0% found this document useful (0 votes)
90 views7 pages

Supplementary Papers - Semester 2

supplementary

Uploaded by

mocetow663
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views7 pages

Supplementary Papers - Semester 2

supplementary

Uploaded by

mocetow663
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Case

St
(Please write your Exa. n Roll No ..392.3).6e.J.9.2.3..
SUPPLE saAMINATION
SECO1 MCA], JUNE, 2024
Paper Code: MCA-102 Subject: Data And File Structures
Maximum Marks: 60
Time: 3 Hours
Note: Attempt allquestions as dirccted. Internal choice is indicated.
(4 x 5 = 20)
1. Answer any four of the following questions:
(aWrite a C Program/algorithm to implement two stacks using asingle array.
Depict your answer
(b)Why Binary Search algorithm is more efficient that linear search?
algorithms
two
with suitable example? Mention the time complexity level oflink list. How can you check
(c) Write the routine to convert a singly link list into circular
weather the circular queue is empty and full.
midsquare hashing
()What is hash table? What are the properties of hash function? Explain
function.
string is present in a given string or not? If
(e)Write a program in C to check a particular sub
found print its location /CD
Evaluate the following postfix expression step by step using the algorithm A BC*
()
*+CB * -, where A-6, B-2, C=3 and D=4
(g) Elaborate M way search tree.
expression: ABLMKNPQ and Infix expression: LBMANKQP.
Draw the
(h) Given Prefix
1,44,55,20
the following list 54,26,93,17,77,3
tree
the passes using Shell sort for
(i) Show all element in last
Create a circular link list and insert an
UNIT -I 5
used to represent a polynomial 5x3 +4x2 +3x+2? Give an
2. (a) How a linked list can be polynomials using linked list
algorithm to perform addition of two middle of the singly linked list. If the number of
5
find the
Write a function in Cis to would so return the second
middle
(b) there be two middle nodes,
nodes are even, then
5
node. cycle in link list.
algorithm that detects and removes a linked list.
3. (a Formulate an list. Write a function in C such that you reverse a
linked
b Given a
UNIT - II 5
steps to create a B-tree. Construct a B-tree of
about B-trees? Write the 40.
What do you know 23, 41, 78, 100, 234, 122, 199, 10,
4.a) values 34, 45, 98, 1,
a min-heap. Explain and
how 5
order 4 and insert the characteristics of a max-heap and
insertion
Discuss the properties and during
(b) that these properties are maintained
heapify operations ensure 5
deletion operations. following
heap sort using heap.
5
by inserting
Write a function in Cfor binary tree. Construct an A VL tree rotations after inserting
5. (a) Compare AVL trees with number of left and right
(b) elements one by one and count the total
72, 78
elements l6, 27, 9, 11, 36, 54, 81, 63,
all the
UNIT - II algorthim 5
in graph traversal. Developan
breadth-first search (BFS)
(a)Explain the concept of (BFS).
6. search
for breadth-first
(b) Develop an algorithm for Warshall's algorithm to compute the shortest distances between
5
all pairs of vertices in a weighted directed graph.
(a)Compute the Minimum Spanning Tree and its cost for the following graph using Prim's 5

Algorithm. Indicate each step clearly.

15

11

5
(b) Explain the concept of topological sort for the following directed acyclic graph (DAG).
B

UNIT -1V
8(2Y Write aprogram in Cthat merges content oftwofiles into athird file. 10
b) Explain the concept of polyphase merge and how it differs from conventional merge sort 5
algorithms.
9.(a) Explain howsequential file access differs from indexed file access. 3
(b) Consider inserting the keys 10, 22, 31, 4, 15, 28, 17, 59, 88 into a hash table with m=11 7
slots using open addressing with primary hash function hl(k)-k mod m. Illustrate the
inserting of these keys using linear probing, using quadratic probing with cl=l and c2-2
and using double hashing with h2()= 1+(kmod(m-1)
Roll No.
Bharati Vidyapeeth's
Institute of Computer Applications and Management (BVICAM)
A-4, Paschim Vihar, New Delhi-63
SECOND SEMESTER .MCAJ Reappear Examination, June 2023
Paper Code: MCA-104 Subject: Object Oriented Software Engineering
Time: 3 Hours Maximum Marks: 60

Note: Question No. 1is compulsory, and attempt one question from each unit.
2x 10 = 20
1. Answer all the following questions briefly: -
CO6
Ja Contrast error to a fault.
b) Describe the purpose of a UML activity diagram. Provide an example scenario
CO1

where an activity diagram would be used in software development.


diagram. CO2
Explain the difference between a UML class diagram and a UML object
Provide a brief example for each to illustrate their use.
to extend the CO1
d) Provide an example of a stereotype and explain how it can be used
standard UML elements.

(Y Discuss the use of packages in UML diagrams. How do packages help in organizing CO1
and managing the complexity of large systems?
Differentiate between a scenario and a use case? CO6

Le Explain the concept of multiplicity in UML. How is multiplicity represented


CO5
in a class diagram, and why is it important in modeling relationships
between classes?
CO1
or Contrast between the different interaction diagrams?
Discuss the importance of pair programming? CO6
CO6
List the principles of agile software development.
UNIT- I

5 CO1
2. (a) Maintaining traceability during requirements and subsequent activities is
expensive, because of the additional information that must be captured and
maintained. What are the benefits of traceability that outweigh this
overhead?
Explain the role of UML in software architecture. How does UML help in 5 CO2
(b)
designing and visualizing the architecture of a software system?
CO1
3. Elaborate is-a relationship in detail with suitable example? 5

6) Describe the various architectural views that can be represented using UML. 5 CO2
How do these views help in understanding and communicating the software
architecture?
UNIT-II

4. (a) Analyze the relationship between a class and object diagram with an 5 CO3

appropriate example?
Page 1 of 2
5 CO3
(b) Case study: Online Shopping Paragraphs Corporation sells books and CDs
using through online shopping. The customer adds items to her shopping cart.
She may remove items or go to the check-out to make her purchases at any
time. The customer reviews her purchases, chooses a payment method and
pays. Asales employee at Paragraphs Corporation gets the order and purchase
confirmation from the system, and sends the electronic order to the warehouse.
The warehouse employee updates the order status. The customer may check the
order status. Model the above scenarios through a Use case Diagram
5 CO3
5. (a) Acompany wants to develop a new software system to manage its inventory.
They need a system that can track items., suppliers, purchase orders, and sales
orders. Create a UML class diagram that represents the main entities and their
relationships in this system. Include attributes and relationships between the
classes.
part CO2
An Online Public Access Catalog (OPAC) is an e-Library website which is
5
(b)
of Integrated Library System (ILS), also known as a Library Management
System (LMS), and managed by a library or group of libraries. Patrons of the
library can search library catalog online to locate various resources books.
periodicals, audio and visual materials, or other items under control of the
library. Patrons may reserve or renew item, provide feedback, and manage their
account. Model the above scenarios through a Use case Diagram.
UNIT - III

With appropriate example, justify the purpose of construction phase in object


5 CO4
6 (a
oriented analysis model.
5 CO5
(b) Evaluate the Iterator design pattern with an appropriate example?
5 CO4
7. (a) Explain the concept of design patterns and their importance in software
development.
(b) Elaborate the need of various design patterns through appropriate examples. 5 CO5
UNIT - IV

Elaborate the XP practices that embody the basic practices of Extreme 5 CO6
8. (a)
Programming?
Contrast the various types of black box testing strategies? 5 CO5
(b)
Analyze the stakeholders that affect a scrum project? 5 CO6
9. a)
Evaluate the testing process lifecycle? 5 CO5

Page 2 of 2
Roll No.
Bharati Vidyapeeth Management
s (BVICAM)
Institute of Computer Applications and
A-4, Paschim Vihar New Delhi-63
SECOND SEMESTER [MCAResmnear Examination, May 2024
Subject: Python Programming
Paper Code: MCA 106
Maximum Marks: 60
Time: 2 Hours
compulsory, and attempt ont
oes Atempt THREE questions in all. Oteetien No. 1 is
question from cach unit.
2.5 x 10 = 25
1 Answer all the following questions briefly:
a) Differentiate between break and continue statement with example.
() Compare and contrast packages with composition.
(9 Create a simple phone book program that stores names and phone numbers
in a dictionary
List the differences between set and frozen set

) Ilustrate the life cycle ofa thread.


) Explain the significance of finally block in exception handling.
gyArieuizie dcancant nf polvmarphism relating python programming with
real-world application.
b Explain map) and zip) function vith example.
) Justify the purpose of "kwargs parameters
Y Discuss grid) method of Tkinter.

(a) Write a Python program to find roots of a quadratic equation.


5
2
(b) Articulate concept of scope and lifetime of variables in Python Programming
5

language with help of an example.


3. a Define short circuit evaluation performed by Python with help of an 5

example.
Demonstrate the working of followingg statements along with syntax 5

and example
i) for loop
i) while loop
UNIT- 1II

4. (ay xplain the significance of a Dictionary in Python Programming


language.
Write four methods available in the dictionary along with example.
Page 1of 2
(b) Write a program to copy oda nuhber of lines from
one file to another.
5. (a) Demonstrate a program to sort a lIist without using
built-in function.
(b) Evaluate the purpose of using strings in python and explain few
methods with
example.

6. (a) Discuss Synchronization using locks and semaphores with example.


(b) Demonstrate the concept of multiple inheritance througha program.
7. (a) Write a program to overload addition operator in python.
(b) Create a class to find cube of a number entered by the user. Throw an
exception if string is given as input by user.

8. (a) With help of a python script, plot a bar chart using seaborn library for
number of boys and girls present in a class.
(b) Mention two ways of creating a 2-D array. Explain 5 functions that can
be performed on 2-D array with help of an example.
9. (a) Create a radio button, check box, and drop-down menu using Tkinter
library.
(b) Explain the process of database connectivity in Python.
(Please write your Exam Roll
No.) Exam Roll No ....
END TERM EXAMINATION
Paper Code:SECOND
MCA -120
SEMESTER SUPPLEMENTARY YEXAM [MCA| MAY, 2024
Subject: Software Testing
Time: 3 Hours Maximum Marks: 60
Note: Attempt FIVE questions in all. Question No., 1is scompulsory and attempt one question from
each unit.
1. Ansyer all the 2x 10- 20
eA.ist threc following questionsof briefly'
major objectives testing.
Wny test plans are necessarv to conduet
the testing of any softwarc.
O)Explain unit testing.
4d Discuss control flow
testing, taking an exanple.
eSummaries
List
various test approaches
various disadvantages of
BVA.
g Discuss the Equivalence Partitioning
Or Compare product and project risks. method of testing.
() Determine various skills of tester in agile teams.
Y Differentiate between traditional and agile testing?

UNTT -1
2. (a) Differentiate between testing and debugging.
(b) Discuss various test process stages.
3 (a) Illustrate with the help of an example how slice-based testing is done.
(b) Explain data flow testing in detail.
UNIT-I
4. (a) taking an example. Write the importance of
Illugrate Boundary Value Analysis (BVA) 5

BVA.
(b) ilTerentiate between regression testing and mutation testing.
S
page
5. (a) Take an example of login into a wcbpage and illustrate state transition testing of the
with various cases.
(b) List various disadvantages of Use Case testing.
5

UNIT -III
associated with test management.
6. (a) Describe various components
b) Illustrate various components of the test strategy.
ways of test estimation techniques.
A (a) Elaborate on various quadrant in detail.
Develop a risk analysis plot and describe each
(b)
UNIT -IV
llustrate Test Driven Developments and write the benefits of it.
8. (a) test processing.
5
(b)/Describe the steps followed in automatedtesting and explain them in detail taking suitable 5
various levels of object-oriented
9, (aX List
examples.
Briefly describe agile testing Scrum. State
various phases of Extreme programming. 5
b)

Page 1 of 1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy