0% found this document useful (0 votes)
11 views20 pages

Computer Science 1

Uploaded by

Abera Birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views20 pages

Computer Science 1

Uploaded by

Abera Birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 20
Lemicory Ne & Department of Computer Science Faculty of Informatics Addis Ababa University Entrance Examination for the M. Se. Program in Computer Science — Soni fo ame Lem! — nl ee sf 1. Read the instruction and the questions early 2. Write your name anlyon this page. Wrtng your name onthe other pages wll automaaly isqulity you from this exam. 5 Answeall questions eligibly on the spss provided onthe question papers Plese make se that seatences are shor, rmmaiclly liz eres. You can ute backside fea pape wen spe isnot sufficient. In such case pleas indicates, 4 Thisenainaton booklet consis of 11 pages (ecding his cover age) Mak sure that the wee, 6. Use only the rough papers provided. Using other unauthorized papers wil be considered as cheating 17. Switch off your mobile phones. You ae not allowed fo ust mobile for any purpose, 8 You are not allowed ous cleulatorso any other electronic device. For Office Use Only Part Marks Part es) Part IL @5) Pare PartV Total aon) 1.2 a. Define coupling and cohesion, +b, How are coupling and cohesion used in modularzation rteria? (6 pons) @ points) @ Points) 13, Write pseudo cde fra fineton ile_copy that copies the conteat of one file to anew file. The fection {aks one argument, rina fl which eth pth othe eo be oped a ens the name of tbe file, Ian err ocurred, NULL shouldbe returned. The function wil bave the following signature: fuetonfite_copy (origina file: stig): copy file sing : points) "To write the function, ue the following builtin pseudo functions fr file manipulation: open(jile pat: suing, mode char): integer opens the le whose path is passed to ita an srgument ov rein file anda sets teen point at be Sst byte fhe le. On er, items 1. mode indiates the mode in which the files opened and it cn ake one ofthe following values: rw which stand for read and wrt, respectively. feloe(le_ handle: integer) ~closes the fle whose file handle i passed ois an argument. On the le ‘whose handle i passed as an argument atthe current end of file, On ror, itetums 1 file hon: etger): Bolen returns TRUE fed of Soi encountered, otherwise east FALSE. Pape-2- Ta ano for gun L3 may camino poe Pope) 1A. Consider the following binary search tee: Ie rot node 50, deleted, which node will, become the ew roe? Answer 4 poins) 1.5, Given the sorting algorithm represented in the following pseudocode, attempt the questions hat fallow. ‘Assume A has m clement, where the first index it 1 andthe lst inde sm 1: for i w-Ldowato 1 Degia sorted — TRUE forj— iti begin HtAgy < ay +1) then 'b, Whats the worst cas and conesponding computing tim fr this gorithm? poins) Whats the name ofthe sorting slgorthm represented with the above pseudo code? (@ points Paget 1.6 Consider linked list with data valuss sorte in descending order. The folowing is given a a sample. ier oS Le sk \Wiite an algorit that inserts an element nthe appropriate poston. Your algorithm must anda he special cases. Make your writing cles, otharwiso marks wil be deducted Page 5. (6 points) Part Il: Computer Architecture and Operating Systems (25 points) 2.1 For interactive operating systems, wrt the advantages of preemptive scheduling algorithms over the noa- preemptive scheduling algorithms. © pois) 2.2 Bxphin wy cache memory, in adtion o RAM or primary memcry) is needed in computer systems. a) 223. In process smapping, wit briy hw imptant procs relation is 2.4. Givetwo posible methods that re wed to ede disk as tine. @ 172 points) pert SS 2 pins) » 225 Consider he ntl 8086088 microprocessor attire one the following onto point) a What ste ame ofthe unit responsible fr geting the instructions fom memory an loading itinthe Instruction Queve for excoution? bs. What yp of dressing mode represents the insrction MOV CL [BXIDI}+8.7 of eok ime, atonal latency, and transfer ine, Rottonal tency refers 1. thetime i takes fr the plate to mak ul ation, the imei takes forthe read. write hea to move into position aver the appropriate trek ‘© thetime it takes forthe pater orotate he comet sector under the head 4. none ofthe above Interrupts can be generated in esponse to ‘detected program errs such asaihmetic overflow or division by zero. > detected hardware fats, «:InpuvOutput setivts 4 internal mer © allofthe above. £ allexcepta 2.7 Ifamagnti isk has 100 cylinders, each containing 10 tracks of 10 sectors, and eech sector 128 bytes, what isthe maximum capacity ofthediskintytes?__ point) 28, The conpuersystem bis male up of ire indepndent bos pt Wha ae ihey? pis) 29 A computer's memory is composed of SK words of 32 bts ach, How many bts are require for memory ress ifthe smallest adresable memory unite a word? pointy 2.10 Whose responsibilities are the following tasks tothe instructions of the compute system? Page 7 (un point eae) Part Ill: Database Management Systems (20 points) 53:1 Based onthe description given blow, answer te questions that follow “The Cheapst Car Company sells new and use cas fom diferent makers such as Ford, Volvo and Toyota sdf frst models ste Camry, Fao, Carol Cai. eustNo, seritNe and tf the ole ays of Customer, Car and Staff, respectively. Customers make orders to buy cars; a customer an make several orders. Bach order has a unique order number (orderNo) and only one car is ordered in one onder. ‘An order is proceso by one sta member. Customer(ews,enstName, sree, iy, postcode) Car(serialNo, model, year, make, pice) StaffsasfNe, sapfName, postion) OrterorderNo, tffNo, date, eustNo, sralNo, amount paid) Asuibuteamount_paid of lation Orders the amount that a customer pays fran order, 3 (Customer may ot payin fl forthe order. The other atibutes are selFexplanatoy. a. Discuss the likely Functional Dependencies in Order Give the foreign keys in Order andthe relevant referential integrity constrains. Page 2 points) (2 points) @ pois) pois) Ii. Crs wit price greater than Bis 280,000 ae luxury cars. List the customer number, ame sad ‘ade of customers who have ordered more than one wary ct point) |v. Listthe name and postion of staf’ members who have only sold cars to customers living inthe cites “Addis Ababa” or “Mekal” 32 When isthe concopt of weak entity used in database modeling? 33. Discuss the various reasons that ead to he ocunence ofl values in estos? (G pois) @ pois) Page (points) Part IV: Computer Networks and Data Communications (20 points) 4.Compare and contast virtual creuit switching and datagram switelag based on factors suchas dressing (addressing information in very pace), routing and effets of node flrs. @ pints) 42. For each ofthe following questions, ice the ltr ofthe comet answer. 1. Which ofthe fttowing i deterministic medium access contol protocol? 4. ALOHA‘Sloted ALOHA Token passing © CSMA 4. cSMAICD (pint eset) 4 Ina data communication network, sender hs a sliding window of ize 1S andthe ist 15 packet have been seat. The frst ACK received by the sender was ACK 5, which frames) has the received? Frames b Frames cFrime0te2 Fame Oto4 ii A uanspor-ayer adress is called MAC address & Paddeess pein exch 1 Processto-ocess data delivery. Provides use services suchas email and ile ranaer. «Mechanical, lee, and functional interice, 4. Responsible for delivery between adjacent nodes. a «Responsible for choosing outs for packets, Poge-10- “44 What isthe difereace between error deteton and error correction? Which method has higher ‘overhead? 6 poins) 45 Consider the rwo anspor layer protocols, TCP and UDP, Which protocol isthe most pproprit for each ofthe fllowing two applications? Justify your answer. 4 Money transfer . Mutimedia 46 Give one major eason why standardization i requirod in computer networking. Part I: Computer organization and assembly (15 points total) 4. points) Give two applications where writing the code in assembly language rather than in high- level language is compulsory or highly beneficial. Explain very succinctly why itis, ‘compulsory or highly beneficial. W Applicaton Reason 2. @ points) Give two major concepts that make the difference between RISC and cise technologies and how those concepts contribute in improving the performance of the processor. 3. (point) Give the name of an existing processor that Is bullt based on RISC technology. Application Page 2oft 5. (Points) Give the name ofthe character encoding system that is most widely used for encoding ‘of texts in most alphabets and scripts ofthe World. What are the differences between this system {and the Latin character encoding system almost exclusively used, until recently, to ‘encode texts in Latin characters? What are its advantages and te drawbacks? Answer very suecinctly Inthe table, Ditferenees Advantages of the character encoding system Drawbacks of the character encoding ‘tem ‘adidress. Write this fragment of code knowing that: © The virtual addross isin AX © The page size is 256 Bytes ‘©. Tho page table isin memory at the address PAGE_TABLE. Each entry of the page table occupies one byte and contains only the page frame number. '© We consider that all pages ofthe virtual memory are always inthe real ‘memory (there Is no page fault) ‘© The result (real address) should be in BX © You should use the simplost and minimum number of instructions in order to minimize the execution time ofthis code © If there is a mnemonic of an instruetion that you have forgotten use INST#, INST, ete ‘and explain what this Instruction does. This will be accepted only if an Instruction that does exactly what you say exists In INTEL 8086. Explain how your program works and give your commented program. Explanation Page 3 oft Program. Part Il: Programming and Data strueture (14 points total) Page 40014 2. (point) Write a program segment to put N numbers into ascending order using @ binary ‘search tree, Assume that inorder traversal ofthe tree gives the numbers in ascending orde Write the code your language of choice, ‘Part IIL: Software Engineering (16 points total) 4. Give precise answers tothe following questions, ‘ G points) What are the basic concopts of object-oriented approach? +. (@ points) Define polymorphism and give an example.Page Sof 14 © G points) Explain the differences between testing a procedural program and an object. otiented program, 2. (6 polats) To propery satisty the basle goals of a system, a software requirements ‘specification should have certain properties. What are the desirable properties that a good ‘Software requirements specification should have? Describe each of the properties. 3-6 poins) Explain the difference between validation and verification, which a important concepts in software quality roferentialintogrity rule. State the rules. 2. 6 points) Transaction recovery is one ofthe data protection mechanisms used in database ‘systoms. Describe transaction recovery and show how itis implemented. lowing information to answer subsequent questions (Office ofthe African Union (AU) is planning to organize the second ordinary sum of heads of

You might also like