State the advantages and disadvantages of dynamic linking.

d) Differentiate between contiguous allocation and linked allocation method


of disk.

e) Consider queue : 23,89,132,42,187 and schedule

by algorithms : i) Look ii) C-Look

There are 200 cylinders numbered from 0-199. The disk head starts at
numbers 100.

f) Explain the disk performance parameters.

g) What is thrashing? Explain causes of thrashing.



[6158]-53 4
Total No. of Questions : 5] SEAT No. :
P-6454 [Total No. of Pages : 3

[6158]-54
T.Y. B.C.A. (Science)
BCA - 354 : ARTIFICIAL INTELLIGENCE
(2019 Pattern) (Semester - V)
Time : 2 Hours] [Max. Marks : 35
Instructions to the candidates :
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw neat diagrams whenever necessary.

Q1) Attempt any eight of the following : [8 × 1 = 8]


i) Who is father of AI.
a) Fisher Ada b) Alan Turing
c) John McCarthy d) Allen Newell
ii) _______ is the computational system that implements the control strategy
and applies the rules.
a) A set of rules b) A control strategy
c) One or more knowledge d) A rule applier
iii) Which function will select the lowest expansion node at first for evaluation?
a) Greedy Best-First Search b) Depth-First Search
c) Both a) & b) d) A * Search
iv) First order logic statement contains _________.
a) Predicate and preposition b) Subject and an object
c) Predicate and subject d) None of above
v) What is a frame?
a) A way of representing knowledge
b) Data structure
c) Data type
d) None
P.T.O.
vi) Which of the following is not a type of data?
a) ordinal b) cardinal
c) nominal d) categorical
vii) Which of the following is not an application of AI?
a) Intelligent Robots b) Handwriting recognition
c) Speech recognition d) Content mining
viii) _______ is a representation of problem elements at a given moment.
a) Search b) Problem
c) State d) State Space
ix) What is the problem space of Means-End Analysis?
a) An initial state and one or more goal state
b) One or more initial states and one goal state
c) One or more initial states and one or more goal step
d) One initial and one goal state
x) Which of the following option is used to build complex sentences in
knowledge representation?
a) Symbols b) Connectives
c) Quantifiers d) Word

Q2) Attempt any four of the following : [4 × 2 = 8]


a) A good control strategy is that it causes motion and should be systematic.
Justify your answer.
b) List the two advantages of DFS.
c) Define knowledge. What are its types?
d) What is Heuristic function?
e) Represent the following using semantic net :
i) Every girl likes ice - cream.
ii) I won a blue car

[6158]-54 2
Q3) Attempt any two of the following : [2 × 4 = 8]
a) Write a detailed note on Intelligent Agents.
b) Discuss the problem characteristics in detail.
c) Explain AO* algorithm.

Q4) Attempt any two of the following : [2 × 4 = 8]


a) Write a detailed note on script.
b) Differentiate between supervised and unsupervised learning.
c) Translate the following statements in First Order Predicate Logic (FOPL).
i) Mohan Likes all kind of food.
ii) Grapes and vegetables are food.
iii) Anything anyone eats and not killed is food.
iv) Preeti eats cashew and is still alive.

Q5) Attempt any one of the following : [1 × 3 = 3]


a) Explain predicate logic with example.
b) Explain Means End Analysis with example.



[6158]-54 3
Total No. of Questions : 5] SEAT No. :
P-6455 [Total No. of Pages : 3

[6158]-55
T.Y. B.C.A. (Science)
BCA 355 : CLOUD COMPUTING
(2019 Pattern) (Semester - V)
Time : 2 Hours] [Max. Marks : 35
Instructions to the candidates :
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw labelled diagram wherever necessary.

Q1) Attempt any Eight of the following. [8×1=8]


a) ________ of the following cloud concept is related to sharing and pooling
the resources.
i) Polymorphism ii) Virtualization
iii) Abstraction iv) Inheritance
b) ________ of the following can be identified as a cloud.
i) Web application ii) Intranet
iii) Hadoop iv) HTML
c) A hypervisor some time called as _______
i) VMS ii) VMA
iii) VMM iv) VMR
d) Cloud computing doesnot require that _________ and software be
composable.
i) Database ii) Web app
iii) HTML iv) Services
e) Cloud computing product named elastic compute was released in the
year _________
i) 2007 ii) 2006
iii) 2000 iv) 2010
P.T.O.
f) Microsoft Azure was released by ________ Vendor.
i) Amazon ii) Microsoft
iii) IBM iv) Dell
g) ________ Is the first step of the iterative seven step model migration
process.
i) Validation ii) Mapping
iii) Assessment iv) Augment
h) Azure DDOs is the service offered by ________
i) Google ii) Intel
iii) Microsoft iv) Amazon
i) _________ will be used to encrypt the data that will be stored in the
block chain.
i) Stereography ii) Cryptography
iii) Steganography iv) Crypto currency
j) ________ is the way of the future for industries seeking better security
and privacy.
i) Cloud computing ii) Cloud AI
iii) Block chain iv) Omni-Cloud

Q2) Attempt any four of the following : (Out of five) [4×2=8]


a) What is the Amazon Web service?
b) Write a note on Azure App service.
c) What is role of Kubeproxy in slave node?
d) What do mean by VPN?
e) Write note on any two open source software.

Q3) Attempt any two of the following : (out of three) [2×4=8]


a) What are the advantages and disadvantages of Iaas.
b) What are the types of virtualization in AWS? Explain.
c) Explain the challenges imposed by Multi cloud Environment.

[6158]-55 2
Q4) Attempt any two of the following : (Out of three) [2×4=8]
a) What is differences between Amazon S3 and Ec2?
b) Describe the role of cloud for Backup and Recovery.
c) Write a note on the limited cloud usage visibility challenge in cloud security.

Q5) Attempt any one of the following : (Out of two) [1×3=3]


a) What is computational Grid? Why it is needed?
b) Explain the insider threats in detail.



[6158]-55 3
Total No. of Questions : 4] SEAT No. :
P-6456 [Total No. of Pages : 3

[6158]-61
T.Y. B.C.A. (Science)
BCA 361 : DSE-IV-ANDROID PROGRAMMING
(2019 Pattern) (Semester - VI)
Time : 3 Hours] [Max. Marks : 70
Instructions to the candidates :
1) Figures to the right indicate full marks.
2) Draw diagram wherever necessary.

Q1) Attempt of the following. [5×1=5]


A) Choose the correct options :
a) A fragment can be used in ________ activities.
i) Single ii) Multiple
iii) Both i & ii iv) None
b) ________ class provides the functionality to use SQlite database.
i) SQlite open Helper ii) SQlite class Helper
iii) SQlite Fetch Helper iv) SQlite Fold Helper
c) The Table Layout groups views into ________.
i) Rows ii) Columns
iii) Layouts iv) Both i) and ii)
d) _________ is view which groups several items and display them in
vertical scrollable list.
i) Tentview ii) List view
iii) Button iv) List Item
e) The Android ________ provides you the API libraries and
developer tools necessary to build test and debug opps for android.
i) JDK ii) SDK
iii) ADT iv) AVD
P.T.O.
B) Answer the following : [5×1=5]
a) Define Image View.
b) Explain cursor in sqlite.
c) What is ADT?
d) Enlist the types of Menu.
e) Write the purpose of onCreate()method.

Q2) Answer the following : (Any five) [5×3=15]


a) How to get feedback after sending SMS?
b) Write an application to perform following operation using menu.
Menu Example
Enter string Lower case
Upper case

c) Write the use of on Create(), onUpgrade() and get writable Database


methods.
d) Explain Date Picker and Time Picker. List any three methods.
e) Explain the life cycle of Fragment.
f) Which methods are overriden while implementing an option Menu in
activity?

Q3) Answer the following : (Any five) [5×4=20]


a) Explain Architecture of Android.
b) Write steps for linking activities using intents.
c) Write an application to display data from Database. (any table)
d) Differentiate between:
i) Location based services and Google Map.
ii) Geocoding and reserve geocoding.
e) What is Layout? Expain the types of Layout.

[6158]-61 2
f) Design a Layout to read percentage from user on clicking OK Button,
display message.
if per > 70 then display "Distinction"
if per > 60 and per <70, display "First Class"
if per > 40 and per <50, display "Pass Class"
else display "Fail"
g) Explain the features of Android.

Q4) Answer the following : (Any five) [5×5=25]


a) Write an application to display Google Map using Intent.
b) Explain the lifecycle of Activity with suitable diagram.
c) Explain specialized Fragments in detail.
d) What is VideoView? How to optimized video view in List View.
e) Explain caveats and Warnings.
f) Write an application to send message using Intent.
g) Define :
i) ADT
ii) AVD
iii) Emulator.



[6158]-61 3
Total No. of Questions : 4] SEAT No. :

P-6457 [Total No. of Pages : 3


[6158]-62
T.Y. B.C.A. (Science)
DSE-V BCA-362 : PROGRAMMING IN GO
(2019 Pattern) (Semester - VI)

Time : 3 Hours] [Max. Marks : 70


Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw diagram wherever necessary.

Q1) A) Attempt the following : [5 × 1 = 5]


a) Which of the following is not a valid way to declare a variable in
Go?
i) var blint ii) var b = 10
iii) var b int iv) int a = a
b) What is the output of following Go program?
import “fmt”
func main ( ) {
var b[2] int
b[1] = 20
b[2] =20
fmt.println (b[1]+b[2])
i) 40 ii) 20
iii) 21 iv) 19
c) Which version of Go Language was released in february 2018?
i) 1.50 ii) 1.20
iii) 1.10 iv) 1.30
d) What is another name for Go?
i) Golang ii) Goo
iii) GoL v) Goint
P.T.O.
e) _______indexing can not be used in an array.
i) Positive ii) Negative
iii) Increment iv) Decrement
B) Attempt the following : [5 × 1 = 5]
a) What is workspace?
b) What are trickers?
c) What is the method?
d) In which year Go language was designed?
e) ‘Functions can also be send as parameters’ comment.

Q2) Attempt the following (Any five) [5 × 3 = 15]


a) What is the difference between print and println? Explain.
b) What do you mean by functions as value in Go?
c) How to display allor specific element from a slice?
d) Differentiate between function and method.
e) Explain unbuffered channel.
f) What are import paths?

Q3) Attempt the following (Any five) [5 × 4 = 20]


a) Write a program to delete a file in Go.
b) Write a program in Go to create a simple buffered channel of string with
capacity of 3.
c) Can a method accept both pointer & value?
d) How to add element in an already existing slice?
e) Write a syntax of function in Go land.
f) Explain if-else statement with syntax.
g) Write a note on type assertion and type switches.

[6158]-62 2
Q4) Answer the following (Any five) [5 × 5 = 25]
a) Explain concept of recursion with example.
b) Explain how to use new keyword for creation of structure instance?
c) Explain methods with struct type receiver.
d) What are table tests?
e) What is benchmarking?
f) Write a program in Go language to accept two strings and compare
them.
g) Write a program using function to print addition and subtraction where
both the values are returned by function and accepted in main and then
printed.



[6158]-62 3
Total No. of Questions : 4] SEAT No. :

P-6458 [Total No. of Pages : 3


[6158]-63
T.Y. B.C.A. (Science)
BCA-363 : (DSE-VI) SOFTWARE PROJECT
MANAGEMENT
(2019 Pattern) (Semester - VI)

Time : 3 Hours] [Max. Marks : 70


Instructions to the candidates:
1) Figures to the right indicate full marks.
2) Draw diagram wherever necessary.

Q1) Attempt the following : [5 × 1 = 5]


A) Choose correct option :
a) Interviews are conversations with _________.
i) friendliness ii) fun
iii) purpose iv) informality
b) _________ estimation method works well for a tiny, low number
of user stories.
i) Bucket ii) Planning poker
iii) Analogous iv) Dot voting
c) _________ is used when you need to manage lots of tasks with
different due dates.
i) Project chart ii) Project calendar
iii) Project diagram iv) Project timeline
d) The critical path is _________.
i) the shortest path ii) the longest path
iii) mixture of both iv) path from starting node
e) Activity in network diagram is represented by ________.
i) Arroues ii) Circles
iii) Squares iv) Rectangles

P.T.O.
B) Attempt the following : [5 × 1 = 5]

a) What is virtual team?

b) Define predictive control.

c) What is project?

d) Define the term Milestone.

e) What is an activity?

Q2) Attempt the following (Any five) : [5 × 3 = 15]

a) Explain the forward pass technique with example.

b) Write a note on project planning.

c) Write a note on PMBOK.

d) Describe the cost control in project management.

e) Differentiate Non-agile and Agile project.

f) Discuss the organizational behaviour with an example.

Q3) Attempt the following (Any five) : [5 × 4 = 20]

a) Discuss the project life cycle in detail.

b) Explain the Gantt chart with an example.

c) List and explain the different activity relationships in detail.

d) Explain software configuration management.

e) Explain project scheduling in an agile team.

f) What is health and safety management?

g) Discuss the program and portfolio management in detail.

[6158]-63 2
Q4) Attempt the following (Any five) : [5 × 5 = 25]
a) Write detailed note on Work Breakdown Structure.
b) Explain PERT chart with an example.
c) Explain the backward pass technique in detail.
d) Explain the visualizing progress in detail with an example.
e) How to effectively track progress on agile projects.
f) Discuss about the different types of motivation.
g) List out the project knowledge areas and explain it.



[6158]-63 3
Total No. of Questions: 5] SEAT No. :
P6459 [6158]-64
[Total No. of Pages : 4

T.Y.B.C.A (Science)
BCA 364 : SEC III : MANAGEMENT INFORMATION SYSTEMS
(2019 Pattern) (Semester-VI)
Time : 2 Hours] [Max. Marks : 35
Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw Diagram wherever necessary.

Q1) Attempt any eight of the following. [8×1=8]


a) Summary transaction data, high volume data and simple models are
information inputs characteristic of
i) Decision support system
ii) Management Information system
iii) Executive support system
iv) Transaction Processing system

b) What is the base for any application of MIS in various sectors.


i) Analytical Processing
ii) Transaction Processing
iii) Information Processing
iv) Objective Processing

c) Which of the following is one of the method for data or information


collection?
i) Book writing
ii) Objectives
iii) Observations
iv) Paper writing
P.T.O.
d) BPR Stands for _____
i) Business Process Re-engineering
ii) Business Product Re-engineering
iii) Better Process Re-engineering
iv) Better Product Re-engineering

e) EMS stands for ____


i) Enterprise Management systems
ii) Enquiry management systems
iii) Engine management systems
iv) Editable management standard

f) DRDD stands for ____


i) Derivation RDD
ii) Deriviable RDD
iii) Divide RDD
iv) Division RDD

g) GDSS stands for_____


i) Group Decision support systems
ii) Grand Decision support systems
iii) Group Division Support systems
iv) Grand Division supply systems

h) KBES stands for _____


i) Knowledge Based Expert systems
ii) Knowledge Basic Expert Systems
iii) Knowledge Basic Enquiry systems
iv) Knowledge Basic Enter Systems

[6158]-64 2
i) EDI stands for _____

i) Electronic Data Processing

ii) Electronic Data Interchange

iii) Electronic Division Processing

iv) Electronic Data Provision

j) Which of the following is the reason for using computers in DSS?

i) Decreased Productivity

ii) Increased Productivity

iii) Slow Computations

iv) Mismagement of Data

Q2) Attempt any four of the following [4×2=8]

a) State various components of GDSS.

b) What is CRM?

c) What is DSS?

d) What is Financial MIS?

e) State various phases of BPR

Q3) Attempt any two of the following. [2×4=8]

a) State various characteristics of MIS.

b) Explain what if analysis.

c) What are various types of supply chain models?

[6158]-64 3
Q4) Attempt any two of the following [2×4=8]
a) Explain Enter prise management system with diagram.
b) What are different types of Decision support systems?
c) What are various applications of marketing management?

Q5) Attempt any one of the following [1×3=3]


a) Write a short note on applications of VSM.
b) Write a short note on various tasks of information management.



[6158]-64 4
Total No. of Questions : 5] SEAT No. :

P-6460 [Total No. of Pages : 3


[6158]-65
T.Y. B.C.A. (Science)
BCA-365, SEC-IV : INTERNET OF THING (IOT)
(2019 Pattern) (Semester - VI)

Time : 2 Hours] [Max. Marks : 35


Instructions to the candidates:
1) All questions are compulsory.
2) Figures to the right indicate full marks.
3) Draw diagram wherever necessary.

Q1) Attempt any EIGHT of the following (out of TEN) [8 × 1 = 8]


a) _____ of the following is the way in which an IoT device is associated
with data.
i) Internet ii) Cloud
iii) Automata iv) Network
b) ______ of the following IoT networks has a very short range.
i) Short Network ii) LPWAN
iii) Sig fox iv) Short-range wireless network
c) ______ numbers of element in the open IoT architecture?
i) Two ii) Three
iii) Four iv) Seven
d) The protection and security for an embedded system made by ______.
i) Security chip ii) Memory disk
iii) IPR iv) OTP
e) “Interenet of things” coined in year ______.
i) 1998 ii) 1999
iii) 2000 iv) 2002

P.T.O.
f) MQTT is mainly used for _________.
i) M2M communication
ii) Device communication
iii) Internet communication
iv) Wireless communication
g) ___________ is an open standard.
i) CoAP ii) MQTT
iii) XMPP iv) HTTP
h) Request field is present in _______ message format.
i) Request Message ii) Response Message
iii) Both (i) & (ii) iv) None
i) SDLC stands for ________.
i) Synchronous Data Link Control
ii) Synchronous Data Level Control
iii) Synchronous Data Level Coordinator
iv) Synchronous Data Link Coordinator
j) Using _______ an embedded system communicate with outside world.
i) Memory ii) Output
iii) Peripherals iv) Input

Q2) Attempt any FOUR of the following : (out of FIVE) [4 × 2 = 8]


a) What are the challenges for secure IoT?
b) Enlist the characteristics of Embedded system.
c) What is SCADA?
d) Write Need of Analog/Digital conversion.
e) What is LoRa?

[6158]-65 2
Q3) Attempt any TWO of the following. (out of THREE) [2 × 4 = 8]
a) Difference between Realtime system and Embedded system.
b) M2M and WSN protocols with example.
c) Define IoT? Write a trends in Adoption of IoT.

Q4) Attempt any TWO of the following. (out of THREE) [2 × 4 = 8]


a) Difference between General processors and Embedded processors.
b) Write a basic building Block of IoT.
c) Explain key elements of IoT security.

Q5) Attempt any ONE of the following. (out of TWO) [1 × 3 = 3]


a) Difference between AWS and Skynet.
b) Define :
i) M2M
ii) WSN
iii) MQTT



[6158]-65 3
Total No. of Questions : 7] SEAT No. :
P8769 [Total No. of Pages : 4
[6158]-101
S.Y. B.C.A. (Science)
BCA - 404 : OOSE
(2016 Pattern) (Semester - IV)

Time : 3 Hours] [Max. Marks : 70


Instructions to the candidates:
1) Question No. 1 (A and B) are compulsory.
2) Attempt any two questions from Group - I.
3) Attempt any two questions from Group - II.
4) Figures to the right indicates full marks.

Q1) A) Choose the appropriate options: [7×1=7]


a) Which of the following is not an inheritance type?
i) Multiple ii) Multilevel
iii) Natural iv) Hybrid
b) Which of the following is used to tie elements of UML together?
i) Threads ii) Elements
iii) Protocol iv) Relationships
c) Fundamental Principle designed to handle similar variations in a
system is known as
i) Inheritance ii) Polymorphism
iii) Abstraction iv) None
d) Which symbol is used to show multiple objects :-

i) ii)

iii) iv)

P.T.O.
e) The types of events in behavioural modeling can be classified into

i) External ii) Internal

iii) Self linked iv) (i) & (ii) both

f) Activity diagrams contain :-

i) Activity states and transitions

ii) Branching and swim lanes

iii) Forks and joins

iv) All of above

g) A physical element that exists at runtime and represents a


computational resource is known as

i) Component ii) Node

iii) Connection iv) None of above

B) Answer in one sentence: [7×1=7]

a) Define patterns.

b) What is collaboration diagram?

c) What do you understand by an event?

d) List any two uses of class diagram.

e) What are the components of a classifier?

f) Defime model.

g) What is meant by a Role?

[6158]-101 2
GROUP - I

Q2) Answer the following questions:

a) What is aggregation? Explain recursive aggregation? [5]

b) What is object diagram? Explain its symbols & notations. [5]

c) Write a short note on : - [4]

Process and Thread

Q3) Answer the following questions:

a) What do you understand by Generalization? Explain with example. [4]

b) Draw use-case diagram for college administration system. [4]

c) Discuss the advantages and disadvantages of frameworks. [3]

d) Define Design view, Process view and implementation view of UML.[3]

Q4) Answer the following questions:

a) Draw sequence diagram for ATM - withdraw transaction. [4]

b) Explain uses of component diagram with examples. [4]

c) Draw activity diagram for opening a savings bank account in the bank.[3]

d) List the guidelines for drawing a class diagram. [3]

[6158]-101 3
GROUP - II

Q5) Answer the following questions:

a) Explain the component and uses of Interaction diagram. [5]

b) What is multiple inheritance? Explain with example. [5]

c) Explain the need of deployment diagram with example. [4]

Q6) Answer the following questions:

a) Draw a class diagram for Hospital management system, consisting of


atleast three classes. Define appropriate attributes with visibility,
relationships, association with multiplicity. [4]

b) Explain state-chart diagram with example. [4]

c) Draw use-case diagram for online grocery shopping. [3]

d) Explain relationships in UML. [3]

Q7) Answer the following questions:

a) Explain the uses and extend relationships with appropriate example. [4]

b) Distinguish between Aggregation and Association. [4]

c) Draw a sequence diagram for online railway reservation system. [3]

d) Define the following :- [3]

i) Dependency

ii) Attributes

iii) Binary association


[6158]-101 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy