End Semester Examination - April / May 2024
End Semester Examination - April / May 2024
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO
Write a member of Σ2 where Σ = {p, q}. 1 A 1
2. CO
Name the machine that accepts regular language. 1 R 1
3. CO
Differentiate Deterministic and Non-deterministic Finite Automata. 2 U 1
4. Select the regular expression from the given set of regular expressions,
which will generate the string “aabab”. CO
{(a|b)*ba, ab(a|b)*, (a|b)*bab} 2 R 1
5. Show the dependency graph for Grammar G with the following
productions.
S->Aa | B
B->A | bb CO
A->a | bc | B 3 U 1
6. State the form of production for a Context free grammar to be in CO
Chomsky Normal Form (CNF). 3 R 1
7. List the properties of context sensitive grammars. CO
4 R 1
8. CO
Define Turing machine. 4 R 1
9. Relate Turing machine and Finite automata based on their ability to CO
U 1
recognize various languages. 5
10 CO
R 1
. Identify the language recognized by the turing machine. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
. Sketch the Chomsky hierarchy for the formal languages. 1 A 3
12 CO
. Define Deterministic Finite Automata. 2 R 3
13 Rewrite the following grammar by eliminating the useless productions CO U 3
. from G=(V,T,S,P), where V={S,A,B,C} and T={a, b}, with P 3
consisting of the following productions.
S → aS |A| C
A→a
B→ aa
C → aCb
14 CO
. Define context sensitive grammar. 4 R 3
15 CO
. Differentiate Push Down Automata and Turing Machine. 5 U 3
16 Define Church-Turing thesis. CO
R 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Construct Non-Deterministic Finite Automata with ε-transition for CO
. . the regular expression (0+01)*(0*+11*) 2 A 6
Develop a Deterministic Finite Automata equivalent to the given CO A 6
Non-Deterministic Finite Automata. 2
b
.
22 a CO A 6
Explain the closure properties of regular languages.
. . 2
b Convert the given finite automata to its equivalent regular CO U 6
. expression. 2
a.
b.
23 a Identify whether the following are the closure properties of CFL and CO U 6
. . describe them. 3
(i) Intersection
(ii) Homomrphism
(iii) Difference
(iv) Concatenation and
(iv) Kleene closure.
b CO
A 6
. Construct a Turing Machine to add two positive integers. 5
COMPULSORY QUESTION
24 a Describe the following
CO
. . i) Recursive Languages U 8
6
ii) Recursive Enumerable Languages
b CO
. Differentiate decidable and undecidable problems. 6 U 4
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO
recall the concept of languages and the hierarchy of languages.
1
CO
develop finite automata to accept a set of strings of a language.
2
CO
classify the given language based on chomsky’s hierarchy.
3
CO
construct context free grammars to generate strings of context free language.
4
CO determine equivalence of languages accepted by Push Down Automata and languages generated
5 by context free grammars.
CO
6 compare computability & non-computability and Decidability & Un-decidability.
7. a. Explain the concept of functions by using the example of swaping two CO4 10
numbers.
b. Define recursion. Develop a C program to calculate factorial of a given CO4 10
number using recursion.
(OR)
8. a. Discuss about the Storage Class in C. CO4 15
b. Demonstrate enumerated data type. CO6 5
COMPULSORY
9. a. Summarize various computer software and its usage. CO1 10
b. Construct a C program to display the employee details using Structures CO6 10
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
N Questions CO BL M
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Abstract Data Type. CO
U 1
1
2. Represent the function “23n4 + n2 log n + 5n” in Big-Oh notation. CO
U 1
1
3. Convert the following infix expression A+B*C+D-B/(C+A*D) to its CO
R 1
equivalent reverse polish notation. 2
4. State any applications of Queue data structure. CO
R 1
2
5. Write the time complexity to insert an element at the front of the CO
U 1
singly linked list. 3
6. Let last denote the last node of a circular linked list. If last.next= CO
U 1
None, how many node(s) is/are there in the circular linked list? 3
7. Write the best-case time complexity of Quick sort algorithm. CO
R 1
4
8. Identify the number of iterations required by radix sort to the list: 45, CO
U 1
78, 22, 8, 456, 98, 25, 12, 65, 15 4
9. Sketch a valid Complete binary tree. CO
R 1
5
10 List the keys in the following binary tree in post-order
.
CO
A 1
6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11 Given an array, arr[1………12][1………17] with base value 100 and CO U 3
. the size of each element is 1 Byte in memory. Locate the address of 1
arr[7][5] with the help of row-major order.
12 Evaluate the postfix expression “ABC+*D-“, where A = 2, B = 5, C = CO A 3
. 3 and D = 10 using stack. Show the contents of the stack in each step 2
of the evaluation.
13 Consider the following circular linked list:
. CO U 3
3
Write the code to insert “23” at the front of the above circular linked
list.
14 Consider a hash table of size 7. Insert the values 28, 39, 17, 45, and CO A 3
. 49 into the hash table using the hash function “value mod 7”. Handle 4
collisions, if any, by applying separate chaining.
15 List the Properties of Binary Search Tree. CO R 3
. 5
16 Differentiate null graph and complete graph with suitable diagrams. CO U 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17 Explain in detail about time and Space trade off. CO R 12
. 1
18 Demonstrate the push, pop, peak and display functions of stack data CO A 12
. structure with code and example. 2
20 Explain with the algorithm how the merge sort technique sorts the list CO A 12
. of inputs. Apply the algorithm to sort the list of numbers 46, 67, 23, 4
13, 36, 42, and 96.
22 Design an AVL Tree with the values: 44, 27, 32, 78, 90, 38, 48, 80, CO A 12
. 62, 54. Explain the different rotations that are used to balance the tree 4
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Identify the attributes and methods of a dishwasher object. CO
1. 1 U 1
Construct a class hierarchy to organize the following Vehicle classes CO
2. such as bus, truck car, tow truck, ford, tanker, log truck, Honda, Nissan. 1 A 1
Sketch the Data Flow diagram for online shopping system. CO
3. 2 A 1
List the differences that exist in abstract and concrete use case. CO
4. 2 R 1
Identify the type of association from the following diagram.
CO
5. 3 U 1
CO
6.
Tabulate the essential components of pattern template. 3 R 1
CO
7. Write short note on framework. 4 A 1
Give examples for static model in UML. CO
8. 4 U 1
Define macro level user interface in a view layer class. CO
9. 5 R 1
10 List the different types of protocols visibilities associated with an UML CO
. class. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 Compare pattern and framework CO A 3
. 1 n
12 List the phases performed iteratively by the Object Modeling CO R 3
. Technique. 2
13 Identify and explain the type of relationship given below. CO R 3
. 3
Can Fly flown by
Pilot Planes
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Consider the following requirements for an ATM, build the CO E 6
. . behavioral use case diagram with a clear explanation of each 1
activity.
21 a Construct use case, class diagram and component diagram for the CO A 12
. . stock maintenance system given below A new stock maintenance 5
system for a book store is to replace the existing maintenance
system which is in efficient. The new stock maintenance system will
allow the employee to record information of the nooks available in
the book store and generate report based on the total amount of
sales. The new system will has a windows based desktop interface
to allow employee to enter the information of sale, purchase orders,
change employee preferences and create reports. Employee can only
access the information and purchase orders for security purpose.
COURSE OUTCOMES
CO1 describe the various object oriented concepts.
CO2 recognize the requirements of any real time application.
CO3 sketch the design of any application using UML diagram.
CO4 identify various prototypes to represent the application.
CO5 prepare the documentation of any real time application.
CO6 explain the application in terms of use case driven approach.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Differentiate keyword and identifier. CO U 1
1
CO
U 1
2. Compare variables and constants in C++. 1
CO
U 1
3. Differentiate Unary and Binary operator. 2
Define inline function. CO R 1
4. 2
CO
R 1
5. What is protected constructor in C++ inheritance? 2
CO
R 1
6. Recall new operator with a suitable example. 3
Describe the importance of destructor. CO U 1
7. 3
CO
R 1
8. Enumerate the advantages of virtual functions. 4
CO
U 1
9. Define Stream I/O. 6
10 CO
R 1
. Define seekp() function. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
R 3
. Recite the use of the ternary operator in C++. 1
12 CO
Write in detail about Enumeration with an example program. U 3
. 2
13 CO
Construct a scenario where we require user defined exceptions briefly. A 3
. 3
14 Write a C++ program to multiply two numbers using the class CO A
3
. template. 4 n
15 CO
Discuss the use of private specifiers and their visibility in the class. R 3
. 5
16 CO
U 3
. Differentiate friend function and virtual function. 4
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Elaborate the fundamental characteristics of object-oriented CO U 6
. . programming with real-time examples. 1
b Write a C++ Program to check whether the given number is CO A 6
. Armstrong or not 1 n
20 a Create a class named real estate that has data members to hold the CO A 1
. . price of a house. The number of bedrooms, and the number of 3 2
baths. Member functions include insertion and extraction functions.
Write a main() function that instantiates a real estate object, allows
the user to enter data, and displays the data members entered. The
main() function should display an appropriate thrown error message
if negative values are entered for any of the data members.
22 a CO A 6
Explain Generic functions and Generic class.
. . 5
b CO U 6
Illustrate the exception handling mechanism.
. 4
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define a work product. 1 R 1
CO
2. List few advantages of RAD Model. 1 R 1
CO
3. Define white box testing. 2 R 1
List the golden rules to be followed by the designers while CO
4. designing the interface. 2 R 1
CO
5. Define coupling. 3 R 1
CO
6. Infer the important aspects of validation testing. 3 U 1
CO
7. Differentiate path testing and security testing 4 U 1
CO
8. Define software product scheduling. 4 R 1
CO
9. List the key participants in software configuration management. 5 R 1
CO
10. State the formulae for mean-time-between failure. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11. List the drawbacks of RAD model. CO R 3
1
CO
12.
Describe the process framework of a complete software. 2 U 3
CO
13.
Differentiate user interface and business domain classes. 3 U 3
Describe the tasks in inception and elicitation phase of CO
14.
requirements engineering. 4 R 3
CO
15.
Differentiate reviews and audits of SQA. 5 U 3
CO
16.
State Pareto principle in a product development process. R 6 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a Explain waterfall model and incremental model in software CO A 6
. development process. 1
b Describe the process of extreme programming in agile software CO R 6
. development. 1
18. a CO U 6
. Describe seven tasks in requirements engineering. 2
b Sketch the use case and class diagram for a smart village CO A 6
. monitoring system. 2
20. CO U 12
Explain the testing strategies of unit tests and integration tests. 4
COURSE OUTCOMES
CO
discover an effective software engineering process to develop software-intensive systems.
1
CO
translate the requirements specification into an implementable design
2
CO
construct UML diagrams along with design strategies and design patterns.
3
CO
analyze architectural design methods.
4
CO
evaluate the system using various testing strategies
5
CO
6 develop the software system with quality measures.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define system software. 1 R 1
CO
2. List the addressing modes that are used in SIC/XE architecture. 1 R 1
CO
3. Name the assembler directives used in the SIC assembler language. 2 R 1
CO
4. State the function of assembler. 2 R 1
CO
5. Define linking loader. 3 R 1
CO
6. State the advantage of dynamic linking. 3 R 1
CO
7. Write the format of Text record. 4 A 1
CO
8. Identify the type of macro call that contains the call to another macro. 5 U 1
CO
9. List the various tables used by macro processor. 5 U 1
10 CO
. Give examples for text editor. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 Write the sequence of SIC instructions for the following equation. CO
A 3
. ALPHA = BETA + GAMMA * 12 1
12 CO
. Differentiate immediate operand and literal with example. 2 U 3
13 CO
. Discuss the advantages and disadvantages of absolute loader. 3 U 3
14 Describe the functions required to translate source program to object CO
. program. 4 R 3
15 CO
. Explain the generation of unique labels in macro processor. 5 U 3
16 CO A
. Compare DBMS with file processing systems. 6 n 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Sketch the neat diagram of SIC/XE architecture and explain the CO A 1
. . various addressing modes, instruction formats, memory and 1 2
registers in detail.
19 a Illustrate the steps taken by the absolute loader to load the following CO A 1
. . object program in memory. 4 n 2
20 a CO
. . Compare and contrast linking loader and linkage editor. 3 U 6
b CO
. Describe the working principle for bootstrap loader. 3 R 6
22 a CO 1
. . Discuss the differences between CISC and RISC architecture. 1 U 2
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Mention the purpose of $ symbol in shell script. U 1
1
CO
2. Infer the output of echo command. R 1
1
CO
3. Discuss the function of iput. R 1
2
CO
4. Write the number of processes created by executing fork() twice. R 1
2
CO
5. Interpret the outcome of ls –i. U 1
3
CO
6. Expand IPC. R 1
3
CO
7. Define swapper process. U 1
4
CO
8. List any two file system calls. R 1
4
CO
9. Define incore inode U 1
5
10 CO
Paraphrase shmget() system call. U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
. Define system call. 1 R 3
12 CO
. Write the syntax for converting pathname into inode 2 U 3
13 CO A
. Differentiate iget and ifree algorithm. 3 n 3
14 Write a program to create a parent process and two child processes CO
. under the parent. 4 U 3
15 CO A
. Write the advantages of creating pipes. 5 n 3
16 CO
. Write the syntax for allocating shared memory space. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO 1
Draw and explain the block diagram of the kernel. R
. . 1 2
18 a Discuss the scenarios of buffer retrieval when the kernel can find CO U 1
. . and can find the block on its hash queue. 2 2
21 a CO R 1
Explain the process system calls with its functionalities.
. . 5 2
Q.
Mark
N Questions CO BL
s
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Compare call by value and ref variables in C#. CO1 R 1
2. Name the base class of all classes in C#. CO1 R 1
3. State the process through which the concept of multiple CO4 U 1
inheritance is made possible in C#.
4. Identify the code block that executes regardless of whether an CO4 R 1
exception is thrown or not.
5. Define a thread in the C# application program. CO4 R 1
6. Identify the Thread class property used to get the Main thread CO4 R 1
reference.
7. Identify the namespace required to establish a connection with CO5 R 1
the MySQL database server.
8. State the method name used to assign event handling code with CO4 R 1
Button.
9. State the method used to insert data in Queue Collection. CO4 R 1
10 Define MVC in ASP.NET Framework. CO6 R 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11 Describe the creation and accessing of the jagged array with CO1 U 3
. sample C# code.
12 Write a C# program containing preprocessor directives to CO2 U 3
. check whether a variable PI is declared.
13 Differentiate between the ExecuteReader and ExecuteScalar CO5 U 3
. methods
14 Explain the MessageBox creation in the Windows Form CO4 U 3
. application with a suitable C# code snippet.
15 Give an example program for an Obsolete attribute in C#. CO5 U 3
.
16 List the three types of action selector attributes and their usage CO6 R 3
. with proper syntax in ASP.NET MVC.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a Describe the method overriding in C# with a suitable CO3 U 6
. . example.
b Construct a class to represent a Rectangle with length and
. breadth as instance attributes. Create two rectangle objects,
r1 and r2. Initialize the attributes using the constructor
function and do the following operations using operator
overloading.
Compute r3 = r1 + r2, where r3 is another Rectangle
object, where CO3 A 6
r3’s length = r1’s length + r2’s length
r3’s breadth = r1’s breadth + r2’s breadth
Compute r4 = r1 * r2, where r3 is another Rectangle
object, where
r3’s length = r1’s length * r2’s length
r3’s breadth = r1’s breadth * r2’s breadth
COMPULSORY QUESTION
24 a Develop an ASP.NET web application using C# to perform CO6 A 12
. . the following operations with ADO.NET.
Design a web page with relevant fields
Connect with the database named ‘Employee’
Insert a record in the table called ‘Profile’ with
fields such as EmpName (varchar), EmpId (int) and
Salary (int)
Delete an employee record based on the EmpId
Display the details in an HTML table.
COURSE OUTCOMES
CO1 Describe the basic programming constructs of C# in the .NET Framework.
CO2 Extend and debug a variety of .NET applications.
CO3 Demonstrate the aspects of object-oriented functionalities in .NET applications.
CO4 Use the .NET base libraries in developing real-time applications.
CO5 Illustrate .NET applications with a relational database and a variety of data sources for efficient
data access.
CO6 Develop well-designed ASP.NET applications using the .NET framework.
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Predict the output of the following code snippet. CO U 1
1. int i = 0; 2
2. while (i < 3) {
3. System.out.print(i + " ");
4. i++; }
2. Predict the output of the following code snippet. CO U 1
1. int a = 5; 2
2. int b = 2;
3. int c = a / b;
4. System.out.println(c);
3. ____________ in Java is a special method that is used to initialize CO R 1
objects. 1
4. CO R 1
What is the use of a final class in Java? 2
5. CO U 1
Write down the application of Interface in Java. 3
6. CO R 1
What is the used of implements keyword in Java? 3
7. CO U 1
What is the use of run() method in Multitrheading ? 4
8. The automatic conversion of primitive data types into its equivalent CO R 1
Wrapper type is known as _________ 4
9. CO U 1
Which function used to join two string in java? 5
10 CO R 1
. A _______ is the basic class for all SWING UI components? 6
PART – B (6 X 3 = 18 MARKS)
22 CO U 12
. Demonstrate the usage of multithreading with a suitable example. 4
COURSE OUTCOMES
CO
understand the fundamental principles of object-oriented design.
1
CO
identify the fundamental programming constructs to develop real time applications.
2
CO
model applications using Java.
3
CO
demonstrate the development of multitasking applications
4
CO
breakdown the real time applications into small abstract entities
5
CO
6 develop desktop-based applications.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 1 12 13
CO2 4 17 21
CO3 13 4 12 29
CO4 1 28 29
CO5 3 1 12 16
CO6 1 15 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. State the HTML syntax to include an image of dimensions 200x200. 1 R 1
CO
2. Write the syntax for CSS. 1 C 1
CO
3. State the CSS Selector that selects the HTML element by the * Symbol. 2 R 1
Define the HTML code to display the following text. The Product MRP CO
4. is Rs.10000, Offer Price is Rs.100000 Rs.49999 2 U 1
CO
5. Differentiate between static and relative positioning in CSS. 2 U 1
Write a JavaScript code to execute a function after every specific time CO
6. intervals. 2 A 1
Identify the method used to call a JavaScript function every specified CO
7. millisecond. 3 R 1
CO
8. Identify the purpose of JSON. 2 R 1
State the angular JS filter to display the cost of a product in dollar CO
9. format. 5 U 1
10 CO
. Compare the PHP built -in fcuntions require and include. 4 U 1
PART – B (6 X 3 = 18 MARKS)
11 Explain the data exchange formats such as XML and JSON for web CO U 3
. applications with suitable example. 2
12 Describe the HTML code to display the following content on a web CO U 3
. page. 1
1. Breakfast
Idli
2. Afternoon
Briyani
13 CO U 3
. Explain the popup box functions in JavaScript with suitable examples 3
14 A student class comprises of data members such as regno and name. CO A 3
. Initialize the data members through constructor. Use a member 3
function display() to display the details of student. Write PHP code to
create the object and print the details.
15 Display the array elements in HTML list format using AngularJS ng- CO R 3
. repeat. 5
16 CO U 3
. Define PHP cookies, session and authentication. 4
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Design a website using HTML form elements and media elements CO C 1
. . with the following fields: 1 2
i)create a form for feedback using form elements.
ii)use media element in the above form.
iii)use the text boxes to enter the user names and password.
iv)insert radio buttons to provide ranking level.
v)use checkboxes to give suggestions to improve the session.
vi)create textbox to enter comments.
vii)use buttons to submit the form and reset to clear values entered.
COURSE OUTCOMES
CO
Select appropriate design standards for designing attractive web pages.
1
CO
Identify the latest client and server-side technologies for creating interactive data driven websites.
2
CO
Apply properties and methods which facilitate dynamic application development.
3
CO Model dynamic web applications using suitable server-side technologies integrated with the
4 database
CO Create fully functional web applications that incorporate planning, designing, coding, testing, and
5 publishing to a web server.
CO Attach rich interactive features for web applications using MVC based framework.
6
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Compare and contrast the representation of images in grayscale and CO U 10
. color formats, highlighting their differences in visual perception, 1
data size, and application suitability.
b Analyze the role of Fourier Transform in the advancement of CO A 10
. medical imaging techniques. 4 n
(OR)
2. a Examine the role of technological advancements in shaping the CO R 20
. landscape of medical imaging modalities. Investigate how 1
innovations in imaging technology have influenced the diagnosis
and treatment of various medical conditions.
COURSE OUTCOMES
CO1 describe the specific terminologies and objectives of utilizing different imaging modalities in
clinical
practice
CO2 infer the intensity and filtering operations on medical image datasets.
CO3 summarize the segmentation and multimodal image registration techniques used for clinical
applications.
CO4 analyze the application of imaging techniques like transformations and rendering.
CO5 explain the techniques and concepts of image registration and reconstruction.
CO6 predict the issues in medical image archiving, retrieval and communication and apply the
techniques to real
world problems
Q.
B
No Questions CO M
L
.
PART – A (20X1=20 MARKS)
1. Define Algorithm. CO
R 1
5
2. How do you represent numbers in bits? CO
R 1
3
3. What do you mean by two state devices? CO
R 1
2
4. Which organization has evolved a standard code to represent CO
R 1
characters to be stored and processed by computers? 2
5. Convert the binary number 11011011 into decimal number. CO
E 1
4
6. Which notation is a more concise numerical representation? CO
R 1
1
7. What is GIF? CO
R 1
5
8. Find the Hex equivalent for binary 1011010. CO
A 1
2
9. How do you do the representation of characters in Computers? CO
U 1
2
10. Write about Run length Encoding (RLE). CO
A 1
2
11. How do we convert a continuous analog signal to its digital CO
A 1
equivalent? 2
12. State the Nyquist theorem. CO
A 1
5
13. Write the steps in converting video tape output to digital values. CO
R 1
4
14. Write the two types of Random Access Memory. CO
U 1
3
15. Sketch the structure of CPU CO
U 1
3
16. Define flash memory. CO
R 1
5
17. What is the program which allows entering text using keyboard? CO
U 1
3
18. What assists users to carryout operations of creating, storing, CO
U 1
accessing, editing, updating and querying a database? 5
19. What is User Datagram Protocol? CO
R 1
5
20. What are the functions of Operating Systems? CO
U 1
4
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
21. Sketch the functionality of MP3 music system. CO
U 5
1
22. Write about Error-detecting codes. CO
R 5
2
23. Write down the different image storage formats along with their CO
U 5
applications and advantages. 2
24. Illustrate the MP3 music system. CO
U 5
1
25. Sketch the connection between PCs/LANs and telephone lines. CO
U 5
3
26. Illustrate the compress process of the video tape output. CO
R 5
5
27. Write the specifications of CPU. CO
R 5
3
28. Illustrate the classification of programming languages based on CO
U 5
applications. 3
29. State the functionality of memory cell and list down the ideal CO
R 5
properties of memory cell. 3
30. Write the different display devices and printers. CO
R 5
5
31. Classify the different types of Programming languages. CO
R 5
5
32. Explain the generation of audio output. CO
An 5
2
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
33. a. Write about the processing and displaying textual data. CO
U 5
2
b. Elaborate the fundamentals of image compression with CO
U 10
examples. 2
34. Elucidate the different applications of LAN. CO
U 15
5
35. List and explain the various physical devices that are used as CO
R 15
memory cells. 3
COURSE OUTCOMES
CO1 The student will be able to classify different forms of data
CO2 The student will be able to acquire different forms of data
CO3 The student will be able to analyze the working of hardware and software
CO4 The student will be able to organize the data
CO5 The student will be able to work on technologies related to multimedia and Internet
Q.
No Questions CO BL M
.
PART – A (10 X 1 = 10 MARKS)
1. State whether the following condition will evaluate to True or CO R 1
False. 1
if ( (5<4) || (5>10) )
2. Locate the invalid variable(s) in the following declarations. CO R 1
int number; 1
float if;
int variable_count;
int $main;
3. Define an Algorithm. CO R 1
2
4. The data type of the controlling statement of a switch statement CO R 1
cannot be of the type________ 2
(a) int (b) char (c) short
(d) float
5. Identify the unconditional branching statement that terminates the CO U 1
execution of a loop. 3
6. List all conditional control statements used in C CO R 1
3
7. List the two ways a string can be declared. CO R 1
4
8. Identify the value of arr[1] from the below line of code CO U 1
int arr[]={9,6,4,2,3,5,1,7,8}; 4
9. Define recursion in C. CO R 1
5
10. Predict the error / output in the following program: CO U 1
#include<stdio.h> 6
#include<string.h>
void main(){
char str1[]="abc", str2[]="def";
printf("%d", strcmp(str1,str2));
}
PART – B (6 X 3 = 18 MARKS)
11. Define any three characteristics of computer. CO U 3
1
12. List the operator precedence rules used in C programming CO U 3
language. 2
13. Write a simple program to find whether a number is a multiple of 2 CO A 3
or not. 3
14. Explain the Linear search algorithm with an example. CO U 3
4
15. Describe a function prototype along with its syntax. CO U 3
5
16. Develop an application in C programming to store 5 user names A CO 3
and addresses using structures. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No 17 to 23, Q. No 24 is Compulsory)
17. a. Explain the various parts of a C program along with its CO U 4
features. 1
b Write the algorithm to find the area of the rectangle by getting CO U 8
. the value from the user and develop the program for the same. 1
COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the data type to represent the real time data representation and operators for
computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using the
divide and conquer approach.
CO5 Formulate algorithms and programs using arrays, pointers, and structures.
CO6 Create a new application software to solve real-world problems.
Q.
B Mark
No Questions CO
L s
.
PART – A (20 X 1 = 20 MARKS)
Variables common to all functions in a program are known as CO
1. U 1
___________. 1
CO
2. U 1
The exit-controlled loop in C is _____________. 1
CO
3. U 1
Define ASCII. 1
CO
4. U 1
List the statement used for input and output function. 1
CO
5. U 1
Give an example of integer constant. 1
_________________ can be used to store different data under a CO
6. U 1
single name. 1
CO
7. U 1
____________is the format specifier used for integer. 1
CO
8. U 1
Give an example of spreadsheet application. 1
CO
9. U 1
List any two examples of bitwise operator. 1
CO
10. U 1
State the escape sequence of newline character. 1
CO
11. An 1
Differentiate = operator and == operator. 1
CO
12. U 1
List the usage of recursive function. 1
CO
13. U 1
______ is the size of the character variable. 1
CO
14. U 1
Give any two examples of variable. 1
CO
15. U 1
Define interpreter. 1
CO
16. U 1
State any two input output function. 1
CO
17. U 1
List any two examples of operating system. 1
CO
18. U 1
List any two rules of a constant. 1
CO
19. U 1
Name any one iterative statement. 1
CO
20. U 1
Give any one example of three dimensional array. 1
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
CO
21. Discuss the characteristics of fifth generation computers. U 5
1
CO
22. Design the truth table for bitwise AND and NAND operator. C 5
2
CO
23. Discuss about the different data types in c programming. U 5
2
CO
24. Describe the break statement with suitable example. U 5
2
Develop a c program to find whether the given number is CO
25. C 5
positive or negative. 3
CO
26. Report on switch case statement with suitable examples. U 5
2
CO
27. List any five string functions with suitable examples. R 5
2
Develop a c program to find the smallest of n number using CO
28. C 5
array. 4
CO
29. Compare and contrast the structure and union. An 5
2
Develop a c program to create a structure for loan details CO
30. C 5
(loanno, name_of_customer, amount) and access the same. 6
List any five applications of array in the real world and explain CO
31. R 5
the same. 5
CO
32. Demonstrate sum of n numbers using function. A 5
6
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
33. a. CO U 8
Discuss about the different classification of computer.
2
b Design a block diagram and explain the basic computer CO C 7
. organization. 1
34. Explain the various operators available in C with suitable CO U 15
examples. 3
COURSE OUTCOMES
CO1 Understand the fundamental principles of programming.
CO2 Gain knowledge on the concepts of structured programming.
CO3 Understand logics of solving problems.
CO4 Solve problems using basic programming techniques.
CO5 Apply programming to solve real world problems.
CO6 Illustrate the role of programming in real life scenarios.
Assessment Pattern as per Bloom’s Taxonomy
CO / BL R U A An E C Total
CO1 24 1 22 47
CO2 5 23 5 5 38
CO3 15 5 20
CO4 5 5
CO5 5 5
CO6 5 5 10
125
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the type of attack from the following diagram. CO U 1
1
CO R 1
2. List the authentication requirements. 1
State whether Symmetric and Asymmetric cryptographic algorithms CO R 1
3. need key exchange. 2
CO R 1
4. Define ElGamal encryption algorithm. 2
Identify any two applications where one way authentication is CO U 1
5. necessary. 3
CO R 1
6. Name the security services involved in digital signature. 3
CO U 1
7. Give examples for X.509 certification. 4
CO R 1
8. List the requirements of Kerberos. 4
CO U 1
9. Cite any two properties of Pretty Good Privacy. 5
10 CO U 1
. Relate the usage of IPsec in Cryptography. 6
PART – B (6 X 3 = 18 MARKS)
11 Divide the data “Better late than never into blocks using AES CO A 3
. Algorithm. 1 n
12 Estimate the value for encryption and decryption using RSA Algorithm CO U 3
. for the following. 2
P=17; q=11; e=7; M=88.
13 CO A 3
. Prioritize the role of compression function in Hash functions. 3 n
14 CO U 3
. Classify the different roles of the intruder. 4
15 CO A 3
. Infer the steps for preparing envelope data using MIME. 5 n
16 CO U 3
. Represent the structure of ESP packet format? 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO A 1
. . Explain in detail about DES and Triple DES. 1 2
18 a Calculate the cipher text from the given details using RSA CO A 6
. . Algorithm. 2
p=7, q=11, e=17,M=8. Discuss its merit
b Discuss the discrete logarithm and explain Diffie Hellman Key CO U 6
. Exchange algorithm with its merits and demerits. 2
22 a Compute the value of key from the given problem and write short CO A 1
. . notes on each step. 2 2
Alice & Bob exchange the key. Assume α=5 q=83 XA=6 XB=10.
Find YA, YB, K.
COURSE OUTCOMES
CO
summarize the computer security concepts and their needs
1
CO
Apply the various symmetric and asymmetric key algorithms.
2
CO experiment with the various principles of cryptosystems, hashing algorithms and digital
3 signatures
CO
Recognize the importance of network security.
4
CO
evaluate network and internet security
5
CO
6 Explain the different types of virus/worms & firewalls.
Q.
Mark
N Questions CO BL
s
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List any two characteristics of algorithm. CO1 R 1
2. State the formula to calculate the space complexity. CO1 R 1
3. Examine any two applications of greedy method. CO2 R 1
Write the time complexity of the fractional knapsack problem
4. CO2 A 1
using greedy solution.
Identify the number of multiplications to be done for
5. CO3 R 1
multiplying the matrices A (10 X 6) and B (6 X 7).
6. Discuss the solution for two queen problem. CO4 U 1
7. Define branch and bound. CO4 R 1
8. List the characteristics of minimum spanning tree. CO5 R 1
9. Define the Topological Sorting of a graph. CO5 R 1
10
Differentiate between class P and class NP problems. CO6 U 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
Write short notes on Big-O notation with suitable example. CO1 A 3
.
The jobs J = (J1,J2,J3,J4,J5) are assigned profit Pi= (100, 60,
12
40, 20, 20), with deadlines Di = (1, 2, 2, 3, 1). Calculate the CO2 An 3
.
maximum number of jobs that can be completed.
13 Apply the dynamic programming approach to compute the
CO3 A 3
. longest common subsequence between " abcde" and " ace".
14 Calculate the total reduced cost for the following graph: CO4 An 3
.
Identify any three spanning tree from the following vertices.
15
CO5 R 3
.
16
Write short notes on Vertex Cover Problem. CO6 A 3
.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a Explain the steps in mathematical analysis of non-recursive CO1 U 6
. . method for the following problem:
Given two n × n matrices A and B, find the time efficiency
of the definition-based algorithm for computing their
product C = AB. By definition, C is an n × n matrix whose
elements are computed as the scalar (dot) products of the
rows of matrix A and the columns of matrix B:
b Apply Master’s theorem to represent the solution of the CO1 A 6
. following recurrence relations using the asymptotic
representations:
a) T(n) = T(n-2) + O(1)
b) T(n) = 3T(n-2) + n2
18 a Apply the optimal binary merge pattern algorithm for the CO2 A 6
. . following files f1, f2, f3, f4 and f5 with 2, 7, 9, 3 and 5
number of elements respectively. Calculate the number of
operations performed on each file.
b Sketch an algorithm for to find the set of jobs which can be CO2 A 6
. completed within the deadline with maximum profit value
using greedy technique.
COURSE OUTCOMES
CO1 analyze given algorithm and express its complexity in asymptotic notation
CO2 design algorithms using brute force and greedy techniques
CO3 develop dynamic programming solutions for optimization problems
CO4 propose solutions using backtracking and branch-and-bound technique
CO5 solve problems using fundamental graph algorithms
apply suitable algorithmic technique to solve a problem and identify the problems belonging
CO6
to the class of P, NP-Complete or NP-Hard
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO
Differentiate between Partitioning and Hierarchical Based clustering.
1 R 1
2. CO
Define entropy. 1 R 1
3. Consider the following SOM network. How many output nodes can fire CO U 1
simultaneously? What is the maximum number of clusters that can be 2
formed using SOM when provided with sufficient input data?
4. CO R 1
Which impurity measure is used for CART approach? 2
5. CO U 1
Mention the types of regression algorithms. 3
6. CO R 1
List the advantages of SVM. 3
7. Assuming that you want to cluster 5 datasets consisting of 2 attributes CO U 1
(x1, x2) into 2 clusters using the K-Means clustering algorithm. The 4
cluster outputs after the first iteration are C1= {(2,2), (3,3), (4,4)} C2 =
{(0,2), (2,0)}. Calculate the new cluster centroids of C1 and C2 at the
end of the first iteration.
8. CO U 1
Compare K-means clustering and Hierarchical clustering. 4
9. CO R 1
List the linkage methods used in clustering. 5
10 Consider the following input to the max-pooling layer. The pooling CO A 1
. size of neurons in this layer is (3, 3). What would be the output of this 6
pooling layer?
PART – B (6 X 3 = 18 MARKS)
15 CO U 3
. Differentiate classification and regression trees. 5
16 Write the pseudocode of the All-vs.-all (AVA) multiclass classification CO
. approach. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the geometric and logical machine learning models in CO U 6
. . detail with suitable examples. 1
b Determine the consistent hypothesis using Candidate elimination CO A 6
. algorithm for the given dataset. 1
Origin Manufacturer Color Decade Type Target
Japan Honda Blue 1980 Economy Positive
Japan Toyota Green 1970 Sports Negative
Japan Toyota Blue 1990 Economy Positive
Japan Honda White 1980 Economy Positive
PCV 46 42 44 41 39 31
b Summarize the various procedures involved in handling missing CO U 6
. and noisy data in data cleaning preprocessing method with suitable 2
examples.
22 a Construct the first level of the tree (i.e. the root node) using CO A 7
. . ''Decision Tree’ approach for the following dataset. 3
RID Age Income Student Rating Buy
1 <=30 High No Fair No
2 <=30 High No Excellent No
3 31..40 High No Fair Yes
4 >40 Medium No Fair Yes
5 >40 Low Yes Fair Yes
6 >40 Low Yes Excellent No
7 31..40 Low Yes Excellent Yes
8 <=30 Medium No Fair No
9 <=30 Low Yes Fair Yes
10 >40 Medium Yes Fair Yes
11 <=30 Medium Yes Excellent Yes
12 31..40 Medium No Excellent Yes
13 31..40 High Yes Fair Yes
14 >40 Medium No Excellent No
b Consider the following table and analyze the results using apriori CO A 5
. algorithm by generating frequent 2-itemset and 3-itemset with 3 n
minimum support = 2 and confidence = 70%.
23 a Apply the Naive Bayes classifier on the given dataset and determine CO A 6
. . the diagnosis class for the symptoms 3
<chills-Yes, runny nose-Yes, headache-Strong, fever-No>
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Predict the output of the following C++ code: CO U 1
#include <iostream> 1
using namespace std;
int main(){
int a = 8;
cout << "ANDing integer 'a' with 'true' :" << a && true;
return 0;
}
2. Predict the output of the following C++ code: CO A 1
#include <iostream> 1
using namespace std;
int operate (int a, int b)
{
return (a * b);
}
float operate (float a, float b)
{
return (a / b);
}
int main ()
{
int x = 5, y = 2;
float n = 5.0, m = 2.0;
cout << operate (x, y);
cout << operate (n, m);
return 0;
}
3. Predict the output of the following Java code snippet: CO U 1
int var1 = 5; 1
int var2 = 6;
System.out.println(var1 > var2);
4. Predict the output of the following Java code: CO A 1
abstract class Bike{ 2
abstract void run();
}
class Honda extends Bike{
void run(){System.out.println("running safely");}
public static void main(String args[]){
Bike obj = new Honda();
obj.run();
} }
5. Differentiate between process based multitasking and thread based CO U 1
multitasking. 3
6. Demonstrate auto-boxing and auto-unboxing for Integer Type Wrapper CO U 1
class. 3
7. CO R 1
List the advantages of Generics in Java. 4
8. Identify the keyword used to refer the immediate parent class members CO R 1
from the sub class. 3
9. Predict the output for the following code: CO U 1
TreeSet<String> t = new TreeSet<String>(); 4
t.add("Apple");
t.add("Orange");
t.add("Kiwi");
t.add("Pineapple");
System.out.print(t.last());
10 Name the listener to recognize the state change of an item in Java CO R 1
. Swing. 6
PART – B (6 X 3 = 18 MARKS)
11 CO U 3
. Describe the looping control statements in C++ with suitable example. 1
12 Discuss any two different ways of creating arrays in Java? Explain with CO U 3
. example 2
13 List out the three uses of final keyword in Java and explain with CO R 3
. example. 3
14 Consider the following code: CO U 3
. class Demo { 4
int a,b;
double c,d; }
public class MainDemo
public static void main(String[] args) {
Demo obj = new Demo();
}}
Rewrite the above code by adding default and parameterized
constructors. Construct necessary objects to invoke the constructors to
initialize the data members of Demo class.
15 CO U 3
. Illustrate the usage of inter-thread communication. 5
16 Construct the code snippet to handle the event which is generated by CO A 3
. javax.swing.JButton. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss the logical and relational operators in C++ using suitable CO U 6
. . example. 1
b Illustrate passing objects to functions and returning object from CO U 6
. functions through an appropriate example. 1
18 a Develop a Java class called “Event” with Event_name, Budget and CO A 6
. . Venue as data members. Develop the member functions such as 2
add_event, edit_event and display_event. Demonstrate the above-
mentioned class with five array of objects.
b CO U 6
. Illustrate the three types of inheritance with suitable Java code. 2
COURSE OUTCOMES
CO
define the object-oriented programming concepts.
1
CO select the relevant object oriented concepts to implement a real time application with design
2 patterns
CO
demonstrate the application of polymorphism in various ways
3
CO
illustrate the use of inheritance, exceptions, generics and collection
4
CO
develop applications with event-driven graphical user interface and file management
5
CO
6 describe software development process
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO
Give two examples of Language processors. 1 R 1
2. CO
Define Macro instruction. 2 R 1
3. Draw a parse tree for the string “xyyxy” from the given context free CO U 1
grammar. 4
S → AB
A → xB | λ
B → yA | zB
4. Determine the left factored grammar for the following grammar. CO U 1
S iEtS | iEtSeS | a 4
E b
5. List the possible LR(0) items of the given production. CO R 1
A → abc | xy 4
6. CO R 1
Define Synthesized attribute. 3
7. CO
List the type expression operators. 4 R 1
8. CO
Give an example for syntax directed definition. 3 R 1
9. CO
Define flowgraph. 6 R 1
10 CO
. List the peephole optimization techniques. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 Define the following: CO R 3
. a) Loading b) Relocation c) Linking 2
12 CO U 3
. Show how the LEX tool works to generate a sequence of tokens. 3
13 CO U 3
. Differentiate top down and bottom-up parsing techniques. 5
14 Eliminate left recursion from the following grammar. CO U 3
. X → XYd | Xa | a 4
Y → Ye | b
15 CO U 3
. Write a short note on the working of a bootstrap loader. 2
16 CO U 3
. Define a sound type system. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Show the steps in a language processing system using a flow CO U 8
. . diagram and explain each of them in detail. 1
b Explain how the assembler converts the assembly language CO A 4
. program into object code with an example. 1
20 a CO R 6
. . Draw a general activation record and explain the fields in it. 6
b CO U 6
. Explain the parts of the YACC source program with an example. 6
23 a Construct the SLR parsing table for the grammar given below. CO A 6
. . E → T+E | T 4
T → id
b Consider the following SLR parsing table. Show the actions the CO A 6
. parser will take when parsing the string “a * b + a – ” 4
COMPULSORY QUESTION
24 Examine the issues faced in the design of a Code Generator phase CO A 1
. of the Compiler. 6 2
COURSE OUTCOMES
CO
explain algorithm and data structures for assembler
1
CO
develop algorithms for macros and loaders
2
CO
list and define various stages of compiler
3
CO
select and use standard tools and techniques in different stages of compiler design
4
CO
compare and contrast various methods for implementing the phases of a compiler
5
CO
6 design and construct different phases of the compiler
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Indicate the HTML code to include an external CSS file in the HTML CO
1. page. 1 U 1
CO
2.
Differentiate GET and POST method HTTP. 1 U 1
Define the HTML syntax used to attach the external JavaScript file in CO
3. an HTML document. 2 R 1
CO
4. Write the syntax for CSS. 2 R 1
Define the syntax to perform the page redirection in PHP. CO
5. 3 R 1
CO
6.
Name the event triggered when the HTML button element is pressed. 3 R 1
CO
7.
Name the PHP array variable used to store session data. 4 R 1
CO
8. Give an example php code to illustrate the ‘for’ loop statement. 4 U 1
CO
9. Write a code snippet to create an AngularJS module. 5 A 1
10 CO
.
Identify the CSS property to change the text size in an HTML page. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO A
.
Give an example for DTD in XML. 1 n 3
12 Describe any three super global variables in PHP with example code CO
. snippets. 2 U 3
13 Demonstrate the popup box functions in JavaScript with suitable CO
. examples. 3 U 3
14 A student class comprises data members such as Regno and name.
. Initialize the data members through the constructor. Use a member
function display () to display the details of the student. Write PHP code CO
to create the object and print the details. 4 A 3
15 CO
. List any three types of AngularJS filters with their examples. 5 U 3
16 CO
. Write a brief note on the ng-repeat directive using AngularJS code. 6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Elucidate the various types of List elements in HTML5. CO U 6
. . 1
b Explain the following HTML form elements with appropriate CO U 6
. examples. 1
Text Field
Password Field
Radio Button
Checkboxes
File Upload
Email Field
18 a Consider the webpage contains four parts. Write CSS rules to apply CO A 8
. . the following styles. 2
1: Set the dotted border with a 5px thick, green color.
2: Display an image with an opacity of 0.2.
3: Display a text with italic and center alignment.
4: Display a text in red color with a font size of 24px
b Explain the CSS box model with suitable HTML and CSS code. CO U 4
. 2
COMPULSORY QUESTION
24 a Design a dynamic shopping list by letting the user to add and CO A 8
. . remove the items using AngularJS directives. Get a new item value 6
from the user with text box and add it to the shopping list with cross
mark (x) on add button click. Also remove the item from the list
when the cross mark (x) is clicked.
COURSE OUTCOMES
CO1 Identify the relevant properties and methods which facilitate dynamic application development.
CO2 Explain the development of fully functional web applications that incorporates planning, designing,
coding, testing, and publishing to a web server.
CO3 Apply latest client and server side technologies for creating interactive data driven websites.
CO4 Model dynamic web applications using suitable latest server-side technologies integrated with
database.
CO5 Formulate and build extensible web applications using the Model View Controller design pattern.
CO6 Select appropriate design standards for designing attractive web pages.
Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
Name the file system that is distributed to run on commodity CO
1. R 1
hardware. 1
State the name of the concept that is based on dividing a large
CO
2. problem into smaller ones and each of them is carried out by one R 1
1
single processor individually.
Identify the type of data that comes from the likes, tweets & CO
3. U 1
retweets, comments, video uploads, and general media. 2
CO
4. List the 3 sources of big data. R 1
2
CO
5. Name the platforms on which YARN containers gets executed. R 1
3
CO
6. State the syntax to define a variable in Hive. R 1
3
CO
7. Recall any 2 commands used in Hive DDL. R 1
4
Identify the method used for distributing a single dataset across
CO
8. multiple databases, which can then be stored on multiple U 1
4
machines.
Name the secure cluster that use the operating system facilities to CO
9. R 1
offer execution isolation for containers 5
Identify the type of chart in Tableau that will be used for
10 CO
comparing multiple sets of data and representing their minimum U 1
. 6
and maximum values.
PART – B (6 X 3 = 18 MARKS)
11 CO
Paraphrase the use of big data in social network analysis. U 3
. 1
12 CO
Sketch the overview of Hadoop ecosystem. A 3
. 2
13 Discuss the following:
CO
. a) Mapper b) Reducer U 3
3
b) Combiner d) Partitioner
14 CO
List the important features of Oozie Bundles. R 3
. 4
15 Write hive commands for the following in Hadoop: CO A 3
. a) Creating a Database b) Creating a Table
5
b) Altering a Table
16 List the phases involved in the Analytic process of Big Data CO
R 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17 a Discuss the use of big data in preventing fraudulent activities CO
U 6
. . and list the most common types of financial frauds. 1
b Illustrate the impact of big data in retail industry and list the
CO
. ways through which Amazon has improved the profit in retail U 6
1
industry.
18 a Paraphrase the features and goals of Hadoop Distributed File CO
U 6
. . System (HDFS). 2
b CO
Describe in detail about the working of MapReduce. U 6
. 2
19 a CO
List the steps involved in MapReduce process. R 6
. . 3
b Illustrate the architecture of YARN and list the components CO
U 6
. involved in it. 3
20 a CO
Discuss in detail the Operators used in Pig. U 6
. . 4
b Identify the types of jobs involved in Oozie and also explain CO
U 6
. the functional components of Oozie with a suitable diagram. 4
21 a Discuss the different types of NoSQL databases with an CO
U 6
. . example. 5
b Describe in detail the following:
CO
. a) Flume b) Sqoop U 6
5
b) Mahout d) Clustering and Classification
22 a CO
Discuss in detail Distributed and Parallel Computing. U 6
. . 1
b Describe the following: CO
U 6
. a) Cloud Computing b) In-memory Computing 1
23 a CO
Discuss in detail about the different Hive Services. U 6
. . 4
b CO
Illustrate the different data types available in Hive. U 6
. 4
COMPULSORY QUESTION
24 a CO
Discuss in detail the types of Big Data Analytics. U 6
. . 6
b Explain in detail the following in Tableau: CO
U 6
. a) Data Types b) Tableau Charts 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the big data concepts, data analytics life cycle and applications.
CO2 Illustrate the different eco system components of Hadoop.
CO3 Develop MapReduce programs for real world problems.
CO4 Justify the need of YARN Hadoop2 framework for big data analytics.
CO5 Classify various NoSQL databases.
CO6 Use big data analytics and data visualization techniques to analyze data and to provide business
insights.
Assessment Pattern as per Bloom’s Level
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 27 - - - - 29
CO2 1 13 3 - - - 17
CO3 8 9 - - - - 17
CO4 4 25 - - - - 29
CO5 1 12 3 - - - 16
CO6 3 13 - - - - 16
124
Q.
Mark
N Questions CO BL
s
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the type of menus available in android. CO3 R 1
2. List the features of android. CO3 R 1
Identify the component used to send information among any
3. CO3 U 1
applications.
Recall the controls used to manage the visibility of the
4. CO2 R 1
notification.
5. Name the call back methods in the android bounded services. CO2 R 1
6. List the operations of content providers in android. CO4 R 1
Identify the callback method that supports to remove all the
7. CO2 U 1
notifications.
Name the method used to retrieve the information of all
8. CO4 R 1
available networks.
9. List the callback methods in fragments. CO3 R 1
10
Recall the prerequisite to publish an android app. CO6 R 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
Summarize Android view groups. CO1 U 3
.
12
Compare android Dalvik machine and android runtime. CO1 U 3
.
13 Sketch the working of android content provider. CO4 U 3
.
Write a code snippet to send notification as
14
CATEGORY_ALARM when the user has enabled CO2 A 3
.
DoNotDisturb mode.
15
Write an android application code to manage WIFI. CO4 A 3
.
16 Write a mobile application code to create a TabLayoutMediator
CO5 A 3
. to link the TabLayout with ViewPager2.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a
Illustrate android activity life cycle with suitable diagram. CO1 U 6
. .
Write an android application code to implement the
following.
b
CO3 C 6
.
CO5 C 12
20 a
Write a mobile application code to handle popup menu. CO3 A 6
. .
b Explain shared preference with an example android
CO4 U 6
. application.
24 a
CO6 C 12
. .
COURSE OUTCOMES
CO1 identify a significant programming component, involving the sensors and hardware features
of mobile devices.
CO2 use the power of background tasks.
CO3 model mobile applications with appropriate, layouts and user interfaces.
CO4 demonstrate applications with network connectivity, messaging and persistent storage.
CO5 design and develop android applications for real time problems.
CO6 build, sign and publish mobile applications.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Infer the output for the following program. CO U 1
print(28//4**2*4) 1
2. CO R 1
Find the correct symbol to indicate single-line comment in Python. 1
3. Print the second item in the fruits list given below. CO R 1
fruits = ["apple", "banana", "cherry"] 2
print( _______ )
4. CO R 1
Convert the binary number 1001 into equivalent decimal value. 2
5. CO U 1
Outline the concept of top-down design of problem solving in Python. 3
6. Write the Python program to show the use of + operator for different CO U 1
purposes. 3
7. Identify the suitable library to to convert colors between RGB and CO U 1
other coordinate systems. 4
8. CO R 1
State the significance Python Imaging Library(PIL). 4
9. CO U 1
Differentiate process and thread. 5
10 Identify the suitable mechanism in Python to address critical section CO U 1
. problem. 6
PART – B (6 X 3 = 18 MARKS)
11 Develop a Python program that asks the user to enter a password and CO A 3
. keep asking for the password until the correct password is entered. 1
12 Illustrate the creation of a dictionary and the method for accessing its CO U 3
. elements using Python code. 2
13 Analyse the output of the following. CO A 3
. def tri_recursion(k): 3 n
if(k > 0):
result = k + tri_recursion(k - 1)
print(result)
else:
result = 0
return result
print("\n\nRecursion Example Results")
tri_recursion(6)
14 CO U 3
. Write a Python program to draw square using Turtle programming. 4
15 Develop a Python code to create simple button event as shown below. CO A 3
. 5
16 CO
. Outline the key components and functionality of chat script in Python. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain various looping statements in python with suitable CO
U 6
. . examples. 1
b For a given integer M, print all the cube of integer numbers from 1, CO U 6
. where the cube is less than or equal to M, in descending order. 1
COURSE OUTCOMES
CO
understand and apply the basic programming constructs of Python suitably
1
CO
infer the concepts of string processing, file I/O, lists and dictionary
2
CO apply modules for reusability and the object-oriented principles for modeling and developing
3 software system.
CO
make use of graphics for processing images.
4
CO
construct applications with graphical user interface.
5
CO
6 develop software solutions using multi-threading, networking and client-server concepts.
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Social Network Analysis. CO1 R 1
2. State edges in a network. CO1 R 1
3. Give two examples of secondary sources for collecting network data. CO2 U 1
4. List the two primary formats for closed-ended questions. CO2 R 1
5. Differentiate clusters and dimensions. CO3 U 1
6. Name the components SAOM. CO3 R 1
7. List the ways to choose appropriate methods in large networks. CO4 R 1
8. List any two approaches to find the coreness. CO4 R 1
9. Define faction in Social Networks. CO5 R 1
10. State the importance of cohesion in a network. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Explain the path and walk with suitable examples. CO1 U 3
12. Differentiate between Census and Survey. CO2 U 3
Explain how randomization tests can be used to test a variety of network
13. CO3 U 3
hypothesis.
14. Describe one-mode networks. CO4 R 3
15. List the properties of equivalence class. CO5 R 3
16. Describe homophily and transitivity in a network. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Describe Strongly connected, Weakly connected and Unilaterally CO1 U 7
connected components with examples.
b. Construct an Adjacency matrix for the given directed graph. CO1 A 5
18. a. Explain in detail about connected graphs and disconnected graphs with CO1 U 5
examples.
b. Determine the various types of errors that occur in social networks. CO2 A 7
19. a. Describe the ways to construct a network from nodelist using UCINET CO2 U 7
DL Editor.
b. Write in detail about archival data collection. CO2 C 5
Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Virtual Reality. CO1 R 1
2. Identify the three I’s of VR technology. CO1 U 1
3. Define interaural time difference. CO2 R 1
4. Classify the types of HMDs. CO2 U 1
5. CO3 1
List the advantages of the workstations over PCs. R
Identify the key aspects used to characterize the distributive
6. CO3 U 1
network.
7. Define Toolkit. CO4 R 1
8. State the purpose of scene graphs in VR programming. CO4 R 1
9. Define cybersickness. CO5 R 1
10. List the applications of VR in the field of science and technology. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Compare the performance of DidjiGlove with CyberGlove. CO1 U 3
12. Sketch the optical arrangement present in a virtual binocular. CO2 A 3
Explain the working of multipipeline synchronization in a
13. CO3 A 3
distributed VR engine.
14. Sketch the scene graph for the following picture. CO4 A 3
20. a Illustrate the working mechanism of the general haptics open CO4 A 7
. software toolkit with a diagram.
b CO4 A 5
. Explain the importance of scene graphs in VR programming.
21. a Illustrate the working of human auditory system using a neat CO2 A 6
. labeled diagram.
b Determine an expression for crosstalk found in speaker-based CO2 A 6
. 3D sound.
22. a CO5 A 7
. Explain the indirect effects of VR simulation on users.
b Analyze the impact of VR technology on the professional life CO5 A 5
. of the users. n
Q. CO
B M
No. Questions
PART – A (10 X 1 = 10 MARKS)
1. Formulate the output of the following expression CO1 C 1
print(3*3**3//2)
2. Describe the symbol used for single line comment with an example. CO1 U 1
3. Write the output of the following segments of code. Months = “Mon, Tue, CO2 R 1
Wed, Thu, Fri” print(Weeks[::5])
4. Write a Python command to insert 5 in a list ‘‘L’’ at 3rd CO2 U 1
position.
Describe the syntax of if else statement.
5. CO3 E 1
6. Find the output of the following expression if the CO3 U 1
list1 = [7, 8, 9, 10, 11 ]
print(list1[3])
7. Define Recursive function. CO4 R 1
8. Find the output of the below python code CO4 U 1
person = {
"name": "John",
"age": 30,
"city": "New York"
}
print("Name:", person["name"])
print("Age:", person["age"])
print("City:", person["city"])
22. a. Formulate a python code by analyzing the given dictionary dict = CO4 C 6
"name": "John", "age": 30, "city": "New York"} and perform the
following operations.
Add a new key-value pairs.
Remove all the key-value pairs.
Update the value of Dept from CSE to ECE available in
the dictionary.
Modify the value of existing key
b. Review the application of user-defined packages in Python.
CO3 U 6
Compulsory:
24. Discuss the file operations in Python using your own examples. CO6 U 12
COURSE OUTCOMES
CO1 describe the datatypes, expressions and type conversions in Python
CO2 use functions, control statements, strings, lists and dictionaries in python programming.
CO3 demonstrate the concept of object, class inheritance and polymorphism in Python.
CO4 write user defined functions, classes in python.
CO5 develop GUI based Python program and to read and write files using python programming.
CO6 create python program for real world applications
CO 1 7 4 11
CO 2 1 16 12 29
CO 3 13 1 15 29
CO 4 1 1 3 6 11
CO 5 3 13 1 17
CO 6 3 12 12 27
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q. B
Questions CO M
No. L
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Analyze the complexity of a binary counter in terms of cost using CO A 0
. aggregation, accounting and potential methods. 1 n 8
b Apply Dijkstra’s algorithm to find the shortest path for the given CO A 0
. graph G. 5 8
COURSE OUTCOMES
CO1 state the correctness of the basic algorithms for the classic problems.
CO2 understand the mathematical foundation in analysis of algorithms
CO3 analyze the efficiency of algorithms using time and space complexity
CO4 understand different algorithmic design strategies
CO5 choose the appropriate data structure for solving a particular set of problems.
CO6 developing efficient algorithms of various problems in different domains
Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Illustrate the frame format of NRZ, NRZI and stress on the CO U 1
. importance of Error detection. 1 6
3. a Compare and Contrast IPV4 and IPV6 along with its fragmentation CO U 1
. details. 2 6
4. a Compare and contrast the various routing protocols along with its CO U 1
. algorithm. 3 6
COURSE OUTCOMES
CO1 identify and discuss the concepts underlying protocols, and their main characteristics and
functionality.
CO2 identify the various TCP/IP protocols that used for particular networking application.
CO3 recognize the requirement of Interior and exterior routing protocols that are used for different
networks.
CO4 understand the behavior of internetworking different networks in MPLS networks.
CO5 apply knowledge of the TCP/IP layering model to intelligently debug networking problems.
CO6 evaluate theoretical and practical concepts behind the design of multi-constrained
applications and services.
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Explain the encryption and decryption of Advanced Encryption CO A 10
1.
. Standard in detail. 1
b Explain the Open Systems Interconnection security architecture. CO A 10
. 1
(OR)
a Analyze the effectiveness of Diffie-Hellman key exchange CO A 10
2.
. algorithm with an example. 2 n
b Compute encryption and decryption using RSA algorithm by CO A 10
. considering the following parameters: p=11, q=13, e=11 and M=7. 2
COURSE OUTCOMES
CO1 recognize the importance of cryptography.
CO2 distinguish different kinds of attacks and design new security features.
CO3 apply key management using various symmetric and asymmetric key algorithms.
CO4 categorize cryptographic data integrity algorithms.
CO5 explain the different types of firewalls.
CO6 evaluate wireless network and cloud security.
Q.
Mark
No Questions CO BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a List the keys in the following binary tree in in-order, pre- CO1 A 8
. order, post-order and level order traversals.
b CO1 R 8
. Give an example of a Binary Tree and show the array
representation for the following tree:
5. a Insert the Keys 1, 4, 7, 10, 17, 21, 31, 25, 19, 20, 28 and 42 in CO A 10
+¿¿
. this order in an initially empty B Tree of order 4. 5
b Describe the Breadth First Search algorithm of the graph with CO R 6
. an example. 5
7. a State AVL Tree Rotations and build the tree for the following CO An 10
. sequence of numbers: 15, 17, 11, 7, 53, 3, 13, 12, 8, 60, and 5
19. Demonstrate each insertion and rotation performed during
the tree formation process.
b Compute the in-degree and out-degree of the vertices in the CO U 6
. graph given. 5
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a Consider the sum-of-subset problem, n = 4, Sum = 13, and w1 CO E 12
. = 3, w2 = 4, w3 = 5 and w4 = 6. Find a solution to the 6
problem using backtracking. Show the state-space tree leading
to the solution. Also, number the nodes in the tree in the order
of recursion calls.
b Briefly define "tractable problem" and "non-tractable CO R 8
. problem" with an example. 6
COURSE OUTCOMES
CO1 Select an appropriate design technique for finding solution to a problem.
CO2 Design algorithms using greedy and dynamic programming techniques.
CO3 propose solutions using backtracking and branch and bound technique
CO4 Analyze the efficiency of various algorithms and express its complexity in asymptotic
notation
CO5 Solve problems using fundamental graph algorithms.
CO6 identify the problems belonging to the class of P, NP, NP-complete or NP-hard
Q.
No QUESTIONS CO BL M
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a CO U 6
. Explain the contents of a system catalog. 1
b Consider the following relations and query: CO A 1
. Sailors(sid: integer, sname: string, rating: integer, age: real) 1 0
Reserves(sid: integer, bid: integer, day: dates, rname: string)
6. a CO R 8
Describe the three main architectures for distributed DBMSs
. 4
b Discuss how each of the following operators be parallelized CO U 8
. using data partitioning: scanning, sorting, join. Compare the use 4
of sorting versus hashing for partitioning.
7. a Name any two applications that deal with spatial data and CO U 6
. specify their requirements on a database system. Explain feature 6
vector and mention its uses.
b Consider the Employees and Departments relations described as CO A 1
. follows: 4 0
Employees(eid: integer, did: integer, sal: real)
Departments(did: integer, mgrid: integer, budget:
integer)
The above tables are now stored in a distributed DBMS with 10
sites. The Departments tuples are horizontally partitioned across
the 10 sites by did, with the same number of tuples assigned to to
each site and no particular order to how tuples are assigned to
sites. The Employees tuples are similarly partitioned, by sal
ranges, with sal ≤100,000 assigned to the first site, 100,000 < sal
≤ 200,000 assigned to the second site, and so on. In addition, the
partition sal ≤ 100,000 is frequently accessed and infrequently
updated, and it is therefore replicated at every site. No other
employee partition is replicated. Describe the best plan(unless a
plan is specified) and give its cost for the following cases:
i) Find the highest paid manager
ii) Find the highest paid employee with salary between
450,000 and 550,000.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a Explain how certificates are issued to sites and validated by a CO U 1
. browser using the SSL protocol. Explain the use of SSL to 6 0
protect passwords and other sensitive information being
exchanged. Discuss how secure electronic transaction protocol is
added advantage over SSL.
b Differentiate between symmetric and public-key encryption. CO U 1
. Explain how weakness of symmetric-key encryption is addressed 6 0
in public key encryption.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Identify alternative designs for implementation of database systems, including data models, file structures, index
schemes, and query evaluation.
CO2 Recognize appropriate techniques for transaction processing, concurrency control, backup and recovery that
maintain data integrity in database systems.
CO3 Apply locks and isolation levels to the concurrent transactions
CO4 Analyze the operation of parallel and distributed databases
CO5 Design and implement significant database objects such as file structures and index schemes
CO6 Explain the concepts of information retrieval and spatial data management.
Assessment Pattern as per Bloom’s Taxonomy
CO / BL R U A An E C Total
CO1 6 10 16
CO2 24 24
CO3 8 8 16
CO4 16 24 10 50
CO5
CO6 26 26
132
Q.
Questions CO BL Marks
No.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a. Summarize the categories of machine learning techniques and CO1 U 10
elaborate the elements involved in designing a machine learning
system.
b Compare Bagging and Boosting techniques, outlining the key CO1 An 10
. differences in their approaches, advantages, and potential limitations.
(OR)
2. a. Determine the parent/root node of the decision tree for the following CO2 A 20
dataset and show all the intermediate steps.
Gender Age Marital Education Class
Male Young Single High school Churn
Female Young Single College Churn
Male Middle Married Bachelor Retained
Female Young Single High school Churn
Male Senior Married Master Retained
Male Middle Married Bachelor Retained
Female Middle Single College Retained
Female Young Single Bachelor Churn
Male Middle Married High school Retained
Female Senior Married Master Retained
COURSE OUTCOMES
CO1 Summarize the theoretical and practical aspects of advanced machine learning techniques.
CO2 Compare the strengths and limitations of selected machine learning techniques and where
they can be applied for different applications.
CO3 Identify the relevant tool for different machine learning techniques.
CO4 analyze the problem thoroughly and identify the advanced machine learning approaches and
paradigms.
CO5 Design and implement suitable machine learning technique to a given task.
CO6 Evaluate and compare the performance of the selected approaches for a given problem.
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the types of hypervisors with relevant examples. CO R 10
. 1
b Imagine you're assigned to establish a virtualized environment for a CO A 10
. small business aiming to operate multiple operating systems on a 1
single physical server. Determine the type of hypervisor you would
choose and justify your answer.
(OR)
2. a Describe cloud computing and its key characteristics, challenges, CO R 10
. advantages, and disadvantages. 2
b Distinguish the service models of cloud computing using CO U 10
. appropriate diagrams and elaborate on each model. 2
COURSE OUTCOMES
CO1 Infer the concept of virtualization in cloud computing.
CO2 Use the concepts of cloud storage, cloud networks and its management.
CO3 Identify the architecture, infrastructure and delivery models of cloud computing.
CO4 Categorize the services using cloud computing.
CO5 Apply the security models in the cloud environment.
CO6 Develop an automation solution for the cloud.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 10 - 10 - - - 20
CO2 10 10 - - - - 20
CO3 - 30 10 - - - 40
CO4 - 10 30 - - - 40
CO5 - 40 - - - - 40
CO6 - - 20 - - - 20
180
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Compare and contrast the Web 3.0 view and the panoramic CO An 8
. view of IoT applications. 1
b Outline the operational procedure and enumerate the IoT CO R 8
. technologies employed in the implementation of the smart 1
home system
7. a
Describe the cloud resource provisioning techniques, CO U 8
.
challenges and its types with relevant example. 4
b
Explain the concept of IoT kaleidoscope and how it can help CO A 8
.
in understanding the complexity and diversity of IoT 1
systems.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a Assess the various network security threats across the seven CO E 20
. layers of the OSI model in the Internet of Things. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 examine IoT Architecture and various protocols.
CO2 classify the IoT value chain structure (device, data cloud), application areas and
technologies involved.
CO3 design, develop and implement smart systems.
CO4 infer the advantages of Cloud Services.
CO5 learn about optimization of cloud storage.
CO6 apply various kinds of security mechanisms.
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Enumerate the research challenges confronted by IOT applications. CO R 10
. 1
b Describe the four pillars of IoT with respect to distinct networking CO U 10
. technologies. 1
(OR)
2. a Describe the middleware architecture of Wireless Sensor Networks CO U 10
. with necessary diagram. 2
b Analyze on the technical aspects of wired and wireless networks in CO A 10
. terms of protocols. 2 n
COURSE OUTCOMES
CO Examine IoT Architecture and various protocols.
1
CO Classify the IoT value chain structure (device, data cloud), application areas and technologies involved.
2
CO Design, develop and implement smart systems.
3
CO Infer the advantages of Cloud Services.
4
CO Learn about optimization of cloud storage.
5
CO Apply various kinds of security mechanisms.
6
Q.
B Mark
No Questions CO
L s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Write in detail about the Protocol layers of internet stack CO
1. R 12
. along with their service models. 1
b Give examples to show how the layers of the TCP/IP CO
U 8
. protocol-suite correlate to any application of your choice. 2
(OR)
a CO
2. U 10
. Illustrate and explain the reference architecture of IoT. 3
b Compare and contrast frame relay networks and ATM CO
U 10
. networks. 3
a CO
3. U 10
. Illustrate and explain the reference model of IoT. 4
b Identify the main design principles and required capabilities CO
U 10
. of a IoT network. 3
(OR)
a Discuss on the various factors that support the M2M and IoT CO
4. U 10
. in the global context. 4
b Analyze the various factors required for data management CO
An 10
. and business process in IoT network. 3
CO – COURSE OUTCOME BL –
BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the terminology and concepts of the OSI reference model and the TCP‐IP
reference model.
CO2 Apply different methods for simplification of boolean expressions.
CO3 Infer the vision of IoT from a global context.
CO4 Evaluate the IoT in Market perspective.
CO5 Design and understands state of the art – IoT Architecture.
CO6 Apply the real world IoT design constraints, industrial automation and commercial building
automation in IoT.
Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Explain the concept of developing a monocular imaging system for CO U 8
. a robotics company where the system can accurately perceive 1
distances and objects in its surroundings using only a single
camera.
b Imagine, you are a computer vision engineer tasked with CO A 8
. developing a robust 3D reconstruction framework for a project that 1
involves reconstructing scenes from multiple images captured by a
camera. Develop the procedure to apply Direct Linear Transform
(DLT) algorithm.
COURSE OUTCOMES
CO1 define image formation models and light effects in computer vision
CO2 identify the feature extraction methodology suitable for computer vision applications
CO3 apply the segmen3tation approaches in image analysis
CO4 analyze the motion detection and estimation techniques
CO5 construct image analysis models for object recognition
CO6 explain the computer vision techniques used for real time applications
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Examine the characteristics and classification of CO R 8
. cybercrimes. 1
b In 2023, the XYZ Corporation, a multinational technology CO A 8
. company, fell victim to a significant cybercrime incident. 5
Hackers breached their internal network and gained
unauthorized access to sensitive customer data, intellectual
property, and employee information. Apply the forensics
investigation, collection, and examination methods and
discuss the forensic investigation techniques to be followed
by a digital forensics’ investigator.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a In 2023, a 16-year-old student, Rahul, became a victim of CO U 10
. relentless cyberbullying through various social media 6
platforms. The perpetrators created fake profiles, posted
derogatory content, and engaged in harassment. Rahul and
his family decided to seek legal action. Discuss the legal
aspects of cyber laws as per the IT Act 2000 and its
amendment to the IT Act 2008 of the Indian Government for
the above scenario.
b An alleged case of corporate espionage has been reported at CO A 10
. a technology company named TechCorp, involving a former 6
employee, Sam. He is accused of stealing sensitive and
proprietary information to benefit a competitor. TechCorp
believes that Sam used electronic means to access and
transfer the data, and they are pursuing a legal case against
him. Illustrate the electronic evidence collection and
preservation operations taken by the legal team to prove the
allegations against Sam.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 identify the effect of cybercrime in forensic computing
CO2 infer digital forensic evidences and investigate the contents
CO3 choose and apply current computer forensics tools.
CO4 analyze the nature of cyber terrorism and its effects
CO5 devise basic computer and network forensic analysis
CO6 summarize the technical and legal aspects related to cyber crime
Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Analyze how human brain sees visual information using Gestalt CO U 8
. Principles. 1
b The modern era is characterized by the promise of better decision CO U 8
. making through access to more data than ever before. Most real- 1
world datasets are much larger, ranging from thousands to millions
to even more. Moreover, many datasets change dynamically over
time. Illustrate the purpose of having computers in visualization
rather than just relying on humans with some examples and
sketches.
COURSE OUTCOMES
CO1 Familiar with the design process to develop visualization methods and visualization systems, and
methods for their evaluation.
CO2 Preparation and processing of data.
CO3 Have an understanding of large-scale abstract data.
CO4 Understand visual mapping and the visualization.
CO5 Create actual visualization, interaction and distorting techniques.
CO6 Keep track of recent visual perception techniques.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Discuss the working concept of Distributed systems under CO U 16
various real time scenarios and illustrating the challenges 1
encountered in distributed systems.
COURSE OUTCOMES
CO1 describe the distributed system models.
distinguish between different inter-process communication mechanisms and their
CO2
application scenarios.
CO3 illustrate a transaction and concurrency control scheme for a real time application.
CO4 compare the various file system architectures used in distributed systems.
construct a real time distributed system with suitable IPC, event coordination, file
CO5
management, name service, transaction and concurrency control mechanisms.
CO6 evaluate an efficient distributed system and its qualities.
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Evaluate the feasibility of using DNA for molecular computing, CO A 10
. supported by an analysis of DNA's structure, information storage 1 n
ability, and challenges in DNA-based computing systems.
b Compare and contrast DNA replication and sequencing in CO U 10
. molecular computing. Discuss how these processes are harnessed 1
or modified in molecular computing applications, highlighting the
key similarities and differences between them.
(OR)
2. a Analyze the importance of basic notations, automata, and grammar CO A 10
. systems in characterizing recursively enumerable languages within 2 n
formal language theory.
b Compare and contrast the roles of universal Turing machines and CO U 10
. type-0 grammars in contributing to computational models, 2
emphasizing their impact on formal language theory.
Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a CO R 1
. Examine the steps involved in the penetration testing process. 1 0
b Discuss how the laws and regulations for data protection and CO U 6
. cybersecurity impact the scope and practice of ethical hacking. 5
COURSE OUTCOMES
CO1 learn how to apply knowledge of engineering to society evaluations and design
CO2 understand the impact of security practices in a global and societal context
CO3 defend a computer against different types of security attacks
CO4 practice and use safe techniques on the World Wide Web
CO5 appreciate the Cyber Laws and impact of hacking
CO6 exploit the vulnerabilities related to conquer system and networks using state of the art tools and
technologies
Q.
Questions CO BL M
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Describe the main components of an IoT architecture and explain how they CO1 R 16
interact within an IoT ecosystem.
2. Explain various attacks specific to IoT and identify corresponding control CO2 U 16
measures.
4. Explain the fundamental role of encryption and decryption in securing data CO3 U 16
transmission within an IoT network.
5. Compare and contrast local and wide area networking in IoT devices and CO1 An 16
gateways.
6. Explain the role of cryptographic primitives in IoT security and give CO3 U 16
examples of how they are used in practice.
Q.
Questions CO BL Marks
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Identify the key technology trends that are associated with the progress of CO1 U 10
smart cities.
b. Based on the smart city principles, create a detailed visual representation CO1 A 6
of a smart city also incorporates elements such as renewable energy
sources, efficient waste management, integrated transportation systems,
and data-driven urban planning. And explain how each component
contributes to the overall intelligence and sustainability of the city.
2. a. Identify the concept of Mobile Business Intelligence (BI) and discuss its CO2 U 8
key trends.
b. Discuss the significance of mobile devices in terms of urban challenges of CO2 A 8
intelligent cities such as intelligent energy management, wireless fleet
management, remote healthcare, and mobile payment.
3. a. Recall the concept of the context-aware framework for smart city CO1 A 10
applications and its role in enhancing personalized services and user
experiences within an intelligent urban environment.
b. Explain the process of the evolution of Mobile Wireless Technologies CO2 U 6
highlighting the key advancement.
COURSE OUTCOMES
CO1 identify the necessity for smart cities.
CO2 describe the factors influencing smart cities.
CO3 apply the IoT technologies in healthcare and security areas.
CO4 analyze data in smart buildings, including data stemming from sensors and IoT devices.
CO5 evaluate the devices and technologies needed for smart cities.
CO6 design and plan the architecture for smart cities.
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Explain the need for intelligent cities in addressing city specific CO
1. U 10
. challenges. 1
b Explain the potential benefits of smart cities and their role in CO
U 10
. transforming urban landscapes. 1
(OR)
a List the key advancements in mobile wireless technologies and CO
2. R 10
. summarize their impact on the evolution of intelligent cities. 2
Compare and contrast the various mobile wireless technologies and
b CO
devices available for enhancing the functionality of intelligent U 10
. 2
cities.
COURSE OUTCOMES
CO1 Identify the necessity for smart cities.
CO2 Describe the factors influencing the smart cities.
CO3 Apply the IoT technologies in healthcare and security areas.
CO4 Analyze data in smart buildings, including data stemming from sensors and IoT devices.
CO5 Evaluate the devices and technologies deeded for smart cities.
CO6 Design and plan the architecture for smart cities.
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a With the help of suitable examples, explain the types of machine CO U 10
. learning. 1
b Discuss the common issues in machine learning. CO U 10
. 1
(OR)
2. a Summarize the steps involved in designing a learning system. CO U 10
. 1
b With the help of pseudocode, develop the candidate elimination CO A 10
. algorithm in machine learning. 1
COURSE OUTCOMES
CO1 describe some concepts and methods central to machine learning such as classification, regression,
clustering, bias/variance.
CO2 explain mathematically various machine learning approaches and paradigms
CO3 compare the strengths and limitations of selected machine learning algorithms and where they can
be applied in different applications
CO4 design and implement suitable machine learning algorithm to a given task
CO5 apply some state-of-the-art development frameworks and software libraries in machine learning
task realization
CO6 evaluate the performance of machine learning algorithms using suitable metrics
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Describe the different categories of computer security threats. CO R 10
. 1
b Explain the primary goals of cryptography in computer security. CO U 10
. Compare the differences between symmetric and asymmetric 1
encryption algorithms.
(OR)
2. a Discuss the techniques used to enforce access control policies in CO U 10
. distributed systems. 1
b Examine the steps involved in malware analysis, and brief the CO R 10
. effective countermeasures. 1
COURSE OUTCOMES
CO1 Identify the factors driving the need for security.
CO2 Discuss security issues in operating systems.
CO3 Apply computer security in data and databases.
CO4 Analyze the possibilities in securing the network.
CO5 Categorize information security techniques.
CO6 Assess legal and ethical issues in security.
Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Explain about the Authentication and Authorization required for CO U 1
smart thermostats in IoT. 1 6
3. Analyze the sensors and actuators fitted in the smart home figure CO A 1
below. Also identify the tool to visualize the same for decision 3 n 6
making.
7. CO A 1
Sketch the SCADA system for a school management. 3 6
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. Write a case study to aggregate temperature data to the cloud using CO A 2
AWS IoT. 6 0
COURSE OUTCOMES
CO1 recognize the hardware and software components of IoT
CO2 interpret technologies and protocols in IoT
CO3 operate the tools in design and development
CO4 demonstrate the practical applications and real-world scenarios
CO5 relate security issues in IoT
CO6 develop solutions to real time projects and case studies
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Discuss the role of IoT in various industry domains, including CO U 10
. retail, logistics, agriculture, and energy sectors. 1
b Evaluate the benefits and challenges associated with implementing CO A 10
. IoT solutions in these industries, considering factors such as data 1 n
security, scalability, and interoperability. Provide case studies
illustrating successful IoT deployments and their contributions to
efficiency, sustainability, and innovation within each domain.
(OR)
2. a Explain the physical and logical design aspects of the Internet of CO R 20
. Things (IoT), highlighting key enabling technologies and 2
deployment templates. Provide examples of domain-specific
applications of IoT, such as home automation, smart cities, and
healthcare, and analyze their potential impacts on society,
economy, and environment
3. a Compare and contrast IoT sensors and devices with a focus on their CO U 10
. functionalities, capabilities, and applications. Discuss the 3
differences between IoT and M2M (Machine-to-Machine)
communication protocols, emphasizing their respective
architectures and use cases.
b Analyze the significance of Software-Defined Networking (SDN) CO A 10
. and Network Functions Virtualization (NFV) in IoT deployments, 3 n
and evaluate their impact on scalability, flexibility, and security.
(OR)
4. a Report an in-depth analysis of Raspberry Pi as a prominent IoT CO A 10
. device, covering its hardware specifications, operating system 3
(Linux), and connectivity options
b Discuss the role of sensor networks in IoT environments, CO U 10
. highlighting their design considerations, communication protocols, 3
and scalability challenges.
COURSE OUTCOMES
CO1 identify the important aspects of IoT and its benefits.
CO2 illustrate the working principles of a IoT sensors and devices.
CO3 demonstrate the working of various tools available for IoT.
CO4 compare and contrast different technologies of IoT.
CO5 evaluate the performance of IoT technologies.
CO6 develop new IoT based projects
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the technological advancements enabling real time CO U 10
. measurement and monitoring of environmental parameters via 1
smart sensors and IoT platforms.
b Describe the potential benefits of integrating smart sensors and IoT CO R 10
. technologies into environmental monitoring systems for public 1
health and ecological sustainability.
(OR)
2. a Explain the working principles behind capacitive sensors and how CO U 10
. they differ from resistive sensors. 2
b Describe the operation of surface acoustic wave sensors and CO R 10
. explain their advantages and limitations in practical applications. 2
5. a CO U 10
Explain the role of interface electronic circuits in smart sensors.
. 5
b CO R 10
Describe the usefulness of silicon technology in smart sensors.
. 5
(OR)
6. a Explain future trends and potential developments in environmental CO U 10
. parameter measurement and monitoring for IoT. 1
b CO R 10
Describe potential research directions in smart sensor technology.
. 4
COURSE OUTCOMES
CO1 Understand the vision of IoT from a global context.
CO2 Determine the market perspective of IoT.
CO3 Use of devices, gateways and data management in IoT.
CO4 Application of IoT in industrial and commercial building automation and real world design
constraints.
CO5 Building state of the art architecture in IoT.
Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Construct SOM (Self Organizing Map) to cluster four given CO A 8
. vectors by assuming the number of clusters to be formed as 1
2 and learning rate 0.5.
Input vectors:
0 0 1 1
1 0 0 0
0 1 1 0
0 0 0 1
Weight vector:
0.2 0.9
0.4 0.7
0.6 0.5
0.8 0.3
b Describe the algorithmic steps and the architecture involved CO R 8
. in classifying nonlinear data points using the radial basis 1
function.
[ ]
0.2 0.5 0.7 1 0.9
0.3 0.5 0.7 1 0.8
~R =
0.4 0.6 0.8 0.9 0.4
0.9 0.1 0.8 0.6 0.4
[ ]
1 0.8 0.6 0.3 0.1
0.7 1 0.7 0.5 0.4
~S = 0.5 0.6 1 0.8 0.8
0.3 0.4 0.6 1 0.9
0.9 0.3 0.5 0.7 1
COURSE OUTCOMES
CO1 describe the principles of biological systems and the concept of learning through soft computing
techniques
CO2 summarize the theoretical and practical aspects of different soft computing and hybrid techniques.
CO3 demonstrate the steps involved in the development of intelligent system.
CO4 analyze the problem thoroughly and identify the appropriate technique to design the model
CO5 design and implement the computing systems using appropriate technique and tools for any real
world application.
CO6 evaluate and compare the performance of different soft computing approaches for a given
problem.
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the sensor network architecture and discuss any two CO U 10
. applications of wireless sensor networks. 1
b Explain major issues for designing wireless sensor applications in CO U 10
. detail. Also, summarize the limitations of wireless sensor networks. 1
(OR)
2. a Compare and contrast the various wireless protocols used by CO A 10
. wireless networks. List the available wireless technologies for 2 n
wireless networks.
b Describe how ZigBee technology is applied to wireless sensor CO U 10
. networks in the consumer and industrial markets to solve the issues 2
of power and cost for home management, building automation, and
remote monitoring.
COURSE OUTCOMES
CO identify the important aspects of wireless sensor networks and its benefits
1
CO illustrate the working principle od WSN
2
CO demonstrate the applications of WSN and protocol working of WSN
3
CO compare and contrast the different wireless technologies, MAC protocols, Routing Protocols,
4 Transport protocols
CO evaluate the performance of transport protocol, traffic management in WSN
5
CO develop new framework/methods/protocols for WSN
6
Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Explain the concept of converting non-linear data to linear data for CO A 8
. classification purpose using Support Vector Machine (SVM) with 1 n
suitable illustration.
b Apply the single layer perceptron (SLP) algorithm to classify the CO A 8
. AND Boolean function (2-dimensional inputs) into two classes. 1
Show the updated weight values after one iteration.
Use Net = 1 if Net >= 0.8
= 0 if Net < 0.8
The initial weight vector = [0.2, 0.4], learning rate parameter = 0.3
4. a CO U 9
Distinguish between shallow and deep neural networks.
. 2
b Differentiate the following adaptive optimization techniques to CO U 7
. improve the performance of deep learning and machine learning 4
algorithms.
Adagrad
RMSProp
Adam
COURSE OUTCOMES
CO1 understand the basics of deep learning
CO2 implement various deep learning models
CO3 realign high dimensional data using reduction techniques
CO4 analyze optimization and generalization in deep learning
CO5 explore the deep learning applications
CO6 apply the algorithms to real time problems
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Compare and contrast the underlying architectures and applications C U 1
. of machine learning and deep learning, highlighting their strengths O1 0
and limitations in various domains.
b Describe the application of Support Vector Machines (SVM) and C R 1
. kernel functions in classification tasks. O1 0
(OR)
2. a Discuss the advantages of using logistic regression for binary C U 1
. classification over linear regression models. O1 0
b Analyze how a probabilistic theory supports deep learning models C A 1
. and their ability to make predictions. O2 n 0
COURSE OUTCOMES
CO1 understand the basics of deep learning
CO2 implement various deep learning models
CO3 realign high dimensional data using reduction techniques
CO4 analyze optimization and generalization in deep learning
CO5 explore the deep learning applications
CO6 apply the algorithms to real time problems
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the process of computing the Discrete Fourier Transform CO R 10
. (DFT) and its significance in signal processing. 2
b Discuss the challenges and limitations associated with sampling CO U 10
. and quantization in image processing, including issues such as 1
aliasing, quantization noise, and dynamic range issues.
(OR)
2. Analyze the computational aspects of the DWT, including the CO A 20
algorithmic complexity and computational efficiency. Illustrate this 2 n
process with a suitable diagram and provide a step-by-step
explanation.
COURSE OUTCOMES
CO1 Understand the basics of image and video processing
CO2 Implement various image processing techniques
CO3 Demonstrate image compression techniques
CO4 Analyze various coding techniques for 2D Estimation
CO5 Explore the video processing techniques
CO6 Apply the algorithms to real time problems
Q.
Questions C B
N M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
List the identity operators in python. 1
2. CO U 1
Identify the output of the following statement: print(3-2**2**3+99/11) 1
3. Predict the output for the following program: CO A 1
fruits = ["apple", "banana", "cherry"] 2
for x in fruits:
if x == "banana":
continue
print(x)
4. CO R 1
State why * is called as a string repetition operator. 5
5. CO U 1
Interpret why tuples are called as immutable data type. 6
6. CO R 1
Define a Python code that accesses the last element of a tuple. 6
7. Indicate the role of __init__.py in creating a python package. CO U 1
3
8. CO A 1
Write the code to demonstrate anonymous function. 3
9. CO R 1
List the use of OS module in python. 4
10 CO R 1
. Identify the function used to read more than one line from a file. 4
PART – B (6 X 3 = 18 MARKS)
11 List the two Membership and logical operators in python with CO R 3
. appropriate example. 1
12 Illustrate with examples about the append() and extend() functions in CO U 3
. list. 6
13 Write a program to determine whether a person is eligible to vote or CO A 3
. not. 2
14 Identify the string method used to implement the following. CO U 3
. (i) To count the number of characters in the string. 5
(ii) To change the first character of the string in capital letter.
(iii) To check whether the given character is a letter or a number.
(iv) To change lower case to upper case letter.
(v) To change one character into another character.
15 Illustrate a python program for given two integer numbers, where it CO A 3
. returns their product only if the product is equal to or lower than 1000, 3
else it returns their sum.
Number1=20
Number2=30
16 CO U 3
. Differentiate between the r+ and w+ python file modes. 4
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO U 6
. . Summarize the salient features of python programming language. 1
b Write a python program to calculate the area of circle, rectangle and CO A 6
. triangle and to print the results. 1
20 a Distinguish between tuples and lists and list the various operations CO U 6
. . that can be performed on a tuple and Lists (minimum 5) with 6
appropriate examples.
b Discuss the following Dictionary methods in Python with examples. CO U 6
. (i) get() (ii) items() (iii) keys() (iv) values() 6
22 a CO U 6
. . Write a python program to add ‘N’ natural numbers using functions. 3
b Explain the different methods of passing formal arguments to a CO U 6
. function in Python with an example. 3
23 a CO U 6
. . Explain in detail about the types of Modules. 4
b Illustrate with a python program on how to read specific lines from CO U 6
. a file. 4
COMPULSORY QUESTION
24 a Explain the decision-making statements and loops in python with CO A 6
. . suitable examples. 2
b Calculate the total and aggregate by reading the marks of a student CO A 6
. in four subjects and display the grade obtained by the student on the 2 n
following conditions.
(i) If the student scores an aggregate greater than 75%, then the
grade is distinction.
(ii) If aggregate is 60 >= and < 75, then the grade is first division.
(iii) If aggregate is 50 >= and < 60, then the grade is second
division.
(iv) If aggregate is 40 >= and < 50, then the grade is third division.
(v) Else the grade is fail
COURSE OUTCOMES
CO Outline the structure and components of a Python program.
1
CO Explain loops and decision statements in Python.
2
CO illustrate class inheritance in Python for reusability
3
CO Experiment read and write files in Python.
4
CO Design, code, and test small Python programs that meet requirements expressed in English.
5
CO Choose lists, tuples, and dictionaries in Python programs.
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. State the significance of the brain wallet. 1 R 1
CO
2. Give the appropriate bytes required for a blockchain header. 1 U 1
List the various models that a mining pool manager can use to pay the CO
3. miners. 2 R 1
CO
4. Define token in the blockchain ecosystem. 2 R 1
CO
5. Name the wallet that is available as a Chrome and Firefox extension. 3 R 1
CO
6. State the Ethereum protocol applying the Rust programming language. 3 R 1
CO
7. Define the term "gas". 4 R 1
CO
8. List the various applications of dApps. 4 R 1
CO
9. Give an example of the hardware wallet. 5 U 1
10 CO
. Define the term “root of trust”. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. List the elements of blockchain. 1 R 3
12 CO
. Define the term "nonce". 2 R 3
13 CO
. Describe wrapped bitcoin. 3 U 3
14 CO
. List the types of Ethereum wallets. 4 R 3
15 CO
. Differentiate proof of stake from proof of work. 5 U 3
16 CO
. Define blockchain survivability. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain the recently emerged Bitcoin wallets fulfilling the industry CO A 1
. . standards. 1 2
COURSE OUTCOMES
CO1 define bitcoin and its underlying blockchain
CO2 describe the foundation of bitcoin and cryptographic currencies for developers, engineers, and software
CO3 explain decentralized network, peer-to-peer architecture, transaction lifecycle, and security principles
CO4 execute basic transactions, program smart contracts , transmit and use an Ethereum client
CO5 test wallets, token and oracle
CO6 implement decentralized applications using multiple peer-to-peer (P2P) components
Q. CO / BL
Mark
No Questions
s
.
PART – A (10 X 1 = 10 MARKS)
1. A “= type” constraint expressed in the standard form is active at CO 1 / U 1
a design point if it has how much value?
2. What happens for the feasible region for the inequality CO 1/ U 1
constraints with respect to equality constraints?
3. Label the parameters which are possessed by each optimization CO 1/ R 1
problem.
4. Identify the type of the feasible region given by the set of CO 1/ U 1
inequalities x - y <= 1 x - y >= 2
5. Give the term for a process of finding best solution among the CO 2/ R 1
set of all feasible solutions
6. For converting the unbalanced to balanced transportation, what CO 3/ U 1
step is taken if the supply is greater than the demand in a
transportation problem?
7. Which is the primary condition to be satisfied for optimal CO 4/ U 1
solution of an assignment problem?
8. Give the similarity between Assignment Problem and CO 4/ R 1
Transportation Problem.
9. The minimum cost based on North west corner method is______ CO 4/ 1
for the following cells An
PART – B (6 X 3 = 18 MARKS)
11. Define local optimum. CO 1/ 3
R
12. What is a feasible solution? CO 2/ 3
R
13. For the given project selection problem, find the objective CO 3/ 3
function in a standard format. R
Project Cost Return after 3 Years
P1 5000 9000
P2 6000 11000
P3 3500 6500
P4 8000 15000
P5 7500 14000
14. Determine the cost of the nearest neighbor starting from vertex CO 4/ 3
A. E
Max 7x +2y
4x+7y <=58
x, y>=0 and x is integer
16. Model the cost tradeoff model for ATM. CO 6 / 3
A
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23. Q.No 24 is Compulsory)
17. Explain in detail about the classification of optimization CO 1 / 12
problems. U
21. Identify the solution for 0/1 knapsack problem for m=8, CO 5/ 12
n=4, p={1,2,5,6} and w={2,3,4,5} A
COURSE OUTCOMES
CO1 Formulation of optimization problems
CO2 Define and use optimization terminology and concepts
CO3 Describe the appropriate the linear programming techniques.
CO4 Choose the appropriate optimization for real world problems
CO5 Customize the optimization methodologies for real time problems
CO6 Apply the knowledge to solve the queuing problems
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
List any two examples for recoverable problems. 1
2. Identify the test in which if an interrogator cannot differentiate between CO R 1
a machine and a human and the machine may be assumed to be 1
intelligent.
3. Identify the adequacy that the good knowledge representation should CO U 1
exhibit. 2
4. _________ is the ability to manipulate the representational structures to CO U 1
derive new structures corresponding to new knowledge inferred from 2
old.
5. CO R 1
Define Soft Tissue. 3
6. CO R 1
Define Tendinitis. 3
7. Recall the primary objective of heavy metal prediction techniques in CO R 1
environmental science. 4
8. Identify the key differences between regression models and CO U 1
classification models used in heavy metal prediction. 4
9. Provide examples of how AI based plant and disease identification CO R 1
systems benefit farmers and contribute to improved crop health. 5
10 Express the major disadvantage of using AI. CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 List the four steps to be carried out to build a system to solve an AI CO R 3
. problem. 1
12 CO U 3
. Differentiate Procedural and Declarative Knowledge. 2
13 Explain the role of AI in toxicity prediction and its implications for CO A 3
. drug development. 3 n
14 Explain how artificial neural networks (ANNs) are used in heavy metal CO U 3
. prediction models 4
15 Explain how AI-based pest and plant disease identification systems CO A 3
. utilize machine learning and computer vision techniques to enhance 5 n
early detection and response strategies in agriculture.
16 CO U 3
. Discuss on the need of AI in food industry. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Consider the water jug problem: You are given two jugs, a 4-gallon CO A 8
. . one and 3-gallon one. Neither has any measuring marker on it. 1 n
There is a pump that can be used to fill the jugs with water. How
can you get exactly 2 gallons of water from the 4-gallon jug?
Explicit Assumptions:
A jug can be filled from the pump, water can be poured out of a jug
onto the ground, water can be poured from one jug to another and
that there are no other measuring devices available. Apply suitable
production rules to solve this problem.
b CO A 4
. Choose any one of the uninformed search techniques and explain. 1
b CO U 6
. Summarize the four approaches of artificial intelligence. 1
COURSE OUTCOMES
CO Define AI based problems and select appropriate search method for different search spaces
1
CO Express knowledge representation techniques and problem-solving strategies to common AI
2 applications
CO Develop prediction models and extend for healthcare applications
3
CO Analyze energy and environmental issues and discover AI based solutions
4
CO Inspect the challenges on agriculture and suggest solutions for plant disease identification and
5 discrimination
CO
6 Propose AI based solutions for industrial applications
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
Define IoT.
1. 1 R 1
CO
_________layers provides end-to-end communication in IoT.
2. 1 A 1
CO
List out the Characteristics of IoT.
3. 2 U 1
CO
Mention few sensors used in Food Industries.
4. 2 U 1
CO
5. Classify different types pins present in Arduino board. 3 R 1
CO
6. Write down the need of battery used in IoT. 3 R 1
CO
7. Define Client-server communication. 4 U 1
The maximum operating voltage of the GPIO pins in Arduino is __ CO
8. Volts. 4 R 1
CO
9. In Touch screen devices __________ type of sensor is used. 5 R 1
10 CO
. What are the different type of protocol which supports AWS? 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO R 3
. Classify the 4 types of IoT platforms. 1
12 CO A 3
. Write down the significance of 5G used in communication network. 1 n
13 CO R 3
. Differentiate between sensors and actuators. 2
14 CO U 3
. Justify the statement “power consumption important in IoT”. 3
15 CO A 3
. Name any three software used in IoT. 4
16 CO U 3
. Differentiate QoS and DoS. 5
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Draw the Functional block diagram of the IoT and brief about its CO A 6
. . functions. 1 n
b CO R 6
Differentiate between IoT and M2M.
1
18 a Brief about various types of big data analysis used in IoT and also CO U 6
. . mention the tools used in Big data Analytics. 2
b How to deploy different level of IoT in industries? Explain it with CO R 6
. the help of flow chart. 2
19 a Draw the flow chart to design IoT technology for any kind of food CO R 6
. . industries. 4
b CO R 6
. Draw the architecture of Wireless Sensor Network (WSN). 4
20 a CO A 6
. . Expand AWS. Review any 4 of the top services provided by AWS. 3
b CO R 6
. Brief about various Communication Protocols used in IoT. 3
22 a CO A 1
. . Define Data aggregation mechanisms on IoT and explain its types. 4 2
23 a CO R 6
. . Criticize the four different objectives of SMARTIE approach. 5
b CO A 6
. Brief about cloud server used in IoT. 5
COMPULSORY QUESTION
24 a Describe about food quality standards, food safety and regulations CO R 6
. . in food industries. 6
b Illustrate about the energy efficient raw food processing methods in CO A 6
. food industries. 6
COURSE OUTCOMES
CO1 Present a survey on building blocks of IOT.
CO2 Analyze the deployment models of IOT.
CO3 Compare the connectivity technologies and protocols in IOT.
CO4 Select IOT platform for an application.
CO5 Infer security issues in IOT.
CO6 Develop architectural approach for IOT applications
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Define the Heuristic function. CO
1. 1 U 1
CO
2. List the advantages of breadth-first search. 1 R 1
Turning test approach is the foundation of AI-Justify. CO
3. 2 E 1
Represent how rules help computers to make decisions and understand CO
4. information. 2 U 1
CO
5. Define Principal Component Analysis (PCA). 3 U 1
CO
6. Represent the role of AI in forecasting food microbiology. 3 U 1
Indicate one application of electronic nose technology. CO
7. 4 U 1
Computer vision is the most common technology in food sorting - CO
8. Justify 4 R 1
Identify the factors considered in edge deduction. CO
9. 5 U 1
10 Name some of the methods where artificial intelligence can be applied CO
. in the Food industry. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 Identify various elements of an agent and the characteristics of an CO
. intelligent agent. 1 U 3
12 CO
. Represent the disadvantages of relational knowledge. 2 U 3
13 CO
. Give an example of using AI in the prediction of food microbiology. 3 U 3
14 Indicate the significance of food sensory analysis in the food industry. CO
. 4 U 3
15 State the primary goal of image segmentation. CO
. 5 R 3
16 Consistency helps in enhancing the consumer experience -Justify CO
. 6 E 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Summarize the working of the breadth-first search algorithm with a CO U 6
. . tree diagram. 1
b Compute the path to reach from S to G using A* search for the CO A 6
. given figure. 1
COURSE OUTCOMES
CO Define AI based problems and select appropriate search method for different search spaces.
1
CO Express knowledge representation techniques and problem solving strategies to common AI
2 applications.
CO Develop prediction models and extend for food processing applications.
3
CO Analyze the food industry operations and develop AI based solutions.
4
CO Inspect the challenges in quality management of food products through AI based image processing
5 techniques.
CO Propose AI based solutions for food industry management.
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO
Define flowchart. R 1
1
2. CO
R 1
Identify the use of header file. 1
3. CO
List the four keywords. R 1
2
4. Write the C statement to find whether the person is eligible for vote or CO
A 1
not using conditional operator. 2
5. CO
Write the syntax of “do - while” loop. A 1
3
6. CO
List the unconditional statements used in C programming. R 1
3
7. CO
Name a string function which is used to join two strings. R 1
4
8. CO
Enumerate the various sorting algorithms in C programming. R 1
4
9. CO
R 1
Define recursion. 5
10 CO
Define pointer. R 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 Construct the flowchart to input two numbers from the user and display CO A 3
. the largest among them. 1
12 Write the output of the following C code. CO A 3
. #include <stdio.h> 2
int main()
{
int a = 8, b = 2;
printf("a & b = %d ", a & b);
return 0;
}
13 Predict the output of the following C code. CO U 3
. #include <stdio.h> 3
int main()
{
int a = 20;
int b = 10;
int c = 15;
if(a<b && b<c)
printf(" C is the greatest number of all");
else
printf(" C is not greatest number of all");
return 0;
}
19 a Write a program that uses an "else-if" ladder to find out the grades CO A 6
. . of a student. The marks obtained by a student in five different 3
subjects are given as input through the keyboard.
b CO A 6
Write a C program for print addition table using ‘for’ loop.
. 3
22 a CO R 7
Describe in detail the computer hardware and software.
. . 1
b CO U 5
Illustrate a C program to find the size of int, float, double and char.
. 2
COURSE OUTCOMES
CO Understand the fundamentals of computer and software development process.
1
CO Identify the data type to represent the real time data representation and operators for computation.
2
CO Prepare innovative solutions for the problem using branching and looping statements.
3
CO Decompose a problem into functions and synthesize a complete program using divide and conquer
4 approach.
CO
Formulate algorithms and programs using arrays, pointers and structures.
5
CO
6 Create a new application software to solve real world problems.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO U 1
Identify the types of variables in Python. 1
2. CO R 1
Name the keyword that deletes the variable in Python. 1
3. CO U 1
Represent the syntax for the while loop statements. 2
4. CO R 1
Name the method to sort the elements in a list. 2
5. CO U 1
Identify the pickle function to load pickled objects from a file. 3
6. CO U 1
Represent the schematic diagram of hierarchical inheritance in Python. 3
7. Identify the method name to find the image file formats like PPG, CO U 1
JPEG, and TIFF in Python. 4
8. Name the library in Python programming that supports the opening, CO R 1
manipulating, and saving of many different image file formats. 4
9. CO U 1
Identify the method to create a button widget in Python GUI design. 5
10 CO R 1
. List the types of multitasking in Python programs. 6
PART – B (6 X 3 = 18 MARKS)
11 Predict the output for the following code. CO U 3
. for v in range(10,1,-2): 1
print(v)
12 Predict the output of the following code. CO U 3
. dict1 = {'Ten': 10, 'Twenty': 20, 'Thirty': 30} 2
dict2 = {'Thirty': 30, 'Fourty': 40, 'Fifty': 50}
dict3 = dict1.copy()
dict3.update(dict2)
print(dict3)
13 CO A 3
. Differentiate the accessors and mutators methods in the Python class. 3 n
14 Predict the output of the following code for the input image size = CO U 3
. (1024, 819). 4
from PIL import Image
im = Image.open(r"C:\Users\asus tuf\Desktop\copter.jpg")
print(im.size)
im1=im.resize((im.width//2, im.height//2))
print(im1.size)
15 CO A 3
. Differentiate the combo box and list box in Python GUI. 5 n
16 CO U 3
. Explain the importance of multithreading in Python programs. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Write a Python program to find whether the given number is prime CO A 6
. . or not. 1
b CO A 6
. Illustrate the break, continue and pass statements in Python. 1
20 a Write a Python code that reads an input image and performs the CO A 1
. . following tasks on it. 4 2
a) Rotate the image by 120 degrees in a clockwise direction
b) Convert the color image into black and white.
c) Change the image size using the thumbnail() function
d) Perform Gaussian blur operation.
e) Flip the image
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Name the translator that creates an executable machine code file from a CO R 1
program written in a high-level language. 1
2. Predict the output of the following flowchart: CO U 1
1
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Explain the Software Development Life Cycle (SDLC) stages in CO U 1
. detail. 1 2
20 a CO A 6
. . Write a C program to perform 2x2 Matrix Addition using functions. 4
b Write a C program to implement Bubble sort for the following CO A 6
. numbers: 4
34, 4, 123, 2, 25.
COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development processes.
CO2 identify the data type to represent the real time data representation and operators for computation
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using divide and conquer
approach.
CO5 Formulate algorithms and programs using arrays, pointers and structures.
CO6 Create a new application software to solve real world problems.
Q. BL /
Questions M
No. CO
PART – A (10 X 1 = 10 MARKS)
1. Identify the valid identifier out of the following. U/ CO1 1
a) item*qty
b) $price
c) for
d) price
2. Write the full form of CSV. R / CO2 1
3. Write the output of the following: 1
L = list("Python Questions")
print(L)
4. The following declaration is of __________ (Tuple/Dictionary) A/ CO1 1
A = (“Amit”, “Sumit”, “Naman”)
5. What is abs( ) function in python? A/ CO1 1
6. Find the value of “res” in the following code snippet: 1
val = 5
res = val is 5
7. Write a code segment that displays the values of the integers x, y U/ CO1 1
and z on a single line, such that each value is left justified in six
columns.
8. Find the output for the following code: U/CO2 1
List=[3,4,6,1,2]
List[1:2]=[7,8]
print(List)
9. Predict the output for the following code: An/CO2 1
d=[12,23,34,45,56,67]
print(d[2:5])
10. Define the use of ‘self’ parameter in python class. R/CO6 1
PART – B (6 X 3 = 18 MARKS)
1 Describe the for loop with sample code illustration. R/CO1 3
1.
1 Write the code to create a dictionary of three fruits. A/CO4 3
2.
1 Convert the following function into a recursive function: U/CO3 3
3. def compute(lower,upper):
while lower<=upper:
print(lower)
lower=lower+1
1 Mention the purpose of count function with respect to string and R/CO5 3
4. list.
1 Mention the code segment used to get multiple integer inputs. R/CO5 3
5.
1 Write the print function that displays a float variable amount that A/CO6 3
6. has exactly two digits of precision and field width of zero.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23. Q.No 24 is Compulsory)
17. a. Write a user defined function convert_to_binary(decimal) that U/CO3 4
takes decimal number as parameter and returns the binary
number.
b. Write a Python program to encrypt and decrypt the string A/CO2 8
based on the given key value.
Sample Encryption:
Input: <String> “ANACONDA”, <key> 4
Output: “EREGSRHE”
Sample Decryption:
Input: <String> “EREGSRHE”, <key> 4
Output: “ANACONDA”
18. a. Develop a telephone directory of 10 contacts, where “Name” A/CO2 6
will be the key and “Mobile number” will be the value.
Demonstrate the usage of the directory by computing the
following functionalities:
• Inserting a new contact
• Updating an existing contact
• Searching a contact
b. Design a program to print the following pattern (for the given A/CO1 6
integer “n”) filled with random numbers:
Sample Input: 4
Output:
12
1 15
28 98 76
31 83 13 72
19. a. Illustrate read and write functionalities with sample code in a U/ 6
text file. CO2
b. Design a class called “Box” with data such as length, height A/CO3 6
and breadth then create two Box objects box1 and box2 with
proper dimensions and check both box is similar or not by
overloading = = operator.
20. a. Illustrate the following inheritance hierarchy. Define A/ 6
members in each class according to the following details and CO3
test your program by creating 2 objects of sub classes.
Class Data Methods
Details id, name,gender setDetails, getDetails
Employee company,department setEmployee, getEmployee
Doctor hospital, department setDoctor, getDoctor
b. Create a program that read an image and carry out the A/CO4 6
following tasks on it and save each modified image in a
separate file
• Rotate the image by 30 degrees in clockwise direction
• Change the image to black and white.
• Reduce the image to half of its size.
• A blur effect on the image.
21. a. Develop a program to design the following shapes using A/ 6
turtle graphics. CO4
• Star (Yellow for filling and red for line)
• Indian Flag(A filling color appropriately)
COURSE OUTCOMES
CO1 Choose the basic programming constructs of Python suitably.
CO2 Infer the concepts of string processing, file I/O, lists and dictionary.
CO3 Apply modules for reusability and the object-oriented principles for modeling and developing
software system.
CO4 Utilize the power of graphics for processing images.
CO5 Construct applications with graphical user interface.
CO6 Develop software solutions using standard libraries for mechanical applications.
Assessment Pattern as per Bloom’s Taxonomy
CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 3 8 5 - - - 16
CO2 8 7 14 1 29
CO3 - 7 12 - - - 19
CO4 - - 15 - 15
CO5 6 - - - - - 6
CO6 6 - 9 - - - 15
100
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
CO
1. State the process of agile software development life cycle. 1 R 1
CO
2. Identify the need for frequent inspection in an agile project. 1 U 1
CO
3. List the components of single responsibility principle. 2 R 1
CO
4. State the principles of Liskov Substitution principle. 2 R 1
CO
5. List the importance of frequent inspection in Agile. 3 R 1
CO
6. State the functions of a product backlog. 3 R 1
CO
7. Define user story. 4 R 1
CO
8. State the practices of affinity estimating. 4 R 1
Outline the success percentage of collocated and dislocated scrum CO
9. teams. 5 U 1
CO
10. List ADKAR’s five steps to manage change in agile projects. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11. CO
State the objective of open closed principle. 1 R 3
12. CO
Describe rigidity and fragility of agile design. 2 U 3
13. CO
List the advantages of Kanban. 3 R 3
14. CO
Illustrate the work of task board. 4 U 3
15. CO
Enumerate the concept of sprint review bazaar. 5 R 3
16. CO
Name few agile principles that support risk management. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a Explain the 12 principles and steps involved in agile project CO U 6
. management. 1
b As a software developer you may want to use the design CO A 6
. principles in the object-oriented design process to create a 1
system of interacting objects and resolve software problems.
State the overall execution of Single Responsibility Principle for
this purpose.
class Switch {
private SwitchableDevice device;
21. a Describe the types of software testing that you can automate CO R 6
. during the process of managing quality and risk of a software 5
project.
b Illustrate the methods of becoming self-managing and self- CO U 6
. organizing in managing agile team dynamics. 5
COURSE OUTCOMES
CO
Describe the principles and practices of Agile methods in software development.
1
CO Explain the processes and strategies of the various Agile technologies in terms of work products,
2 roles and practices.
CO
Choose appropriate managing techniques to solve issues in real time applications.
3
CO
describe the techniques and tools used to improve team collaboration and software quality
4
CO
Identify and address the most common problems encountered in the use of Agile methods.
5
CO
Apply Agile practices when multiple teams are working on a single project.
6
Q.
N Questions CO BL M
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define ‘virtuality’ in the context of AR and VR. 1 R 1
CO
2. Identify how VR differs from AR and telepresence. 1 R 1
Examine the relationship between the HMD field of view and CO
3. resolution. 2 R 1
CO
4. Distinguish between touch feedback and force feedback. 2 U 1
CO
5. List two common graphics accelerators used for 3D rendering. 3 R 1
State the role of collision detection in managing multi-model CO
6. interactions. 4 R 1
Name two key components of physical modelling in computer CO
7. graphics. 4 R 1
Classify the types of foveated rendering in perception-based CO
8. graphics. 5 U 1
CO
9. Explain the term ‘agency’ in the context of interactive systems. 6 U 1
10 CO
. Infer on productivity enhancement platforms in VR. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 Explain the key differences between virtual reality (VR) and CO U 3
. augmented reality (AR) 1
12 Illustrate how depth is perceived by the human vision system using CO A 3
. a diagram. 2
13 Compare and contrast distributed virtual reality architectures with CO An 3
. centralized ones. 3
14 Summarize the concept of object hierarchies for efficient 3D scene CO U 3
. management. 4
15 CO U 3
. Infer on the role of kinematics modelling for 3D world simulations. 5
16 CO U 3
. Discuss the applications of virtual reality in robotics. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Describe the impact of early commercial VR on the gaining and CO U 12
. animation industry. 1
COURSE OUTCOMES
CO Describe the augmented reality and virtual reality technologies.
1
CO Demonstrate motion trackers, navigators in augmented and virtual reality environments.
2
CO Estimate the effect of virtual reality and augmented reality simulation on users.
3
CO Analyze camera tracking and 3D rendering in augmented reality.
4
CO Identify the various modelling techniques in virtual reality.
5
CO Design real-time applications using virtual and augmented reality.
6
Q. C B M
N Questions O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the process where the vocal folds are held open to allow the CO U 1
air to pass through or vibrate to make a sound. 1
2. Name the third dimension of the spectrographic representation of the CO R 1
input speech signal. 1
3. Identify the algorithm that is used to measure similarity between two CO R 1
temporal sequences that may vary in speed. 2
4. CO R 1
List any one symmetry of the distortion measures. 2
5. Identify the framework that is proven to work well when DNN and CO U 1
HMM are combined. 3
6. CO R 1
Name the probability that transitions from one hidden state to another. 3
7. Which is the key component of the speech-to-speech translation CO R 1
system? 4
8. State the mathematical function that converts a vector of numbers into CO R 1
a vector of probabilities. 4
9. Name the inferred transcription that can be obtained by decoding the CO R 1
utterance using the speaker-independent models. 5
10 Write any one of the tasks used in multitasking learning to improve CO R 1
. the performance of the given number of tasks. 6
PART – B (6 X 3 = 18 MARKS)
11 CO A 3
. Distinguish between voiced and unvoiced speech. 1 n
12 CO U 3
. Represent the block diagram of the pattern recognition model. 2
13 CO R 3
. List out the 3 components in the CD-DNN-HMM model. 3
14 Explain the living room interaction systems and in-vehicle CO U 3
. infotainment using speech signals. 4
15 Explain the feature learning process of the deep neural network CO U 3
. model. 5
16 List out the three key applications where multitasking and transfer CO R 3
. learning can be applied to provide solutions for problems faced in the 6
domain of speech recognition.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Illustrate the filter bank representation of an input speech signal CO A 12
. and show how the linear prediction analysis is important for 1
speech.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
List any three applications of bigdata. CO
1. 1 R 1
CO
2. List any three file manipulation functions used in RHADOOP. 1 R 1
CO
3. Differentiate interactive and batch mode in R programming. 2 U 1
CO
4.
Identify the different types of components used in RHIPE architecture. 2 R 1
CO
5. Write the command for local mode grunt shell. 3 A 1
CO
6. State the difference between STORE and DUMP 3 R 1
CO
7. State the syntax for creating a database using HQL. 4 R 1
List the three types of complex data model in HIVE with the format. CO
8. 4 R 1
CO
9. List out the types of shell in SPARK. 5 R 1
10 CO
. Compare Cassandra and RDBMS. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Enumerate the various types of bigdata 1 R 3
12 CO
. Visualize the diagram of RHADOOP architecture and its components. 2 R 3
13 Write short notes on Piggybank. CO
. 3 A 3
14 CO
. Summarize the different types of read operations in Cassandra. 4 U 3
15 CO
. Discuss about various features of HIVE. 5 U 3
16 CO
. Tabulate the various Cassandra collections that are used to handle tasks. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a From the shuffled pack of cards, a card is drawn. This trial is CO A 1
. . repeated for 400 times, and the suits are given below: 1 2
Suit Spade Clubs Hearts Diamonds
No. of times drawn 90 100 120 90
18 a CO U 1
. .
Explain the HDFS architecture and MapReduce algorithm in detail. 6 2
20 a Explain the following HIVE DDL commands with the syntax and CO U 1
. . example: 4 2
a) Create a database
b) Drop database
c) Create a table
d) Altering a table
23 a CO R 6
. .
Describe how Cassandra handles tasks with various collections 5
b Illustrate any three transformations used in Resilient Distributed CO
. Datasets. 5 U 6
COMPULSORY QUESTION
24 a Determine a student table with following fields: Name, RegNo, CO A 1
. . Branch, Email and insert the multiple values to the employee table 5 2
using Set collection.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 understand the importance and challenges of Big data
CO2 design applications using HADOOP and RHADOOP
CO3 identify the appropriate function of PIG data model to be used in development
CO4 model Big data applications schema and use HIVE QL
CO5 develop applications with Cassandra
CO6 build applications with HDFS and MapReduce
Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. State Machine learning.
1 R 1
CO
2. List two disadvantages of cognitive computing.
1 R 1
CO
3. Name three eras of computing.
2 R 1
Write three fields that led to the development of cognitive CO
4.
computing. 4 A 1
CO
5. Name three types of machine learning.
2 R 1
CO
6. Interpret the uses of Bayes net.
4 U 1
CO
7. Define Bayes rule.
4 R 1
CO
8. Infer your views on visual analytics.
3 U 1
CO
9. Write the output for sentiment analytics.
3 A 1
CO
10. State computer vision.
3 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO R 3
11. List two systems of judgment and choice.
1
CO U 3
12. Discuss a few applications of visual analytics.
3
CO U 3
13. Describe the two disadvantages of Bayes net.
3
CO R 3
14. Define taxonomy with an example.
3
CO A 3
15. Explain two syntaxes in Lexical analysis.
6
CO U 3
16. Infer Semantic Web its two categories.
3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. Describe two systems of judgment and choice with their CO R 12
advantages and disadvantages. 1
18. Discuss the various perspectives put forth by computer CO U 12
scientists regarding the advancement of cognitive 1
computing.
19. a. Describe the three design principles for cognitive systems. CO U 8
1
b. Define differentiating characteristics useful for designing a CO R 4
cognitive system. 4
20. a. Recite Analytics Evolution in detail with a diagram. CO R 7
4
b. Sketch overview of the proposed cognitive computing CO A 5
architecture–cognitive random forest. 4
21. a. Enumerate how the speech analytics is done and its CO R 9
importance in the business field. 4
b. Write the functions of lexical analysis. CO A 3
2
22. a. Explain the Hidden Markov Model with an example. CO A 8
3
b. Infer the functionality of the voice of the customer. CO A 4
4 n
23. a. Illustrate how different analytics enhance the Shopping CO U 7
experience of a customer with the use case. 3
b. Write how language identification and tokenization are CO A 5
done with an example. 3
COMPULSORY QUESTION
24. a. List the DeepQA architecture of IBM Watson. CO R 5
5
b. Discuss how computer vision is used in face recognition. CO U 7
6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS
ALLOTTED
COURSE OUTCOMES
CO1 outline the importance of cognitive computing
CO2 analyze the business implications of cognitive computing
CO3 apply natural language technologies to business problems
CO4 apply machine learning for a specific real-world application
CO5 develop Chabot applications for business problems
CO6 develop Cognitive applications in health care using machine learning
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Relate the transmission mode employed when there is a communication CO U 1
between the computer and the keyboard. 1
2. Name the topology which would require the most extensive cabling CO R 1
when a network has 30 computers. 1
3. CO R 1
Identify the even parity bit for the following data 1110111. 2
4. CO R 1
List the protocols that make up the PPP stack. 2
5. Indicate the type of address for the ethernet destination address CO U 1
FF:FF:FF:FF:FF:FF. 3
6. CO R 1
Name the IEEE standard assigned for Wireless LAN. 3
7. CO R 1
Define the term roaming in cellular networks. 4
8. CO R 1
Identify the principle used in Global Positioning System. 4
9. Show the shortest form for the following address: CO U 1
2340:1ABC:119A:A000:0000:0000:0000:0000 5
10 CO U 1
. Represent an implementation of Link State Routing. 6
PART – B (6 X 3 = 18 MARKS)
11 Interpret the types of direction of data flow in a data communication CO U 3
. system. 1
12 Calculate the checksum for the following binary data CO A 3
. 10011001111000100010010010000100. 2
13 CO A 3
. Sketch the frame format for IEEE 802.3. 3
14 CO U 3
. Discuss the MEO satellites with relevant sketches. 4
15 Appraise how ICMP supports error-reporting and error-correcting CO A 3
. mechanism. 5 n
16 CO U 3
. Explain the connection establishment in TCP with a timeline diagram. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss on the responsibilities of the layers of the ISO-OSI model CO 1
. . with a sketch. 1 U 2
18 a Determine the CRC for the data word 100100 with a polynomial CO
. . x3+x2+1. 2 A 6
b Interpret Go-back N ARQ when a frame is being transmitted from CO
. the sender to the receiver. 2 U 6
19 a CO
. . Explain the IEEE802.11 architecture with a sketch. 3 U 6
b CO
. Describe the concept of VLAN with supporting architecture. 3 U 6
22 CO A 1
. Construct the Hamming code for the data 1001101. 2 2
COURSE OUTCOMES
CO understand the components and layered architecture of communication networks
1
CO identify the protocols and services of data link layer.
2
CO analyze the different LAN technologies for building networks.
3
CO describe the wireless WAN technologies for wireless transmission.
4
CO design network model and determine the routing protocols for different applications.
5
CO construct communication networks for supporting different applications.
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
Name some application layer protocols.
1
2. CO R 1
List the types of network topologies.
1
3. CO U 1
Identify the transport layer protocol for SMTP.
2
4. CO R 1
List the functions of DNS.
2
5. CO R 1
Identify the protocol used for network management.
3
6. Compute the maximum number of IP addresses that can be assigned to CO U 1
hosts on a local subnet that uses 255.255.255.24 subnet mask. 3
7. CO R 1
Give examples of protocols used for Intra-Domain routing.
4
8. Assuming even parity, find the 1-D parity bit for each of the following CO U 1
data units. 4
a. 1001001
b. 1000001
9. CO U 1
List the services offered by the data link layer.
5
10 CO R 1
Define SDN.
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO R 3
Describe the types of Physical media.
. 1
12 CO R 3
Explain the working of FTP Protocol.
. 2
13 CO R 3
Differentiate TCP and UDP protocol.
. 3
14 Determine the network address for the given IP address and subnet CO A 3
. mask. 4
a) IP address: 182.44.92.16 Mask: 255.255.224.0
b) IP address: 212.44.82.116 Mask: 255.255.255.192
15 CO A 3
Discuss the need for virtual LAN.
. 5
16 CO R 3
List the types of clouds.
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO R 6
Explain the TCP/IP layer protocol suite with a neat diagram.
. . 1
b Discuss in detail about the types of delay a packet suffers along the CO R 6
. path. 1
19 a CO R 6
Draw and explain the TCP header structure.
. . 3
b CO R 6
Describe the BGP protocol used in Inter-AS domain routing.
. 3
21 a Compare and contrast the IPv4 and IPv6 header format and discuss CO R 6
. . the rationale for transition and the methods available to migrate 4
from IPv4 to IPv6 addressing.
b CO R 6
Explain the router architecture and its components.
. 4
COURSE OUTCOMES
CO
identify the factors influencing computer network infrastructure and development.
1
CO
apply the network protocols in building the computer networks.
2
CO
analyze the routing algorithms and their behaviors.
3
CO
design computer networks with optimized address assignment.
4
CO
evaluate the performance and characteristics of network protocols.
5
CO
6 develop real life network based projects
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Interpret the concept of IAS computer. CO1 U 1
2. Name the registers in central processing unit. CO1 R 1
3. Describe the need for MBR component in CPU. CO2 U 1
4. List out the number of sub cycles in a basic instruction cycle. CO2 R 1
5. Differentiate logical address and physical address. CO3 U 1
6. Name the major components in DMA. CO3 R 1
Consider the 64 bit processor computer system. User wants to
7. install 32 bit operating sysetem in the above computer. Predict CO4 U 1
the installation output.
8. Define the term instruction prefetching. CO4 R 1
9. List out the types of pipeline hazards. CO5 U 1
10
Describe control unit. CO6 R 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
Illustrate the major functionality of a PCI BUS in CPU. CO1 A 3
.
12 A
Compare the functionality of cache memory and main memory. CO2 3
. n
13 Demonstrate the functions of a DMA module in a computer
CO3 A 3
. system.
14 Differentiate the following methods: unsigned integer A
CO4 3
. multiplication and singed integer multiplication. n
Consider the following Equation:
15 Y = ( A − B ) / [ C + ( D × E ) ]
CO5 A 3
. Apply three address instruction and list out the necessary
instruction.
16 Order the micro-operations may require in an instruction A
CO6 3
. execution. n
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a Illustrate the functional diagram of a computer top level
. . structure and state the functions of each component in CO1 U 6
computer.
b Identify the list of components in a von Neumann architecture CO1 R 6
. (CPU) and describe the functionality of each component with
proper block diagram.
COURSE OUTCOMES
CO1 explain function of the central processing unit
CO2 develop algorithms for error correction for memory modules (main and cache memory)
CO3 design and understand various input and output modules for central processing unit.
CO4 select and use standard addressing modes for logical and physical memory addressing
CO5 list and define various stages of instruction pipelining in processor.
CO6 explore various ways to implementing the micro instruction sequencing and execution
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
__________ is when each plaintext element or group of
elements is uniquely replaced by a corresponding ciphertext
1. element or group of elements. CO1 U 1
2. What is private key encryption? CO1 R 1
3. Differentiate symmetric and asymmetric key cryptography. CO2 R 1
4. Give the classification of active attacks. CO2 R 1
5. What are the two types of key used in public key cryptography? CO3 U 1
How can asymmetric key encryption be used in a practical
6. scenario? CO3 R 1
Diffie-Hellman algorithm also supports Digital Signature
7. application. Is it True or False? CO4 U 1
When a hash function is used to provide message authentication,
8. the hash function value is referred to as______________. CO4 R 1
_________ protocol is used for the purpose of copying the
9. pending state into the current state. CO5 U 1
10. Elucidate Virtual Ponzi schemes with respect to cryptocurrency. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. How are cryptographic algorithms classified? CO1 An 3
Explain the differences between private and public key
12.
cryptosystems. CO2 U 3
Can you explain the working of the Diffie-Hellman (DH)
13.
algorithm? CO3 An 3
Would you recommend using the MD5 hash to store user
14.
passwords? Justify your answer. CO4 U 3
15. List out any three benefits of IPSec. CO5 An 3
Explain any two types Of Cryptocurrency Scams that affect
16.
cyber security. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Elucidate the working principle of Triple Data Encryption CO1 R 12
Standard (3DES) in details with neat diagram.
19. a Construct the procedural steps for selecting the primes CO3 U 6
. number in Rivest Shamir Adleman (RSA) algorithm and
discuss its security features.
b Apply RSA algorithm for the given prime numbers of p=61 CO3 A 6
. and q=53, find the resulting public and private keys. For the
plaintext M=65, do the encryption and decryption.
20. Explain the concepts of Digital signature algorithm with key CO4 U 12
generation and verification in detai
COURSE OUTCOMES
CO
Interpret the security issues and the need for cryptographic algorithms.
1
CO
Apply the various algorithms to achieve confidentiality, integrity, and availability.
2
CO
recognize the importance of network security based on the attacks
3
CO
Examine the cryptographic algorithms for securing the network.
4
CO
Choose the combination of cryptographic algorithms for securing any network application.
5
CO
6 Analyze the advancements in implementing security of networks.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define Active sensor. 1 R 1
CO
2. Compare ADC with DAC. 1 U 1
CO
3. List the features of USB connector. 2 R 1
CO
4. State the advantages of feedback systems. 2 R 1
CO
5. Define clock jitter. 3 R 1
CO
6. List the advantages of LabVIEW. 3 R 1
CO
7. Classify the types of accuracy. 4 U 1
CO
8. Compute the two’s complement of 1010111. 4 A 1
CO
9. Define Aliasing effect. 5 R 1
10 Express mathematically the cross-correlation function between two CO
. signals x(t) and y(t). 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Classify the various types of noises. 1 U 3
12 CO
. Compare microprocessor with microcontroller. 2 U 3
13 CO
. Identify the advantages of application software. 3 U 3
14 Interpret the conversion of binary to gray code and vice versa using a CO
. circuit diagram. 4 A 3
15 CO
. Sketch the sampling and quantization process. 5 A 3
16 CO
. Explain the various types of bus management lines. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Illustrate the working of n-bit Successive approximation digital to CO A 8
. . analog converter with circuit diagram. 1
b CO A 4
. Sketch the block diagram of Plug-in DAQ system. 1
19 CO 1
. Develop a sample functional design for a data acquisition system 3 A 2
with all necessary requirements.
22 a CO A 7
. . Sketch the various types of clock skews with necessary diagrams. 2
b CO U 5
. Compare USB with Firewire. 2
COURSE OUTCOMES
CO Outline the fundamentals of data acquisition, configuration, characteristic and specifications of
1 various components used in DAS.
CO Elucidate the elements of data acquisition techniques.
2
CO Recognize various interfacing issues of ADC’s and DAC’s to a microprocessor/PC.
3
CO Explain the components of data acquisition system.
4
CO Infer bus driver programs and data analysis using data acquisition packages.
5
CO Summarize different data transfer techniques.
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
List out the two main components of access control. CO
1. 1 U 1
2. Identify the process of verifying the identity of a user or system before CO R 1
granting access to a resource. 1
3. State the term for an incident that could cause harm to an asset or a CO R 1
system. 2
4. Name the error that occurs when a program tries to write more data CO R 1
than the allocated space. 2
5. List out the three main objectives of information security. CO U 1
3
6. Define Malicious Mobile code. CO R 1
3
7. Recall three classic security models commonly referenced in CO U 1
information security. 4
8. State the primary function of a Reference Monitor in an operating CO R 1
system security model. 4
9. Identify the key ethical principles that should guide decisions in CO U 1
computer security. 5
10 CO U 1
. List the types of computer crimes. 6
PART – B (6 X 3 = 18 MARKS)
11 List out the common types of access control attacks. CO
. 1 R 3
12 Classify the types of Database Backups. CO
. 2 U 3
13 Examine the impact of Man in the middle attack. CO A
. 3 n 3
14 Explain the difference between authentication and authorization in CO
. information security. 4 U 3
15 Compare the security considerations necessary for securing a Web CO A
. Server versus a DNS Server. 5 n 3
16 CO
. Describe the role of a firewall in a network security setup. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Analyze the causes and consequences of the most significant
. . malicious code incidents in history. Describe the motivations and CO A
objectives of the attackers? 1 n 6
b Explain the impact and mitigation of access control attacks on data CO
. security and privacy. 1 R 6
23 a CO U 6
. . Discuss the impact of computer crime on businesses and society. 5
b Examine the challenges law enforcement faces in combating CO A 6
. computer crime internationally. 6
COMPULSORY QUESTION
COURSE OUTCOMES
CO1 define the fundamental concepts of data and information security.
CO2 apply the procedures to secure a system against failure, theft and invasion.
CO3 discuss the security terms, principles and risk factors.
CO4 recognize the importance of network security.
CO5 choose various security operations to secure a network
CO6 select suitable policies for administering a company’s network.
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. List the Linear Data Structures. CO1 R 1
2. Write a simple algorithm to find biggest of three numbers. CO1 A 1
3. Explain the concept of a stack and enumerate its fundamental operations. CO2 U 1
4. Write any two applications of queue. CO2 A 1
5. Enumerate the benefits of using arrays compared to linked lists as data structures. CO3 R 1
6. List the types of linked lists. CO3 R 1
7. Describe the best-case and worst-case time complexities for linear search. CO4 U 1
8. List some of the internal sorting methods. CO4 R 1
9. Give an example for binary tree and binary search tree. CO5 U 1
10. Define adjacent nodes. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Write a brief note on Abstract Data Type. CO1 A 3
12. Convert the infix expression (A+B)*C-(D-E)*(F+G) to its equivalent postfix
expression. CO2 U 3
13. Enumerate the difference between Doubly Linked Lists and Circular Linked Lists. CO3 R 3
14. Rewrite the order of values after each iteration by applying the bubble sort
algorithm to arrange the list {18, 32, -11, 6, 68, 2, -34} in ascending order. CO4 U 3
15. Describe Binary Search tree using an example. CO5 R 3
16. Give examples for weighted and directed graph. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the time and Space complexity with a suitable example. CO1 A 6
b. Discuss about Algorithmic Problem solving approaches. CO1 U 6
18. a. Write an algorithm to perform any two fundamental Stack operations. CO2 A 6
b. Illustrate the En-queue, De-queue, and display operations in queue using
suitable algorithms. CO2 An 6
19. a. Explain the operations that can be performed in a circular singly linked list
with algorithm. CO3 A 12
20. a. Discuss about Insertion sort and Selection sort algorithms with an example. CO4 U 12
21. a. Explain the tree traversal algorithms; Apply the In-order, Pre-order, and CO5 A 12
Post-order traversal algorithms in the following tree and give the results.
22. Explain the B-Trees; Insert the elements [5, 3, 21, 9, 13, 22, 7, 10, 11, 14, 8,
6] into the B-Tree and give the resultant tree. (order 3) CO6 A 12
23. Discuss any three applications of stack and queue with appropriate
examples. CO2 U 12
COMPULSORY QUESTION
24. Explain the different graphs traversal algorithms with proper examples. CO6 A 12
COURSE OUTCOMES
CO1 Understand the basics of abstract data type and algorithm analysis
CO2 Illustrate the use of array to implement stack and queue
CO3 Describe singly and doubly linked list and utilize linked list to design stack and queue data
structures.
CO4 Illustrate the working of sorting and searching algorithms and application of hashing
CO5 understand the different types of tree data structures and demonstrate the methods for traversing
binary trees
CO6 Differentiate the graph representations and traversals
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define cognition. CO1 R 1
2. Enumerate the types of photosensitive cells in retina. CO1 R 1
3. State spatial substrate. CO2 R 1
4. List the different types of visualization. CO2 R 1
5. State corpus. CO3 R 1
6. Define block in a node-link graph. CO4 R 1
Enumerate the common approaches in generating space-filling
7. CO4 R 1
hierarchies.
List the various types of maps supported by computer
8. CO5 R 1
technology.
9. Record the advantages of flow maps. CO5 R 1
10
CO6 R 1
. Name the general aspects of the characteristics of time.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
CO1 U 3
. Summarize enclosure in Gestalt principles.
12
CO2 U 3
. Differentiate between data visualization and visual analytics.
13
CO3 U 3
. Express Zipf’s law.
14
CO4 U 3
. Paraphrase planar embedding.
15 Distinguish between Direct Volume Rendering and Surface
CO5 U 3
. Fitting.
16
CO6 U 3
. Classify the visual variables for spatial data.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a
CO1 A 12
. . Illustrate the visual perception and its process.
19 a CO3 A 12
. . Illustrate the single document visualizations.
21 a CO5 U 12
. . Describe the types of geological visualization in detail.
22 a CO5 A 12
. . Illustrate the various factors in evaluating visualization.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define item data type. 1 R 1
CO
2. State structured grid. 1 R 1
Name the term which plots one numeric attribute against another CO
3. numeric attribute. 2 R 1
CO
4. List the layouts in spatial layout density. 2 R 1
CO
5. Label network topology. 3 R 1
CO
6. State nested circles. 3 R 1
CO
7. Define named entity recognition (NER). 4 R 1
CO
8. Quote tf-idf. 4 R 1
CO
9. Enumerate the various interaction controls. 5 R 1
10 CO
. Name the modern integrated visualization system. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Differentiate sequential and diverging attribute types. 1 U 3
12 CO
. Paraphrase stream graphs. 2 U 3
13 CO
. Compare rods and cones in color vision. 3 U 3
14 CO
. Summarize filtering operators in interactive visualization. 4 U 3
15 CO
. Express data space in interactive techniques. 5 U 3
16 CO
. Paraphrase jigsaw visualization tool. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 CO A 1
. Illustrate the rules of thumb in data visualization. 1 2
18 a CO A 6
. . Write about geographic data with example. 2
b CO A 6
. Explain tensor fields: many values. 2
19 CO U 1
. Discuss in detail the color maps and its types with examples. 3 2
20 CO A 1
. Illustrate the single document visualization with neat sketch. 4 2
22 CO U 1
. Describe the task abstraction in visualizing data. 1 2
23 CO A 1
. Explain the steps in designing an effective visualization. 5 2
COMPULSORY QUESTION
24 CO A 1
. Illustrate the visualization systems based on data type. 6 2
COURSE OUTCOMES
CO
Choose knowledge of perception and cognition to evaluate visualization design alternatives.
1
CO Understand the role of visualization in the processing and analysis of data coming from a broad
2 range of sources.
CO
Apply suitable data visualization tools for various applications.
3
CO Identify appropriate data visualization techniques given particular requirements imposed by the
4 data.
CO
Describe the cutting-edge research ideas in the field of visualization.
5
CO
6 Apply appropriate design principles in the creation of presentation and visualization.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
Name two DCL commands. 1
2. Convert the following relational algebra expression into the CO U 1
corresponding SQL query: 1
σdept = “CSE” ˄ CGPA >8.5 (student).
3. CO R 1
Define “Triggers”. 2
4. Show the output for the given query. CO U 1
SELECT NULL + 5 from dual; 2
5. Identify the symbol used for “dependent” in the following ER model. CO R 1
3
6. CO R 1
State “Multivalued Dependency”. 3
7. Indicate the disadvantages of the sequential index. CO U 1
4
8. Define “clustering index”. CO R 1
4
9. Name the process that is responsible for ensuring durability in DBMS CO R 1
systems. 5
10 List the components of the data warehouse. CO R 1
. 6
PART – B (6 X 3 = 18 MARKS)
21 a CO U 6
. . Illustrate the various transaction states with a neat diagram. 5
b CO U 6
. Explain any two control mechanisms without locking techniques. 5
COMPULSORY QUESTION
COURSE OUTCOMES
CO recognize the role of database administrator and database management systems in software
1 applications and other advanced concepts.
CO use query language to retrieve data efficiently from the database.
2
CO design the database for the given specification of the requirement using the ER method and
3 normalization.
CO design and implement significant database objects such as file structures and index schemes.
4
CO describe techniques for transaction processing and concurrency control.
5
CO implement security in database.
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the activation function used in logistic regression to classify CO U 1
any given data. 1
2. State the thumb rule for obtaining an optimal hyperplane in a support CO R 1
vector machine (SVM). 1
3. CO R 1
Name a few loss functions used in deep learning algorithms.
2
4. CO R 1
Define universal approximation theorem.
2
5. Apply the given filter on the input matrix with a stride of 2 and padding CO A 1
of 1. Obtain the first and the last element of the output image. 2
18 a Determine the new weight values at the end of the first iteration of CO A 6
. . the 2-input ‘OR’ logic gate using the single-layer perceptron (SLP) 1
algorithm.
Use Net = 1 if Net >= 0.2
= 0 if Net < 0.2
The initial weight vector = [0.1, 0.3], learning rate = 0.2.
b Compare the architectures, learning laws, and training procedures of CO A 6
. SLP and multiple-layer perceptron (MLP) algorithms. 1 n
COURSE OUTCOMES
CO1 Understand the basics of deep learning
CO2 Implement various deep learning models
CO3 Realign high dimensional data using reduction techniques
CO4 Analyze optimization and generalization in deep learning
CO5 Explore the deep learning applications
CO6 Apply the algorithms to real time problems.
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Is 2n2 = O(n3) be true? CO1 U 1
2. Write a recursive algorithm for computing GCD of two numbers. CO1 R 1
3. n CO2 R 1
Draw recursion tree for T(n) = 2T( ¿+ ¿n2 ,
2
4. Find time complexity and space complexity of following algorithm. CO2 R 1
11 CO1 A 3
. Prove 2*n2 + 10*n + 7 = O(n2) n
12 Consider the problem of making change for 2530 rupees using the CO2 U 3
. fewest number of currencies. Assume that each currency’s value is
an integer and Rupees 1000, 500, 200,100,50,20,10 and 5 are
available. Describe a greedy algorithm to make change. Prove that
your algorithm yields an optimal solution. Give any five feasible
solutions also.
13 Consider the strings “PQRSTPQRS” and “PRATPBRQRPS”. CO3 A 3
. What is the length of the longest common subsequence? n
14 How to use branch and bound method for solving knapsack CO4 U 3
. problem?
15 Find max flow of the network shown below CO5 A 3
. n
S ←0
for i ←1 to n do
S ←S + i * i
return S
a. What does this algorithm compute?
b. What is its basic operation?
c. How many times is the basic operation executed?
d. What is the efficiency class of this algorithm?
e. Suggest an improvement, or a better algorithm altogether, and
indicate its efficiency class. If you cannot do it, try to prove that,
in fact, it cannot be done
19 a. CO1 R 4
. What is Optimal Merge Pattern? Explain.
b CO1 A 8
. Apply Optimal Merge Pattern algorithm on 5, 3, 2, 7, 9, 13 n
20 a. CO4 R 4
. Write Floyd’s Algorithm.
Apply the Floyd’s algorithm for the following graph CO4 A 8
6
x y
4
3
11 2
21 a. CO5 R 4
. Write Prim’s algorithm.
b Consider an undirected, weight graph as shown below. CO5 A 8
. Construct MST using Prim’s algorithm.
b 1 c
5 3 4 6
a 6 d 2 e
23 a. CO6 R 4
. Discuss the concepts used in tractable and intractable problems.
b Explain the following intractable problem and its solution find CO6 R 8
. methodologies.
1. Travelling Salesman Problem
2. Graph coloring problem
3. Knapsack problem.
COMPULSORY QUESTION
24 a. Let A = { i/119, m/96, c/247, g/283, h/72, f/77, k/92, j/19} be CO6 A 12
. the letters and its frequency of distribution in a text file.
Compute the suitable Huffman coding to compress that data
efficiently.
Encode the text “mick” using the above code.
Decode the text whose encoding is 1111110011111
COURSE OUTCOMES
CO
Analyze given algorithm and express its complexity in asymptotic notation
1
CO
Design algorithms using brute force and greedy techniques.
2
CO
Develop dynamic programming solutions for optimization problems.
3
CO Propose solutions using backtracking and branch-and-bound technique.
4
CO
Solve problems using fundamental graph algorithms
5
CO Apply suitable algorithmic technique to solve a problem and identify the problems belonging
6 to the class of P, NP-Complete or NP-Hard
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Define transparency. CO1 R 1
2. List the generations of distributed systems. CO1 R 1
3. Define Remote Object Reference. CO2 R 1
4. Predict the method used by clients to invoke remote operations CO2 U 1
5. Differentiate Synchronous and Asynchronous Communication. CO3 U 1
6. Illustrate the concept of deadlock with its representation. CO3 A 1
7. Describe the characteristics of Multicast Communication. CO4 R 1
8. Summarize the limitations of Bully algorithm. CO4 U 1
9. State the importance of linearizability in data replication. CO5 R 1
10. Define distributed shared memory. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Distinguish between the physical and architectural models of distributed systems. CO1 An 3
12. Explain publish-subscribe paradigm. CO2 U 3
13. Describe Christian’s method of clock synchronization. CO3 R 3
14. Differentiate growing phase and shrinking phase of 2PL protocol. CO4 An 3
15. Describe Update propagation in gossip architecture. CO5 R 3
16. Explain EDF scheduling. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the different client-server architectures employed in a distributed CO1 U 8
environment. Explain the rationale behind focusing on thin clients
instead of fat clients. State a few relevant applications of client-server
architecture.
b. Distinguish between different types of omissions and arbitrary failures CO1 An 4
that affect channels and processes in a distributed environment.
18. a. Explain the key steps and considerations involved in implementing RMI CO2 U 6
with a suitable diagram.
b. Describe the modules of distributed file service architecture. CO2 R 6
19. a. Illustrate the mechanism by which pastry routes messages to the CO3 An 12
addressed node in the distributed system.
20. a Explain the edge-chasing protocol for deadlock detection. CO4 An 6
Consider a distributed system with three sites in the following situation:
i) Site S1 has 3 processes, P1, P2, and P3, where process P2 is waiting to
acquire a resource held by process P4.
ii) Site S2 has 2 processes, P4, and P5, where process P4 is waiting to
acquire a resource held by process P7.
iii) Site 3 has 3 processes, P6, P7, and P8, where process P7 is waiting to
acquire a resource held by process P2.
Analyze the edge-chasing protocol and identify if any deadlock arises for
the given scenario.
b Illustrate two phase commit protocol with suitable example. CO4 A 6
21. a Determine the strategies and operations to minimize the overhead CO5 A 6
associated with maintaining primary replication manager in passive
replication.
b Describe the role of group communication in a distributed environment. CO5 R 6
22. a. Explain network partition algorithm. Why is it not suitable for banking CO5 An 6
applications?
Describe the components of a gossip replica manager. CO5 U 6
COMPULSORY QUESTION
24. a. Analyze the distributed multimedia systems by considering its CO6 An 12
characteristics, QoS management and parameters.
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Interpret the term “pervasive computing”. CO1 U 1
2. List out any four application areas of embedded systems. CO1 R 1
3. Define Petri Nets. CO2 R 1
4. Name the three types of modeling in VHDL. CO2 R 1
5. Define dynamic power consumption. CO3 R 1
6. Identify the key advantage of the processor. CO3 R 1
7. Explain whether air traffic control systems are an example for soft or hard real CO4 U 1
time systems.
8. Define sporadic task. CO4 R 1
9. List the four different design patterns used for system representation. CO5 R 1
10. Represent FPGA based emulation using a block diagram. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Develop the sample requirement form for a washing machine. CO1 A 3
12. Sketch the block diagram of “calling an answering machine”. CO2 A 3
13. Differentiate between a sensor and an actuator with examples. CO3 An 3
14. Identify six characteristics of an embedded operating system. CO4 U 3
15. List and explain the three parts of hardware-software codesign. CO5 R 3
16. Classify the different injection times for software fault injection. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Examine the various models of Computation with examples. CO1 A 12
20. a. Sketch the basic diagram of a sample and hold circuit and explain its CO3 A 5
operation.
b. Explain the various types of sensors used in an embedded system. CO3 U 7
21. a. Describe the typical features and functionalities of e-voting systems. CO3 R 6
b. Identify the four key requirements needed for an OS to be an RTOS. CO4 U 6
22. a. Write the role of rate monotonic scheduling in real-time operating CO4 A 7
systems with an example.
b. Evaluate and justify the statement which says, “EDF allows for CO5 An 5
preemptive scheduling and can handle tasks with varying deadlines and
burst times”.
23. a. Explain Directed Acyclic Graph based partitioning structure with block CO5 A 7
diagram.
b. Write about the three simple loop transformations used in the source code. CO5 A 5
COMPULSORY QUESTION
24. a. Compare and contrast Serial fault simulation, Parallel fault simulation and CO6 An 7
Concurrent fault simulation.
b. Sketch the different design flow integrations for emulation. CO6 A 5
COURSE OUTCOMES
CO1 understand specific requirements and problems arising in embedded system applications.
CO2 design embedded systems using formal models and methods as well as computer-based
synthesis methods
CO3 apply the formal models and methods in embedded system design in practical applications using
the programming language C, the operating system FreeRTOS, a commercial embedded system
platform and the associated design environment.
CO4 describe embedded architectures and components, hardware-software interfaces, memory
architecture, communication between components.
CO5 explain embedded operating systems, real-time scheduling theory, shared resources, and
hardware architecture synthesis.
CO6 identify validation and testing methodologies for embedded system
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define ethics in information technology. 1 R 1
CO
2. Name any two characteristics of organizational culture. 1 R 1
CO
3. State the meaning of phishing. 2 R 1
CO
4. Differentiate between smishing and vishing. 2 U 1
CO
5. Define Copyright Infringement. 3 R 1
CO
6. List the types of work that can be copyrighted. 3 R 1
CO
7. Describe the importance of software quality in systems. 4 R 1
Identify the forms of representation if the seller either misrepresents the CO
8. quality of a product or conceals a defect in it. 4 U 1
CO
9. Name any two ethical issues related to social networking. 5 R 1
10 CO
. Represent the ISO 27001 framework. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. List the various roles of Quality circle facilitators in an organization. 1 R 3
12 CO
. Write the most prominent professional organizations in the field of IT. 2 A 3
13 CO
. Distinguish between submarine patents and patent farming. 3 U 3
14 CO
. Explain about any two types of testing used for systems. 4 U 3
15 CO
. Illustrate any four forms of cyberbullying. 5 A 3
16 CO
. List the requirements for ISO 27001 framework. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Illustrate the features and benefits of Plan- Do- Check- Act and A3 CO A 5
. . problem solving tools. 1
b CO A 7
. Determine the various steps used by Plan- Do- Check- Act tool. 1
19 a CO U 6
. . Explain in detail about Copyright and Copyright Infringement. 3
b Describe how the use of copyrights to protect computer software CO R 6
. causes issues in interpretation and implementation. 3
20 CO A 1
. Examine the strategies for engineering quality software. 4 2
22 a CO A 6
. . Write about H1B Workers and the H1B application process. 5
b CO U 6
. Explain B1- Visa controversy and the advantage of this type of visa. 5
24 a CO
. . Explain the responsibilities of information asset management. 6 A 7
b Sketch the block diagram showing the information asset CO
. management roles. 6 A 5
COURSE OUTCOMES
CO understand professional ethics and organizational culture conduct in information technology.
1
CO identify the various leadership styles and the suitability for the specific organization.
2
CO identify the possible Computer crimes and the rules and regulations for protection.
3
CO familiarize with the various types of IPR and the procedures for obtaining IPR
4
CO understand about the various types of Social Networking and issues.
5
CO relate to the different national and international organizational model with intellectual ability.
6
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 5 12 17
CO2 1 13 3 17
CO3 8 9 17
CO4 1 4 12 12 29
CO5 1 18 9 28
CO6 3 1 12 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Quote the name of the concept where coins can move from one CO
1. R 1
blockchain to another or back. 1
Recall the property where information written on the blockchain CO
2. R 1
cannot be changed. 1
CO
3. Give example for a software wallet. U 1
2
After a finite time, all participants agree on a single state. Recite CO
4. R 1
the blockchain element. 2
CO
5. R 1
Recall the denomination for the Bitcoin value 0.001. 3
CO
6. U 1
Differentiate between Bitcoin and Blockchain. 3
CO
7. R 1
Name the blocks that are detached. 4
CO
8. R 1
State the attack possible on the resilient proof of work. 4
CO
9. R 1
Define cross-border financial services. 5
Recite the various components used to provide communication CO
10. R 1
between IoT devices. 6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. U 3
Distinguish between private and public blockchains. 1
CO
12. R 3
Define digital certificate. 2
CO
13. R 3
Enumerate the applications of Blockchain. 3
CO
14. U 3
Give a neat sketch for Ricardian Contracts. 4
CO
15. R 3
List the functions performed by an IoT device. 5
CO
16. R 3
Define crypto-economics. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the challenges of the distributed system in CO U 6
consideration of the Byzantine problem, which describes 1
the difficulty of decentralized parties, have in arriving at a
consensus without relying on a trusted central party.
Assume a network where no member can verify the
identity of other members.
b. CO U 6
Describe the key features of blockchain. 1
23. a. Write on smart contracts and how its user can interact CO A 12
creating a transaction. 4
COMPULSORY QUESTION
24. a. Summarize the payment system implementation of a CO U 6
blockchain. Explain how those platforms provide a 6
network to bridge participants and remove other
intermediaries.
b. Sketch the supply chain flow diagram and describe its CO A 6
various components. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 understand the necessity of blockchain and realize where blockchain fits in
CO2 compare and contrast cryptocurrencies, blockchain, and concept of wallets
CO3 relate classical consensus algorithms with modern algorithms like Proof-of-Work
CO4 illustrate the uses of programmable blockchains, smart contracts and oracles
CO5 comprehend the various use cases and synergistic layered approach with AI/ML/IOT etc.
CO6 design and develop blockchain based applications using the principles of cryptoeconomics
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List a few early applications of computer graphics. CO1 R 1
2. Infer on dithering and image compositing. CO1 U 1
3. Differentiate right-handed and left-handed coordinate systems. CO2 U 1
4. Compare and contrast window and viewport. CO2 An 1
5. Evaluate the importance of stereo image rectification. CO3 E 1
6. Illustrate cleanliness property in a plane sweep algorithm. CO4 A 1
7. Define radiance, luminance and brightness. CO4 R 1
8. Sketch the architecture of a 3*5 Bezier patch. CO5 A 1
9. Name a few exportable 3D file formats. CO1 R 1
10. Distinguish between revolve and sweep. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Summarize the midpoint circle algorithm. CO1 U 3
12. Illustrate point clipping with examples. CO2 U 3
13. Determine the volume of the following pyramid: CO3 A 3
COURSE OUTCOMES
CO1 Understand the basics of geometric modelling techniques in computer-aided design
CO2 Describe the different coordinate systems and views.
CO3 Explain the tools and mathematical models involved in geometric modelling
CO4 Identify the appropriate Illumination and rendering techniques for modelling the virtual
objects
CO5 Implement various algorithms to map and render the basic geometrical primitives into
complex models.
CO6 Apply the geometric modelling concepts in the development of CAD applications.
Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
COMPULSORY QUESTION
24. a. Explain the boosting techniques associated with web CO4 A 6
spam in detail. n
b. Infer your views on Byes net and list down the CO6 U 6
applications of Byes net.
COURSE OUTCOMES
CO1 Design an effective text indexing system
CO2 Familiar with the Boolean and vector-space retrieval models.
CO3 Identify the evaluation and interface issues in text processing
CO4 Understand IR techniques for the web, including crawling, link-based algorithms, and
metadata usage.
CO5 Develop Document clustering and classification applications.
CO6 Compare traditional and machine learning-based ranking approaches
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Identify the functionality of IoT. CO1 U 1
2. Define RFID with suitable example. CO1 R 1
3. Give some examples of neurological diseases. CO2 R 1
4. Mention various sensors in agricultural IoT. CO2 R 1
5. Name any two examples of inertial sensors. CO3 U 1
6. State what is meant by wearable motherboard. CO3 R 1
7. Define the term “smart home”. CO4 U 1
8. Discuss about smart eye wear with suitable examples. CO4 R 1
9. Recall a few payloads used in drones for surveillance applications. CO6 U 1
10. Recall a few challenges to find an optimal path for drone movement. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Discuss the security and privacy measures in IoT. CO1 U 3
12. List any three smart wearables and mention its application. CO2 R 3
13. Explain about the elements of a biosensor. CO3 U 3
14. List out the system design of sample collection in wearable chemical and bio CO4 R 3
chemical sensor.
15. Explain the working concept of aerial networking used in law enforcement. CO5 U 3
16. List down the basic requirements needed for drone delivery system in rural CO6 R 3
areas.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Sketch the architecture of IoT and explain it. CO1 U 6
b. Explain about the technology of connected devices in IoT. CO1 U 6
18. a. Explain the steps involved in the connection of a light using blynk app with CO2 A 6
suitable diagram.
b. Relate a real-time scenario of a smart home automation and sketch any five CO2 A 6
technologies with its relevant protocols.
19. Determine a scenario in which a patient is not safe in the environment, and CO3 An 12
hence eventually, it becomes inevitable for at least one caregiver to be with
him all the time for Parkinson disease. It’s an emergency for the caregiver
and he has to leave for a day. How will IoT help the caregiver in such
critical time? Explain in detail.
20. What effect will the internet of things (IoT) have in healthcare? Explain CO4 A 12
with any one example of smart device.
21. a. Describe about the assistive devices for individuals with severe paralysis. CO5 A 8
b. Outline the hardware specifications of Raspberry Pi. CO5 U 4
24. Explain the working concept of IoT enabled classroom monitoring system CO6 A 12
with needed IoT technology and outline the system architecture of the
monitorization of student behavior during class hours.
COURSE OUTCOMES
CO1 understand Internet of Things and its hardware and software components
CO2 interface I/O devices, sensors & communication modules
CO3 examine remote data and control devices
CO4 compare the connectivity technologies and protocols in IoT
CO5 infer security issues in IoT
CO6 develop real life IoT based projects
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. What is data science? 1 R 1
CO
2. List any two application of data science in healthcare domain. 2 R 1
CO
3. What is EDA? 2 R 1
CO
4. Define median. 2 R 1
CO
5. What is Hypothesis Testing? 1 R 1
CO
6. What are the advantages of decision tree? 1 R 1
CO A
7. How supervised models differ from unsupervised models? 4 n 1
CO
8. List the types of machine learning. 2 R 1
CO
9. Define clustering. 1 U 1
10 List applications unsupervised learning. CO
. 2 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Discuss exploring various datasets in different repositories. 6 C 3
12 CO
. List any two strategies used to handle missing data. 2 U 3
13 CO
. Write short on correlation analysis. 3 R 3
14 Construct a box plot for the given data. CO
. 18, 27, 34, 52, 54, 59, 61, 68, 78, 82, 85, 87, 91, 93, 100 4 C 3
15 CO
. Compare regression and classification. 2 U 3
16 Enumerate the benefits and limitations of content-based CO A
. recommendation. 4 n 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a CO
. . Classify Python fundamental libraries. 1 U 6
b CO
. Write in detail the application of data science in any five domains. 1 R 6
18 a CO 1
. . Describe in detail about exploratory data analysis. 4 U 2
19 a CO 1
. . Construct linear and logistics regression with an example. 2 A 2
20 a CO
. . Illustrate decision trees with suitable examples. 4 R 6
b Discuss in detail the various Supervised Machine Learning CO
. techniques. 6 E 6
21 a CO 1
. . Explain regression analysis and types. 5 U 2
22 a CO
. . Explain different types of clustering. 4 E 6
b CO
. Describe K means clustering with an example. 4 U 6
23 a CO
. . Discuss about content-based filtering. 6 C 6
b CO
. Develop a case study of Sentiment Analysis in Twitter. 5 A 6
COMPULSORY QUESTION
24 a Explain in detail about the recommender systems and its CO 1
. . classification. 6 E 2
COURSE OUTCOMES
CO remember the key concepts of data science, data characteristics, its applications, and the toolkit
1 used data scientists
CO recall the mathematical concepts for descriptive and statistical analysis of the given dataset
2
CO discuss on the principle operation of various supervised and unsupervised machine learning
3 techniques
CO select appropriate mathematical machine learning techniques for solving real-world problems.
4
CO apply the relevant techniques for implementing solutions to solve real-world problems
5
CO access the performance of prediction, classification, and recommendation of machine learning
6 techniques
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 9 7 16
CO2 4 7 12 23
CO3 3 3
CO4 6 18 4 6 3 37
CO5 6 12 18
CO6 18 9 27
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Differentiate between supervised and unsupervised learning, CO1 U 1
2. Describe which hypotheses are consistent and inconsistent for the given data. CO1 U 1
# A B C D E Class
1 90 70 60 80 100 +ve
Shape Circle,Triangle,Rectangle
Surface Smooth,Irregular
Thickness Thick,Thin
12. Illustrate with an example about All-vs.-all (AVA) multiclass classification CO2 U 3
approach and write the steps involved in handling imbalance problem.
13. Differentiate between single layer perceptron and multiple layer perceptron. CO3 U 3
14. Compare and contrast between K-means and fuzzy C-means clustering. CO4 U 3
15. Distinguish between classification and regression trees. CO5 U 3
16. Describe the methods of assessing the performance of multiclass classifiers with CO6 U 3
suitable mathematical representations.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Determine the consistent hypothesis using the Candidate elimination CO1 A 6
algorithm for the given dataset.
# Color Toughness Fungus Appearance Poisonous
18. a. Calculate the mean, standard deviation, and IQR to measure the reading CO2 An 6
ability of children where the scores of 9 third grade students: 40 26 39 14
42 18 25 43 56.
b. Describe the various methods for handling missing and noisy values in CO2 U 6
real-world data which is crucial for accurate analysis and modeling..
19. a. Estimate the decision boundary to be formed using a linear SVM model by CO3 U 8
considering the vectors (2,1) and (2,-1) as negative and the weight vector
(4,0) as positive. Also, highlight the calculated ‘w’ and offset value ‘b’.
b. List the objectives and advantages of linear SVM model. CO3 R 4
20. a. Apply the K means Algorithm and cluster the below data by assuming k=3 CO4 A 6
with initial centroids as (2, 10) and (5,8).
S. No X Y
1 2 10
2 2 5
3 8 4
4 5 8
5 7 5
6 6 4
7 1 2
8 4 9
b. Apply K-medoid clustering technique to the following dataset by assuming CO4 A 6
two medoids S2 and S4 for the 2 clusters. Estimate the absolute error
criterion and predict whether it is a good choice of replacing S2 by S7.
21. a. Apply a regression tree algorithm on the following dataset to form the CO5 An 12
regression tree.
22. a. Evaluate the effectiveness of using a simple linear regression line to CO5 An 6
estimate chocolate sales with revenue data for X=30
TEMPER 80 72 45 40 55 75
ATURE
[F]
b. Articulate a single layer perceptron model using perceptron learning CO4 A 6
algorithm for the given data by assuming the initial weights as [1.6, 0.9],
threshold >= 1, learning rate = 0.5 and determine the updated weight after
one iteration.
X1 X2 Y
0 0 1
0 1 0
1 0 0
1 1 0
23. a. Describe the step-by-step procedure to construct the decision tree using the CO3 U 4
ID3 Algorithm
b. Explain the types of hierarchical clustering with a neat diagram and CO3 An 8
construct a dendrogram for the following distance matrix using a single
linkage criterion.
1 2 3 4 5
1 0
2 9 0
3 3 7 0
4 6 5 9 0
5 11 10 2 8 0
COMPULSORY QUESTION
24. a. Explain the evaluation metrics for binary classification in detail and CO6 A 6
calculate the Precision, Recall and F1 Score for the below Confusion
matrix.
Predicted + Predicted -
Actual + 30 20
Actual - 10 40
b. Illustrate the various cross validation strategies with suitable examples CO6 A 6
COURSE OUTCOMES
CO1 recall the concepts, mathematical background, applicability, limitations of existing machine learning
techniques.
CO2 explain the simple feature engineering steps
CO3 apply suitable linear / nonlinear / probabilistic machine learning algorithms for a given task
CO4 demonstrate the working principle of distance based algorithms to handle unlabeled data
CO5 distinguish tree and rule based machine learning algorithms and appropriately apply to the suitable
application
CO6 evaluate the performance of machine learning models using suitable metrics
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Recognise the number of ambiguities exist in the sentence: ‘I know CO R 1
little Italian’. 1
2. CO R 1
Identify the field of study that focuses on internal structures of words. 1
3. Name the morpheme that cannot stand alone, but must be attached CO R 1
to another morpheme to have a meaning. 2
4. Predict the possible candidates that can be generated for the error CO U 1
word ‘tast’. 2
5. Express the three grammatical constituents for the given sentence: CO U 1
‘The retired man grew potatoes in his garden’. 3
6. CO R 1
Define the metric ‘Labelled precision’ in parse evaluation. 3
7. Identify the relation between the head word (booked) and dependent CO U 1
word (flight) in the sentence: ‘We booked her the first flight to 4
Canada’
8. Predict the lexical relationship between the word ‘newspaper’ in the CO U 1
following sentences: 4
The newspaper was delivered early today
The newspaper recruited a new journalist
9. Predict the context words for the sentence ‘I saw a cute grey cat CO U 1
playing in the garden’, with C=2, and the target word ‘cat’. 5
10 Identify the named entities in the following sentence and classify them CO U 1
. based on the generic types. Barack Obama, the former President of 6
the United States, visited New York City on January 20, 2022’.
PART – B (6 X 3 = 18 MARKS)
11 Discuss the potential categories of errors stemming from keyboard CO U 3
. mistyping, with examples. 1
12 CO U 3
Estimate the Bigram probability of the test sequence: ‘<s> do Sam I
. 2
like’,
Given a set of unigram and bigram probabilities: P(do|<s>) = 2/11,
P(do|Sam) = 1/11, P(Sam|<s>) = 4/11, P(Sam|do) = 1/8, P(I|Sam) =
4/11, P(Sam|I) = 2/9, P(I|do) = 2/8, P(I|like) = 2/7, P(like|I) = 3/11,
P(do) = 3/8, P(Sam) = 2/11, P(I) = 4/11, P(like) = 5/11.
13 Analyze the differences and similarities between Lexical and CO A 3
. Syntactic analysis. 3 n
14 Evaluate the parsing metrics recall, precision and F1 Score for the CO E 3
. given Gold standard and parsed output of the statement ‘Saw the man 4
with a telescope’
15 CO U 3
. Describe the challenges in Word Sense Disambiguation. 5
16 CO U 3
. Indicate the suitable measure for Disambiguation in entity linking. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Estimate the bigram probability of the test sentence: <s>I love CO A 6
. . machine learning algorithms </s>, by applying add-one 1 n
smoothing for the training corpus with four sentences:
<s> I love natural language processing </s>
<s> The cat is sitting on the mat</s>
<s> Machine learning algorithms are powerful</s>
<s> NLP models analyze linguistic patterns</s>
b Explain Levinstein approach to estimate the minimum edit CO U 6
. distance and calculate the cost to transform the word ‘numpy’ to 1
‘numexpr’.
18 CO A 1
Apply Viterbi Algorithm to estimate the appropriate POS tags for
. 2 2
the given sentence: ‘one dog bit’
Transition probabilities are given as:
VB
CD PRP NN VB </s>
D
<s> 0.5 0.2 0 0.3 0 0
CD 0.2 0 0.3 0.2 0.2 0.1
PRP 0.1 0.1 0 0.3 0.4 0.1
NN 0.05 0.15 0.2 0.25 0.3 0.05
VB 0 0.2 0.6 0 0 0.2
VB
0 0.1 0.6 0 0 0.3
D
And the observation likelihoods are given as:
one cat dog bit
CD 0.1 0 0 0
PRP 0.02 0 0 0
NN 0.05 0.03 0.04 0.01
VB 0 0 0.03 0
VBD 0 0 0 0.06
19 CO A 1
Apply CKY algorithm to construct the parse tree for the statement
. 3 2
“she eats a fish with a fork” with the CNF form given here.
Illustrate the stages of tree construction in detail.
23 CO U 1
. Describe the various elements of lexical semantics with examples. 5 2
COMPULSORY QUESTION
24 a Apply Naive Bayes classifier with add-1 smoothing for the CO A 6
. . likelihoods, and compute the most likely class for new document 6
D : fast, couple, shoot, fly. Given the following short movie
reviews, each labeled with a genre, either comedy or action:
1. fun, couple, love, love comedy
2. fast, furious, shoot action
3. couple, fly, fast, fun, fun comedy
4. furious, shoot, shoot, fun action
5. fly, fast, shoot, love action
b Summarize the relationship extraction process in NLP with an CO U 6
. example. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Identify the different linguistic components of natural language.
CO2 design a morphological analyser for a given natural language
CO3 Prefer appropriate parts of speech technique.
CO4 choose on the appropriate parsing techniques necessary for a given language and applications
CO5 decide on the appropriate semantic techniques necessary for a given language and applications
CO6 Design application involving natural language.
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the output of the following Java code snippet. CO1 U 1
class Karunya {
public static void main(String[] args) {
int a=1;
System.out.println(a++ + ++a +a++);
} }
2. Rewrite the following code snippet with foreach loop. CO1 U 1
int a[ ] = {1,2,3,4,5}
for ( i=0; i < a.length; i++)
{
System.out.println (“The Values in the array are: “+ a[i]);
}
3. State the significance of the import keyword. CO1 U 1
4. Predict the output of the following Java code snippet. CO3 A 1
try
{
int x = 0;
int y = 5 / x;
}
catch (Exception e)
{
System.out.println("Exception");
}
catch (ArithmeticException ae)
{
System.out.println(" Arithmetic Exception");
}
System.out.println("finished");
5. Differentiate between process based multitasking and thread based CO4 U 1
multitasking.
6. Predict the output of the following Java code. CO2 U 1
String str = "KarunyaUniversity";
System.out.println(str.substring(4));
7. Predict the output of the following Java code snippet. CO4 U 1
class Parent {
void display () {
System.out.println("Parent");
}
}
class Child extends Parent {
void display() {
System.out.println("Child");
}
public class Main {
public static void main(String[] args) {
Parent obj = new Child();
obj.display () ;
}}
8. Name the package used to do socket programming in Java. CO6 R 1
9. Predict the output of the following code. CO6 U 1
interface Display{
void test();
}
public class LambdaDemo{
public satic void main(String[] arg){
Display d=( ) -> System.out.println("All the Best");
d.test();
}}
10. List the various listeners in Event handling in Java Swing. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Explain the branching statements in Java with an example. CO1 U 3
12. Illustrate the method overloading with an example. CO2 U 3
13. List out the three uses of final keyword with an example. CO3 R 3
14. Discover the error(s) (if any) in following code and justify your answer. CO4 A 3
abstract class Department
{ abstract void display();
}
public class CSE extends Department {
public static void main(String[] args) {
System.out.println("Welcome to CSE");
} }
Analyze the importance of using checked and unchecked exceptions in
15. Java. Provide examples of each and explain when it is appropriate to use CO6 An 3
them in your code.
16. Discuss any three layout managers in Java Swing package. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Describe the feature of Java programming language. CO1 R 6
b. Illustrate the arithmetic and relational operators with appropriate CO1 U 6
examples.
23. a. Construct a file named MyData.txt. Write your profile data such as CO6 A 6
name, regno, age, and CGPA into the file MyData.txt. Copy this
file content into another file called MyCopy.txt.
b. Discuss the Bounded Types in the Generic class to handle the CO4 U 6
hierarchical inheritance of Human, Student and Staff. Each class is
responsible for displaying information concerning their class. Prove
the workability of the above classes through bounded types.
COMPULSORY QUESTION
24. a. Develop a GUI program to convert Dollar to Rupee using Java Swing CO5 A 12
API as given below.
COURSE OUTCOMES
CO1 acquire the knowledge of structure and model of object-oriented programming
CO2 identify classes, objects, members of a class and relationships among them needed for a specific
problem
CO3 apply various techniques in polymorphism for software development.
CO4 develop applications using multi-threading, collections and IO concepts to solve real-time problems
CO5 create applications using event-driven programming
CO6 design and implement applications to solve distributed collaborative problems.
Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
1. Identify major functions of a kernel in a Unix operating system. CO1 R 1
2. Distinguish between command-line interface (CLI) and graphical user interface
(GUI). CO1 U 1
3. State the use of the program counter. CO2 R 1
4. Name the types of multithreading models. CO2 R 1
5. Differentiate scheduler and dispatcher. CO3 U 1
6. Define semaphore. CO3 R 1
7. Express any one way to overcome deadlock. CO4 U 1
8. Define external fragmentation. CO5 U 1
9. List the attributes of a file. CO5 U 1
10. Write the function of the interrupt handler. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Describe the storage structure of an operating system along with its diagram. CO1 U 3
12. Write short notes on the process control block (PCB). CO2 A 3
13. Analyze the role of the critical section in synchronizing the processes. CO3 An 3
14. Differentiate Paging and segmentation. CO4 U 3
15. List the different operations that can be performed on a file. CO5 R 3
16. Give any three merits of direct memory access. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain various operating system structures accompanied by its diagram. CO1 U 6
b. Describe the various types of system calls with examples. CO1 R 6
18. a. Illustrate the various types of inter process communications with all possible CO2 U 8
examples.
b. Differentiate preemptive and non-premptive scheduling. CO3 U 4
19. a. Apply priority scheduling and round robin scheduling with time slice t=2 to CO3 A 12
calculate waiting time (WT), turnaround time (TAT) of each process and find out
average WT and ATAT(Average Turnaround Time). (Lower number signifies
higher priority)
Process Burst Time Arrival Time
P1 10 3
P2 1 1
P3 2 4
P4 3 5
P5 5 2
20. a. Explain the classical problems of process synchronization with examples. CO4 R 12
21. a. Assume that there are 5 processes, P0 through P4, and 4 types of resources. CO5 A 12
At T0 we have the following system state:
Max Instances of Resource Type A = 3 (2 allocated + 1 Available)
Max Instances of Resource Type B = 17 (12 allocated + 5 Available)
Max Instances of Resource Type C = 16 (14 allocated + 2 Available)
Max Instances of Resource Type D = 12 (12 allocated + 0 Available)
i. Create a need matrix for the following.
ii. Use the safety algorithm to test if the system is in a safe state or not.
23. a.Explain the different types of file allocation methods with a neat sketch. CO5 U 8
b Consider a file system where a file can be deleted and its disk space reclaimed CO5 An 4
while links to that file still exist. Analyze the problems may occur if a new file is
created in the same storage area or with the same absolute path name? How can
these problems be avoided?
COMPULSORY QUESTION
24. a. Examine the total distance (in cylinders) that the disk arm moves to satisfy all the CO6 A 12
pending requests, for each of the following disk-scheduling algorithms. The disk
drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a
request at cylinder 143, and the previous request was at cylinder 125. The queue
of pending requests, in FIFO order, is 86, 1470, 913, 1774, 948, 1509, 1022,
1750, 130 Starting from the current head position.
a. FCFS b. SSTF c. SCAN d. LOOK e. C-SCAN
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Understand how operating systems makes it possible for many applications to share resources and to make programming easier for
user space applications.
CO2 Distinguish between user and kernel level operating.
CO3 Analyze the thread context management, synchronization methods and various scheduling algorithms.
CO4 Apply various memory management schemes especially paging and segmentation in real time applications.
CO5 Illustrate file systems in operating systems like UNIX/Linux and Windows.
CO6 Discover input output management, use of device driver and secondary storage (disk) mechanism.
Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the types of constraints in optimization problems. CO1 U 1
2. List the types of optimal points in optimization problems. CO1 R 1
3. Define sensitivity analysis. CO2 R 1
4. State the significance of the Slack variable. CO2 U 1
Name the method that is used to obtain an optimum assignment
5. CO3 R 1
solution.
6. Define pure integer programming. CO3 R 1
List the methods to find the solution for a Transportation
7. CO4 R 1
problem.
Represent the separable functions of the given objective
8. function. CO4 U 1
Max W = 2x+3y-7z
State the formula for backward recursion in dynamic
9. CO5 R 1
programming.
10. Identify the various queue’s discipline in queuing theory. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate linear and nonlinear programming problems. CO1 U 3
12. Determine and sketch the coordinates of the feasible region CO2 A 3
using the graphical method.
13. Apply the Least cost cell method to obtain the basic feasible CO3 A 3
solution for the following problem: Luminous lamps has three
factories - F1, F2, and F3 with production capacity 30, 50, and
20 units per week respectively. These units are to be shipped to
four warehouses W1, W2, W3, and W4 with requirements of
20, 40, 30, and 10 units per week respectively. The
transportation costs (in Rs.) per unit between factories and
warehouses are given below.
problem.
16. Give examples in real time of Queuing Systems. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Explain the classification of optimization algorithms in CO1 U 8
detail.
b. Construct the dual over the primal optimization problem. CO1 A 4
20. Solve the following NLPP using the Lagrange method. CO4 A 12
Minimize z=30x12+ x22+ x32
subject to x1+x2+3x3=2
5x1+2x2+x3=5
x1, x2, x3 ≥ 0
21. a. CO5 A 6
I II III IV V
A 9 11 14 11 7
B 6 15 13 13 10
C 12 13 6 8 8
D 11 9 10 12 9
E 7 12 14 10 14
A team of employees have identified five projects (I, II, III,
IV, V) that need to be assigned to the team members (A, B,
C, D, E). Each project has an estimated workload, and each
team member has different skills. Determine the minimal
assignment cost of projects.
b. Determine an initial basic feasible solution to the following CO5 A 6
transportation problem using the Northwest corner method.
iteration up to 4.
b. Describe the steps of Vogel’s approximation method for CO6 U 4
transportation problems.
23. a. Solve the following NLPP using the Karush Kuhn Tucker CO3 A 8
method.
COURSE OUTCOMES
CO1 formulation of optimization problems
CO2 define and use optimization terminology and concepts
CO3 describe the appropriate linear programming techniques.
CO4 choose the appropriate optimization for real world problems
CO5 customize the optimization methodologies for real time problem
CO6 apply the knowledge to solve the queuing problems
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define Intelligent devices. 1 R 1
CO
2. List the current modern technologies used in IIoT. 1 R 1
CO
3. Define Miniaturization. 2 R 1
CO
4. State the significance of network functions virtualization. 2 R 1
Name the wireless technology that relies on electrostatic coupling for CO
5. data transfer. 3 R 1
Identify the type of Address represented by the given alphanumeric
sequence: CO
6. 2001:0db8:85a3:0000:0000:8a2e: 0370:7334. 3 U 1
CO
7. Define middleware software pattern. 4 R 1
CO
8. List the features of the constrained application protocol. 4 R 1
CO
9. Identify the most popular commercial IoT middleware platforms. 5 U 1
10 CO
. State the primary objective of digital transformation. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Identify the various catalysts and precursors of the IIoT. 1 U 3
12 CO
. Sketch the diagrammatic representation of Cyber-Physical Systems. 2 A 3
13 CO
. Compare Zwave and Zigbee. 3 U 3
14 CO
. Explain the significance of the Real-time Transport Protocol. 4 U 3
15 CO
. List the characteristics of Low Power WAN. 5 R 3
16 CO
. Classify the various types of value chain components. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the architecture of IIoT infrastructure, outlining the CO U 7
. . arrangement and functionalities of its key components. 1
b Explain the various opportunities provided by IIoT across diverse CO U 5
. manufacturing units. 1
18 a Sketch the life cycle phases of Big Data analytics and explain the CO A 7
. . various stages and processes in the analysis of extensive datasets. 2
b CO U 5
. Identify the application areas of augmented reality. 2
21 a CO U 7
. . Compare Long Range WAN with SigFox Low Power WAN. 5
b CO U 5
. Describe in detail the importance of IIoT middleware. 5
COURSE OUTCOMES
CO Describe the drivers and enablers of Industry 4.0.
1
CO Define the smartness in Smart Factories, Smart cities, smart products and smart services.
2
CO Understand the various systems used in a manufacturing plant and their role in an Industry 4.0
3 world.
CO Summarize the power of Cloud Computing in a networked economy.
4
CO Express the opportunities, challenges brought about by Industry 4.0 and how organizations and
5 individuals should prepare to reap the benefits.
CO Identify the security challenges involved in Industry 4.0.
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Identify the types of real time operating systems. 1 U 1
CO
2. Name any two general purpose operating systems. 1 R 1
CO
3. Name the multiprocessor design that has identical processing units. 2 R 1
CO
4. Define distributed systems. 2 R 1
Identify the scheduling algorithm that is being executed process can be CO
5. stopped when a high-priority process arrives. 3 U 1
CO
6. Represent the formula to calculate the waiting time of the processes. 3 U 1
List the different forms of communication to support inter task CO
7. interactions. 4 R 1
Represent the methods to solve the priority inversion problem in CO
8. embedded systems. 4 U 1
CO
9. Identify the types of digital storage devices in embedded systems. 5 U 1
10 CO
. List the elements of task control block. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO A
. Distinguish between hard and soft real time operating systems. 1 n 3
12 CO
. Give examples of asymmetric multicore multiprocessor design. 2 U 3
13 Differentiate the preemptive and non-preemptive scheduling CO A
. algorithms. 3 n 3
14 CO
. List the application areas for mixed-mode systems. 4 R 3
15 CO A
. Differentiate the pool and queue in RTOS. 5 n 3
16 CO
. List the importance of the memory management unit. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain the types of common services that are offered by the kernel CO U 6
. . to the application software. 1
b CO U 6
. Explain the basic features of real time operating systems. 1
19 a Consider the following table of arrival time and burst time for five CO A 6
. . processes P1, P2, P3, P4 and P5 with the time quantum = 2 ms. 3
22 Consider a system with five processes (P0 through P4) and four CO A 1
. resources of type A, B, C and D with allocation of each process as 6 2
shown in the table below.
Process Maximum Allocated Available
A B C D A B C D A B C D
P0 6 0 1 2 4 0 0 1 3 2 1 1
P1 1 7 5 0 1 1 0 0
P2 2 3 5 6 1 2 5 4
P3 1 6 5 3 0 6 3 3
P4 1 6 5 6 0 2 1 2
Calculate the need matrix and determine the safe sequence of the
system.
23 Consider the set of 5 processes whose arrival time and burst time CO A 1
. are given below. Use SJF and preemptive priority scheduling 3 2
algorithm to calculate the average waiting time and average
turnaround time. (Higher number represents higher priority).
Process Arrival Time Burst Time Priority
Id
P1 0 4 2
P2 1 3 3
P3 2 1 4
P4 3 5 5
P5 4 2 5
COMPULSORY QUESTION
24 a Explain the task coordination mechanisms using a condition flag CO U 6
. . group. 6
b Construct a mailbox application system that uses a synchronization CO A 6
. mechanism and data transfer to enable task interactions. 6
COURSE OUTCOMES
CO understand the concepts of real-time systems and modeling
1
CO outline the potential benefits of distributed systems
2
CO analyze the time complexity in job handling
3
CO design real time embedded systems using the concepts of RTOS
4
CO identify and evaluate the storage management policies with respect to different storage
5 management
CO design applications in Embedded systems by using RTOS
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Recall the role of reinforcement learning in a chess game. R 1
1
Recall the two feedbacks used in multi-armed bandits with the non- CO
2. R 1
associative setting. 1
Represent the functional components of reinforcement learning with a CO
3. U 1
neat diagram. 1
CO
4. Define state transition and probability transition in Markov decision. R 1
2
Recall the different types of simulators used in the Markov decision CO
5. R 1
process. 2
CO
6. List down a few classical algorithms used in dynamic programming. R 1
3
CO
7. Recall the two standard approaches used in dynamic programming. R 1
3
CO
8. List down a few real-time Monte Carlo applications. R 1
4
Define the operations used for Monte Carlo control without exploring CO
9. R 1
starts. 5
10 Identify a few reinforcement learning applications using recommender CO
U 1
. systems 6
PART – B (6 X 3 = 18 MARKS)
11 CO
Name the two threads that have been used in machine learning to date. R 3
. 1
12 CO
State the bellman’s equation and its elements used in MDP problems. R 3
. 2
13 Describe the policy evaluation used for state-value function in CO
U 3
. reinforcement learning. 3
14 Describe how the Monte Carlo method is used to estimate the policy CO
U 3
. value. 4
15 Examine the reproduction of state aggregation cases within the linear CO
A 3
. framework. 5
16 Examine the ethical issues that take place in artificial reinforcement CO
A 3
. learning for solving real-world problems 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss the working concept of the n-armed bandit problem for slot CO U 6
. . machines and identify the possible outcome of a jackpot with a 1
minimum of four rollers with 12 combinations of labels.
b Visualize an apartment with 5 rooms; each door has a bidirectional CO R 6
. way of entering and exiting the rooms. Only one room carries the 1
reward point of 500 dollars. Apply the Q-learning technique and
represent the scenario in a graph of states, edges, and steps.
20 a Discuss the working concept of the Monte Carlo method used in the CO U 9
. . blackjack game and show the total number of possibilities of the 4
strike, hit and draw in a neat diagram.
b Discuss the role of Monte Carlo Control and identify the steps CO U 3
. involved in the Monte Carlo ES algorithm. 4
COURSE OUTCOMES
CO
Understand the basics of Reinforcement learning
1
CO
Formalize problems as Markov Decision Processes
2
CO
Analyze the utility of dynamic programming for industrial applications and problems
3
CO
Apply Monte Carlo reinforcement learning algorithms
4
CO
Implement policy gradient methods and linear methods for function approximation
5
CO
6 Recognize current advanced techniques and applications in RL
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. R 1
List the eras of RFID technology. 1
CO
2. R 1
Expand CRC and RTD. 2
CO
3. R 1
Identify the various addressing privacy in RFID. 3
CO
4. R 1
State the possible counter measures involved in zone 3. 4
CO
5. R 1
Enumerate the common uses of RFID at airports. 4
CO
6. R 1
Classify the various types of contactless smart cards. 5
CO
7. R 1
Name the operating frequency of closed coupling smart card. 5
CO
8. R 1
List the categories of NFC. 5
CO
9. R 1
State the benefits of contactless smart card. 6
CO
10. R 1
Identify the application areas of animal identification. 6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. Define singulation. R 3
1
CO
12. Briefly describe antenna gain. U 3
2
CO
13. Identify the terminologies and shift keying of RFID technology. U 3
3
CO
14. Trace the security zones of RFID. U 3
4
CO
15. Relate an open payment system with a real time examples. A 3
5
CO
16. Define bolus. U 3
6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Explain in detail about the types of RFID tags with suitable CO U 12
diagram. 1
18. a. CO U 6
Illustrate the tags classified by its physical factor.
2
b. CO U 6
Differentiate the tags classified by its programming method.
2
20. a. An oil and gas firm that operates in a difficult and remote CO An 12
region is thinking about implementing RFID technology to 4
improve its operations. They have a particular interest in
RFID technology for maintenance, staff safety, and asset
tracking. Employ integrating RFID technology to promote
employee safety, improve asset monitoring, and streamline
maintenance procedures given the special obstacles faced by
the oil and natural gas business, particularly in remote and
dangerous locations. Construct the various difficulties and
dangers associated with using RFID in this situation and
provide ideas for reducing these issues while preserving the
greatest levels of efficiency, safety, and adherence to legal
requirements.
COURSE OUTCOMES
CO1 Understand the architecture of RFID, types of readers and tags and their protocols.
CO2 Interface RFID based systems with smart antennas and various levels of frequencies.
CO3 Apply the appropriate RFID configuration for effective communication.
CO4 Analyze the security and privacy issues, standards of RFID technologies.
CO5 Compare the influence of RFID technologies in different case studies.
CO6 Design and deploy RFID based real time Industrial Applications.
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List some of the tasks that can be performed by RPA bots. CO1 R 1
2. Identify OCR features used in RPA platforms. CO1 R 1
3. Enumerate the steps in 5S. CO2 R 1
4. List the factors to keep in mind when applying Lean and Six Sigma to RPA. CO2 R 1
5. Define Proof of Concept. CO3 R 1
6. State the skillsets required for RPA supervisor. CO3 R 1
Name the function responsible for displaying the initial screen to design the
7. CO4 R 1
bot when getting started.
8. Name the software that assists users in bot management. CO4 R 1
Identify the box testing that functions as a blend of the black-and-white box
9. CO5 R 1
testing approaches.
List any two of the actions in data preparation that improve the quality of the
10. CO6 R 1
data.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Represent the architectural flow of Robotic Desk Automation using
11. CO1 U 3
flowchart.
12. Enumerate the ways in Lean to reduce and eliminate wastes. CO2 R 3
13. Describe the steps in the automation CoE. CO3 U 3
14. Explain “for each” loop, accompanied by an illustrative example. CO4 U 3
15. Discuss briefly the concept of “learning by osmosis”. CO5 U 3
16. Discuss Intellibot and how the technology is of use in RPA. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Predict the solution for the case study “A leading manufacturer was CO1 U 6
struggling to process hundreds of invoices from multiple vendors each
month. The format of these scanned/digital invoices significantly varied
among the vendors; more than four full-time employees were manually
transcribing data from these invoices into SAP, which considerably
delayed the processing. The end-to-end process was further delayed due
to several hierarchical approvals.”
b. Explain the Flavors of RPA. CO1 U 6
18. a. Observe the scenario and apply the suitable mechanism to maintain the CO2 R 6
profit “Paymentshield is one of the UK’s leading distributors and
administrators of insurance. But after 20 years of success, the leadership
team saw an opportunity to improve their already stellar customer
service. They challenged the Operational Excellence Coordinator,
Diane Leatherbarrow, to make a 10% improvement for their Customer
Services department. The result? Four areas that resulted in an average
of a 69% improvement!”
b. Explain the steps to apply Lean and Six sigma to RPA CO2 U 6
19. a. Examine the below scenario and help them to standardize using Centre CO3 A 6
of Excellence “A global pharmaceutical company with sites worldwide
had a requirement to standardize their Manufacturing Execution
Systems (MES) across four sites.”
b. Explain in detail about vendor evaluation. CO3 U 6
20. a. Predict your work for a large retail company that wants to implement CO3 A 6
RPA to streamline its order processing system. The organization
receives a high volume of online orders daily. Accuracy, efficiency, and
scalability are critical factors in this process. Examine how RPA would
solve the addresses that are specific to its needs, and interpret the steps
needed to ensure a successful implementation.
b. Discuss an overview of the structure or framework typically employed CO3 U 6
in change management.
21. a. Summarize on Uipath orchestrator and outline the best practices for CO4 U 6
developing bots.
b. Explain the four installation choices available for uipath. CO4 U 6
22. Interpret your work as a project manager responsible for deploying an CO5 A 12
RPA solution in a healthcare organization. The RPA bot's task is to
process insurance claims, verify patient eligibility, and submit claims to
the appropriate insurance providers. As the project enters the
deployment and monitoring phase, you are tasked with ensuring a
successful rollout.
Question:
Articulate the steps you would take to deploy and monitor the RPA bot
in the healthcare organization's claims processing workflow. Provide a
detailed plan and discuss the key performance indicators (KPIs) you
would track to measure the success of the automation. Additionally,
explain how you would handle issues and errors that may arise during
the deployment and monitoring process.
23. a. Explain in detail the issues faced in handling big data and the data CO5 U 12
process that is involved in delivering the solution.
COMPULSORY QUESTION
24. a. Articulate on implementing a Pega Robotic Process Automation (RPA) CO6 A 6
solution for a customer service department. The goal is to automate the
process of handling customer inquiries through email. Explain the key
components of a Pega RPA bot, and how they contribute to the
successful automation of this customer service task.
b. Apply the Nintex RPA solution for a logistics company to streamline CO6 A 6
their order processing. Describe the key features and benefits of Nintex
RPA in this logistics scenario, and explain how they contribute to
increased efficiency and accuracy in order processing.
COURSE OUTCOMES
CO1 articulate the history of RPA technology, benefits, drawbacks, and comparisons to other
automation technologies
CO2 examine the implementation of RPA and ensure its processes are in good shape
CO3 choose the right RPA software by considering its costs, training, functionality, and security
CO4 create a bot to develop the UiPath and establish the workflow structures
CO5 evaluate the bots and ensure its functionality through scaling and optimization
CO6 review the large and small RPA software developers and vendors
Q.
B
No Questions CO M
L
.
PART – A (10 X 1 = 10 MARKS)
18 a Explain the kinematics and drive the equation for forward CO2 A 12
. . kinematics and inverse kinematics. n
22 a Identify the type of locomotion used for the following scenario CO5 A 8
. . and justify the answer. “A developer needs to design the robot n
for detecting land mines, Robot will be used in different terrain,
Developer should select a locomotion method which will be
used effectively”
b Classify the types of actuators. CO4 U 4
.
COURSE OUTCOMES
CO1 Perform kinematic and dynamic analyses with simulation
CO2 Design control laws for a robot.
CO3 Integrate mechanical and electrical hardware for a real prototype of robotic device.
CO4 Select a robotic system for given application.
CO5 describe the different physical forms of robot architectures.
CO6 develop simple robot control systems integrating perception, planning, and action
Q.
N Questions CO BL M
o.
PART – A (10 X 1 = 10 MARKS)
1. Illustrate the user requirement expressed in extreme programming CO R 1
model. 1
2. List any two agile process models. CO R 1
1
3. Indicate an abstract class in a UML class diagram with an example. CO U 1
3
4. List the components to draw a sequence diagram in Star UML. CO U 1
3
5. Identify any two architectural designs that will be used to design CO R 1
the software. 4
6. Name the software testing tool that is used for automated testing. CO R 1
5
7. Identify the software configuration management paradigm that CO U 1
allows us to regulate change without severely limiting legitimate 6
change.
8. List the number of clauses used in ISO 9001 to specify quality CO R 1
system requirements. 6
9. Write the formula for cost estimation of a software project as per CO R 1
the basic COCOMO model. 6
10 Name two project management approaches that are utilized to keep CO R 1
. all tasks on schedule. 6
PART – B (6 X 3 = 18 MARKS)
11 Describe about various phases of the unified process. CO R 3
. 1
12 List the functional and non-functional requirements of the CO An 3
. following web application. Ex: https://www.flipkart.com 2
13 Discuss any three design concepts used in software development. CO R 3
. 3
14 Differentiate error and defect of a software product. CO U 3
. 4
15 State the core steps of six sigma methodology in software R CO 3
. engineering. 5
16 Describe the version control technique in Software Configuration R CO 3
. Management. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a. Consider “Designing an IVRS (Interactive Voice Response CO An 12
. System) for fine collection by the police presents a 1
multifaceted problem statement. The system must efficiently
handle various tasks, including fine inquiries, payment
processing, and receipt issuance, while ensuring user-
friendliness and compliance with legal regulations. Challenges
encompass ensuring secure payment transactions, integrating
with existing police databases for fine verification,
accommodating diverse payment methods, and providing
multilingual support to cater to a wide range of users”.
a. Suggest a process model for the above scenario and the
reasons for choosing that model.
b. Explain the design process of the above system using the
suggested process model.
COURSE OUTCOMES
Discover an effective software engineering process to develop software-intensive
CO1
systems.
CO2 Translate the requirements specification into an implementable design.
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies.
CO6 Develop the software system with quality measures.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Name the dependency used to create view binding template in spring CO
R 1
1. application. 2
Identify the required spring annotation to process the HTTP delete CO
R 1
2. request. 1
CO
Discover the use of the RepresentationModel class in HATEOAS. U 1
3. 1
CO
Label the annotation used for creating controller class with REST API. R 1
4. 3
Express the reactive data type for the stream that can emit 0 or 1 data CO
U 1
5. item. 4
CO
List the four building blocks of reactive programming. R 1
6. 4
7. State the library name that controls the interaction between CO
R 1
microservices to provide latency and fault tolerance. 2
8. Identify the name of the secret management tool for keeping CO
R 1
configuration properties secure. 6
CO
Define the use of ‘/health’ in spring application devleopment. U 1
9. 6
10 CO
State the expansion of DAO in spring framework. R 1
. 4
PART – B (6 X 3 = 18 MARKS)
11 Indicate the appropriate controller class code to read the value from CO U 3
. HTML form given below and display the same. 3
<form action= “/save” method=”post”>
<input type=“text” name=“data”>
<input type=“submit” value=“save”>
</form>
12 CO
Describe any three additional components of spring integration. R 3
. 4
13 Illustrate filter() and map() methods of Flux reactive data type with CO
U 3
. suitable program. 5
14 CO
Describe about encrypting properties in Git. R 3
. 6
15 List any five Actuator end points to monitor the running spring CO
R 3
. application. 1
16 Discuss any three methods of JdbcTemplate for interacting with CO
U 3
. database. 2
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Illustrate simple spring MVC application to demonstrate the CO U 6
. . following components. 1
Model
Controller
View
b Discuss the spring security mechanism for authentication and CO U 6
. authorization using In-memory user store. 4
22 a Develop spring integration flow program for polling all the files CO A 6
. . from the directory “D:/songs” to another directory called 4
“E:/documents”.
b Illustrate the creating microservices and consuming microservices CO U 6
. with suitable example programs. 2
COURSE OUTCOMES
CO identify the variety of ancillary members of the spring ecosystem
1
CO describe the usage of dependency Injection, microservices in Spring framework
2
CO translate the user requirements into enterprise quality web application using Spring MVC
3
CO extend the requirements such as security, AOP, transaction to the Spring applications
4
CO practice to build RESTful services to the application
5
CO prepare and manage configurations for cloud based application.
6
Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
CO U 1
1. Write a Linux command to count the number of lines in file. 1
CO R 1
2. List the types of interfaces in YAST. 1
CO R 1
3. Mention the configuration file of SSH Server. 2
Give a Linux command to connect to server2 from server1 using CO U 1
4. vncviewer. 2
State the Linux command to view all the process in process CO R 1
5. management. 3
CO R 1
6. List the two basic classes of ACLs in Linux security. 3
7. Recall the RPM utility that handles installation and CO R 1
uninstallation of RPM packages. 4
Mention the syntax for Bridge configuration in Network CO R 1
8. Management. 4
CO R 1
9. Mention the tools to configure MBR and GPT. 5
10 Give the Linux command to check the status of chronyd service CO U 1
. in Linux administration and monitoring. 6
PART – B (6 X 3 = 18 MARKS)
11 List the 7 different types of files in linux. CO R 3
. 1
12 Cite the Linux command to generate an encrypted to be used for CO U 3
. GRUB. 2
13 State the Linux command to create a directory named Private CO U 3
. and change the permissions on created directory so that only 3
root has read, write, and execute permissions.
14 Define Software Repository in software management. CO R 3
. 4
15 State the Linux command to create an extended partition and CO U 3
. create a logical partition within the free space in the extended 5
partition.
16 Describe the meaning of the below Linux commands. CO U 3
. ‒ tail -n X 6
‒ tail -f
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17 a Differentiate sockets and pipes from Linux file types and CO R 6
. . visualize the diagrammatic representation of Linux file 1
System Structure.
b Outline SSH v2 Connection Process using appropriate CO R 6
. figure. 1
COURSE OUTCOMES
CO1 Identify the application of Linux commands and Linux flavours
CO2 Use remote administration and secure system bootup process
CO3 Managing Process, Identity and Security
CO4 Managing Software packages
CO5 Create and Manage storage devices
CO6 Create policies to monitor and perform installation
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Define compiler. CO1 R 1
2. Differentiate between macro definition and macro expansion. CO1 U 1
3. State the definition of the term lexemes. CO2 R 1
4. List the functions of lexical analysis. CO2 R 1
5. Sketch the parse tree for the production F E a + T. CO3 A 1
6. State a conflict which is possible in a shift-reduce parser. CO3 R 1
7. Differentiate S-attributed definition from L-attributed definition. CO4 U 1
8. Define synthesized attributes. CO4 R 1
9. Rewrite the following three-address code in static single-assignment form: CO5 U 1
a=b+c
a=a+d
10. Identify a possible optimization for computing x2. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Describe the role of an Assembler. CO1 R 3
12. Write short notes on Input Buffering. CO3 A 3
13. Describe the panic mode error recovery method used in the syntax analysis CO3 R 3
phase.
14. Sketch a parse tree with actions embedded for the expression 3 + 8 * 4 using the CO4 A 3
syntax-directed translation:
E { print(‘+’); } E 1 + T
E T
T { print(‘*’); } T 1 * F
T F
F digit { print(digit.lexval); }
15. Translate the following code snippet to three address code: CO5 U 3
do i = i + 1; while (a[i] < v);
16. Give an example of dead-code elimination to optimize a code. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the basic functions of Linker and Loader. CO1 U 6
b. Explain the role of the Bootstrap loader with the algorithm. CO2 U 6
18. Illustrate the various phases of a compiler. Trace the output of each phase CO3 A 12
for the program segment a: = b + c * 60. Assume that the identifiers a, b,
and c are of type float.
19. Construct an SLR Parsing table for the following grammar: CO6 A 12
EE+T|T
TTF|F
FF*|a|b
20. a. Summarize with relevant examples the bottom-up evaluation of the S- CO5 U 6
attributed definition for evaluating an arithmetic expression.
b. Explain the working principle of a simple type checker. CO5 U 6
22. Construct a predictive parsing table for the following grammar. Verify CO5 A 12
whether the input string ( id + id ) * id is accepted or not.
E TE’
E’ + T E | €
T F T’
T’ * F T’ | €
F ( E ) | id
23. a. Write a YACC program for evaluating a Boolean expression, which is CO4 A 6
represented by the following grammar.
E T | T or E
T F | F and T
F true | false | not F | (E)
b. Construct the semantic rules to generate three-address code for Booleans CO5 A 6
represented by the following grammar:
B B||B
B B && B
B !B
B E relop E
B true
B false
COMPULSORY QUESTION
24. a. Describe the issues in code generation. CO6 R 6
b. Illustrate the following ways for code optimization: CO6 A 6
● Copy propagation
● Common subexpression elimination
● Constant folding
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Explain the algorithm and data structures for the assembler
CO2 Develop algorithms for macros and loaders
CO3 List and define various stages of the compiler.
CO4 Select and use standard tools and techniques in different stages of compiler design
CO5 Compare and contrast various methods for implementing the phases of a compiler
CO6 Design and construct different phases of the compiler
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate an acceptor and a transducer. CO1 U 1
2. Name the machine that accepts Context Free Language. CO1 R 1
State whether the following statement is true or false:
3. “A DFA can have several accepting states.” CO2 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Show that the following grammar accepts the language and regular
expression representing the strings.
S → Aab CO1 U 3
A → Aab | a
12. Construct DFA for the language L = { ab3wb2 : w ɛ {a, b}*} CO2 A 3
13. Show that the following grammar is ambiguous.
S → SS | aSb | bSa | λ CO2 U 3
14. Convert the given context-free grammar into pushdown automata. CO3 U 3
S → aSbb | aab
15. Show that the family of recursive languages is closed under union. CO4 U 3
16. Define Universal Turing Machine. CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Construct Non-Deterministic Finite Automata using Thompson’s CO2 A 6
construction for the regular expression (pq)*p(p|q).
b. Develop a Deterministic Finite Automata equivalent to the given Non- CO2 A 6
Deterministic Finite Automata.
18. a. Convert the given finite automata to its equivalent regular expression. CO2 U 6
19. a. Determine the right quotient for the languages listed below. CO2 A 6
L1=L(a*baa*)
L2=L(ab*)
b. Apply the pumping lemma to determine whether the language is CO2 A 6
regular.
L1 =(anbn:n≥1}
20. a. Convert the grammar G = ({S, A, B, C}, {a, b}, S, P) with P defined CO3 U 6
given as
S → ABC | BaB
A → aA | BaC | aaa
B → bBb | A | D
C → CA | AC
D→λ
into Chomsky and Greibach Normal Forms.
b. Apply the CYK algorithm and find whether “cbba“ is a member of the CO3 A 6
language represented by the grammar:
S → AB
A → CC | a | c
B → BC | b
C → CB | BA | c
COURSE OUTCOMES
CO1 understand the concept of languages, basics of grammars and the hierarchy of languages
CO2 construct and compare deterministic and non-deterministic finite automata
CO3 develop push down automata from a given context free language or context free grammar
CO4 recognize context sensitive grammars
CO5 design turing machine for recursively enumerable language
CO6 compare computability & non-computability and decidability & un-decidability
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Give an example HTML code to create a hyperlink in a webpage. U 1
2
Identify the CSS property to adjust the space between the border and CO
2. R 1
the content of HTML elements. 6
Identify the JavaScript event triggered when the HTML button is CO
3. R 1
pressed. 1
CO
4. State the jQuery effect to switch between fade-in and fade-out. R 1
1
Express the syntax to create a JSON object with name, age, and CO
5. U 1
designation. 1
CO
6. State the function to convert JSON string to a JavaScript object. R 1
1
CO
7. Differentiate between $pristine and $dirty in AngularJS. U 1
5
Describe the AngularJS code to display the value of num inside the
CO
8. following <DIV> element. U 1
5
<div ng-init = 'num=10'></div>
CO
9. Recall the module used to create server function in NodeJS program. R 1
3
10 State the shell method used to create data collection in MongoDB CO
R 1
. Server. 4
PART – B (6 X 3 = 18 MARKS)
11 CO
Describe any three HTML multimedia elements with their syntax. U 3
. 2
12 Write a CSS code to change the background color and text color of the CO
A 3
. <DIV> element when the user moves the cursor over that division. 6
13 Illustrate the three types of JavaScript popup boxes with suitable CO
U 3
. examples. 1
14 CO
Describe the various JSON data types with examples. U 3
. 1
15 Write the appropriate AngularJS filter code to display the following CO A 3
values in a HTML view.
. 5
a) Date: 12/04/2023 b) Price: ₹1,000 c) Name: ALICE
16 Write a NodeJS code snippet to read and display the text file contents CO
A 3
. in a terminal. 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Develop the following HTML form layout with necessary CO A 1
. . attributes. 2 2
Make all fields as mandatory
Include necessary placeholders
Age field should be in the range of 18-25
Mobile number should be in 10-digits
b CO U 6
. Explain any six CSS selectors with suitable program illustrations. 6
COURSE OUTCOMES
CO identify the relevant properties and methods to facilitate dynamic web application development.
1
CO explain the development of fully functional web applications that incorporates front-end and back-
2 end design technologies
CO apply client and server side technologies for creating interactive data driven websites.
3
CO model dynamic web applications using suitable server-side technologies integrated with the
4 database.
CO develop extensible web applications using the Model View Controller (MVC) framework.
5
CO apply web development framework for designing attractive web pages along with dynamic and
6 flexible schema
Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall the use of <!DOCTYPE html> tag. CO1 R 1
2. Identify the HTML tag used for rendering the text in italics. CO1 R 1
3. Label the term HTTP. CO2 R 1
4. Indicate any one example of a static web application. CO2 U 1
5. Define padding in CSS. CO3 R 1
6. Name the hexadecimal code for the color yellow in CSS. CO3 R 1
7. Recall the developers of Bootstrap. CO4 R 1
8. Label the term XSS. CO5 R 1
9. Define cookies. CO6 R 1
Indicate the well-known server-side scripting language used for
10. CO6 U 1
web development.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. State the uses of <p>, <h>, and <li> tags in HTML. CO1 R 3
12. Indicate the three headers of the HTTP request. CO2 U 3
13. Differentiate the linear and radial gradient in CSS. CO3 U 3
14. Explain the four classes of the bootstrap grid system. CO4 U 3
15. Discuss the use of JavaScript events with an example. CO5 U 3
16. Represent the uses of functions in PHP with an example. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
a Write an HTML code to showcase a table listing six CO1 A 6
17.
. vegetables and their benefits.
Write an HTML code titled "WEBSITES" with the header CO1 A 6
"Clickable Links". Include three clickable links that open in
b new tabs:
. i. "NASA Website"
ii. "Eduserve Website"
iii. "ChatGPT Website"
19. a Write an HTML code that displays formulas for calculating CO3 A 8
. the volume of the cube, volume of the cylinder, perimeter of a
rectangle, and surface area of the square, along with the CSS
styling to enhance text clarity and readability.
b Illustrate the four components of the box model in CSS with CO3 U 4
. examples.
22. a Illustrate the decision and control flow statements in PHP CO6 U 7
. with examples.
b Summarize the form validation, and handling in PHP with an CO6 U 5
. example.
COURSE OUTCOMES
CO1 Select appropriate design standards for designing attractive web pages.
CO2 Identify latest client and server-side technologies for creating interactive data driven websites.
CO3 apply properties and methods to facilitate dynamic application development
CO4 create fully functional web applications that incorporates planning, designing, coding, testing,
and publishing to a web server.
CO5 formulate the requirements for web page design
CO6 build extensible responsive featured web applications
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define variable. CO1 R 1
2. State the use of read.csv(). CO1 R 1
Identify the output of the following R code snippet. CO2 U 1
3.
near(1 / 49 * 49, 1)
Predict the output of the following R code snippet. CO2 U 1
4.
y <- seq(1, 10, length.out = 4)
5. Define recursion. CO3 R 1
6. List any two limitations of using pipe. CO3 R 1
7. Differentiate between atomic vector and list. CO4 U 1
State the output of the following R code snippet. CO4 R 1
models<-tibble(
8. a1=runif(4,30,40),
a2=runif(4,40,50)
)
9. List the usage of flexdashboard. CO5 R 1
Identify an example of data visualization in a Course Metrics CO6 U 1
10.
Dashboard created using Tableau.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List any three advantages of data visualization. CO1 R 3
Predict the output of the following R code snippet. CO2 U 3
NA + 10
12.
NA > 5
10 == NA
Identify the output of the following R code snippet. CO3 U 3
print(seq(22,32))
13.
print(mean(25:56))
print(sum(1:5))
Identify the output of the following R code snippet. CO4 U 3
v1<-c(1,2,3)
v2<-c(2,1,2)
14.
map2_dbl(v1,v2,min)
map2_dbl(v1,v2,max)
map2_dbl(v1,v2,mean)
15. Differentiate between axes and legends in graphics of R CO5 U 3
programming.
Compare and contrast traditional spreadsheet based data CO6 U 3
16. reporting with Tableau's data visualization approach in terms
of data interpretation.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Write the R code for the following plots using the CO1 A 6
dataset given below.
Book_no Book_Name No_Of_Copies
1 R Program 10
2 Web Technology 12
3 Strength of Materials 8
4 CAD 10
5 Thermodynamics 25
6 Heat Transfer 30
7 Machine Design 25
8 Engineering Metallurgy 21
9 Numerical Analysis 28
10 Automotive Systems 30
a).
b).
21. a. Write the R code for the following plots using the CO5 A 6
dataset given below.
x y
10 14.2
10 17.511
20 18.989
20 20.24
30 18.356
30 20.51
40 22.43
40 31.89
50 29.13
50 21.74
a).
b).
b. Explain the legend layout of graphics for CO5 U 6
communication with an example.
COURSE OUTCOMES
CO1 apply the principles of data Wrangling to transform the datasets into a form convenient
for analysis.
CO2 demonstrate powerful R tools for solving data problems with greater clarity and ease.
CO3 perform data exploration, generate hypotheses, and quickly test them.
CO4 provide a low-dimensional summary that captures true signals in your dataset.
CO5 develop visualizations to communicate results using R Markdown.
CO6 communicate the data analytics summary using tableau dashboards.
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Give an example for irrecoverable problem. CO U 1
1
2. Identify the component through which the agent can perceive through CO R 1
the environment. 1
3. CO R 1
Informed search is also known as _____________ 2
4. CO R 1
Recall the structure of AI agent. 2
5. Analyze the given sentence into wff’s in predicate logic. CO A 1
Some children like to play 3
6. Describe any two problems of indexing. CO R 1
3
7. Solve the given fact into predicate logic. CO A 1
All Pompeians died when the volcano erupted in 78 A.D. 4
8. Give the time complexity of Breadth First Search if b represents CO U 1
branching factor and d represents the depth of shallowest goal state. 4
9. CO U 1
Enumerate default logic in non-monotonic reasoning 5
10 Apply conceptual dependency to represent the given statement. CO U 1
. John pushed the cart. 6
PART – B (6 X 3 = 18 MARKS)
11 Write a short note on application of AI in computer vision. CO
. 1 U 3
12 Differentiate informed and uninformed search strategies. CO
. 2 U 3
13 Briefly describe the simple relational knowledge representation CO
. technique. 3 R 3
14 CO
. Describe the types of uncertainties in knowledge representation. 4 R 3
15 Construct the frame for the knowledge “Artificial Intelligence”. CO
. 5 U 3
16 CO
. Describe learning by parameter adjustment in learning process. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the following Agents. CO U 6
. . Simple Reflex Agents 1
Model-Based Reflex Agents
Goal-Based Agent
Learning Agent
b Describe the steps performed by a problem-solving agent with CO R 6
. examples. 1
21 a Consider the following block world problem and apply goal stack CO A 6
. . planning to reach the goal state from initial state. 5
b Discuss the importance of the Bayesian network in handling CO U 6
. uncertainty in the system. 4
COURSE OUTCOMES
CO describe the basics of Artificial Intelligence.
1
CO identify the appropriate search algorithms for any AI problem
2
CO prepare appropriate knowledge-based rules to identify causal relationships and conditional
3 independence of a real-world situation.
CO select the appropriate search method for identifying different search spaces.
4
CO evaluate the working knowledge of reasoning in the presence of incomplete and/or uncertain
5 information.
CO produce the learning theory for expert systems
6
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
List a few games which do not have any strategy and are CO
1. U 1
purely reactive. 1
CO
2. R 1
Define Artificial Intelligence. 1
CO
3. R 1
State the usage of angular velocity. 2
CO
4. U 1
Differentiate between pursue and evade steering behaviors. 2
Identify the significance of the connections in the movement CO
5. U 1
planning graph. 3
CO
6. R 1
Define the heuristic function used in the A* algorithm 3
Express the meaning of the term insistence in goal-oriented CO
7. U 1
behavior. 4
Define the terms ‘State’ and ‘Reward’ in reinforcement CO
8. R 1
learning 4
Give an example of a zero-sum game. CO
9. U 1
5
Identify the key AI requirements for real-time strategy games. CO
10. U 1
6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Indicate the speed and memory constraints faced by AI game CO
11. U 3
developers. 1
CO
12. Define the jumping points in the movement algorithms. U 3
2
CO
13. Show the velocity diagram for the allowed animations. R 3
3
List the two main components in the structure of the rule- CO
14. U 3
based system. 4
CO
15. Express the concept of the transposition table in board games. U 3
5
Show the finite state machine for a simple sheep-like creature CO
16. R 3
in flocking and herding games. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
CO U 8
17. a. Discuss the structure of the AI Engine in detail.
1
State the benefit of AI in Games. How AI is used in CO R 4
b.
Games? 1
18. Define kinematic movements. Explain the kinematic CO U 12
movement algorithms with appropriate pseudocode for 2
the following movements in games:
a) Seek b)Flee c) Arrive d) Wander
19. a. Apply Dijkstra’s algorithm to the following directed CO A 6
weighted graph and find the shortest path between A 3
and F. Provide all the intermediate steps to arrive at the
solution.
COURSE OUTCOMES
CO1 Recognize the importance of artificial intelligence in games.
CO2 Identify the different steering behaviors in movement of characters.
CO3 Choose the path finding techniques for designing games.
CO4 Illustrate decision making method for games.
CO5 Design the strategies for the games using game theory.
CO6 Select the appropriate design for artificial intelligence games genre.
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Human Centered Reinforcement Learning. CO1 R 1
2. Define CI/CD in MLOps. CO1 R 1
3. Describe Version Control. CO2 U 1
4. List the MLOps tools for solving the business problem. CO2 R 1
5. Define precision. CO3 R 1
6. Name one deployment target for ML models. CO3 R 1
7. Identify the main purpose of Continuous Integration (CI) in MLOps. CO4 R 1
8. Describe on pipeline execution trigger. CO4 U 1
9. Define "model testing". CO5 R 1
10. Name two modes for serving machine learning models. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Summarize Federated Learning. CO1 U 3
12. Describe label encoding method in data preprocessing. CO2 R 3
Describe the significance of serialization in machine learning model
13. CO3 R 3
packaging.
Compare and contrast Continuous Delivery (CD) and Continuous
14. Deployment (CD) in terms of their level of automation and human CO4 E 3
intervention.
15. Explain the significance of "poisoning attacks", CO5 U 3
Define data drift and feature drift in the context of machine learning model
16. CO6 R 3
monitoring.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Apply MLOps principles to establish an automated process for the
continuous retraining and updating of the personalized
17. a. recommendation model for an e-commerce website. Develop a CO1 A 8
detailed, step-by-step approach that covers data management, model
training, deployment, and monitoring with an illustrative diagram.
Explain the advantages of using MLOps for ML solution development
b. CO1 U 4
process.
18. a. Compare waterfall model and agile model in software development. CO1 E 8
b. Identify the types of Statistical Models of Machine Learning. CO1 U 4
COURSE OUTCOMES
CO1 Understand the concept, workflow, and structure of MLOps
CO2 Operationalize ML models for pipeline deployment and for external business systems that are more complex and less
standardized.
CO3 Design an ML production system end-to-end: project scoping, data needs, modeling strategies, and deployment
requirements.
CO4 Establish a model baseline, address concept drift, and prototype how to develop, deploy, and continuously improve a
productionized ML application.
CO5 Build data pipelines by gathering, cleaning, and validating datasets. Establish data lifecycle by using data lineage and
provenance metadata tools.
CO6 Apply best practices and progressive delivery techniques to maintain and monitor a continuously operating production
system
Assessment Pattern as per Bloom’s Taxonomy
CO / BL R U A An E C Total
CO1 2 11 8 8 29
CO2 8 1 8 17
CO3 5 10 6 8 29
CO4 1 7 6 3 17
CO5 1 7 8 16
CO6 4 6 6 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
B
No Questions CO M
L
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. R 1
Define Discriminant Function. 1
CO
2. Define hierarchical clustering. R 1
1
CO
3. 1
Differentiate between classification and regression tasks. 1 U
CO
4. Differentiate between supervised and unsupervised learning. U 1
1
CO
5. R 1
Define Formal Grammar. 2
CO
6. R 1
Define dimensionality reduction. 1
Represent the language generated by the following CFG. CO
7. A 1
S → T U, T → 0T1 | ε, U → 1U0 | ε 2
CO
8. List the basic steps in automatic object recognition. R 1
4
CO
9. Differentiate between image processing and object recognition. U 1
4
CO
10. Define semi-supervised learning. R 1
1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. State and explain Bayes rule with suitable example. R 3
1
Discuss a procedure for graph-based clustering with a suitable CO
12. U 3
example. 1
Define stochastic grammar and give any two applications of CO
13. U 3
stochastic grammar. 2
Write the formal definition of context free grammar and illustrate
each component using an example. Develop the context free grammar CO
14. A 3
for the language L, where L contains all binary strings with an even 2
number of zeroes and an even number of ones.
Explain the role of mean shifting and mode finding methods in object CO
15. U 3
recognition. 4
16. Discuss various types of anomalies by giving suitable examples. CO R 3
5
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a Write pseudo-code for K-means algorithm. Discuss how to make CO A 8
. better approximations for K value and initial centroids. 3
b Examine the following flower dataset represented in a table. List CO A 4
. all the features. Identify the type of learning and explain the task 1
that can be performed on the dataset giving proper justification.
18. a CO A 5
. 1
22. a Explain how split and merge method can be used for object CO U 4
. detection with suitable example. 4
b Design an automatic face recognition system for the detection of CO A 8
. multiple classes of chairs from a given input image and explain 4 n
the step-by-step procedure for the object detection.
23. a Explain how one class SVM can be used for anomaly detection CO U 6
. with suitable example 6
b CO U 6
Discuss change detection and its role in the object detection.
. 6
COMPULSORY QUESTION
24. a Discuss how temporal convolutional networks can be used for CO U 6
. anomaly detection. 5
b Explain how auto encoders are used to detect anomalies in CO U 6
. general, 5
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the need and significance of mathematical fundamentals in pattern matching
to solve real-time problems.
CO2 Design pattern matching models to extract interesting patterns from structured data like
graph, syntactic description.
CO3 Develop prototype pattern matching algorithms that can be used to study algorithm
behavior and performance against real-world multivariate data.
CO4 Develop an algorithm to recognize the specified objects in the given image.
CO5 Understand the various anomaly detection techniques using deep learning
CO6 Apply anomaly detection algorithms to find patterns in real world data
Q.
B
N Questions CO M
L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Identify the type of theorem from the following diagram and CO U 10
. state its consequences with proof. 1
b List the applications of BFS and DFS in detail and suggest when CO U 10
. to use BFS and DFS. 3
(OR)
4. a Write short notes on the following Techniques. CO A 20
. i. Long Short-Term Memory. 4
ii. Time Series Forecasting
5. a CO A 20
Compare RNN, GRU and LSTM with examples.
. 5 n
(OR)
6. a Illustrate with suitable examples the different levels of NLP. CO A 10
. 5
b List and explain the challenges of Natural language Processing. CO A 10
. 5 n
(OR)
8. Discuss the evaluation metrics used to assess the performance of CO U 20
predictive models. Explain commonly used metrics such as 6
accuracy, precision, recall, F1 score, mean squared error (MSE),
and mean absolute error (MAE). Highlight situations when each
metric is appropriate and their interpretation.
COMPULSORY QUESTION
COURSE OUTCOMES
CO understand the existing machine learning techniques: it’s concepts, mathematical background,
1 applicability, limitations and toolkit used in industries
CO create AI/ML solutions for various societal problems
2
CO apply some state-of-the-art development frameworks and software libraries in machine learning task
3 realization
CO evaluate the performance of machine learning algorithms using suitable metrics.
4
CO compare the strengths and limitations of selected machine learning algorithms and where they can
5 be applied in different applications.
CO build and deploy production grade AI/ML applications
6
Q.
Questions CO BL M
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Explain the four basic steps that are taken in computer forensic CO1 U 10
investigation.
b. Illustrate the characteristics of Cyberterrorism. CO1 U 6
3. a. Assume that a cyber-criminal has used his android mobile device to create CO3 A 10
a deep fake videos/images and uploaded the content in a social media like
Facebook, twitter, etc. Illustrate the steps involved in Android Forensic
Setup and Pre-Data Extraction Techniques in order to examine the seized
mobile device.
b. Differentiate Screen lock bypassing techniques and rooting in android CO3 An 6
devices.
4. a. In general, forensic analysis deals with files on media, deleted files, files in CO4 A 10
folders, files in other files. The goal of media analysis is to identify, extract,
and analyze these files. You are asked to choose any one tool and report the
steps involved in media forensic analysis.
b. Discuss the investigative incident-response actions on any known cyber- CO4 U 6
crime.
5. a. Summarize the outsourcing process with explanation of the steps involved CO5 U 8
in non-disclosure agreement.
b. Appraise the following myths related to outsourcing security. CO5 An 8
i. Managed-security service-level agreements are the same
ii. Security-services-vendor credentials are not relevant
iii. Outsourcing security is a security problem
6. a. Apply the laws applicable in the “State of Tamil Nadu Vs Suhas Katti” CO6 A 10
case and the cyber laws invoked while giving the verdict.
b. Explain the legal aspects of Digital Forensics in India. CO6 An 6
7. a. Explain the methodology used in mobile forensic tool leveling system. CO4 U 10
b. Summarize the potential evidence that are stored on mobile phones. CO3 U 6
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a. A public institution was the victim of a hacker. The subject got into the CO4 An 10
network and placed several large media files on several computers and
changed the desktop configurations. Management decided against calling
law enforcement initially (because of media attention) and instructed the IT
department to get a cyber-forensic system to privately investigate. How did
the cyber forensics system go about conducting the investigation?
b. A man has been arrested by the Crime Branch of Mumbai Police for CO3 A 10
allegedly sending threatening text messages to Bollywood actress. The
accused sent four messages to the actress, threatening to kill her children if
she did not pay him, say sources. How to do mobile device forensics on this
case?
COURSE OUTCOMES
CO1 identify the effect of cybercrime in forensic computing
CO2 infer digital forensic evidences and investigate the contents
CO3 choose and apply current computer forensics tools.
CO4 analyze the nature of cyber terrorism and its effects
CO5 devise basic computer and network forensic analysis
CO6 summarize the technical and legal aspects related to cyber crime
Q.
B
N Questions CO M
L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Explain the different information security characteristics integrated CO U 1
. into the development of Smart Cities. Include key features related 1 0
to data protection, network security, privacy measures, and any
other aspects crucial for ensuring a secure and resilient information
environment in the context of Smart City development.
b Discuss about the contribution towards classification of CO U 6
. information in information security measures, and identify the 1
criteria and methodologies are commonly used to classify sensitive
data within an organization's information security framework.
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Discuss the potential benefits and drawbacks of using NLP for CO U 10
. machine translation. 1
b Design a spam filtering algorithm for email communication and CO C 10
. explain the key components. Consider the trade-offs between 1
accuracy and efficiency.
(OR)
2. a Compare and contrast the two different types of corpora used in CO U 10
. NLP. 1
b Evaluate the efficiency of morphological analysis using finite state CO E 10
. transducers in NLP applications. 1
5. a CO E 10
Critique the effectiveness of n-gram models over sparse data.
. 3
b Design an experiment using Pearson’s chi-square test to analyze CO C 10
. collocations in a large corpus. 3
(OR)
6. a Develop a comprehensive plan for implementing a supervised word CO A 10
. sense disambiguation system. Include the steps for training, feature 4
selection, and performance evaluation methods.
b Apply a Hidden Markov Model to a given corpus text for POS CO A 10
. tagging. 4
COURSE OUTCOMES
CO1 Apply the principles and Processes of Human Languages such as English and other Indian
Languages using computers.
CO2 Realize semantics and pragmatics of the English language for text processing
CO3 Check a current method for statistical approaches to machine translation.
CO4 Perform POS tagging for a given natural language and select a suitable language modelling
technique based on the structure of the language.
CO5 Demonstrate the state-of-the-art algorithms and techniques for text-based processing of natural
language for morphology.
CO6 Develop Statistical Methods for Real World Applications and explore deep learning-based NLP
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. State associative law. R 1
1
CO
2. Convert binary number 11011110 into gray code. U 1
2
Identify the combinational circuit that converts binary CO
3. U 1
information from 2n input lines to an ‘n’ output line. 3
CO
4. Define data distributor. R 1
3
CO
5. Infer the characteristic table of T flip-flop. An 1
4
CO
6. Sketch the graphic symbol of JK flip flop. A 1
4
Determine the number of flip flops required to design 3-bit CO
7. A 1
synchronous up-counter. 4
CO
8. Identify the basic building block of a Sequential circuit. R 1
4
Interpret the primary model recommended for designing CO
9. U 1
synchronous systems. 5
CO
10. Develop the Verilog code for 2 x 4 Decoder. A 1
6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. Write the truth table of EX-OR and NAND gate. A 3
1
Illustrate the logical expression for a Half adder using K- CO
12. A 3
map. 2
CO
13. Define set-up time and Propagation delay. R 3
3
CO
14. List the applications of shift register. R 3
4
Differentiate synchronous and asynchronous sequential CO
15. U 3
circuits. 6
Categorize the types of Verilog modelling with suitable CO
16. An 3
examples. 5
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Solve the following Boolean expression using K-Map
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO U 1
Identify the address bus size of 8086 microprocessor. 1
2. Recall the processor that supports pipelined architecture is CO R 1
____________. 1
3. Examine the mode of 8086 if the pin MN/MX is connected to the CO R 1
ground (0v). 2
4. Recognize the addressing mode for the given instruction MOV AX, CO R 1
[2500H] in 8086. 2
5. Name the internal register that can be programmed to determine the CO U 1
functions of the ports of 8255 IC. 3
6. CO R 1
List the number of counters present in the 8254 IC. 3
7. CO U 1
Predict the port that doesn’t have any alternate function in 8051. 4
8. CO R 1
Examine the signal used to demultiplex address bus and data bus. 4
9. Interpret the number of rows and columns present in a 16 * 2 CO U 1
alphanumeric LCD. 5
10 RISC stands for ___________. CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO A 3
. Write the functions of the EU in 8086. 1 n
12 CO U 3
. Sketch the block diagram for a closely coupled configuration. 2
13 CO U 3
. Illustrate the control word format of 8255 PPI IC. 3
14 Write an Assembly language program to count the number of 1’s in a CO A 3
. byte ‘AA’ and store it in a register R5. 4 n
15 Summarize the importance of Interrupt and the different sources of CO A 3
. interrupts of 8051. 5 n
16 CO U 3
. List any three features of CISC architecture. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss the various addressing modes of 8086 microprocessor with CO R 1
. . an example. 1 0
b The Value of DS register is 3032H and BX register contains an CO A 2
. offset value of 3032H. Compute the 20-bit physical address of the 1
memory pointed by DS register.
19 Explain briefly the various modes of 8254 Timer IC with its timing CO A 1
. diagram. 3 2
COURSE OUTCOMES
CO
Write the assembly language coding using 8086 microprocessors.
1
CO
Apply interfacing techniques for various applications.
2
CO
Explain the concepts of 8051 and interfacing with 8051.
3
CO
Develop microprocessor and Microcontrollers based systems.
4
CO
Select the Microprocessor with proper specifications for various applications.
5
CO
6 Review the concepts of advanced microprocessors and microcontrollers.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 11 1 2 3 - - 17
CO2 11 5 - - - - 16
CO3 1 4 12 - - - 17
CO4 1 13 - 3 - - 17
CO5 - 15 12 13 - - 40
CO6 - 17 - - - - 17
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
Define flowchart.
1
2. CO R 1
Identify the use of header file. 1
3. Write the C statement to find whether the person is eligible for vote or CO A 1
not using conditional operator. 2
4. CO A 1
Write the syntax of “do - while” loop.
2
5. CO R 1
Name a string function which is used to join two strings.
3
6. CO R 1
How would you initialize an array while declaring it?
3
7. CO R 1
List the types of functions.
4
8. CO R 1
Define recursion. 4
9. CO R 1
How will you declare an array of char pointers?
5
10 CO R 1
Define structure.
. 6
PART – B (6 X 3 = 18 MARKS)
11 Construct the flowchart to input two numbers from the user and display CO A 3
. the largest among them. 1
12 Write the output of the following C code. CO A 3
. #include <stdio.h> 2
int main()
{
int a = 8, b = 2;
printf("a & b = %d ", a & b);
return 0;
}
13 Illustrate how the initialization of a 1D-array takes place during its CO U 3
. runtime by a C program. 3
14 Describe the need of C function. CO U 3
. 4
15 Predict the output of the following C code. CO U 3
. #include <stdio.h> 5
int main (){
int var;
int *ptr;
int **pptr;
var = 3000;
ptr = &var;
pptr = &ptr;
printf("Value of var = %d\n", var );
printf("Value available at *ptr = %d\n", *ptr );
printf("Value available at **pptr = %d\n", **pptr);
return 0;
}
16 CO U 3
. Differentiate between the array and structure. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Construct a C program that demonstrates the various format CO A 6
. . specifiers used in C language. 1
b CO A 6
Explain the structure of C program with an example.
. 1
COURSE OUTCOMES
CO understand the basics of computer programming concepts and write own programs
1
CO apply the operators and conditional statements to represent the real time programs
2
CO prepare solutions for the problem using array and strings
3
CO decompose a problem into functions and synthesize a complete program using divide and
4 conquer approach using functions
CO formulate algorithms and simple programs using arrays and pointers
5
CO create a new application to solve real world problems using structures and unions
6
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the Python function used to convert the string '123' to an CO R 1
integer. 1
2. Predict the output for the following program. CO U 1
print(19//2**3*2) 1
3. Infer the output for the following Python code. CO U 1
li = [2, 12, 22, 32, 42, 52, 62, 72] 2
print(li[-2])
4. Trace the output for the following program. CO U 1
Str = “Karunya” 2
print(Str*3)
5. CO R 1
Name the function used as a constructor of a class. 3
6. Interpret the type of inheritance from the following code. CO U 1
class A(): 3
pass
class B(A):
pass
class C(B):
pass
7. Infer the output of the following code snippet. CO U 1
4
import turtle
t=turtle.Pen()
for i in range(0,6):
t.forward(100)
t.left(60)
8. Name the function which retains the most important aspects of an CO R 1
image even after reducing its size. 4
9. Identify the property used to add horizontal padding between the CO U 1
boundaries of the widget and its cell boundaries. 5
10 CO R 1
. List two methods in socket module. 6
PART – B (6 X 3 = 18 MARKS)
11 CO U 3
. Discuss the characteristics of membership operator with an example. 1
12 Construct a Python code to create a dictionary where the keys are CO A 3
. numeric indices from 1 to 4, and the corresponding values are names 2
('Annet', 'Ukesh', 'Steffana', 'Judah'). Then, access the third key of the
dictionary and print it along with its corresponding name.
13 CO U 3
. Differentiate between serialization and deserialization. 3
14 Illustrate how to open an image ‘carimage1.png’ using PIL and store CO A 3
. that image in ‘Img_data.png’ using Python code. 4
15 Explain the grid and pack layout managers with its attributes in Tkinter CO U 3
. module of python. 5
16 CO A 3
. Write a Python code to create a thread. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain various control statements in python with suitable CO
. . examples. U 6
1
b For a given integer N, print all the squares of integer numbers from CO
R 6
. 1 to N. 1
19 a CO U 6
. . Illustrate the multilevel inheritance with suitable example program. 3
b Write Python code to overload ‘ + ’, ‘ – ’ and ‘ * ’ operators by CO A 6
. providing the methods __add__, __sub__ and __mul__. 3
20 a Express the representation of the Indian National Flag using CO U 6
. . Python's Turtle graphics. 4
COURSE OUTCOMES
CO Select the basic programming constructs of Python suitably.
1
CO Infer the concepts of string processing, Encryption, file I/O, lists and dictionary.
2
CO Apply modules for reusability and the object-oriented principles for modeling and developing
3 software system.
CO Experiment the power of graphics for processing images.
4
CO Construct applications with graphical user interface.
5
CO Develop software solutions using multi-threading, networking and client-server concepts.
6
Q. CO BL M
Questions
No.
PART – A (10 X 1 = 10 MARKS)
1. Identify the various sensors in smart phones. CO1 R 1
2. Define Non-Invasive Sensors. CO1 R 1
3. Recall different IoT based systems in Smart Buildings. CO2 R 1
4. State the primary purpose of the IEEE 802.15.4 standard. CO2 R 1
5. Define embedded computing and provide an example of an embedded system. CO3 R 1
6. Identify the specific interface on the Raspberry Pi that can be controlled or CO3 U 1
accessed using Python programming.
7. Define Attack-as-an administration (Aaas). CO4 R 1
8. List the approaches in Knowledge representation. CO4 R 1
9. Enumerate the role of machine learning in agriculture. CO5 R 1
10. List few problems in conventional medical systems. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Explain SANET. CO1 U 3
12. Explain the characteristics of Low Power and Lossy Networks (LLNs). CO2 U 3
13. Differentiate Microcontroller and Microprocessor. CO3 U 3
14. List security and privacy issues in IOT based systems. CO4 R 3
15. Illustrate about expert system. CO5 A 3
16. Discuss the security requirement of AI/IOT medical devices. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Examine a scenario: A leading smartphone manufacturer that has CO1 A 12
developed a new flagship smartphone model with advanced health and
fitness tracking capabilities. The company aims to leverage IoT technology
to empower users to monitor and improve their health and well-being using
their smartphones. Discuss the various sensors used for smart phone iot
application
19. Explain Physical, Mac layer, Topology and Security standard of IEEE CO2 U 12
802.11
20. a. Explain the components of the Arduino board with a neat diagram. CO3 U 6
b. Write an Arduino Sketch for blinking LED. CO3 A 6
22. Articulate a scenario where a 20-story office building located in a bustling CO4 A 12
urban area. The building owner is committed to implementing sustainable
and cost-effective practices while ensuring a comfortable and productive
work environment for tenants. Design an IoT-based smart building
management system using the various methods of design methodology.
23. Examine the role of AI and IOT based knowledge representation for the CO5 A 12
below case study:
Consider a hypothetical scenario involving a 65-year-old patient named
Sarah who has been diagnosed with congestive heart failure (CHF). Sarah's
healthcare provider has prescribed a remote monitoring system to track her
vital signs and symptoms on a daily basis, allowing for timely intervention
in case of any anomalies.
COMPULSORY QUESTION
24. a. Discuss the types of medical devices. CO6 U 6
b. Discuss the critical issues and challenges of internet of things in medical CO6 U 6
devices and systems.
COURSE OUTCOMES
CO1 Recognize the hardware and software components of IoT
CO2 Interpret technologies and protocols in IoT
CO3 Operate the tools in design and development
CO4 Demonstrate the practical applications and real-world scenarios
CO5 Relate security issues in IoT
CO6 Develop solutions to real time projects and case studies
Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define the term ‘Artificial Intelligence’. CO1 R 1
Predict the environment in which the agent engages in a series of connected
2. CO1 U 1
episodes.
3. List the two types of elements in a graph structure. CO2 R 1
4. Express the term ‘state space’ in the context of problem-solving. CO2 U 1
Recognize the learning problem when the output is one of a finite set of
5. CO3 R 1
values.
6. Represent the ‘measure of success’ in a learning problem. CO3 U 1
Show the precondition for ‘deliver coffee (dc)’ action of delivery robot
7. CO4 U 1
using STRIPS representation.
8. Give examples for progression planning in AI. CO4 U 1
9. Indicate one key application of language models in real-world scenarios. CO5 U 1
List two examples of virtual assistants, assisting the users in their daily
10. CO6 R 1
tasks.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Discuss the four distinct perspectives on AI, each falling into one of two
11. CO1 U 3
key dimensions.
12. Differentiate ‘cycle’ and ‘tree’ representation of search problem in AI. CO2 U 3
13. Represent the components of learning problem in AI CO3 U 3
14. Predict the challenges of representing the state space explicitly. CO4 A 3
Identify any three basic image processing operations in remote sensing
15. CO5 U 3
applications.
16. Indicate the main functions of a medical diagnostic agent. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Explain the different types of environments in which intelligent agents CO1 U 12
17.
operate.
18. Describe the concepts of "problem space" and "state space" in the CO2 U 12
context of problem-solving by search, with examples.
Discuss forward planning with a delivery robot example and examine CO4 U 12
20.
the challenges of implementing it.
23. Represent STRIPS planning for State based search with neat diagrams CO4 U 12
COMPULSORY QUESTION
Show an example of a real-time application where intelligent agents are CO6 U 6
24. a. used to enhance decision-making or automation, and discuss the
specific tasks and benefits they bring to this application.
Analyze the main functions of a virtual assistant, in assisting the users CO6 An 6
b
in their daily tasks.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 define AI as intelligent agent that receive precepts from the environment
CO2 select different search algorithms to reach the goal in state-space problems.
CO3 infer modern learning strategies to acquire knowledge from the environment.
CO4 generalize the planning methods with certainty factors for problem solving in AI.
CO5 identify the communicating and perceiving agents in the AI field.
CO6 focus on the real-time applications of AI in various fields.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO U 1
Differentiate between hardware and software interrupts. 1
2. CO U 1
Draw the diagrammatic representation of the Instruction Cycle. 1
3. CO R 1
List any two elements in the cache memory. 2
4. Calculate the number of check bits needed, if the 8 bit code is 1101 CO A 1
1100. 2
5. CO R 1
List out the various addressing modes. 3
6. CO R 1
List the various types of computer functions. 3
7. CO R 1
List out the types in displacement addressing. 4
8. Perform the 2’s complement subtraction of smaller number (101011) CO R 1
from larger number(111001). 4
9. CO R 1
List the types of control and status registers. 5
10 Predict the method used to implement control logic in a hardwired CO U 1
. control unit. 6
PART – B (6 X 3 = 18 MARKS)
11 CO R 3
. Describe the different types of system bus. 1
12 Differentiate between centralized and distributed bus arbitration CO U 3
. mechanisms. 2
13 CO R 3
. Describe the DMA operations. 3
14 Consider the following integer values (+12) and (-5) Perform 2’s CO U 3
. complement addition between above integer values. Note: above 4
integer values need to be converted into binary representation.
15 Distinguish between write after read and read after write data hazard CO A 3
. with a neat diagram. 5 n
16 CO R 3
. State the implementation of the control unit along with its advantage. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Compare and contrast the structures of Von Neumann and IAS CO U 6
. . architectures highlighting the architectural design that impacts the 1
functionality and program execution.
b Describe how interrupts can improve processing efficiency of the CO U 6
. processor. Illustrate the program flow of control with interrupts 1
using short and long I/O wait.
21 Consider the Data bits: 00001111. While writing this data bit into CO A 1
. the memory, how many check bits are required. While reading the 3 2
same data bit, the following is received from the memory:
00001110. Apply the syndrome word calculation error detection
method to detect the error bit position and rectify the same. Sketch
the necessary diagram for the above calculation.
COURSE OUTCOMES
CO explain function of the Central Processing Unit.
1
CO
develop algorithms for error correction for memory modules (main and cache memory).
2
CO
design and understand various input and output modules for central processing unit.
3
CO
select and use standard addressing modes for logical and physical memory addressing.
4
CO
list and define various stages of instruction pipelining in processor.
5
CO
6 explore various ways to implementing the micro instruction sequencing and execution.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define Integrity. 1 R 1
CO
2. List the characteristics of organizational culture. 1 R 1
CO
3. Name the types of attacks. 2 R 1
CO
4. Give examples of Identity theft. 2 U 1
CO
5. List the types of work that can be copyrighted. 3 R 1
CO
6. Identify the necessary conditions to grant a patent. 3 U 1
CO
7. Name the different types of software product liability. 4 R 1
CO
8. Define Teleworking. 4 R 1
CO
9. Give examples of social network advertising strategies. 5 U 1
10 CO
. State the main components of ISO 27001 framework. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 Sketch the fishbone diagram for the following statement: CO A 3
. “Late to work” 1
12 CO A 3
. Classify the types of perpetrators of computer crime. 2 n
13 CO R 3
. Describe the terms copyright, patent and trade secret. 3
14 CO A 3
. Write the cause of poor-quality software developed by programmers. 4
15 CO U 3
. Discuss the advantages and disadvantages of offshore outsourcing. 5
16 CO U 3
. Describe the need for ISMS for any organization. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO
U 6
. . Summarize the OCTAPACE of an organization culture. 1
Describe the different leadership styles, focusing on understanding
b CO
their key characteristics and the impact on various organizational R 6
. 2
contexts.
19 CO 1
R
. Describe the key issues that are prevalent with intellectual property. 4 2
21 a CO
U 6
. . Explain the various social networking ethical issues in detail. 5
b Discuss the following Non-traditional workers. CO U 6
. i. Contingent workers 5
ii. H-1B workers.
22 a Sketch the CIA security triad and explain the layers of protective CO
A 6
. . measures. 3
b Discuss the different types of software testing used in software CO U 6
. development. 4
23 Explain the PDCA cycle and sketch the tools used for continuous CO 1
A
. improvement with examples. 1 2
COMPULSORY QUESTION
24 a Summarize the business benefits that a company can achieve with CO U 6
. . the implementation of information security standards. 6
b CO U 6
. Discuss the various threats in Business Continuity Planning. 6
COURSE OUTCOMES
CO1 Observe professional ethics and organizational culture and climate in information technology.
CO2 Identify the various leadership styles and the suitability for the specific organization.
CO3 Survey the possible computer crimes and the rules and regulations for protection.
CO4 Appraise various types of IPR and the procedures for obtaining IPR.
CO5 Categorize various types of social networking and ethical issues.
CO6 Articulate the standards for Information Security Management Systems.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
List any two attributes of text primitive. CO R 1
1. 1
Name any two professional 3D modelling tools. CO R 1
2. 1
Calculate and write the number of rectangular faces in the triangular CO A 1
3. prism. 2
Differentiate right-handed and left-handed coordinate systems. CO U 1
4. 2
Compare object space and world space in 3D. CO U 1
5. 3
Name the different types of color models. CO R 1
6. 3
List the factors that affect illumination in 3D environments. CO R 1
7. 4
State a few common 3D model file extensions. CO R 1
8. 5
Recall the latest version of open-source Blender software. CO R 1
9. 5
10 Describe the explicit goal of design thinking. CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
Explain how geometric modelling is used for scientific visualization. U 3
. 1
12 CO A
. Illustrate the principles of geometric modelling. 2 n 3
13 CO
Infer on window-to-viewport transformation with an example figure. C 3
. 3
14 CO
Indicate the significance of shadows in 3D mapping. U 3
. 4
15 CO
Summarize the steps to design and render a 3D model. E 3
. 5
16 CO
Discuss the concept of ideation in the design thinking process. U 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Discuss the applications of geometric modelling in the animation CO U 1
. and gaming industry with real-world examples. 1 2
19 a CO A 6
Solve and derive the Cohen-Sutherland line clipping algorithm.
. . 2
b Apply the midpoint algorithm to find the intersection points of a CO A 6
. line starting at (1,1) and ending at (9,6). 2
22 CO A 1
Illustrate Flat, Gouraud and Phong 3D shading models in detail.
. 4 2
23 a CO E 6
. . Evaluate the error analysis and editing techniques in Blender 3D. 5
b CO A 6
. Sketch an example for environment and bump mapping in 3D. 5
COMPULSORY QUESTION
24 Explain the various stages involved in the design thinking process CO U 1
. with examples. 6 2
COURSE OUTCOMES
CO Examine the fundamental principles of geometric modelling.
1
CO Analyze the design problems from a geometric perspective.
2
CO Identify the mathematical models and algorithms involved in geometric modelling.
3
CO Exhibit proficiency in using geometric modelling software tools to develop 3D models.
4
CO Apply design thinking methodologies to innovate and solve problems creatively.
5
CO Develop design concepts and ideas through sketches, models, and presentations.
6
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define operating system. CO1 R 1
2. Differentiate between variable and constant. CO2 An 1
3. Define Non-Volatile Memory. CO1 R 1
4. Show the general form of for statement. CO3 R 1
Evaluate the following expression:
5. CO2 U 1
50 % 2 / 3 + 2
6. List the Unconditional Statements used in C Programming. CO3 R 1
Predict the output of the following Code:
main()
{
7. char x; CO2 A 1
x = ‘a’;
printf(“%d\n”, x);
}
8. Show a C function to compare two strings. CO5 R 1
9. Recall the syntax of structure declaration. CO6 R 1
10. Define recursive function. CO4 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Differentiate between System software and Application
11. CO1 An 3
software.
12. List the different types of tokens available in C language. CO2 R 3
13. Show the differences between while and do-while statements. CO3 An 3
14. Define function with its syntax. CO4 R 3
15. Declare and initialize two dimensional array. CO5 R 3
16. State the use of & and * operator with respect to pointer. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Write algorithm for finding biggest number among 3
17. a. CO1 U 6
numbers.
Define flowchart and list the different symbols used for
b. flowchart. Draw flow chart to find the average of three CO1 R 6
numbers.
Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the output of the following code snippet. CO R 1
print("Hello", end=" ") 1
print("World")
2. CO
R 1
State the use of in operator in python programing. 1
3. Predict the result of the following expression. CO
U 1
print(5*3**2//2) 1
4. Name the function used to convert string numerical value to integer CO
R 1
value 3
5. Identify the output for the following code. CO U 1
str1 = "Hello" 3
print (str1*3)
6. Consider the variable data refers to the list [10, 20, 30,40,50] then CO U 1
predict the result of the following expression. 4
print(data[2:4])
7. CO
U 1
Differentiate formal and actual arguments in user defined function. 5
8. CO
R 1
Identify the function used to find the number characters in a string data. 3
9. CO
U 1
Indicate the operator used for integer division. 1
10 State the function name used to create a new folder or directory using CO
R 1
. os module. 6
PART – B (6 X 3 = 18 MARKS)
11 Write a program to display the area of a rectangle for the given inputs CO A 3
. length and breadth. 1
12 CO
. Illustrate the any two bitwise operators with example programs. 2 U 3
13 CO
. Describe the slicing concept in List data with an example code. 3 U 3
14 Illustrate a program to store five numbers in a Tuple and display the CO U 3
. same using for loop. 4
15 CO
. Define default arguments in user defined function with example. 5 R 3
16 Write a program to display all the files and folders names from a CO
. specified directory. 6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the comparison and boolean logical operators used in CO R 6
. . python. 1
b Write a program to read an integer N and perform the following CO A 6
. operations using if conditional statements. 1
If N is odd, print Weird
If N is even and in between 5 to 9, print Not Weird
If N is even and in between 8 to 24, print Weird
COURSE OUTCOMES
CO
Examine the basic syntax and semantics of Python Programming language for problem solving.
1
CO
Infer the concepts of operators and control statements.
2
CO
Apply Programming concepts for string manipulation.
3
CO
Select appropriate data structures available in python language for solving problems.
4
CO
Design Python functions for real life problems.
5
CO
6 Develop software solutions using file handling concepts.
Q.
B
No Questions CO M
L
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
If s = 'Monty Python' then calculate the output for the following CO
1. U 1
comments >> print s[8:] 1
Find the output of the following comment.
CO
2. a = " Hello, World! " R 1
1
print(a.strip())
List=[“G”,”O”, “O”, “D”] CO
3. R 1
print(List(2)) = ? 2
CO
4. A 1
Convert the number system (12)10 to its octal number system. 2
CO
5. U 1
Calculate the output of the expression: len(["hello",2, 4, 6]). 3
myString = “GATTACA” Find the output of the following CO
6. U 1
>>> myString[4:]. 3
CO
7. R 1
Mention the use of comparison operator in python programming 4
CO
8. R 1
Write the syntax and usage of for loop. 4
CO
9. U 1
List_var=[ 23, ‘ March’, 14.7]. Compute len(List_var). 5
10 CO
U 1
. Print Dictionary using loop. 5
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11 CO
List out the standard data types used in python programming. R 3
. 1
12 CO
U 3
. Define Tuple. 2
13 CO
U 3
. Mention the rules for naming a variable. 3
14 CO
R 3
. Classify the different types of operators which supports python. 4
15 CO
R 3
. Define python dictionary with suitable example. 5
16 CO
R 3
. Name any three Modes to open a file in python. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a. List the Five Generations of Computers and their CO
U 6
. Applications. 1
b. Draw the architecture of the computer and explain the CO
A 6
basic terminology. 1
Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Discuss the importance of communication protocols in distributed CO U 10
. systems and compare different communication models. 1
b Explain the structure of a blockchain, including blocks, CO R 10
. transactions, cryptographic hashes, and the concept of a distributed 1
ledger.
(OR)
2. a Describe the lifecycle of a blockchain application, including the CO R 10
. stages of development, deployment, and operation. 1
b Compare traditional fault tolerance mechanisms such as CO U 10
. redundancy, and error correction codes with Byzantine fault 1
tolerance mechanisms in distributed systems.
COMPULSORY QUESTION
9. a Assume you are a blockchain compliance officer responsible for CO A 20
. ensuring Know Your Customer (KYC) compliance in a 6
decentralized finance (DeFi) platform. A user, Sarah, has initiated a
transaction involving a significant amount of cryptocurrency.
However, Sarah's identity verification process has raised red flags,
as her provided documents do not match the information stored on
the blockchain's immutable ledger. Additionally, there are
suspicions of Sarah's involvement in illicit activities based on
transaction patterns. Illustrate how you would address this KYC
compliance issue within the decentralized nature of the blockchain
while upholding regulatory standards and mitigating potential risks.
COURSE OUTCOMES
CO1 Demonstrate the significance of decentralized systems, blockchain as a technology and its real
world use cases.
CO2 Illustrate the working principle of bitcoin and cryptocurrency.
CO3 Develop applications using the solidity programming language for ethereum.
CO4 Examine the functionalities and the working model of hyperledger.
CO5 Formulate privacy using channels and private data collections.
CO6 Design end to end business flow of an hyperledger application.
Q.
B
No Questions CO M
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Explain the role of input devices in allowing users to interact CO1 U 10
1.
. with virtual environments and control their actions.
b Illustrate the major challenges associated with implementing CO1 U 10
. immersive virtual reality systems for consumer use.
(OR)
a Discuss the concept of presence in VR and why it is a CO1 U 10
2.
. critical factor for creating immersive experiences.
b Express the significance of four key elements in creating an CO1 U 10
. immersive VR experience.
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Justify how Industry 4.0 is revolutionizing traditional CO6 E 20
a
9. industrial processes, with a focus on smart factories and
.
supply chain optimization.
COURSE OUTCOMES
CO1 Identify the commercial applications of virtual technology and the effective usage of input
devices.
CO2 Distinguish the essential output devices, sound displays and graphics architecture and examine
the safety concerns related to VR.
CO3 Illustrate the VR hardware and the adaptability with Mobile devices.
CO4 Apply the VR Authoring and Computing architecture for VR.
CO5 Identify the VR Health and safety issues and the guidelines for proper VR usage.
CO6 Design the real-time applications using Virtual Reality for industry 4.0.