0% found this document useful (0 votes)
17 views

Bsc

The document outlines examination details for various computer science courses, including unique paper codes, course names, paper names, semester durations, maximum marks, and instructions for candidates. It includes questions on discrete structures, database management systems, multimedia systems, and information security, requiring students to attempt any four questions from each section. Each question covers topics such as graph theory, SQL commands, normalization, multimedia environments, and cybersecurity threats.

Uploaded by

nancygupta1907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Bsc

The document outlines examination details for various computer science courses, including unique paper codes, course names, paper names, semester durations, maximum marks, and instructions for candidates. It includes questions on discrete structures, database management systems, multimedia systems, and information security, requiring students to attempt any four questions from each section. Each question covers topics such as graph theory, SQL commands, normalization, multimedia environments, and cybersecurity threats.

Uploaded by

nancygupta1907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Unique Paper Code : 32341202-OC

Name of the Course : B. Sc. (Hons.) Computer Science (Old Course)


Name of the Paper : Discrete Structure
Semester : II
Duration : 2 Hours
Maximum Marks : 75
Year of Admission : 2015-2017
Instructions for Candidates: Attempt Any Four questions. All Questions carry equal marks.

Q1. For the following given graphs G1 and G2, show whether G1 and G2 are bipartite?
Find the incidence matrix for the given graphs G1 and G2. Determine whether G1
and G2 are planar, if yes, how many regions are there in each graph? Determine
chromatic number of the given graphs?

G1 G2

For each of the following graph, give the value of n for which it is bipartite. Kn, Cn,
Wn

Q2. Use Master method to find asymptotic bounds for the following recurrence relation:
T(n) = 2T (𝑛/4) + √𝑛 + 24

(a) Find S6a and S-3a for the following numeric function ar

1 0 ≤ 𝑟 ≤ 10
ar = { }
2 𝑟 ≥ 11

Q3.Dr Show all the steps of Bubble Sort to put the following list of items in an increasing
order:

3 1 5 9 2 6 4 7 11 5

The number of comparison in bubble sort is n (n – 1) / 2. Prove that it is Θ(n2). Also


find suitable values of C1, C2 and K.
Q4. For the following given matrix AR, Show AR is a Partial Ordering Relation. Draw
the digraph and Hasse diagram for given relation.

1 0 1 1 1
AR = 0 1 1 1 1
0 0 1 1 1
0 0 0 1 0
0 0 0 0 1

Assume f(x) = 2x2 + 10 and g(x) = x + 6. Find the composition f o g and g o f.

Q5. Find the total solution (homogeneous and particular solution) of the given
recurrence relation:

ar + 5 ar-1 + 6 ar-2=42 . 4r

with a2 = 278, a3 = 962

Q6. Convert the following statement in symbolic form:


S1: If a woman is married, she is happy.
S2: If a woman is happy, she lives longer.
Show that “Woman lives longer” is a valid conclusion. “If women is not married
and either women is married or women is happy then women is happy.” Prove that
the given statement is a tautology. Also find inverse, converse and contra-positive
for the given statement S1.

Consider the word “CORONAVIRUS”. Calculate in how many ways these letters
can be arranged. Calculate in how many ways the letters can be arranged such that
the vowels should always come together.
Set : B
Unique Paper Code : 32341403
Course : B. Sc. (H) Computer Science
Paper : Database Management Systems
Semester : IV
Duration : 2 Hours
Maximum Marks : 75
Attempt any FOUR questions
All questions carry equal marks
(For courses effective from Academic Year 2015-16)

Q1 Consider the following case study:


BookMyEvent is an online booking website which allows customers to book
tickets for events, shows and artists’ performances.

The site stores details about various performance artists that the customers might be
interested in such as the artist’s name, gender, date of birth, latest work. Artists are
associated to an artist category, namely, comedy, tragedy, theatre, T.V. artist. Each
category has a code, a title and a description and most categories have several
artists, although some are not populated yet.

Artists may perform at many different events. All events have an id, a name, a
description, start time, and duration. An event may have many news stories released
about it, namely, ‘new show in city’ or ‘successfully running for many weeks’, to
develop interest in the events. Event news has an id, title, author and date.

Events are held at a specific venue. Venues have a name, address, lead contact,
seating capacity, star rating. Star ratings are stored with a number, 1-5.

Many tickets are sold for each event. Tickets include a number, type, such as
standard or VIP and a price. Each ticket is for one event only. Customers have to
register on the system before they can reserve tickets. They must add standard
information including name, address, email, and contact number. A customer can
buy many tickets for an event though a ticket is for one event and one customer.

For the above given case study, identify the entities and relationships with their
associated attributes, cardinality ratio, and participation constraints. Also, identify
subclasses for entities, if they exist. Then, based on these, draw an Enhanced Entity-
Relationship Diagram. Clearly state any assumptions you make.

1
Q2

Study the above ER diagram. For each of the relationships, find the cardinality
ratio, and participation constraint values. Map the ER diagram to the relation
schema. Clearly show all the steps. Mention all the primary and foreign keys for
each relation. Clearly state any assumptions that are made.

Q3 You are hired as a database designer for an animal adoption agency. You
designed the following relations.

Animal (AnimalID, Name, DateAdmitted, PreviousOwnerID)


Adopter (ID, Name, Address, OtherAnimals)
Adoption (AnimalID, AdoptDate, PrevOwnerID,
CurrentAdopterID)
MedicalRecord (AnimalID, age, vaccine, prescription,
dosage)

 The underlined attributes are the primary keys.


 The relation Animal stores the information about the animal.
DateAdmitted is of Date data type. The PreviousOwnerID value
should be NULL by default. It references the ID attribute in the relation
Adopter.
 The Adopter relation stores information about the person who adopts the
animal. The attribute OtherAnimals should allow values as Yes or No
only.
 The Adoption relation depicts the relationship between the relations
Animal and Adopter. AdoptDate should be of Date data type and
should not be NULL. PrevOwnerID and CurrentAdopterID refer to
the ID attribute of the relation Adopter and may or may not be the same.
 AnimalID attribute in the MedicalRecord relation references the
AnimalID attribute in the Animal relation.

2
For the above relations, answer the following questions using SQL:

 Write CREATE TABLE command for each of the tables. You must use
data types, PRIMARY KEY constraint, and FOREIGN KEY constraint, as
applicable. Implement the other constraints mentioned above
 For each of the given relations, write a command to INSERT one row with
appropriate values

Q4 Consider the relations in question 3.

Design four queries in English language. The first query should involve a join and
should display the results in a sorted fashion. The second query should involve an
aggregation operator and the group by clause. The third query should update the
data (based on a condition) in one of the tables. The fourth query should delete all
the data in one of the tables.

Write the corresponding SQL queries for any of the three English queries.
Write relational algebra queries for any one of the English queries.

Example: If you were to write a query using WHERE clause, you might answer as
follows:
English query: Find name of the animal whose AnimalID is
234567.
SQL query: SELECT Name
FROM Animal
WHERE AnimalID = 234567;

Q5 Consider a relation R (A, B, C, D, E, F) with the following set of


functional dependencies
F = {AB  C, DC  AE, E  F}

Find any two keys for the given relation? Is this relation in 2NF? If not, state the
reason and decompose this relation until each of the decomposed relations are in
2NF.

Q6 Consider a disk with block size B = 1024 bytes. A block pointer is P = 8


bytes long and a record pointer is PR = 10 bytes long. A file has r =
102,000 Book records of fixed length. Each record has the following fields:
BookID (6 bytes), Name (30 bytes), Author (30 bytes),
Publisher (30 bytes), Year (2 bytes), PrintedCopies (2
bytes). Assume that the file is ordered by the key field BookID.

 Calculate the record size R for the file in bytes.


 Assuming the un-spanned organization, calculate the blocking factor and the
number of file blocks b required to store all the records.
 Calculate the number of block accesses required for searching a record in
the data file using binary search.

3
Suppose that we construct a primary index on BookID for the above file.
 Calculate the size of an entry in the index Ri.
 Calculate the index blocking factor bfri
 Find the total number of index entries ri and the number of index blocks,
bi.
 Calculate the number of block accesses required for searching a record in
the data file using this primary index.

4
Unique Paper Code : 62341201

Name of the Course : B.A. (Prog.) Computer Applications (Old Course)

Name of the Paper : Database Management Systems

Semester : II

Duration : 2 Hours

Maximum Marks : 75

Instructions for Candidates:

Attempt any four questions. All questions carry equal marks.

Q1. Consider the following table EMPLOYEE. Identify the types of problems that
may occur while performing insert, delete or update operations in the table. Give
suitable examples for each of the problem.

EMPLOYEE
Emp_id Emp_Name Emp_Address Emp_Dept
101 Rick Delhi D001
101 Rick Delhi D002
123 Maggie Agra D890
166 Glenn Chennai D900
166 Glenn Chennai D004

Q2. Consider the following table BOOKS:


BOOKS
Bookid Title Author Price

101 DBMS Varuna 600

102 Computer Fundamentals Brijesh 650

103 Python Swati 450

104 C++ Vaani 500


Give the output that will be produced on execution of the following SQL
Commands:

SELECT COUNT(*) FROM BOOKS;

SELECT Title , SUM(Price) FROM BOOKS GROUP BY Title;

UPDATE BOOKS SET PRICE=700 WHERE Author= Varuna ,;

INSERT INTO BOOKS VALUES (105, , KELVIN ,700);

ALTER TABLE BOOKS ADD Publisher;

SELECT Title, Author FROM BOOKS WHERE Price BETWEEN 400 AND 600;

Q3. Consider the following relation instances R1 and R2:

R1
Roll No. Name
1001 Amit
1002 Sunil
2001 Ojas
2002 Radha

R2
Roll No. Name
1004 Ankit
1005 Sunil
2002 Radha
1001 Amit

Display the result of following operations:


R1 UNION R2, R1 PRODUCT R2, R1 INTERSECTION R2, R1 DIFFERENCE
R2, R1 JOIN R2, and R1 LEFT JOIN R2.

Q4. Consider the following table Work_Allocation:


Stud_id, Stud_Name, Collge, Project_id, Project_Name, Project_marks

Following are the functional dependencies for the above table:

Stud_id Stud_Name, College

Project_id Project_Name
RollNo, Project_id Project_marks

Reduce the table Work_Allocationin the Ist normal form (1NF) into third normal
form (3NF) and identify the primary key in each of the resulting tables.

Q5. Consider the following table STUDENT with following attributes:

Attribute Data Type


Stud_id INTEGER(6), UNIQUE, NOT
NULL
Name VARCHAR (12), NOT NULL

Address VARCHAR (15)

Course_id INTEGER (2), NOT NULL

University_rollno INTEGER(6), UNIQUE, NOT


NULL

Identify the candidate keys in the table STUDENT.

Give SQL command to create the table STUDENT using suitable data types and
constraints, define a suitable primary key for the table.

Populate the table STUDENT with information of four students.

starts

Add

U all the students with suitable values in the table.

Q 6. A Company maintains the following tables for its Database :


Table Attributes
Executive E_Id, Name, Address, Salary, Date_of_Joining,
Product P_Id, Name, Price
Customer C_Id, Name
Invoice_No, Date_of_Purchase, P_Id, E_Id, C_Id,
Order
Quantity

Construct an ER diagram where an invoice is given by the executive. Each


executive can write many invoices but each invoice is written by only one
executive. The invoice is written for a single customer but each customer can
have many invoices.
Unique Paper Code : 62344414

Name of the Paper : Multimedia Systems and Applications

Name of the Course : B.A. (Programme) Discipline Course

Semester : IV

Duration of Examination : Two Hours

Maximum Marks : 75

Year of admission : 2015, 2016, 2017

Instructions for Candidates:

Answer any FOUR questions out of SIX given in the question paper.

All questions carry equal marks.

Q1. Describe different environments in which multimedia can be used. Give three aspects of
multimedia that make it superior over other forms of information presentation.

Q2. Describe primary multimedia delivery methods. You have been given the task of creating a new
website for your college. What tools will you use to create the dynamic webpages?

Q3. Differentiate between animation and virtual reality. Describe the types of animation techniques.

Q4. Describe the terms anti-aliasing, rollovers, auto-tracing, dithering.

Q5. Describe hardware components that are used in multimedia projects. How do you evaluate the
appropriateness of multimedia authoring systems for a given project?

Q6. Compare the use of MIDI and digitized audio in a multimedia production. List the important
steps and considerations in recording and editing (any five) digital audio.
Unique Paper Code: 32345401
Name of the paper: Information Security and Cyber Laws
Name of the Course: Generic Elective (Computer Science)
Semester: IV

Duration: 2 hours Maximum Marks: 75


Instructions for Candidates:

Attempt any four questions.


All questions carry equal marks

Q1. Suppose you receive an e-mail saying “someone tried to login


into your Facebook account from a new device, if
it wasn’t you, please confirm your identity. Please
Sign in by clicking on the following link.” What form
of attack is this e-mail attempting? How should you respond to such e-
mails? List some other ways in which your system can be maliciously
attacked through e-mail?

Q2. What are three important aspects related to information security. Explain
each one in detail. List at least three kinds of damage a company could
suffer when the integrity of a program or company data is compromised.

Q3. Assume that you have found a pen drive in your parking area. You just plug
in the pen drive into your personal laptop to examine its content. What
threats might this pose to your laptop? What steps can be taken to mitigate
these threats? List different ways to safely determine the contents of the
pen drive? What are the four broad categories of payloads that a malware
may carry?

Q4. What is cryptanalysis? What are tasks performed by cryptanalysts? What


are the differences between substitution ciphers and transpositions?
Encrypt the message “hello, how are u” using the substitution
cipher and Rail-fence techniques with key =3.

Q5. What is risk analysis? List various steps involved in risk analysis? Explain
different strategies to deal with risk? Consider a situation where system
failure occurs as a result of overheating in a server room. List the
consequences of such failure. What are the assets which will be effected?
Identify the risks involved and suggest the solution to mitigate the
identified risks.

Q6. In e-commerce, safeguarding privacy of the customers is one of the


characteristics of company’s policies. List four other characteristics of such
policies and explain them with the help of an example. Who are audiences
of these policies apart from customers?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy