BSM-204 Roll No.
B. Tech.
Year: I| Semester: Ill
Major Exam (0dd Semester)
Applied Computational Methods
Time: 3 Hrs.
Max Marks: 50
Note: Attempt ALL questions.
Q. Altempt any Five parts of the following. Mark CO B PO
S Code
.Estimate the missing term in thc following table. 2 3 1,8 .2.1
L.2.2
2 3 4
8.3.1
y= f(x) 3 9 81.
2 3 1.8 1.2.
b)| Find the root of the equation x² +x-1 0 using iteration method. 1.2.7
8.3.
2 3 1,8 1.2.
) Using Lagrange interpolation formula, find a polynomial which satisfies
2
1.2.
the points (0,-12), (1, 0), (3, 6) and (4, 12). 8.3
2 4 3 1,8 1.2.
á) Solve thedifference equation (0- 34 + 2)yn = 0 1.2.2
8.3.
. Hence 2 3 1,8 1.2.
e) Using Simpson's one-third rule on integration, evaluate J01+x 1.2.2
evalue loge 2 approximately. 8.3.
2 4 1,8 1.2.
Given=y(0)
dx y+x
= 1, find yapproximately for x= 0.1 by using 1.2.2
Euler's method. Take step size h = 0.05. 8.3.
Find the Rank coefficient of correlation between marks in Economics 2 5,6 3 1,8 1.2.
(x)and marks in Mathematics (y)from the table of their values 12.2
8.3.
80 90 65 67 45 64 32 19
26 78 32 45 21 90 99 58
02. Attempt any Two parts of the following.
Using Newton-Raphson method, find the real root of the 5 3 1,8 1.2
equation 3x = cos x + 1, correct to four decimal places. 1.2
8.3
Perform two iterations of the fixed-point iterative method
followed by one iteration of the Atkin A method to find the
root of the equation x'- 5x+ 1=0. Repeat the process
two times. Take initial guess Xo = 0.5.
b) i. Using generalized Newton- Raphson method, find the double 1 3 1,8
root of x* -x-x+1=0, choosing xÍ =0.8.
:
ii Determine the value ofp and qso that the rate of convergence
N
of the iterative method xnt1 = px, +q x for computing
1
Ni becomes as high as possible.
Solve.the equation xtanx = -1 by Regula Falsi method starting with 1,8
Xo = 2.5 and x = 3,correct to three decimal places.
Atenpt ay Iwo parls of the folloino
Show that E = eD and1 +
The following are the 2 = /1+8'
marks obtained by 492
a certain examination candidates in
Marks 0-40 40-45 45-50 50-55
No. of 210 43
55-60 60-65
S4 74
candidates 32 79
Find out the number of
ot more than 50 candidates who have scored more than 48 but
marks, and less than 48 but not less
I.8
) The
following values of the function f(x) for values ofthan 45 marks.
x are given
2
f(1) =4,f(2) = 5,f(7) = 5, f(8) = 4. Find
the value of x for which f(x) is the value of f (6) ano
maximum or 3 1,8
Acurve is drawnto pass through the points minimum. 5 3
given by the following tabie.
1 1.5 2 2.5 3.5 4
2 2.4 2.7 2.8 3 2.6 2.1
Find the area bounded by the curve, the x axis. and the lines x=l, x=4.
Attempt any Two parts of the following.
3 1.8
a Solve the difference equations: 4
Yn+2 4yn+1 t 4y, = 2n +3 + I.
ii
Yn+2-4y, =9n2
dy 4 3 18
Given dx =1+y' :y (0) =0. Find f(0.2), f(0.4) and f(0.6) by Runge
Kutta method of fourth order taking h=0.2.
Use Picard's method to approximate y when x = 0.1, x =0.2 given 1.8
dy
that y=1 when x=0, dx
=x+ y. Check the result with the exact value.
Attempt any Two parts of the following.
Á) Find the moment generating function of the distribution
5
5.4 1.8
its
fx) = C-e c, 0 <x<o, c >0. Hence find
mean and
standard deviation.
point
b) In acertain distribution the first four moments about the 5.6
|,8
x-4 are -1.5, 17, -30 and 308, Calculate B, and B and
of the
comment uponthe skewness and kurtosis
distribution.
simultaneously. What is the probability
ii. Four coins are tossed
headse) at most 2 heads?
of getting a)2 heads b) at least 2
acute angle between two lines of regression in case of two
If0 is the 1-r
y. show that tan! where r. Or Oy have
variables x and
meaning. Explain the significance ofthe formula when r
their usual
0andr t 1.
B.Tech.
Year: II Semester: Odd
Major Examination 2022 -2023
Switching Theory & Logic Design
Time: 03 Hrs Max. Marke
Note: Attempt ALL questions. Each question carries equal Marks.
O.Attempt any five of the following, Mar BL PO
ks
1
a. Perform (110101)2 -(11111)2 by using 2's complement 2 3 2.3
method.
What is the difference between canonical form and standard 1,2
form? Explain. 2 3
C. State and prove extended De Morgan's theorem.
Distinguish between decoder and de multiplexer. 2 1 2
Disinguish between T flip-flop and D flip-flop. 2 1 2
f. What is programmable logic array? Where is it useful? 2 4
Connpare static and dynamic RAMs. 2 1 2
SAitempi any two of the foowing
2.5 3 2.3
a i. ii. (367)s X(715)s =(X)s.
Keduce the Boolean expressions to four literals: 2.5 3 3.4 2.
(A'+C) (A'+C) (A +B + C' D).
b. 1 Implement the Boolean function F =A'B'C + 2.5 4.5 2
A'BC'+AC'+ AB with NAND gate only.
Implement the Boolean function F = A'BC + 2.5 2 4,5
iBC+AC'+ ABwith NAND gate only.
Hammingcode 100101001 is received at receiver end with 2.5 3 4
evenaritv. Correct it if it has any error.
2.5 3
3 3
iAerform subtraction (6432)% - (3466)8 using 7h
compiement.
Q. Attempt any two of the following
3
34iniruz the tollowing expression using K-map. 2.5 2. 3,4
y=5m(o.1.5.9.13,14.15) + d(3,4.7, 10.11) 6
1 i'esigne BCDto Excess-3 code converter using minimum 2.5 1 4
j:rumber of NAND gates.
Vwhat are fast adders? Desigrn a 4 bit, carry look-ahead adder, 5 1 2
1,2 13
showing the logical diagram.
Simplify the following expressions F together with the 2.5 2. 3.4 2,5 2.1
don't care conditions d in () sum-of-products form and 6
(I) products-of-sums form:
F(w.x.;.z) S0.1.5,9,13,14,15)
d(w,x.y,z) = (3,4,7, 10,1 1)
Implement the following function with (i) 16:1 (ii) 8:1 and 2.5 1 3.4 2.5 2.
(ii) 4:1 multiplexer:
F(A.B,C.D) = (2.4,5,7,10,14)
Attempt any two of the fellowing.
Draw the logic diagram of a 4-bit binary ripple counter using 5 12.3: 1,2 1.
flip-flops that trigger on the positive-edge transition.
b. Design a 3-bit gray code synchronous counter using J-K flip 5 1 2,3 1 1.
flop and explain the steps in detail.
Design asynchronous BCD counter with JK flip-flops. 5 12.3 1.2 2.
QAttempt any two of the folowing.
What do you understand by fundamental mode of operation? 5 1 1.2 ! 1.
Discuss diferent types of of Hazards in Asynchronous
sequential circuit bv giving suitable exmple.
. Show the internal architecture of a 8X4 ROM. Show the 5 1 1,2 2.
2,3
implementation of a full adder using ROM.
Find a circuit that has no static hazards and implements the 23.4
2 2 2.1
Boolean function: F(A, B, C, D) = X(0, 2, 6, 7, 8, 10, 12).
SubjectCode: AUC -08 Roll- No
B.Tech
SEM Ill ODD SEMESTER
Major Examination 2022-202.3
Subject Name: IntellectualProperty Rights
Time: 2Hrs. Max. Marks: 50
Note : Attempt all Questions. Each Questions carry equal marks.
) Attemptany Four parts of the following: MarksCO BI. PO
5 2 4
How willyou define IPR? Discuss its main functions.
5 3 4
What is WTOstands for? Mention the role of WTO in IPR.
How do you select and evaluate trademark? Explain it 5 3 5 6
3 2
Define patent law. What are the rgquirements of patent law?
2
What do you mean by copyright? Where it is followed? 3
4
Howwill you define patent searching process? Explain in bricf. 5 2
Attempt any three parts of the following:
What is Patent? Howcan one register for patents? 3 2 4
What do you mean by TRIPS? What are the main features of 3 2
TRIPS?
3 4 4
How will youdefine rights of a patent holder?
5 4 4
Discuss some emerging issues of IPR?
5
Attempt any three parts of the following:
5
What do youmean bytrademark? Discuss its main functions 2 2
5 3 2 4
What do you mean by copyright issue? Why it is important to
study copyright issue?
5 2 4 4
Define acquisitionof trademark rights in protectable manner.
Explain fundamental right of copyright law. What is the types of 4 4
work that are covered by copyright?
BIT-202 Roll O 2o2
B. Tech. (IT)
Year: 2nd Semester: 3rd
Major Examination: 2022-23
Data Structures
Time: 3 Hrs.
Max Marks: 50
Note: Attempt ALL questions. ALL questionscarry equal marks.
Q1. Attempt any Five parts of the following. Marks Co BL PO PI
Code
lList some linear and non-linear data structures stating the 2,3 1 1.61
application area where they will be used.
6) What is the Tower of Hanoi problem. Give the recursive 2 2,3 1.61
solution for n=4 disks.
What is the difference between Naïve and Tail recursion. 2 2,3 1.6.1
A recursive function f is as follows:
int f(int x)
{
if (x<2)
return 1;
else
return f(xX-1)+ f(x-2);
Find the value of f(S)?
2 2,3 1 1.6.1
d) Evaluate the following postfix expression using stack:
5,9, 8, +, 4, 6, *, +, 7, -,*
Now, convert this expression into its Infix equivalent and
solve it. Then validate this obtained mathematicalresult
from the result obtain using above evaluation algorithm. 1.6.1
9 Define AVL tree with its rotations. Why AVL tree is 5 2,3 1
known as a height balanced tree?
1.6.1
Why AVL tree is better than the binary tree? Construct a 2 2,3 1
AVL tree with values 7 to I numbers into an initially
empty tree.
1.6.1
In which operations of Graph, you use stacks and queues? 2 5 2,3 1
Clearly justify the use of stacks and queues in those
respective operations.
Attempt any Two parts of the following.
How are the elements of a 2D array stored in the 5 1 2,3 1 1.6.
memory? Suppose that each element of an array
Data[20][50] requires 4 bytes of storage. Base address of
Data is 2000. Determine the location of Data[10][10]
when the array is stored as:
i. Row-major
i. Column-major
E) Write Algorithms for the following: 5 1 2,3 1
M. To reverse a Linked List
Y1. To check if a singly linked list is palindrome
c) What are Dynamic Data Structures? Name a few of them. 3 2,3 1
Are linked lists considered linear or non-linear Data
Structures? What are the advantages of a linked list over
an array? In which scenarios do we use Linked List and
when Array?
Attempt any Two parts of the following.
YWrite down the algorithm for converting Infix expression 5 1 3,4 5 5
into its Prefix equivalent. Convert the following
expression into its equivalent Prefix using stack. Also,
validate this result with the result obtained from its
mathematical evaluation:
A+B*C
Write down the algorithm for
into its Postfix equivalent.converting Infix expression 5 1 3,4 5 5
Convert the
arithmetic infix expression into jts equivalentfollowing
Postfix
expression using stack. Also, validate this result with the
result obtained from its
mathematical evaluation:
A-B/C+D*E+F
chConsider the following circular queue capable of 5 1 3,4 5 5.
accommodating maximum 6 elements.
below operation on it and write the value Perform the
of Front and
Rear related with each operation.
Initially, FRONT=2, REAR=4, and
QUEUE: , A, C, D,,.
Now perform the following operations:
i. Add F
Delete 2 elements
iii. Add K, L and M
iv. Delete 2 elements
V. Add S
a4. Attempt any Two parts of the following.
What is a Threaded Binary Tree? Explain the advantages 5 5 3,4 5 5
of using athreaded binary tree using suitable example.
Also, construct a binary search tree from the following
sequence of numbers:
49, 22, 25, 90, 82, 7, 13, 47, 63.
Differentiate among B Tree, B+ Tree, Binary Tree and 5 3,4 5 5.
Binary Search Tree. AVL tree is based on which of these
trees? Construct a B-tree on following sequence of
inputs:
10, 20, 30, 40, 50.
(Assume that the order of the B-tree is 3.) 5 5
5 5 3,4
Define spanning tree. Construct the minimal spanning
tree for the following graph using prim's algorithm:
21 19
Attempt any Two parts of the following.
5 7 3,4 5 5.4.2
Is Quicksort a stable sorting algorithm? Justify the
answer. What is the worst case and average case time
complexity of the Quick sort algorithm. Provide any real
time example of the Quick sort. Use Quick sort algorithm
to sort the following elenments:
15, 22. 30, 10, 15, 64, 1, 3,9, 2.
5 5.4.2
b)Write down the algorithm of Heap sort. Explain the 5 7 3,4
significance of max and min heap in Heap sort. When are
they used? Sort the following list using Heap sort:
25 30 59 10 92 85 30
oWhat is the purpose of hashing? Write down the time 5 7 3,4 5 5.4.2
complexity of hashing and justify the answer. Given the
input (4322, 1334, 1471, 9679. 1989, 6171, 6173, 4199)
and the hash function x mod 10, which kevs hash to the
same value? Show the process to justify your answer.
Roll
No
Cade BIT-203
B Tecl
Year l
Semester Odd
Major Examination (2022-23)
Time: 3 Hrs. Object Onented Programming
Note: Answer all questions Max Ma
. Attempt any Five parts of the following, Marks
What do you understand by pointers? Explain with lhe Code
2 1 41
help of a suitable program.
Write a program to swap tWo integers using call by 2 1,3 23 235 141
reference method.
e Write the syntax for declaration of class & creation of 2 1.2.3 2.4.5 2,3.5 1.4 1
objects?
Discuss how data &functions organized in an object 2 2,3 2 1 141
oriented paradigm. List major areas of application of
OOP.
State any four points of differentiation between function 2 2,3 3,6 2,3 1.4.1
overloading &function overriding.
Write the name of the function in C++ used for opening a 2 2,3 3,6 2,3 1.4.1
f)
file for input only.
2 1,2,3| 2,3,4 1,2 1.4.1
9) Differentiate between seekg() and seekp() functions.
Q2. \Attempt any Two parts of the following.
5 1.2 2 1 1.4.1
a)i. Explain the following:
a. Namespace
b. Std
C. Keywords
d. ldentifiers
e. Constants
i. How do you define member function inside & outside
the class? Give example.
What is array? How to declare array and how to allocate 5 3,6 3,5 1.4.1
the memory to for array? Write a program to display
elements of array using pointer to array of integers.
Lo Explain memory management operators in Ct+ with 5 3 3,6 3,5 1.4.1
example.
j With suitable example, describe effect of ++ &--
operators used with pointer in pointer arithmetic.
Q3. Attenptany Two parts of the following.
a) Differentiate between object-oriented programming & 5 1,4 2,4 1,2 1.4.1
Procedural programming? Write a program in C+t by
creating a class of integers &write functions that prints all
the circular prime numbers from the class. A prime
number p is called circular if it remains prime after any
cyclic permutation of its digits.
Example: 193 is cyclic prime as 931, 311,and 119 tare all
primes
5 3 3,6 3.5
Scoperesolution operator.
Explain the use of are.they
b create an array of objects? How
i How do weDiscuss with example. 3 3,6 3.5 14 1
initialized? functions & static data 5
c) Explain static member suitable examples.
members in a class usingobject type from a function?
How can we return an
Explain with program.
following.
Q4 Attempt any Two parts of the 5 |1.3.6 2,3 1,2 141
types. Write a
a Explain inheritance with its different inheritances.
program in C++ to demonstrate multiple 5 1,3 2 1 1.4.1
example.
b) i. Define concept of virtual base class with
specifier
ii. Give reason for assigning protected visibility
to a class member. 3.5 1.4.1
5 3 3,6
With an example, differentiate between compile-time and
run-time polymorphism.
Write a program to overload the unary operator to
negate the values.
Q5 Attempt any Two parts of the following.
5 3 2 1 1.4.1
w¥) What is an exception? Explain try and catch block.
Write a program in C++ that copies the contents of one file
to another. 3.5 14.1
b) Explain the concept of exception handling. Write
a 5 3,5 3,6
program containing a possible exception. Use a try block
to throw it & catch block to handle it properly.
C) How do we open and close the file in C++ program?? What 5 4 2,3 1,3,51 41
is the function required for reading and writing data in
file? Explain with an example.
BL- Bloom's Taxonomy Levels
(1 - Remembering 2 - Understanding 3 - Applying 4 - Analysing5 - Evaluating 6 - Creating)
CO- Course Outcomes
PO- Program Outcomes
PICode- Performarnce Indicator Code
Roll No.
3IT-204 B. Tech
ODD SEMESTER
Semester)
Major Exam (3rd
Session: 2022-2023
Subject: Software Engineering Max. Marks: 50
Tíme: 03 Hrs
Vote: Be precise in your answver. CO BL PO PICode
Marks
parts nfthefollowing.
M. Attempt any five various 2 1 1,2 1.7.1
What is Software E ng? Describe the
saj
software characteristics is. uetail.
1,2 12 12.4.1
so What is the Software Development Life Cycle (SDLC)?
2
Explain Prototype Model along with its advantages and
disadvantages.
(c) What is Module Cohesion? Describe the various types of 2 1 2.4.1
module cohesion in detail.
Compare the Structural Testing and Functional Testing 2 2 2. 4 2.3 3.5.3
with a suitable example.
(e) Describe the various characteristics of a good Software 2 1.2 2.5.2
Requirement Specification (SRS).
(P What is Reverse Engineering? How the various levels of 7 3, 4 5.8 5.4.2
Reverse Engineering can be applied in order to discover
the specification?
2
Je Illustrate the various activities of Software Configuration 6 1.2 1.2 2.8.1
Management.
2. Attempt any two parts of the following.
Illustrate the working of Spiral Model of software 1,2 1,2 1.5 5.4.2
development with a suitable diagram along with its
advantages and disadvantages.
1.2 1.2 1.8 1.7.1
(b) Describe the various requirement gathering techniques 5
for the software development in detail.
2.4 5.9 5.4.1
Discuss the prototyping model along with itsadvantages 1.2
and disadvantages. What is the effect of designing a
prototype on the overall cost of the project?
3. Attempt anytwoparts of the folowing.
(a) What is the significance of Entity-Relationship model? 5 1.2 2.3 3.5
Draw the E-R diagram for the course registration process
of students at MMMUT Gorakhpur. Assume the entities
and attributes of your own.
.(3) Define the term Module Cohesion and Module Coupling. 1,2 5,8 5.4.2
Illustrate various types of Module Cohesion. Which type
of Module Cohesion is the best and why?
) Differentiate between Verification and Validation.
1.3 1,2 8. 11 11.5.1
Explain the various levels of SEI-CMM Model in detail.
Attempt any two parts of the following.
5 1,4 1,2 1,3 1.7.1
a What is Software Testing? Describe Unit testing,
Integration testing and System testing with a suitable
example.
(b) Describe the black box and white bOx testing with a 1,4 2, 6 5, 12 5.4.2
suitable example. Suppose you have developed the
software for the Library Management of University.
Create test cases for the Library Management software.
) Write short notes on Software Reliability Metrics# 5 1,3 1,2 1,3 1.7.1
05. Attempt any two parts of the following.
.(a What is software maintenance? Describe the various 5 1,6 2,4 5, 11 5.4.2
categories of software maintenance. Analyze, Which
category of software maintenance consumes maximum
effort and why?
b What is the significance of Constructive Cost Model 3.5 8, 12 12.6.2
(COCOMO) in software project development? A project
size of 200 KLOC is to be developed. Software
development team has average experience on similar type
of projects. The project schedule is not very tight.
Implement the equations of COCOMO to calculate the
effort, development time, average staff size and
productivity of the project.
(c) What is Software Risk? List the various types of typical 7 1.2 2. 11 11.6.1
risks. Describe the various Risk Management Activities
with a suitable diagram.