0% found this document useful (0 votes)
16 views

End Semester Examination - April / May 2024

CSE syllabus

Uploaded by

prajeetnithi97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

End Semester Examination - April / May 2024

CSE syllabus

Uploaded by

prajeetnithi97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 380

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 12CS230/14CS2047/17CS2021/18CS2021 Duration 3hrs


Course Name THEORY OF COMPUTATION Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO
Write a member of Σ2 where Σ = {p, q}. 1 A 1
2. CO
Name the machine that accepts regular language. 1 R 1
3. CO
Differentiate Deterministic and Non-deterministic Finite Automata. 2 U 1
4. Select the regular expression from the given set of regular expressions,
which will generate the string “aabab”. CO
{(a|b)*ba, ab(a|b)*, (a|b)*bab} 2 R 1
5. Show the dependency graph for Grammar G with the following
productions.
S->Aa | B
B->A | bb CO
A->a | bc | B 3 U 1
6. State the form of production for a Context free grammar to be in CO
Chomsky Normal Form (CNF). 3 R 1
7. List the properties of context sensitive grammars. CO
4 R 1
8. CO
Define Turing machine. 4 R 1
9. Relate Turing machine and Finite automata based on their ability to CO
U 1
recognize various languages. 5
10 CO
R 1
. Identify the language recognized by the turing machine. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
. Sketch the Chomsky hierarchy for the formal languages. 1 A 3
12 CO
. Define Deterministic Finite Automata. 2 R 3
13 Rewrite the following grammar by eliminating the useless productions CO U 3
. from G=(V,T,S,P), where V={S,A,B,C} and T={a, b}, with P 3
consisting of the following productions.
S → aS |A| C
A→a
B→ aa
C → aCb
14 CO
. Define context sensitive grammar. 4 R 3
15 CO
. Differentiate Push Down Automata and Turing Machine. 5 U 3
16 Define Church-Turing thesis. CO
R 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Construct Non-Deterministic Finite Automata with ε-transition for CO
. . the regular expression (0+01)*(0*+11*) 2 A 6
Develop a Deterministic Finite Automata equivalent to the given CO A 6
Non-Deterministic Finite Automata. 2

b
.

18 a Explain the method of minimizing the Deterministic Finite CO U 1


. . Automata (DFA) and sketch the minimized DFA. 2 2

19 a Convert the following context-free grammar to Chomsky and CO U 6


. . Greibach 3
Normal Form.
S → a | aA | ADa
A → aDD
D → Aa | d | a
b Determine whether “aab” is a member of the language using CYK CO A 6
. membership algorithm represented by the grammar. 3
S → AB
A → BB | a
B → AB | b

20 a Construct Linear Bounded Automata to recognize the language. CO A 6


. . L = {anbn: n≥ 1}. 4
b Apply the pumping lemma and determine whether the language is CO A 6
. context-free. 4
L1 =(0n1n2n:n≥1}

21 a Illustrate the variations in the standard Turing machine model. CO A 1


. . 5 2

22 a CO A 6
Explain the closure properties of regular languages.
. . 2
b Convert the given finite automata to its equivalent regular CO U 6
. expression. 2
a.

b.

23 a Identify whether the following are the closure properties of CFL and CO U 6
. . describe them. 3
(i) Intersection
(ii) Homomrphism
(iii) Difference
(iv) Concatenation and
(iv) Kleene closure.
b CO
A 6
. Construct a Turing Machine to add two positive integers. 5
COMPULSORY QUESTION
24 a Describe the following
CO
. . i) Recursive Languages U 8
6
ii) Recursive Enumerable Languages
b CO
. Differentiate decidable and undecidable problems. 6 U 4
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO
recall the concept of languages and the hierarchy of languages.
1
CO
develop finite automata to accept a set of strings of a language.
2
CO
classify the given language based on chomsky’s hierarchy.
3
CO
construct context free grammars to generate strings of context free language.
4
CO determine equivalence of languages accepted by Push Down Automata and languages generated
5 by context free grammars.
CO
6 compare computability & non-computability and Decidability & Un-decidability.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 4 5
CO2 4 19 18 41
CO3 1 16 6 23
CO4 5 12 17
CO5 4 18 22
CO6 4 12 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 17CS1001 Duration 3hrs


Course Name FUNADAMENTALS OF COMPUTING AND PROGRAMMING Max. marks 100

ANSWER ALL QUESTIONS (5 x 20 = 100 Marks)


Q. Sub Questions CO Marks
No. Div.
1. a. Elaborate the various generations of computer. CO1 15
b. Discuss in detail about the evolution of computers. CO1 5
(OR)
2. a. List different format specifiers in C with suitable examples. CO1 10
b. Solve the following CO1 10
(i) ( B4) 16 = ( ? ) 10
(ii) ( 101011 ) 2 = ( ? ) 8
(iii) (46) 8 = ( ? ) 2
(iv) ( 1011011011 ) 2 = ( ?) 16
(v) ( DA3E ) 16=( ? ) 2

3. a. Develop an algorithm to calculate the Area of a Rectangle. Draw a CO2 10


flowchart for the same.
b. Demostrate the types of constants with examples. CO2 10
(OR)
4. a. Illustrate different types of Operators in C with suitable examples. CO2 20

5. a. Construct a C program to find the smallest of three numbers. CO3 6


b. Explain string handling functions with an example program for each CO5 14
function.
(OR)
6. a. Describe the looping statements with suitable examples. CO4 20

7. a. Explain the concept of functions by using the example of swaping two CO4 10
numbers.
b. Define recursion. Develop a C program to calculate factorial of a given CO4 10
number using recursion.
(OR)
8. a. Discuss about the Storage Class in C. CO4 15
b. Demonstrate enumerated data type. CO6 5

COMPULSORY
9. a. Summarize various computer software and its usage. CO1 10
b. Construct a C program to display the employee details using Structures CO6 10
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 14CS2009 / 19CS2005 Duration 3hrs


Course Name DATA STRUCTURES AND ALGORITHMS Max. Marks 100

Q.
N Questions CO BL M
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Abstract Data Type. CO
U 1
1
2. Represent the function “23n4 + n2 log n + 5n” in Big-Oh notation. CO
U 1
1
3. Convert the following infix expression A+B*C+D-B/(C+A*D) to its CO
R 1
equivalent reverse polish notation. 2
4. State any applications of Queue data structure. CO
R 1
2
5. Write the time complexity to insert an element at the front of the CO
U 1
singly linked list. 3
6. Let last denote the last node of a circular linked list. If last.next= CO
U 1
None, how many node(s) is/are there in the circular linked list? 3
7. Write the best-case time complexity of Quick sort algorithm. CO
R 1
4
8. Identify the number of iterations required by radix sort to the list: 45, CO
U 1
78, 22, 8, 456, 98, 25, 12, 65, 15 4
9. Sketch a valid Complete binary tree. CO
R 1
5
10 List the keys in the following binary tree in post-order
.
CO
A 1
6

PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11 Given an array, arr[1………12][1………17] with base value 100 and CO U 3
. the size of each element is 1 Byte in memory. Locate the address of 1
arr[7][5] with the help of row-major order.
12 Evaluate the postfix expression “ABC+*D-“, where A = 2, B = 5, C = CO A 3
. 3 and D = 10 using stack. Show the contents of the stack in each step 2
of the evaluation.
13 Consider the following circular linked list:
. CO U 3
3
Write the code to insert “23” at the front of the above circular linked
list.
14 Consider a hash table of size 7. Insert the values 28, 39, 17, 45, and CO A 3
. 49 into the hash table using the hash function “value mod 7”. Handle 4
collisions, if any, by applying separate chaining.
15 List the Properties of Binary Search Tree. CO R 3
. 5
16 Differentiate null graph and complete graph with suitable diagrams. CO U 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17 Explain in detail about time and Space trade off. CO R 12
. 1

18 Demonstrate the push, pop, peak and display functions of stack data CO A 12
. structure with code and example. 2

19 Describe the following functions in a Singly linked list with suitable CO A 12


. pseudocode: 3
Insert at the front
Insert in the middle
Delete from the front
Delete the middle element

20 Explain with the algorithm how the merge sort technique sorts the list CO A 12
. of inputs. Apply the algorithm to sort the list of numbers 46, 67, 23, 4
13, 36, 42, and 96.

21 Write the pseudocode to insert a node in a binary search tree. CO A 12


. Construct a binary search tree by inserting the values 35, 46, 29, 23, 5
34, 28, 9, 32, 73, 63, 92.

22 Design an AVL Tree with the values: 44, 27, 32, 78, 90, 38, 48, 80, CO A 12
. 62, 54. Explain the different rotations that are used to balance the tree 4

23 Illustrate the pseudocode to perform linear search on a given set of ‘n’ CO U 12


. numbers. Using the algorithm search for the element 48 in the set [11, 4
43, 24, 54, 48, 63, 82, 19]
COMPULSORY QUESTION
24 Describe the Depth First Search algorithm of the graph with an CO U 12
. example. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO1 understand the basics of abstract data type and algorithm analysis.
CO2 illustrate the use of an array to implement stack and queue.
CO3 apply the linked list to design stack and queue data structures.
CO4 demonstrate the working of sorting and searching algorithms and application of hashing.
CO5 understand the different types of tree data structures and demonstrate the methods for traversing trees.
CO6 differentiate the graph representations and traversals.

Assessment Pattern as per Bloom’s Level


CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 12 5 - - - - 17
CO2 2 - 15 - - - 17
CO3 - 5 12 - - - 17
CO4 1 13 27 - - - 41
CO5 4 - 12 - - - 16
CO6 - 15 1 - - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 14CS2034 / 17CS2010 Duration 3hrs


Course Name OBJECT ORIENTED ANALYSIS AND DESIGN Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Identify the attributes and methods of a dishwasher object. CO
1. 1 U 1
Construct a class hierarchy to organize the following Vehicle classes CO
2. such as bus, truck car, tow truck, ford, tanker, log truck, Honda, Nissan. 1 A 1
Sketch the Data Flow diagram for online shopping system. CO
3. 2 A 1
List the differences that exist in abstract and concrete use case. CO
4. 2 R 1
Identify the type of association from the following diagram.

CO
5. 3 U 1
CO
6.
Tabulate the essential components of pattern template. 3 R 1
CO
7. Write short note on framework. 4 A 1
Give examples for static model in UML. CO
8. 4 U 1
Define macro level user interface in a view layer class. CO
9. 5 R 1
10 List the different types of protocols visibilities associated with an UML CO
. class. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 Compare pattern and framework CO A 3
. 1 n
12 List the phases performed iteratively by the Object Modeling CO R 3
. Technique. 2
13 Identify and explain the type of relationship given below. CO R 3
. 3
Can Fly flown by
Pilot Planes

14 Compare the 2-Layered and 3-Layered approach for software CO A 3


. development. 4 n
15 Identify and outline the guidelines for identifying super-sub CO U 3
. relationship and generalization 5
16 Describe the different types of coupling exist among objects. CO U 3
. 6

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Consider the following requirements for an ATM, build the CO E 6
. . behavioral use case diagram with a clear explanation of each 1
activity.

The ATM must be able to provide the following services to the


customer:

1. A customer must be able to make a cash withdrawal from any


suitable account linked to the card, in multiples of ₹100.00.
2. The withdrawal should not exceed ₹25,000/- in total per day.
3. A customer must be able to make a deposit to any account linked
to the card, consisting of cash. The customer will enter the
amount of the deposit into the ATM, subject to automatic
verification by the ATM machine.
4. A customer must be able to make a transfer of money between
any two accounts linked to the card.
5. A customer must be able to make a balance inquiry of any
account linked to the card.
b Summarize the steps involved in Macro and Micro development CO U 6
. process in Booch methodology. 1

18 a Explain the Unified Approach of software development with CO U 6


. . analysis of each phase. 2
b Consider a payroll system that processes employee records. There CO A 6
. exist three categories of workers. They are: 2
1. Managers – regular salary.
2. Office Workers – Hourly wagers with overtime for over 40
hours work.
3. Production workers – salary as per piece rate.
(i) Examine the structured and object oriented approach for the
employees with syntax and explain the differences.
(ii) List the problems that may occur in both the programming
paradigms while there is an addition of a new worker category as,
outsourced worker – salary as per job completion.

19 a Consider the online food ordering system to enable the customers CO E 12


. . for placing the order, track the orders, and maintain the customer's 3
database to improve the food delivery service. This system allows
the user to select the desired food items from the displayed menu.
The payment can be made online or pay-on-delivery system. The
user’s details are maintained confidential because it maintains a
separate account for each user. An ID and password is provided for
each user; therefore it provides a more secured ordering. For the
above scenario, draw the following diagrams.
1. Statechart Diagram with event transitions (entry/do/exit).
2. Activity Diagram with swimlane.
3. Sequence Diagram with horizontal and vertical view.

20 a Enumerate the various processes of the unified approach. CO R 2


. . 4
b Explain the Noun Phrase Approach in detail with vianet Bank ATM CO U 10
. System. 4

21 a Construct use case, class diagram and component diagram for the CO A 12
. . stock maintenance system given below A new stock maintenance 5
system for a book store is to replace the existing maintenance
system which is in efficient. The new stock maintenance system will
allow the employee to record information of the nooks available in
the book store and generate report based on the total amount of
sales. The new system will has a windows based desktop interface
to allow employee to enter the information of sale, purchase orders,
change employee preferences and create reports. Employee can only
access the information and purchase orders for security purpose.

22 a Differentiate between generative and non-generative patterns. CO A 2


. . 5 n
b Tabulate the essential components of pattern template for effective CO R 10
. 5

23 a Sketch the class diagram and identify the aggregation, association, CO A 12


. . super-sub relationship among the classes for the following scenario. 5
“A bank has many branches. In each zone, one branch is designated
as the zonal head office that supervises the other branches in that
zone. Each branch can have multiple accounts and loans. An
account may be either a savings account or a current account. A
customer may open both a savings account and a current account.
However, a customer must not have more than one savings account
or current account. A customer may also procure loans from the
bank.”
COMPULSORY QUESTION
24 a Explain the following corollaries in making specific design CO U 10
. . decisions. 6
i. Strong mapping
ii. Standardization
iii. Design with inheritance
b Describe the following two properties of aggregation relationship CO U 2
. with an example. 6
i. Transitivity
ii. Antisymmetry

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 describe the various object oriented concepts.
CO2 recognize the requirements of any real time application.
CO3 sketch the design of any application using UML diagram.
CO4 identify various prototypes to represent the application.
CO5 prepare the documentation of any real time application.
CO6 explain the application in terms of use case driven approach.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 7 1 3 6 17
CO2 4 6 7 17
CO3 4 1 12 17
CO4 2 11 1 3 17
CO5 11 3 12 2 28
CO6 1 15 12 28
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 14CS2035 / 17CS2012 Duration 3hrs


Course Name OBJECT ORIENTED PROGRAMMING IN C++ Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Differentiate keyword and identifier. CO U 1
1
CO
U 1
2. Compare variables and constants in C++. 1
CO
U 1
3. Differentiate Unary and Binary operator. 2
Define inline function. CO R 1
4. 2
CO
R 1
5. What is protected constructor in C++ inheritance? 2
CO
R 1
6. Recall new operator with a suitable example. 3
Describe the importance of destructor. CO U 1
7. 3
CO
R 1
8. Enumerate the advantages of virtual functions. 4
CO
U 1
9. Define Stream I/O. 6
10 CO
R 1
. Define seekp() function. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
R 3
. Recite the use of the ternary operator in C++. 1
12 CO
Write in detail about Enumeration with an example program. U 3
. 2
13 CO
Construct a scenario where we require user defined exceptions briefly. A 3
. 3
14 Write a C++ program to multiply two numbers using the class CO A
3
. template. 4 n
15 CO
Discuss the use of private specifiers and their visibility in the class. R 3
. 5
16 CO
U 3
. Differentiate friend function and virtual function. 4
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Elaborate the fundamental characteristics of object-oriented CO U 6
. . programming with real-time examples. 1
b Write a C++ Program to check whether the given number is CO A 6
. Armstrong or not 1 n

18 a Create the equivalent of a four-function calculator. The program CO A 8


. . should ask the user to enter a number, an operator, and another 2
number. (Use floating point. It should then carry out the specified
arithmetical operation: adding, subtracting, multiplying, or dividing
the two numbers. Use a switch statement to select the operation.
Finally, display the result. When it finishes the calculation, the
program should ask whether the user wants to do another
calculation. The response can be “yes” or “no”.
b Create a structure ‘employee’ with it’s data members: empid (data CO A 4
. type: char[]), salary (data type: long). Prompt the user to fill in this 2
data for four employees, and then display the information.
19 a Write a program in C++ to do the following operations in a n x n CO A 6
. . matrix. 3
(i) Matrix Addition
(ii) Matrix Multiplication
b CO U 6
. Explain the relational and logical operators with sample code. 2

20 a Create a class named real estate that has data members to hold the CO A 1
. . price of a house. The number of bedrooms, and the number of 3 2
baths. Member functions include insertion and extraction functions.
Write a main() function that instantiates a real estate object, allows
the user to enter data, and displays the data members entered. The
main() function should display an appropriate thrown error message
if negative values are entered for any of the data members.

21 a Write a C++ program that uses function templates to sort a list of CO A 6


. . numbers in ascending order. 4 n
b Sketch a function to calculate the factorial value of any integer as an CO A 6
. argument. Call this function from main( ) and print the results in 4
main( ). What are the ways of passing arguments to a function?

22 a CO A 6
Explain Generic functions and Generic class.
. . 5
b CO U 6
Illustrate the exception handling mechanism.
. 4

23 a Write a C++ program to read the contents from the file“karunya.txt” CO A 6


. . and write it into the file “university.txt”. 6 n
b You are developing a software system for a university. The system CO A 6
. needs to manage information about both students and faculty 5
members. Both students and faculty have some common attributes
like name, age, and address, but they also have some specific
attributes. How would you design the class hierarchy using
inheritance to represent students and faculty members in C++?
COMPULSORY QUESTION
24 a Explain the role of strcmp(), strcpy(), strchr(), strlen() function in CO U 1
. . the string manipulation. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO
Define object-oriented programming concepts.
1
CO
Select the relevant object-oriented concepts to implement a real time application.
2
CO
Demonstrate the application of polymorphism in various ways.
3
CO Illustrate the use of advanced features of C++ such as templates, exceptions, and multiple
4 inheritances.
CO
Create applications using inheritance in C++.
5
CO
6 Explain file management and string manipulation.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 3 8 6 17
CO2 2 10 12 24
CO3 1 1 21 23
CO4 1 9 6 9 25
CO5 3 12 15
CO6 1 13 6 20
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 14CS2042 / 17CS2018 / 18CS2018 Duration 3hrs


Course Name SOFTWARE ENGINEERING Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define a work product. 1 R 1
CO
2. List few advantages of RAD Model. 1 R 1
CO
3. Define white box testing. 2 R 1
List the golden rules to be followed by the designers while CO
4. designing the interface. 2 R 1
CO
5. Define coupling. 3 R 1
CO
6. Infer the important aspects of validation testing. 3 U 1
CO
7. Differentiate path testing and security testing 4 U 1
CO
8. Define software product scheduling. 4 R 1
CO
9. List the key participants in software configuration management. 5 R 1
CO
10. State the formulae for mean-time-between failure. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11. List the drawbacks of RAD model. CO R 3
1
CO
12.
Describe the process framework of a complete software. 2 U 3
CO
13.
Differentiate user interface and business domain classes. 3 U 3
Describe the tasks in inception and elicitation phase of CO
14.
requirements engineering. 4 R 3
CO
15.
Differentiate reviews and audits of SQA. 5 U 3
CO
16.
State Pareto principle in a product development process. R 6 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a Explain waterfall model and incremental model in software CO A 6
. development process. 1
b Describe the process of extreme programming in agile software CO R 6
. development. 1

18. a CO U 6
. Describe seven tasks in requirements engineering. 2
b Sketch the use case and class diagram for a smart village CO A 6
. monitoring system. 2

19. a Explain the following architectures in software development CO A 6


. process. 3
a) Object oriented architecture
b) Call and return architecture
c) Data centered architecture
b CO U 6
. Describe about formal technical review and informal review. 3

20. CO U 12
Explain the testing strategies of unit tests and integration tests. 4

21. a Explain six-sigma quality standards in software engineering CO U 6


. process. 5
b Describe on the following software metrics. CO R 6
. i. Size-oriented 5
ii. Function-oriented

22. a Explain the process of risk mitigation, monitoring and CO A 6


. management. 5
b Describe the following aspects in software scheduling CO U 6
. a) Relationship between people and effort. 5
b) Effort distribution.

23. a Explain COCOMO II model to predict the software estimation CO U 6


. for software development projects. 5
b Describe the measures of software reliability and availability CO R 6
. with the aspects of software safety. 6
COMPULSORY QUESTION

24. Explain software process improvement framework by CO U 12


incorporating the concept of maturity models. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
discover an effective software engineering process to develop software-intensive systems.
1
CO
translate the requirements specification into an implementable design
2
CO
construct UML diagrams along with design strategies and design patterns.
3
CO
analyze architectural design methods.
4
CO
evaluate the system using various testing strategies
5
CO
6 develop the software system with quality measures.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 11 - 6 - - - 17
CO2 2 9 6 - - - 17
CO3 1 10 6 - - - 17
CO4 4 13 - - - - 17
CO5 7 21 6 - - - 34
CO6 10 12 - - - - 22
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 14CS2045 / 17CS2019 Duration 3hrs


Course Name SYSTEM SOFTWARE Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define system software. 1 R 1
CO
2. List the addressing modes that are used in SIC/XE architecture. 1 R 1
CO
3. Name the assembler directives used in the SIC assembler language. 2 R 1
CO
4. State the function of assembler. 2 R 1
CO
5. Define linking loader. 3 R 1
CO
6. State the advantage of dynamic linking. 3 R 1
CO
7. Write the format of Text record. 4 A 1
CO
8. Identify the type of macro call that contains the call to another macro. 5 U 1
CO
9. List the various tables used by macro processor. 5 U 1
10 CO
. Give examples for text editor. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 Write the sequence of SIC instructions for the following equation. CO
A 3
. ALPHA = BETA + GAMMA * 12 1
12 CO
. Differentiate immediate operand and literal with example. 2 U 3
13 CO
. Discuss the advantages and disadvantages of absolute loader. 3 U 3
14 Describe the functions required to translate source program to object CO
. program. 4 R 3
15 CO
. Explain the generation of unique labels in macro processor. 5 U 3
16 CO A
. Compare DBMS with file processing systems. 6 n 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Sketch the neat diagram of SIC/XE architecture and explain the CO A 1
. . various addressing modes, instruction formats, memory and 1 2
registers in detail.

18 a Explain the following Machine independent features of an CO U 1


. . assembler with an example. 2 2
a. Literals b. Program Blocks c. Control Sections

19 a Illustrate the steps taken by the absolute loader to load the following CO A 1
. . object program in memory. 4 n 2

20 a CO
. . Compare and contrast linking loader and linkage editor. 3 U 6
b CO
. Describe the working principle for bootstrap loader. 3 R 6

21 a Explain the following macro invocation statements and expand CO A 1


. . them using the macro definition given below. 5 2

22 a CO 1
. . Discuss the differences between CISC and RISC architecture. 1 U 2

23 a Explain the concatenation of macro parameters feature with CO U 6


. . example. 5
b Illustrate with an example the procedure to handle forward CO A 6
. references by multi-pass assembler. 3
COMPULSORY QUESTION
24 a CO
. . Describe the working of an Editor structure with a neat sketch. 6 R 6
b Explain the Interactive debugging system functions with its CO U 6
. capabilities. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO1 list different system architectures like SIC, CISC and RISC.
CO2 explain algorithm and data structures for assembler.
CO3 choose different features of loader and assembler.
CO4 examine the object program.
CO5 comply macros in assembler.
CO6 select different system software for practical applications.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 12 15 29
CO2 2 15 17
CO3 8 9 6 23
CO4 3 1 12 16
CO5 11 12 23
CO6 6 7 3 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 14CS2050 / 17CS2022 Duration 3hrs


Course Name UNIX ARCHITECTURE Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Mention the purpose of $ symbol in shell script. U 1
1
CO
2. Infer the output of echo command. R 1
1
CO
3. Discuss the function of iput. R 1
2
CO
4. Write the number of processes created by executing fork() twice. R 1
2
CO
5. Interpret the outcome of ls –i. U 1
3
CO
6. Expand IPC. R 1
3
CO
7. Define swapper process. U 1
4
CO
8. List any two file system calls. R 1
4
CO
9. Define incore inode U 1
5
10 CO
Paraphrase shmget() system call. U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
. Define system call. 1 R 3
12 CO
. Write the syntax for converting pathname into inode 2 U 3
13 CO A
. Differentiate iget and ifree algorithm. 3 n 3
14 Write a program to create a parent process and two child processes CO
. under the parent. 4 U 3
15 CO A
. Write the advantages of creating pipes. 5 n 3
16 CO
. Write the syntax for allocating shared memory space. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO 1
Draw and explain the block diagram of the kernel. R
. . 1 2

18 a Discuss the scenarios of buffer retrieval when the kernel can find CO U 1
. . and can find the block on its hash queue. 2 2

19 a Consider a disk block containing 1024 bytes, each block is CO A 1


. . addressable by 256 bytes. If a process wants to access a file with 3 2
byte offset 4,25,000. Find out in which block number and in which
byte number is this given byte offset present. Based on the
identified level of indirection and block number draw the file block
layout.

20 a Elaborate the interprocess communication between two related and CO U 1


. . unrelated processes through pipes. 4 2

21 a CO R 1
Explain the process system calls with its functionalities.
. . 5 2

22 a Paraphrase the steps in the creation of a new process. Write the CO A 1


. . algorithm and explain with an example program. 4 2

23 a Describe the scheduling algorithm in detail. Consider there are three CO A 1


. . processes A, B and C. If the base level priority is 60 and the clock 5 n 2
interrupts the process 60 times/sec. Assume the time quantum as 1
sec.
i) Sketch the process scheduling for 5 clock time slices.
Assume process A is in group1 and processes B and C are in
group2, sketch the process scheduling using fair share scheduling
algorithm. Compute the decay of the CPU usage and the process
priority between process A, B and C.
COMPULSORY QUESTION
24 a Explain with suitable code to demonstrate interprocess CO U 1
. . communication between two process through sockets. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO1 Describe the architecture and features of UNIX Operating System.
CO2 Identify UNIX commands for file handling and process control.
CO3 Discover the context of a process and system calls that manipulate and control process context.
CO4 illustrate data structure of file, process and system calls for file subsystem and process control
subsystem
CO5 Develop the internal algorithms of the kernel.
CO6 Appraise the various Inter-process communication methods.

Assessment Pattern as per Bloom’s Taxonomy


CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 16 13 - - - - 29
CO2 1 3 13 - - - 17
CO3 4 12 - 1 - - 17
CO4 13 3 12 1 - - 29
CO5 - 1 3 12 - - 16
CO6 1 15 - - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 14CS2054 / 18CS2027 Duration 3hrs


Course Name C# AND .NET PROGRAMMING Max. Marks 100

Q.
Mark
N Questions CO BL
s
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Compare call by value and ref variables in C#. CO1 R 1
2. Name the base class of all classes in C#. CO1 R 1
3. State the process through which the concept of multiple CO4 U 1
inheritance is made possible in C#.
4. Identify the code block that executes regardless of whether an CO4 R 1
exception is thrown or not.
5. Define a thread in the C# application program. CO4 R 1
6. Identify the Thread class property used to get the Main thread CO4 R 1
reference.
7. Identify the namespace required to establish a connection with CO5 R 1
the MySQL database server.
8. State the method name used to assign event handling code with CO4 R 1
Button.
9. State the method used to insert data in Queue Collection. CO4 R 1
10 Define MVC in ASP.NET Framework. CO6 R 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11 Describe the creation and accessing of the jagged array with CO1 U 3
. sample C# code.
12 Write a C# program containing preprocessor directives to CO2 U 3
. check whether a variable PI is declared.
13 Differentiate between the ExecuteReader and ExecuteScalar CO5 U 3
. methods
14 Explain the MessageBox creation in the Windows Form CO4 U 3
. application with a suitable C# code snippet.
15 Give an example program for an Obsolete attribute in C#. CO5 U 3
.
16 List the three types of action selector attributes and their usage CO6 R 3
. with proper syntax in ASP.NET MVC.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a Describe the method overriding in C# with a suitable CO3 U 6
. . example.
b Construct a class to represent a Rectangle with length and
. breadth as instance attributes. Create two rectangle objects,
r1 and r2. Initialize the attributes using the constructor
function and do the following operations using operator
overloading.
 Compute r3 = r1 + r2, where r3 is another Rectangle
object, where CO3 A 6
r3’s length = r1’s length + r2’s length
r3’s breadth = r1’s breadth + r2’s breadth
 Compute r4 = r1 * r2, where r3 is another Rectangle
object, where
r3’s length = r1’s length * r2’s length
r3’s breadth = r1’s breadth * r2’s breadth

18 a Explain the following String methods with an example C# CO2 A 6


. . code snippet.
 Substring()
 IndexOf()
 Remove()
 Split()
 Concat()
 ToUpper()
 Replace()
b Write a C# program to get a person's name and age as CO4 A 6
. inputs.
Create two user-defined exceptions as per the following
constraints:
 If the name contains any numeric digits, throw a
user-defined exception called
InvalidNameException.
 If the Age is less than 18, throw the
InvalidAgeException.
 If valid input is given, display the entered name and
age.

19 a Develop a C# Windows application program to perform CO4 A 6


. . electric bill calculations.

The constraints are as follows.


b Illustrate the following operations in an ArrayList CO5 A 6
. collection using the
C# program.
 Add new data items.
 Display all the data items.
 Replace the existing data.
 Remove a data item.

20 a Develop a console application using C# to perform the CO5 A 12


. . following operations with MySql Database.
 Connect with the database named ‘Store’.
 Insert a record in the table called ‘Product’ with
fields such as pid(int), pname (varchar), price(int).
 Update a particular product price by pid.
 Delete an entity from the table.
 Search a particular product details by pid.
 Display all the product details

21 a Construct a C# program to perform the following: CO4 A 6


. .  Create a custom attribute called ShapeAttribute
with ‘side’ as the positional parameter and ‘color’
as the named parameter.
 The custom attribute is targeted to Class and allow
multiple is true.
 Create a class Rectangle and provide the functions
Area and Volume. Apply the custom attribute in the
required places.
 Using Reflection, obtain type information of the
Rectangle class, retrieve the custom attributes at
runtime and display it
b Write a C# program that creates three threads to print even, CO4 A 6
. odd, and prime numbers between 1 to 100. The program
should perform synchronization such that one series is
printed at a time and continues to the next series with a
delay of 2 seconds.

22 a Develop an IShape interface with two methods: GetArea() CO3 A 6


. . and GetPerimeter(). Then, implement the interface in two
classes: Circle
and Rectangle. Use the appropriate constructors and fields
for each
class. Create Main class and call the interface methods.
b Construct a generic C# class “calc” with three variables and CO2 A 6
. two methods for arithmetic operations and test the same
using int and float
instances.

23 a Write a C# program to create the following methods and CO3 A 6


. . implement
the delegate concepts.
 Sum of odd numbers between the given two
numbers.
 Product of every even number between the given
two numbers.
 Initialize a delegate to attach all aforementioned
methods.
 Invoke all the methods through the delegate object.
b Develop a C# Windows program to store the given CO4 A 6
. employee details in the database table called
“MyCompany” upon pressing the save button and display
the status of the operation.

COMPULSORY QUESTION
24 a Develop an ASP.NET web application using C# to perform CO6 A 12
. . the following operations with ADO.NET.
 Design a web page with relevant fields
 Connect with the database named ‘Employee’
 Insert a record in the table called ‘Profile’ with
fields such as EmpName (varchar), EmpId (int) and
Salary (int)
 Delete an employee record based on the EmpId
 Display the details in an HTML table.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the basic programming constructs of C# in the .NET Framework.
CO2 Extend and debug a variety of .NET applications.
CO3 Demonstrate the aspects of object-oriented functionalities in .NET applications.
CO4 Use the .NET base libraries in developing real-time applications.
CO5 Illustrate .NET applications with a relational database and a variety of data sources for efficient
data access.
CO6 Develop well-designed ASP.NET applications using the .NET framework.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 3 - - - - 5
CO2 - 3 12 - - - 15
CO3 - 6 18 - - - 24
CO4 5 4 30 - - - 39
CO5 1 6 18 - - - 25
CO6 1 3 12 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 16CS2002 / 17CS2038 / 18CS2086 Duration 3hrs


Course Name FUNDAMENTALS OF JAVA PROGRAMMING Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Predict the output of the following code snippet. CO U 1
1. int i = 0; 2
2. while (i < 3) {
3. System.out.print(i + " ");
4. i++; }
2. Predict the output of the following code snippet. CO U 1
1. int a = 5; 2
2. int b = 2;
3. int c = a / b;
4. System.out.println(c);
3. ____________ in Java is a special method that is used to initialize CO R 1
objects. 1
4. CO R 1
What is the use of a final class in Java? 2
5. CO U 1
Write down the application of Interface in Java. 3
6. CO R 1
What is the used of implements keyword in Java? 3
7. CO U 1
What is the use of run() method in Multitrheading ? 4
8. The automatic conversion of primitive data types into its equivalent CO R 1
Wrapper type is known as _________ 4
9. CO U 1
Which function used to join two string in java? 5
10 CO R 1
. A _______ is the basic class for all SWING UI components? 6
PART – B (6 X 3 = 18 MARKS)

11 Write a java program to find a factorial of given number. CO


. 2 U 3
12 IIllustrate the usage of 'this' keyword with java program. CO
. 2 R 3
13 CO
. What is package? Write a java program to create new package 3 U 3
14 Differentiate throw and throws keywords with a suitable example. CO U 3
. 4
15 CO
. Write short notes on enumeration in java. 5 R 3
16 CO
. What is swing? 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Write a java program to get two decimal numbers from user and CO U 12
. perform anyone of the following operation using switch case. 1
i) Addition ii) Subtraction c) Multiplication d) Division

18 Demonstrate the method overloading with an example program. CO U 12


. 2

19 Illustrate the concept of packages with suitable example. CO R 12


. 3

20 Why java doesn’t support multiple inheritance? Demonstrate the CO A 12


. concept of Interface with suitable example. 3

21 Explain with suitable example how exceptions are being handled CO A 12


. in Java. Briefly elaborate on the various keywords used in Java for 5
exception handling. Give a demonstration of user defined
exceptions in Java.

22 CO U 12
. Demonstrate the usage of multithreading with a suitable example. 4

23 Write a java program to demonstrate the usage of various string CO U 12


. functions. 4
COMPULSORY QUESTION

24 What is swing? List the application of swing. Illustrate application CO U 12


. of swing with necessary java code. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
understand the fundamental principles of object-oriented design.
1
CO
identify the fundamental programming constructs to develop real time applications.
2
CO
model applications using Java.
3
CO
demonstrate the development of multitasking applications
4
CO
breakdown the real time applications into small abstract entities
5
CO
6 develop desktop-based applications.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 1 12 13
CO2 4 17 21
CO3 13 4 12 29
CO4 1 28 29
CO5 3 1 12 16
CO6 1 15 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 17CS2024 Duration 3hrs


Course Name WEB TECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. State the HTML syntax to include an image of dimensions 200x200. 1 R 1
CO
2. Write the syntax for CSS. 1 C 1
CO
3. State the CSS Selector that selects the HTML element by the * Symbol. 2 R 1
Define the HTML code to display the following text. The Product MRP CO
4. is Rs.10000, Offer Price is Rs.100000 Rs.49999 2 U 1
CO
5. Differentiate between static and relative positioning in CSS. 2 U 1
Write a JavaScript code to execute a function after every specific time CO
6. intervals. 2 A 1
Identify the method used to call a JavaScript function every specified CO
7. millisecond. 3 R 1
CO
8. Identify the purpose of JSON. 2 R 1
State the angular JS filter to display the cost of a product in dollar CO
9. format. 5 U 1
10 CO
. Compare the PHP built -in fcuntions require and include. 4 U 1
PART – B (6 X 3 = 18 MARKS)
11 Explain the data exchange formats such as XML and JSON for web CO U 3
. applications with suitable example. 2
12 Describe the HTML code to display the following content on a web CO U 3
. page. 1
1. Breakfast
 Idli
2. Afternoon
 Briyani
13 CO U 3
. Explain the popup box functions in JavaScript with suitable examples 3
14 A student class comprises of data members such as regno and name. CO A 3
. Initialize the data members through constructor. Use a member 3
function display() to display the details of student. Write PHP code to
create the object and print the details.
15 Display the array elements in HTML list format using AngularJS ng- CO R 3
. repeat. 5
16 CO U 3
. Define PHP cookies, session and authentication. 4
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Design a website using HTML form elements and media elements CO C 1
. . with the following fields: 1 2
i)create a form for feedback using form elements.
ii)use media element in the above form.
iii)use the text boxes to enter the user names and password.
iv)insert radio buttons to provide ranking level.
v)use checkboxes to give suggestions to improve the session.
vi)create textbox to enter comments.
vii)use buttons to submit the form and reset to clear values entered.

18 a Write CSS rules to apply the following styles. CO A 8


. . Assume the webpage contains four divisions. 1
Division 1: Set the dotted border with 5px thick, green color
Division 2: Display an image with opacity of 0.2
Division 3: Display a text in red color with font size 24px.
b CO U 4
. Explain the CSS box model with suitable HTML and CSS code. 2

19 a Describe any five JavaScript document object model methods with CO U 6


. . example programs. 3
b Explain the following JSON components with example. a. data CO A 6
. types b) parse c) stringfy d) objects. 2 n

20 a Apply timer functions and object and create different buttons to CO A 1


. . display: 2 2
a)date and time.
b)current date not time.
c)current time and not date.
d)the message “Your form has been submitted” should appear after
5 seconds.
e)stop the execution of the above program before the message gets
displayed.
f)time where the seconds should get changed for every 2 seconds
(similar to digital clock).

21 a Apply the AJAX technology in dynamic web application to CO A 8


. . demonstrate live search suggestion example. 3
b Explain the three types of lists in HTML with suitable example CO A 4
. program. 1

22 a Write a HTML program with AngularJS to store the Given book CO A 7


. . details in Array variable when ‘Add Book’ button is clicked and 6
display the same in the table format. Moreover, delete the particular
book details when the Delete button is clicked.
b Explain any three angularjs filters with proper HTML and angularjs CO A 5
. code for each. 6

23 a Create a student database using PHP with the fields: (Name, CO C 1


. . Degree, CGPA). Also perform the below operations 4 2
a) insert 5 documents
b) display all the documents.
c) find the first document in the customers collection.
d) exclude "name" from the result.
e) display only the degree.
f) update one document from the existing collection.
COMPULSORY QUESTION
24 a Develop a webpage using HTML, and Angular JS Routing for your CO A 1
. . job portal website as per your choice with the following pages a. 6 2
Main HTML program with Angular JS routing b. Hyper-Links
 Candidate1
 Candidate2
 Candidate3
 Candidate4
 Candidate5

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
Select appropriate design standards for designing attractive web pages.
1
CO
Identify the latest client and server-side technologies for creating interactive data driven websites.
2
CO
Apply properties and methods which facilitate dynamic application development.
3
CO Model dynamic web applications using suitable server-side technologies integrated with the
4 database
CO Create fully functional web applications that incorporate planning, designing, coding, testing, and
5 publishing to a web server.
CO Attach rich interactive features for web applications using MVC based framework.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 3 12 0 0 13 29
CO2 2 9 13 6 0 0 30
CO3 1 9 11 0 0 0 21
CO4 3 1 0 0 0 12 16
CO5 0 4 0 0 0 0 4
CO6 0 0 24 0 0 0 24
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 17CS3032 Duration 3hrs


Course Name APPLIED MEDICAL IMAGE PROCESSING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Compare and contrast the representation of images in grayscale and CO U 10
. color formats, highlighting their differences in visual perception, 1
data size, and application suitability.
b Analyze the role of Fourier Transform in the advancement of CO A 10
. medical imaging techniques. 4 n
(OR)
2. a Examine the role of technological advancements in shaping the CO R 20
. landscape of medical imaging modalities. Investigate how 1
innovations in imaging technology have influenced the diagnosis
and treatment of various medical conditions.

3. a Explain the following algorithms for segmentation based on CO U 20


. intensity values 2
i) Thresholding
ii) Region growing
(OR)
4. a Describe the technique for visualization of tomographic image data CO R 20
. using reformatting. 3

5. a Discuss challenges and potential strategies for optimizing CO U 10


. interpolation and regularization methods to improve image quality 3
and clinical utility in medical imaging.
b Enumerate algebraic reconstruction methods. CO R 10
. 5
(OR)
6. a Analyze the impact of image registration on enhancing diagnostic CO A 20
. accuracy, treatment planning, and therapeutic monitoring in clinical 5 n
practice.

7. a Discover the various filtering operations in medical image CO A 10


. processing. 2
b Compare Voxel and Triangulated surface rendering with example. CO U 10
. 4
(OR)
8. a Describe the projection process of a parallel beam CT using Radon CO U 20
. Transform and CT reconstruction by filtered back projection. 4
COMPULSORY QUESTION
9. a Sona is a radiologist working in a multi-specialty hospital. She CO E 20
. faces some challenges in medical image archiving, retrieval, and 6
communication within the hospital setting. Evaluate the innovative
strategies and technologies to overcome the challenges.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 describe the specific terminologies and objectives of utilizing different imaging modalities in
clinical
practice
CO2 infer the intensity and filtering operations on medical image datasets.
CO3 summarize the segmentation and multimodal image registration techniques used for clinical
applications.
CO4 analyze the application of imaging techniques like transformations and rendering.
CO5 explain the techniques and concepts of image registration and reconstruction.
CO6 predict the issues in medical image archiving, retrieval and communication and apply the
techniques to real
world problems

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 20 10 30
CO2 20 10 30
CO3 20 10 30
CO4 30 10 40
CO5 10 20 30
CO6 20 20
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS1001 Duration 3hrs


Course Name INFORMATION AND COMMUNICATION TECHNOLOGY Max. Marks 100

Q.
B
No Questions CO M
L
.
PART – A (20X1=20 MARKS)
1. Define Algorithm. CO
R 1
5
2. How do you represent numbers in bits? CO
R 1
3
3. What do you mean by two state devices? CO
R 1
2
4. Which organization has evolved a standard code to represent CO
R 1
characters to be stored and processed by computers? 2
5. Convert the binary number 11011011 into decimal number. CO
E 1
4
6. Which notation is a more concise numerical representation? CO
R 1
1
7. What is GIF? CO
R 1
5
8. Find the Hex equivalent for binary 1011010. CO
A 1
2
9. How do you do the representation of characters in Computers? CO
U 1
2
10. Write about Run length Encoding (RLE). CO
A 1
2
11. How do we convert a continuous analog signal to its digital CO
A 1
equivalent? 2
12. State the Nyquist theorem. CO
A 1
5
13. Write the steps in converting video tape output to digital values. CO
R 1
4
14. Write the two types of Random Access Memory. CO
U 1
3
15. Sketch the structure of CPU CO
U 1
3
16. Define flash memory. CO
R 1
5
17. What is the program which allows entering text using keyboard? CO
U 1
3
18. What assists users to carryout operations of creating, storing, CO
U 1
accessing, editing, updating and querying a database? 5
19. What is User Datagram Protocol? CO
R 1
5
20. What are the functions of Operating Systems? CO
U 1
4
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
21. Sketch the functionality of MP3 music system. CO
U 5
1
22. Write about Error-detecting codes. CO
R 5
2
23. Write down the different image storage formats along with their CO
U 5
applications and advantages. 2
24. Illustrate the MP3 music system. CO
U 5
1
25. Sketch the connection between PCs/LANs and telephone lines. CO
U 5
3
26. Illustrate the compress process of the video tape output. CO
R 5
5
27. Write the specifications of CPU. CO
R 5
3
28. Illustrate the classification of programming languages based on CO
U 5
applications. 3
29. State the functionality of memory cell and list down the ideal CO
R 5
properties of memory cell. 3
30. Write the different display devices and printers. CO
R 5
5
31. Classify the different types of Programming languages. CO
R 5
5
32. Explain the generation of audio output. CO
An 5
2
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
33. a. Write about the processing and displaying textual data. CO
U 5
2
b. Elaborate the fundamentals of image compression with CO
U 10
examples. 2
34. Elucidate the different applications of LAN. CO
U 15
5
35. List and explain the various physical devices that are used as CO
R 15
memory cells. 3

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 The student will be able to classify different forms of data
CO2 The student will be able to acquire different forms of data
CO3 The student will be able to analyze the working of hardware and software
CO4 The student will be able to organize the data
CO5 The student will be able to work on technologies related to multimedia and Internet

Assessment Pattern as per Bloom’s Taxonomy


CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 1 10 11
CO2 3 21 3 5 36
CO3 26 13 39
CO4 1 1 1 3
CO5 19 16 1 36
125
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS1004 Duration 3hrs


Course Name PROGRAMMING FOR PROBLEM SOLVING Max. Marks 100

Q.
No Questions CO BL M
.
PART – A (10 X 1 = 10 MARKS)
1. State whether the following condition will evaluate to True or CO R 1
False. 1
if ( (5<4) || (5>10) )
2. Locate the invalid variable(s) in the following declarations. CO R 1
 int number; 1
 float if;
 int variable_count;
 int $main;
3. Define an Algorithm. CO R 1
2
4. The data type of the controlling statement of a switch statement CO R 1
cannot be of the type________ 2
(a) int (b) char (c) short
(d) float
5. Identify the unconditional branching statement that terminates the CO U 1
execution of a loop. 3
6. List all conditional control statements used in C CO R 1
3
7. List the two ways a string can be declared. CO R 1
4
8. Identify the value of arr[1] from the below line of code CO U 1
int arr[]={9,6,4,2,3,5,1,7,8}; 4
9. Define recursion in C. CO R 1
5
10. Predict the error / output in the following program: CO U 1
#include<stdio.h> 6
#include<string.h>
void main(){
char str1[]="abc", str2[]="def";
printf("%d", strcmp(str1,str2));
}
PART – B (6 X 3 = 18 MARKS)
11. Define any three characteristics of computer. CO U 3
1
12. List the operator precedence rules used in C programming CO U 3
language. 2
13. Write a simple program to find whether a number is a multiple of 2 CO A 3
or not. 3
14. Explain the Linear search algorithm with an example. CO U 3
4
15. Describe a function prototype along with its syntax. CO U 3
5
16. Develop an application in C programming to store 5 user names A CO 3
and addresses using structures. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No 17 to 23, Q. No 24 is Compulsory)
17. a. Explain the various parts of a C program along with its CO U 4
features. 1
b Write the algorithm to find the area of the rectangle by getting CO U 8
. the value from the user and develop the program for the same. 1

18. a. Explain the arithmetic operators with sample code. CO U 5


2
b Write a C program to find the interest at the interest rate of 7% CO A 7
. p.a. and 10% p.a. and compare. 2

19. a. Develop a function to count the digits of a number and use it to CO A 9


check whether the given number is an Armstrong number or 5
not.
b Differentiate between ‘if’ loop and ‘while’ loop. CO U 3
. 3

20. a. Define an array and explain the declaration of CO U 6


multidimensional arrays with an example. 4
b Write a C program to generate a geometric series using array. CO A 6
. 4

21. a. Discuss how the C structures are declared in detail with CO U 6


example. 6
b Using functions, write a C program to find the odd numbers CO A 6
. from an integer array and print them. 5

22. a. Write a program in C to add two matrices of MXN order. CO A 8


4
b Write a program to find the length of two strings, and compare CO U 4
. and concatenate them using string functions. 4

23. a. Develop an application in C using structures to maintain and CO A 8


display the records with the name, register number, place and 6
percentage of marks of n students.
b Develop a C program to interchange two numbers using the CO U 4
. call by reference method 6
COMPULSORY QUESTION
24. a. Develop a C program to find the factorial of a given number CO A 6
using the recursion function. 5
b Write the C program for sorting an array of numbers given by CO A 6
. the user in ascending and descending order. 4
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development process.
CO2 Identify the data type to represent the real time data representation and operators for
computation.
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using the
divide and conquer approach.
CO5 Formulate algorithms and programs using arrays, pointers, and structures.
CO6 Create a new application software to solve real-world problems.

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2001 / 16CS2003 / CS245 / CS101 Duration 3hrs


Course Name BASICS OF COMPUTER PROGRAMMING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (20 X 1 = 20 MARKS)
Variables common to all functions in a program are known as CO
1. U 1
___________. 1
CO
2. U 1
The exit-controlled loop in C is _____________. 1
CO
3. U 1
Define ASCII. 1
CO
4. U 1
List the statement used for input and output function. 1
CO
5. U 1
Give an example of integer constant. 1
_________________ can be used to store different data under a CO
6. U 1
single name. 1
CO
7. U 1
____________is the format specifier used for integer. 1
CO
8. U 1
Give an example of spreadsheet application. 1
CO
9. U 1
List any two examples of bitwise operator. 1
CO
10. U 1
State the escape sequence of newline character. 1
CO
11. An 1
Differentiate = operator and == operator. 1
CO
12. U 1
List the usage of recursive function. 1
CO
13. U 1
______ is the size of the character variable. 1
CO
14. U 1
Give any two examples of variable. 1
CO
15. U 1
Define interpreter. 1
CO
16. U 1
State any two input output function. 1
CO
17. U 1
List any two examples of operating system. 1
CO
18. U 1
List any two rules of a constant. 1
CO
19. U 1
Name any one iterative statement. 1
CO
20. U 1
Give any one example of three dimensional array. 1
PART – B (10 X 5 = 50 MARKS)
(Answer any 10 from the following)
CO
21. Discuss the characteristics of fifth generation computers. U 5
1
CO
22. Design the truth table for bitwise AND and NAND operator. C 5
2
CO
23. Discuss about the different data types in c programming. U 5
2
CO
24. Describe the break statement with suitable example. U 5
2
Develop a c program to find whether the given number is CO
25. C 5
positive or negative. 3
CO
26. Report on switch case statement with suitable examples. U 5
2
CO
27. List any five string functions with suitable examples. R 5
2
Develop a c program to find the smallest of n number using CO
28. C 5
array. 4
CO
29. Compare and contrast the structure and union. An 5
2
Develop a c program to create a structure for loan details CO
30. C 5
(loanno, name_of_customer, amount) and access the same. 6
List any five applications of array in the real world and explain CO
31. R 5
the same. 5
CO
32. Demonstrate sum of n numbers using function. A 5
6
PART – C (2 X 15 = 30 MARKS)
(Answer any 2 from the following)
33. a. CO U 8
Discuss about the different classification of computer.
2
b Design a block diagram and explain the basic computer CO C 7
. organization. 1
34. Explain the various operators available in C with suitable CO U 15
examples. 3

35. Solve the following CO C 15


(i) ( 25 ) 10 = ( ? ) 2 1
(ii) ( 49 ) 10 = ( ? ) 8
(iii) ( 2456 ) 10 = ( ? ) 16
(iv) ( 11011 ) 2 = ( ? ) 10
(v) ( 1234 ) 8 = ( ? ) 10
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the fundamental principles of programming.
CO2 Gain knowledge on the concepts of structured programming.
CO3 Understand logics of solving problems.
CO4 Solve problems using basic programming techniques.
CO5 Apply programming to solve real world problems.
CO6 Illustrate the role of programming in real life scenarios.
Assessment Pattern as per Bloom’s Taxonomy
CO / BL R U A An E C Total
CO1 24 1 22 47
CO2 5 23 5 5 38
CO3 15 5 20
CO4 5 5
CO5 5 5
CO6 5 5 10
125

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2005 Duration 3hrs


Course Name CRYPTOGRAPHY AND NETWORK SECURITY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the type of attack from the following diagram. CO U 1
1
CO R 1
2. List the authentication requirements. 1
State whether Symmetric and Asymmetric cryptographic algorithms CO R 1
3. need key exchange. 2
CO R 1
4. Define ElGamal encryption algorithm. 2
Identify any two applications where one way authentication is CO U 1
5. necessary. 3
CO R 1
6. Name the security services involved in digital signature. 3
CO U 1
7. Give examples for X.509 certification. 4
CO R 1
8. List the requirements of Kerberos. 4
CO U 1
9. Cite any two properties of Pretty Good Privacy. 5
10 CO U 1
. Relate the usage of IPsec in Cryptography. 6
PART – B (6 X 3 = 18 MARKS)

11 Divide the data “Better late than never into blocks using AES CO A 3
. Algorithm. 1 n
12 Estimate the value for encryption and decryption using RSA Algorithm CO U 3
. for the following. 2
P=17; q=11; e=7; M=88.
13 CO A 3
. Prioritize the role of compression function in Hash functions. 3 n
14 CO U 3
. Classify the different roles of the intruder. 4
15 CO A 3
. Infer the steps for preparing envelope data using MIME. 5 n
16 CO U 3
. Represent the structure of ESP packet format? 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO A 1
. . Explain in detail about DES and Triple DES. 1 2

18 a Calculate the cipher text from the given details using RSA CO A 6
. . Algorithm. 2
p=7, q=11, e=17,M=8. Discuss its merit
b Discuss the discrete logarithm and explain Diffie Hellman Key CO U 6
. Exchange algorithm with its merits and demerits. 2

19 a Analyze the given problem using Digital signature scheme. CO A 1


. . i. prime divisor q=3 and prime modulus p=7 prove that p 3 n 2
is a prime modulus of q.
ii. If g=2 and x=5 find, public keys and private keys using
Digital Signature Algorithm with relevant proof of
selection criteria.
iii. Given k=2 and H(M)=3 generate the signature of {r, s}.
iv. Verify the signature generated.

20 a Prioritize the importance of Certificate Authority in X.509 CO A 1


. . Certificates. 4 n 2

21 a Write short notes on CO A 1


. . i. Transport layer security 5 2
ii. Secure Socket layer

22 a Compute the value of key from the given problem and write short CO A 1
. . notes on each step. 2 2
Alice & Bob exchange the key. Assume α=5 q=83 XA=6 XB=10.
Find YA, YB, K.

23 a Summarize the concept of hashing techniques used in CO U 1


. . Cryptography. 3 2
COMPULSORY QUESTION

24 a Discuss authentication, header and ESP in detail with their packet CO U 1


. . format. 6 2
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
summarize the computer security concepts and their needs
1
CO
Apply the various symmetric and asymmetric key algorithms.
2
CO experiment with the various principles of cryptosystems, hashing algorithms and digital
3 signatures
CO
Recognize the importance of network security.
4
CO
evaluate network and internet security
5
CO
6 Explain the different types of virus/worms & firewalls.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 1 12 3 17
CO2 2 9 18 - 29
CO3 1 13 - 15 29
CO4 1 4 - 12 17
CO5 - 1 12 3 16
CO6 - 16 - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2010 Duration 3hrs


Course Name DESIGN AND ANALYSIS OF ALGORITHMS Max. Marks 100

Q.
Mark
N Questions CO BL
s
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List any two characteristics of algorithm. CO1 R 1
2. State the formula to calculate the space complexity. CO1 R 1
3. Examine any two applications of greedy method. CO2 R 1
Write the time complexity of the fractional knapsack problem
4. CO2 A 1
using greedy solution.
Identify the number of multiplications to be done for
5. CO3 R 1
multiplying the matrices A (10 X 6) and B (6 X 7).
6. Discuss the solution for two queen problem. CO4 U 1
7. Define branch and bound. CO4 R 1
8. List the characteristics of minimum spanning tree. CO5 R 1
9. Define the Topological Sorting of a graph. CO5 R 1
10
Differentiate between class P and class NP problems. CO6 U 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
Write short notes on Big-O notation with suitable example. CO1 A 3
.
The jobs J = (J1,J2,J3,J4,J5) are assigned profit Pi= (100, 60,
12
40, 20, 20), with deadlines Di = (1, 2, 2, 3, 1). Calculate the CO2 An 3
.
maximum number of jobs that can be completed.
13 Apply the dynamic programming approach to compute the
CO3 A 3
. longest common subsequence between " abcde" and " ace".
14 Calculate the total reduced cost for the following graph: CO4 An 3
.
Identify any three spanning tree from the following vertices.

15
CO5 R 3
.

16
Write short notes on Vertex Cover Problem. CO6 A 3
.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a Explain the steps in mathematical analysis of non-recursive CO1 U 6
. . method for the following problem:
Given two n × n matrices A and B, find the time efficiency
of the definition-based algorithm for computing their
product C = AB. By definition, C is an n × n matrix whose
elements are computed as the scalar (dot) products of the
rows of matrix A and the columns of matrix B:
b Apply Master’s theorem to represent the solution of the CO1 A 6
. following recurrence relations using the asymptotic
representations:
a) T(n) = T(n-2) + O(1)
b) T(n) = 3T(n-2) + n2

18 a Apply the optimal binary merge pattern algorithm for the CO2 A 6
. . following files f1, f2, f3, f4 and f5 with 2, 7, 9, 3 and 5
number of elements respectively. Calculate the number of
operations performed on each file.
b Sketch an algorithm for to find the set of jobs which can be CO2 A 6
. completed within the deadline with maximum profit value
using greedy technique.

19 a Using the dynamic programming technique, calculate the CO3 An 8


. . most efficient way to multiply the matrices A1, A2, A3 and
A4 together.
Array dimensions of the matrices are:
A1: 5 x 4
A2: 4 x 6
A3: 6 x 2
A4: 2 x 7
b Apply Floyd’s Algorithm and find all pairs shortest paths CO3 A 4
. for the given graph:
20 a The below graph shows cities and the distance between CO4 A 12
. . every pair of cities. Apply the branch and bound method to
travel between cities to find the path for the optimal tour.

21 a Illustrate the backtracking solution for the sum of subsets CO4 U 4


. . problem by using the state space tree for S = { 3, 5, 6, 7}
and d = 15.
b Solve the 0/1 knapsack problem by applying the Branch CO4 A 8
. and Bound. The capacity of the knapsack, m=15. Represent
the solution using the state space tree.
Profit 10 10 12 18
Weight 2 4 6 9

22 a Consider the undirected graph given. Construct a minimum CO5 A 8


. . spanning tree by applying Kruskal's algorithm.

b Calculate the total flow between 0 to 5 in following graph: CO5 An 4


.

23 a Describe the solution to the N-Queens problem with the CO4 R 6


. . algorithm using Backtracking.
b Apply Warshall’s algorithm and find all pairs shortest paths CO3 A 6
. for the given graph:
COMPULSORY QUESTION
24 a Consider the set of items S = {0.5, 0.7, 0.5, 0.2, 0.4, 0.2, CO6 U 8
. . 0.5, 0.1, 0.6} and bins of size 1. Explain the following in
detail:
a) First fit algorithm
b) Next fit algorithm
c) Best fit algorithm.
b CO6 R 4
State the CIRCUIT-SAT problem and prove that it is in NP.
.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 analyze given algorithm and express its complexity in asymptotic notation
CO2 design algorithms using brute force and greedy techniques
CO3 develop dynamic programming solutions for optimization problems
CO4 propose solutions using backtracking and branch-and-bound technique
CO5 solve problems using fundamental graph algorithms
apply suitable algorithmic technique to solve a problem and identify the problems belonging
CO6
to the class of P, NP-Complete or NP-Hard

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 6 9 - - - 17
CO2 1 - 13 3 - - 17
CO3 1 - 13 8 - - 22
CO4 7 5 20 3 - - 35
CO5 5 - 8 4 - - 17
CO6 4 9 3 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2013 Duration 3hrs


Course Name MACHINE LEARNING TECHNIQUES Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)

1. CO
Differentiate between Partitioning and Hierarchical Based clustering.
1 R 1
2. CO
Define entropy. 1 R 1
3. Consider the following SOM network. How many output nodes can fire CO U 1
simultaneously? What is the maximum number of clusters that can be 2
formed using SOM when provided with sufficient input data?

4. CO R 1
Which impurity measure is used for CART approach? 2
5. CO U 1
Mention the types of regression algorithms. 3
6. CO R 1
List the advantages of SVM. 3
7. Assuming that you want to cluster 5 datasets consisting of 2 attributes CO U 1
(x1, x2) into 2 clusters using the K-Means clustering algorithm. The 4
cluster outputs after the first iteration are C1= {(2,2), (3,3), (4,4)} C2 =
{(0,2), (2,0)}. Calculate the new cluster centroids of C1 and C2 at the
end of the first iteration.
8. CO U 1
Compare K-means clustering and Hierarchical clustering. 4
9. CO R 1
List the linkage methods used in clustering. 5
10 Consider the following input to the max-pooling layer. The pooling CO A 1
. size of neurons in this layer is (3, 3). What would be the output of this 6
pooling layer?
PART – B (6 X 3 = 18 MARKS)

11 List all the important terms of reinforcement learning algorithms and CO R 3


. discuss them in detail. 1
12 Discuss the weight updation equations of the LVQ algorithm in detail. CO U 3
. 2
13 CO R 3
. Define Bayes rule. 3
14 Identify the corresponding class label for ‘X’ using 3 – Nearest CO U 3
. Neighbour algorithm in the given figure. 4

15 CO U 3
. Differentiate classification and regression trees. 5
16 Write the pseudocode of the All-vs.-all (AVA) multiclass classification CO
. approach. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the geometric and logical machine learning models in CO U 6
. . detail with suitable examples. 1
b Determine the consistent hypothesis using Candidate elimination CO A 6
. algorithm for the given dataset. 1
Origin Manufacturer Color Decade Type Target
Japan Honda Blue 1980 Economy Positive
Japan Toyota Green 1970 Sports Negative
Japan Toyota Blue 1990 Economy Positive
Japan Honda White 1980 Economy Positive

18 a Calculate the covariance between the two variables Hb and PCV of CO A 6


. . the following sample dataset of blood donors. 2
Hb 16 14 13.5 13 12.5 12

PCV 46 42 44 41 39 31
b Summarize the various procedures involved in handling missing CO U 6
. and noisy data in data cleaning preprocessing method with suitable 2
examples.

19 a Generate a dendrogram for the given distance matrix using single CO A 6


. . linkage clustering approach. 3 n
A B C D E F
A 0
B 0.71 0
C 5.66 4.95 0
D 3.61 2.92 2.24 0
E 4.24 3.54 1.41 1 0
F 3.2 2.5 2.5 0.5 1.12 0
b Apply ‘K Nearest Neighbor’ approach to the following dataset and CO A 6
. show how the 3-NN classifier with majority voting would classify 3
{Age=30, Income=22000, Loan=15000, Buy=?}
Age Income Loan Laptop Buy
20 20000 10000 No
25 32000 10000 Yes
31 10000 5000 No
43 18000 6000 No
55 68000 20000 Yes
34 23000 5000 No
48 90000 20000 Yes

20 a Apply K-Means clustering to cluster the following eight points CO A 6


. . (with (x, y) representing locations) into three clusters: A1(2, 10), 4
A2(2, 5), A3(8, 4), A4(5, 8), A5(7, 5), A6(6, 4), A7(1, 2), A8(4, 9).
Assume the initial cluster centers as: A1(2, 10), A4(5, 8) and A7(1,
2).
b Describe the steps involved in achieving dimensionality reduction CO U 6
. through attribute subset selection. 4

21 a Analyze the given distance matrix and construct a dendrogram CO A 6


. . using a 5 n
single linkage agglomerative clustering algorithm.

b Apply decision tree algorithm on the following dataset and identify CO A 6


. the root node of the tree. (Note: Input attributes: Outlook, humidity 5
and Windy, Output attribute: Play)

22 a Construct the first level of the tree (i.e. the root node) using CO A 7
. . ''Decision Tree’ approach for the following dataset. 3
RID Age Income Student Rating Buy
1 <=30 High No Fair No
2 <=30 High No Excellent No
3 31..40 High No Fair Yes
4 >40 Medium No Fair Yes
5 >40 Low Yes Fair Yes
6 >40 Low Yes Excellent No
7 31..40 Low Yes Excellent Yes
8 <=30 Medium No Fair No
9 <=30 Low Yes Fair Yes
10 >40 Medium Yes Fair Yes
11 <=30 Medium Yes Excellent Yes
12 31..40 Medium No Excellent Yes
13 31..40 High Yes Fair Yes
14 >40 Medium No Excellent No
b Consider the following table and analyze the results using apriori CO A 5
. algorithm by generating frequent 2-itemset and 3-itemset with 3 n
minimum support = 2 and confidence = 70%.

23 a Apply the Naive Bayes classifier on the given dataset and determine CO A 6
. . the diagnosis class for the symptoms 3
<chills-Yes, runny nose-Yes, headache-Strong, fever-No>

b Construct SOM to cluster four given input vectors. CO A 6


. X1 = [1 0 1 0] 4
X2 = [1 0 0 0]
X3 = [1 1 1 1]
X4 = [0 1 1 0].
The number of clusters to be formed is 2. Assume the learning rate
as 0.5. The initial weight matrix is as follows.
wij = [0.3 0.5 0.7 0.2]
[0.6 0.5 0.4 0.2]
COMPULSORY QUESTION
24 a CO U 1
. . Explain the different types of ensemble learning with examples. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO1 describe the concepts, mathematical background, applicability, limitations of existing machine learning
techniques.
CO2 identify the performance evaluation criteria of the model developed
CO3 analyze and design various machine learning based applications with a modern outlook focusing on recent
advances.
CO4 build the learning model for a given task
CO5 apply some state-of-the-art development frameworks and software libraries for implementation
CO6 evaluate the performance of machine learning algorithms using suitable metrics

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 5 6 6 - - - 17
CO2 1 10 6 - - - 17
CO3 4 1 19 11 - - 35
CO4 - 11 12 - - - 23
CO5 1 3 6 6 - - 16
CO6 4 12 - - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2014 Duration 3hrs


Course Name OBJECT ORIENTED PROGRAMMING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Predict the output of the following C++ code: CO U 1
#include <iostream> 1
using namespace std;
int main(){
int a = 8;
cout << "ANDing integer 'a' with 'true' :" << a && true;
return 0;
}
2. Predict the output of the following C++ code: CO A 1
#include <iostream> 1
using namespace std;
int operate (int a, int b)
{
return (a * b);
}
float operate (float a, float b)
{
return (a / b);
}
int main ()
{
int x = 5, y = 2;
float n = 5.0, m = 2.0;
cout << operate (x, y);
cout << operate (n, m);
return 0;
}
3. Predict the output of the following Java code snippet: CO U 1
int var1 = 5; 1
int var2 = 6;
System.out.println(var1 > var2);
4. Predict the output of the following Java code: CO A 1
abstract class Bike{ 2
abstract void run();
}
class Honda extends Bike{
void run(){System.out.println("running safely");}
public static void main(String args[]){
Bike obj = new Honda();
obj.run();
} }
5. Differentiate between process based multitasking and thread based CO U 1
multitasking. 3
6. Demonstrate auto-boxing and auto-unboxing for Integer Type Wrapper CO U 1
class. 3
7. CO R 1
List the advantages of Generics in Java. 4
8. Identify the keyword used to refer the immediate parent class members CO R 1
from the sub class. 3
9. Predict the output for the following code: CO U 1
TreeSet<String> t = new TreeSet<String>(); 4
t.add("Apple");
t.add("Orange");
t.add("Kiwi");
t.add("Pineapple");
System.out.print(t.last());
10 Name the listener to recognize the state change of an item in Java CO R 1
. Swing. 6
PART – B (6 X 3 = 18 MARKS)

11 CO U 3
. Describe the looping control statements in C++ with suitable example. 1
12 Discuss any two different ways of creating arrays in Java? Explain with CO U 3
. example 2
13 List out the three uses of final keyword in Java and explain with CO R 3
. example. 3
14 Consider the following code: CO U 3
. class Demo { 4
int a,b;
double c,d; }
public class MainDemo
public static void main(String[] args) {
Demo obj = new Demo();
}}
Rewrite the above code by adding default and parameterized
constructors. Construct necessary objects to invoke the constructors to
initialize the data members of Demo class.
15 CO U 3
. Illustrate the usage of inter-thread communication. 5
16 Construct the code snippet to handle the event which is generated by CO A 3
. javax.swing.JButton. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss the logical and relational operators in C++ using suitable CO U 6
. . example. 1
b Illustrate passing objects to functions and returning object from CO U 6
. functions through an appropriate example. 1
18 a Develop a Java class called “Event” with Event_name, Budget and CO A 6
. . Venue as data members. Develop the member functions such as 2
add_event, edit_event and display_event. Demonstrate the above-
mentioned class with five array of objects.
b CO U 6
. Illustrate the three types of inheritance with suitable Java code. 2

19 a Develop an interface called “Engine” with set of methods CO A 1


. . changeGear(), speedUp(), applyBrakes(). Create two classes “Car” 3 2
and “Bike” with properties gear, speed which implement the
interface functionalities. Include a “Main” class to demonstrate the
accessing of those interface methods.

20 a Develop a Java application to illustrate exception handling which CO A 1


. . prompts the user to enter a number as an array size and then attempt 4 2
to declare an array using the entered size. If the array is created
successfully, display an appropriate message. Java generates a
NegativeArraySizeException if the user attempts to create an array
with a negative size, and a NumberFormatException if the user
attempt to create an array using a non-numeric value for the size.
Create necessary catch block to handle both the exception, and
displaying a message that indicates the array was not created.

21 a Develop a Java application to demonstrate the following operations. CO A 6


. . • Write your own profile into the file, "MyProfile.txt". The 5
profile contains the data such as name, regno, age and
CGPA.
• Read the contents of a file named "MyProfile.txt" by
character by character and write the same in another file
called "MyData.txt".
b Write a program that store the names of five students in an CO A 6
. ArrayList collection and display the same using Iterator. 4

22 a Develop a package named “mathematics” which contains class CO A 8


. . named BasicOperations to perform the basic arithmetic operations 4
(add, sub, mul, div, mod). Import this package in a Test class and do
a menu driven program to perform the basic arithmetic operations.
b CO A 4
. Write a Java program to print Fibonacci series. 1

23 a Illustrate a multi-threaded program which creates three threads CO A 8


. . named t1, t2, t3. t1 should print “Hello” for every 2 seconds, t2 4
should print “Welcome” for every 3 seconds and t3 should print
“Good Moring” for every 5 seconds. Repeat this for 5 times and
terminate the application with a message of “GOOD BYE”.
b Write a Java program to reverse a five digit integer number using CO A 4
. for loop without using array. 2
COMPULSORY QUESTION
24 a Develop a GUI program using Java programming for Dollar to CO A 8
. . Rupee convertor using Swing API as given below. 6
b CO U 4
. Discuss the importance of model-view-controller pattern in Java. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
define the object-oriented programming concepts.
1
CO select the relevant object oriented concepts to implement a real time application with design
2 patterns
CO
demonstrate the application of polymorphism in various ways
3
CO
illustrate the use of inheritance, exceptions, generics and collection
4
CO
develop applications with event-driven graphical user interface and file management
5
CO
6 describe software development process

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - 17 5 - - - 22
CO2 - 9 11 - - - 20
CO3 4 2 12 - - - 18
CO4 1 4 34 - - - 39
CO5 - 3 6 - - - 9
CO6 1 4 11 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2019 Duration 3hrs


Course Name SYSTEM SOFTWARE AND COMPILER DESIGN Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO
Give two examples of Language processors. 1 R 1
2. CO
Define Macro instruction. 2 R 1
3. Draw a parse tree for the string “xyyxy” from the given context free CO U 1
grammar. 4
S → AB
A → xB | λ
B → yA | zB
4. Determine the left factored grammar for the following grammar. CO U 1
S iEtS | iEtSeS | a 4
E b
5. List the possible LR(0) items of the given production. CO R 1
A → abc | xy 4
6. CO R 1
Define Synthesized attribute. 3
7. CO
List the type expression operators. 4 R 1
8. CO
Give an example for syntax directed definition. 3 R 1
9. CO
Define flowgraph. 6 R 1
10 CO
. List the peephole optimization techniques. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 Define the following: CO R 3
. a) Loading b) Relocation c) Linking 2
12 CO U 3
. Show how the LEX tool works to generate a sequence of tokens. 3
13 CO U 3
. Differentiate top down and bottom-up parsing techniques. 5
14 Eliminate left recursion from the following grammar. CO U 3
. X → XYd | Xa | a 4
Y → Ye | b
15 CO U 3
. Write a short note on the working of a bootstrap loader. 2
16 CO U 3
. Define a sound type system. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Show the steps in a language processing system using a flow CO U 8
. . diagram and explain each of them in detail. 1
b Explain how the assembler converts the assembly language CO A 4
. program into object code with an example. 1

18 Construct DFA for the regular expression ba(a | b)* by computing CO A 1


. the following positions. 4 2
a) Nullable
b) Firstpos
c) Lastpos
d) followpos

19 a Compute the predictive parsing table for the given grammar. CO A 8


. . Z → d | XYZ 4
X→a|Y
Y→c|ε
b Prove that the following grammar is ambiguous. CO A 4
. E→E+E 5
E→E*E
E → id

20 a CO R 6
. . Draw a general activation record and explain the fields in it. 6
b CO U 6
. Explain the parts of the YACC source program with an example. 6

21 Convert the arithmetic expression a + a * (b-c) + (b-c) *d into the CO A 1


. following forms. 5 2
a) Syntax tree
b) DAG
c) Three address code
d) Quadruples
e) Triples
f) Indirect Triples

22 a Describe the following type checking rules. CO U 4


. . i) Type Synthesis ii) Type Inference 3
b Illustrate the working of the various phases of compiler by showing CO A 8
. the output for the statement “a = b + c / 100” 3

23 a Construct the SLR parsing table for the grammar given below. CO A 6
. . E → T+E | T 4
T → id
b Consider the following SLR parsing table. Show the actions the CO A 6
. parser will take when parsing the string “a * b + a – ” 4
COMPULSORY QUESTION
24 Examine the issues faced in the design of a Code Generator phase CO A 1
. of the Compiler. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
explain algorithm and data structures for assembler
1
CO
develop algorithms for macros and loaders
2
CO
list and define various stages of compiler
3
CO
select and use standard tools and techniques in different stages of compiler design
4
CO
compare and contrast various methods for implementing the phases of a compiler
5
CO
6 design and construct different phases of the compiler

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 8 4 13
CO2 4 3 7
CO3 2 7 8 17
CO4 2 5 32 39
CO5 3 16 19
CO6 8 9 12 29
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2022 Duration 3hrs


Course Name WEB TECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Indicate the HTML code to include an external CSS file in the HTML CO
1. page. 1 U 1
CO
2.
Differentiate GET and POST method HTTP. 1 U 1
Define the HTML syntax used to attach the external JavaScript file in CO
3. an HTML document. 2 R 1
CO
4. Write the syntax for CSS. 2 R 1
Define the syntax to perform the page redirection in PHP. CO
5. 3 R 1
CO
6.
Name the event triggered when the HTML button element is pressed. 3 R 1
CO
7.
Name the PHP array variable used to store session data. 4 R 1
CO
8. Give an example php code to illustrate the ‘for’ loop statement. 4 U 1
CO
9. Write a code snippet to create an AngularJS module. 5 A 1
10 CO
.
Identify the CSS property to change the text size in an HTML page. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO A
.
Give an example for DTD in XML. 1 n 3
12 Describe any three super global variables in PHP with example code CO
. snippets. 2 U 3
13 Demonstrate the popup box functions in JavaScript with suitable CO
. examples. 3 U 3
14 A student class comprises data members such as Regno and name.
. Initialize the data members through the constructor. Use a member
function display () to display the details of the student. Write PHP code CO
to create the object and print the details. 4 A 3
15 CO
. List any three types of AngularJS filters with their examples. 5 U 3
16 CO
. Write a brief note on the ng-repeat directive using AngularJS code. 6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Elucidate the various types of List elements in HTML5. CO U 6
. . 1
b Explain the following HTML form elements with appropriate CO U 6
. examples. 1
 Text Field
 Password Field
 Radio Button
 Checkboxes
 File Upload
 Email Field

18 a Consider the webpage contains four parts. Write CSS rules to apply CO A 8
. . the following styles. 2
 1: Set the dotted border with a 5px thick, green color.
 2: Display an image with an opacity of 0.2.
 3: Display a text with italic and center alignment.
 4: Display a text in red color with a font size of 24px
b Explain the CSS box model with suitable HTML and CSS code. CO U 4
. 2

19 a Explain the six document object model methods in Javascript with CO U 6


. . proper programs. 3
b Demonstrate the selection and looping statements in JavaScript with CO U 6
. suitable examples. 3

20 a The following table is ‘student’ in a database called “CSE”. CO A 12


. . Regno Name Section 4
001 XYZ A
Apply HTML and PHP technologies to perform the following
operations.
a) Add 5 new students to the table.
b) View the content of the table.
c) Update a batch detail of a student.
d) Delete 2 students from the table

21 a Apply the AJAX technology to check if a username already exists in CO A 12


. . the database. 5

22 a Develop a HTML program with Javascript to calculate and display CO A 12


. . the BMI value and Status for the given weight and heights. 3
BMI = weight(kg)/[height(m)]2
Check the status using the following conditions.
• Underweight: BMI < 18
• Normal: BMI between 18 – 25
• Overweight: BMI between 25 – 30
• Obese: BM > 30

23 a Explain the working of AJAX in detail with its architecture CO A 12


. . diagram. 5 n

COMPULSORY QUESTION
24 a Design a dynamic shopping list by letting the user to add and CO A 8
. . remove the items using AngularJS directives. Get a new item value 6
from the user with text box and add it to the shopping list with cross
mark (x) on add button click. Also remove the item from the list
when the cross mark (x) is clicked.

Elucidate the following directives in AngularJS with suitable CO U 4


b examples. 6
. i) ng-app ii) ng-model iii) ng-init iv) ng-controller

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Identify the relevant properties and methods which facilitate dynamic application development.
CO2 Explain the development of fully functional web applications that incorporates planning, designing,
coding, testing, and publishing to a web server.
CO3 Apply latest client and server side technologies for creating interactive data driven websites.
CO4 Model dynamic web applications using suitable latest server-side technologies integrated with
database.
CO5 Formulate and build extensible web applications using the Model View Controller design pattern.
CO6 Select appropriate design standards for designing attractive web pages.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - 14 - 3 - - 17
CO2 2 7 8 - - - 17
CO3 2 15 12 - - - 29
CO4 1 1 15 - - - 17
CO5 - 3 13 12 - - 28
CO6 - 5 11 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2025 Duration 3hrs


Course Name BIG DATA PLATFORMS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (10 X 1 = 10 MARKS)
Name the file system that is distributed to run on commodity CO
1. R 1
hardware. 1
State the name of the concept that is based on dividing a large
CO
2. problem into smaller ones and each of them is carried out by one R 1
1
single processor individually.
Identify the type of data that comes from the likes, tweets & CO
3. U 1
retweets, comments, video uploads, and general media. 2
CO
4. List the 3 sources of big data. R 1
2
CO
5. Name the platforms on which YARN containers gets executed. R 1
3
CO
6. State the syntax to define a variable in Hive. R 1
3
CO
7. Recall any 2 commands used in Hive DDL. R 1
4
Identify the method used for distributing a single dataset across
CO
8. multiple databases, which can then be stored on multiple U 1
4
machines.
Name the secure cluster that use the operating system facilities to CO
9. R 1
offer execution isolation for containers 5
Identify the type of chart in Tableau that will be used for
10 CO
comparing multiple sets of data and representing their minimum U 1
. 6
and maximum values.
PART – B (6 X 3 = 18 MARKS)
11 CO
Paraphrase the use of big data in social network analysis. U 3
. 1
12 CO
Sketch the overview of Hadoop ecosystem. A 3
. 2
13 Discuss the following:
CO
. a) Mapper b) Reducer U 3
3
b) Combiner d) Partitioner
14 CO
List the important features of Oozie Bundles. R 3
. 4
15 Write hive commands for the following in Hadoop: CO A 3
. a) Creating a Database b) Creating a Table
5
b) Altering a Table
16 List the phases involved in the Analytic process of Big Data CO
R 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17 a Discuss the use of big data in preventing fraudulent activities CO
U 6
. . and list the most common types of financial frauds. 1
b Illustrate the impact of big data in retail industry and list the
CO
. ways through which Amazon has improved the profit in retail U 6
1
industry.
18 a Paraphrase the features and goals of Hadoop Distributed File CO
U 6
. . System (HDFS). 2
b CO
Describe in detail about the working of MapReduce. U 6
. 2
19 a CO
List the steps involved in MapReduce process. R 6
. . 3
b Illustrate the architecture of YARN and list the components CO
U 6
. involved in it. 3
20 a CO
Discuss in detail the Operators used in Pig. U 6
. . 4
b Identify the types of jobs involved in Oozie and also explain CO
U 6
. the functional components of Oozie with a suitable diagram. 4
21 a Discuss the different types of NoSQL databases with an CO
U 6
. . example. 5
b Describe in detail the following:
CO
. a) Flume b) Sqoop U 6
5
b) Mahout d) Clustering and Classification
22 a CO
Discuss in detail Distributed and Parallel Computing. U 6
. . 1
b Describe the following: CO
U 6
. a) Cloud Computing b) In-memory Computing 1
23 a CO
Discuss in detail about the different Hive Services. U 6
. . 4
b CO
Illustrate the different data types available in Hive. U 6
. 4
COMPULSORY QUESTION
24 a CO
Discuss in detail the types of Big Data Analytics. U 6
. . 6
b Explain in detail the following in Tableau: CO
U 6
. a) Data Types b) Tableau Charts 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Describe the big data concepts, data analytics life cycle and applications.
CO2 Illustrate the different eco system components of Hadoop.
CO3 Develop MapReduce programs for real world problems.
CO4 Justify the need of YARN Hadoop2 framework for big data analytics.
CO5 Classify various NoSQL databases.
CO6 Use big data analytics and data visualization techniques to analyze data and to provide business
insights.
Assessment Pattern as per Bloom’s Level
CO / P Remember Understand Apply Analyze Evaluate Create Total
CO1 2 27 - - - - 29
CO2 1 13 3 - - - 17
CO3 8 9 - - - - 17
CO4 4 25 - - - - 29
CO5 1 12 3 - - - 16
CO6 3 13 - - - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2057 Duration 3hrs


MOBILE APPLICATION DEVELOPMENT USING
Course Name Max. Marks 100
ANDROID

Q.
Mark
N Questions CO BL
s
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Name the type of menus available in android. CO3 R 1
2. List the features of android. CO3 R 1
Identify the component used to send information among any
3. CO3 U 1
applications.
Recall the controls used to manage the visibility of the
4. CO2 R 1
notification.
5. Name the call back methods in the android bounded services. CO2 R 1
6. List the operations of content providers in android. CO4 R 1
Identify the callback method that supports to remove all the
7. CO2 U 1
notifications.
Name the method used to retrieve the information of all
8. CO4 R 1
available networks.
9. List the callback methods in fragments. CO3 R 1
10
Recall the prerequisite to publish an android app. CO6 R 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
Summarize Android view groups. CO1 U 3
.
12
Compare android Dalvik machine and android runtime. CO1 U 3
.
13 Sketch the working of android content provider. CO4 U 3
.
Write a code snippet to send notification as
14
CATEGORY_ALARM when the user has enabled CO2 A 3
.
DoNotDisturb mode.
15
Write an android application code to manage WIFI. CO4 A 3
.
16 Write a mobile application code to create a TabLayoutMediator
CO5 A 3
. to link the TabLayout with ViewPager2.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a
Illustrate android activity life cycle with suitable diagram. CO1 U 6
. .
Write an android application code to implement the
following.

b
CO3 C 6
.

a Explain the ways to manage screen orientation changes in


18 CO3 U 12
. android.

19 a Develop an SQL android mobile application as exhibited in


. . the following.

CO5 C 12

20 a
Write a mobile application code to handle popup menu. CO3 A 6
. .
b Explain shared preference with an example android
CO4 U 6
. application.

21 a Write a mobile application code to implement the


CO2 A 12
. . following.
22 a Write an android application to manage the network and
CO4 A 12
. . internet connectivity.

23 a Explain fragment life cycle and its callback methods with


CO1 U 6
. . upward state transitions.
b
Write an android application to send a text message. CO4 A 6
.
COMPULSORY QUESTION
Develop an android application for call history using
swipeable view with Tab layout as show in the figure given
below. Formulate the ways to publish the application as
an .apk file.

24 a
CO6 C 12
. .

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 identify a significant programming component, involving the sensors and hardware features
of mobile devices.
CO2 use the power of background tasks.
CO3 model mobile applications with appropriate, layouts and user interfaces.
CO4 demonstrate applications with network connectivity, messaging and persistent storage.
CO5 design and develop android applications for real time problems.
CO6 build, sign and publish mobile applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 18 18
CO2 2 1 15 18
CO3 3 13 6 6 28
CO4 2 9 21 32
CO5 3 12 15
CO6 1 12 13
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2068 Duration 3hrs


Course Name PYTHON PROGRAMMING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Infer the output for the following program. CO U 1
print(28//4**2*4) 1
2. CO R 1
Find the correct symbol to indicate single-line comment in Python. 1
3. Print the second item in the fruits list given below. CO R 1
fruits = ["apple", "banana", "cherry"] 2
print( _______ )
4. CO R 1
Convert the binary number 1001 into equivalent decimal value. 2
5. CO U 1
Outline the concept of top-down design of problem solving in Python. 3
6. Write the Python program to show the use of + operator for different CO U 1
purposes. 3
7. Identify the suitable library to to convert colors between RGB and CO U 1
other coordinate systems. 4
8. CO R 1
State the significance Python Imaging Library(PIL). 4
9. CO U 1
Differentiate process and thread. 5
10 Identify the suitable mechanism in Python to address critical section CO U 1
. problem. 6
PART – B (6 X 3 = 18 MARKS)
11 Develop a Python program that asks the user to enter a password and CO A 3
. keep asking for the password until the correct password is entered. 1
12 Illustrate the creation of a dictionary and the method for accessing its CO U 3
. elements using Python code. 2
13 Analyse the output of the following. CO A 3
. def tri_recursion(k): 3 n
if(k > 0):
result = k + tri_recursion(k - 1)
print(result)
else:
result = 0
return result
print("\n\nRecursion Example Results")
tri_recursion(6)
14 CO U 3
. Write a Python program to draw square using Turtle programming. 4
15 Develop a Python code to create simple button event as shown below. CO A 3
. 5

16 CO
. Outline the key components and functionality of chat script in Python. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain various looping statements in python with suitable CO
U 6
. . examples. 1
b For a given integer M, print all the cube of integer numbers from 1, CO U 6
. where the cube is less than or equal to M, in descending order. 1

18 a Given the list of cities: cities = ["Paris", "Tokyo", "New York", CO A 6


. . "London"], express the code segment to perform the following 2 n
operations and display the list 'cities' after each operation:
 Append the city "Rome" to the list.
 Remove the city "Tokyo" from the list.
 Insert "Sydney" at index 2 in the list.
 Update "New York" to "Los Angeles" in the list.
b Construct a tuple named "colors" with five items representing CO A 6
. different colors and perform the following operations: 2 n
 Iterate through the "colors" tuple and print each color.
 Access the third item of the "colors" tuple using negative
indexing.
 Add a new color "Purple" to the "colors" tuple.
 Remove the color "Green" from the "colors" tuple.

19 a Develop a Python program to find the factorial of a number 10 CO A 6


. . using recursive function. 3
b Explain the concept of inheritance in object-oriented programming CO A 6
. with respect to Python classes. Provide an example of a base class 3
and a derived class, illustrating how inheritance is implemented and
how methods and attributes are inherited.

20 a Write a Python program to draw a square and a circle using the CO


. . Turtle module. 4 A 6
b Explain the following operation using Python code with PIL CO A 6
. package. 4
i) Change the image format.
ii) Crop an image to (75,300,220,320).
iii) Flip Image to top to bottom.

21 a Represent whether an individual is classified as a child, adult or CO U 6


. . elder based on their age using the GUI window and display the 5
result in a pop-up information message box.

b Develop a Python code to display the image as given below using CO A 6


. Image.show() method. 5

22 a Write a Python code utilizes event-driven programming, to develop CO A 6


. . a ticketing system for a busy event venue that hosts various 6 n
concerts, sports events, and exhibitions. The system needs to handle
ticket sales, entry validation, and event notifications efficiently to
ensure a smooth experience for attendees.
b Develop a Python code to read user name and password and submit CO A 6
. as shown below. 5
23 a Interpret the output for the following list operations: CO U 6
. . i) len([15,33,88]) 2
ii) [300,300] - [30,50,60]
iii) ['Hello!'] * 5
b Show how to count the number of lines from a text file "Book.txt" CO U 6
. which is not starting 2
with an alphabet "R" using a function in python.

The file "Book.txt" contains the following lines:

Ravi is drinking water.


There is a well.
A star is in the sky.
The sky is blue in color.
COMPULSORY QUESTION
24 a Imagine you are tasked with developing a system to manage CO A 6
. . inventory in a warehouse where products are produced by one group 6 n
of workers (producers) and consumed by another group
(consumers). The system needs to efficiently handle the concurrent
production and consumption of items to ensure optimal warehouse
operations.

Compare two potential implementations of this system:

 Implementation A utilizes Python's threading module to


manage producer and consumer tasks within the same
process.
 Implementation B utilizes Python's multiprocessing module
to manage producer and consumer tasks as separate
processes.
Discuss the advantages and disadvantages of each implementation.
b Develop a Python server program that can handle multiple client CO A 6
. connections concurrently using the socket module. Your server 6 n
should be able to accept connections from multiple clients
simultaneously and handle each client's requests independently.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
understand and apply the basic programming constructs of Python suitably
1
CO
infer the concepts of string processing, file I/O, lists and dictionary
2
CO apply modules for reusability and the object-oriented principles for modeling and developing
3 software system.
CO
make use of graphics for processing images.
4
CO
construct applications with graphical user interface.
5
CO
6 develop software solutions using multi-threading, networking and client-server concepts.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 13 3 17
CO2 2 15 12 29
CO3 - 2 12 3 17
CO4 1 4 12 17
CO5 7 15 22
CO6 4 18 22
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2072 Duration 3hrs


Course Name SOCIAL NETWORK ANALYSIS Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Social Network Analysis. CO1 R 1
2. State edges in a network. CO1 R 1
3. Give two examples of secondary sources for collecting network data. CO2 U 1
4. List the two primary formats for closed-ended questions. CO2 R 1
5. Differentiate clusters and dimensions. CO3 U 1
6. Name the components SAOM. CO3 R 1
7. List the ways to choose appropriate methods in large networks. CO4 R 1
8. List any two approaches to find the coreness. CO4 R 1
9. Define faction in Social Networks. CO5 R 1
10. State the importance of cohesion in a network. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Explain the path and walk with suitable examples. CO1 U 3
12. Differentiate between Census and Survey. CO2 U 3
Explain how randomization tests can be used to test a variety of network
13. CO3 U 3
hypothesis.
14. Describe one-mode networks. CO4 R 3
15. List the properties of equivalence class. CO5 R 3
16. Describe homophily and transitivity in a network. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Describe Strongly connected, Weakly connected and Unilaterally CO1 U 7
connected components with examples.
b. Construct an Adjacency matrix for the given directed graph. CO1 A 5
18. a. Explain in detail about connected graphs and disconnected graphs with CO1 U 5
examples.
b. Determine the various types of errors that occur in social networks. CO2 A 7

19. a. Describe the ways to construct a network from nodelist using UCINET CO2 U 7
DL Editor.
b. Write in detail about archival data collection. CO2 C 5

20. a. Explain hierarchical clustering in social network analysis to uncover CO3 U 7


patterns of relationships and identify influential individuals within a
network.
b. Describe correspondence analysis with suitable examples. CO3 R 5

21. a. Explain properties of one-mode and two-mode networks. CO3 U 5


b. Compute the closeness centrality for the following undirected graph. CO4 A 7

22. a. Explain graphing affiliation networks. CO4 U 5


b. Evaluate the Grivan-Newman algorithm to find communities for the CO4 An 7
following graph.
23. a. Explain different types of triad census in undirected graphs. CO5 U 7
b. Describe cliques in Social Networks. CO5 U 5
COMPULSORY QUESTION
24. a. Explain the procedure for examining the cohesive subgroup structure CO6 U 6
within the network.
b. Describe the combinatorial optimizations in a social network. CO6 U 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 describe the core concepts of social network and the underlying mathematics.
CO2 summarize the research design methods and different options for collection and management of
the network data
CO3 distinguish between the whole network and egocentric research designs.
CO4 apply suitable multivariate and statistical techniques for testing hypotheses with network data.
CO5 analyze the node’s position and structural similarities of network using suitable measures.
CO6 interpret various social networks using suitable tools.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 2 15 5 - - - 22
CO2 1 11 7 - - 5 24
CO3 6 16 - - - - 22
CO4 5 5 7 7 - - 24
CO5 4 12 - - - - 16
CO6 1 15 - - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2080 Duration 3hrs


Course Name VIRTUAL REALITY TECHNOLOGY Max. Marks 100

Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Virtual Reality. CO1 R 1
2. Identify the three I’s of VR technology. CO1 U 1
3. Define interaural time difference. CO2 R 1
4. Classify the types of HMDs. CO2 U 1
5. CO3 1
List the advantages of the workstations over PCs. R
Identify the key aspects used to characterize the distributive
6. CO3 U 1
network.
7. Define Toolkit. CO4 R 1
8. State the purpose of scene graphs in VR programming. CO4 R 1
9. Define cybersickness. CO5 R 1
10. List the applications of VR in the field of science and technology. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Compare the performance of DidjiGlove with CyberGlove. CO1 U 3
12. Sketch the optical arrangement present in a virtual binocular. CO2 A 3
Explain the working of multipipeline synchronization in a
13. CO3 A 3
distributed VR engine.
14. Sketch the scene graph for the following picture. CO4 A 3

15. Identify the various stages of VR human factor studies. CO5 U 3


Explain the role of virtual reality technology in the field of
16. CO6 A 3
education.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a Interpret the sequential process of VR technology through a CO1 A 4
. basic flow diagram.
b Compare the performance of an AC magnetic tracker with a CO1 U 8
. DC magnetic tracker.

18. a Illustrate the working mechanism of convolvotron with a CO2 A 8


. generic block diagram.
b CO2 U 4
. Compare 3D virtual sound with stereo sound using an example.

19. a Explain the description of a 3D virtual object using geometrical CO3 A 7


. modeling.
b Sketch the various network topologies employed for multiuser CO3 A 5
. shared virtual environment.

20. a Illustrate the working mechanism of the general haptics open CO4 A 7
. software toolkit with a diagram.
b CO4 A 5
. Explain the importance of scene graphs in VR programming.

21. a Illustrate the working of human auditory system using a neat CO2 A 6
. labeled diagram.
b Determine an expression for crosstalk found in speaker-based CO2 A 6
. 3D sound.

22. a CO5 A 7
. Explain the indirect effects of VR simulation on users.
b Analyze the impact of VR technology on the professional life CO5 A 5
. of the users. n

23. Explain the significance of virtual reality technology in the CO6 A 12


field of entertainment.
COMPULSORY QUESTION
24. CO6 A 12
Analyze the impact of virtual reality in the field of medicine. n

CO – COURSE OUTCOME BL – BLOOM’S LEVEL


COURSE OUTCOMES
CO1 recognize the virtual technology and usage of input devices.
CO2 identify the essential output devices, sound displays, graphics and feedback.
CO3 demonstrate workstation-based architecture for modeling.
CO4 analyze the programming tool kits in engineering the virtual reality methods.
CO5 relate the user performance and multimodality feedback.
CO6 understand the effect of virtual reality simulation on users.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 1 12 4 - - - 17
CO2 1 5 23 - - - 29
CO3 1 1 15 - - - 17
CO4 2 - 15 - - - 17
CO5 1 3 7 5 - - 16
CO6 1 0 15 12 - - 28
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS2087 Duration 3hrs


Course Name FUNDAMENTALS OF PYTHON PROGRAMMING Max. Marks 100

Q. CO
B M
No. Questions
PART – A (10 X 1 = 10 MARKS)
1. Formulate the output of the following expression CO1 C 1
print(3*3**3//2)
2. Describe the symbol used for single line comment with an example. CO1 U 1
3. Write the output of the following segments of code. Months = “Mon, Tue, CO2 R 1
Wed, Thu, Fri” print(Weeks[::5])
4. Write a Python command to insert 5 in a list ‘‘L’’ at 3rd CO2 U 1
position.
Describe the syntax of if else statement.
5. CO3 E 1
6. Find the output of the following expression if the CO3 U 1
list1 = [7, 8, 9, 10, 11 ]
print(list1[3])
7. Define Recursive function. CO4 R 1
8. Find the output of the below python code CO4 U 1
person = {
"name": "John",
"age": 30,
"city": "New York"
}

print("Name:", person["name"])
print("Age:", person["age"])
print("City:", person["city"])

9. Recognizeand write the output for the following code. CO5 U 1


A = ["John", 23, 2023] print(set[A])
10. Identify the output of the following code segment. CO5 C 1
b = "happy"
print("H" + b[4:])
PART – B (6 X 3 = 18 MARKS)
11. Develop a python program to find the maximum of 3 numbers.
CO1 C 3
12. Differentiate List and Tuples with suitable example.
CO2 U 3
13. Develop a program to generate all even numbers between 1 to 10.
CO3 C 3
14. From the following List, write a loop to print each items in a new line CO4 A 3
Months= {“Jan, “Feb”, “March”, “April”}
15. Define window and list out the window components.
CO5 R 3
16. Define IP Address, Ports, Servers and clients.
CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23, Qn.no 24 is Compulsory)
17. Design a python code to calculate the Fibonacci series
a. CO6 C 6
b. Discuss while loop statement with suitable example programs.
CO2 U 6

18. Discuss about the control statement with suitable example.


a. CO2 U 6
b. Generate a python code by considering 2 tuple CO6 C 6
tuple1 = (1, 2)
tuple2 = ('apple', 'banana')
 Print all the items in the tuple.
 Accessing element in tuple.
 Concatenate the tuple.
 Check the membership in a tuples

19. a. Develop a python program to prepare a list CO2 C 6


car_name=[“Ford”,”Maruti”,”Renault”]
 Print all the items in the list.
 Find the length of the list.
 Update the second item of the list as “BMW”.
 Remove the last item in the list and print the list
Explain the exception handling with example.
b. CO3 U 6

20. a. Develop a python program by considering two sets of elements A = CO2 C 6


{1.0,2.0,3.0, “apple”,5,6} and B = {“apple”,5,6,7.0,8.0,9.0}

 Find and print the difference between set A and set B.


 Find the common elements in the above given two sets A and
B.
 Construct a code segment to find all the elements of A except
the common elements of A and B.
 Develop a code segment to find all the elements of A and B
except the common elements of A and B.
b. Explain type casting with a suitable python code. CO1 U 6

21. Explain Event-driven Programming with example.


a. CO5 U 6
Develop a python program with the given input string CO3 C 6
S = “Helloworld” to perform the following operations.
b.  Perform capitalization of the input string.
 Calculate the length of the input string.
 Convert the input string to lower case.
 Access the last character of the string.

22. a. Formulate a python code by analyzing the given dictionary dict = CO4 C 6
"name": "John", "age": 30, "city": "New York"} and perform the
following operations.
 Add a new key-value pairs.
 Remove all the key-value pairs.
 Update the value of Dept from CSE to ECE available in
the dictionary.
 Modify the value of existing key
b. Review the application of user-defined packages in Python.
CO3 U 6

23. Explain the storing and retrieving of data with examples


a. CO5 U 6
Generate the following pyramid patterns for wall painting.
b. CO3 C 6
*
**
***
****
*****

Compulsory:
24. Discuss the file operations in Python using your own examples. CO6 U 12

COURSE OUTCOMES
CO1 describe the datatypes, expressions and type conversions in Python
CO2 use functions, control statements, strings, lists and dictionaries in python programming.
CO3 demonstrate the concept of object, class inheritance and polymorphism in Python.
CO4 write user defined functions, classes in python.
CO5 develop GUI based Python program and to read and write files using python programming.
CO6 create python program for real world applications

Assessment Pattern as per Bloom’s Taxonomy


CO / BL Remember Understand Apply Analyze Evaluate Create Total

CO 1 7 4 11
CO 2 1 16 12 29
CO 3 13 1 15 29
CO 4 1 1 3 6 11
CO 5 3 13 1 17
CO 6 3 12 12 27
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3001 Duration 3hrs


Course Name ADVANCED ALGORITHMS Max. Marks 100

Q. B
Questions CO M
No. L
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Analyze the complexity of a binary counter in terms of cost using CO A 0
. aggregation, accounting and potential methods. 1 n 8
b Apply Dijkstra’s algorithm to find the shortest path for the given CO A 0
. graph G. 5 8

2. a Construct minimum spanning tree for the given graph using CO A 1


. Kruskal’s algorithm. 5 0

b Compute maximum independent set and minimum independent CO A 0


. set of the given graph. 1 6
3. a Interpret the maximum flow using Edmond Karp’s algorithm. Let CO U 1
. the source be 0 and the sink be 5. 2 0

b Describe the algorithmic steps of Edmond's Blossom algorithm to CO R 0


. compute augmenting path. 2 6

4. a Estimate the shortest distance for the following graph using CO U 1


. Floyd- Warshall algorithm. Also enumerate the steps of the 2 6
algorithm.

5. a Solve the linear system using LUP Decomposition. CO A 1


. x+y+z=1 3 6
4x+3y-z=6
3x+5y+3z=4

6. a Determine the optimal value by maximizing the fitness function CO A 1


. using Simplex method 3 6
max x-y+z
constraints
2x+y-3z  40
x+z  25
2y+3z  32
x, y, z  0

7. a Estimate the Greatest Common Divisor of 98 and 140 using CO U 0


. Euclid algorithm. 4 8
b CO U 0
. Explain Schonhage Strassen Integer Multiplication algorithm. 4 8
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a CO R 1
. Describe the principle of Randomized Algorithms 6 0
b Explain Vertex Cover Problem and enumerate the approximation CO U 1
. algorithm to solve it. 6 0

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 state the correctness of the basic algorithms for the classic problems.
CO2 understand the mathematical foundation in analysis of algorithms
CO3 analyze the efficiency of algorithms using time and space complexity
CO4 understand different algorithmic design strategies
CO5 choose the appropriate data structure for solving a particular set of problems.
CO6 developing efficient algorithms of various problems in different domains

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 6 8 14
CO2 6 26 32
CO3 32 32
CO4 16 16
CO5 18 18
CO6 10 10 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3002 Duration 3hrs


Course Name ADVANCED COMPUTER NETWORKS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Illustrate the frame format of NRZ, NRZI and stress on the CO U 1
. importance of Error detection. 1 6

2. a Illustrate the architecture of DHCP with its frame format. Mention CO A 1


. the difference between ICMP and DCMP. 2 6

3. a Compare and Contrast IPV4 and IPV6 along with its fragmentation CO U 1
. details. 2 6

4. a Compare and contrast the various routing protocols along with its CO U 1
. algorithm. 3 6

5. a Illustrate the working principles of HTTP and DNS with suitable CO A 1


. diagrams. 3 6

6. a Explain the transport protocols UDP and TCP with necessary CO U 1


. diagrams. 4 6

7. a Narrate how OpenFlow has revolutionized the traditional Ethernet CO R 1


. switching with relevant figures. 5 0
b CO R 6
. Show the advantage of using SDN in today’s networking domain. 5
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a Summarize the Socket Address structure and write the IPV4 and CO U 2
. IPV6 socket address. 6 0

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 identify and discuss the concepts underlying protocols, and their main characteristics and
functionality.
CO2 identify the various TCP/IP protocols that used for particular networking application.
CO3 recognize the requirement of Interior and exterior routing protocols that are used for different
networks.
CO4 understand the behavior of internetworking different networks in MPLS networks.
CO5 apply knowledge of the TCP/IP layering model to intelligently debug networking problems.
CO6 evaluate theoretical and practical concepts behind the design of multi-constrained
applications and services.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 16 16
CO2 16 16 32
CO3 16 16 32
CO4 16 16
CO5 16 16
CO6 20 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3004 Duration 3hrs


Course Name ADVANCED CRYPTOGRAPHY AND NETWORK SECURITY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Explain the encryption and decryption of Advanced Encryption CO A 10
1.
. Standard in detail. 1
b Explain the Open Systems Interconnection security architecture. CO A 10
. 1
(OR)
a Analyze the effectiveness of Diffie-Hellman key exchange CO A 10
2.
. algorithm with an example. 2 n
b Compute encryption and decryption using RSA algorithm by CO A 10
. considering the following parameters: p=11, q=13, e=11 and M=7. 2

a Illustrate the process of message authentication and explain the CO A 10


3.
. various authentication requirements. 3
b Evaluate the potential strengths of Secure Hash Algorithm. CO A 10
. 3 n
(OR)
a Sketch the format of the X.509 certificate. CO A 10
4.
. 4
b Describe the authenticated services provided by kerberos in detail. CO U 10
. 4

a Examine the operational description of Pretty Good Privacy. CO A 10


5.
. 5
b Identify the various considerations needed for web security. CO U 10
. 5
(OR)
6. a Explain the following systems in detail: CO A 20
. 1. Elgamal cryptosystem 2. Elliptic curve cryptosystem 2

7. a Describe digital signature algorithm and show how signing and CO U 10


. verification is done using DSA. 3
b Compare and contrast between the symmetric and asymmetric CO A 10
. encryption techniques. 4 n
(OR)
8. a Illustrate the working of intrusion detection system (IDS) with CO A 10
. suitable diagrams. 6
b Explain the IEEE 802.11i Wireless LAN Security with related CO U 10
. issues. 6
COMPULSORY QUESTION
a Explain the technical details of firewall and describe any three CO A 10
9.
. types of firewall with neat diagram. 6
b Sketch the architecture of IP Security and explain each component CO A 10
. briefly. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 recognize the importance of cryptography.
CO2 distinguish different kinds of attacks and design new security features.
CO3 apply key management using various symmetric and asymmetric key algorithms.
CO4 categorize cryptographic data integrity algorithms.
CO5 explain the different types of firewalls.
CO6 evaluate wireless network and cloud security.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 20 20
CO2 30 10 40
CO3 10 10 10 30
CO4 10 10 10 30
CO5 10 10 20
CO6 10 30 40
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3005 Duration 3hrs


Course Name ADVANCED DATA STRUCTURES Max. Marks 100

Q.
Mark
No Questions CO BL
s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a List the keys in the following binary tree in in-order, pre- CO1 A 8
. order, post-order and level order traversals.

b CO1 R 8
. Give an example of a Binary Tree and show the array
representation for the following tree:

2. a Write the pseudo code to find the shortest path in a tree. CO A 16


. Explain Single source path algorithm with the following 2
example.

3. a Solve Travelling Salesman Problem using Branch and Bound CO A 16


. Algorithm in the following graph- 3
4. a Given the jobs, their deadlines and associated profits as shown CO U 10
. below 4

(i) Write the optimal schedule that gives maximum


profit.
(ii) Are all the jobs completed in the optimal schedule?
(iii) What is the maximum earned profit?
b Construct a B-tree of order 5 from the list of items: CO A 6
. A, G, F, B, K, D, H, M, J, E, S, I, R, X, C, L, N, T, U, P 4

5. a Insert the Keys 1, 4, 7, 10, 17, 21, 31, 25, 19, 20, 28 and 42 in CO A 10
+¿¿
. this order in an initially empty B Tree of order 4. 5
b Describe the Breadth First Search algorithm of the graph with CO R 6
. an example. 5

6. a Construct the Huffman tree for the following characters with CO An 16


. the frequencies as shown below 4

7. a State AVL Tree Rotations and build the tree for the following CO An 10
. sequence of numbers: 15, 17, 11, 7, 53, 3, 13, 12, 8, 60, and 5
19. Demonstrate each insertion and rotation performed during
the tree formation process.
b Compute the in-degree and out-degree of the vertices in the CO U 6
. graph given. 5

PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a Consider the sum-of-subset problem, n = 4, Sum = 13, and w1 CO E 12
. = 3, w2 = 4, w3 = 5 and w4 = 6. Find a solution to the 6
problem using backtracking. Show the state-space tree leading
to the solution. Also, number the nodes in the tree in the order
of recursion calls.
b Briefly define "tractable problem" and "non-tractable CO R 8
. problem" with an example. 6

COURSE OUTCOMES
CO1 Select an appropriate design technique for finding solution to a problem.
CO2 Design algorithms using greedy and dynamic programming techniques.
CO3 propose solutions using backtracking and branch and bound technique
CO4 Analyze the efficiency of various algorithms and express its complexity in asymptotic
notation
CO5 Solve problems using fundamental graph algorithms.
CO6 identify the problems belonging to the class of P, NP, NP-complete or NP-hard

Assessment Pattern as per Bloom’s Taxonomy


CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 8 8 16
CO2 16 16
CO3 16 16
CO4 10 6 16 32
CO5 6 6 10 10 32
CO6 8 12 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3007 / 14CS3005 Duration 3hrs


Course Name ADVANCED DATABASE MANAGEMENT SYSTEMS Max. Marks 100

Q.
No QUESTIONS CO BL M
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a CO U 6
. Explain the contents of a system catalog. 1
b Consider the following relations and query: CO A 1
. Sailors(sid: integer, sname: string, rating: integer, age: real) 1 0
Reserves(sid: integer, bid: integer, day: dates, rname: string)

Assume that each tuple of Reserves is 40 byte long, that a page


can hold 100 Reserves tuples, and there are 1000 pages of such
tuples. Also, each tuple of Sailors id 50 bytes long, that a page
can hold 80 Sailors tuples and there are 500 such pages.

SELECT S.sname FROM Reserves R, Sailors S WHERE


R.sid=S.sid AND R.bid = 100 AND S.rating >5

Express the query in relational algebra and relational algebra


tree. Present multiple query evaluation plans and compute the
total cost of each plan.

2. a Define atomicity, consistency, isolation and durability and CO U 8


. illustrate them through examples. 2
b CO R 8
Describe the Srtict Two-Phase Locking (Strict 2PL) protocol.
. 3

3. a Describe the three steps in crash recovery in ARIES. Explain the CO U 8


. goals of Analysis Phase, redo phase and undo phase. 2
b Discuss any two concurrency control protocols that are not lock CO U 8
. based with suitable examples 2

4. a Discuss any two locking based concurrency control protocols CO U 8


. with suitable examples. 3
b Discuss how each of the following operators be parallelized CO U 8
. using data partitioning: scanning, sorting, join. Compare the use 4
of sorting versus hashing for partitioning.

5. a Discuss the following techniques for partitioning data: round- CO R 8


. robin, hash and range. 4
b Describe the three main architectures for parallel DBMSs. CO U 8
. Explain why the shared-memory and shared disk approaches 4
suffer from interference.

6. a CO R 8
Describe the three main architectures for distributed DBMSs
. 4
b Discuss how each of the following operators be parallelized CO U 8
. using data partitioning: scanning, sorting, join. Compare the use 4
of sorting versus hashing for partitioning.

7. a Name any two applications that deal with spatial data and CO U 6
. specify their requirements on a database system. Explain feature 6
vector and mention its uses.
b Consider the Employees and Departments relations described as CO A 1
. follows: 4 0
Employees(eid: integer, did: integer, sal: real)
Departments(did: integer, mgrid: integer, budget:
integer)
The above tables are now stored in a distributed DBMS with 10
sites. The Departments tuples are horizontally partitioned across
the 10 sites by did, with the same number of tuples assigned to to
each site and no particular order to how tuples are assigned to
sites. The Employees tuples are similarly partitioned, by sal
ranges, with sal ≤100,000 assigned to the first site, 100,000 < sal
≤ 200,000 assigned to the second site, and so on. In addition, the
partition sal ≤ 100,000 is frequently accessed and infrequently
updated, and it is therefore replicated at every site. No other
employee partition is replicated. Describe the best plan(unless a
plan is specified) and give its cost for the following cases:
i) Find the highest paid manager
ii) Find the highest paid employee with salary between
450,000 and 550,000.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a Explain how certificates are issued to sites and validated by a CO U 1
. browser using the SSL protocol. Explain the use of SSL to 6 0
protect passwords and other sensitive information being
exchanged. Discuss how secure electronic transaction protocol is
added advantage over SSL.
b Differentiate between symmetric and public-key encryption. CO U 1
. Explain how weakness of symmetric-key encryption is addressed 6 0
in public key encryption.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Identify alternative designs for implementation of database systems, including data models, file structures, index
schemes, and query evaluation.
CO2 Recognize appropriate techniques for transaction processing, concurrency control, backup and recovery that
maintain data integrity in database systems.
CO3 Apply locks and isolation levels to the concurrent transactions
CO4 Analyze the operation of parallel and distributed databases
CO5 Design and implement significant database objects such as file structures and index schemes
CO6 Explain the concepts of information retrieval and spatial data management.
Assessment Pattern as per Bloom’s Taxonomy
CO / BL R U A An E C Total
CO1 6 10 16
CO2 24 24
CO3 8 8 16
CO4 16 24 10 50
CO5
CO6 26 26
132

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3009 Duration 3hrs


Course Name ADVANCED MACHINE LEARNING Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a. Summarize the categories of machine learning techniques and CO1 U 10
elaborate the elements involved in designing a machine learning
system.
b Compare Bagging and Boosting techniques, outlining the key CO1 An 10
. differences in their approaches, advantages, and potential limitations.
(OR)
2. a. Determine the parent/root node of the decision tree for the following CO2 A 20
dataset and show all the intermediate steps.
Gender Age Marital Education Class
Male Young Single High school Churn
Female Young Single College Churn
Male Middle Married Bachelor Retained
Female Young Single High school Churn
Male Senior Married Master Retained
Male Middle Married Bachelor Retained
Female Middle Single College Retained
Female Young Single Bachelor Churn
Male Middle Married High school Retained
Female Senior Married Master Retained

3. a. Explain the basic principle behind Affinity Propagation clustering CO3 U 10


and the role of "exemplars" in forming clusters.
b Describe the steps involved in the Spectral Clustering algorithm. CO3 U 10
. Include details about the construction of the affinity matrix, graph
Laplacian, and how the final clusters are derived.
(OR)
4. a. Examine the various kernel methods available for dealing with CO4 A 20
nonlinear data in machine learning and include explanations of how
these methods function, their benefits, and practical scenarios in
which they are applied.

5. a. Analyze a real-world problem in a specific domain such as CO5 An 10


healthcare, or finance and propose a Bayesian Network structure to
model the problem. Elaborate the fundamental principles of Bayesian
Networks and its role in modelling probabilistic relationships
between variables.
b Explain the fundamental concepts behind undirected Gaussian CO5 U 10
. graphical models and provide insights into the typical domains where
these models find common application.
(OR)
6. a. Explain the process of learning DAG structures with latent variables CO5 U 10
and the challenges in handling latent variables in structure learning
algorithms.
b Discuss the applications of Random Forest in various domains, such CO1 An 10
. as finance, healthcare, and image classification. Provide examples of
how Random Forest has been effectively used in specific real-world
scenarios.

7. a. Compare and contrast Probabilistic Generative Models with CO2 An 10


Probabilistic Discriminative Models.
b Describe the key components of an RBF Network and their CO4 U 10
. importance in enabling the network to perform tasks like
classification or regression.
(OR)
8. a. Discuss the hierarchical approach in machine learning and provide a CO3 U 10
detailed explanation of the procedures employed in hierarchical
agglomerative clustering.
b Sketch a dendrogram for the following distance matrix using single CO3 A 10
. linkage agglomerative clustering algorithm.
A B C D E F
A 0
B 0.71 0
C 5.66 4.95 0
D 3.61 2.92 2.24 0
E 4.24 3.54 1.41 1 0
F 3.2 2.5 2.5 0.5 1.12 0
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
9. a. Describe the architecture, components, and the working of a Deep CO6 U 10
Belief Network (DBN) with neat diagram.
b Compute max pooling and average pooling in the convolutional CO6 A 10
. neural network for the given matrix.
5 3 1 3
8 5 2 6
4 9 1 9
1 2 3 4
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Summarize the theoretical and practical aspects of advanced machine learning techniques.
CO2 Compare the strengths and limitations of selected machine learning techniques and where
they can be applied for different applications.
CO3 Identify the relevant tool for different machine learning techniques.
CO4 analyze the problem thoroughly and identify the advanced machine learning approaches and
paradigms.
CO5 Design and implement suitable machine learning technique to a given task.
CO6 Evaluate and compare the performance of the selected approaches for a given problem.
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3015 Duration 3hrs


Course Name CLOUD COMPUTING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the types of hypervisors with relevant examples. CO R 10
. 1
b Imagine you're assigned to establish a virtualized environment for a CO A 10
. small business aiming to operate multiple operating systems on a 1
single physical server. Determine the type of hypervisor you would
choose and justify your answer.
(OR)
2. a Describe cloud computing and its key characteristics, challenges, CO R 10
. advantages, and disadvantages. 2
b Distinguish the service models of cloud computing using CO U 10
. appropriate diagrams and elaborate on each model. 2

3. a Explain the differences and potential benefits of using a public CO U 10


. cloud, private cloud, and hybrid cloud infrastructure. 3
b Illustrate the architecture with the components required to automate CO A 10
. the deployment process of an automation server using OpenStack. 3
(OR)
4. a Determine a data storage solution using Amazon SimpleDB to CO A 20
. store user profile information for a small-scale web application. 4
Emphasize any factors or constraints you would need to consider
during the implementation process.

5. a Summarize the Hadoop Distributed File System (HDFS) and its CO U 10


. architecture. 4
b Construct a Hadoop MapReduce task aimed at determining the CO A 10
. most visited URLs during peak hours using a dataset containing 4
website visit records, user ID, timestamp, visited URLs, and time
spent on each page. Assess potential challenges regarding data
partitioning and aggregation and propose strategies to optimize
performance.
(OR)
6. a Explain the architecture and functionalities of Amazon EC2 CO U 20
. (Elastic Compute Cloud) as a cloud computing service. Highlight 3
real-world use cases where EC2 is employed and discuss the
considerations and best practices for optimizing EC2 usage in
different scenarios.

7. a Discuss how the cloud infrastructure addresses data security CO U 20


. concerns at the network, host, and application levels. Identify 5
specific measures and best practices for securing data within each
layer of the cloud infrastructure.
(OR)
8. a Illustrate the architecture of identity and access management (IAM) CO U 20
. systems in the cloud. Determine how IAM solutions authenticate 5
users, authorize access, and manage privileges across cloud
services and resources.
COMPULSORY QUESTION
9. a Explain the architecture and components of Ansible. Illustrate the CO A 20
. process of using Ansible to automate tasks across multiple servers. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Infer the concept of virtualization in cloud computing.
CO2 Use the concepts of cloud storage, cloud networks and its management.
CO3 Identify the architecture, infrastructure and delivery models of cloud computing.
CO4 Categorize the services using cloud computing.
CO5 Apply the security models in the cloud environment.
CO6 Develop an automation solution for the cloud.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 10 - 10 - - - 20
CO2 10 10 - - - - 20
CO3 - 30 10 - - - 40
CO4 - 10 30 - - - 40
CO5 - 40 - - - - 40
CO6 - - 20 - - - 20
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3016 Duration 3hrs


Course Name CLOUD COMPUTING AND IOT Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Compare and contrast the Web 3.0 view and the panoramic CO An 8
. view of IoT applications. 1
b Outline the operational procedure and enumerate the IoT CO R 8
. technologies employed in the implementation of the smart 1
home system

2. a Classify the different types of middleware for IoT based on CO U 8


. their application domains and requirements. 2
b Examine the components and functionalities of the WSN CO A 8
. middleware architecture. 2

3. a Critique the challenges of IoT information security and how CO E 8


. they differ from traditional web security challenges. 3
b Describe the SCADA architecture that incorporates IoT CO U 8
. devices. 3

4. a Analyze the relationship between the Internet of Things CO An 8


. (IoT) and cloud computing. List out the possible ways to 4
integrate IoT devices and data with cloud services.
b Illustrate the salient features, characteristics, standardization, CO A 8
. and services of cloud computing and explain the importance 4
of middleware in cloud computing.

5. a Discuss the various implications of the deployment of a CO U 8


. cloud model in IoT. 4
b Design a cloud deployment architecture for a specific IoT CO C 8
. application. 5

6. a Describe the different QoS management tools and CO U 8


. technologies that are available in Cloud. 5
b Compare and contrast the different cloud deployment CO An 8
. models in terms of their suitability for IoT applications 5

7. a
Describe the cloud resource provisioning techniques, CO U 8
.
challenges and its types with relevant example. 4
b
Explain the concept of IoT kaleidoscope and how it can help CO A 8
.
in understanding the complexity and diversity of IoT 1
systems.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a Assess the various network security threats across the seven CO E 20
. layers of the OSI model in the Internet of Things. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 examine IoT Architecture and various protocols.
CO2 classify the IoT value chain structure (device, data cloud), application areas and
technologies involved.
CO3 design, develop and implement smart systems.
CO4 infer the advantages of Cloud Services.
CO5 learn about optimization of cloud storage.
CO6 apply various kinds of security mechanisms.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 8 8 8 24
CO2 8 8 16
CO3 8 8 16
CO4 16 8 8 32
CO5 8 8 8 24
CO6 20 16
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3016 Duration 3hrs


Course Name CLOUD COMPUTING AND IOT Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Enumerate the research challenges confronted by IOT applications. CO R 10
. 1
b Describe the four pillars of IoT with respect to distinct networking CO U 10
. technologies. 1
(OR)
2. a Describe the middleware architecture of Wireless Sensor Networks CO U 10
. with necessary diagram. 2
b Analyze on the technical aspects of wired and wireless networks in CO A 10
. terms of protocols. 2 n

3. a Enumerate the challenges of IoT Information Security. CO R 10


. 3
b Compare and contrast Web of Things and Internet of Things. CO U 10
. 3
(OR)
4. a Describe how Mobile Cloud Computing (MCC) uses cloud CO R 10
. computing to deliver applications to mobile devices. 4
b Compare and contrast MAI with XaaS. CO U 10
. 4

5. a Interpret the challenges of converging IoT and Cloud Computing. CO A 10


. 5
b Summarize the working principle of NIST’s SPI Architecture in CO U 10
. Cloud Computing. 5
(OR)
6. a Determine the need of resource provisioning in Cloud Computing. CO A 10
. 3
b Describe the implications of Cloud Computing in terms of CO U 10
. deployment. 3

7. Represent the technical characteristics of the DCM layers applied CO U 20


IoT value chain. 5
(OR)
8. Illustrate the working process of WoT portals for business CO U 20
intelligence and list out the various security challenges that is 3
enforced on IoT information security.
COMPULSORY QUESTION

9. a List the Security Threats at different layers of IoI. CO R 10


. 6
b Examine the need for Standardization Bodies for IoT and Cloud CO U 10
. threats at different layers of IOT. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Examine IoT Architecture and various protocols.
1
CO Classify the IoT value chain structure (device, data cloud), application areas and technologies involved.
2
CO Design, develop and implement smart systems.
3
CO Infer the advantages of Cloud Services.
4
CO Learn about optimization of cloud storage.
5
CO Apply various kinds of security mechanisms.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 10 20
CO2 10 10 20
CO3 10 40 10 60
CO4 10 10 20
CO5 30 10 40
CO6 10 10 20
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3022 Duration 3hrs


Course Name COMPUTER NETWORKS AND IOT Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Write in detail about the Protocol layers of internet stack CO
1. R 12
. along with their service models. 1
b Give examples to show how the layers of the TCP/IP CO
U 8
. protocol-suite correlate to any application of your choice. 2
(OR)
a CO
2. U 10
. Illustrate and explain the reference architecture of IoT. 3
b Compare and contrast frame relay networks and ATM CO
U 10
. networks. 3

a CO
3. U 10
. Illustrate and explain the reference model of IoT. 4
b Identify the main design principles and required capabilities CO
U 10
. of a IoT network. 3
(OR)
a Discuss on the various factors that support the M2M and IoT CO
4. U 10
. in the global context. 4
b Analyze the various factors required for data management CO
An 10
. and business process in IoT network. 3

Describe the IoT Architecture on the following aspects:


i. Functional View.
a CO
5. ii. Information View. U 20
. 5
iii. Deployment and Operational View.
iv. Other Relevant architectural View.
(OR)
Discuss on the following data link layer protocols:
a CO
6. i. IEEE 802.11 U 12
. 3
ii. IEEE 802.15
b Describe on the 3GPP machine type communication CO
U 8
. protocol. 4

Categorize and explain on the different factors that allow an CO


7. An 20
application to choose either HTTP or MQTT protocol. 6
(OR)

a Compare and contrast the transport layer protocols UDP and CO


8. U 8
. TCP. 3
Discuss on the following network layer protocols:
b CO
i. IPV4 U 12
. 2
ii. ICMP
PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
a Discuss on the 6LoWPAN along with its features, security CO
9. R 10
. and application. 5
b CO
U 10
. Explain on the different security protocols in IoT. 5

CO – COURSE OUTCOME BL –
BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the terminology and concepts of the OSI reference model and the TCP‐IP
reference model.
CO2 Apply different methods for simplification of boolean expressions.
CO3 Infer the vision of IoT from a global context.
CO4 Evaluate the IoT in Market perspective.
CO5 Design and understands state of the art – IoT Architecture.
CO6 Apply the real world IoT design constraints, industrial automation and commercial building
automation in IoT.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 12 12
CO2 20 20
CO3 50 10 60
CO4 28 28
CO5 10 30 40
CO6 20 20
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3023 Duration 3hrs


Course Name COMPUTER VISION Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Explain the concept of developing a monocular imaging system for CO U 8
. a robotics company where the system can accurately perceive 1
distances and objects in its surroundings using only a single
camera.
b Imagine, you are a computer vision engineer tasked with CO A 8
. developing a robust 3D reconstruction framework for a project that 1
involves reconstructing scenes from multiple images captured by a
camera. Develop the procedure to apply Direct Linear Transform
(DLT) algorithm.

2. a Mr. Vivin is working on a project where he needs to analyze binary CO A 8


. shapes extracted from medical images. Identify the way how he 2
would utilize boundary pattern analysis techniques to characterize
the shapes and extract meaningful features.
b Explain the steps involved in the photometric stereo process, CO U 8
. including data acquisition, surface normal estimation, and albedo 2
calculation.

3. a You've been hired by a hospital to improve their medical imaging CO A 8


. analysis system, specifically focusing on MRI brain scans for 3
detecting abnormalities like tumors. Identify the suitable multi-
resolution analysis algorithm to enhance the accuracy of tumor
detection and explain its implementation.
b A precision agriculture company tasked you with developing a CO U 8
. system for crop monitoring and management using texture-based 3
object recognition techniques. Analyze the aerial imagery to
identify different crop types, assess crop health, and detect potential
issues such as pests or disease and explain the design and
implementation procedure for such a system.

4. a Outline the process of selecting and adjusting regularization CO U 8


. parameters to optimize model performance. 4
b Identify the impact of camera motion, occlusions, and object scale CO A 8
. changes, on the accuracy and reliability of motion tracking 4
algorithms in videos.
5. a Illustrate the principles of Hough transforms and compare them CO U 8
. with other simple object recognition methods used in computer 5
vision.
b Analyze the significance of using Principal Component Analysis CO A 8
. (PCA) in dimensionality reduction and feature extraction tasks in 5 n
disease diagnosis and prognosis application in healthcare sector.

6. a Explain the principles of shape correspondence and shape matching CO U 8


. to enhance object recognition in robotics. 5
b In the context of surveillance systems, identify the suitable CO A 8
. background subtraction and modeling techniques for detecting and 4 n
tracking the movement of harmful wild animals in residential areas.
Analyze the effectiveness of such algorithms in terms of accuracy.

7. a Construct the architecture of Curvature Scale Space (CSS) CO A 8


. boundary pattern analysis algorithm for automated detection of 6
anomalies in X-ray images for bone fracture detection and explain
the functionality of each block.
b Develop a shape-based object recognition system for autonomous CO A 8
. vehicles to identify pedestrians in urban environments. Outline your 6
approach to integrate shape priors into the recognition algorithm to
improve accuracy and robustness.
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a You're leading a research team tasked with designing advanced CO A 1
. vehicle vision systems for autonomous driving applications. 6 n 0
Analyze the critical hurdles hindering the development and
deployment of vision systems tailored for autonomous driving, and
how can they be effectively navigated?
b A mobile manufacturing industry demands designing of CO A 1
. computational photography application for smartphones to enhance 6 n 0
the low-light photography capabilities. Examine the possible
approach in developing this application by considering the key
components of computational photography techniques.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 define image formation models and light effects in computer vision
CO2 identify the feature extraction methodology suitable for computer vision applications
CO3 apply the segmen3tation approaches in image analysis
CO4 analyze the motion detection and estimation techniques
CO5 construct image analysis models for object recognition
CO6 explain the computer vision techniques used for real time applications

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 8 8 16
CO2 8 8 16
CO3 8 8 16
CO4 8 8 8 24
CO5 16 8 24
CO6 16 20 36
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3026 Duration 3hrs


Course Name CYBER FORENSICS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Examine the characteristics and classification of CO R 8
. cybercrimes. 1
b In 2023, the XYZ Corporation, a multinational technology CO A 8
. company, fell victim to a significant cybercrime incident. 5
Hackers breached their internal network and gained
unauthorized access to sensitive customer data, intellectual
property, and employee information. Apply the forensics
investigation, collection, and examination methods and
discuss the forensic investigation techniques to be followed
by a digital forensics’ investigator.

2. a Identify the types of hackers by detailing the various CO U 16


. techniques used by them for hacking. Summarize the 4
measures and strategies to defend against hacking attacks.

3. a Illustrate the types of financial cybercrimes facilitated CO A 16


. through digital methods and their mitigation techniques. 1

4. a Describe the major security concerns and functions related CO U 8


. to computer and internet security. 5
b Discuss the characteristics of blended attacks and the tools CO U 8
. required to analyse the attacks. 3

5. a Consider the hypothetical case study where a large CO A 10


. multinational corporation has fallen victim to a cyber 2
extortion attempt. The threat actor claims to have stolen
sensitive customer data and threatens to release it unless a
substantial ransom is paid. Examine the response actions
taken and the subsequent forensics investigative analysis.
b Appraise an open-source forensics tool commonly employed CO An 6
. for analyzing disk and file systems. 3

6. a Enumerate the security issues and the myths associated with CO R 16


. outsourcing security contracts and describe the typical 2
outsourcing process.
7. a Explain cyber-terrorism with relevant national and CO A 16
. international incidents related to cyber-terrorism. 4

PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a In 2023, a 16-year-old student, Rahul, became a victim of CO U 10
. relentless cyberbullying through various social media 6
platforms. The perpetrators created fake profiles, posted
derogatory content, and engaged in harassment. Rahul and
his family decided to seek legal action. Discuss the legal
aspects of cyber laws as per the IT Act 2000 and its
amendment to the IT Act 2008 of the Indian Government for
the above scenario.
b An alleged case of corporate espionage has been reported at CO A 10
. a technology company named TechCorp, involving a former 6
employee, Sam. He is accused of stealing sensitive and
proprietary information to benefit a competitor. TechCorp
believes that Sam used electronic means to access and
transfer the data, and they are pursuing a legal case against
him. Illustrate the electronic evidence collection and
preservation operations taken by the legal team to prove the
allegations against Sam.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 identify the effect of cybercrime in forensic computing
CO2 infer digital forensic evidences and investigate the contents
CO3 choose and apply current computer forensics tools.
CO4 analyze the nature of cyber terrorism and its effects
CO5 devise basic computer and network forensic analysis
CO6 summarize the technical and legal aspects related to cyber crime

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 - 16 - - - 24
CO2 16 - 10 - - - 26
CO3 - 8 - 6 - - 14
CO4 - 16 16 - - - 32
CO5 - 8 8 - - - 16
CO6 - 10 10 - - - 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3033 Duration 3hrs


Course Name DATA VISUALIZATION Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Analyze how human brain sees visual information using Gestalt CO U 8
. Principles. 1
b The modern era is characterized by the promise of better decision CO U 8
. making through access to more data than ever before. Most real- 1
world datasets are much larger, ranging from thousands to millions
to even more. Moreover, many datasets change dynamically over
time. Illustrate the purpose of having computers in visualization
rather than just relying on humans with some examples and
sketches.

2. a Describe the visualization reference model by Hibbard and CO U 8


. Golovchinsky. 2
b Give an example of each of the three categories of visualization: CO U 8
. presentation, confirmation, and exploration. 2

3. a Give examples of the suggested computations required for CO A 8


. document analysis for the following applications: 3
a) identifying plagiarism
b) determining papers that discuss a specific topic
c) selecting a Chinese restaurant with good reviews
b Select a visualization tool with which you are familiar and examine CO U 8
. the types of interaction it supports. List the interaction operators 3
and operands, as well as the parameters of the interaction that the
user can control.

4. a Compare rectilinear and radial space-filling tree visualization CO U 8


. techniques. Under what conditions, or for what tasks, is one better 4
or worse than the other?
b Construct a Treemap from the given lines of code: CO A 8
. { 4
"name": "cricket",
"team": [
{
"name": "India",
"players": [
{"name": "Rohit", "netvalue": 50},
{"name": "Sachin", "netvalue": 40},
{"name": "Dhoni", "netvalue": 20}
]
},
{
"name": "Australia",
"players": [
{"name": "Ricky Ponting", "netvalue": 30},
{"name": "Adam Gilchrist", "netvalue": 20},
{"name": "Steve Waugh", "netvalue": 10}
]
},
{
"name": "England",
"players": [
{"name": "Root", "netvalue": 30},
{"name": "Ben Stokes", "netvalue": 20},
{"name": "James Anderson", "netvalue": 10}
]
}
]
}

5. a Map projections are used to visualize geospatial data. Why are CO U 8


. these projections difficult? 5
b Imagine there is a dataset that contains information about the CO A 8
. population density of different regions in a country, as well as their 5
corresponding levels of pollution.
a) Create a map using GIS visualization techniques that
effectively conveys information on population density and
pollution levels to policymakers and the general public.
b) Write the visualization techniques that can be used to show
the relationship between population density and pollution
levels, and how the map can be interactive to allow users to
explore the data in more detail.

6. a Discuss the characterization of time-oriented data in visualization CO U 8


. techniques. 6
b For each of the following plot types, describe at least one situation CO A 8
. where you would choose this plot over the others. 6
a) Line plot
b) Area plot (area under line is filled)
c) Bar graph

7. a Elaborate the data structures used in data visualization techniques CO U 8


. with suitable example. 6
b There are numerous strategies for dealing with missing data in a CO A 8
. data set. These include deleting the row containing the missing 4
value, replacing the missing value with a special number, such as
−999, replacing the value with the average value for that data
dimension, and replacing the value with the corresponding entry
from the nearest neighbor (using some distance calculation).
Comment on the strengths and weaknesses of each of these
strategies: what is gained or lost by following one approach over
the others?
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a Design a visualization application for the below mentioned details CO A 1
. that allows the company to analyze sales trends and identify 5 0
opportunities for growth. The application can include interactive
visualizations that allow users to explore the data by different
dimensions, such as customer segments, product categories, and
sales channels. The visualizations can include bar charts, line
charts, heatmaps, and scatterplots, among others. The application
can also provide real-time updates on sales activity and allow users
to set alerts for specific events or conditions, such as a sudden
increase in sales volume or a drop in customer satisfaction.
b Elaborate the visualization of the Firewall log data to detect the CO A 1
. vulnerability. 5 0

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Familiar with the design process to develop visualization methods and visualization systems, and
methods for their evaluation.
CO2 Preparation and processing of data.
CO3 Have an understanding of large-scale abstract data.
CO4 Understand visual mapping and the visualization.
CO5 Create actual visualization, interaction and distorting techniques.
CO6 Keep track of recent visual perception techniques.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - 8 8 - - - 16
CO2 - 16 - - - - 16
CO3 - 8 8 8 - - 24
CO4 - 8 16 - - - 24
CO5 - 8 20 8 - - 36
CO6 - 16 - - - - 16
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3040 Duration 3hrs


Course Name DISTRIBUTED SYSTEMS Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Discuss the working concept of Distributed systems under CO U 16
various real time scenarios and illustrating the challenges 1
encountered in distributed systems.

2. Visualize an inter-process communication to which a server CO U 16


creates a port that it uses to receive requests from clients. 2
Discuss the design issues concerning the relationship between
the name of this port and the names used by clients.

3. Discuss the early file-sharing applications such as Napster CO U 16


with a restricted scalability by the need to maintain a central 3
index of resources and the hosts that hold and shared between
them. Identify any other possible solution to overcome or
replace the indexing problem for such applications.

4. Examine a decentralized variant of the two-phase commit CO U 16


protocol the participants communicate directly with one 4
another instead of indirectly via a coordinator. In phase 1, the
coordinator sends its vote to all the participants. In phase 2, if
the coordinator’s vote is No, the participants just abort the
transaction; if it is Yes, each participant sends its vote to the
coordinator and the other participants, each of which decides
on the outcome according to the vote and carries it out.
Calculate the number of messages and the number of rounds it
takes and identify the merits and demerits in comparison with
the centralized variant.

5. Visualize a group communication system with a totally CO U 16


ordered multicast operation and a failure detector. Is it 5
possible to construct view-synchronous group communication
from these components alone.

6. Discuss possible occurrences of each of the main types of CO U 16


security threat (threats to processes, threats to communication 5
channels, denial of service) that might occur in the Internet.
7. Explain why iterative navigation is necessary in a name CO U 16
service in which different name spaces are partially 2
integrated, such as the file-naming scheme provided by NFS.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. Explain the distinctions between the three forms of CO U 20
synchronization (synchronous distributed state, media 6
synchronization and external synchronization) that may be
required in distributed multimedia applications. Suggest
mechanisms by which each of them could be achieved, for
example in a video conferencing application.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 describe the distributed system models.
distinguish between different inter-process communication mechanisms and their
CO2
application scenarios.
CO3 illustrate a transaction and concurrency control scheme for a real time application.
CO4 compare the various file system architectures used in distributed systems.
construct a real time distributed system with suitable IPC, event coordination, file
CO5
management, name service, transaction and concurrency control mechanisms.
CO6 evaluate an efficient distributed system and its qualities.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 16 16
CO2 32 32
CO3 16 16
CO4 16 16
CO5 32 32
CO6 20 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3041 Duration 3hrs


Course Name DNA COMPUTING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Evaluate the feasibility of using DNA for molecular computing, CO A 10
. supported by an analysis of DNA's structure, information storage 1 n
ability, and challenges in DNA-based computing systems.
b Compare and contrast DNA replication and sequencing in CO U 10
. molecular computing. Discuss how these processes are harnessed 1
or modified in molecular computing applications, highlighting the
key similarities and differences between them.
(OR)
2. a Analyze the importance of basic notations, automata, and grammar CO A 10
. systems in characterizing recursively enumerable languages within 2 n
formal language theory.
b Compare and contrast the roles of universal Turing machines and CO U 10
. type-0 grammars in contributing to computational models, 2
emphasizing their impact on formal language theory.

3. a Assess the operation of sticking in sticker systems and categorize CO E 10


. them based on their features, subsequently evaluating their 3
generative capacity within formal language theory.
b Evaluate the effectiveness of different methods for characterizing CO A 10
. recursively enumerable languages, considering their advantages 3 n
and limitations in formal language theory.
(OR)
4. a Evaluate the characterizations of recursively enumerable languages CO A 10
. using Watson-Crick automata, discussing their expressive 4 n
capabilities and computational complexity.
b Critically assess the advantages and limitations of Watson-Crick CO E 10
. automata with Watson-Crick memory, exploring their impact on 4
language recognition and generation tasks in formal language
theory.

5. a Explain the effectiveness of insertion and deletion operations in CO U 10


. IDS, considering their computational complexity and their 5
contributions to solving computational problems beyond regular
language recognition.
b Examine the concept of non-iterated splicing as an operation with CO A 10
. languages, discussing its role in generating complex language 5
structures and its computational implications in formal language
theory.
(OR)
6. a Discuss the relationship between splicing grammar systems and CO U 10
. distributed H systems, exploring how these models interact and 6
contribute to language manipulation and computation.
b Determine the potential impact of DNA computing on computer CO A 10
. networks, exploring opportunities for integrating DNA-based 6
computational methods into network protocols and architectures.

7. a Compare and contrast the features and functionalities of Two-Level CO U 10


. Distributed H Systems with time-varying Distributed H Systems, 6
highlighting their respective advantages and limitations in
distributed computing applications.
b Discuss the applications of splicing grammar systems in CO U 10
. computational linguistics and language processing, exploring how 6
they model linguistic phenomena and generate language structures.
(OR)
8. a Explain DNA recombination's relationship to the splicing CO U 10
. operation, highlighting their contribution to language generation 5
and manipulation in computational models.
b Describe the effectiveness of splicing operations, both non-iterated CO U 10
. and iterated, in generating diverse language structures and solving 5
computational problems, highlighting their strengths and
limitations in formal language theory
COMPULSORY QUESTION

9. a Assess the communication protocols and computational CO E 10


. functionalities of communicating distributed H systems, discussing 6
their role in facilitating information exchange and coordination in
distributed computing environments.
b Evaluate the dynamic nature and adaptability of Time-Varying CO E 10
. Distributed H Systems, exploring how they adjust to changing 6
computational requirements over time and their impact on
distributed computing tasks.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO1 Understand DNA sequence matching algorithms.
CO2 Describe the parallelism in DNA computing algorithms.
CO3 use mathematical theory for DNA computing
CO4 employ language theory for DNA computing
CO5 illustrate various techniques to apply parallelism for DNA computing
CO6 apply DNA computing in Computer Networks

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 10 20
CO2 10 10 20
CO3 10 10 20
CO4 10 10 20
CO5 30 10 40
CO6 30 10 20 60
180

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3042 Duration 3hrs


Course Name ETHICAL HACKING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a CO R 1
. Examine the steps involved in the penetration testing process. 1 0
b Discuss how the laws and regulations for data protection and CO U 6
. cybersecurity impact the scope and practice of ethical hacking. 5

2. a Describe social engineering attacks and their classifications. Also, CO U 1


. identify the defensive measures that can be incorporated by 2 0
organizations to protect against such attacks.
b CO A 6
. Identify the skill set required for an ethical hacker. 2

3. a Explain passive analysis techniques that assist in discovering CO U 1


. potential flaws and vulnerabilities with relevant examples. 1 0
b Discuss the utility of source code auditing tools that enhance CO U 6
. software security devising it as an asset in the development and 3
maintenance of secure software applications.

4. a Examine the strategies employed by organizations to defend against CO A 1


. client-side exploits, considering the historical perspectives, 4 6
evolving trends, advanced methodologies, and tools utilized for
identifying and mitigating browser-based vulnerabilities.

5. a Differentiate the types of malware. Also, discuss how organizations CO U 1


. strengthen their ability to detect and respond to evolving malware 5 6
threats while considering attackers' efforts to remain undetected in
the cybersecurity landscape.

6. a Describe how the intelligent fuzzing technique using Sulley CO R 1


. addresses the limitations and challenges associated with traditional 3 6
fuzzing methodologies.

7. a Summarize the various methods of physical penetration attacks that CO U 1


. could occur in a medium-sized technology company, where an 3 6
unauthorized individual gains access to their secure server room.
Additionally, outline protective measures to mitigate such attacks.
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a Illustrate a recent case study highlighting a specific vulnerability CO A 1
. discovered in cloud platforms. Evaluate the impact of this 6 n 0
vulnerability on security and privacy, analyze the root causes, and
propose effective mitigation strategies for addressing such
vulnerabilities across cloud platforms.
b Determine the vulnerabilities found in mobile devices, and how can CO A 1
. we effectively mitigate these vulnerabilities to enhance the security 6 0
of our devices and protect sensitive data.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 learn how to apply knowledge of engineering to society evaluations and design
CO2 understand the impact of security practices in a global and societal context
CO3 defend a computer against different types of security attacks
CO4 practice and use safe techniques on the World Wide Web
CO5 appreciate the Cyber Laws and impact of hacking
CO6 exploit the vulnerabilities related to conquer system and networks using state of the art tools and
technologies

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 10 - - - - 20
CO2 - 10 6 - - - 16
CO3 16 22 - - - - 38
CO4 - - 16 - - - 16
CO5 - 22 - - - - 22
CO6 - - 10 10 - - 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3053 Duration 3hrs


Course Name INTERNET OF THINGS SECURITY Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Describe the main components of an IoT architecture and explain how they CO1 R 16
interact within an IoT ecosystem.

2. Explain various attacks specific to IoT and identify corresponding control CO2 U 16
measures.

3. A massive influx of traffic overwhelms an IoT network, causing a denial of CO2 A 16


service. Identify the potential attack paths that could lead to a DoS attack on
the IoT network, and how the attacker might exploit weaknesses in access
control to amplify the impact. Construct an attack tree for the scenario.

4. Explain the fundamental role of encryption and decryption in securing data CO3 U 16
transmission within an IoT network.

5. Compare and contrast local and wide area networking in IoT devices and CO1 An 16
gateways.

6. Explain the role of cryptographic primitives in IoT security and give CO3 U 16
examples of how they are used in practice.

7. Describe the consequences of insufficient authentication/authorization in IoT CO4 R 16


systems and how these issues can be addressed.
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. Explain the components of an enterprise IoT cloud security architecture and CO5 A 20
discuss how it can mitigate common security threats.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO1 Demonstrate knowledge and understanding of the security and ethical issues of the internet of
Things.
CO2 Conceptually identify vulnerabilities, including recent attacks, involving the Internet of Things. .
CO3 Describe countermeasures for Internet of Things devices and security threats.
CO4 Analyze the societal impact of IOT security events.
CO5 Develop critical thinking skills.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 16 16 32
CO2 16 16 32
CO3 32 32
CO4 16 16
CO5 20 20
CO6
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3055 Duration 3hrs


Course Name IOT AND SMART CITIES Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Identify the key technology trends that are associated with the progress of CO1 U 10
smart cities.
b. Based on the smart city principles, create a detailed visual representation CO1 A 6
of a smart city also incorporates elements such as renewable energy
sources, efficient waste management, integrated transportation systems,
and data-driven urban planning. And explain how each component
contributes to the overall intelligence and sustainability of the city.

2. a. Identify the concept of Mobile Business Intelligence (BI) and discuss its CO2 U 8
key trends.
b. Discuss the significance of mobile devices in terms of urban challenges of CO2 A 8
intelligent cities such as intelligent energy management, wireless fleet
management, remote healthcare, and mobile payment.

3. a. Recall the concept of the context-aware framework for smart city CO1 A 10
applications and its role in enhancing personalized services and user
experiences within an intelligent urban environment.
b. Explain the process of the evolution of Mobile Wireless Technologies CO2 U 6
highlighting the key advancement.

4. a. Describe the essential requirements for a Cyber-Physical System (CPS) to CO3 R 10


support the development of a Smart City.
b. Identify the Popular IOT/M2M applications. CO3 U 6

5. a. Describe Smarter Homes and Building Elements. CO4 U 8


b. Discuss the key concepts and principles of technological advancements in CO4 R 8
smart homes and buildings.

6. a. Explain the new challenges towards Edge-based Solutions. CO5 R 8


b. Discuss in detail about Cloud-based IoT Analytics. CO5 U 8

7. a. Explain the concept of building capabilities in smarter homes. CO4 U 8


b. List out the security requirements associated with an intelligent city. CO6 A 8
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. Illustrate the best practices to be adopted for the security of an intelligent CO6 A 20
city.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 identify the necessity for smart cities.
CO2 describe the factors influencing smart cities.
CO3 apply the IoT technologies in healthcare and security areas.
CO4 analyze data in smart buildings, including data stemming from sensors and IoT devices.
CO5 evaluate the devices and technologies needed for smart cities.
CO6 design and plan the architecture for smart cities.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 - 10 16 - - - 26
CO2 - 14 8 - - - 22
CO3 10 6 - - - - 16
CO4 8 16 - - - - 24
CO5 8 8 - - - - 16
CO6 - - 28 - - 28
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3055 Duration 3hrs


Course Name IoT AND SMART CITIES Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Explain the need for intelligent cities in addressing city specific CO
1. U 10
. challenges. 1
b Explain the potential benefits of smart cities and their role in CO
U 10
. transforming urban landscapes. 1
(OR)
a List the key advancements in mobile wireless technologies and CO
2. R 10
. summarize their impact on the evolution of intelligent cities. 2
Compare and contrast the various mobile wireless technologies and
b CO
devices available for enhancing the functionality of intelligent U 10
. 2
cities.

a Identify and explain emerging trends in IoT technology and their CO


3. R 10
. impact on urban development. 3
b Explain the concept of cyber physical systems and their role in CO
U 10
. fulfilling smart city requirements. 3
(OR)
a Describe the essential elements of smart homes for enhancing CO
4. R 10
. living environments. 4
b Explain the role of cloud technology in smart homes for assessing CO
U 10
. its facilitation of data management and device integration. 4

Explain the concept of cloud based IoT analytics and its


a CO
5. significance in optimizing data processing and analysis for smart U 10
. 5
cities.
b Explain a specific use case of edge based data analytics in a smart CO
U 10
. city context. 5
(OR)
a Explain the significance of the IoT era and its implications for CO
6. U 10
. connected and cognitive cities. 3
b List the importance of smart city infrastructure and platform CO
R 10
. solutions in enabling various applications and services. 1

7. a Describe the utilization of the sensor cloud for enhancing homeland CO R 10


. security measures in smart cities. 3
b Explain different city transformation strategies employed to CO
U 10
. transition towards intelligent cities. 1
(OR)
a Explain the role of mobile application development platforms in CO
8. U 10
. enabling innovative solutions for intelligent cities. 2
b Explain best practices for ensuring the security of IT based CO
U 10
. infrastructure components in an intelligent city. 6
COMPULSORY QUESTION
a Explain the importance of health information exchange in CO
9. U 10
. improving patient care coordination and healthcare delivery. 6
b Develop strategies to address the challenges and maximize the CO
A 10
. benefits of electronic storage of medical records. 6

COURSE OUTCOMES
CO1 Identify the necessity for smart cities.
CO2 Describe the factors influencing the smart cities.
CO3 Apply the IoT technologies in healthcare and security areas.
CO4 Analyze data in smart buildings, including data stemming from sensors and IoT devices.
CO5 Evaluate the devices and technologies deeded for smart cities.
CO6 Design and plan the architecture for smart cities.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 30 - - - - 40
CO2 10 20 - - - - 30
CO3 20 20 - - - - 40
CO4 10 10 - - - - 20
CO5 - 20 - - - - 20
CO6 - 20 10 - - - 30
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3059 Duration 3hrs


Course Name MACHINE LEARNING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a With the help of suitable examples, explain the types of machine CO U 10
. learning. 1
b Discuss the common issues in machine learning. CO U 10
. 1
(OR)
2. a Summarize the steps involved in designing a learning system. CO U 10
. 1
b With the help of pseudocode, develop the candidate elimination CO A 10
. algorithm in machine learning. 1

3. a Compare different distance metrics used in k-nearest neighbors CO A 10


. (KNN) algorithm. 6 n
b Explain the attribute selection measures used in decision trees. CO A 10
. 6
(OR)
4. Construct the linear regression model for the following data. CO A 20
Calculate the coefficient of determination and correlation 4 n
coefficient. If the weight is 183 lbs, predict the height using the
regression model.

5. a With the help of mathematical model illustrate the backpropagation CO A 10


. algorithm. 2
b Draw the architecture of a radial basis function neural network. CO A 10
. Explain the training process for the network using PyTorch 5
framework.
(OR)
6. a Derive the objective function of SVM using 2-D space. CO A 10
. 2 n
b Compare boosting and bagging of ensemble learning. CO U 10
. 3

7. a How will you train the Kohonen self-organizing feature map? CO A 10


. 2
b State few real-life applications of hierarchical clustering. Adapt CO E 10
. agglomerative clustering for one real-life clustering application. 3
(OR)
8. a Justify that the principal component analysis improves the CO E 10
. performance of machine learning algorithm. How will you 5
implement PCA with scikit-learn library?
b Explain how canonical correlation analysis allows us to summarize CO A 10
. the relationships into fewer statistics while preserving the main 3
facets of the relationships of variables.
COMPULSORY QUESTION
9. a Assess the performance of Gaussian mixture models in determining CO E 10
. the probability that a given data point belongs to a cluster. 6
b With respect to a chess game, analyze the elements of CO A 10
. reinforcement learning. 4 n

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 describe some concepts and methods central to machine learning such as classification, regression,
clustering, bias/variance.
CO2 explain mathematically various machine learning approaches and paradigms
CO3 compare the strengths and limitations of selected machine learning algorithms and where they can
be applied in different applications
CO4 design and implement suitable machine learning algorithm to a given task
CO5 apply some state-of-the-art development frameworks and software libraries in machine learning
task realization
CO6 evaluate the performance of machine learning algorithms using suitable metrics

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 30 10 40
CO2 20 10 30
CO3 10 10 10 30
CO4 30 30
CO5 10 10 20
CO6 10 10 10 30
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3081 Duration 3hrs


Course Name SECURITY IN COMPUTING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Describe the different categories of computer security threats. CO R 10
. 1
b Explain the primary goals of cryptography in computer security. CO U 10
. Compare the differences between symmetric and asymmetric 1
encryption algorithms.
(OR)
2. a Discuss the techniques used to enforce access control policies in CO U 10
. distributed systems. 1
b Examine the steps involved in malware analysis, and brief the CO R 10
. effective countermeasures. 1

3. a Illustrate how browser-based attacks exploit vulnerabilities in web CO A 10


. browsers. 2
b Explain various email-based attacks and the security measures CO U 10
. individuals and organizations implement to protect their email data. 2
(OR)
4. a Discuss the security features that are typically built into modern CO U 10
. operating systems to mitigate threats. 2
b Describe the concept of trusted systems and its need. CO R 10
. 2

5. Illustrate with suitable examples the security challenges associated CO A 20


with wireless networks compared to wired networks. 4
(OR)
6. Explain firewall and its types. Also, discuss how organizations CO U 20
configure firewalls to enforce security policies and control access 4
to network services.

7. Appraise the security requirements that databases need to meet to CO A 20


ensure the confidentiality, integrity, and availability of data. Also, 3 n
discuss the challenges associated with implementing security
measures in databases.
(OR)
8. Discuss the components and approaches for implementation of CO U 20
information security. Provide insights into the key considerations 5
and best practices involved in implementing information security
measures within organizations, including the challenges and
strategies for ensuring compliance and effectiveness.
COMPULSORY QUESTION
9. A healthcare organization experiences a data breach resulting in CO A 20
the exposure of sensitive patient medical records. Illustrate how the 6
organization conduct incident analysis while upholding ethical
principles such as patient confidentiality and transparency. Also,
discuss the ethical considerations involved in communicating the
breach to affected patients and regulatory authorities, as well as the
measures the organization should take to prevent similar incidents
in the future.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Identify the factors driving the need for security.
CO2 Discuss security issues in operating systems.
CO3 Apply computer security in data and databases.
CO4 Analyze the possibilities in securing the network.
CO5 Categorize information security techniques.
CO6 Assess legal and ethical issues in security.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 20 20 - - - - 40
CO2 10 20 10 - - - 40
CO3 - - - 20 - - 20
CO4 - - 40 - - - 40
CO5 - 20 - - - - 20
CO6 - - 20 - - - 20
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3082 Duration 3hrs


Course Name SENSOR NETWORKS AND INTERNET OF THINGS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. Explain about the Authentication and Authorization required for CO U 1
smart thermostats in IoT. 1 6

2. Write a case study for M2M traffic characterization in a smart city CO A 1


environment. Showcase the characteristics of the M2M traffic in a 2 6
more realistic manner pinpointing the differences from the standard
traffic in cellular network.

3. Analyze the sensors and actuators fitted in the smart home figure CO A 1
below. Also identify the tool to visualize the same for decision 3 n 6
making.

4. Explain in detail and help the Life Insurance Company to CO A 1


implement the concepts of big data and Hadoop to analyse and 4 6
store their policy details.

5. Determine the common challenges in IoT security. Also suggest the CO A 1


mechanism to overcome it. 5 6

6. Analyze the methodology to automate the irrigation system in real CO A 1


time. 4 n 6

7. CO A 1
Sketch the SCADA system for a school management. 3 6
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. Write a case study to aggregate temperature data to the cloud using CO A 2
AWS IoT. 6 0

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 recognize the hardware and software components of IoT
CO2 interpret technologies and protocols in IoT
CO3 operate the tools in design and development
CO4 demonstrate the practical applications and real-world scenarios
CO5 relate security issues in IoT
CO6 develop solutions to real time projects and case studies

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - 16 - - - - 16
CO2 - - 16 - - - 16
CO3 - - 16 16 - - 32
CO4 - - 16 16 - - 32
CO5 - - 16 - - - 16
CO6 - - 20 - - - 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3082 Duration 3hrs


Course Name SENSOR NETWORKS AND INTERNET OF THINGS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Discuss the role of IoT in various industry domains, including CO U 10
. retail, logistics, agriculture, and energy sectors. 1
b Evaluate the benefits and challenges associated with implementing CO A 10
. IoT solutions in these industries, considering factors such as data 1 n
security, scalability, and interoperability. Provide case studies
illustrating successful IoT deployments and their contributions to
efficiency, sustainability, and innovation within each domain.
(OR)
2. a Explain the physical and logical design aspects of the Internet of CO R 20
. Things (IoT), highlighting key enabling technologies and 2
deployment templates. Provide examples of domain-specific
applications of IoT, such as home automation, smart cities, and
healthcare, and analyze their potential impacts on society,
economy, and environment

3. a Compare and contrast IoT sensors and devices with a focus on their CO U 10
. functionalities, capabilities, and applications. Discuss the 3
differences between IoT and M2M (Machine-to-Machine)
communication protocols, emphasizing their respective
architectures and use cases.
b Analyze the significance of Software-Defined Networking (SDN) CO A 10
. and Network Functions Virtualization (NFV) in IoT deployments, 3 n
and evaluate their impact on scalability, flexibility, and security.
(OR)
4. a Report an in-depth analysis of Raspberry Pi as a prominent IoT CO A 10
. device, covering its hardware specifications, operating system 3
(Linux), and connectivity options
b Discuss the role of sensor networks in IoT environments, CO U 10
. highlighting their design considerations, communication protocols, 3
and scalability challenges.

5. a Evaluate different application protocols for IoT at the transport CO A 20


. layer, including SCADA (Supervisory Control and Data 4 n
Acquisition), generic web-based protocols, and emerging
standards.
(OR)
6. a Compare and contrast IoT application layer protocols such as CO U 20
. CoAP (Constrained Application Protocol) and MQTT (Message 4
Queuing Telemetry Transport), analyzing their features,
advantages, and suitability for different IoT use cases.

7. a Discuss the Apache Hadoop ecosystem and its components, such as CO U 10


. Hadoop MapReduce and Apache Spark, highlighting their 5
capabilities for batch data analysis and real-time processing.
b Evaluate the role of Apache Oozie and Apache Storm in CO A 10
. orchestrating and executing data workflows in large-scale IoT 5 n
deployments.
(OR)
8. a Discuss the unique security considerations for IoT devices and CO U 20
. networks, including device authentication, data encryption, and 5
secure firmware updates. Discuss the emerging security
technologies and standards aimed at addressing the evolving threat
landscape in IoT, such as blockchain-based authentication and
Software Defined Perimeter (SDP) frameworks.
COMPULSORY QUESTION
9. a Discuss the role of cloud services such as Amazon Web Services CO U 20
. (AWS) in IoT deployments, highlighting key features and services 6
tailored for IoT applications. Evaluate tools like Chef and Puppet
for automating the deployment and management of IoT
infrastructure, and present case studies demonstrating their
effectiveness in real-world IoT projects.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 identify the important aspects of IoT and its benefits.
CO2 illustrate the working principles of a IoT sensors and devices.
CO3 demonstrate the working of various tools available for IoT.
CO4 compare and contrast different technologies of IoT.
CO5 evaluate the performance of IoT technologies.
CO6 develop new IoT based projects

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 10 20
CO2 20 20
CO3 20 10 10 40
CO4 20 20 40
CO5 30 10 40
CO6 20 20
180

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3084 Duration 3hrs


Course Name SMART SENSORS AND INTERNET OF THINGS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the technological advancements enabling real time CO U 10
. measurement and monitoring of environmental parameters via 1
smart sensors and IoT platforms.
b Describe the potential benefits of integrating smart sensors and IoT CO R 10
. technologies into environmental monitoring systems for public 1
health and ecological sustainability.
(OR)
2. a Explain the working principles behind capacitive sensors and how CO U 10
. they differ from resistive sensors. 2
b Describe the operation of surface acoustic wave sensors and CO R 10
. explain their advantages and limitations in practical applications. 2

3. a Describe impedance spectroscopy and its significance in CO R 10


. understanding the equivalent circuit of sensors. 3
b Explain the process of modeling sensors and discuss its importance CO U 10
. in enhancing sensor performance and reliability. 3
(OR)
4. a Explain in detail the intricate process of electrode fabrication CO U 10
. tailored for smart sensors. 4
b Compare and contrast the mechanisms of physical vapor deposition CO U 10
. and chemical vapor deposition in the architecture of smart sensors. 4

5. a CO U 10
Explain the role of interface electronic circuits in smart sensors.
. 5
b CO R 10
Describe the usefulness of silicon technology in smart sensors.
. 5
(OR)
6. a Explain future trends and potential developments in environmental CO U 10
. parameter measurement and monitoring for IoT. 1
b CO R 10
Describe potential research directions in smart sensor technology.
. 4

7. a List the key characteristics of smart sensors and discuss their CO R 10


. adoption trends in various industries. 3
b Explain the primary technologies utilized in humidity sensors and CO U 10
. describe how they accurately measure humidity levels. 2
(OR)
8. a Describe how pressure sensors function and discuss the various CO R 10
. types available for different industrial and consumer applications. 2
b List key stakeholders involved in environmental parameter CO R 10
. measurement and monitoring initiatives for IoT applications. 1
COMPULSORY QUESTION
9. a List innovative applications of smart sensors in various domains of CO R 10
. day to day life. 5
b Explain the role of evolving sensor architectures in enhancing the CO U 10
. capabilities of smart sensor systems. 5

COURSE OUTCOMES
CO1 Understand the vision of IoT from a global context.
CO2 Determine the market perspective of IoT.
CO3 Use of devices, gateways and data management in IoT.
CO4 Application of IoT in industrial and commercial building automation and real world design
constraints.
CO5 Building state of the art architecture in IoT.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 20 20 - - - - 40
CO2 20 20 - - - - 40
CO3 20 10 - - - - 30
CO4 10 20 - - - - 30
CO5 20 20 - - - - 40
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3085 Duration 3hrs


Course Name SOFT COMPUTING Max. Marks 100

Q.
B Mark
No Questions CO
L s
.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Construct SOM (Self Organizing Map) to cluster four given CO A 8
. vectors by assuming the number of clusters to be formed as 1
2 and learning rate 0.5.
Input vectors:
0 0 1 1
1 0 0 0
0 1 1 0
0 0 0 1
Weight vector:
0.2 0.9
0.4 0.7
0.6 0.5
0.8 0.3
b Describe the algorithmic steps and the architecture involved CO R 8
. in classifying nonlinear data points using the radial basis 1
function.

2. a Estimate the performance of the network by training a CO An 8


. hetero associative memory network to store input vectors s = 2
(s1, s2, s3, s4) to the output vectors t = (t1, t2) for the given
below vector pairs.
Input s1 s2 s3 s4 t1 t2
and
Targets
First 1 0 0 0 0 1
Second 1 1 0 0 0 1
Third 0 0 0 1 1 0
Fourth 0 0 1 1 1 0
b Calculate weight matrix by training hetero associative CO An 8
. memory network using outer product rule to store input 2
vector to output row vector.
Input s1 s2 s3 s4 t1 t2
and
Targets
First 1 0 1 0 1 0
Second 1 0 0 1 1 0
Third 1 1 0 0 0 1
Fourth 0 0 1 1 0 1

3. a Describe the architecture and the testing algorithm for CO U 8


. discrete BAM (Bidirectional Associative Memory) network. 3
b Design OR gate circuit by using OR gate perceptron training CO C 8
. rule assuming w1 = 0.6, w2 = 0.6 , threshold = 1, learning 3
rate n = 0.5.

4. a Apply max-min and max-product composition operation CO A 8


. over the given fuzzy relations ~R and ~S to obtain a fuzzy 3
relation ~T.

[ ]
0.2 0.5 0.7 1 0.9
0.3 0.5 0.7 1 0.8
~R =
0.4 0.6 0.8 0.9 0.4
0.9 0.1 0.8 0.6 0.4

[ ]
1 0.8 0.6 0.3 0.1
0.7 1 0.7 0.5 0.4
~S = 0.5 0.6 1 0.8 0.8
0.3 0.4 0.6 1 0.9
0.9 0.3 0.5 0.7 1

b Explain the various ways to assign membership values to CO U 8


. fuzzy variables. 3

5. a Consider two fuzzy sets A and B, both defined on X and CO E 8


. express the lamda-cut sets using Zadeh’s notation for the 4
given questions.
0.2 0.3 0.4 0.7 0.1
~A = { + + + + }
x 1 x2 x 3 x 4 x5
0.4 0.5 0.6 0.8 0.9
~B { + + + + }
x1 x 2 x3 x 4 x 5
(a) ( A)0.7
(b) ( B)0.2
(c) ( A U B)0.6
(d) ( A ∩ B)0.6
(e) ( A ∪ B) 0.6

b Describe in detail of formation of inference rules using CO U 8


. Mamdani fuzzy inference system and Takagi Sugeno fuzzy 4
inference system.

6. a Illustrate and explain the fundamental concept of an ART CO U 8


. (Adaptive Resonance Theory) network along with its 5
architecture. Also discuss on the measures ART (Adaptive
Resonance Theory) networks aim to address in the context
of unsupervised learning?
b Explain in detail the concepts of neuro fuzzy hybrid systems CO U 8
. with its architecture. 5

7. a Discuss how genetic fuzzy hybrid systems can be used for CO U 8


. developing an efficient medical diagnosis of diabetes, a 5
chronic medical condition that affects millions of people
worldwide. The scheme aims to create a system that
efficiently analyses patient symptoms, medical test results,
and historical data using a hybrid approach, thereby
improving the accuracy and reliability of diabetes diagnosis.
b Calculate the optimal value using genetic algorithm to CO A 8
. maximize the objective function f(x) = x 2 where x varies 5
between 0 to 31. Assume the initial population as 01100,
11001, 00101, 10011 and the crossover point for the first
two strings is 4, the crossover points for 3 rd and 4th string is
2, and the mutation chromosomes are 10000, 00000, 00000,
00101.
PART – B (1 X 20 = 20 MARKS)
(Compulsory Question)
8. a Explain the primary purpose of CNN in the field of deep CO A 10
. learning. Describe the key components of a CNN 6
architecture, including the convolutional layer, pooling
layer, and fully connected layer. Explain the role of each
component.
b Define a Recurrent Neural Network (RNN) and describe the CO R 10
. basic architecture of an RNN, highlighting the recurrent 6
connections and the role they play in processing sequential
data.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 describe the principles of biological systems and the concept of learning through soft computing
techniques
CO2 summarize the theoretical and practical aspects of different soft computing and hybrid techniques.
CO3 demonstrate the steps involved in the development of intelligent system.
CO4 analyze the problem thoroughly and identify the appropriate technique to design the model
CO5 design and implement the computing systems using appropriate technique and tools for any real
world application.
CO6 evaluate and compare the performance of different soft computing approaches for a given
problem.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 8 - 8 - - - 16
CO2 - - - 16 - - 16
CO3 8 8 8 - - 8 32
CO4 - 8 - - 8 - 16
CO5 - 24 8 - - - 32
CO6 10 - 10 - - - 20
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3100 Duration 3hrs


Course Name WIRELESS SENSOR NETWORKS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the sensor network architecture and discuss any two CO U 10
. applications of wireless sensor networks. 1
b Explain major issues for designing wireless sensor applications in CO U 10
. detail. Also, summarize the limitations of wireless sensor networks. 1
(OR)
2. a Compare and contrast the various wireless protocols used by CO A 10
. wireless networks. List the available wireless technologies for 2 n
wireless networks.
b Describe how ZigBee technology is applied to wireless sensor CO U 10
. networks in the consumer and industrial markets to solve the issues 2
of power and cost for home management, building automation, and
remote monitoring.

3. a Explain the critical issue in designing MAC layer protocols for CO U 10


. wireless sensor networks and analyze the performance metrics of 3
MAC Protocols for wireless sensor networks.
b Analyze the design goal of the sensor-MAC (S-MAC) protocol and CO A 10
. discuss the techniques it proposes to achieve energy efficiency 3 n
while keeping minimal latency in surveillance applications.
(OR)
4. a Explain the basic operation of the beacon and beaconless mode of CO U 10
. operation in IEEE 802.15.4 MAC protocol used for monitoring and 4
security applications.
b Explain the main objective of the Low-Energy Adaptive Clustering CO U 10
. Hierarchy (LEACH) routing algorithm and illustrate its basic 4
operations.

5. a Explain the designing process of transport protocols for wireless CO U 10


. sensor networks and give examples of transport protocols designed 5
for wireless sensor networks.
b Write the basic middleware functions for wireless sensor networks CO A 10
. and discuss the challenges in designing middleware for these 5
networks.
(OR)
6. a Explain the importance of network management for wireless sensor CO U 10
. networks and also summarize the issues that must be addressed 5
before designing network management tools for it.
b Explain why traditional operating systems are not suitable for CO U 10
. wireless sensor networks. Distinguish between sensor operating 1
systems and traditional operating systems.

7. a Classify routing protocols for wireless sensor networks. Also, CO U 10


. specify typical parameters used to measure the performance of 4
MAC protocols.
b Explain the software and hardware components of wireless CO U 10
. networks. 2
(OR)
8. a Explain any three applications of wireless sensor networks. CO U 10
. Describe how wireless sensor network technology is used for 6
military surveillance systems.
b Explain the importance of schedule-based MAC-layer protocols for CO U 10
. wireless sensor networks. Also, summarize the measures taken to 4
achieve a high level of energy efficiency for it.
COMPULSORY QUESTION
9. a Construct a model to compute the system life span in wireless CO A 10
. sensor networks. Also, analyze the various factors that will extend 6
system lifetime when designing wireless sensor networks.
b Construct a smart home automation system using a wireless sensor CO A 10
. network and describe the sensor nodes used in the network to 6
improve the performance of the systems.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO identify the important aspects of wireless sensor networks and its benefits
1
CO illustrate the working principle od WSN
2
CO demonstrate the applications of WSN and protocol working of WSN
3
CO compare and contrast the different wireless technologies, MAC protocols, Routing Protocols,
4 Transport protocols
CO evaluate the performance of transport protocol, traffic management in WSN
5
CO develop new framework/methods/protocols for WSN
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - 30 - - - - 30
CO2 - 20 - 10 - - 30
CO3 - 10 - 10 - - 20
CO4 - 40 - - - - 40
CO5 - 20 10 - - - 30
CO6 - 10 20 - - - 30
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3106 Duration 3hrs


Course Name DEEP LEARNING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Explain the concept of converting non-linear data to linear data for CO A 8
. classification purpose using Support Vector Machine (SVM) with 1 n
suitable illustration.
b Apply the single layer perceptron (SLP) algorithm to classify the CO A 8
. AND Boolean function (2-dimensional inputs) into two classes. 1
Show the updated weight values after one iteration.
Use Net = 1 if Net >= 0.8
= 0 if Net < 0.8
The initial weight vector = [0.2, 0.4], learning rate parameter = 0.3

2. a Compare the learning procedures of Multiple Layer Perceptron CO A 6


. (MLP) and SLP algorithm. 1 n
b State the purpose of ‘regularization’. Discuss all the available CO R 1
. regularization techniques in detail with suitable illustration. 4 0

3. a Discuss the operation of all the layers of Convolutional Neural CO U 8


. Network (CNN) and write down the equations to calculate the 2
output image size of convolution and max pooling layers.
b Explain the concept of every layer of Lenet-5 architecture for a CO U 8
. given input image of size 32x32x1. 2

4. a CO U 9
Distinguish between shallow and deep neural networks.
. 2
b Differentiate the following adaptive optimization techniques to CO U 7
. improve the performance of deep learning and machine learning 4
algorithms.
 Adagrad
 RMSProp
 Adam

5. a Examine the concept of skip connections to resolve the vanishing CO R 1


. gradient problem using ResNet model. Discuss the solution in detail 2 0
using the architecture of ResNet 50.
b Analyze the merits and demerits of any two most popular pre- CO A 6
. trained models. 2 n

6. a Compare the benefits of Long Short-Term Memory (LSTM) over CO A 1


. Recurrent Neural Network (RNN). Explain the architecture and 2 n 6
working principles of LSTM and RNN

7. a Define autoencoder. Discuss the different types of autoencoders CO R 6


. with suitable architecture. 3
b Examine the working principle of the following autoencoders with CO A 1
. suitable architectures. 3 0
 Variational Autoencoder
 Generative Adversarial Networks
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a Explain the following CNN applications: CO U 2
. 5 0
 Face Recognition
 Natural Language Processing
 Sentimental analysis to identify the emotions
 Word2Vec to handle large corpus of text

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 understand the basics of deep learning
CO2 implement various deep learning models
CO3 realign high dimensional data using reduction techniques
CO4 analyze optimization and generalization in deep learning
CO5 explore the deep learning applications
CO6 apply the algorithms to real time problems

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - - 8 14 - - 22
CO2 10 25 - 22 - - 57
CO3 6 - 10 - - - 16
CO4 10 7 - - - - 17
CO5 - 20 - - - - 20
CO6 - - - - - - -
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3106 Duration 3hrs


Course Name DEEP LEARNING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Compare and contrast the underlying architectures and applications C U 1
. of machine learning and deep learning, highlighting their strengths O1 0
and limitations in various domains.
b Describe the application of Support Vector Machines (SVM) and C R 1
. kernel functions in classification tasks. O1 0
(OR)
2. a Discuss the advantages of using logistic regression for binary C U 1
. classification over linear regression models. O1 0
b Analyze how a probabilistic theory supports deep learning models C A 1
. and their ability to make predictions. O2 n 0

3. a Explain how batch normalization complements backpropagation and C A 1


. regularization in training deep neural networks. O2 0
b Compare and contrast the capabilities and limitations of deep and C A 1
. shallow neural networks in capturing complex patterns in data. O2 n 0
(OR)
4. a Examine the evolution of CNN architectures, starting from AlexNet C A 1
. to ResNet, highlighting the key improvements and innovations O3 0
introduced with each model.
b Explain the hyper parameter optimization techniques in the context C A 1
of ConvNets and how they influence model performance and O3 n 0
training efficiency.

5. a Compare and contrast various regularization techniques used in deep C A 2


. learning, highlighting their strengths and weaknesses. O4 n 0
(OR)
6. a Evaluate the table below, which compares the performance of C A 2
. different regularization techniques applied to a convolutional neural O4 n 0
network (CNN) on a standard image classification task. Determine
which regularization technique achieved the highest average
validation accuracy across two trials.
Regularization Technique Trial 1 Accuracy (%) Trial 2 Accuracy (%)
L1 Regularization 87 88
L2 Regularization 89 90
Dropout 92 91
Early Stopping 90 89

Calculate the average accuracy for each regularization technique


based on the two trials and identify the most effective technique
based on these results.

7. a Explain the key differences and similarities between LSTM (Long C A 1


. Short-Term Memory) units and GRU (Gated Recurrent Unit) units in O5 0
recurrent neural networks.
b Discuss the architectural details of recurrent neural networks (RNNs) C U 1
. that make them suitable for sequence data processing, compared to O5 0
traditional neural networks.
(OR)
8. a Analyze the table below, which summarizes the performance metrics C A 2
. of different deep learning models applied to a speech recognition O5 n 0
task. Determine which model achieved the highest overall
performance based on the average of the accuracy and F1 score
across two evaluation sets.
Model Evaluation Evaluation Evaluation Evaluation
Set 1 Set 1 F1 Set 2 Set 2 F1
Accuracy (%) Score Accuracy (%) Score
LSTM 92 0.91 93 0.92
GRU 94 0.93 92 0.91
Bidirectional 95 0.94 94 0.93
LSTM
Transformer 96 0.95 95 0.94
Calculate the average accuracy and F1 score for each model across
both evaluation sets, and identify the model with the highest overall
performance.
COMPULSORY QUESTION
9. a Explain the impact of the ImageNet challenge on the development of C A 1
. computer vision technologies and deep learning architectures. O6 0
b Evaluate the techniques and effectiveness of sentiment analysis in C A 1
. interpreting emotions and opinions from text data. O6 n 0

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 understand the basics of deep learning
CO2 implement various deep learning models
CO3 realign high dimensional data using reduction techniques
CO4 analyze optimization and generalization in deep learning
CO5 explore the deep learning applications
CO6 apply the algorithms to real time problems

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 20 - - - - 30
CO2 - - 10 20 - - 30
CO3 - - 10 10 - - 20
CO4 - - 40 - - 40
CO5 10 - 10 20 - - 40
CO6 - - 10 10 - - 20
180

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 18CS3107 Duration 3hrs


Course Name IMAGE AND VIDEO PROCESSING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Explain the process of computing the Discrete Fourier Transform CO R 10
. (DFT) and its significance in signal processing. 2
b Discuss the challenges and limitations associated with sampling CO U 10
. and quantization in image processing, including issues such as 1
aliasing, quantization noise, and dynamic range issues.
(OR)
2. Analyze the computational aspects of the DWT, including the CO A 20
algorithmic complexity and computational efficiency. Illustrate this 2 n
process with a suitable diagram and provide a step-by-step
explanation.

3. a Discuss the process of linear and nonlinear filters in the area of CO U 10


. spatial domain for the purpose of image enhancement. 3
b Analyze the role of histogram processing in spatial domain image CO A 10
. enhancement. Explain how histogram equalization and histogram 3 n
matching techniques can be applied to improve the contrast and
overall quality of an image.
(OR)
4. Describe the process of point, line, and edge detection in image CO U 20
segmentation. Explain the fundamental principles behind each 6
detection technique and provide examples of real-world
applications where each technique is used effectively.

5. Explain the principles of lossless compression, focusing on CO A 20


techniques such as Huffman coding and Arithmetic coding. 3
Describe how these methods exploit redundancy in data to achieve
compression without losing any information.
(OR)
6. a Explain an overview of the JPEG (Joint Photographic Experts CO U 10
. Group) standards for image compression. Discuss the JPEG 3
baseline and JPEG2000 standards, including their differences,
features, and applications.
b Analyze the advantages and limitations of using 3D motion models CO A 10
. and Geometric Image Formation models in video processing tasks. 5 n

7. Define Analog Video and Digital Video formats, outlining their CO R 20


fundamental differences in terms of signal representation, storage, 5
and transmission. Discuss the advantages and disadvantages of
each format in the context of image quality, flexibility, and
compatibility.
(OR)
8. Explain block-based transform coding in video compression and CO A 20
discuss how block-based transform coding, such as discrete cosine 6
transform (DCT) and discrete wavelet transform (DWT), partitions
video frames into blocks and applies transform coding to each
block to achieve compression.
COMPULSORY QUESTION
9. a Discuss rigid object tracking methods in video processing and CO U 15
. explain how rigid object tracking algorithms track objects with 5
fixed geometric structures and motion patterns.
b Explain the concept of Simultaneous Motion Estimation and CO A 5
. Segmentation (SMES) in video processing. 5 n

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Understand the basics of image and video processing
CO2 Implement various image processing techniques
CO3 Demonstrate image compression techniques
CO4 Analyze various coding techniques for 2D Estimation
CO5 Explore the video processing techniques
CO6 Apply the algorithms to real time problems

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 10
CO2 10 20 30
CO3 20 20 10 50
CO4 15 5 20
CO5 20 10 30
CO6 20 20 40
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 19CS1001 Duration 3hrs


Course Name PROGRAMMING IN PYTHON Max. Marks 100

Q.
Questions C B
N M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
List the identity operators in python. 1
2. CO U 1
Identify the output of the following statement: print(3-2**2**3+99/11) 1
3. Predict the output for the following program: CO A 1
fruits = ["apple", "banana", "cherry"] 2
for x in fruits:
if x == "banana":
continue
print(x)
4. CO R 1
State why * is called as a string repetition operator. 5
5. CO U 1
Interpret why tuples are called as immutable data type. 6
6. CO R 1
Define a Python code that accesses the last element of a tuple. 6
7. Indicate the role of __init__.py in creating a python package. CO U 1
3
8. CO A 1
Write the code to demonstrate anonymous function. 3
9. CO R 1
List the use of OS module in python. 4
10 CO R 1
. Identify the function used to read more than one line from a file. 4
PART – B (6 X 3 = 18 MARKS)
11 List the two Membership and logical operators in python with CO R 3
. appropriate example. 1
12 Illustrate with examples about the append() and extend() functions in CO U 3
. list. 6
13 Write a program to determine whether a person is eligible to vote or CO A 3
. not. 2
14 Identify the string method used to implement the following. CO U 3
. (i) To count the number of characters in the string. 5
(ii) To change the first character of the string in capital letter.
(iii) To check whether the given character is a letter or a number.
(iv) To change lower case to upper case letter.
(v) To change one character into another character.
15 Illustrate a python program for given two integer numbers, where it CO A 3
. returns their product only if the product is equal to or lower than 1000, 3
else it returns their sum.
Number1=20
Number2=30
16 CO U 3
. Differentiate between the r+ and w+ python file modes. 4
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO U 6
. . Summarize the salient features of python programming language. 1
b Write a python program to calculate the area of circle, rectangle and CO A 6
. triangle and to print the results. 1

18 a Explain in detail about the various flow control statements CO U 6


. . supported in python with suitable example. 2
b Develop a Python program to find whether a given number (accept CO A 6
. from the user) is (i) even or odd and (ii) prime or not. Print out an 2
appropriate message to the user.

19 a Discuss in detail about strings and the string methods supported in CO U 6


. . python. 5
b Explain Set in python and discuss about the various set operations CO U 6
. with suitable examples. 6

20 a Distinguish between tuples and lists and list the various operations CO U 6
. . that can be performed on a tuple and Lists (minimum 5) with 6
appropriate examples.
b Discuss the following Dictionary methods in Python with examples. CO U 6
. (i) get() (ii) items() (iii) keys() (iv) values() 6

21 a Illustrate local and global scope of variable in python with an CO U 6


. . example snippet. 3
b Devise a Python recursive function with suitable parameters to CO A 6
. generate first N Fibonacci numbers. The first two Fibonacci 3 n
numbers are 0 and 1 and the Fibonacci sequence is defined as a
function F as Fn = Fn-1 + Fn-2. Write a Python program which
accepts a value for N (where N >0) as input and pass this value to
the function. Display suitable error message if the condition for
input value is not followed.

22 a CO U 6
. . Write a python program to add ‘N’ natural numbers using functions. 3
b Explain the different methods of passing formal arguments to a CO U 6
. function in Python with an example. 3

23 a CO U 6
. . Explain in detail about the types of Modules. 4
b Illustrate with a python program on how to read specific lines from CO U 6
. a file. 4
COMPULSORY QUESTION
24 a Explain the decision-making statements and loops in python with CO A 6
. . suitable examples. 2
b Calculate the total and aggregate by reading the marks of a student CO A 6
. in four subjects and display the grade obtained by the student on the 2 n
following conditions.
(i) If the student scores an aggregate greater than 75%, then the
grade is distinction.
(ii) If aggregate is 60 >= and < 75, then the grade is first division.
(iii) If aggregate is 50 >= and < 60, then the grade is second
division.
(iv) If aggregate is 40 >= and < 50, then the grade is third division.
(v) Else the grade is fail

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Outline the structure and components of a Python program.
1
CO Explain loops and decision statements in Python.
2
CO illustrate class inheritance in Python for reusability
3
CO Experiment read and write files in Python.
4
CO Design, code, and test small Python programs that meet requirements expressed in English.
5
CO Choose lists, tuples, and dictionaries in Python programs.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 4 7 6 17
CO2 6 16 6 28
CO3 19 4 6 29
CO4 2 15 17
CO5 1 9 10
CO6 1 22 23
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 19CS2004 Duration 3hrs


Course Name BLOCKCHAIN TECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. State the significance of the brain wallet. 1 R 1
CO
2. Give the appropriate bytes required for a blockchain header. 1 U 1
List the various models that a mining pool manager can use to pay the CO
3. miners. 2 R 1
CO
4. Define token in the blockchain ecosystem. 2 R 1
CO
5. Name the wallet that is available as a Chrome and Firefox extension. 3 R 1
CO
6. State the Ethereum protocol applying the Rust programming language. 3 R 1
CO
7. Define the term "gas". 4 R 1
CO
8. List the various applications of dApps. 4 R 1
CO
9. Give an example of the hardware wallet. 5 U 1
10 CO
. Define the term “root of trust”. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. List the elements of blockchain. 1 R 3
12 CO
. Define the term "nonce". 2 R 3
13 CO
. Describe wrapped bitcoin. 3 U 3
14 CO
. List the types of Ethereum wallets. 4 R 3
15 CO
. Differentiate proof of stake from proof of work. 5 U 3
16 CO
. Define blockchain survivability. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain the recently emerged Bitcoin wallets fulfilling the industry CO A 1
. . standards. 1 2

18 a Explain the Bitcoin transaction structure. Assume every transaction CO A 1


. . has a prefix specifying the version number. 2 2

19 a Explain the manner in which peer-to-peer networks communicate CO U 1


. . with other Ethereum clients, like the Metamask. 3 2

20 a Describe the Contract Application Binary Interface, the standard CO U 1


. . way to interact with contracts in the Ethereum ecosystem. 4 2

21 a Describe the life cycle of smart contracts in the blockchain CO U 6


. . ecosystem. 5
b Explain the various Ethereum addresses and accounts used while CO U 6
. dealing with an Ethereum wallet. 5

22 a Explain the way Bitcoin transactions function, allowing for secure CO U 1


. . value transfers between parties. 1 2

23 a Describe the vulnerabilities in smart contracts and common security CO U 1


. . flaws. 6 2
COMPULSORY QUESTION
24 a Explain blockchain forks and their types. Sketch a suitable diagram CO A 1
. . and explain how fork can improve user interaction. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 define bitcoin and its underlying blockchain
CO2 describe the foundation of bitcoin and cryptographic currencies for developers, engineers, and software
CO3 explain decentralized network, peer-to-peer architecture, transaction lifecycle, and security principles
CO4 execute basic transactions, program smart contracts , transmit and use an Ethereum client
CO5 test wallets, token and oracle
CO6 implement decentralized applications using multiple peer-to-peer (P2P) components

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 4 13 12 - - - 29
CO2 5 - 12 - - - 17
CO3 2 - 15 - - - 17
CO4 5 12 - - - - 17
CO5 - 16 - - - - 16
CO6 4 12 12 - - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 19CS2007 Duration 3hrs


Course Name OPTIMIZATION METHODOLOGIES Max. Marks 100

Q. CO / BL
Mark
No Questions
s
.
PART – A (10 X 1 = 10 MARKS)
1. A “= type” constraint expressed in the standard form is active at CO 1 / U 1
a design point if it has how much value?
2. What happens for the feasible region for the inequality CO 1/ U 1
constraints with respect to equality constraints?
3. Label the parameters which are possessed by each optimization CO 1/ R 1
problem.
4. Identify the type of the feasible region given by the set of CO 1/ U 1
inequalities x - y <= 1 x - y >= 2
5. Give the term for a process of finding best solution among the CO 2/ R 1
set of all feasible solutions
6. For converting the unbalanced to balanced transportation, what CO 3/ U 1
step is taken if the supply is greater than the demand in a
transportation problem?
7. Which is the primary condition to be satisfied for optimal CO 4/ U 1
solution of an assignment problem?
8. Give the similarity between Assignment Problem and CO 4/ R 1
Transportation Problem.
9. The minimum cost based on North west corner method is______ CO 4/ 1
for the following cells An

10. Check whether the below table is unbalanced or balanced CO 4/ U 1


transportation.

PART – B (6 X 3 = 18 MARKS)
11. Define local optimum. CO 1/ 3
R
12. What is a feasible solution? CO 2/ 3
R
13. For the given project selection problem, find the objective CO 3/ 3
function in a standard format. R
Project Cost Return after 3 Years

P1 5000 9000

P2 6000 11000

P3 3500 6500

P4 8000 15000

P5 7500 14000
14. Determine the cost of the nearest neighbor starting from vertex CO 4/ 3
A. E

15. Justify whether the problem description is a pure integer CO 5 / 3


programming problem or not. E

Max 7x +2y

Sub to: 2x+4y<=24

4x+7y <=58
x, y>=0 and x is integer
16. Model the cost tradeoff model for ATM. CO 6 / 3
A
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23. Q.No 24 is Compulsory)
17. Explain in detail about the classification of optimization CO 1 / 12
problems. U

18. Recall the various methods in linear programming with CO 2 / 12


example. R

19. Solve the following assignment problem shown in table CO 4/ 12


using Hungarian method. The matrix entries are processing A
time of each man in hours.
20. Classify the direct search algorithm and explain with CO 3/ 12
examples. U

21. Identify the solution for 0/1 knapsack problem for m=8, CO 5/ 12
n=4, p={1,2,5,6} and w={2,3,4,5} A

22. Examine the KKT conditions for maximize cT x CO 5/ 12


subject to: Ax≤ b An
x≥0

23. Solve Max Z = −x1 + 4x2 CO 4/ 12


Subject to A
−10x1 + 20≤ 22
5x1 + 10x2≤ 49
x1≤ 5
xi ≥ 0, xi’s are integers
using Integer Programming with Branch-and-Bound
Technique.
Compulsory:

24. Explain the various Queuing Process in banking system CO 6 / 12


with suitable diagram. U

COURSE OUTCOMES
CO1 Formulation of optimization problems
CO2 Define and use optimization terminology and concepts
CO3 Describe the appropriate the linear programming techniques.
CO4 Choose the appropriate optimization for real world problems
CO5 Customize the optimization methodologies for real time problems
CO6 Apply the knowledge to solve the queuing problems

Assessment Pattern as per Bloom’s Taxonomy


CO / Remember Understand Apply Analyze Evaluate Create Total
P
CO1 4 15 - - - - 19
CO2 16 - - - - - 16
CO3 3 13 - - - - 16
CO4 1 2 24 1 3 31
CO5 - - 12 12 3 - 27
CO6 12 3 - - - 15
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 19CS2012 Duration 3hrs


Course Name ARTIFICIAL INTELLIGENCE FOR BIOTECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
List any two examples for recoverable problems. 1
2. Identify the test in which if an interrogator cannot differentiate between CO R 1
a machine and a human and the machine may be assumed to be 1
intelligent.
3. Identify the adequacy that the good knowledge representation should CO U 1
exhibit. 2
4. _________ is the ability to manipulate the representational structures to CO U 1
derive new structures corresponding to new knowledge inferred from 2
old.
5. CO R 1
Define Soft Tissue. 3
6. CO R 1
Define Tendinitis. 3
7. Recall the primary objective of heavy metal prediction techniques in CO R 1
environmental science. 4
8. Identify the key differences between regression models and CO U 1
classification models used in heavy metal prediction. 4
9. Provide examples of how AI based plant and disease identification CO R 1
systems benefit farmers and contribute to improved crop health. 5
10 Express the major disadvantage of using AI. CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 List the four steps to be carried out to build a system to solve an AI CO R 3
. problem. 1
12 CO U 3
. Differentiate Procedural and Declarative Knowledge. 2
13 Explain the role of AI in toxicity prediction and its implications for CO A 3
. drug development. 3 n
14 Explain how artificial neural networks (ANNs) are used in heavy metal CO U 3
. prediction models 4
15 Explain how AI-based pest and plant disease identification systems CO A 3
. utilize machine learning and computer vision techniques to enhance 5 n
early detection and response strategies in agriculture.
16 CO U 3
. Discuss on the need of AI in food industry. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Consider the water jug problem: You are given two jugs, a 4-gallon CO A 8
. . one and 3-gallon one. Neither has any measuring marker on it. 1 n
There is a pump that can be used to fill the jugs with water. How
can you get exactly 2 gallons of water from the 4-gallon jug?
Explicit Assumptions:
A jug can be filled from the pump, water can be poured out of a jug
onto the ground, water can be poured from one jug to another and
that there are no other measuring devices available. Apply suitable
production rules to solve this problem.
b CO A 4
. Choose any one of the uninformed search techniques and explain. 1

18 a Apply A* algorithm to solve the given problem. CO A 6


. . 1

b CO U 6
. Summarize the four approaches of artificial intelligence. 1

19 a Explain on the approaches to knowledge representation with CO U 6


. . suitable examples. 2
b Discuss about predicate logic and explain the three types of CO U 6
. quantifiers. 2

20 Consider a scenario where a patient named John, aged 45, has CO E 1


. recently been diagnosed with metastatic colorectal cancer. Discuss 3 2
the significance of artificial intelligence (AI) in genomic medicine,
particularly focusing on its role in providing personalized treatment
recommendations and predicting disease outcomes for John.

21 Discuss the application of artificial intelligence (AI) in groundwater CO U 1


. treatment processes, highlighting specific AI-driven techniques and 4 2
their benefits for water quality management.

22 a Evaluate the role of AI in revolutionizing weed and crop CO A 6


. . discrimination in modern agriculture. 5 n
b Discuss the significance of AI in optimizing media usage for crop CO U 6
. cultivation in agriculture. 5

23 Interpret the application of Artificial Intelligence in pharmaceutical CO A 1


. industry for the development of genomic medicine. 6 2
COMPULSORY QUESTION
24 a Explain the implementation techniques of Artificial Neural Network CO U 8
. . (ANN) for diabetes prediction. 6
b Predict the need of machine learning algorithms for pest control in CO A 4
. plants. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Define AI based problems and select appropriate search method for different search spaces
1
CO Express knowledge representation techniques and problem-solving strategies to common AI
2 applications
CO Develop prediction models and extend for healthcare applications
3
CO Analyze energy and environmental issues and discover AI based solutions
4
CO Inspect the challenges on agriculture and suggest solutions for plant disease identification and
5 discrimination
CO
6 Propose AI based solutions for industrial applications

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 5 6 10 8 29
CO2 17 17
CO3 2 3 12 17
CO4 1 16 17
CO5 1 6 9 16
CO6 12 16 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 19CS2013 Duration 3hrs


Course Name INTERNET OF THINGS FOR FOOD TECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
Define IoT.
1. 1 R 1
CO
_________layers provides end-to-end communication in IoT.
2. 1 A 1
CO
List out the Characteristics of IoT.
3. 2 U 1
CO
Mention few sensors used in Food Industries.
4. 2 U 1
CO
5. Classify different types pins present in Arduino board. 3 R 1
CO
6. Write down the need of battery used in IoT. 3 R 1
CO
7. Define Client-server communication. 4 U 1
The maximum operating voltage of the GPIO pins in Arduino is __ CO
8. Volts. 4 R 1
CO
9. In Touch screen devices __________ type of sensor is used. 5 R 1
10 CO
. What are the different type of protocol which supports AWS? 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO R 3
. Classify the 4 types of IoT platforms. 1
12 CO A 3
. Write down the significance of 5G used in communication network. 1 n
13 CO R 3
. Differentiate between sensors and actuators. 2
14 CO U 3
. Justify the statement “power consumption important in IoT”. 3
15 CO A 3
. Name any three software used in IoT. 4
16 CO U 3
. Differentiate QoS and DoS. 5
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Draw the Functional block diagram of the IoT and brief about its CO A 6
. . functions. 1 n
b CO R 6
Differentiate between IoT and M2M.
1

18 a Brief about various types of big data analysis used in IoT and also CO U 6
. . mention the tools used in Big data Analytics. 2
b How to deploy different level of IoT in industries? Explain it with CO R 6
. the help of flow chart. 2

19 a Draw the flow chart to design IoT technology for any kind of food CO R 6
. . industries. 4
b CO R 6
. Draw the architecture of Wireless Sensor Network (WSN). 4

20 a CO A 6
. . Expand AWS. Review any 4 of the top services provided by AWS. 3
b CO R 6
. Brief about various Communication Protocols used in IoT. 3

21 a What are the different types of technology available for computer CO U 1


. . security? Brief about any four technology. 4 2

22 a CO A 1
. . Define Data aggregation mechanisms on IoT and explain its types. 4 2

23 a CO R 6
. . Criticize the four different objectives of SMARTIE approach. 5
b CO A 6
. Brief about cloud server used in IoT. 5
COMPULSORY QUESTION
24 a Describe about food quality standards, food safety and regulations CO R 6
. . in food industries. 6
b Illustrate about the energy efficient raw food processing methods in CO A 6
. food industries. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Present a survey on building blocks of IOT.
CO2 Analyze the deployment models of IOT.
CO3 Compare the connectivity technologies and protocols in IOT.
CO4 Select IOT platform for an application.
CO5 Infer security issues in IOT.
CO6 Develop architectural approach for IOT applications

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 8 1 11 20
CO2 7 10 17
CO3 6 3 8 17
CO4 13 1 15 29
CO5 5 4 20 29
CO6 6 6 12
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 19CS2015 Duration 3hrs


Course Name ARTIFICIAL INTELLIGENCE FOR FOOD ENGINEERING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Define the Heuristic function. CO
1. 1 U 1
CO
2. List the advantages of breadth-first search. 1 R 1
Turning test approach is the foundation of AI-Justify. CO
3. 2 E 1
Represent how rules help computers to make decisions and understand CO
4. information. 2 U 1
CO
5. Define Principal Component Analysis (PCA). 3 U 1
CO
6. Represent the role of AI in forecasting food microbiology. 3 U 1
Indicate one application of electronic nose technology. CO
7. 4 U 1
Computer vision is the most common technology in food sorting - CO
8. Justify 4 R 1
Identify the factors considered in edge deduction. CO
9. 5 U 1
10 Name some of the methods where artificial intelligence can be applied CO
. in the Food industry. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 Identify various elements of an agent and the characteristics of an CO
. intelligent agent. 1 U 3
12 CO
. Represent the disadvantages of relational knowledge. 2 U 3
13 CO
. Give an example of using AI in the prediction of food microbiology. 3 U 3
14 Indicate the significance of food sensory analysis in the food industry. CO
. 4 U 3
15 State the primary goal of image segmentation. CO
. 5 R 3
16 Consistency helps in enhancing the consumer experience -Justify CO
. 6 E 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Summarize the working of the breadth-first search algorithm with a CO U 6
. . tree diagram. 1
b Compute the path to reach from S to G using A* search for the CO A 6
. given figure. 1

18 a Discuss the key functions of rule-based systems in knowledge CO U 1


. . representation within artificial intelligence. Support your answer 2 2
with relevant examples.

19 a With a block diagram, explain the working of the electronic nose CO U 1


. . technology in the food industry. 3 2

20 a Summarize the benefits of AI in the manufacturing of food CO U 6


. . products. 4
b Elucidate three different ways of using AI in sorting Food systems CO U 6
. 4

21 a Discuss the various steps used in image processing for the CO U 1


. . classification of food categories. 5 2

22 a Explain how artificial intelligence improves cleaning processes CO U 1


. . (CIP) in the food industry, and discuss the factors that should be 4 2
considered when implementing AI for cleaning.

23 a Describe how feature extraction improves the checking of raw food CO U 1


. . materials, and what methods are used for this. Also, discuss how 5 2
this enhances food safety.
COMPULSORY QUESTION
24 a Explain the methods of AI that have a significant potential to CO U 1
. . transform the food industry management by improving efficiency, 6 2
reducing cost and enhancing the overall customer experience.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Define AI based problems and select appropriate search method for different search spaces.
1
CO Express knowledge representation techniques and problem solving strategies to common AI
2 applications.
CO Develop prediction models and extend for food processing applications.
3
CO Analyze the food industry operations and develop AI based solutions.
4
CO Inspect the challenges in quality management of food products through AI based image processing
5 techniques.
CO Propose AI based solutions for food industry management.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 10 6 - - - 17
CO2 - 16 - - 1 - 17
CO3 - 17 - - - - 17
CO4 1 28 - - - - 29
CO5 3 25 - - - - 28
CO6 - 13 - - 3 - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS1001 Duration 3hrs


Course Name PROGRAMMING FOR PROBLEM SOLVING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO
Define flowchart. R 1
1
2. CO
R 1
Identify the use of header file. 1
3. CO
List the four keywords. R 1
2
4. Write the C statement to find whether the person is eligible for vote or CO
A 1
not using conditional operator. 2
5. CO
Write the syntax of “do - while” loop. A 1
3
6. CO
List the unconditional statements used in C programming. R 1
3
7. CO
Name a string function which is used to join two strings. R 1
4
8. CO
Enumerate the various sorting algorithms in C programming. R 1
4
9. CO
R 1
Define recursion. 5
10 CO
Define pointer. R 1
. 6
PART – B (6 X 3 = 18 MARKS)

11 Construct the flowchart to input two numbers from the user and display CO A 3
. the largest among them. 1
12 Write the output of the following C code. CO A 3
. #include <stdio.h> 2
int main()
{
int a = 8, b = 2;
printf("a & b = %d ", a & b);
return 0;
}
13 Predict the output of the following C code. CO U 3
. #include <stdio.h> 3
int main()
{
int a = 20;
int b = 10;
int c = 15;
if(a<b && b<c)
printf(" C is the greatest number of all");
else
printf(" C is not greatest number of all");
return 0;
}

14 Illustrate how the initialization of a 1D-array takes place during its CO U 3


. runtime by a C program. 4
15 CO U 3
. Describe the need of C function. 5
16 Predict the output of the following C code. CO
U 3
. #include <stdio.h> 6
int main (){
int var;
int *ptr;
int **pptr;
var = 3000;
ptr = &var;
pptr = &ptr;
printf("Value of var = %d\n", var );
printf("Value available at *ptr = %d\n", *ptr );
printf("Value available at **pptr = %d\n", **pptr);
return 0;
}
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO U 8
Illustrate the software development life cycle model in detail.
. . 1
b Construct a C program that demonstrates the various format CO A 4
. specifiers used in C language. 1

18 a Discuss the following operators in C language with example. CO U 1


. . a) Increment and decrement operators. 2 2
b) Logical operators.

19 a Write a program that uses an "else-if" ladder to find out the grades CO A 6
. . of a student. The marks obtained by a student in five different 3
subjects are given as input through the keyboard.
b CO A 6
Write a C program for print addition table using ‘for’ loop.
. 3

20 a Write a C program that adds two matrices using multidimensional CO A 1


. . arrays using functions. 4 2

21 a Develop a C program that calculates the factorial of a given number CO A 6


. . using a recursive function. 5
b Prepare a C program to find the area and circumference of a circle CO A 6
. using function. 5

22 a CO R 7
Describe in detail the computer hardware and software.
. . 1
b CO U 5
Illustrate a C program to find the size of int, float, double and char.
. 2

23 a Develop a C code to print all the even numbers from 1 to 50 using CO A 6


. . for loop. 3
b Write short notes on following: CO A 6
. a) strlen() 4
b) strcpy()
c) strcat()
COMPULSORY QUESTION
24 a Write a C program to swap two values using call-by-reference CO A 6
. . mechanism with using a third variable. 6
b Develop a C program to create a file named customer.txt and store CO A 6
. the content of any two customer’s information. (Name, Address, 6
contact no, Customer ID).

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Understand the fundamentals of computer and software development process.
1
CO Identify the data type to represent the real time data representation and operators for computation.
2
CO Prepare innovative solutions for the problem using branching and looping statements.
3
CO Decompose a problem into functions and synthesize a complete program using divide and conquer
4 approach.
CO
Formulate algorithms and programs using arrays, pointers and structures.
5
CO
6 Create a new application software to solve real world problems.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 9 8 7 - - - 24
CO2 1 17 4 - - - 22
CO3 1 3 19 - - - 23
CO4 2 3 18 - - - 23
CO5 1 3 12 - - - 16
CO6 1 3 12 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS1002 Duration 3hrs


Course Name PYTHON PROGRAMMING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO U 1
Identify the types of variables in Python. 1
2. CO R 1
Name the keyword that deletes the variable in Python. 1
3. CO U 1
Represent the syntax for the while loop statements. 2
4. CO R 1
Name the method to sort the elements in a list. 2
5. CO U 1
Identify the pickle function to load pickled objects from a file. 3
6. CO U 1
Represent the schematic diagram of hierarchical inheritance in Python. 3
7. Identify the method name to find the image file formats like PPG, CO U 1
JPEG, and TIFF in Python. 4
8. Name the library in Python programming that supports the opening, CO R 1
manipulating, and saving of many different image file formats. 4
9. CO U 1
Identify the method to create a button widget in Python GUI design. 5
10 CO R 1
. List the types of multitasking in Python programs. 6
PART – B (6 X 3 = 18 MARKS)
11 Predict the output for the following code. CO U 3
. for v in range(10,1,-2): 1
print(v)
12 Predict the output of the following code. CO U 3
. dict1 = {'Ten': 10, 'Twenty': 20, 'Thirty': 30} 2
dict2 = {'Thirty': 30, 'Fourty': 40, 'Fifty': 50}
dict3 = dict1.copy()
dict3.update(dict2)
print(dict3)
13 CO A 3
. Differentiate the accessors and mutators methods in the Python class. 3 n
14 Predict the output of the following code for the input image size = CO U 3
. (1024, 819). 4
from PIL import Image
im = Image.open(r"C:\Users\asus tuf\Desktop\copter.jpg")
print(im.size)
im1=im.resize((im.width//2, im.height//2))
print(im1.size)
15 CO A 3
. Differentiate the combo box and list box in Python GUI. 5 n
16 CO U 3
. Explain the importance of multithreading in Python programs. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Write a Python program to find whether the given number is prime CO A 6
. . or not. 1
b CO A 6
. Illustrate the break, continue and pass statements in Python. 1

18 a Write a Python function to multiply and add all the numbers in a CO A 6


. . given list [8, 2, 3, -1, 7]. 2
b Write a Python function that accepts a string (“The quick Brow CO A 6
. Fox”) and counts the number of upper and lower case letters in it. 2

19 a Write a Python program to find a factorial of a given input number CO A 6


. . using a recursive function call. 3
b Write a Python program to implement object serialization and CO A 6
. deserialization using the pickle module. 3

20 a Write a Python code that reads an input image and performs the CO A 1
. . following tasks on it. 4 2
a) Rotate the image by 120 degrees in a clockwise direction
b) Convert the color image into black and white.
c) Change the image size using the thumbnail() function
d) Perform Gaussian blur operation.
e) Flip the image

21 a Write a Python program that designs a simple login form with CO A 6


. . labels and entry widgets, and arranges them in a grid using the Grid 5
geometry manager.
b Write a Python program that generates a pop-up dialog box to CO A 6
. display a message, error, warning, and ok/cancel box using Python 5
GUI.

22 a Write a Python program to perform the addition of two complex CO A 6


. . numbers using binary “+” operator overloading. 3
b Write a Python program to perform the following string operations CO A 6
. for the given string. 2
a) Check whether the string is palindrome or not
b) Find the length of a string
c) Capitalize the first letter of a string

23 a Write a Python program to print the second largest and smallest CO A 6


. . element in a tuple given below. 1
T1=(23,14,15,46,78,90,35,67,54)
b Write a Python function called drawRectangle() which expects a CO A 6
.
turtle object to draw a rectangle. 5
COMPULSORY QUESTION
24 a Explain how the producer-consumer problem can be implemented CO U 6
. . using the threading concepts in Python. 6
b Write a Python program to create a two-way chat application using CO U 6
. socket programming concepts. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO choose the basic programming constructs of Python suitably
1
CO infer the concepts of string processing, file I/O, lists and dictionary
2
CO apply modules for reusability and the object-oriented principles for modeling and developing
3 software system
CO utilize the power of graphics for processing images
4
CO
construct applications with graphical user interface
5
CO
6 develop software solutions using multi-threading, networking and client-server concepts

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 4 18 - - - 23
CO2 1 4 18 - - - 23
CO3 - 2 18 3 - - 23
CO4 1 4 12 - - - 17
CO5 - 1 18 3 - - 22
CO6 1 15 - - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS1003 Duration 3hrs


FUNDAMENTALS OF PROGRAMMING FOR PROBLEM
Course Name Max. Marks 100
SOLVING

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Name the translator that creates an executable machine code file from a CO R 1
program written in a high-level language. 1
2. Predict the output of the following flowchart: CO U 1
1

3. Name the type of error in the following C program: CO R 1


#include<stdio.h> 2
void main()
{
int n = 9, div = 0;
div = n/0;
printf("Result = %d", div);
}
4. Identify the output of the following expression: CO R 1
8+4*5+6/2 2
5. Write the output for the following C program: CO A 1
#include <stdio.h> 3
int main() {
int age=17;
(age > 17)?printf("Eligble to Vote."):printf("Not Eligble to
Vote.");
return 0;
}
6. Predict the output for the following C program: CO U 1
#include <stdio.h> 3
void main() {
int i;
for(i=0;i<=5;i++)
{
printf("%d",i);
break;
}
}
7. Write the output for the following C program: CO A 1
#include <stdio.h> 4
int main() {
int arr[] = {10, 20, 30, 40, 50};
printf("%d\n", arr[3]);
return 0;
}
8. Identify the output for the following C program: CO R 1
#include <stdio.h> 4
int main() {
char a[]={"Karunya"};
char *p; p=a; p++;
printf(“%c”, *p);
return 0;
}
9. CO R 1
List the different types of functions in the C program. 5
10 Write the output for the following C program: CO A 1
. #include <stdio.h> 5
int multiply(int a, int b) {
return a * b;
}
int main() {
int result = multiply(3, 4);
printf("%d\n", result);
return 0;
}
PART – B (6 X 3 = 18 MARKS)
11 Illustrate a flowchart to represent the odd or even number using if CO U 3
. condition. 1
12 Write a C program to perform a bitwise OR operation between the CO A 3
. numbers a=10 and b=4. 2
13 Develop a C program to find whether the given number is positive or CO A 3
. not. 3
14 Write a C program to store 5 elements in an array and display the array CO A 3
. in reverse order. 4
15 CO U 3
. Illustrate passing array to function concept using a C program. 5
16 CO R 3
. List the C programming applications used in bioinformatics. 6

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Explain the Software Development Life Cycle (SDLC) stages in CO U 1
. detail. 1 2

18 a Write a C program to perform the arithmetic operations using a CO A 8


. . switch statement. 2
b Write a C program to perform the bitwise AND operation for the CO A 4
. numbers a=10 and b=5. 2

19 Develop a C program to perform Telephone bill calculations by CO A 1


. getting calls_made as input from the user and calculate the billvalue 3 2
based on the following table:
S.No Calls_made Charges [per Call]
1. 0-100 Free
2. 100-200 2 per call
3. 200-300 3 per call
4. 300-400 4 per call
5. 400 - 500 5 per call
6. >500 10 per call

20 a CO A 6
. . Write a C program to perform 2x2 Matrix Addition using functions. 4
b Write a C program to implement Bubble sort for the following CO A 6
. numbers: 4
34, 4, 123, 2, 25.

21 a Develop a C program to calculate the factorial of a given number CO A 6


. . using recursion. 5
b Write a C program to find the number is prime or not using a CO A 6
. function. 5

22 Write a C program to do the Sum S where CO A 1


. 2 3 4 n 1 2
S=1+ − + … .
3! 4 ! 5! ( n+1 ) !

23 Discuss in detail about the following string operations with a CO U 1


. suitable example for each: 4 2
a) strcpy()
b) strlwr()
c) strupr()
d) strdup()
COMPULSORY QUESTION
24 Explain in detail about disease prediction functionalities with a CO U 1
. suitable example. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Understand the fundamentals of computer and software development processes.
CO2 identify the data type to represent the real time data representation and operators for computation
CO3 Prepare innovative solutions for the problem using branching and looping statements.
CO4 Decompose a problem into functions and synthesize a complete program using divide and conquer
approach.
CO5 Formulate algorithms and programs using arrays, pointers and structures.
CO6 Create a new application software to solve real world problems.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 16 12 - - - 29
CO2 2 - 15 - - - 17
CO3 - 1 16 - - - 17
CO4 1 12 16 - - - 29
CO5 1 3 13 - - - 17
CO6 3 12 - - - - 15
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS1004 Duration 3hrs


Course Name APPLICATIONS OF PYTHON PROGRAMMING Max. Marks 100

Q. BL /
Questions M
No. CO
PART – A (10 X 1 = 10 MARKS)
1. Identify the valid identifier out of the following. U/ CO1 1
a) item*qty
b) $price
c) for
d) price
2. Write the full form of CSV. R / CO2 1
3. Write the output of the following: 1
L = list("Python Questions")
print(L)
4. The following declaration is of __________ (Tuple/Dictionary) A/ CO1 1
A = (“Amit”, “Sumit”, “Naman”)
5. What is abs( ) function in python? A/ CO1 1
6. Find the value of “res” in the following code snippet: 1
val = 5
res = val is 5
7. Write a code segment that displays the values of the integers x, y U/ CO1 1
and z on a single line, such that each value is left justified in six
columns.
8. Find the output for the following code: U/CO2 1
List=[3,4,6,1,2]
List[1:2]=[7,8]
print(List)
9. Predict the output for the following code: An/CO2 1
d=[12,23,34,45,56,67]
print(d[2:5])
10. Define the use of ‘self’ parameter in python class. R/CO6 1

PART – B (6 X 3 = 18 MARKS)
1 Describe the for loop with sample code illustration. R/CO1 3
1.
1 Write the code to create a dictionary of three fruits. A/CO4 3
2.
1 Convert the following function into a recursive function: U/CO3 3
3. def compute(lower,upper):
while lower<=upper:
print(lower)
lower=lower+1
1 Mention the purpose of count function with respect to string and R/CO5 3
4. list.
1 Mention the code segment used to get multiple integer inputs. R/CO5 3
5.
1 Write the print function that displays a float variable amount that A/CO6 3
6. has exactly two digits of precision and field width of zero.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.no 17 to 23. Q.No 24 is Compulsory)
17. a. Write a user defined function convert_to_binary(decimal) that U/CO3 4
takes decimal number as parameter and returns the binary
number.
b. Write a Python program to encrypt and decrypt the string A/CO2 8
based on the given key value.
Sample Encryption:
Input: <String> “ANACONDA”, <key> 4
Output: “EREGSRHE”
Sample Decryption:
Input: <String> “EREGSRHE”, <key> 4
Output: “ANACONDA”
18. a. Develop a telephone directory of 10 contacts, where “Name” A/CO2 6
will be the key and “Mobile number” will be the value.
Demonstrate the usage of the directory by computing the
following functionalities:
• Inserting a new contact
• Updating an existing contact
• Searching a contact
b. Design a program to print the following pattern (for the given A/CO1 6
integer “n”) filled with random numbers:
Sample Input: 4
Output:
12
1 15
28 98 76
31 83 13 72
19. a. Illustrate read and write functionalities with sample code in a U/ 6
text file. CO2
b. Design a class called “Box” with data such as length, height A/CO3 6
and breadth then create two Box objects box1 and box2 with
proper dimensions and check both box is similar or not by
overloading = = operator.
20. a. Illustrate the following inheritance hierarchy. Define A/ 6
members in each class according to the following details and CO3
test your program by creating 2 objects of sub classes.
Class Data Methods
Details id, name,gender setDetails, getDetails
Employee company,department setEmployee, getEmployee
Doctor hospital, department setDoctor, getDoctor
b. Create a program that read an image and carry out the A/CO4 6
following tasks on it and save each modified image in a
separate file
• Rotate the image by 30 degrees in clockwise direction
• Change the image to black and white.
• Reduce the image to half of its size.
• A blur effect on the image.
21. a. Develop a program to design the following shapes using A/ 6
turtle graphics. CO4
• Star (Yellow for filling and red for line)
• Indian Flag(A filling color appropriately)

b. Give the code segment to display the uppercase alphabetical A/CO2 6


letters from A to Z.
22. a. Design a program that accepts the lengths of three sides of a A/ 6
triangle as inputs. The program output should indicate CO1
whether or not the triangle is a right triangle. Recall from the
Pythagorean theorem that in a right triangle, the square of one
side equals the sum of the squares of the other two sides.
b. Describe the following control statements with illustrations U/ 6
a) if statement CO1
b) for loop
23. a. Create a program that opens a text file in read mode and A/ 5
display the total number of words, spaces, and vowels in it. CO2
b. List down any ten Python file functions with description and R/ 7
sample code. CO2
Compulsory:
24. a. Describe python libraries used for thermodynamics with an A/ 6
example. CO6
b. Describe about Scipy (Numpy, matplotlib, pandas) reading R/ 6
data from data repository. CO6

COURSE OUTCOMES
CO1 Choose the basic programming constructs of Python suitably.
CO2 Infer the concepts of string processing, file I/O, lists and dictionary.
CO3 Apply modules for reusability and the object-oriented principles for modeling and developing
software system.
CO4 Utilize the power of graphics for processing images.
CO5 Construct applications with graphical user interface.
CO6 Develop software solutions using standard libraries for mechanical applications.
Assessment Pattern as per Bloom’s Taxonomy
CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 3 8 5 - - - 16
CO2 8 7 14 1 29
CO3 - 7 12 - - - 19
CO4 - - 15 - 15
CO5 6 - - - - - 6
CO6 6 - 9 - - - 15
100
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2001 Duration 3hrs


Course Name AGILE SOFTWARE DEVELOPMENT Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
CO
1. State the process of agile software development life cycle. 1 R 1
CO
2. Identify the need for frequent inspection in an agile project. 1 U 1
CO
3. List the components of single responsibility principle. 2 R 1
CO
4. State the principles of Liskov Substitution principle. 2 R 1
CO
5. List the importance of frequent inspection in Agile. 3 R 1
CO
6. State the functions of a product backlog. 3 R 1
CO
7. Define user story. 4 R 1
CO
8. State the practices of affinity estimating. 4 R 1
Outline the success percentage of collocated and dislocated scrum CO
9. teams. 5 U 1
CO
10. List ADKAR’s five steps to manage change in agile projects. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11. CO
State the objective of open closed principle. 1 R 3
12. CO
Describe rigidity and fragility of agile design. 2 U 3
13. CO
List the advantages of Kanban. 3 R 3
14. CO
Illustrate the work of task board. 4 U 3
15. CO
Enumerate the concept of sprint review bazaar. 5 R 3
16. CO
Name few agile principles that support risk management. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a Explain the 12 principles and steps involved in agile project CO U 6
. management. 1
b As a software developer you may want to use the design CO A 6
. principles in the object-oriented design process to create a 1
system of interacting objects and resolve software problems.
State the overall execution of Single Responsibility Principle for
this purpose.

18. a Apply Dependency Inversion Principle by showcasing its CO A 6


. implementation in the provided Java program. 2

class Switch {
private SwitchableDevice device;

public Switch(SwitchableDevice device) {


this.device = device;
}
public void press() {
if (device != null) {
device.turnOn();
device.turnOff();
}}}
public class DependencyInversionPrincipleExample {
public static void main(String[] args) {
SwitchableDevice bulb = new LightBulb();
SwitchableDevice fan = new Fan();

Switch lightSwitch = new Switch(bulb);


lightSwitch.press();

Switch fanSwitch = new Switch(fan);


fanSwitch.press();
}}
b CO U 6
. Explain interface segregation principle with an example. 2

19. a Explain different approaches for creating physical environment CO U 6


. in agile. 3
b Explain Scrum and its framework, and then design a Scrum CO A 6
. framework for the given scenario. 3
The scenario involves developing a web-based Recruitment
Process System for the HR Group of a company. The system
should include features such as vacancy creation, applicant data
storage, initiation of the interview process, interview scheduling,
storing interview results, and the final hiring of applicants.
Additionally, the framework should incorporate the generation
of reports for the HR group, providing a clear overview of the
implementation process.

20. a Describe the various stages involved in formulating a roadmap. CO R 6


. Subsequently, design a project roadmap for the given context: 4
the creation of a web-based system for Student Project
Management and Online Testing. This system will oversee the
database, compile a roster of all registered student groups,
administer their online tests, and identify students meeting
professors' eligibility criteria. The modules will involve
monitoring students leave records, calculating and recording
fees payments, and documenting academic results as the
ultimate outcome. Finally, establish a project vision for the
aforementioned scenario.
b Explain sprint review and retrospective of agile project CO U 6
. development. 4

21. a Describe the types of software testing that you can automate CO R 6
. during the process of managing quality and risk of a software 5
project.
b Illustrate the methods of becoming self-managing and self- CO U 6
. organizing in managing agile team dynamics. 5

22. a Explain role of scrum master and product owner in quality CO U 6


. management. 5
b Describe the concept of introducing velocity by managing CO R 6
. schedules. 5

23. a Explain few important factors on Multiteam Coordination with CO U 6


. LeSS. 5
b Explain agile methods in lowering cost by: CO U 6
. i)Reducing time ii)Increasing velocity 6
COMPULSORY QUESTION
24. Explain platinum edges change road map in adapting different CO A 1
steps to change in agile projects. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
Describe the principles and practices of Agile methods in software development.
1
CO Explain the processes and strategies of the various Agile technologies in terms of work products,
2 roles and practices.
CO
Choose appropriate managing techniques to solve issues in real time applications.
3
CO
describe the techniques and tools used to improve team collaboration and software quality
4
CO
Identify and address the most common problems encountered in the use of Agile methods.
5
CO
Apply Agile practices when multiple teams are working on a single project.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 4 7 6 - - - 17
CO2 2 9 6 - - - 17
CO3 5 6 6 - - - 17
CO4 8 9 - - - - 17
CO5 15 19 - - - - 34
CO6 4 6 12 - - - 22
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2003 Duration 3hrs


Course Name AUGMENTED REALITY AND VIRTUAL REALITY Max. Marks 100

Q.
N Questions CO BL M
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define ‘virtuality’ in the context of AR and VR. 1 R 1
CO
2. Identify how VR differs from AR and telepresence. 1 R 1
Examine the relationship between the HMD field of view and CO
3. resolution. 2 R 1
CO
4. Distinguish between touch feedback and force feedback. 2 U 1
CO
5. List two common graphics accelerators used for 3D rendering. 3 R 1
State the role of collision detection in managing multi-model CO
6. interactions. 4 R 1
Name two key components of physical modelling in computer CO
7. graphics. 4 R 1
Classify the types of foveated rendering in perception-based CO
8. graphics. 5 U 1
CO
9. Explain the term ‘agency’ in the context of interactive systems. 6 U 1
10 CO
. Infer on productivity enhancement platforms in VR. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 Explain the key differences between virtual reality (VR) and CO U 3
. augmented reality (AR) 1
12 Illustrate how depth is perceived by the human vision system using CO A 3
. a diagram. 2
13 Compare and contrast distributed virtual reality architectures with CO An 3
. centralized ones. 3
14 Summarize the concept of object hierarchies for efficient 3D scene CO U 3
. management. 4
15 CO U 3
. Infer on the role of kinematics modelling for 3D world simulations. 5
16 CO U 3
. Discuss the applications of virtual reality in robotics. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Describe the impact of early commercial VR on the gaining and CO U 12
. animation industry. 1

18 Speculate the potential future applications of AR and VR CO C 12


. technologies in enhancing human experiences. 1

19 a Discuss the importance of human perception and cognition with CO U 6


. . examples. 2
b Evaluate the impact of ball-tracking technology in basketball CO E 6
. games. How does it enhance gameplay and player training? 2

20 a Explain the concept of inside-out camera tracking and discuss CO U 6


. . its pros and cons. 3
b Interpret the role of optimization techniques in improving real- CO U 6
. time 3D rendering. 3

21 Describe the steps in the interaction design process life cycle CO U 12


. with suitable examples. 4

22 a Discuss the significance of identity in shaping user perceptions CO U 6


. . in immersive environments. 5
b Create a scenario where users can experience a heightened sense CO C 6
. of presence through an augmented reality application. 5

23 a Evaluate the success of different information visualization CO E 6


. . techniques for conveying complex data in VR environments. 6
b Design an interactive robotic simulation in VR that allows users CO C 6
. to control robot movements and observe their impact on the 6
environment.
COMPULSORY QUESTION
24 a Explain virtual heritage and the steps needed to build a heritage CO E 6
. . edifice in detail. 6
b Give examples and comment on how VR is being used in CO U 6
. different levels of education. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Describe the augmented reality and virtual reality technologies.
1
CO Demonstrate motion trackers, navigators in augmented and virtual reality environments.
2
CO Estimate the effect of virtual reality and augmented reality simulation on users.
3
CO Analyze camera tracking and 3D rendering in augmented reality.
4
CO Identify the various modelling techniques in virtual reality.
5
CO Design real-time applications using virtual and augmented reality.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 15 - - - 12 29
CO2 1 7 3 - 6 - 17
CO3 1 12 - 3 - - 16
CO4 2 15 - - - - 17
CO5 - 10 - - - 6 16
CO6 - 11 - - 12 6 29
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2004 Duration 3hrs


Course Name AUTOMATIC SPEECH RECOGNITION Max. Marks 100

Q. C B M
N Questions O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the process where the vocal folds are held open to allow the CO U 1
air to pass through or vibrate to make a sound. 1
2. Name the third dimension of the spectrographic representation of the CO R 1
input speech signal. 1
3. Identify the algorithm that is used to measure similarity between two CO R 1
temporal sequences that may vary in speed. 2
4. CO R 1
List any one symmetry of the distortion measures. 2
5. Identify the framework that is proven to work well when DNN and CO U 1
HMM are combined. 3
6. CO R 1
Name the probability that transitions from one hidden state to another. 3
7. Which is the key component of the speech-to-speech translation CO R 1
system? 4
8. State the mathematical function that converts a vector of numbers into CO R 1
a vector of probabilities. 4
9. Name the inferred transcription that can be obtained by decoding the CO R 1
utterance using the speaker-independent models. 5
10 Write any one of the tasks used in multitasking learning to improve CO R 1
. the performance of the given number of tasks. 6
PART – B (6 X 3 = 18 MARKS)
11 CO A 3
. Distinguish between voiced and unvoiced speech. 1 n
12 CO U 3
. Represent the block diagram of the pattern recognition model. 2
13 CO R 3
. List out the 3 components in the CD-DNN-HMM model. 3
14 Explain the living room interaction systems and in-vehicle CO U 3
. infotainment using speech signals. 4
15 Explain the feature learning process of the deep neural network CO U 3
. model. 5
16 List out the three key applications where multitasking and transfer CO R 3
. learning can be applied to provide solutions for problems faced in the 6
domain of speech recognition.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Illustrate the filter bank representation of an input speech signal CO A 12
. and show how the linear prediction analysis is important for 1
speech.

18 a. Calculate the cost matrix between two time-series signals X and CO A 6


. Y using the dynamic time warping (DTW) algorithm. 2
X=[1,2,3,4,3,4,1,5] Y=[1,3,1,4,5,2,1,4]
b. CO U 6
Explain the working principle of the ASR system. 1

19 Determine you are tasked with designing a speech recognition CO A 12


. system for a smart home device. The system should be able to 3
accurately understand and respond to various commands spoken
by users, such as turning on/off lights, adjusting thermostat
settings, playing music, and providing weather updates. Describe
how you would approach building this system, considering the
different components, techniques, and challenges involved.

20 a. Explain how Mel frequency cepstral coefficients (MFCC) are CO U 6


. used to recognize the emotion of a speaker from their voice. 2
b. Construct an ASR system using a filter bank-based technique to CO A 6
extract more robust and discriminative features. 2

21 Describe the comprehensive architecture of automatic speech CO U 12


. recognition systems, outlining the key components of converting 3
speech to text. Elaborate on strategies and advancements utilized
to mitigate these challenges and enhance the overall performance
and robustness of acoustic models in speech recognition.

22 a. Explain how the automatic speech recognition system is an CO U 6


. important bridge in fostering better human-to-human and 4
machine communication.
b. Explain the architecture of a deep neural network for speech CO U 6
recognition application and also summarize the limitations of 4
conventional acoustic models.

23 Describe the significance and mechanisms of feature CO U 12


. representation learning in deep neural networks, emphasizing its 5
role in extracting meaningful representations from raw data.
Highlight the importance of feature representation in enabling
deep neural networks to effectively tackle complex tasks and
improve performance across speech recognition domains.
COMPULSORY QUESTION
24 Explain in detail representation sharing and transfer in deep CO U 12
. neural networks. How do these concepts contribute to the 6
efficacy and efficiency of neural network models? Provide
examples or applications to illustrate their significance.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 understand the fundamentals of speech processing techniques
CO2 choose the appropriate speech analysis techniques
CO3 design a suitable acoustic model for a given input speech
CO4 illustrate the models for recognizing given input speech
CO5 describe the learning using Deep Neural Networks for a given speech
CO6 develop an advanced deep model for Automatic Speech Recognition
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 1 7 12 3 - - 23
CO2 2 9 12 - - - 23
CO3 4 13 12 - - - 29
CO4 2 15 - - - - 17
CO5 1 15 - - - - 16
CO6 4 12 - - - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2005 Duration 3hrs


Course Name BIGDATA QUERY LANGUAGE Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
List any three applications of bigdata. CO
1. 1 R 1
CO
2. List any three file manipulation functions used in RHADOOP. 1 R 1
CO
3. Differentiate interactive and batch mode in R programming. 2 U 1
CO
4.
Identify the different types of components used in RHIPE architecture. 2 R 1
CO
5. Write the command for local mode grunt shell. 3 A 1
CO
6. State the difference between STORE and DUMP 3 R 1
CO
7. State the syntax for creating a database using HQL. 4 R 1
List the three types of complex data model in HIVE with the format. CO
8. 4 R 1
CO
9. List out the types of shell in SPARK. 5 R 1
10 CO
. Compare Cassandra and RDBMS. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Enumerate the various types of bigdata 1 R 3
12 CO
. Visualize the diagram of RHADOOP architecture and its components. 2 R 3
13 Write short notes on Piggybank. CO
. 3 A 3
14 CO
. Summarize the different types of read operations in Cassandra. 4 U 3
15 CO
. Discuss about various features of HIVE. 5 U 3
16 CO
. Tabulate the various Cassandra collections that are used to handle tasks. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a From the shuffled pack of cards, a card is drawn. This trial is CO A 1
. . repeated for 400 times, and the suits are given below: 1 2
Suit Spade Clubs Hearts Diamonds
No. of times drawn 90 100 120 90

While a card is tried at random, then calculate the probability of


getting the following:
a. Diamond cards
b. Black cards
c. Except for spade

18 a CO U 1
. .
Explain the HDFS architecture and MapReduce algorithm in detail. 6 2

19 a Describe the four components of RHIPE architecture with a neat CO R 8


. . diagram. 2
b Consider the following employee dataset: CO R 4
. 2

Identify the output of the combiner face and reducer face.

20 a Explain the following HIVE DDL commands with the syntax and CO U 1
. . example: 4 2
a) Create a database
b) Drop database
c) Create a table
d) Altering a table

21 a Enumerate the following Pig Relational operators with suitable CO R 1


. . examples. 4 2
a. Load
b. Cross
c. Foreach
d. Limit.

22 a Describe the following Pig Relational operators with suitable CO R 1


. . examples. 3 2
a. Distinct
b. Filter
c. Split
d. Union

23 a CO R 6
. .
Describe how Cassandra handles tasks with various collections 5
b Illustrate any three transformations used in Resilient Distributed CO
. Datasets. 5 U 6
COMPULSORY QUESTION
24 a Determine a student table with following fields: Name, RegNo, CO A 1
. . Branch, Email and insert the multiple values to the employee table 5 2
using Set collection.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 understand the importance and challenges of Big data
CO2 design applications using HADOOP and RHADOOP
CO3 identify the appropriate function of PIG data model to be used in development
CO4 model Big data applications schema and use HIVE QL
CO5 develop applications with Cassandra
CO6 build applications with HDFS and MapReduce

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 5 - 12 - - - 17
CO2 16 1 - - - - 17
CO3 13 - 4 - - - 17
CO4 14 15 - - - - 29
CO5 7 9 12 - - - 28
CO6 3 13 - - - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2006 Duration 3hrs


Max.
Course Name COGNITIVE COMPUTING 100
Marks

Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. State Machine learning.
1 R 1
CO
2. List two disadvantages of cognitive computing.
1 R 1
CO
3. Name three eras of computing.
2 R 1
Write three fields that led to the development of cognitive CO
4.
computing. 4 A 1
CO
5. Name three types of machine learning.
2 R 1
CO
6. Interpret the uses of Bayes net.
4 U 1
CO
7. Define Bayes rule.
4 R 1
CO
8. Infer your views on visual analytics.
3 U 1
CO
9. Write the output for sentiment analytics.
3 A 1
CO
10. State computer vision.
3 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO R 3
11. List two systems of judgment and choice.
1
CO U 3
12. Discuss a few applications of visual analytics.
3
CO U 3
13. Describe the two disadvantages of Bayes net.
3
CO R 3
14. Define taxonomy with an example.
3
CO A 3
15. Explain two syntaxes in Lexical analysis.
6
CO U 3
16. Infer Semantic Web its two categories.
3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. Describe two systems of judgment and choice with their CO R 12
advantages and disadvantages. 1
18. Discuss the various perspectives put forth by computer CO U 12
scientists regarding the advancement of cognitive 1
computing.
19. a. Describe the three design principles for cognitive systems. CO U 8
1
b. Define differentiating characteristics useful for designing a CO R 4
cognitive system. 4
20. a. Recite Analytics Evolution in detail with a diagram. CO R 7
4
b. Sketch overview of the proposed cognitive computing CO A 5
architecture–cognitive random forest. 4
21. a. Enumerate how the speech analytics is done and its CO R 9
importance in the business field. 4
b. Write the functions of lexical analysis. CO A 3
2
22. a. Explain the Hidden Markov Model with an example. CO A 8
3
b. Infer the functionality of the voice of the customer. CO A 4
4 n
23. a. Illustrate how different analytics enhance the Shopping CO U 7
experience of a customer with the use case. 3
b. Write how language identification and tokenization are CO A 5
done with an example. 3
COMPULSORY QUESTION
24. a. List the DeepQA architecture of IBM Watson. CO R 5
5
b. Discuss how computer vision is used in face recognition. CO U 7
6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS
ALLOTTED

COURSE OUTCOMES
CO1 outline the importance of cognitive computing
CO2 analyze the business implications of cognitive computing
CO3 apply natural language technologies to business problems
CO4 apply machine learning for a specific real-world application
CO5 develop Chabot applications for business problems
CO6 develop Cognitive applications in health care using machine learning

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 17 20 - - - - 37
CO2 2 - 3 - - - 5
CO3 4 17 14 - - - 35
CO4 21 1 6 4 - - 32
CO5 5 - - - - - 5
CO6 - 7 3 - - - 10
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2007 Duration 3hrs


Course Name COMPUTER COMMUNICATION NETWORKS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Relate the transmission mode employed when there is a communication CO U 1
between the computer and the keyboard. 1
2. Name the topology which would require the most extensive cabling CO R 1
when a network has 30 computers. 1
3. CO R 1
Identify the even parity bit for the following data 1110111. 2
4. CO R 1
List the protocols that make up the PPP stack. 2
5. Indicate the type of address for the ethernet destination address CO U 1
FF:FF:FF:FF:FF:FF. 3
6. CO R 1
Name the IEEE standard assigned for Wireless LAN. 3
7. CO R 1
Define the term roaming in cellular networks. 4
8. CO R 1
Identify the principle used in Global Positioning System. 4
9. Show the shortest form for the following address: CO U 1
2340:1ABC:119A:A000:0000:0000:0000:0000 5
10 CO U 1
. Represent an implementation of Link State Routing. 6
PART – B (6 X 3 = 18 MARKS)
11 Interpret the types of direction of data flow in a data communication CO U 3
. system. 1
12 Calculate the checksum for the following binary data CO A 3
. 10011001111000100010010010000100. 2
13 CO A 3
. Sketch the frame format for IEEE 802.3. 3
14 CO U 3
. Discuss the MEO satellites with relevant sketches. 4
15 Appraise how ICMP supports error-reporting and error-correcting CO A 3
. mechanism. 5 n
16 CO U 3
. Explain the connection establishment in TCP with a timeline diagram. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss on the responsibilities of the layers of the ISO-OSI model CO 1
. . with a sketch. 1 U 2

18 a Determine the CRC for the data word 100100 with a polynomial CO
. . x3+x2+1. 2 A 6
b Interpret Go-back N ARQ when a frame is being transmitted from CO
. the sender to the receiver. 2 U 6

19 a CO
. . Explain the IEEE802.11 architecture with a sketch. 3 U 6
b CO
. Describe the concept of VLAN with supporting architecture. 3 U 6

20 a Interpret Cellular Networks and discuss on the terms: paging, CO 1


. . frequency reuse, and handoff. 4 U 2

21 Employ the Distance Vector routing protocol within the intradomain CO A 1


. of an autonomous system for the following network. 5 2

22 CO A 1
. Construct the Hamming code for the data 1001101. 2 2

23 a Justify the following queries: CO A 6


. . (i) Determine the class for the IP address 227.12.14.87. 5
(ii) Change the IP address 11111001 10011011 11111011
00001111 to
dotted-decimal notation.
(iii) Determine the netid and the hostid of the IP address
171.34.14.8.
b Interpret the guided media used for a data communication system CO U 6
. with relevant diagrams. 2
COMPULSORY QUESTION

24 Interpret the various categories and policies related to the CO A 1


. congestion control in a network. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO understand the components and layered architecture of communication networks
1
CO identify the protocols and services of data link layer.
2
CO analyze the different LAN technologies for building networks.
3
CO describe the wireless WAN technologies for wireless transmission.
4
CO design network model and determine the routing protocols for different applications.
5
CO construct communication networks for supporting different applications.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 16 17
CO2 2 6 21 29
CO3 1 13 3 17
CO4 2 15 17
CO5 8 18 3 29
CO6 3 12 15
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2008 Duration 3hrs


Course Name COMPUTER NETWORKS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
Name some application layer protocols.
1
2. CO R 1
List the types of network topologies.
1
3. CO U 1
Identify the transport layer protocol for SMTP.
2
4. CO R 1
List the functions of DNS.
2
5. CO R 1
Identify the protocol used for network management.
3
6. Compute the maximum number of IP addresses that can be assigned to CO U 1
hosts on a local subnet that uses 255.255.255.24 subnet mask. 3
7. CO R 1
Give examples of protocols used for Intra-Domain routing.
4
8. Assuming even parity, find the 1-D parity bit for each of the following CO U 1
data units. 4
a. 1001001
b. 1000001
9. CO U 1
List the services offered by the data link layer.
5
10 CO R 1
Define SDN.
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO R 3
Describe the types of Physical media.
. 1
12 CO R 3
Explain the working of FTP Protocol.
. 2
13 CO R 3
Differentiate TCP and UDP protocol.
. 3
14 Determine the network address for the given IP address and subnet CO A 3
. mask. 4
a) IP address: 182.44.92.16 Mask: 255.255.224.0
b) IP address: 212.44.82.116 Mask: 255.255.255.192
15 CO A 3
Discuss the need for virtual LAN.
. 5
16 CO R 3
List the types of clouds.
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO R 6
Explain the TCP/IP layer protocol suite with a neat diagram.
. . 1
b Discuss in detail about the types of delay a packet suffers along the CO R 6
. path. 1

18 a Consider a scenario where a user Alice, with a Web-based e-mail CO U 6


. . account (such as Hotmail or gmail), sends a message to another user 2
Bob, who accesses his mail from his mail server using any mail
access protocol. Discuss how the message gets from Alice’s host to
Bob’s host. Distinguish various mail access protocols.
b CO R 6
Discuss various methods and status codes in HTTP.
. 2

19 a CO R 6
Draw and explain the TCP header structure.
. . 3
b CO R 6
Describe the BGP protocol used in Inter-AS domain routing.
. 3

20 a Apply the Dijkstra algorithm to the following graph to find the CO A 8


. . shortest path from node a to z and illustrate with its steps. 4
b Describe how dynamic IP is assigned to the hosts by the DHCP CO U 4
. server with an example. 4

21 a Compare and contrast the IPv4 and IPv6 header format and discuss CO R 6
. . the rationale for transition and the methods available to migrate 4
from IPv4 to IPv6 addressing.
b CO R 6
Explain the router architecture and its components.
. 4

22 a Explain the working of ARP in the network below to transmit data CO A 1


. . from A to B. 5 2

23 a Transmitting a bit stream 101110 uses the standard CRC method CO A 6


. . with a generator polynomial of 1001. Demonstrate the process of 5
generating CRC code bits and their utilization for validating the bit
stream. Additionally, elucidate how the receiver detects errors, such
as the inversion of the third bit from the left, during transmission.
b CO R 6
Enumerate the working of Ethernet Protocol.
. 5
COMPULSORY QUESTION

24 a Elaborate on the function of SDN within data centers and CO U 6


. . computing systems, elucidating its role in network management and 6
control.
b Describe the fundamental structure of SDN and identify the CO R 6
. components, operations, and devices involved in its architecture. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
identify the factors influencing computer network infrastructure and development.
1
CO
apply the network protocols in building the computer networks.
2
CO
analyze the routing algorithms and their behaviors.
3
CO
design computer networks with optimized address assignment.
4
CO
evaluate the performance and characteristics of network protocols.
5
CO
6 develop real life network based projects

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 17 17
CO2 10 7 17
CO3 16 1 17
CO4 13 5 11 29
CO5 6 1 21 28
CO6 10 6 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2009 Duration 3hrs


Course Name COMPUTER ORGANIZATION AND ARCHITECTURE Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Interpret the concept of IAS computer. CO1 U 1
2. Name the registers in central processing unit. CO1 R 1
3. Describe the need for MBR component in CPU. CO2 U 1
4. List out the number of sub cycles in a basic instruction cycle. CO2 R 1
5. Differentiate logical address and physical address. CO3 U 1
6. Name the major components in DMA. CO3 R 1
Consider the 64 bit processor computer system. User wants to
7. install 32 bit operating sysetem in the above computer. Predict CO4 U 1
the installation output.
8. Define the term instruction prefetching. CO4 R 1
9. List out the types of pipeline hazards. CO5 U 1
10
Describe control unit. CO6 R 1
.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
Illustrate the major functionality of a PCI BUS in CPU. CO1 A 3
.
12 A
Compare the functionality of cache memory and main memory. CO2 3
. n
13 Demonstrate the functions of a DMA module in a computer
CO3 A 3
. system.
14 Differentiate the following methods: unsigned integer A
CO4 3
. multiplication and singed integer multiplication. n
Consider the following Equation:
15 Y = ( A − B ) / [ C + ( D × E ) ]
CO5 A 3
. Apply three address instruction and list out the necessary
instruction.
16 Order the micro-operations may require in an instruction A
CO6 3
. execution. n
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a Illustrate the functional diagram of a computer top level
. . structure and state the functions of each component in CO1 U 6
computer.
b Identify the list of components in a von Neumann architecture CO1 R 6
. (CPU) and describe the functionality of each component with
proper block diagram.

18 a With a neat Sketch, explain the Instruction Cycle State CO2 U 6


. . Diagram.
b Examine the internal structure of a traditional single-processor CO2 R 6
. computer from a hierarchical perspective.

19 a List out the key characteristics of computer memory system CO3 R 6


. . and describe the characteristics with proper example.
b Consider the following details regarding cache memory and CO3 A 6
. main memory:
Cache memory size: 64KB
Main memory size: 16MB
Block size: 4 Bytes
Calculate the following for direct mapping method:
1. Total number bits required for addressing.
2. Number of tag bits
3. Number of index bits

20 a List out the accessing methods and performance metrics of a CO4 R 6


. . memory. Also explain the memory accessing methods with
required examples.
b Consider the following details regarding main memory: CO4 A 6
. Main memory size: 32 MB
Block Size: 4 Bytes
Calculate the total number of bits required to address the
memory with required diagram.

21 a Define hard error in semiconductor memory. Also illustrate CO4 R 6


. . the functional procedure of error correcting code function
with required block diagram.
b Consider the memory write and read operations during a data CO5 A 6
. processing:
While writing into memory the data is 1111 1111
While reading from memory the data is 1111 1101
Calculate the following:
1. Check bit.
2. Syndrome word
3. Error bit position

22 a Consider the following data for signed integer multiplication CO5 A 6


. . using booth’s algorithm:
Data 1: 6
Data 2: 3
Compute the multiplication with above data’s.
b Illustrate the flow diagram for unsigned integer addition and CO5 U 6
. subtraction. Also describe the procedure to compute the
unsigned integer addition with suitable example.

23 a Consider a software program have 6 instructions. Illustrate CO5 U 6


. .the timing diagram for instruction pipeline operation for
above program. Also describe the working procedure of a
instruction pipeline operation for above software program.
b Examine the common addressing modes or techniques may CO6 A 6
. use in the instruction sets. n
COMPULSORY QUESTION
24 a Clarify the differences between indirect cycle and interrupt CO6 U 6
. . cycle in view of sequencing the micro-operations.
b Consider the execute cycle in an instruction execution. List CO6 R 6
. out the register’s required for this fetch cycle. Also state the
sequence of micro-operations in this cycle with proper
example.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 explain function of the central processing unit
CO2 develop algorithms for error correction for memory modules (main and cache memory)
CO3 design and understand various input and output modules for central processing unit.
CO4 select and use standard addressing modes for logical and physical memory addressing
CO5 list and define various stages of instruction pipelining in processor.
CO6 explore various ways to implementing the micro instruction sequencing and execution

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 7 7 3 17
CO2 7 7 3 17
CO3 7 1 9 17
CO4 13 1 6 3 23
CO5 13 15 28
CO6 7 6 9 22
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2010 Duration 3hrs


Course Name CRYPTOGRAPHY AND NETWORK SECURITY Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
__________ is when each plaintext element or group of
elements is uniquely replaced by a corresponding ciphertext
1. element or group of elements. CO1 U 1
2. What is private key encryption? CO1 R 1
3. Differentiate symmetric and asymmetric key cryptography. CO2 R 1
4. Give the classification of active attacks. CO2 R 1
5. What are the two types of key used in public key cryptography? CO3 U 1
How can asymmetric key encryption be used in a practical
6. scenario? CO3 R 1
Diffie-Hellman algorithm also supports Digital Signature
7. application. Is it True or False? CO4 U 1
When a hash function is used to provide message authentication,
8. the hash function value is referred to as______________. CO4 R 1
_________ protocol is used for the purpose of copying the
9. pending state into the current state. CO5 U 1
10. Elucidate Virtual Ponzi schemes with respect to cryptocurrency. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. How are cryptographic algorithms classified? CO1 An 3
Explain the differences between private and public key
12.
cryptosystems. CO2 U 3
Can you explain the working of the Diffie-Hellman (DH)
13.
algorithm? CO3 An 3
Would you recommend using the MD5 hash to store user
14.
passwords? Justify your answer. CO4 U 3
15. List out any three benefits of IPSec. CO5 An 3
Explain any two types Of Cryptocurrency Scams that affect
16.
cyber security. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Elucidate the working principle of Triple Data Encryption CO1 R 12
Standard (3DES) in details with neat diagram.

18. a Briefly explain the steps of message digest generation in CO2 R 6


. Whirlpool Hash with a block diagram.
b Explain PKI management model and its operations with the CO2 R 6
. help of a diagram.

19. a Construct the procedural steps for selecting the primes CO3 U 6
. number in Rivest Shamir Adleman (RSA) algorithm and
discuss its security features.
b Apply RSA algorithm for the given prime numbers of p=61 CO3 A 6
. and q=53, find the resulting public and private keys. For the
plaintext M=65, do the encryption and decryption.

20. Explain the concepts of Digital signature algorithm with key CO4 U 12
generation and verification in detai

21. a Explain IP security architecture using a neat diagram. CO5 R 6


.
b Discuss in detail Encapsulating security payload. CO5 R 6
.

22. a Let message = "instruments", Key = “monarchy”, find CO1 An 6


. ciphertext using playfair cipher.
b Demonstrate encryption and decryption process in hill CO1 An 6
. cipher. Consider m = “ACT” and key = “GYBNQKURP”

23. Explain briefly about the architecture and certification CO4 U 12


mechanisms in Kerberos and X.509.
COMPULSORY QUESTION

24. Consider a quantum computing, in which, we are given a set CO6 U 12


of N elements and we want to find a single marked element
as unstructured search problem. State and explain the
Grover’s Algorithm in details for solving the above said
problem.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
Interpret the security issues and the need for cryptographic algorithms.
1
CO
Apply the various algorithms to achieve confidentiality, integrity, and availability.
2
CO
recognize the importance of network security based on the attacks
3
CO
Examine the cryptographic algorithms for securing the network.
4
CO
Choose the combination of cryptographic algorithms for securing any network application.
5
CO
6 Analyze the advancements in implementing security of networks.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 13 1 - 15 - - 29
CO2 2 15 - - - - 17
CO3 1 7 6 3 - - 17
CO4 1 28 - - - 29
CO5 12 1 - 3 - - 16
CO6 - 16 - - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2011 Duration 3hrs


Course Name DATA ACQUISITION AND PROCESSING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define Active sensor. 1 R 1
CO
2. Compare ADC with DAC. 1 U 1
CO
3. List the features of USB connector. 2 R 1
CO
4. State the advantages of feedback systems. 2 R 1
CO
5. Define clock jitter. 3 R 1
CO
6. List the advantages of LabVIEW. 3 R 1
CO
7. Classify the types of accuracy. 4 U 1
CO
8. Compute the two’s complement of 1010111. 4 A 1
CO
9. Define Aliasing effect. 5 R 1
10 Express mathematically the cross-correlation function between two CO
. signals x(t) and y(t). 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Classify the various types of noises. 1 U 3
12 CO
. Compare microprocessor with microcontroller. 2 U 3
13 CO
. Identify the advantages of application software. 3 U 3
14 Interpret the conversion of binary to gray code and vice versa using a CO
. circuit diagram. 4 A 3
15 CO
. Sketch the sampling and quantization process. 5 A 3
16 CO
. Explain the various types of bus management lines. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Illustrate the working of n-bit Successive approximation digital to CO A 8
. . analog converter with circuit diagram. 1
b CO A 4
. Sketch the block diagram of Plug-in DAQ system. 1

18 a Explain the working of serial and parallel communication interfaces CO U 7


. . with necessary diagrams. 2
b Explain the architecture of Bluetooth wireless communication with CO U 5
. relevant diagrams. 2

19 CO 1
. Develop a sample functional design for a data acquisition system 3 A 2
with all necessary requirements.

20 a Calculate the hexadecimal equivalent of 2684 using the suitable CO A 6


. . number system conversion table. 4
b Compute the binary equivalent of 27.85 using the suitable number CO A 6
. system conversion table. 4

21 a Determine an expression for Signal to Noise Ratio for a sawtooth CO A 1


. . error waveform with equation given by ɛ = - kt. 5 2

22 a CO A 7
. . Sketch the various types of clock skews with necessary diagrams. 2
b CO U 5
. Compare USB with Firewire. 2

23 a Identify the various data and control signals included in a DAQ CO U 6


. . system. 6
b Calculate the quantization noise and the corresponding signal-to- CO A 6
. noise ratio for a full range sinusoidal signal for a 12-bit D/A 6
converter with a 5.000 V reference.
COMPULSORY QUESTION
24 a Explain the following analytical techniques (i) curve fitting (ii) CO
. . correlation 6 U 8
(iii) Frequency response of a system.
b Sketch the Fourier transforms and Power spectral density of the CO
. following functions: (a) square pulse (b) delta function (c) half- 6 A 4
cosine pulse (d) Gaussian pulse.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Outline the fundamentals of data acquisition, configuration, characteristic and specifications of
1 various components used in DAS.
CO Elucidate the elements of data acquisition techniques.
2
CO Recognize various interfacing issues of ADC’s and DAC’s to a microprocessor/PC.
3
CO Explain the components of data acquisition system.
4
CO Infer bus driver programs and data analysis using data acquisition packages.
5
CO Summarize different data transfer techniques.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 4 12 - - - 17
CO2 2 20 7 - - - 29
CO3 2 3 12 - - - 17
CO4 - 1 16 - - - 17
CO5 1 - 15 - - - 16
CO6 - 18 10 - - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2012 Duration 3hrs


Course Name DATA AND INFORMATION SECURITY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
List out the two main components of access control. CO
1. 1 U 1
2. Identify the process of verifying the identity of a user or system before CO R 1
granting access to a resource. 1
3. State the term for an incident that could cause harm to an asset or a CO R 1
system. 2
4. Name the error that occurs when a program tries to write more data CO R 1
than the allocated space. 2
5. List out the three main objectives of information security. CO U 1
3
6. Define Malicious Mobile code. CO R 1
3
7. Recall three classic security models commonly referenced in CO U 1
information security. 4
8. State the primary function of a Reference Monitor in an operating CO R 1
system security model. 4
9. Identify the key ethical principles that should guide decisions in CO U 1
computer security. 5
10 CO U 1
. List the types of computer crimes. 6
PART – B (6 X 3 = 18 MARKS)
11 List out the common types of access control attacks. CO
. 1 R 3
12 Classify the types of Database Backups. CO
. 2 U 3
13 Examine the impact of Man in the middle attack. CO A
. 3 n 3
14 Explain the difference between authentication and authorization in CO
. information security. 4 U 3
15 Compare the security considerations necessary for securing a Web CO A
. Server versus a DNS Server. 5 n 3
16 CO
. Describe the role of a firewall in a network security setup. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Analyze the causes and consequences of the most significant
. . malicious code incidents in history. Describe the motivations and CO A
objectives of the attackers? 1 n 6
b Explain the impact and mitigation of access control attacks on data CO
. security and privacy. 1 R 6

18 a Discuss the benefits and challenges of implementing access control CO


. . in an organization. 2 U 6
b Evaluate the effectiveness and efficiency of various encryption CO
. algorithms and standards. 2 E 6

19 a Analyze how a well-defined security policy can mitigate risks in an CO A 6


. . organization. 3 n
b Evaluate the importance of regular risk analysis in maintaining the CO E 6
. security of information systems. 3

20 a Explain how a Proxy Server contributes to the security of a network CO R 6


. . 4
b Evaluate the effectiveness of current security measures in protecting CO E 6
. mobile devices against cyber threats 4

21 a Given a scenario where a new e-commerce company requires a CO U 12


. . secure network infrastructure, outline the steps you would take to 5
design a network that balances security with functionality. Consider
factors like data protection, user access control, and threat
mitigation.

22 a Analyze the security implications of default configurations on CO A 6


. . network devices and the potential risks they pose. 5 n
b Analyze the effectiveness of signature-based IDS versus anomaly- CO A 6
. based IDS. 5 n

23 a CO U 6
. . Discuss the impact of computer crime on businesses and society. 5
b Examine the challenges law enforcement faces in combating CO A 6
. computer crime internationally. 6
COMPULSORY QUESTION

24 a Explain how an IDS differentiates between normal network traffic CO U 12


. . and potential security threats. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 define the fundamental concepts of data and information security.
CO2 apply the procedures to secure a system against failure, theft and invasion.
CO3 discuss the security terms, principles and risk factors.
CO4 recognize the importance of network security.
CO5 choose various security operations to secure a network
CO6 select suitable policies for administering a company’s network.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 10 1 6 17
CO2 2 9 6 17
CO3 1 1 9 6 17
CO4 7 16 6 29
CO5 7 15 22
CO6 16 6 22
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2013 Duration 3hrs


Course Name DATA STRUCTURES AND ALGORITHMS Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. List the Linear Data Structures. CO1 R 1
2. Write a simple algorithm to find biggest of three numbers. CO1 A 1
3. Explain the concept of a stack and enumerate its fundamental operations. CO2 U 1
4. Write any two applications of queue. CO2 A 1
5. Enumerate the benefits of using arrays compared to linked lists as data structures. CO3 R 1
6. List the types of linked lists. CO3 R 1
7. Describe the best-case and worst-case time complexities for linear search. CO4 U 1
8. List some of the internal sorting methods. CO4 R 1
9. Give an example for binary tree and binary search tree. CO5 U 1
10. Define adjacent nodes. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Write a brief note on Abstract Data Type. CO1 A 3
12. Convert the infix expression (A+B)*C-(D-E)*(F+G) to its equivalent postfix
expression. CO2 U 3
13. Enumerate the difference between Doubly Linked Lists and Circular Linked Lists. CO3 R 3
14. Rewrite the order of values after each iteration by applying the bubble sort
algorithm to arrange the list {18, 32, -11, 6, 68, 2, -34} in ascending order. CO4 U 3
15. Describe Binary Search tree using an example. CO5 R 3
16. Give examples for weighted and directed graph. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the time and Space complexity with a suitable example. CO1 A 6
b. Discuss about Algorithmic Problem solving approaches. CO1 U 6

18. a. Write an algorithm to perform any two fundamental Stack operations. CO2 A 6
b. Illustrate the En-queue, De-queue, and display operations in queue using
suitable algorithms. CO2 An 6

19. a. Explain the operations that can be performed in a circular singly linked list
with algorithm. CO3 A 12

20. a. Discuss about Insertion sort and Selection sort algorithms with an example. CO4 U 12

21. a. Explain the tree traversal algorithms; Apply the In-order, Pre-order, and CO5 A 12
Post-order traversal algorithms in the following tree and give the results.

22. Explain the B-Trees; Insert the elements [5, 3, 21, 9, 13, 22, 7, 10, 11, 14, 8,
6] into the B-Tree and give the resultant tree. (order 3) CO6 A 12

23. Discuss any three applications of stack and queue with appropriate
examples. CO2 U 12
COMPULSORY QUESTION
24. Explain the different graphs traversal algorithms with proper examples. CO6 A 12

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Understand the basics of abstract data type and algorithm analysis
CO2 Illustrate the use of array to implement stack and queue
CO3 Describe singly and doubly linked list and utilize linked list to design stack and queue data
structures.
CO4 Illustrate the working of sorting and searching algorithms and application of hashing
CO5 understand the different types of tree data structures and demonstrate the methods for traversing
binary trees
CO6 Differentiate the graph representations and traversals

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 6 10 - - - 17
CO2 - 16 7 6 - - 29
CO3 5 - 12 - - - 17
CO4 1 16 - - - - 17
CO5 3 1 12 - - - 16
CO6 1 3 24 - - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2014 Duration 3hrs


Course Name DATA VISUALIZATION Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define cognition. CO1 R 1
2. Enumerate the types of photosensitive cells in retina. CO1 R 1
3. State spatial substrate. CO2 R 1
4. List the different types of visualization. CO2 R 1
5. State corpus. CO3 R 1
6. Define block in a node-link graph. CO4 R 1
Enumerate the common approaches in generating space-filling
7. CO4 R 1
hierarchies.
List the various types of maps supported by computer
8. CO5 R 1
technology.
9. Record the advantages of flow maps. CO5 R 1
10
CO6 R 1
. Name the general aspects of the characteristics of time.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11
CO1 U 3
. Summarize enclosure in Gestalt principles.
12
CO2 U 3
. Differentiate between data visualization and visual analytics.
13
CO3 U 3
. Express Zipf’s law.
14
CO4 U 3
. Paraphrase planar embedding.
15 Distinguish between Direct Volume Rendering and Surface
CO5 U 3
. Fitting.
16
CO6 U 3
. Classify the visual variables for spatial data.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a
CO1 A 12
. . Illustrate the visual perception and its process.

18 a Write the significance of visualization using the Anscombe’s CO2 A 12


. . Quartet.
I II III IV
x y x y x y x Y
10.0 8.04 10.0 9.14 10.0 7.46 8.0 6.58
8.0 6.95 8.0 8.14 8.0 6.77 8.0 5.76
13.0 7.58 13.0 8.74 13.0 12.74 8.0 7.71
9.0 8.81 9.0 8.77 9.0 7.11 8.0 8.84
11.0 8.33 11.0 9.26 11.0 7.81 8.0 8.47
14.0 9.96 14.0 8.10 14.0 8.84 8.0 7.04
6.0 7.24 6.0 6.13 6.0 6.08 8.0 5.25
4.0 4.26 4.0 3.10 4.0 5.39 19.0 12.50
12.0 10.84 12.0 9.13 12.0 8.15 8.0 5.56
7.0 4.82 7.0 7.26 7.0 6.42 8.0 7.91
5.0 5.68 5.0 4.74 5.0 5.73 8.0 6.89

19 a CO3 A 12
. . Illustrate the single document visualizations.

20 a Imagine you are a data scientist working for a transportation CO4 A 7


. . company that wants to improve its route planning system.
The company operates a fleet of vehicles to deliver goods,
and you have access to data about the road network between
cities. Each city is represented as a node in a graph, and the
roads connecting them as edges. Apply an adjacency matrix
to represent this road network, with cities as nodes and road
connections as edges.
b Write the aesthetic rules for drawing a node-link diagram in CO4 A 5
. non-space filling methods.

21 a CO5 U 12
. . Describe the types of geological visualization in detail.

22 a CO5 A 12
. . Illustrate the various factors in evaluating visualization.

23 a Explain the line-based techniques for visualizing multivariate CO6 U 12


. . data.
COMPULSORY QUESTION
24 a Imagine, you work for a multinational e-commerce company CO6 A 12
. . that operates in multiple countries. Your task is to build a
data visualization system that presents a global view of sales
data, allowing executives to track sales performance across
regions, product categories, and time. The dataset is
substantial, including millions of transactions and spans
several years.
i. Choose the appropriate data structure and data
organization techniques in designing to efficiently
handle the vast sales data and facilitate global data
visualization.
ii. Explain your choices and how they optimize data
retrieval and visualization for executives who need to
monitor sales performance on a global scale.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 design visualization dashboards by utilizing various visualization methods and tools.
CO2 describe the design process to develop visualization methods and visualization systems,
and methods for their evaluation.
CO3 summarize large-scale abstract data
CO4 understand visual mapping and the visualization
CO5 apply actual visualization, interaction and distorting techniques
CO6 infer recent visual perception techniques

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 3 12 - - - 17
CO2 2 3 12 - - - 17
CO3 1 3 12 - - - 16
CO4 2 3 12 - - - 17
CO5 2 15 12 - - - 29
CO6 1 15 12 - - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2015 Duration 3hrs


Course Name DATA VISUALIZATION AND PRESENTATION Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define item data type. 1 R 1
CO
2. State structured grid. 1 R 1
Name the term which plots one numeric attribute against another CO
3. numeric attribute. 2 R 1
CO
4. List the layouts in spatial layout density. 2 R 1
CO
5. Label network topology. 3 R 1
CO
6. State nested circles. 3 R 1
CO
7. Define named entity recognition (NER). 4 R 1
CO
8. Quote tf-idf. 4 R 1
CO
9. Enumerate the various interaction controls. 5 R 1
10 CO
. Name the modern integrated visualization system. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Differentiate sequential and diverging attribute types. 1 U 3
12 CO
. Paraphrase stream graphs. 2 U 3
13 CO
. Compare rods and cones in color vision. 3 U 3
14 CO
. Summarize filtering operators in interactive visualization. 4 U 3
15 CO
. Express data space in interactive techniques. 5 U 3
16 CO
. Paraphrase jigsaw visualization tool. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 CO A 1
. Illustrate the rules of thumb in data visualization. 1 2

18 a CO A 6
. . Write about geographic data with example. 2
b CO A 6
. Explain tensor fields: many values. 2

19 CO U 1
. Discuss in detail the color maps and its types with examples. 3 2

20 CO A 1
. Illustrate the single document visualization with neat sketch. 4 2

21 Imagine, you are working as a data analyst for an e-commerce CO A 1


. company that sells a wide range of products online. The company 5 2
wants to improve its sales performance by understanding customer
behavior and preferences. As part of your role, you are tasked with
creating an interactive visualization dashboard to analyze customer
purchasing patterns and identify opportunities for targeted
marketing campaigns. Using interactive visualization techniques,
design a dashboard that allows stakeholders to explore the
following aspects of customer purchasing behavior:
i. Sketch a line chart showing the trend in product sales over
time.
ii. Prepare a scatter plot that visualizes customer segmentation
based on demographic factors such as age, gender, and
location.
iii. Develop a heatmap or treemap visualization to represent
purchase patterns, showing which products are frequently
bought together.
iv. Integrate sentiment analysis data from customer feedback
surveys into the dashboard.

22 CO U 1
. Describe the task abstraction in visualizing data. 1 2

23 CO A 1
. Explain the steps in designing an effective visualization. 5 2
COMPULSORY QUESTION
24 CO A 1
. Illustrate the visualization systems based on data type. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
Choose knowledge of perception and cognition to evaluate visualization design alternatives.
1
CO Understand the role of visualization in the processing and analysis of data coming from a broad
2 range of sources.
CO
Apply suitable data visualization tools for various applications.
3
CO Identify appropriate data visualization techniques given particular requirements imposed by the
4 data.
CO
Describe the cutting-edge research ideas in the field of visualization.
5
CO
6 Apply appropriate design principles in the creation of presentation and visualization.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 15 12 - - - 29
CO2 2 3 12 - - - 17
CO3 2 15 - - - - 17
CO4 2 3 12 - - - 17
CO5 1 3 24 - - - 28
CO6 1 3 12 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2016 Duration 3hrs


Course Name DATABASE MANAGEMENT SYSTEMS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
Name two DCL commands. 1
2. Convert the following relational algebra expression into the CO U 1
corresponding SQL query: 1
σdept = “CSE” ˄ CGPA >8.5 (student).
3. CO R 1
Define “Triggers”. 2
4. Show the output for the given query. CO U 1
SELECT NULL + 5 from dual; 2
5. Identify the symbol used for “dependent” in the following ER model. CO R 1
3

6. CO R 1
State “Multivalued Dependency”. 3
7. Indicate the disadvantages of the sequential index. CO U 1
4
8. Define “clustering index”. CO R 1
4
9. Name the process that is responsible for ensuring durability in DBMS CO R 1
systems. 5
10 List the components of the data warehouse. CO R 1
. 6
PART – B (6 X 3 = 18 MARKS)

11 List the key differences in effectiveness and efficiency between CO R 3


. computerized and paper-based systems, particularly regarding data 1
processing and accessibility.
12 Differentiate between the “UNION” and “UNION ALL” set operators CO U 3
. in SQL. 2
13 Represent the terms Entity, Entity Type, and Entity Set in DBMS with CO U 3
. an example. 3
14 State dynamic hashing with an example. CO R 3
. 4
15 CO U 3
. Express “Two-Phase Locking” with an example. 5
16 CO R 3
. Examine the threat posed by SQL injection to database security. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the architecture for a database system in detail with a neat CO U 8
. . diagram. 1
b Explain any four relational algebra operators in detail by writing the CO U 4
. relational algebra expressions for the banking database. 1

18 Given the following schema Employee with attributes, CO A 1


. Employee_ID (Primary Key), Name, Age, Department, and Salary. 2 2
Write the SQL queries for the following statements by referring to
the given table “Employee”,
1. Retrieve the names of employees who earn more than the
average salary, using subqueries.
2. List the departments with more than two employees, using
subqueries.
3. Find the names of employees who work in departments
where the average salary is higher than the average salary in
the 'Sales' department, using nested subqueries.
4. Retrieve the names of employees who earn more than the
average salary of employees in the 'IT' department, using
nested subqueries.
5. List the names of employees who work in departments with
more than one employee earning a salary higher than 60000,
using complex queries.
6. Find the departments where the average salary is higher than
the overall average salary, and the number of employees is
more than three, using complex queries.

19 a In a library management system, patrons borrow books from the CO A 8


. . library. Each book has a unique identifier, title, author, and genre. 3
Patrons are registered with the library and can borrow multiple
books. The library also tracks the due dates for borrowed books and
any fines incurred for overdue returns. Additionally, the library
maintains a collection of categories for organizing books.

Develop an Entity-Relationship (ER) diagram to represent the


relationships between patrons, books, borrowing transactions, fines,
and book categories in the library system. Ensure that your ER
diagram captures the cardinality and participation constraints
accurately. Additionally, provide a brief description of each entity
and relationship, highlighting their attributes and roles in the library
system. Ensure that your ER diagram reflects the complexities of
managing book borrowing, fines, and categorization in a library
environment.
b Describe the functional and transitive dependencies with an CO U 4
example. 3
20 a Explain the structure and properties of B+ Tree and present the CO U 6
. . algorithm for search in B+ Tree with an example. 4
b Discuss the advantages and disadvantages of B+ Tree. CO U 6
. 4

21 a CO U 6
. . Illustrate the various transaction states with a neat diagram. 5
b CO U 6
. Explain any two control mechanisms without locking techniques. 5

22 a Explain the DAC mechanism with suitable examples. CO U 6


. . 6
b CO A 6
. Write short notes on logical databases and distributed databases. 6

23 Given the following schemas, CO A 1


. a) Books with attributes, Book_ID (Primary Key), Title, 2 2
Author, Genre, and Price
b) Customers with attributes Customer_ID (Primary Key),
Name, Email, and, Phone
c) Orders with attributes Order_ID (Primary Key),
Customer_ID (Foreign Key referencing Customers table),
Book_ID (Foreign Key referencing Books table), Quantity,
and Order_Date.
Using the above schema, write the SQL queries for the following
questions:
1. List the names of customers who have placed book orders
along with their corresponding order quantities and order
dates.
2. Find the total price of all orders placed by a specific
customer, given their customer ID.
3. Identify the title and author of the book(s) with the highest
price.
4. List all customers who have not placed any orders yet.
5. Calculate the number of orders placed for books in a specific
genre.
6. Find the average price of books ordered by each customer.

COMPULSORY QUESTION

24 a List the 3-Levels of abstraction in DBMS. Explain each level with CO U 6


. . an example of a student database management system (Eduserve). 1
b Design a database schema and assess its normalization from 1NF to CO A 6
. the BCNF based on the given scenario. 3

You're designing a database for an online bookstore. The database


must store information about books, authors, publishers, and
customer orders. Each book has a unique ISBN, a title, a genre, and
a price. Each author has a unique author ID, a name, and a
biography. Each publisher has a unique publisher ID, a name, and
an address. Customers can place multiple orders, and each order can
contain multiple books.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO recognize the role of database administrator and database management systems in software
1 applications and other advanced concepts.
CO use query language to retrieve data efficiently from the database.
2
CO design the database for the given specification of the requirement using the ER method and
3 normalization.
CO design and implement significant database objects such as file structures and index schemes.
4
CO describe techniques for transaction processing and concurrency control.
5
CO implement security in database.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 4 19 - - - - 23
CO2 1 4 24 - - - 29
CO3 2 7 14 - - - 23
CO4 4 13 - - - - 17
CO5 1 15 - - - - 16
CO6 4 6 6 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2017 Duration 3hrs


Course Name DEEP LEARNING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the activation function used in logistic regression to classify CO U 1
any given data. 1
2. State the thumb rule for obtaining an optimal hyperplane in a support CO R 1
vector machine (SVM). 1
3. CO R 1
Name a few loss functions used in deep learning algorithms.
2
4. CO R 1
Define universal approximation theorem.
2
5. Apply the given filter on the input matrix with a stride of 2 and padding CO A 1
of 1. Obtain the first and the last element of the output image. 2

6. Calculate the size of the output image by performing a convolution CO A 1


operation on an input image of size 26 x 26. Use a filter of size 9 x 9 2
with a stride of 1 and padding of 0 on the input image.
7. CO U 1
Distinguish between underfitting and overfitting curves. 4
8. CO R 1
List the hyperparameters of an autoencoder. 3
9. Identify the type of recurrent neural network (RNN) architectures to CO U 1
perform ‘Named Entity Recognition’ and ‘Music Generation’ 2
applications.
10 CO R 1
. Define reinforcement learning. 1
PART – B (6 X 3 = 18 MARKS)
11 Summarize the performance metrics of classification and regression CO U 3
. tasks. 1
12 Explain the least square approach to determine regression coefficients CO U 3
. in the multiple linear regression model. 1
13 Compare the architectures and the number of learnable parameters of CO A 3
. VGG16 and VGG19 pre-trained models. 2 n
14 Discuss the two salient features of convolutional neural network (CNN) CO U 3
. with suitable illustrations. 2
15 CO U 3
. Describe the working principle of a simple RNN. 2
16 CO A 3
. Distinguish between undercomplete and sparse autoencoders. 3 n
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Calculate the regression coefficients of the following dataset using a CO A 6
. . simple linear regression model of the form y=a0+a1x. Calculate the 1
output for X = 25 and X = 33.
X 2 3 7 10 16
Y 5 10 15 19 23
b Apply the kernel trick of SVM to transform non-linear data of the CO A 6
. ‘XOR’ logic gate to a linear form for the classification task. Plot 1
and justify your answer.

18 a Determine the new weight values at the end of the first iteration of CO A 6
. . the 2-input ‘OR’ logic gate using the single-layer perceptron (SLP) 1
algorithm.
Use Net = 1 if Net >= 0.2
= 0 if Net < 0.2
The initial weight vector = [0.1, 0.3], learning rate = 0.2.
b Compare the architectures, learning laws, and training procedures of CO A 6
. SLP and multiple-layer perceptron (MLP) algorithms. 1 n

19 Analyze the significance of the following adaptive optimization CO A 1


. techniques to improve the performance of deep neural networks. 4 n 2
 Adagrad
 RMSProp
 Adam
 Momentum
 Nesterov Accelerated Gradient

20 Construct a CNN architecture based on the details given in the CO A 1


. following table. 2 2
 Apply an image of size 227 x 227 x 3 and determine the size
of the output image at every layer.
 Tabulate the equations used to calculate the number of
learnable parameters at different layers of CNN architecture.
 Calculate the number of learnable parameters at every layer.
Layer No of Filter Stride Padding Output Learnable
Filters/ Size image parameters
kernels size
Input - - - -
Conv 1 56 11 x 11 4 -
Max Pool 1 - 3x3 2 -
Conv 2 156 5x5 1 2
Max Pool 2 - 3x3 2 -
Conv 3 300 3x3 1 1
Conv 4 320 3x3 1 1
Conv 5 215 3x3 1 1
Max Pool 3 - 3x3 2 1
FC Layer 1 No of nodes = 4096
FC Layer 2 No of nodes = 4096
Softmax No of nodes = 1000
layer

21 a Distinguish the identity block from the convolutional block in the CO A 8


. . ResNet architecture. How are these blocks and skip connections 2 n
useful to address the vanishing gradient problem? Explain it using
the architectural diagram of ResNet50.
b Discuss the ‘backpropagation through time’ algorithm to determine CO U 4
. the gradients in RNN. 2

22 a Explain the limitations of latent space representation in CO U 6


. . autoencoders. Discuss the type of autoencoder that helps to resolve 3
the limitations.
b Describe the architecture of GAN and its working principles in CO U 6
. detail to generate fake images. 3

23 a Apply the MLP backpropagation algorithm to the following CO A 8


. . architecture and update the weight links between the hidden and 1
output layers after one iteration for the details given: Use the
unipolar sigmoidal activation function, X1 = 2, X2 = 3, X3 = 1,
learning rate = 1, desired output = 1.

b Discuss the concept of regularization to improve the generalization CO U 4


. capability of the deep neural network. How can a data engineer 4
ensure good generalization using lasso and ridge regression
techniques?
COMPULSORY QUESTION
24 Explain the following CNN applications: CO U 1
.  Face Recognition 5 2
 Natural Language Processing
 Sentimental analysis to identify the emotions
 Word2Vec to handle large corpus of text
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Understand the basics of deep learning
CO2 Implement various deep learning models
CO3 Realign high dimensional data using reduction techniques
CO4 Analyze optimization and generalization in deep learning
CO5 Explore the deep learning applications
CO6 Apply the algorithms to real time problems.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 7 26 6 - - 41
CO2 2 11 14 11 - - 38
CO3 1 12 - 3 - - 16
CO4 - 5 - 12 - - 17
CO5 - 12 - - - - 12
CO6 - - - - - - -
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2018 Duration 3hrs


Course Name DESIGN AND ANALYSIS OF ALGORITHMS Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Is 2n2 = O(n3) be true? CO1 U 1
2. Write a recursive algorithm for computing GCD of two numbers. CO1 R 1
3. n CO2 R 1
Draw recursion tree for T(n) = 2T( ¿+ ¿n2 ,
2
4. Find time complexity and space complexity of following algorithm. CO2 R 1

Transpose( int A[ ][ ] , int m, int n)


{
for(i = 1; i <= m; i ++)
for(j = i+1; j <= n; j++)
{
int temp = A [ i ] [ j ];
A[ i ] [ j ] = A [j ] [ i ];
A[ j ] [ i ] = temp ;
}
}
5. Write the meaning of plagiarism detection. CO3 U 1
6. What is optimal binary search trees (OBST)? CO3 R 1
7. Compare greedy method and dynamic programming. CO4 U 1
8. Let us consider the bins of size 1, Next fit algorithms assigns each CO4 R 1
item to the current bin, if it fits; otherwise, it is assigned to a new
bin, which becomes the current one.
Assuming the sizes of the items be {0.5, 0.7, 0.5, 0.2, 0.4, 0.2, 0.5,
0.1, 0.6}.
Find minimum number of bins to hold above items.
9. State Cook’s theorem. CO5 U 1
10 CO6 U 1
. Give example for NP Complete problem.
PART – B (6 X 3 = 18 MARKS)

11 CO1 A 3
. Prove 2*n2 + 10*n + 7 = O(n2) n
12 Consider the problem of making change for 2530 rupees using the CO2 U 3
. fewest number of currencies. Assume that each currency’s value is
an integer and Rupees 1000, 500, 200,100,50,20,10 and 5 are
available. Describe a greedy algorithm to make change. Prove that
your algorithm yields an optimal solution. Give any five feasible
solutions also.
13 Consider the strings “PQRSTPQRS” and “PRATPBRQRPS”. CO3 A 3
. What is the length of the longest common subsequence? n
14 How to use branch and bound method for solving knapsack CO4 U 3
. problem?
15 Find max flow of the network shown below CO5 A 3
. n

16 Give Venn diagram representation for P, NP, NP Complete and NP CO6 U 3


. Hard problem along with brief description.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a. CO1 A 4
2
. Compare the order of growth of n(n+1)/2 and n . n
b Consider the following graph where x axis represents input size CO1 A 8
. and y axis represents efficiency. n
Answer the following questions:
What is linear growth? Identify linear growth rate functions.
What is exponential growth? Identify exponential growth rate
functions.
In linear and exponential growth rate, which is having faster
growth rate?
In linear and exponential growth rate, what kinds of algorithms
are preferred? Why?
Order the above functions by its growth rate (Use O notation or
Ω notation or Θ notation for ordering)

18 a. Solve the following recurrence relation. CO2 A 4


. x(n) = x(n-1)+5 for n>1 n
x(1) = 0
b Consider the following algorithm. CO2 A 8
. ALGORITHM Mystery(n) //Input: A nonnegative n
integer n

S ←0
for i ←1 to n do
S ←S + i * i
return S
a. What does this algorithm compute?
b. What is its basic operation?
c. How many times is the basic operation executed?
d. What is the efficiency class of this algorithm?
e. Suggest an improvement, or a better algorithm altogether, and
indicate its efficiency class. If you cannot do it, try to prove that,
in fact, it cannot be done

19 a. CO1 R 4
. What is Optimal Merge Pattern? Explain.
b CO1 A 8
. Apply Optimal Merge Pattern algorithm on 5, 3, 2, 7, 9, 13 n

20 a. CO4 R 4
. Write Floyd’s Algorithm.
Apply the Floyd’s algorithm for the following graph CO4 A 8
6

x y
4
3
11 2

21 a. CO5 R 4
. Write Prim’s algorithm.
b Consider an undirected, weight graph as shown below. CO5 A 8
. Construct MST using Prim’s algorithm.

b 1 c

5 3 4 6
a 6 d 2 e

22 a. What is n-queen problem? CO6 U 4


. Identify implicit and explicit constraints in 8 queen problem.
b CO6 U 8
. Explain 8-queen problem using state space tree.

23 a. CO6 R 4
. Discuss the concepts used in tractable and intractable problems.
b Explain the following intractable problem and its solution find CO6 R 8
. methodologies.
1. Travelling Salesman Problem
2. Graph coloring problem
3. Knapsack problem.
COMPULSORY QUESTION
24 a. Let A = { i/119, m/96, c/247, g/283, h/72, f/77, k/92, j/19} be CO6 A 12
. the letters and its frequency of distribution in a text file.
Compute the suitable Huffman coding to compress that data
efficiently.
Encode the text “mick” using the above code.
Decode the text whose encoding is 1111110011111

CO – COURSE OUTCOME BL – BLOOM’S LEVELM – MARKS ALLOTTED

COURSE OUTCOMES
CO
Analyze given algorithm and express its complexity in asymptotic notation
1
CO
Design algorithms using brute force and greedy techniques.
2
CO
Develop dynamic programming solutions for optimization problems.
3
CO Propose solutions using backtracking and branch-and-bound technique.
4
CO
Solve problems using fundamental graph algorithms
5
CO Apply suitable algorithmic technique to solve a problem and identify the problems belonging
6 to the class of P, NP-Complete or NP-Hard

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 5 1 - 23 - - 29
CO2 2 3 - 12 - - 17
CO3 1 1 - 3 - - 05
CO4 5 4 8 - - - 17
CO5 4 0 8 3 - - 15
CO6 12 16 12 - - - 40
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2021 Duration 3hrs


Course Name DISTRIBUTED COMPUTING Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Define transparency. CO1 R 1
2. List the generations of distributed systems. CO1 R 1
3. Define Remote Object Reference. CO2 R 1
4. Predict the method used by clients to invoke remote operations CO2 U 1
5. Differentiate Synchronous and Asynchronous Communication. CO3 U 1
6. Illustrate the concept of deadlock with its representation. CO3 A 1
7. Describe the characteristics of Multicast Communication. CO4 R 1
8. Summarize the limitations of Bully algorithm. CO4 U 1
9. State the importance of linearizability in data replication. CO5 R 1
10. Define distributed shared memory. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Distinguish between the physical and architectural models of distributed systems. CO1 An 3
12. Explain publish-subscribe paradigm. CO2 U 3
13. Describe Christian’s method of clock synchronization. CO3 R 3
14. Differentiate growing phase and shrinking phase of 2PL protocol. CO4 An 3
15. Describe Update propagation in gossip architecture. CO5 R 3
16. Explain EDF scheduling. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Discuss the different client-server architectures employed in a distributed CO1 U 8
environment. Explain the rationale behind focusing on thin clients
instead of fat clients. State a few relevant applications of client-server
architecture.
b. Distinguish between different types of omissions and arbitrary failures CO1 An 4
that affect channels and processes in a distributed environment.

18. a. Explain the key steps and considerations involved in implementing RMI CO2 U 6
with a suitable diagram.
b. Describe the modules of distributed file service architecture. CO2 R 6

19. a. Illustrate the mechanism by which pastry routes messages to the CO3 An 12
addressed node in the distributed system.
20. a Explain the edge-chasing protocol for deadlock detection. CO4 An 6
Consider a distributed system with three sites in the following situation:
i) Site S1 has 3 processes, P1, P2, and P3, where process P2 is waiting to
acquire a resource held by process P4.
ii) Site S2 has 2 processes, P4, and P5, where process P4 is waiting to
acquire a resource held by process P7.
iii) Site 3 has 3 processes, P6, P7, and P8, where process P7 is waiting to
acquire a resource held by process P2.
Analyze the edge-chasing protocol and identify if any deadlock arises for
the given scenario.
b Illustrate two phase commit protocol with suitable example. CO4 A 6

21. a Determine the strategies and operations to minimize the overhead CO5 A 6
associated with maintaining primary replication manager in passive
replication.
b Describe the role of group communication in a distributed environment. CO5 R 6

22. a. Explain network partition algorithm. Why is it not suitable for banking CO5 An 6
applications?
Describe the components of a gossip replica manager. CO5 U 6

23. a. Discuss various memory consistency models. CO6 U 12

COMPULSORY QUESTION
24. a. Analyze the distributed multimedia systems by considering its CO6 An 12
characteristics, QoS management and parameters.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED


COURSE OUTCOMES
CO1 Describe the distributed system models
CO2 Classify inter-process communication mechanisms and their application scenarios.
CO3 Illustrate a transaction and concurrency control scheme for a real time application.
CO4 Compare the various file system architectures used in distributed systems.
CO5 Construct a real time distributed system with suitable IPC, event coordination, file management,
name service, transaction, and concurrency control mechanisms.
CO6 Evaluate an efficient distributed system and its qualities.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 8 7 17
CO2 7 10 17
CO3 3 1 1 12 17
CO4 1 1 6 9 17
CO5 10 6 6 6 28
CO6 1 15 12 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2022 Duration 3hrs


Course Name EMBEDDED SYSTEMS Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Interpret the term “pervasive computing”. CO1 U 1
2. List out any four application areas of embedded systems. CO1 R 1
3. Define Petri Nets. CO2 R 1
4. Name the three types of modeling in VHDL. CO2 R 1
5. Define dynamic power consumption. CO3 R 1
6. Identify the key advantage of the processor. CO3 R 1
7. Explain whether air traffic control systems are an example for soft or hard real CO4 U 1
time systems.
8. Define sporadic task. CO4 R 1
9. List the four different design patterns used for system representation. CO5 R 1
10. Represent FPGA based emulation using a block diagram. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Develop the sample requirement form for a washing machine. CO1 A 3
12. Sketch the block diagram of “calling an answering machine”. CO2 A 3
13. Differentiate between a sensor and an actuator with examples. CO3 An 3
14. Identify six characteristics of an embedded operating system. CO4 U 3
15. List and explain the three parts of hardware-software codesign. CO5 R 3
16. Classify the different injection times for software fault injection. CO6 U 3

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Examine the various models of Computation with examples. CO1 A 12

18. a. List out the characteristics of an Embedded System. CO1 R 4


b. Write VHDL code for OR & NAND logic gates by using data flow CO2 A 8
modeling

19. a. Describe the dependability requirements of Embedded System. CO2 U 7


b. Explain in detail about the language Spec C. CO2 U 5

20. a. Sketch the basic diagram of a sample and hold circuit and explain its CO3 A 5
operation.
b. Explain the various types of sensors used in an embedded system. CO3 U 7
21. a. Describe the typical features and functionalities of e-voting systems. CO3 R 6
b. Identify the four key requirements needed for an OS to be an RTOS. CO4 U 6

22. a. Write the role of rate monotonic scheduling in real-time operating CO4 A 7
systems with an example.
b. Evaluate and justify the statement which says, “EDF allows for CO5 An 5
preemptive scheduling and can handle tasks with varying deadlines and
burst times”.

23. a. Explain Directed Acyclic Graph based partitioning structure with block CO5 A 7
diagram.
b. Write about the three simple loop transformations used in the source code. CO5 A 5
COMPULSORY QUESTION
24. a. Compare and contrast Serial fault simulation, Parallel fault simulation and CO6 An 7
Concurrent fault simulation.
b. Sketch the different design flow integrations for emulation. CO6 A 5

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 understand specific requirements and problems arising in embedded system applications.
CO2 design embedded systems using formal models and methods as well as computer-based
synthesis methods
CO3 apply the formal models and methods in embedded system design in practical applications using
the programming language C, the operating system FreeRTOS, a commercial embedded system
platform and the associated design environment.
CO4 describe embedded architectures and components, hardware-software interfaces, memory
architecture, communication between components.
CO5 explain embedded operating systems, real-time scheduling theory, shared resources, and
hardware architecture synthesis.
CO6 identify validation and testing methodologies for embedded system

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 5 1 15 21
CO2 2 12 11 25
CO3 8 7 5 3 23
CO4 1 10 7 18
CO5 4 12 5 21
CO6 4 5 7 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2024 Duration 3hrs


Course Name ETHICS IN INFORMATION TECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define ethics in information technology. 1 R 1
CO
2. Name any two characteristics of organizational culture. 1 R 1
CO
3. State the meaning of phishing. 2 R 1
CO
4. Differentiate between smishing and vishing. 2 U 1
CO
5. Define Copyright Infringement. 3 R 1
CO
6. List the types of work that can be copyrighted. 3 R 1
CO
7. Describe the importance of software quality in systems. 4 R 1
Identify the forms of representation if the seller either misrepresents the CO
8. quality of a product or conceals a defect in it. 4 U 1
CO
9. Name any two ethical issues related to social networking. 5 R 1
10 CO
. Represent the ISO 27001 framework. 6 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. List the various roles of Quality circle facilitators in an organization. 1 R 3
12 CO
. Write the most prominent professional organizations in the field of IT. 2 A 3
13 CO
. Distinguish between submarine patents and patent farming. 3 U 3
14 CO
. Explain about any two types of testing used for systems. 4 U 3
15 CO
. Illustrate any four forms of cyberbullying. 5 A 3
16 CO
. List the requirements for ISO 27001 framework. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Illustrate the features and benefits of Plan- Do- Check- Act and A3 CO A 5
. . problem solving tools. 1
b CO A 7
. Determine the various steps used by Plan- Do- Check- Act tool. 1

18 Describe in detail about the relationship between CO U 1


. (i) IT workers and Employers 2 2
(ii) IT workers and Clients

19 a CO U 6
. . Explain in detail about Copyright and Copyright Infringement. 3
b Describe how the use of copyrights to protect computer software CO R 6
. causes issues in interpretation and implementation. 3

20 CO A 1
. Examine the strategies for engineering quality software. 4 2

21 Explain the software product liability. What do you mean by CO A 1


. intentional misrepresentation of product? 4 n 2

22 a CO A 6
. . Write about H1B Workers and the H1B application process. 5
b CO U 6
. Explain B1- Visa controversy and the advantage of this type of visa. 5

23 Describe the various ethical issues related to social networking web CO U 1


. sites giving examples of each. 5 2
COMPULSORY QUESTION

24 a CO
. . Explain the responsibilities of information asset management. 6 A 7
b Sketch the block diagram showing the information asset CO
. management roles. 6 A 5

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO understand professional ethics and organizational culture conduct in information technology.
1
CO identify the various leadership styles and the suitability for the specific organization.
2
CO identify the possible Computer crimes and the rules and regulations for protection.
3
CO familiarize with the various types of IPR and the procedures for obtaining IPR
4
CO understand about the various types of Social Networking and issues.
5
CO relate to the different national and international organizational model with intellectual ability.
6
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 5 12 17
CO2 1 13 3 17
CO3 8 9 17
CO4 1 4 12 12 29
CO5 1 18 9 28
CO6 3 1 12 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2026 Duration 3hrs


Course Name FOUNDATIONS OF BLOCKCHAIN Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
Quote the name of the concept where coins can move from one CO
1. R 1
blockchain to another or back. 1
Recall the property where information written on the blockchain CO
2. R 1
cannot be changed. 1
CO
3. Give example for a software wallet. U 1
2
After a finite time, all participants agree on a single state. Recite CO
4. R 1
the blockchain element. 2
CO
5. R 1
Recall the denomination for the Bitcoin value 0.001. 3
CO
6. U 1
Differentiate between Bitcoin and Blockchain. 3
CO
7. R 1
Name the blocks that are detached. 4
CO
8. R 1
State the attack possible on the resilient proof of work. 4
CO
9. R 1
Define cross-border financial services. 5
Recite the various components used to provide communication CO
10. R 1
between IoT devices. 6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. U 3
Distinguish between private and public blockchains. 1
CO
12. R 3
Define digital certificate. 2
CO
13. R 3
Enumerate the applications of Blockchain. 3
CO
14. U 3
Give a neat sketch for Ricardian Contracts. 4
CO
15. R 3
List the functions performed by an IoT device. 5
CO
16. R 3
Define crypto-economics. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the challenges of the distributed system in CO U 6
consideration of the Byzantine problem, which describes 1
the difficulty of decentralized parties, have in arriving at a
consensus without relying on a trusted central party.
Assume a network where no member can verify the
identity of other members.
b. CO U 6
Describe the key features of blockchain. 1

18. a. Apply the RSA algorithm to generate a public/private key CO A 6


pair for the given prime numbers, p = 17 and q = 11. 2
b. Illustrate the generic cryptography model with terminology CO U 6
for encryption. 2

19. a. Apply the SHA256 algorithm in elliptic curve CO A 6


cryptography and sketch the generation of public and 3
private key pairs in the Bitcoin network.
b. Transactions are included in a block after passing CO U 6
verification and based on their priority. Illustrate the 3
transaction verification process performed by Bitcoin
nodes.

20. a. Apply the BIP-39 encoding scheme to combine seeds from CO A 12


a sequence of English words. Assume "you get the idea 2
and solve the puzzle". Explain how to generate entropy and
encode 128 bits from the mnemonic word.

21. a. Illustrate how proof of elapsed time ideal for private CO U 6


enterprise blockchain networks. 3
b. CO R 6
List out the various issues in proof of stake.
3

22. a. Enumerate on: CO R 12


i) Paper wallets 2
ii) Hardware wallets
iii) Online wallets
iv) Mobile wallets

23. a. Write on smart contracts and how its user can interact CO A 12
creating a transaction. 4
COMPULSORY QUESTION
24. a. Summarize the payment system implementation of a CO U 6
blockchain. Explain how those platforms provide a 6
network to bridge participants and remove other
intermediaries.
b. Sketch the supply chain flow diagram and describe its CO A 6
various components. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 understand the necessity of blockchain and realize where blockchain fits in
CO2 compare and contrast cryptocurrencies, blockchain, and concept of wallets
CO3 relate classical consensus algorithms with modern algorithms like Proof-of-Work
CO4 illustrate the uses of programmable blockchains, smart contracts and oracles
CO5 comprehend the various use cases and synergistic layered approach with AI/ML/IOT etc.
CO6 design and develop blockchain based applications using the principles of cryptoeconomics

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 2 15 - - - - 17
CO2 16 7 18 - - - 41
CO3 10 13 6 - - - 29
CO4 2 3 12 - - - 17
CO5 4 - - - - - 4
CO6 4 6 6 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2027 Duration 3hrs


Course Name GEOMETRIC MODELLING Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List a few early applications of computer graphics. CO1 R 1
2. Infer on dithering and image compositing. CO1 U 1
3. Differentiate right-handed and left-handed coordinate systems. CO2 U 1
4. Compare and contrast window and viewport. CO2 An 1
5. Evaluate the importance of stereo image rectification. CO3 E 1
6. Illustrate cleanliness property in a plane sweep algorithm. CO4 A 1
7. Define radiance, luminance and brightness. CO4 R 1
8. Sketch the architecture of a 3*5 Bezier patch. CO5 A 1
9. Name a few exportable 3D file formats. CO1 R 1
10. Distinguish between revolve and sweep. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Summarize the midpoint circle algorithm. CO1 U 3
12. Illustrate point clipping with examples. CO2 U 3
13. Determine the volume of the following pyramid: CO3 A 3

14. Explain how motion capture is used to capture human


CO4 A 3
movements.
15. Analyze the concept of inverse kinematics. CO5 An 3
16. Define sampling and reconstruction in 3D. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Explain the process of computer animation using raster
17. a. CO1 U 6
graphics in detail.
Discuss the different types of raster algorithms used in
b. CO1 U 6
computer graphics.

Construct the steps in the Liang-Barsky line clipping


18. a. CO2 A 6
algorithm.
b. Solve Hodgman-Sutherland polygon clipping algorithm. CO2 A 6
Illustrate the classification of 3D transformations with
19. a. CO2 A 6
examples.
Infer on image-based modelling (IBM) and image-based
b. CO2 An 6
rendering (IBR).

20. a. Evaluate the relationship between robotics and animation. CO3 E 4


b. Discuss color model transformations in detail. CO3 U 8

Review the classification of 3D rendering algorithms in


21. a. CO4 U 6
detail.
b. Compare and contrast the types of texture mapping in 3D. CO4 E 6

Explain the different types of splines and patches with


22. a. CO5 An 12
suitable examples.

23. a. Explain polygon approximation, reduction and expansion. CO6 An 8


b. Infer on GIS visualization in 3D. CO6 U 4
COMPULSORY QUESTION
Create a block diagram and explain the steps in designing a
24. a. CO6 C 6
3D model.
Explain the concepts in geometric modelling for scientific
b. CO6 A 6
visualization.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the basics of geometric modelling techniques in computer-aided design
CO2 Describe the different coordinate systems and views.
CO3 Explain the tools and mathematical models involved in geometric modelling
CO4 Identify the appropriate Illumination and rendering techniques for modelling the virtual
objects
CO5 Implement various algorithms to map and render the basic geometrical primitives into
complex models.
CO6 Apply the geometric modelling concepts in the development of CAD applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 2 16 - - - - 18
CO2 - 4 18 7 - - 29
CO3 - 8 3 - 5 - 16
CO4 1 6 4 - 6 - 17
CO5 - - 1 15 - - 16
CO6 3 5 6 8 - 6 28
124
END SEMESTER EXAMINATION – APR / MAY – 2024

Course Code 20CS2029 Duration 3hrs


Course Name INFORMATION RETRIEVAL AND TEXT ANALYSIS Max. Marks 100

Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)

1. List down three types of data. CO3 R 1


2. Recite the science from which Information Retrieval is evolved. CO1 R 1
3. Name the best-known relevance feedback method. CO4 R 1
State the final procedure in process of Logical View of the
4. Documents. CO1 R 1
Internet is dumped with Unstructured data, Structured Data, and
Semi-Structured data which increases the complexity, how this
5. issue can be solved? Justify your answer with an example CO1 E 1
6. Infer the formula for recall and precision. CO4 U 1
7. Interpret the ways by which the thesaurus is created. CO4 A 1
8. Define Meta Search Engine. CO5 R 1
Identify which two main classes perform well in the Meta-
9. Search Combination Algorithms. CO5 U 1
Distinguish between the in-links and out-links of a directed
10. graph. CO4 U 1
PART – B (6 X 3 = 18 MARKS)
11. Differentiate between browsing and retrieval. CO1 U 3
12. Sketch the taxonomy of information retrieval models. CO1 A 3
13. Describe an inverted file with an example. CO2 U 3
14. List the ways to improve recall in search. CO4 R 3
15. Interpret the two main tasks of Meta-Search. CO4 U 3
16. Infer the directed graph with an example. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17. a. Illustrate the vector space model with the algebraic CO2 A 6
expression and list its advantages and disadvantages.
b. Explain the logical view of the document with a CO1 A 6
diagram. n
18. a. Infer the Probabilistic Model and write its advantages CO1 U 12
and disadvantages.
19. a. Explain the process of retrieving information with a CO1 A 6
diagram. n
b. Describe the Boolean model with set theory and list the CO2 R 6
advantage and disadvantages of the Boolean model.
20. a. State the global analysis method to produce the CO4 R 4
thesaurus.
b. Define Query Expansion and explain the ways by which CO3 R 8
the thesaurus is created with example.
21. a. State the steps of how min heap is used for selecting top CO4 R 8
k out of N.
b. Sketch how the keywords and documents are arranged CO4 A 4
in the tired index and describe it with an example.
22. a. Enumerate the steps for Borda ranking and Condorcet CO4 R 12
Ranking.
23. a. Illustrate the working of the Page Rank algorithm and CO5 A 6
explain the problems in the Page Rank calculation.
b. Express your views on Social Network Analysis. CO5 U 6

COMPULSORY QUESTION
24. a. Explain the boosting techniques associated with web CO4 A 6
spam in detail. n
b. Infer your views on Byes net and list down the CO6 U 6
applications of Byes net.

COURSE OUTCOMES
CO1 Design an effective text indexing system
CO2 Familiar with the Boolean and vector-space retrieval models.
CO3 Identify the evaluation and interface issues in text processing
CO4 Understand IR techniques for the web, including crawling, link-based algorithms, and
metadata usage.
CO5 Develop Document clustering and classification applications.
CO6 Compare traditional and machine learning-based ranking approaches

Assessment Pattern as per Bloom’s Level


CO / Remember Understan Apply Analyze Evaluate Create Total
BL d
CO1 2 15 3 12 1 - 33
CO2 6 3 6 - - - 15
CO3 9 - - - - - 9
CO4 28 5 5 6 - - 44
CO5 1 10 6 - - - 17
CO6 - 6 - - - - 6
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2030 Duration 3hrs


Course Name INTERNET OF THINGS Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Identify the functionality of IoT. CO1 U 1
2. Define RFID with suitable example. CO1 R 1
3. Give some examples of neurological diseases. CO2 R 1
4. Mention various sensors in agricultural IoT. CO2 R 1
5. Name any two examples of inertial sensors. CO3 U 1
6. State what is meant by wearable motherboard. CO3 R 1
7. Define the term “smart home”. CO4 U 1
8. Discuss about smart eye wear with suitable examples. CO4 R 1
9. Recall a few payloads used in drones for surveillance applications. CO6 U 1
10. Recall a few challenges to find an optimal path for drone movement. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Discuss the security and privacy measures in IoT. CO1 U 3
12. List any three smart wearables and mention its application. CO2 R 3
13. Explain about the elements of a biosensor. CO3 U 3
14. List out the system design of sample collection in wearable chemical and bio CO4 R 3
chemical sensor.
15. Explain the working concept of aerial networking used in law enforcement. CO5 U 3
16. List down the basic requirements needed for drone delivery system in rural CO6 R 3
areas.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Sketch the architecture of IoT and explain it. CO1 U 6
b. Explain about the technology of connected devices in IoT. CO1 U 6

18. a. Explain the steps involved in the connection of a light using blynk app with CO2 A 6
suitable diagram.
b. Relate a real-time scenario of a smart home automation and sketch any five CO2 A 6
technologies with its relevant protocols.

19. Determine a scenario in which a patient is not safe in the environment, and CO3 An 12
hence eventually, it becomes inevitable for at least one caregiver to be with
him all the time for Parkinson disease. It’s an emergency for the caregiver
and he has to leave for a day. How will IoT help the caregiver in such
critical time? Explain in detail.
20. What effect will the internet of things (IoT) have in healthcare? Explain CO4 A 12
with any one example of smart device.

21. a. Describe about the assistive devices for individuals with severe paralysis. CO5 A 8
b. Outline the hardware specifications of Raspberry Pi. CO5 U 4

22. a. Illustrate the role of Arduino in the field of agriculture. CO6 U 8


b. Explain about any one case study done as an application of IOT in CO6 An 4
Agriculture.

23. a. Examine the smart steps for a smart home. CO6 A 6


b. Explain the smart components for a smart home. CO6 U 6
COMPULSORY QUESTION

24. Explain the working concept of IoT enabled classroom monitoring system CO6 A 12
with needed IoT technology and outline the system architecture of the
monitorization of student behavior during class hours.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 understand Internet of Things and its hardware and software components
CO2 interface I/O devices, sensors & communication modules
CO3 examine remote data and control devices
CO4 compare the connectivity technologies and protocols in IoT
CO5 infer security issues in IoT
CO6 develop real life IoT based projects

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 16 - - - - 17
CO2 5 - 12 - - - 17
CO3 1 4 - 12 - - 17
CO4 4 1 12 - - - 17
CO5 - 7 8 - - - 15
CO6 3 16 18 4 - - 41
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2031 Duration 3hrs


Course Name INTRODUCTION TO DATA SCIENCE Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. What is data science? 1 R 1
CO
2. List any two application of data science in healthcare domain. 2 R 1
CO
3. What is EDA? 2 R 1
CO
4. Define median. 2 R 1
CO
5. What is Hypothesis Testing? 1 R 1
CO
6. What are the advantages of decision tree? 1 R 1
CO A
7. How supervised models differ from unsupervised models? 4 n 1
CO
8. List the types of machine learning. 2 R 1
CO
9. Define clustering. 1 U 1
10 List applications unsupervised learning. CO
. 2 U 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Discuss exploring various datasets in different repositories. 6 C 3
12 CO
. List any two strategies used to handle missing data. 2 U 3
13 CO
. Write short on correlation analysis. 3 R 3
14 Construct a box plot for the given data. CO
. 18, 27, 34, 52, 54, 59, 61, 68, 78, 82, 85, 87, 91, 93, 100 4 C 3
15 CO
. Compare regression and classification. 2 U 3
16 Enumerate the benefits and limitations of content-based CO A
. recommendation. 4 n 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a CO
. . Classify Python fundamental libraries. 1 U 6
b CO
. Write in detail the application of data science in any five domains. 1 R 6

18 a CO 1
. . Describe in detail about exploratory data analysis. 4 U 2

19 a CO 1
. . Construct linear and logistics regression with an example. 2 A 2

20 a CO
. . Illustrate decision trees with suitable examples. 4 R 6
b Discuss in detail the various Supervised Machine Learning CO
. techniques. 6 E 6

21 a CO 1
. . Explain regression analysis and types. 5 U 2

22 a CO
. . Explain different types of clustering. 4 E 6
b CO
. Describe K means clustering with an example. 4 U 6

23 a CO
. . Discuss about content-based filtering. 6 C 6
b CO
. Develop a case study of Sentiment Analysis in Twitter. 5 A 6
COMPULSORY QUESTION
24 a Explain in detail about the recommender systems and its CO 1
. . classification. 6 E 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO remember the key concepts of data science, data characteristics, its applications, and the toolkit
1 used data scientists
CO recall the mathematical concepts for descriptive and statistical analysis of the given dataset
2
CO discuss on the principle operation of various supervised and unsupervised machine learning
3 techniques
CO select appropriate mathematical machine learning techniques for solving real-world problems.
4
CO apply the relevant techniques for implementing solutions to solve real-world problems
5
CO access the performance of prediction, classification, and recommendation of machine learning
6 techniques
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 9 7 16
CO2 4 7 12 23
CO3 3 3
CO4 6 18 4 6 3 37
CO5 6 12 18
CO6 18 9 27
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2032 Duration 3hrs


Course Name MACHINE LEARNING TECHNIQUES Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Differentiate between supervised and unsupervised learning, CO1 U 1
2. Describe which hypotheses are consistent and inconsistent for the given data. CO1 U 1
# A B C D E Class

1 90 70 60 80 100 +ve

2 100 60 60 90 100 -ve


H1 = (90,?,?,?,100)
H2 = (?,?,70,?,90)
3. List the major steps involved in data transformation. CO2 R 1
4. Calculate the nearest neighbor using the Euclidean distance between two points CO3 A 1
X and Y: X[2,6], Y[6,9].
5. Identify the process of partitioning a set of data objects or observations into CO3 R 1
subsets.
6. Calculate the slope of the linear regression line by considering a dataset with CO3 A 1
two variables, X (independent variable) and Y (dependent variable), where X =
[1, 2, 3, 4] and Y = [2, 4, 6, 8].
7. Estimate candidate 1-itemset of the dataset by considering the support value as CO4 U 1
50%.

8. Define entropy. CO4 An 1


9. List the applications of self-organizing map technique. CO5 U 1
10. List the types of regression losses. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Calculate the instance spaces. syntactically and semantically distinct hypothesis CO1 An 3
spaces for the given data.
Attributes Values
Size Big,Small,Medium

Color Red,Green Blue,Yellow

Shape Circle,Triangle,Rectangle

Surface Smooth,Irregular

Thickness Thick,Thin
12. Illustrate with an example about All-vs.-all (AVA) multiclass classification CO2 U 3
approach and write the steps involved in handling imbalance problem.
13. Differentiate between single layer perceptron and multiple layer perceptron. CO3 U 3
14. Compare and contrast between K-means and fuzzy C-means clustering. CO4 U 3
15. Distinguish between classification and regression trees. CO5 U 3
16. Describe the methods of assessing the performance of multiclass classifiers with CO6 U 3
suitable mathematical representations.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Determine the consistent hypothesis using the Candidate elimination CO1 A 6
algorithm for the given dataset.
# Color Toughness Fungus Appearance Poisonous

1 Green Hard No Wrinkled Yes

2 Green Hard Yes Smooth No

3 Orange Hard No Wrinkled Yes

4 Green Soft Yes Smooth Yes

5 Green Hard Yes Wrinkled Yes


b. Explain the concepts underlying geometric and logical models in machine CO1 U 6
learning with illustrative examples.

18. a. Calculate the mean, standard deviation, and IQR to measure the reading CO2 An 6
ability of children where the scores of 9 third grade students: 40 26 39 14
42 18 25 43 56.
b. Describe the various methods for handling missing and noisy values in CO2 U 6
real-world data which is crucial for accurate analysis and modeling..

19. a. Estimate the decision boundary to be formed using a linear SVM model by CO3 U 8
considering the vectors (2,1) and (2,-1) as negative and the weight vector
(4,0) as positive. Also, highlight the calculated ‘w’ and offset value ‘b’.
b. List the objectives and advantages of linear SVM model. CO3 R 4

20. a. Apply the K means Algorithm and cluster the below data by assuming k=3 CO4 A 6
with initial centroids as (2, 10) and (5,8).
S. No X Y

1 2 10

2 2 5

3 8 4

4 5 8

5 7 5

6 6 4

7 1 2

8 4 9
b. Apply K-medoid clustering technique to the following dataset by assuming CO4 A 6
two medoids S2 and S4 for the 2 clusters. Estimate the absolute error
criterion and predict whether it is a good choice of replacing S2 by S7.

21. a. Apply a regression tree algorithm on the following dataset to form the CO5 An 12
regression tree.
22. a. Evaluate the effectiveness of using a simple linear regression line to CO5 An 6
estimate chocolate sales with revenue data for X=30

CHOCOL 120 110 80 70 85 100


ATE
SALES
[UNITS]

TEMPER 80 72 45 40 55 75
ATURE
[F]
b. Articulate a single layer perceptron model using perceptron learning CO4 A 6
algorithm for the given data by assuming the initial weights as [1.6, 0.9],
threshold >= 1, learning rate = 0.5 and determine the updated weight after
one iteration.
X1 X2 Y
0 0 1
0 1 0
1 0 0
1 1 0

23. a. Describe the step-by-step procedure to construct the decision tree using the CO3 U 4
ID3 Algorithm
b. Explain the types of hierarchical clustering with a neat diagram and CO3 An 8
construct a dendrogram for the following distance matrix using a single
linkage criterion.

1 2 3 4 5

1 0

2 9 0

3 3 7 0

4 6 5 9 0

5 11 10 2 8 0

COMPULSORY QUESTION
24. a. Explain the evaluation metrics for binary classification in detail and CO6 A 6
calculate the Precision, Recall and F1 Score for the below Confusion
matrix.
Predicted + Predicted -

Actual + 30 20

Actual - 10 40
b. Illustrate the various cross validation strategies with suitable examples CO6 A 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 recall the concepts, mathematical background, applicability, limitations of existing machine learning
techniques.
CO2 explain the simple feature engineering steps
CO3 apply suitable linear / nonlinear / probabilistic machine learning algorithms for a given task
CO4 demonstrate the working principle of distance based algorithms to handle unlabeled data
CO5 distinguish tree and rule based machine learning algorithms and appropriately apply to the suitable
application
CO6 evaluate the performance of machine learning models using suitable metrics

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 8 6 3 17
CO2 1 9 6 16
CO3 3 17 2 8 27
CO4 4 18 1 26
CO5 1 3 18 22
CO6 1 3 12 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2033 Duration 3hrs


Course Name NATURAL LANGUAGE PROCESSING Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Recognise the number of ambiguities exist in the sentence: ‘I know CO R 1
little Italian’. 1
2. CO R 1
Identify the field of study that focuses on internal structures of words. 1
3. Name the morpheme that cannot stand alone, but must be attached CO R 1
to another morpheme to have a meaning. 2
4. Predict the possible candidates that can be generated for the error CO U 1
word ‘tast’. 2
5. Express the three grammatical constituents for the given sentence: CO U 1
‘The retired man grew potatoes in his garden’. 3
6. CO R 1
Define the metric ‘Labelled precision’ in parse evaluation. 3
7. Identify the relation between the head word (booked) and dependent CO U 1
word (flight) in the sentence: ‘We booked her the first flight to 4
Canada’
8. Predict the lexical relationship between the word ‘newspaper’ in the CO U 1
following sentences: 4
The newspaper was delivered early today
The newspaper recruited a new journalist
9. Predict the context words for the sentence ‘I saw a cute grey cat CO U 1
playing in the garden’, with C=2, and the target word ‘cat’. 5
10 Identify the named entities in the following sentence and classify them CO U 1
. based on the generic types. Barack Obama, the former President of 6
the United States, visited New York City on January 20, 2022’.
PART – B (6 X 3 = 18 MARKS)
11 Discuss the potential categories of errors stemming from keyboard CO U 3
. mistyping, with examples. 1
12 CO U 3
Estimate the Bigram probability of the test sequence: ‘<s> do Sam I
. 2
like’,
Given a set of unigram and bigram probabilities: P(do|<s>) = 2/11,
P(do|Sam) = 1/11, P(Sam|<s>) = 4/11, P(Sam|do) = 1/8, P(I|Sam) =
4/11, P(Sam|I) = 2/9, P(I|do) = 2/8, P(I|like) = 2/7, P(like|I) = 3/11,
P(do) = 3/8, P(Sam) = 2/11, P(I) = 4/11, P(like) = 5/11.
13 Analyze the differences and similarities between Lexical and CO A 3
. Syntactic analysis. 3 n
14 Evaluate the parsing metrics recall, precision and F1 Score for the CO E 3
. given Gold standard and parsed output of the statement ‘Saw the man 4
with a telescope’

15 CO U 3
. Describe the challenges in Word Sense Disambiguation. 5
16 CO U 3
. Indicate the suitable measure for Disambiguation in entity linking. 6

PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Estimate the bigram probability of the test sentence: <s>I love CO A 6
. . machine learning algorithms </s>, by applying add-one 1 n
smoothing for the training corpus with four sentences:
<s> I love natural language processing </s>
<s> The cat is sitting on the mat</s>
<s> Machine learning algorithms are powerful</s>
<s> NLP models analyze linguistic patterns</s>
b Explain Levinstein approach to estimate the minimum edit CO U 6
. distance and calculate the cost to transform the word ‘numpy’ to 1
‘numexpr’.
18 CO A 1
Apply Viterbi Algorithm to estimate the appropriate POS tags for
. 2 2
the given sentence: ‘one dog bit’
Transition probabilities are given as:
VB
CD PRP NN VB </s>
D
<s> 0.5 0.2 0 0.3 0 0
CD 0.2 0 0.3 0.2 0.2 0.1
PRP 0.1 0.1 0 0.3 0.4 0.1
NN 0.05 0.15 0.2 0.25 0.3 0.05
VB 0 0.2 0.6 0 0 0.2
VB
0 0.1 0.6 0 0 0.3
D
And the observation likelihoods are given as:
one cat dog bit
CD 0.1 0 0 0
PRP 0.02 0 0 0
NN 0.05 0.03 0.04 0.01
VB 0 0 0.03 0
VBD 0 0 0 0.06

19 CO A 1
Apply CKY algorithm to construct the parse tree for the statement
. 3 2
“she eats a fish with a fork” with the CNF form given here.
Illustrate the stages of tree construction in detail.

20 Analyse the performance of Word Sense Disambiguation model in CO A 1


. solving the ambiguity and explain the Lesk and Walkers 4 n 2
algorithms in WSD.

21 Discuss the word embedding process with Word2Vec model, and CO U 1


. explain the two architectures for embedding text data. 5 2

22 Explain the commonly used techniques for semantic analysis in CO U 1


. language processing. 1 2

23 CO U 1
. Describe the various elements of lexical semantics with examples. 5 2
COMPULSORY QUESTION
24 a Apply Naive Bayes classifier with add-1 smoothing for the CO A 6
. . likelihoods, and compute the most likely class for new document 6
D : fast, couple, shoot, fly. Given the following short movie
reviews, each labeled with a genre, either comedy or action:
1. fun, couple, love, love comedy
2. fast, furious, shoot action
3. couple, fly, fast, fun, fun comedy
4. furious, shoot, shoot, fun action
5. fly, fast, shoot, love action
b Summarize the relationship extraction process in NLP with an CO U 6
. example. 6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Identify the different linguistic components of natural language.
CO2 design a morphological analyser for a given natural language
CO3 Prefer appropriate parts of speech technique.
CO4 choose on the appropriate parsing techniques necessary for a given language and applications
CO5 decide on the appropriate semantic techniques necessary for a given language and applications
CO6 Design application involving natural language.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 21 - 6 - - 29
CO2 1 4 12 - - - 17
CO3 1 1 12 3 - - 17
CO4 - 2 - 12 3 - 17
CO5 - 28 - - - - 28
CO6 - 10 6 - - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2035 Duration 3hrs


Course Name OBJECT ORIENTED PROGRAMMING Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the output of the following Java code snippet. CO1 U 1
class Karunya {
public static void main(String[] args) {
int a=1;
System.out.println(a++ + ++a +a++);
} }
2. Rewrite the following code snippet with foreach loop. CO1 U 1
int a[ ] = {1,2,3,4,5}
for ( i=0; i < a.length; i++)
{
System.out.println (“The Values in the array are: “+ a[i]);
}
3. State the significance of the import keyword. CO1 U 1
4. Predict the output of the following Java code snippet. CO3 A 1
try
{
int x = 0;
int y = 5 / x;
}
catch (Exception e)
{
System.out.println("Exception");
}
catch (ArithmeticException ae)
{
System.out.println(" Arithmetic Exception");
}
System.out.println("finished");
5. Differentiate between process based multitasking and thread based CO4 U 1
multitasking.
6. Predict the output of the following Java code. CO2 U 1
String str = "KarunyaUniversity";
System.out.println(str.substring(4));
7. Predict the output of the following Java code snippet. CO4 U 1
class Parent {
void display () {
System.out.println("Parent");
}
}
class Child extends Parent {
void display() {
System.out.println("Child");
}
public class Main {
public static void main(String[] args) {
Parent obj = new Child();
obj.display () ;
}}
8. Name the package used to do socket programming in Java. CO6 R 1
9. Predict the output of the following code. CO6 U 1
interface Display{
void test();
}
public class LambdaDemo{
public satic void main(String[] arg){
Display d=( ) -> System.out.println("All the Best");
d.test();
}}
10. List the various listeners in Event handling in Java Swing. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Explain the branching statements in Java with an example. CO1 U 3
12. Illustrate the method overloading with an example. CO2 U 3
13. List out the three uses of final keyword with an example. CO3 R 3
14. Discover the error(s) (if any) in following code and justify your answer. CO4 A 3
abstract class Department
{ abstract void display();
}
public class CSE extends Department {
public static void main(String[] args) {
System.out.println("Welcome to CSE");
} }
Analyze the importance of using checked and unchecked exceptions in
15. Java. Provide examples of each and explain when it is appropriate to use CO6 An 3
them in your code.
16. Discuss any three layout managers in Java Swing package. CO5 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Describe the feature of Java programming language. CO1 R 6
b. Illustrate the arithmetic and relational operators with appropriate CO1 U 6
examples.

18. a. Construct a program to store the given N numbers in an array, CO1 A 4


search a given number in the array, and display “Available” if it
exists and “Not Available” if it does not exist.
b. Develop a menu driven application to perform the ATM operations CO2 A 8
using Java. Your application must contain the following
functionalities. Use constructors, getter and setter functions.
 In the menu give options for Balance Enquiry, Withdrawal
and PIN change
 Do not allow to withdraw money if the balance is < = 500
 Do not allow to withdraw money if the amount is not a
multiple of 10.

19. a. Explain the following concepts with suitable example. CO3 U 4


 Garbage collector
 Static Methods
b. Develop a multilevel inheritance in Java to represent Building, CO4 A 8
Residential_Building, and Bungalow. Define two unique data
members for each class and initialize all the members through
constructors. Display_data() is a common function for all the
classes. Illustrate the above structure by creating a derived class
object and dynamic method dispatch.

20. a. In a company, they have decided to conduct a recruitment process CO6 A 12


with the eligibility of “7+ years in DevOps”. If the enrolled persons
are not acquiring the eligibility, then construct the following
Exceptions.
 If below seven years of experience, throw an user-defined
exception called “Exp_Shortage_Exception.”
 If the skill set is not “DevOps,” throw the built-in exception
called “NullPointerException.”

21. a. Develop a Java application to perform the following functionalities CO4 A 6


in ArrayList.
 Create an ArrayList to hold the product names of the data
type String.
 Add five different product names.
 Print the first two product names.
 Print the size of the ArrayList.
 Remove a particular product from ArrayList.
b. Construct two thread classes to perform operations such as add and CO6 A 6
subtract, by getting the input from the main thread.

22. a. Construct an interface called “Engine” with set of methods CO3 A 6


changeGear(), speedUp() and applyBrakes(). Create two classes
“Car” and “Bike” with properties gear, speed which implement the
interface functionalities. Include a “Main” class to demonstrate the
accessing of those interface methods.
b. Explain the TCP Socket programming model with an example CO6 U 6
program to send a message from the server to client.

23. a. Construct a file named MyData.txt. Write your profile data such as CO6 A 6
name, regno, age, and CGPA into the file MyData.txt. Copy this
file content into another file called MyCopy.txt.
b. Discuss the Bounded Types in the Generic class to handle the CO4 U 6
hierarchical inheritance of Human, Student and Staff. Each class is
responsible for displaying information concerning their class. Prove
the workability of the above classes through bounded types.
COMPULSORY QUESTION
24. a. Develop a GUI program to convert Dollar to Rupee using Java Swing CO5 A 12
API as given below.

Note: 1 Dollar=83 Rupees


CO – COURSE OUTCOME BL –
BLOOM’S LEVEL

COURSE OUTCOMES
CO1 acquire the knowledge of structure and model of object-oriented programming
CO2 identify classes, objects, members of a class and relationships among them needed for a specific
problem
CO3 apply various techniques in polymorphism for software development.
CO4 develop applications using multi-threading, collections and IO concepts to solve real-time problems
CO5 create applications using event-driven programming
CO6 design and implement applications to solve distributed collaborative problems.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 6 12 4 - - - 22
CO2 - 4 8 - - - 12
CO3 3 4 7 - - - 14
CO4 - 8 17 - - - 25
CO5 - 3 12 - - - 15
CO6 2 7 24 3 - - 36
124

END SEMESTER EXAMINATION – APRIL / MAY 2024


Course Code 20CS2036 Duration 3hrs
Course Name OPERATING SYSTEMS Max. Marks 100

Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
1. Identify major functions of a kernel in a Unix operating system. CO1 R 1
2. Distinguish between command-line interface (CLI) and graphical user interface
(GUI). CO1 U 1
3. State the use of the program counter. CO2 R 1
4. Name the types of multithreading models. CO2 R 1
5. Differentiate scheduler and dispatcher. CO3 U 1
6. Define semaphore. CO3 R 1
7. Express any one way to overcome deadlock. CO4 U 1
8. Define external fragmentation. CO5 U 1
9. List the attributes of a file. CO5 U 1
10. Write the function of the interrupt handler. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Describe the storage structure of an operating system along with its diagram. CO1 U 3
12. Write short notes on the process control block (PCB). CO2 A 3
13. Analyze the role of the critical section in synchronizing the processes. CO3 An 3
14. Differentiate Paging and segmentation. CO4 U 3
15. List the different operations that can be performed on a file. CO5 R 3
16. Give any three merits of direct memory access. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain various operating system structures accompanied by its diagram. CO1 U 6
b. Describe the various types of system calls with examples. CO1 R 6

18. a. Illustrate the various types of inter process communications with all possible CO2 U 8
examples.
b. Differentiate preemptive and non-premptive scheduling. CO3 U 4

19. a. Apply priority scheduling and round robin scheduling with time slice t=2 to CO3 A 12
calculate waiting time (WT), turnaround time (TAT) of each process and find out
average WT and ATAT(Average Turnaround Time). (Lower number signifies
higher priority)
Process Burst Time Arrival Time
P1 10 3
P2 1 1
P3 2 4
P4 3 5
P5 5 2

20. a. Explain the classical problems of process synchronization with examples. CO4 R 12

21. a. Assume that there are 5 processes, P0 through P4, and 4 types of resources. CO5 A 12
At T0 we have the following system state:
Max Instances of Resource Type A = 3 (2 allocated + 1 Available)
Max Instances of Resource Type B = 17 (12 allocated + 5 Available)
Max Instances of Resource Type C = 16 (14 allocated + 2 Available)
Max Instances of Resource Type D = 12 (12 allocated + 0 Available)
i. Create a need matrix for the following.
ii. Use the safety algorithm to test if the system is in a safe state or not.

22. a. Consider the following reference string 5,0,1,2,3,0,5,2,3,0,3,2,1,2,0,1,5,0,1 for a CO4 U 12


memory with 3 frames and 4 frames. Predict whether the reference string suffers
from Belady anomaly. Estimate the number of page faults using FIFO,LRU and
Optimal page replacement algorithms.

23. a.Explain the different types of file allocation methods with a neat sketch. CO5 U 8
b Consider a file system where a file can be deleted and its disk space reclaimed CO5 An 4
while links to that file still exist. Analyze the problems may occur if a new file is
created in the same storage area or with the same absolute path name? How can
these problems be avoided?
COMPULSORY QUESTION
24. a. Examine the total distance (in cylinders) that the disk arm moves to satisfy all the CO6 A 12
pending requests, for each of the following disk-scheduling algorithms. The disk
drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a
request at cylinder 143, and the previous request was at cylinder 125. The queue
of pending requests, in FIFO order, is 86, 1470, 913, 1774, 948, 1509, 1022,
1750, 130 Starting from the current head position.
a. FCFS b. SSTF c. SCAN d. LOOK e. C-SCAN
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Understand how operating systems makes it possible for many applications to share resources and to make programming easier for
user space applications.
CO2 Distinguish between user and kernel level operating.
CO3 Analyze the thread context management, synchronization methods and various scheduling algorithms.
CO4 Apply various memory management schemes especially paging and segmentation in real time applications.
CO5 Illustrate file systems in operating systems like UNIX/Linux and Windows.
CO6 Discover input output management, use of device driver and secondary storage (disk) mechanism.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 7 10 - - - - 17
CO2 2 8 3 - - - 13
CO3 1 5 12 3 - - 21
CO4 12 16 - - - - 28
CO5 3 10 12 4 - - 29
CO6 - 4 12 - - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2037 Duration 3hrs


Course Name OPTIMIZATION METHODOLOGIES Max. Marks 100

Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Identify the types of constraints in optimization problems. CO1 U 1
2. List the types of optimal points in optimization problems. CO1 R 1
3. Define sensitivity analysis. CO2 R 1
4. State the significance of the Slack variable. CO2 U 1
Name the method that is used to obtain an optimum assignment
5. CO3 R 1
solution.
6. Define pure integer programming. CO3 R 1
List the methods to find the solution for a Transportation
7. CO4 R 1
problem.
Represent the separable functions of the given objective
8. function. CO4 U 1
Max W = 2x+3y-7z
State the formula for backward recursion in dynamic
9. CO5 R 1
programming.
10. Identify the various queue’s discipline in queuing theory. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Differentiate linear and nonlinear programming problems. CO1 U 3
12. Determine and sketch the coordinates of the feasible region CO2 A 3
using the graphical method.
13. Apply the Least cost cell method to obtain the basic feasible CO3 A 3
solution for the following problem: Luminous lamps has three
factories - F1, F2, and F3 with production capacity 30, 50, and
20 units per week respectively. These units are to be shipped to
four warehouses W1, W2, W3, and W4 with requirements of
20, 40, 30, and 10 units per week respectively. The
transportation costs (in Rs.) per unit between factories and
warehouses are given below.

14. Predict the determinant of the Bordered Hessian matrix. CO4 U 3

15. Convert the following problem to a balanced transportation CO5 U 3

problem.
16. Give examples in real time of Queuing Systems. CO6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Explain the classification of optimization algorithms in CO1 U 8
detail.
b. Construct the dual over the primal optimization problem. CO1 A 4

18. Solve linear programming maximization problems using the CO2 A 12


Simplex Method.
19. Solve the LPP using Branch and Bound method. CO3 A 12

20. Solve the following NLPP using the Lagrange method. CO4 A 12
Minimize z=30x12+ x22+ x32
subject to x1+x2+3x3=2
5x1+2x2+x3=5
x1, x2, x3 ≥ 0

21. a. CO5 A 6
I II III IV V

A 9 11 14 11 7

B 6 15 13 13 10

C 12 13 6 8 8

D 11 9 10 12 9

E 7 12 14 10 14
A team of employees have identified five projects (I, II, III,
IV, V) that need to be assigned to the team members (A, B,
C, D, E). Each project has an estimated workload, and each
team member has different skills. Determine the minimal
assignment cost of projects.
b. Determine an initial basic feasible solution to the following CO5 A 6
transportation problem using the Northwest corner method.

using Dichotomous search method. Assume △=0.05 and


22. a. Determine the optimal value for the following function CO6 A 8

iteration up to 4.
b. Describe the steps of Vogel’s approximation method for CO6 U 4
transportation problems.

23. a. Solve the following NLPP using the Karush Kuhn Tucker CO3 A 8
method.

Maximize z =2x12-7x22 +12x1x2


subject to 2x1+5x2 ≤ 98
x1, x2 ≥ 0
b. Explain the steps in solving separable programming CO4 U 4
problems.
COMPULSORY QUESTION
24. Describe the Queueing models using Kendall notation and
CO6 U 12
the components of queuing theory.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 formulation of optimization problems
CO2 define and use optimization terminology and concepts
CO3 describe the appropriate linear programming techniques.
CO4 choose the appropriate optimization for real world problems
CO5 customize the optimization methodologies for real time problem
CO6 apply the knowledge to solve the queuing problems

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 1 12 4 - - - 17
CO2 1 1 15 - - - 17
CO3 2 - 23 - - - 25
CO4 1 8 12 - - - 21
CO5 1 3 12 - - - 16
CO6 3 17 8 - - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2039 Duration 3hrs


Course Name PRINCIPLES OF INDUSTRY 4.0 Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define Intelligent devices. 1 R 1
CO
2. List the current modern technologies used in IIoT. 1 R 1
CO
3. Define Miniaturization. 2 R 1
CO
4. State the significance of network functions virtualization. 2 R 1
Name the wireless technology that relies on electrostatic coupling for CO
5. data transfer. 3 R 1
Identify the type of Address represented by the given alphanumeric
sequence: CO
6. 2001:0db8:85a3:0000:0000:8a2e: 0370:7334. 3 U 1
CO
7. Define middleware software pattern. 4 R 1
CO
8. List the features of the constrained application protocol. 4 R 1
CO
9. Identify the most popular commercial IoT middleware platforms. 5 U 1
10 CO
. State the primary objective of digital transformation. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO
. Identify the various catalysts and precursors of the IIoT. 1 U 3
12 CO
. Sketch the diagrammatic representation of Cyber-Physical Systems. 2 A 3
13 CO
. Compare Zwave and Zigbee. 3 U 3
14 CO
. Explain the significance of the Real-time Transport Protocol. 4 U 3
15 CO
. List the characteristics of Low Power WAN. 5 R 3
16 CO
. Classify the various types of value chain components. 6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the architecture of IIoT infrastructure, outlining the CO U 7
. . arrangement and functionalities of its key components. 1
b Explain the various opportunities provided by IIoT across diverse CO U 5
. manufacturing units. 1

18 a Sketch the life cycle phases of Big Data analytics and explain the CO A 7
. . various stages and processes in the analysis of extensive datasets. 2
b CO U 5
. Identify the application areas of augmented reality. 2

19 Sketch the schematic diagram of the access network diagram and CO A 1


. explain its role in facilitating connectivity and communication 3 2
within the framework of industrial systems.

20 a Illustrate the Store and Forward approach in delay-tolerant networks CO A 7


. . and explain the key components and their interactions within the 4
network architecture.
b Explain the operation of an Application Programming Interface CO U 5
. with a diagram. 4

21 a CO U 7
. . Compare Long Range WAN with SigFox Low Power WAN. 5
b CO U 5
. Describe in detail the importance of IIoT middleware. 5

22 a Sketch the Industrial Internet Architecture Framework and explain CO A 7


. . the function of each building block. 2
b Analyze the components and functionalities of Network CO A 5
. Virtualization Function architecture. 2 n

23 a Summarize the key features of Industry 4.0 and their contributions CO U 7


. . to contemporary manufacturing transformation. 6
b Explain the role of digital transformation in reshaping traditional CO U 5
. operational methods. 6
COMPULSORY QUESTION
24 Evaluate the centrality of smart factories in Industry 4.0 by CO A 1
. critically assessing their influence on manufacturing processes, 6 n 2
supply chain dynamics, business models, and external interfaces.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Describe the drivers and enablers of Industry 4.0.
1
CO Define the smartness in Smart Factories, Smart cities, smart products and smart services.
2
CO Understand the various systems used in a manufacturing plant and their role in an Industry 4.0
3 world.
CO Summarize the power of Cloud Computing in a networked economy.
4
CO Express the opportunities, challenges brought about by Industry 4.0 and how organizations and
5 individuals should prepare to reap the benefits.
CO Identify the security challenges involved in Industry 4.0.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 15 - - - - 17
CO2 2 5 17 5 - - 29
CO3 1 4 12 - - - 17
CO4 2 8 7 - - - 17
CO5 3 13 - - - - 16
CO6 1 15 - 12 - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2042 Duration 3hrs


Course Name REAL TIME OPERATING SYSTEMS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Identify the types of real time operating systems. 1 U 1
CO
2. Name any two general purpose operating systems. 1 R 1
CO
3. Name the multiprocessor design that has identical processing units. 2 R 1
CO
4. Define distributed systems. 2 R 1
Identify the scheduling algorithm that is being executed process can be CO
5. stopped when a high-priority process arrives. 3 U 1
CO
6. Represent the formula to calculate the waiting time of the processes. 3 U 1
List the different forms of communication to support inter task CO
7. interactions. 4 R 1
Represent the methods to solve the priority inversion problem in CO
8. embedded systems. 4 U 1
CO
9. Identify the types of digital storage devices in embedded systems. 5 U 1
10 CO
. List the elements of task control block. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 CO A
. Distinguish between hard and soft real time operating systems. 1 n 3
12 CO
. Give examples of asymmetric multicore multiprocessor design. 2 U 3
13 Differentiate the preemptive and non-preemptive scheduling CO A
. algorithms. 3 n 3
14 CO
. List the application areas for mixed-mode systems. 4 R 3
15 CO A
. Differentiate the pool and queue in RTOS. 5 n 3
16 CO
. List the importance of the memory management unit. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain the types of common services that are offered by the kernel CO U 6
. . to the application software. 1
b CO U 6
. Explain the basic features of real time operating systems. 1

18 a Explain how the task and thread allocation are performed in CO U 6


. . multiprocessor systems. 2
b Illustrate the mapping of software to hardware developed in CO A 6
. distributed systems to satisfy all functional requirements. 2

19 a Consider the following table of arrival time and burst time for five CO A 6
. . processes P1, P2, P3, P4 and P5 with the time quantum = 2 ms. 3

Proces Burst time (ms) Arrival time (ms)


s
P1 5 0
P2 3 1
P3 1 2
P4 2 3
P5 3 4
Determine the completion time of process P4 using the Round-
Robin (RR) scheduling algorithm.
b Analyze the priority-based pre-emptive dynamic scheduling policies CO A 6
. to increase the performance of the system. 3 n

20 a Explain how the memory leakage problem is handled in embedded CO U 6


. . systems 4
b Explain how to use binary semaphores for notifying occurrences of C0 U 6
. an event from a task or thread and for notifying another task waiting 4
for that event.

21 a Explain how queues are implemented to make communication CO U 6


. . between tasks. Also, summarize the steps to read and write data in 5
the circular buffer.
b An automated materials handling that uses a pallet transport robot CO A 6
. and a materials loader/unloader (palletizer) robot. The transport 5
robot's function is to move the pallets about the factory, while the
palletizer function is to unload and/or load items onto the pallets
(palletizing). All operations are controlled by software, in particular
a transport task and a palletizing task. Implement a task
synchronization mechanism between a transport task and a
palletizing task for the aforementioned scenario to handle the
materials.

22 Consider a system with five processes (P0 through P4) and four CO A 1
. resources of type A, B, C and D with allocation of each process as 6 2
shown in the table below.
Process Maximum Allocated Available
A B C D A B C D A B C D
P0 6 0 1 2 4 0 0 1 3 2 1 1
P1 1 7 5 0 1 1 0 0
P2 2 3 5 6 1 2 5 4
P3 1 6 5 3 0 6 3 3
P4 1 6 5 6 0 2 1 2

Calculate the need matrix and determine the safe sequence of the
system.

23 Consider the set of 5 processes whose arrival time and burst time CO A 1
. are given below. Use SJF and preemptive priority scheduling 3 2
algorithm to calculate the average waiting time and average
turnaround time. (Higher number represents higher priority).
Process Arrival Time Burst Time Priority
Id
P1 0 4 2
P2 1 3 3
P3 2 1 4
P4 3 5 5
P5 4 2 5

COMPULSORY QUESTION
24 a Explain the task coordination mechanisms using a condition flag CO U 6
. . group. 6
b Construct a mailbox application system that uses a synchronization CO A 6
. mechanism and data transfer to enable task interactions. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO understand the concepts of real-time systems and modeling
1
CO outline the potential benefits of distributed systems
2
CO analyze the time complexity in job handling
3
CO design real time embedded systems using the concepts of RTOS
4
CO identify and evaluate the storage management policies with respect to different storage
5 management
CO design applications in Embedded systems by using RTOS
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 1 13 - 3 - - 17
CO2 2 9 6 - - - 17
CO3 - 2 18 9 - - 29
CO4 4 13 - - - - 17
CO5 - 7 6 3 - - 16
CO6 4 6 18 - - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2044 Duration 3hrs


Course Name REINFORCEMENT LEARNING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Recall the role of reinforcement learning in a chess game. R 1
1
Recall the two feedbacks used in multi-armed bandits with the non- CO
2. R 1
associative setting. 1
Represent the functional components of reinforcement learning with a CO
3. U 1
neat diagram. 1
CO
4. Define state transition and probability transition in Markov decision. R 1
2
Recall the different types of simulators used in the Markov decision CO
5. R 1
process. 2
CO
6. List down a few classical algorithms used in dynamic programming. R 1
3
CO
7. Recall the two standard approaches used in dynamic programming. R 1
3
CO
8. List down a few real-time Monte Carlo applications. R 1
4
Define the operations used for Monte Carlo control without exploring CO
9. R 1
starts. 5
10 Identify a few reinforcement learning applications using recommender CO
U 1
. systems 6
PART – B (6 X 3 = 18 MARKS)
11 CO
Name the two threads that have been used in machine learning to date. R 3
. 1
12 CO
State the bellman’s equation and its elements used in MDP problems. R 3
. 2
13 Describe the policy evaluation used for state-value function in CO
U 3
. reinforcement learning. 3
14 Describe how the Monte Carlo method is used to estimate the policy CO
U 3
. value. 4
15 Examine the reproduction of state aggregation cases within the linear CO
A 3
. framework. 5
16 Examine the ethical issues that take place in artificial reinforcement CO
A 3
. learning for solving real-world problems 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss the working concept of the n-armed bandit problem for slot CO U 6
. . machines and identify the possible outcome of a jackpot with a 1
minimum of four rollers with 12 combinations of labels.
b Visualize an apartment with 5 rooms; each door has a bidirectional CO R 6
. way of entering and exiting the rooms. Only one room carries the 1
reward point of 500 dollars. Apply the Q-learning technique and
represent the scenario in a graph of states, edges, and steps.

18 a Visualize a deer hunting ground, where the tribes decide to go deer CO R 8


. . hunting or not in a nearby forest to ensure long-term returns. Each 2
deer generates a fixed return. However, if the tribes hunt beyond a
limit, it can result in a lower yield next year. Identify the MDP
states, actions, policy, and its graphical representation.
b Discuss the use of the pick-and-drop robotic arm problem in CO U 4
. industrial automation and identify the MDP states, actions, and 2
policies with a neat graphical representation.

19 a Visualize a grid world of 8x8 size to which the non-terminal states s CO R 9


. . = {1, 2, 3 …64} and actions A = {up, down, right, left} are 3
initialized. Demonstrate the iterative policy evaluation and represent
the random policy for n number of steps.
b Discuss the steps involved in iterative policy evaluation and its CO U 3
. outcome 3

20 a Discuss the working concept of the Monte Carlo method used in the CO U 9
. . blackjack game and show the total number of possibilities of the 4
strike, hit and draw in a neat diagram.
b Discuss the role of Monte Carlo Control and identify the steps CO U 3
. involved in the Monte Carlo ES algorithm. 4

21 a Examine the effect on learning the size of the receptive fields in CO A 1


. . coarse coding using linear function approximation 5 2

22 a Discuss the following theorem used in dynamic programming with CO U 9


. . its equations 3
1. Policy improvement theorem
2. Policy iteration
Value iteration
b Discuss the parameters involved in the bell curve as the frequencies CO U 3
. of the outcome generated by the Monte Carlo simulation. 3

23 a Discuss the working concept of Off-policy prediction via CO U 9


. . importance sampling with a suitable example. 4
b Discuss the off-policy every-visit MC control algorithm using CO U 3
. weighted importance sampling. 4
COMPULSORY QUESTION
24 a Construct a recommender system for a healthcare application CO A 1
. . holding four medical conditions from 30 to 70. Identify the 6 2
medication and age as key factors in building the recommender
system for social awareness.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
Understand the basics of Reinforcement learning
1
CO
Formalize problems as Markov Decision Processes
2
CO
Analyze the utility of dynamic programming for industrial applications and problems
3
CO
Apply Monte Carlo reinforcement learning algorithms
4
CO
Implement policy gradient methods and linear methods for function approximation
5
CO
6 Recognize current advanced techniques and applications in RL

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 11 7 18
CO2 13 4 17
CO3 11 18 29
CO4 1 27 28
CO5 1 15 16
CO6 1 15 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2045 Duration 3hrs


Course Name RFID TECHNOLOGIES Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. R 1
List the eras of RFID technology. 1
CO
2. R 1
Expand CRC and RTD. 2
CO
3. R 1
Identify the various addressing privacy in RFID. 3
CO
4. R 1
State the possible counter measures involved in zone 3. 4
CO
5. R 1
Enumerate the common uses of RFID at airports. 4
CO
6. R 1
Classify the various types of contactless smart cards. 5
CO
7. R 1
Name the operating frequency of closed coupling smart card. 5
CO
8. R 1
List the categories of NFC. 5
CO
9. R 1
State the benefits of contactless smart card. 6
CO
10. R 1
Identify the application areas of animal identification. 6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. Define singulation. R 3
1
CO
12. Briefly describe antenna gain. U 3
2
CO
13. Identify the terminologies and shift keying of RFID technology. U 3
3
CO
14. Trace the security zones of RFID. U 3
4
CO
15. Relate an open payment system with a real time examples. A 3
5
CO
16. Define bolus. U 3
6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Explain in detail about the types of RFID tags with suitable CO U 12
diagram. 1

18. a. CO U 6
Illustrate the tags classified by its physical factor.
2
b. CO U 6
Differentiate the tags classified by its programming method.
2

19. a. Develop a RFID-based tracking and monitoring solution for CO A 12


the electronics company's export process, starting from the 3
manufacturing facility in China to the final delivery at
international destinations. Outline the key components of
your RFID system, including the type of RFID tags, readers,
and middleware. Interpret how this RFID solution will
address the company's logistics challenges, enhance
shipment visibility, and improve overall supply chain
efficiency during the exporting of goods.

20. a. An oil and gas firm that operates in a difficult and remote CO An 12
region is thinking about implementing RFID technology to 4
improve its operations. They have a particular interest in
RFID technology for maintenance, staff safety, and asset
tracking. Employ integrating RFID technology to promote
employee safety, improve asset monitoring, and streamline
maintenance procedures given the special obstacles faced by
the oil and natural gas business, particularly in remote and
dangerous locations. Construct the various difficulties and
dangers associated with using RFID in this situation and
provide ideas for reducing these issues while preserving the
greatest levels of efficiency, safety, and adherence to legal
requirements.

21. a. Explain the working mechanism of vicinity coupling smart CO U 6


card. 5
b. CO U 6
Illustrate the concept of closed coupling smart card.
5

22. a. Develop a various module that allows mobile devices to be CO A 12


modelled as NFC devices. 5

23. a. Develop a smart transportation system based on RFID CO A 12


technology implementing various fare system. 6
COMPULSORY QUESTION
24. a. CO
Devise a smart RFID system for waste disposal in industry. An 12
6
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the architecture of RFID, types of readers and tags and their protocols.
CO2 Interface RFID based systems with smart antennas and various levels of frequencies.
CO3 Apply the appropriate RFID configuration for effective communication.
CO4 Analyze the security and privacy issues, standards of RFID technologies.
CO5 Compare the influence of RFID technologies in different case studies.
CO6 Design and deploy RFID based real time Industrial Applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 4 12 - - - - 16
CO2 1 15 - - - - 16
CO3 1 3 12 - - - 16
CO4 2 3 - 12 - - 17
CO5 3 12 15 - - - 30
CO6 2 3 12 12 - - 29
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2046 Duration 3hrs


Course Name ROBOTICS PROCESS AUTOMATION Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. List some of the tasks that can be performed by RPA bots. CO1 R 1
2. Identify OCR features used in RPA platforms. CO1 R 1
3. Enumerate the steps in 5S. CO2 R 1
4. List the factors to keep in mind when applying Lean and Six Sigma to RPA. CO2 R 1
5. Define Proof of Concept. CO3 R 1
6. State the skillsets required for RPA supervisor. CO3 R 1
Name the function responsible for displaying the initial screen to design the
7. CO4 R 1
bot when getting started.
8. Name the software that assists users in bot management. CO4 R 1
Identify the box testing that functions as a blend of the black-and-white box
9. CO5 R 1
testing approaches.
List any two of the actions in data preparation that improve the quality of the
10. CO6 R 1
data.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Represent the architectural flow of Robotic Desk Automation using
11. CO1 U 3
flowchart.
12. Enumerate the ways in Lean to reduce and eliminate wastes. CO2 R 3
13. Describe the steps in the automation CoE. CO3 U 3
14. Explain “for each” loop, accompanied by an illustrative example. CO4 U 3
15. Discuss briefly the concept of “learning by osmosis”. CO5 U 3
16. Discuss Intellibot and how the technology is of use in RPA. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Predict the solution for the case study “A leading manufacturer was CO1 U 6
struggling to process hundreds of invoices from multiple vendors each
month. The format of these scanned/digital invoices significantly varied
among the vendors; more than four full-time employees were manually
transcribing data from these invoices into SAP, which considerably
delayed the processing. The end-to-end process was further delayed due
to several hierarchical approvals.”
b. Explain the Flavors of RPA. CO1 U 6
18. a. Observe the scenario and apply the suitable mechanism to maintain the CO2 R 6
profit “Paymentshield is one of the UK’s leading distributors and
administrators of insurance. But after 20 years of success, the leadership
team saw an opportunity to improve their already stellar customer
service. They challenged the Operational Excellence Coordinator,
Diane Leatherbarrow, to make a 10% improvement for their Customer
Services department. The result? Four areas that resulted in an average
of a 69% improvement!”
b. Explain the steps to apply Lean and Six sigma to RPA CO2 U 6

19. a. Examine the below scenario and help them to standardize using Centre CO3 A 6
of Excellence “A global pharmaceutical company with sites worldwide
had a requirement to standardize their Manufacturing Execution
Systems (MES) across four sites.”
b. Explain in detail about vendor evaluation. CO3 U 6

20. a. Predict your work for a large retail company that wants to implement CO3 A 6
RPA to streamline its order processing system. The organization
receives a high volume of online orders daily. Accuracy, efficiency, and
scalability are critical factors in this process. Examine how RPA would
solve the addresses that are specific to its needs, and interpret the steps
needed to ensure a successful implementation.
b. Discuss an overview of the structure or framework typically employed CO3 U 6
in change management.

21. a. Summarize on Uipath orchestrator and outline the best practices for CO4 U 6
developing bots.
b. Explain the four installation choices available for uipath. CO4 U 6

22. Interpret your work as a project manager responsible for deploying an CO5 A 12
RPA solution in a healthcare organization. The RPA bot's task is to
process insurance claims, verify patient eligibility, and submit claims to
the appropriate insurance providers. As the project enters the
deployment and monitoring phase, you are tasked with ensuring a
successful rollout.
Question:
Articulate the steps you would take to deploy and monitor the RPA bot
in the healthcare organization's claims processing workflow. Provide a
detailed plan and discuss the key performance indicators (KPIs) you
would track to measure the success of the automation. Additionally,
explain how you would handle issues and errors that may arise during
the deployment and monitoring process.

23. a. Explain in detail the issues faced in handling big data and the data CO5 U 12
process that is involved in delivering the solution.
COMPULSORY QUESTION
24. a. Articulate on implementing a Pega Robotic Process Automation (RPA) CO6 A 6
solution for a customer service department. The goal is to automate the
process of handling customer inquiries through email. Explain the key
components of a Pega RPA bot, and how they contribute to the
successful automation of this customer service task.
b. Apply the Nintex RPA solution for a logistics company to streamline CO6 A 6
their order processing. Describe the key features and benefits of Nintex
RPA in this logistics scenario, and explain how they contribute to
increased efficiency and accuracy in order processing.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 articulate the history of RPA technology, benefits, drawbacks, and comparisons to other
automation technologies
CO2 examine the implementation of RPA and ensure its processes are in good shape
CO3 choose the right RPA software by considering its costs, training, functionality, and security
CO4 create a bot to develop the UiPath and establish the workflow structures
CO5 evaluate the bots and ensure its functionality through scaling and optimization
CO6 review the large and small RPA software developers and vendors

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 2 15 - - - - 17
CO2 11 6 - - - - 17
CO3 2 15 12 - - - 29
CO4 14 3 - - - 17
CO5 1 15 12 - - - 28
CO6 1 3 12 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2047 Duration 3hrs


Course Name ROBOTICS Max. Marks 100

Q.
B
No Questions CO M
L
.
PART – A (10 X 1 = 10 MARKS)

1. Write about safety issues in robot. CO1 U 1


2. Identify the sensors which is used to detect the motion. CO1 A 1
3. Expand ROS. CO2 R 1
State the sensors that require physical contact against other objects
4. to trigger. CO2 R 1
5. Classify the types of locomotion. CO3 U 1
6. Select the actuator to use in the cleaning robot. CO3 U 1
7. Identify the grippers that are used to transfer glass material. CO4 U 1
Depict the level that simulates the algorithms used within the
8. embedded systems. CO4 R 1
Name the robot that has its own computer, and can work
9. independently of other robots or computers. CO5 R 1
10
. Recall the various controlling methods. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11 Define Robot. CO2 R 3
.
12 Discuss about Degrees of Freedom. CO1 U 3
.
13 List the application of machine vision system? CO3 R 3
.
14 Illustrate the desirable features of sensors. CO4 A 3
. n
15 State the transfer function. CO6 R 3
.
16 List any three advantages of a pneumatic actuator. CO5 R 3
.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17 a Describe the various Classification of robots. CO1 U 6
. .
b Explain the components of robot. CO1 U 6
.

18 a Explain the kinematics and drive the equation for forward CO2 A 12
. . kinematics and inverse kinematics. n

19 a Describe the different applications of robot. CO4 R 6


. .
b Differentiate translation and rotation in robotics CO1 U 6
.

20 a Describe a vision sensor used to take the image of an object. CO3 R 6


. .
b Classify the various types of sensors CO3 U 6
.

21 a Explain the pneumatic actuators system with diagram. CO4 U 12


. .

22 a Identify the type of locomotion used for the following scenario CO5 A 8
. . and justify the answer. “A developer needs to design the robot n
for detecting land mines, Robot will be used in different terrain,
Developer should select a locomotion method which will be
used effectively”
b Classify the types of actuators. CO4 U 4
.

23 a Discuss the different types of control system based on CO5 U 12


. . controlling location with suitable example.
COMPULSORY QUESTION
24 a Design the hardware structure of Chef Bot. CO6 A 6
. . n
b Discuss the communication system in chef Bot. CO6 U 6
.

COURSE OUTCOMES
CO1 Perform kinematic and dynamic analyses with simulation
CO2 Design control laws for a robot.
CO3 Integrate mechanical and electrical hardware for a real prototype of robotic device.
CO4 Select a robotic system for given application.
CO5 describe the different physical forms of robot architectures.
CO6 develop simple robot control systems integrating perception, planning, and action

Assessment Pattern as per Bloom’s Level


CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 0 22 1 0 0 0 23
CO2 5 0 0 12 0 0 17
CO3 9 8 0 0 0 0 17
CO4 7 17 0 3 0 0 27
CO5 4 12 0 8 0 0 24
CO6 4 6 0 6 0 0 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2050 Duration 3hrs


Course Name SOFTWARE ENGINEERING Max. Marks 100

Q.
N Questions CO BL M
o.
PART – A (10 X 1 = 10 MARKS)
1. Illustrate the user requirement expressed in extreme programming CO R 1
model. 1
2. List any two agile process models. CO R 1
1
3. Indicate an abstract class in a UML class diagram with an example. CO U 1
3
4. List the components to draw a sequence diagram in Star UML. CO U 1
3
5. Identify any two architectural designs that will be used to design CO R 1
the software. 4
6. Name the software testing tool that is used for automated testing. CO R 1
5
7. Identify the software configuration management paradigm that CO U 1
allows us to regulate change without severely limiting legitimate 6
change.
8. List the number of clauses used in ISO 9001 to specify quality CO R 1
system requirements. 6
9. Write the formula for cost estimation of a software project as per CO R 1
the basic COCOMO model. 6
10 Name two project management approaches that are utilized to keep CO R 1
. all tasks on schedule. 6
PART – B (6 X 3 = 18 MARKS)
11 Describe about various phases of the unified process. CO R 3
. 1
12 List the functional and non-functional requirements of the CO An 3
. following web application. Ex: https://www.flipkart.com 2
13 Discuss any three design concepts used in software development. CO R 3
. 3
14 Differentiate error and defect of a software product. CO U 3
. 4
15 State the core steps of six sigma methodology in software R CO 3
. engineering. 5
16 Describe the version control technique in Software Configuration R CO 3
. Management. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a. Consider “Designing an IVRS (Interactive Voice Response CO An 12
. System) for fine collection by the police presents a 1
multifaceted problem statement. The system must efficiently
handle various tasks, including fine inquiries, payment
processing, and receipt issuance, while ensuring user-
friendliness and compliance with legal regulations. Challenges
encompass ensuring secure payment transactions, integrating
with existing police databases for fine verification,
accommodating diverse payment methods, and providing
multilingual support to cater to a wide range of users”.
a. Suggest a process model for the above scenario and the
reasons for choosing that model.
b. Explain the design process of the above system using the
suggested process model.

18 a. Sketch the UML sequence diagram for the following scenario. CO U 6


. “In an online shopping application, customers often need to go 3
through a checkout process to complete their purchases.
Designing an efficient checkout system requires understanding
the sequence of interactions between the user, the shopping
platform, and any external payment services. Create a
sequence diagram illustrating the steps involved in the
checkout process, including selecting items, providing
shipping information, processing payment, and confirming the
order”.
b. Discuss the steps required to initiate requirement engineering. CO R 6
2

19 a. Explain the process involved in designing the interface with a CO R 6


. neat diagram. 4
b. Discover the golden rules to be followed by the designer while CO R 6
designing the interface. 4

20 a. Write the test cases for the following registration page of a CO An 6


. web application. 3
b. Calculate the cyclomatic complexity of the following code. CO A 6
int main() 4
{
float n1, n2, n3;
cout << "Enter three numbers: ";
cin >> n1 >> n2 >> n3;
if(n1 >= n2 && n1 >= n3)
cout << "Largest number: " << n1;
if(n2 >= n1 && n2 >= n3)
cout << "Largest number: " << n2;
if(n3 >= n1 && n3 >= n2)
cout << "Largest number: " << n3;
return 0;
}

21 a. Describe about six-sigma standard to imply extremely high CO R 6


. quality in an organization. 5
b. Articulate the steps which are required to perform statistical CO R 6
SQA. 5

22 a. Summarize different kind of architectural styles exist in a CO R 12


. software and explain in detail. 3

23 a. Develop a use case diagram and activity diagram for a social CO A 12


. media platform that enables users to create profiles, connect 1
with friends, share posts, and interact with content. The
system should support various actors, including Users,
Administrators, and Content Moderators. Key functionalities
to be represented in the use case diagram include User
Registration, Login, Profile Management, Friend Request
Handling, Posting Content, Commenting, Liking, Reporting
Inappropriate Content, and Admin Dashboard for Content
Moderation. Ensure to include appropriate relationships
between actors and use cases, such as associations and
generalizations, to depict the interactions and dependencies
accurately.
COMPULSORY QUESTION
24 a. Describe COCOMO model and its benefits towards software CO R 6
. project estimation and management. 6
b. Consider a project was estimated to be 700 KLOC. Calculate CO A 6
effort & time for each of 3 modes of development as per the 6
COCOMO model.
Software Product
a b c d
Type
Organic 2.4 1.05 2.5 0.38
Semi detached 3 1.12 2.5 0.35
Embedded 3.6 1.2 2.5 0.32

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
Discover an effective software engineering process to develop software-intensive
CO1
systems.
CO2 Translate the requirements specification into an implementable design.
CO3 Construct UML diagrams along with design strategies and design patterns.
CO4 Analyze architectural design methods.
CO5 Evaluate the system using various testing strategies.
CO6 Develop the software system with quality measures.

Assessment Pattern as per Bloom’s Taxonomy


CO / R U A An E C Total
BL
CO1 5 - 12 12 - - 29
CO2 6 - - 3 9
CO3 15 8 - 6 - - 29
CO4 13 3 6 - 22
CO5 16 - - - - - 16
CO6 11 1 7 - - - 19
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2051 Duration 3hrs


Course Name SPRING FRAMEWORK Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
Name the dependency used to create view binding template in spring CO
R 1
1. application. 2
Identify the required spring annotation to process the HTTP delete CO
R 1
2. request. 1
CO
Discover the use of the RepresentationModel class in HATEOAS. U 1
3. 1
CO
Label the annotation used for creating controller class with REST API. R 1
4. 3
Express the reactive data type for the stream that can emit 0 or 1 data CO
U 1
5. item. 4
CO
List the four building blocks of reactive programming. R 1
6. 4
7. State the library name that controls the interaction between CO
R 1
microservices to provide latency and fault tolerance. 2
8. Identify the name of the secret management tool for keeping CO
R 1
configuration properties secure. 6
CO
Define the use of ‘/health’ in spring application devleopment. U 1
9. 6
10 CO
State the expansion of DAO in spring framework. R 1
. 4
PART – B (6 X 3 = 18 MARKS)
11 Indicate the appropriate controller class code to read the value from CO U 3
. HTML form given below and display the same. 3
<form action= “/save” method=”post”>
<input type=“text” name=“data”>
<input type=“submit” value=“save”>
</form>
12 CO
Describe any three additional components of spring integration. R 3
. 4
13 Illustrate filter() and map() methods of Flux reactive data type with CO
U 3
. suitable program. 5
14 CO
Describe about encrypting properties in Git. R 3
. 6
15 List any five Actuator end points to monitor the running spring CO
R 3
. application. 1
16 Discuss any three methods of JdbcTemplate for interacting with CO
U 3
. database. 2
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Illustrate simple spring MVC application to demonstrate the CO U 6
. . following components. 1
 Model
 Controller
 View
b Discuss the spring security mechanism for authentication and CO U 6
. authorization using In-memory user store. 4

18 a Develop the appropriate programs to consume the following Rest CO A 6


. . API services using RestTemplate 1
 http://localhost:8000/getMovieInfo/234
 http://localhost:8000/addNewMovie
b Explain the working principle of HATEOAS with necessary CO U 6
. example programs. 2

19 Illustrate the appropriate programs to consume the following CO A 1


. Reactive Rest API services using WebClient for the Employee 5 2
details.
 http://localhost:8000/saveNewEmployee
 http://localhost:8000/deleteEmployee/245
 http://localhost:8000/findEmployee/245
 http://localhost:8000/viewAllEmployees

20 Develop a spring Reactive Rest API programs to perform the CO A 1


. following database tasks for the book information such as title, 5 2
author and price.
 Save New Book Details
 Update the existing Book details.
 Display all the Book Details

21 Prepare spring application programs to perform the following CO A 1


. operations in mongodb database with rest controller services. 3 2
 Save new student details such as regno, name, cgpa
 Display all student details.

22 a Develop spring integration flow program for polling all the files CO A 6
. . from the directory “D:/songs” to another directory called 4
“E:/documents”.
b Illustrate the creating microservices and consuming microservices CO U 6
. with suitable example programs. 2

23 a Describe the process of handling failure and latency in spring CO R 6


. . framework. 6
b Illustrate the message communication between producer service and CO A 6
. consumer service using JmsTemplate. 2
COMPULSORY QUESTION
24 a Write a spring application program using JdbcTemplate to perform CO A 1
. . the following database operations with Rest Controller methods 3 2
 Save new Employee details such as name, empid, and
salary in database table “employees”
 Display all the Employee details
 Update the salary of particular employee
 Delete the employee details by empid

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO identify the variety of ancillary members of the spring ecosystem
1
CO describe the usage of dependency Injection, microservices in Spring framework
2
CO translate the user requirements into enterprise quality web application using Spring MVC
3
CO extend the requirements such as security, AOP, transaction to the Spring applications
4
CO practice to build RESTful services to the application
5
CO prepare and manage configurations for cloud based application.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 4 7 6 - - - 17
CO2 2 15 6 - - - 23
CO3 1 3 24 - - - 28
CO4 5 7 6 - - - 18
CO5 - 3 24 - - - 27
CO6 10 1 - - - - 11
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2052 Duration 3hrs


Course Name SYSTEM ADMINISTRATION Max. Marks 100

Q.
No Questions CO BL Marks
.
PART – A (10 X 1 = 10 MARKS)
CO U 1
1. Write a Linux command to count the number of lines in file. 1
CO R 1
2. List the types of interfaces in YAST. 1
CO R 1
3. Mention the configuration file of SSH Server. 2
Give a Linux command to connect to server2 from server1 using CO U 1
4. vncviewer. 2
State the Linux command to view all the process in process CO R 1
5. management. 3
CO R 1
6. List the two basic classes of ACLs in Linux security. 3
7. Recall the RPM utility that handles installation and CO R 1
uninstallation of RPM packages. 4
Mention the syntax for Bridge configuration in Network CO R 1
8. Management. 4
CO R 1
9. Mention the tools to configure MBR and GPT. 5
10 Give the Linux command to check the status of chronyd service CO U 1
. in Linux administration and monitoring. 6
PART – B (6 X 3 = 18 MARKS)
11 List the 7 different types of files in linux. CO R 3
. 1
12 Cite the Linux command to generate an encrypted to be used for CO U 3
. GRUB. 2
13 State the Linux command to create a directory named Private CO U 3
. and change the permissions on created directory so that only 3
root has read, write, and execute permissions.
14 Define Software Repository in software management. CO R 3
. 4
15 State the Linux command to create an extended partition and CO U 3
. create a logical partition within the free space in the extended 5
partition.
16 Describe the meaning of the below Linux commands. CO U 3
. ‒ tail -n X 6
‒ tail -f
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No 17 to 23, Q.No 24 is Compulsory)
17 a Differentiate sockets and pipes from Linux file types and CO R 6
. . visualize the diagrammatic representation of Linux file 1
System Structure.
b Outline SSH v2 Connection Process using appropriate CO R 6
. figure. 1

18 a Illustrate the ways in which you can configure VNC for CO U 6


. . remote administration. 2
b Assume that you are working as a system administrator. CO U 6
. Your company asked you to secure the Linux web-server’s 2
grub using a password. Illustrate the steps using relevant
Linux commands.

19 a Assume you are working as a system administrator in a CO U 7


. . company and the work assigned to you is to manage the 3
process running in background and foreground. There you
are asked to create three processes of your choice and
manage the process by these following operations
i) View
ii) Hungup
iii) Terminate
iv) Kill
And set the third process with the highest priority. Help your
company with the above-mentioned configurations.

b List the query options for RPM database with their CO R 5


. description. 3

20 a Apply the Linux commands to perform the following CO A 7


. . operations using Zypper for software management. 4
a) Remove repository from the list
b) Modify existing repository
c) Add a new repository
d) List software repository
e) List and search
f) Display package information
b Discuss about the following Network configuration files CO U 5
. along with its syntax 4
i) Address Configuration
ii) Route Configuration
iii) Link Configuration
iv) Ethernet Configuration
21 a Apply the required Linux commands and to perform the CO A 6
. . following operations. 5
a) Create a btrfs subvolume.
b) View btrfs subvolumes.
c) Create btrfs subvolume snapshots.
d) To reduce the size of the file system by 2 GB.
e) Command to view the uuid.
f) To View the existing partitions.
b Apply the Linux command to configure the software RAID. CO A 6
. 5

22 a Analyze the steps to configure Logical Volume Management CO An 6


. . (LVM). 5
b List all the traditional Linux File Systems and describe about CO U 6
. its health tools. 5

23 a Explain the Polkit policy and illustrate its functionality with CO U 7


. . neat diagram. 3
b Apply the required Linux commands to perform the CO A 5
. following storage management operations to install RPM 3
packages
i) check dependencies of RPM Package before
installing
ii) List all installed RPM packages
iii) List Recently Installed RPM Packages
iv) Upgrade a RPM Package
v) Remove a RPM Package.
COMPULSORY QUESTION
24 a Describe chrony and represent the ways to configure it. CO U 7
. . 6
b Analyze the steps to configure the NTP Service using yast CO An 5
. and provide Linux commands to ensure that configured NTP 6
service is Loaded and Running in command line tool.

COURSE OUTCOMES
CO1 Identify the application of Linux commands and Linux flavours
CO2 Use remote administration and secure system bootup process
CO3 Managing Process, Identity and Security
CO4 Managing Software packages
CO5 Create and Manage storage devices
CO6 Create policies to monitor and perform installation

Assessment Pattern as per Bloom’s Level


CO / Remember Understand Apply Analyze Evaluate Create Total
BL
CO1 17 1 - - - - 17
CO2 1 16 - - - 17
CO3 7 17 5 - - - 29
CO4 5 5 7 - - - 17
CO5 1 9 12 6 - - 28
CO6 - 11 - 5 - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Course Code 20CS2053 Duration 3hrs
Course Name SYSTEM SOFTWARE AND COMPILER DESIGN Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. Define compiler. CO1 R 1
2. Differentiate between macro definition and macro expansion. CO1 U 1
3. State the definition of the term lexemes. CO2 R 1
4. List the functions of lexical analysis. CO2 R 1
5. Sketch the parse tree for the production F  E a + T. CO3 A 1
6. State a conflict which is possible in a shift-reduce parser. CO3 R 1
7. Differentiate S-attributed definition from L-attributed definition. CO4 U 1
8. Define synthesized attributes. CO4 R 1
9. Rewrite the following three-address code in static single-assignment form: CO5 U 1
a=b+c
a=a+d
10. Identify a possible optimization for computing x2. CO6 U 1
PART – B (6 X 3 = 18 MARKS)
11. Describe the role of an Assembler. CO1 R 3
12. Write short notes on Input Buffering. CO3 A 3
13. Describe the panic mode error recovery method used in the syntax analysis CO3 R 3
phase.
14. Sketch a parse tree with actions embedded for the expression 3 + 8 * 4 using the CO4 A 3
syntax-directed translation:
E { print(‘+’); } E 1 + T
E T
T { print(‘*’); } T 1 * F
T F
F digit { print(digit.lexval); }
15. Translate the following code snippet to three address code: CO5 U 3
do i = i + 1; while (a[i] < v);
16. Give an example of dead-code elimination to optimize a code. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Describe the basic functions of Linker and Loader. CO1 U 6
b. Explain the role of the Bootstrap loader with the algorithm. CO2 U 6

18. Illustrate the various phases of a compiler. Trace the output of each phase CO3 A 12
for the program segment a: = b + c * 60. Assume that the identifiers a, b,
and c are of type float.

19. Construct an SLR Parsing table for the following grammar: CO6 A 12
EE+T|T
TTF|F
FF*|a|b

20. a. Summarize with relevant examples the bottom-up evaluation of the S- CO5 U 6
attributed definition for evaluating an arithmetic expression.
b. Explain the working principle of a simple type checker. CO5 U 6

21. a. Enumerate the common three-address instruction forms. CO4 R 6


b. Describe the representations of three address code. CO4 U 6

22. Construct a predictive parsing table for the following grammar. Verify CO5 A 12
whether the input string ( id + id ) * id is accepted or not.
E  TE’
E’  + T E | €
T  F T’
T’  * F T’ | €
F  ( E ) | id

23. a. Write a YACC program for evaluating a Boolean expression, which is CO4 A 6
represented by the following grammar.
E T | T or E
T F | F and T
F true | false | not F | (E)
b. Construct the semantic rules to generate three-address code for Booleans CO5 A 6
represented by the following grammar:
B B||B
B B && B
B !B
B E relop E
B true
B false
COMPULSORY QUESTION
24. a. Describe the issues in code generation. CO6 R 6
b. Illustrate the following ways for code optimization: CO6 A 6
● Copy propagation
● Common subexpression elimination
● Constant folding
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO1 Explain the algorithm and data structures for the assembler
CO2 Develop algorithms for macros and loaders
CO3 List and define various stages of the compiler.
CO4 Select and use standard tools and techniques in different stages of compiler design
CO5 Compare and contrast various methods for implementing the phases of a compiler
CO6 Design and construct different phases of the compiler

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 4 7 - - - - 11
CO2 2 6 - - - - 8
CO3 4 - 16 - - - 20
CO4 7 7 9 - - - 23
CO5 - 16 18 - - - 34
CO6 6 4 18 - - - 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2054 Duration 3hrs


Course Name THEORY OF COMPUTATION Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Differentiate an acceptor and a transducer. CO1 U 1
2. Name the machine that accepts Context Free Language. CO1 R 1
State whether the following statement is true or false:
3. “A DFA can have several accepting states.” CO2 R 1

Rewrite the given grammar by eliminating ε – production.


4. S→aaS |aS | ε CO2 U 1
A→ bA | ε

5. Define ambiguous grammar. CO3 R 1


Show that a CFG over a,b generates a language with an equal amount of a's
6. and b's. CO3 U 1

7. State the properties of context-sensitive grammars. CO4 R 1


8. Give an example of a Turing Machine. CO5 U 1
9. Identify the language recognized by the linear bounded automata. CO5 U 1
Compare Finite Automata, Pushdown Automata and Turing Machines.
10. Which one is more efficient? CO6 U 1

PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Show that the following grammar accepts the language and regular
expression representing the strings.
S → Aab CO1 U 3
A → Aab | a
12. Construct DFA for the language L = { ab3wb2 : w ɛ {a, b}*} CO2 A 3
13. Show that the following grammar is ambiguous.
S → SS | aSb | bSa | λ CO2 U 3

14. Convert the given context-free grammar into pushdown automata. CO3 U 3
S → aSbb | aab
15. Show that the family of recursive languages is closed under union. CO4 U 3
16. Define Universal Turing Machine. CO5 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Construct Non-Deterministic Finite Automata using Thompson’s CO2 A 6
construction for the regular expression (pq)*p(p|q).
b. Develop a Deterministic Finite Automata equivalent to the given Non- CO2 A 6
Deterministic Finite Automata.

18. a. Convert the given finite automata to its equivalent regular expression. CO2 U 6

b. Explain the method of minimizing the Deterministic Finite Automata CO2 U 6


(DFA) and sketch the minimized DFA.

19. a. Determine the right quotient for the languages listed below. CO2 A 6
L1=L(a*baa*)
L2=L(ab*)
b. Apply the pumping lemma to determine whether the language is CO2 A 6
regular.
L1 =(anbn:n≥1}

20. a. Convert the grammar G = ({S, A, B, C}, {a, b}, S, P) with P defined CO3 U 6
given as
S → ABC | BaB
A → aA | BaC | aaa
B → bBb | A | D
C → CA | AC
D→λ
into Chomsky and Greibach Normal Forms.
b. Apply the CYK algorithm and find whether “cbba“ is a member of the CO3 A 6
language represented by the grammar:
S → AB
A → CC | a | c
B → BC | b
C → CB | BA | c

21. a. Construct PDA to accept the language: CO3 A 6


L = { 0n1m2m3n : n ≥ 0; m ≥ 1}
b. Convert the given pushdown automata (PDA) to equivalent context- CO3 U 6
free grammar (CFG).
δ(p, 0, z) = (p, Az)
δ(p, 0, A) = (p, AA)
δ(p, 1, A) = (q, ε)
δ(q, 1, A) = (q, ε)

22. a. Construct Linear Bounded Automata to recognize the language. CO4 A 6


L = {w: wcwr: w ε {a,b}*}.
b. Explain the closure properties of Context-Free Language. CO4 U 6

23. a.Construct a Turing Machine to recognize the language. CO5 A 6


L = {anbncn: n≥ 1}
b. Explain the Turing Machine as an enumerator. CO5 U 6
COMPULSORY QUESTION
24. a. Explain the diagonalization of languages. CO6 U 10
b. Describe Rice Theorem. CO6 U 2
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 understand the concept of languages, basics of grammars and the hierarchy of languages
CO2 construct and compare deterministic and non-deterministic finite automata
CO3 develop push down automata from a given context free language or context free grammar
CO4 recognize context sensitive grammars
CO5 design turing machine for recursively enumerable language
CO6 compare computability & non-computability and decidability & un-decidability

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 1 4 - - - - 5
CO2 1 16 27 - - - 44
CO3 1 16 12 - - - 29
CO4 1 9 6 - - - 16
CO5 3 8 6 - - - 17
CO6 - 13 - - - - 13
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2056 Duration 3hrs


Course Name WEB TECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Give an example HTML code to create a hyperlink in a webpage. U 1
2
Identify the CSS property to adjust the space between the border and CO
2. R 1
the content of HTML elements. 6
Identify the JavaScript event triggered when the HTML button is CO
3. R 1
pressed. 1
CO
4. State the jQuery effect to switch between fade-in and fade-out. R 1
1
Express the syntax to create a JSON object with name, age, and CO
5. U 1
designation. 1
CO
6. State the function to convert JSON string to a JavaScript object. R 1
1
CO
7. Differentiate between $pristine and $dirty in AngularJS. U 1
5
Describe the AngularJS code to display the value of num inside the
CO
8. following <DIV> element. U 1
5
<div ng-init = 'num=10'></div>
CO
9. Recall the module used to create server function in NodeJS program. R 1
3
10 State the shell method used to create data collection in MongoDB CO
R 1
. Server. 4
PART – B (6 X 3 = 18 MARKS)
11 CO
Describe any three HTML multimedia elements with their syntax. U 3
. 2
12 Write a CSS code to change the background color and text color of the CO
A 3
. <DIV> element when the user moves the cursor over that division. 6
13 Illustrate the three types of JavaScript popup boxes with suitable CO
U 3
. examples. 1
14 CO
Describe the various JSON data types with examples. U 3
. 1
15 Write the appropriate AngularJS filter code to display the following CO A 3
values in a HTML view.
. 5
a) Date: 12/04/2023 b) Price: ₹1,000 c) Name: ALICE
16 Write a NodeJS code snippet to read and display the text file contents CO
A 3
. in a terminal. 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Develop the following HTML form layout with necessary CO A 1
. . attributes. 2 2
 Make all fields as mandatory
 Include necessary placeholders
 Age field should be in the range of 18-25
 Mobile number should be in 10-digits

18 a Write a code to design a navigation bar using HTML list element CO A 6


. . with CSS as given below. 6

b CO U 6
. Explain any six CSS selectors with suitable program illustrations. 6

19 a Explain the various JavaScript document object model methods CO U 6


. . used for accessing the HTML elements with example programs. 1
b Prepare a JSON object to store the following details and convert as CO A 6
. a JavaScript object. Finally, display the data in HTML table format. 1
20 a Develop a single page application with the following HTML pages. CO A 6
. . a. Main HTML webpage with AngularJS routing 5
b. Hyper Links
 Personal Details
 Academic Details
 Internship Details
b Describe the following directives in AngularJS with suitable code CO U 6
. snippet. 5
i) ng-app ii) ng-model iii) ng-init iv) ng-bind v) ng-controller vi)
ng-click

21 a Write a NodeJS server application program using NodeJS HTTP CO A 1


. . module to design the following HTML form to demonstrate 3 2
payment transaction (payment.html) and display the same when the
form is submitted via the POST method.
URL: http://localhost:2000/

When Transfer button is clicked, the URL changed to:


http://localhost:2000/payment and display the submitted details as,
The
Transaction
Details are:
Car
Number:

22 a Develop a calculator using HTML and JavaScript as given below. CO A 1


. . The result should be changed whenever the user clicks the 1 2
corresponding action button.
23 a Describe the following jQuery effects in a HTML webpage with CO U 6
. . suitable examples. 1
◦ Hiding and showing effects
◦ Fading effects
◦ Sliding effects
◦ Animation effects
b Explain the following lists with suitable HTML program. CO U 6
.  Ordered List 2
 Unordered List
 Definition List
COMPULSORY QUESTION
24 a Illustrate the following MongoDB shell operations to manage the CO A 1
. . employee information such as name, empid, gender, email, phone, 4 2
experience.
i) Create a database ‘company’
ii) Create a collection ‘employee’
iii) Insert information for 5 employees
iv) Search a particular employee data using empid
v) Change the phone of a particular employee
vi) Delete a particular employee data
vii) Display all employee details whose experience is greater than
4.5 years

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO identify the relevant properties and methods to facilitate dynamic web application development.
1
CO explain the development of fully functional web applications that incorporates front-end and back-
2 end design technologies
CO apply client and server side technologies for creating interactive data driven websites.
3
CO model dynamic web applications using suitable server-side technologies integrated with the
4 database.
CO develop extensible web applications using the Model View Controller (MVC) framework.
5
CO apply web development framework for designing attractive web pages along with dynamic and
6 flexible schema

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 3 19 18 - - - 40
CO2 - 10 12 - - - 22
CO3 1 - 15 - - - 16
CO4 1 - 12 - - - 13
CO5 - 8 9 - - - 17
CO6 1 6 9 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2057 Duration 3hrs


Course Name FUNDAMENTALS OF WEB DESIGN Max. Marks 100

Q. B
Questions CO M
No. L
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Recall the use of <!DOCTYPE html> tag. CO1 R 1
2. Identify the HTML tag used for rendering the text in italics. CO1 R 1
3. Label the term HTTP. CO2 R 1
4. Indicate any one example of a static web application. CO2 U 1
5. Define padding in CSS. CO3 R 1
6. Name the hexadecimal code for the color yellow in CSS. CO3 R 1
7. Recall the developers of Bootstrap. CO4 R 1
8. Label the term XSS. CO5 R 1
9. Define cookies. CO6 R 1
Indicate the well-known server-side scripting language used for
10. CO6 U 1
web development.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. State the uses of <p>, <h>, and <li> tags in HTML. CO1 R 3
12. Indicate the three headers of the HTTP request. CO2 U 3
13. Differentiate the linear and radial gradient in CSS. CO3 U 3
14. Explain the four classes of the bootstrap grid system. CO4 U 3
15. Discuss the use of JavaScript events with an example. CO5 U 3
16. Represent the uses of functions in PHP with an example. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
a Write an HTML code to showcase a table listing six CO1 A 6
17.
. vegetables and their benefits.
Write an HTML code titled "WEBSITES" with the header CO1 A 6
"Clickable Links". Include three clickable links that open in
b new tabs:
. i. "NASA Website"
ii. "Eduserve Website"
iii. "ChatGPT Website"

a Show the five primary functions of web clients. CO2 U 5


18.
.
Classify the various HTTP methods based on their distinct CO2 A 7
b
purposes and functionalities. Provide a brief explanation of n
.
each method's role in client-server communication.

19. a Write an HTML code that displays formulas for calculating CO3 A 8
. the volume of the cube, volume of the cylinder, perimeter of a
rectangle, and surface area of the square, along with the CSS
styling to enhance text clarity and readability.
b Illustrate the four components of the box model in CSS with CO3 U 4
. examples.

20. a Explain the following bootstrap styles with an example. CO4 U 6


. i. <mark>
ii. <abbr>
iii. <blockquote>
iv. <dl>
v. <kbd>
vi. <code>
b Classify six different bootstrap button styles and provide an CO4 A 6
. explanation of each with an example. n

21. a Imagine you are assigned the task of troubleshooting a CO5 A 8


. JavaScript code that is encountering errors during execution. n
Classify the list of the errors you come across and explain the
consequence of each error in terms of the code's functionality.
b Construct a JavaScript code for handling a division by zero CO5 A 4
. error.

22. a Illustrate the decision and control flow statements in PHP CO6 U 7
. with examples.
b Summarize the form validation, and handling in PHP with an CO6 U 5
. example.

23. a Discuss the concept of SEO (Search Engine Optimization) CO2 U 6


. and list out six key advantages it offers for businesses and
website owners in improving their online presence.
b CO3 U 6
. Explain any six CSS selectors with examples.
COMPULSORY QUESTION
24. a Imagine you are building a profile page on a website. The CO1 A 7
. page includes a list to present information about a person's
school, awards, hobbies, and family details. Explain how you
would set up the code (HTML) and make it look nice (CSS)
to create a good website.
b CO2 U 5
. Describe the five different headers of HTTP response from
the given figure.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Select appropriate design standards for designing attractive web pages.
CO2 Identify latest client and server-side technologies for creating interactive data driven websites.
CO3 apply properties and methods to facilitate dynamic application development
CO4 create fully functional web applications that incorporates planning, designing, coding, testing,
and publishing to a web server.
CO5 formulate the requirements for web page design
CO6 build extensible responsive featured web applications

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 5 - 19 - - - 24
CO2 1 20 - 7 - - 28
CO3 2 13 8 - - - 23
CO4 1 9 - 6 - - 16
CO5 1 3 4 8 - - 16
CO6 1 16 - - - - 17
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 20CS2058 Duration 3hrs


BASICS OF DATA ANALYTICS - R PROGRAMMING AND
Course Name Max. Marks 100
TABLEAU

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define variable. CO1 R 1
2. State the use of read.csv(). CO1 R 1
Identify the output of the following R code snippet. CO2 U 1
3.
near(1 / 49 * 49, 1)
Predict the output of the following R code snippet. CO2 U 1
4.
y <- seq(1, 10, length.out = 4)
5. Define recursion. CO3 R 1
6. List any two limitations of using pipe. CO3 R 1
7. Differentiate between atomic vector and list. CO4 U 1
State the output of the following R code snippet. CO4 R 1
models<-tibble(
8. a1=runif(4,30,40),
a2=runif(4,40,50)
)
9. List the usage of flexdashboard. CO5 R 1
Identify an example of data visualization in a Course Metrics CO6 U 1
10.
Dashboard created using Tableau.
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. List any three advantages of data visualization. CO1 R 3
Predict the output of the following R code snippet. CO2 U 3
NA + 10
12.
NA > 5
10 == NA
Identify the output of the following R code snippet. CO3 U 3
print(seq(22,32))
13.
print(mean(25:56))
print(sum(1:5))
Identify the output of the following R code snippet. CO4 U 3
v1<-c(1,2,3)
v2<-c(2,1,2)
14.
map2_dbl(v1,v2,min)
map2_dbl(v1,v2,max)
map2_dbl(v1,v2,mean)
15. Differentiate between axes and legends in graphics of R CO5 U 3
programming.
Compare and contrast traditional spreadsheet based data CO6 U 3
16. reporting with Tableau's data visualization approach in terms
of data interpretation.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a. Write the R code for the following plots using the CO1 A 6
dataset given below.
Book_no Book_Name No_Of_Copies
1 R Program 10
2 Web Technology 12
3 Strength of Materials 8
4 CAD 10
5 Thermodynamics 25
6 Heat Transfer 30
7 Machine Design 25
8 Engineering Metallurgy 21
9 Numerical Analysis 28
10 Automotive Systems 30
a).

b).

b. Explain exploratory data analysis with an example. CO1 U 6


18. a. Write the R code to reverse a number and also calculate CO2 A 6
the sum of digits of that number.
b. Write the R code to check whether the given number is CO2 A 6
Armstrong or not.

19. a. Explain the following methods of string with an CO3 U 6


example.
i) str_length()
ii)str_c()
iii)str_to_upper()
b. Explain the following methods of tidy data with an CO3 U 6
example.
i) separate()
ii) unite()

20. a. Explain the left_join, right_join, full_join and filtering CO4 U 12


join methods in the context of mutating joins in R.

21. a. Write the R code for the following plots using the CO5 A 6
dataset given below.
x y
10 14.2
10 17.511
20 18.989
20 20.24
30 18.356
30 20.51
40 22.43
40 31.89
50 29.13
50 21.74

a).

b).
b. Explain the legend layout of graphics for CO5 U 6
communication with an example.

22. a. Explain iteration in R programming with suitable CO2 U 6


examples.
b. Write the R code to find the factorial of a number using CO3 A 6
recursion.

23. a. Explain aggregation function of vector with suitable CO4 U 6


examples.
b. Describe the advantages and limitations of using CO6 R 6
Tableau for data visualization in educational settings.
COMPULSORY QUESTION
24. a. Explain the role of data visualization in improving CO6 U 12
educational outcomes and elaborate on how Tableau
can be used to create a dynamic Course Metrics
Dashboard.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 apply the principles of data Wrangling to transform the datasets into a form convenient
for analysis.
CO2 demonstrate powerful R tools for solving data problems with greater clarity and ease.
CO3 perform data exploration, generate hypotheses, and quickly test them.
CO4 provide a low-dimensional summary that captures true signals in your dataset.
CO5 develop visualizations to communicate results using R Markdown.
CO6 communicate the data analytics summary using tableau dashboards.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 5 6 6 - - - 17
CO2 - 11 12 - - - 23
CO3 2 15 6 - - - 23
CO4 1 22 - - - - 23
CO5 1 9 6 - - - 16
CO6 7 3 12 - - - 22
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS2007 Duration 3hrs


ARTIFICIAL INTELLIGENCE: PRINCIPLES AND
Course Name Max. Marks 100
TECHNIQUES

Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Give an example for irrecoverable problem. CO U 1
1
2. Identify the component through which the agent can perceive through CO R 1
the environment. 1
3. CO R 1
Informed search is also known as _____________ 2
4. CO R 1
Recall the structure of AI agent. 2
5. Analyze the given sentence into wff’s in predicate logic. CO A 1
Some children like to play 3
6. Describe any two problems of indexing. CO R 1
3
7. Solve the given fact into predicate logic. CO A 1
All Pompeians died when the volcano erupted in 78 A.D. 4
8. Give the time complexity of Breadth First Search if b represents CO U 1
branching factor and d represents the depth of shallowest goal state. 4
9. CO U 1
Enumerate default logic in non-monotonic reasoning 5
10 Apply conceptual dependency to represent the given statement. CO U 1
. John pushed the cart. 6
PART – B (6 X 3 = 18 MARKS)
11 Write a short note on application of AI in computer vision. CO
. 1 U 3
12 Differentiate informed and uninformed search strategies. CO
. 2 U 3
13 Briefly describe the simple relational knowledge representation CO
. technique. 3 R 3
14 CO
. Describe the types of uncertainties in knowledge representation. 4 R 3
15 Construct the frame for the knowledge “Artificial Intelligence”. CO
. 5 U 3
16 CO
. Describe learning by parameter adjustment in learning process. 6 R 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the following Agents. CO U 6
. .  Simple Reflex Agents 1
 Model-Based Reflex Agents
 Goal-Based Agent
 Learning Agent
b Describe the steps performed by a problem-solving agent with CO R 6
. examples. 1

18 a Discuss the progress of the Map Coloring problem using a CO A 4


. . backtracking search in Constraint Satisfaction Problem (CSP). 2
b Apply DFS on the given problem to reach the goal node “ J” from CO A 8
. the initial node “A”. 2

19 Change the below sentences as well formulated formulas (wffs) in CO A 1


. predicate logic and solve the question “John likes peanuts” using 3 n 2
resolution technique.
 John likes all kinds of food.
 Apple and vegetable are food.
 Anything anyone eats and not killed is food.
 Anil eats peanuts and is still alive.
 Harry eats everything that Anil eats

20 a Describe the role of certainty factor in handling uncertainty in the CO U 6


. . system. 4
b Compare declarative knowledge and procedural knowledge with CO R 6
. examples. 4

21 a Consider the following block world problem and apply goal stack CO A 6
. . planning to reach the goal state from initial state. 5
b Discuss the importance of the Bayesian network in handling CO U 6
. uncertainty in the system. 4

22 a Construct a semantic network that represents the data given below: CO A 6


. . 5
 Mammals have fur.
 All mammals are animals.
 A bird is an animal.
 A cat is a mammal.
 Tom is a cat.
 Tom is owned by John.
 Tom is ginger in color.
 Tom caught a bird.
 Cats like cream.
 The cat sat on the mat
b Describe the need for a hierarchical planning system in planning. CO U 6
. 5

23 a Compare and contrast expert systems and neural networks in terms CO A 6


. . of knowledge representation, knowledge acquisition, and 6
explanation.
b Describe the working of explanation-based learning with its CO R 6
. components. 6
COMPULSORY QUESTION

24 Describe the two important approaches to machine learning within CO R 1


. formal learning theory with necessary diagrams. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO describe the basics of Artificial Intelligence.
1
CO identify the appropriate search algorithms for any AI problem
2
CO prepare appropriate knowledge-based rules to identify causal relationships and conditional
3 independence of a real-world situation.
CO select the appropriate search method for identifying different search spaces.
4
CO evaluate the working knowledge of reasoning in the presence of incomplete and/or uncertain
5 information.
CO produce the learning theory for expert systems
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 7 10 17
CO2 2 3 12 17
CO3 4 1 12 17
CO4 9 16 1 23
CO5 10 12 22
CO6 18 1 9 28
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS2008 Duration 3hrs


Course Name ARTIFICIAL INTELLIGENCE FOR GAMES Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
List a few games which do not have any strategy and are CO
1. U 1
purely reactive. 1
CO
2. R 1
Define Artificial Intelligence. 1
CO
3. R 1
State the usage of angular velocity. 2
CO
4. U 1
Differentiate between pursue and evade steering behaviors. 2
Identify the significance of the connections in the movement CO
5. U 1
planning graph. 3
CO
6. R 1
Define the heuristic function used in the A* algorithm 3
Express the meaning of the term insistence in goal-oriented CO
7. U 1
behavior. 4
Define the terms ‘State’ and ‘Reward’ in reinforcement CO
8. R 1
learning 4
Give an example of a zero-sum game. CO
9. U 1
5
Identify the key AI requirements for real-time strategy games. CO
10. U 1
6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Indicate the speed and memory constraints faced by AI game CO
11. U 3
developers. 1
CO
12. Define the jumping points in the movement algorithms. U 3
2
CO
13. Show the velocity diagram for the allowed animations. R 3
3
List the two main components in the structure of the rule- CO
14. U 3
based system. 4
CO
15. Express the concept of the transposition table in board games. U 3
5
Show the finite state machine for a simple sheep-like creature CO
16. R 3
in flocking and herding games. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
CO U 8
17. a. Discuss the structure of the AI Engine in detail.
1
State the benefit of AI in Games. How AI is used in CO R 4
b.
Games? 1
18. Define kinematic movements. Explain the kinematic CO U 12
movement algorithms with appropriate pseudocode for 2
the following movements in games:
a) Seek b)Flee c) Arrive d) Wander
19. a. Apply Dijkstra’s algorithm to the following directed CO A 6
weighted graph and find the shortest path between A 3
and F. Provide all the intermediate steps to arrive at the
solution.

b. Compare the Dijkstra’s, A*, and Hierarchical path CO An 6


finding algorithms. 3
20. Illustrate the ID3 algorithm and derive a decision tree CO A 12
for the given training data. 4

Day Outlook Temp. Humidity Wind Play


Tennis

D1 Sunny Hot High Weak No

D2 Sunny Hot High Strong No

D3 Overcast Hot High Weak Yes

D4 Rain Mild High Weak Yes

D5 Rain Cool Normal Weak Yes

D6 Rain Cool Normal Strong No

D7 Overcast Cool Normal Weak Yes

D8 Sunny Mild High Weak No

D9 Sunny Cool Normal Weak Yes

D10 Rain Mild Normal Strong Yes

D11 Sunny Mild Normal Strong Yes

D12 Overcast Mild High Strong Yes


D13 Overcast Hot Normal Weak Yes

D14 Rain Mild High Strong No

21. a. Explain the min-max algorithm in detail. CO U 6


5
b. Discuss the alpha-beta pruning to improve the CO U 6
performance of the minimax algorithm with a suitable 5
illustration.
22. a. Illustrate the generation of the graph in an artificial CO U 8
intelligence-based police car pathfinder. Explain the 3
four types of nodes that are generated
b. Describe Weighted Graphs and Directed Weighted CO U 4
Graphs with neat diagrams. 3
23. a. Illustrate the following steering behaviors with suitable CO An 8
examples and the pseudocode 2
 Arrive
 Align
b. CO R 4
Describe pursue and evade with a neat diagram.
2
COMPULSORY QUESTION
24. Explain the basic AI architecture suited to a first- or CO U 12
third-person shooter and discuss the most significant AI 6
needs for the shooting games

COURSE OUTCOMES
CO1 Recognize the importance of artificial intelligence in games.
CO2 Identify the different steering behaviors in movement of characters.
CO3 Choose the path finding techniques for designing games.
CO4 Illustrate decision making method for games.
CO5 Design the strategies for the games using game theory.
CO6 Select the appropriate design for artificial intelligence games genre.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 5 12 17
CO2 5 16 8 29
CO3 4 13 6 6 29
CO4 1 4 12 17
CO5 16 16
CO6 3 13 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS2014 Duration 3hrs


Course Name MLOps Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define Human Centered Reinforcement Learning. CO1 R 1
2. Define CI/CD in MLOps. CO1 R 1
3. Describe Version Control. CO2 U 1
4. List the MLOps tools for solving the business problem. CO2 R 1
5. Define precision. CO3 R 1
6. Name one deployment target for ML models. CO3 R 1
7. Identify the main purpose of Continuous Integration (CI) in MLOps. CO4 R 1
8. Describe on pipeline execution trigger. CO4 U 1
9. Define "model testing". CO5 R 1
10. Name two modes for serving machine learning models. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11. Summarize Federated Learning. CO1 U 3
12. Describe label encoding method in data preprocessing. CO2 R 3
Describe the significance of serialization in machine learning model
13. CO3 R 3
packaging.
Compare and contrast Continuous Delivery (CD) and Continuous
14. Deployment (CD) in terms of their level of automation and human CO4 E 3
intervention.
15. Explain the significance of "poisoning attacks", CO5 U 3
Define data drift and feature drift in the context of machine learning model
16. CO6 R 3
monitoring.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Apply MLOps principles to establish an automated process for the
continuous retraining and updating of the personalized
17. a. recommendation model for an e-commerce website. Develop a CO1 A 8
detailed, step-by-step approach that covers data management, model
training, deployment, and monitoring with an illustrative diagram.
Explain the advantages of using MLOps for ML solution development
b. CO1 U 4
process.

18. a. Compare waterfall model and agile model in software development. CO1 E 8
b. Identify the types of Statistical Models of Machine Learning. CO1 U 4

Illustrate the concept of a feature store in the context of machine


19. a. CO2 An 8
learning operations with a neat diagram.
State the concept of hyperparameter optimization in machine learning
b. CO2 R 4
model training with examples.
Explain the role of human versus machine tests in the evaluation of
20. a. machine learning models, particularly in the context of reaching CO3 U 4
human-level performance.
b. Compare and contrast the different deployment targets for ML models. CO3 E 8

Assume you are a data scientist working on a project where multiple


machine learning models are used. Explain how model streaming can
21. a. CO3 A 6
improve the real-time processing of data and the challenges you might
encounter when implementing this approach.
Explain the three main ways to package machine learning models.
b. Provide examples of when each method is most appropriate for CO3 U 6
deployment and highlight their key benefits

Examine the transition from a monolithic system to a microservices-


based architecture in the context of the car repair facility use case.
22. a. CO4 An 6
Include the functions of the microservices and how they enhance
reliability.
Discuss on the role of REST APIs in microservices architecture,
b. covering their role in inter-service communication, RESTful principles, CO4 U 6
and their alignment with industry standards.

In the context of machine learning, elaborate on the concept of "data


23. a. poisoning attacks." Discuss how data poisoning can compromise the CO5 U 4
integrity and reliability of machine learning models.
Machine learning models are at the core of many applications, from
recommendation systems to fraud detection. Explain the significance
of robust model testing in ensuring the performance, accuracy, and
b. CO5 An 8
reliability of these models. Discuss various types of tests used in model
testing and provide examples of how each contributes to model
evaluation.
COMPULSORY QUESTION
Explain the process of serving machine learning models to human
users, both in on-demand and batch service modes. Discuss the
24. a. CO6 A 6
advantages and disadvantages of each mode and provide real-world use
cases for each.
Explain the importance of model retraining in machine learning
operations. Provide a step-by-step process of how model retraining is
b. CO6 U 6
typically carried out, and discuss the benefits of this practice for
maintaining model performance.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the concept, workflow, and structure of MLOps
CO2 Operationalize ML models for pipeline deployment and for external business systems that are more complex and less
standardized.
CO3 Design an ML production system end-to-end: project scoping, data needs, modeling strategies, and deployment
requirements.
CO4 Establish a model baseline, address concept drift, and prototype how to develop, deploy, and continuously improve a
productionized ML application.
CO5 Build data pipelines by gathering, cleaning, and validating datasets. Establish data lifecycle by using data lineage and
provenance metadata tools.
CO6 Apply best practices and progressive delivery techniques to maintain and monitor a continuously operating production
system
Assessment Pattern as per Bloom’s Taxonomy
CO / BL R U A An E C Total
CO1 2 11 8 8 29
CO2 8 1 8 17
CO3 5 10 6 8 29
CO4 1 7 6 3 17
CO5 1 7 8 16
CO6 4 6 6 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS2017 Duration 3hrs


Course Name PATTERN MATCHING AND ANOMALY DETECTION Max. Marks 100

Q.
B
No Questions CO M
L
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. R 1
Define Discriminant Function. 1
CO
2. Define hierarchical clustering. R 1
1
CO
3. 1
Differentiate between classification and regression tasks. 1 U
CO
4. Differentiate between supervised and unsupervised learning. U 1
1
CO
5. R 1
Define Formal Grammar. 2
CO
6. R 1
Define dimensionality reduction. 1
Represent the language generated by the following CFG. CO
7. A 1
S → T U, T → 0T1 | ε, U → 1U0 | ε 2
CO
8. List the basic steps in automatic object recognition. R 1
4
CO
9. Differentiate between image processing and object recognition. U 1
4
CO
10. Define semi-supervised learning. R 1
1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. State and explain Bayes rule with suitable example. R 3
1
Discuss a procedure for graph-based clustering with a suitable CO
12. U 3
example. 1
Define stochastic grammar and give any two applications of CO
13. U 3
stochastic grammar. 2
Write the formal definition of context free grammar and illustrate
each component using an example. Develop the context free grammar CO
14. A 3
for the language L, where L contains all binary strings with an even 2
number of zeroes and an even number of ones.
Explain the role of mean shifting and mode finding methods in object CO
15. U 3
recognition. 4
16. Discuss various types of anomalies by giving suitable examples. CO R 3
5
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17. a Write pseudo-code for K-means algorithm. Discuss how to make CO A 8
. better approximations for K value and initial centroids. 3
b Examine the following flower dataset represented in a table. List CO A 4
. all the features. Identify the type of learning and explain the task 1
that can be performed on the dataset giving proper justification.

18. a CO A 5
. 1

Examine the above scatterplot of a random labelled dataset. A


decision boundary corresponding to a binary classifier is also
depicted. If a linear decision boundary is utilized in place of the
depicted boundary, explain the advantages and disadvantages with
sound reasoning.

b Explain graph based clustering and hierarchical clustering CO U 7


. techniques with suitable examples. 2

19. a Enumerate the relationship between Principal Component CO U 2


. Analysis and Singular Value Decomposition in the context of 1
dimensionality reduction.
b Write step-by-step procedure for the application of Principal CO A 1
. Component Analysis (PCA) for dimensionality reduction on a 3 0
given generic dataset consisting of ‘n’ features and ‘N’ examples.
. set of terminal symbols {t, b, u, o, s, ∗, ¬, +} where + represents
20. a Design a 2-D line drawing picture description grammar with the CO A 4

head to tail concatenation, ∗ represents head-head/tail-tail


2

attachment, and ¬ represents head to tail reversal. H represents


heads of lines and T represents the tails. Represent a cylinder and
a cone using the line drawing picture description grammar.
b Compare and contrast top-down and bottom-up parsing CO U 8
. techniques with suitable examples. 2

21. a Apply Singular Value Decomposition on matrix A, and obtain CO A 1


. 3 2 2 3 0
U∑VT form, where A=
2 3 −2

b Identify and explain the need of dimensionality reduction in CO U 2


. pattern matching. 1

22. a Explain how split and merge method can be used for object CO U 4
. detection with suitable example. 4
b Design an automatic face recognition system for the detection of CO A 8
. multiple classes of chairs from a given input image and explain 4 n
the step-by-step procedure for the object detection.

23. a Explain how one class SVM can be used for anomaly detection CO U 6
. with suitable example 6
b CO U 6
Discuss change detection and its role in the object detection.
. 6
COMPULSORY QUESTION
24. a Discuss how temporal convolutional networks can be used for CO U 6
. anomaly detection. 5
b Explain how auto encoders are used to detect anomalies in CO U 6
. general, 5
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Understand the need and significance of mathematical fundamentals in pattern matching
to solve real-time problems.
CO2 Design pattern matching models to extract interesting patterns from structured data like
graph, syntactic description.
CO3 Develop prototype pattern matching algorithms that can be used to study algorithm
behavior and performance against real-world multivariate data.
CO4 Develop an algorithm to recognize the specified objects in the given image.

CO5 Understand the various anomaly detection techniques using deep learning
CO6 Apply anomaly detection algorithms to find patterns in real world data

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 7 9 9 25
CO2 1 18 4 23
CO3 28 28
CO4 1 8 8 17
CO5 3 12 15
CO6 12 12
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS3003 Duration 3hrs


Course Name ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Identify the type of theorem from the following diagram and CO U 10
. state its consequences with proof. 1

b Differentiate Empirical risk minimization and Structural Risk CO U 10


. minimization. 1
(OR)
2. a Sketch a Decision Tree for the given data and calculate the CO A 10
. following terms. 2
i. Information gain.
ii. Entropy.
X Y Z C
1 1 1 I
1 1 0 I
0 0 1 II
1 0 0 II

b Explain the Markov Decision Process in detail. CO A 10


. 2 n
3. a Explain Best first search algorithm in detail and apply BFS to CO A 10
. reach the Goal node ‘G’ from the initial node ‘S’ 3

b List the applications of BFS and DFS in detail and suggest when CO U 10
. to use BFS and DFS. 3
(OR)
4. a Write short notes on the following Techniques. CO A 20
. i. Long Short-Term Memory. 4
ii. Time Series Forecasting

5. a CO A 20
Compare RNN, GRU and LSTM with examples.
. 5 n
(OR)
6. a Illustrate with suitable examples the different levels of NLP. CO A 10
. 5
b List and explain the challenges of Natural language Processing. CO A 10
. 5 n

7. a Calculate the Utility value for the following diagram using CO A 20


. MinMax algorithm. 6

(OR)
8. Discuss the evaluation metrics used to assess the performance of CO U 20
predictive models. Explain commonly used metrics such as 6
accuracy, precision, recall, F1 score, mean squared error (MSE),
and mean absolute error (MAE). Highlight situations when each
metric is appropriate and their interpretation.
COMPULSORY QUESTION

9. Describe the recent trends of Machine Learning and Artificial CO R 20


Intelligence in various fields. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO understand the existing machine learning techniques: it’s concepts, mathematical background,
1 applicability, limitations and toolkit used in industries
CO create AI/ML solutions for various societal problems
2
CO apply some state-of-the-art development frameworks and software libraries in machine learning task
3 realization
CO evaluate the performance of machine learning algorithms using suitable metrics.
4
CO compare the strengths and limitations of selected machine learning algorithms and where they can
5 be applied in different applications.
CO build and deploy production grade AI/ML applications
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - 20 20
CO2 - 10 10 20
CO3 10 10 20
CO4 - 20 20
CO5 - 10 30 40
CO6 20 20 20 60
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS3006 Duration 3hrs


Course Name CYBER FORENSICS Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a. Explain the four basic steps that are taken in computer forensic CO1 U 10
investigation.
b. Illustrate the characteristics of Cyberterrorism. CO1 U 6

2. a. Describe the following hacking tools: CO2 U 10


i. Port scanners
ii. Vulnerability scanners
iii. Rootkits
iv. Packet sniffers
b. Explain the different types of hackers with suitable examples. CO2 U 6

3. a. Assume that a cyber-criminal has used his android mobile device to create CO3 A 10
a deep fake videos/images and uploaded the content in a social media like
Facebook, twitter, etc. Illustrate the steps involved in Android Forensic
Setup and Pre-Data Extraction Techniques in order to examine the seized
mobile device.
b. Differentiate Screen lock bypassing techniques and rooting in android CO3 An 6
devices.

4. a. In general, forensic analysis deals with files on media, deleted files, files in CO4 A 10
folders, files in other files. The goal of media analysis is to identify, extract,
and analyze these files. You are asked to choose any one tool and report the
steps involved in media forensic analysis.
b. Discuss the investigative incident-response actions on any known cyber- CO4 U 6
crime.

5. a. Summarize the outsourcing process with explanation of the steps involved CO5 U 8
in non-disclosure agreement.
b. Appraise the following myths related to outsourcing security. CO5 An 8
i. Managed-security service-level agreements are the same
ii. Security-services-vendor credentials are not relevant
iii. Outsourcing security is a security problem

6. a. Apply the laws applicable in the “State of Tamil Nadu Vs Suhas Katti” CO6 A 10
case and the cyber laws invoked while giving the verdict.
b. Explain the legal aspects of Digital Forensics in India. CO6 An 6
7. a. Explain the methodology used in mobile forensic tool leveling system. CO4 U 10
b. Summarize the potential evidence that are stored on mobile phones. CO3 U 6
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a. A public institution was the victim of a hacker. The subject got into the CO4 An 10
network and placed several large media files on several computers and
changed the desktop configurations. Management decided against calling
law enforcement initially (because of media attention) and instructed the IT
department to get a cyber-forensic system to privately investigate. How did
the cyber forensics system go about conducting the investigation?
b. A man has been arrested by the Crime Branch of Mumbai Police for CO3 A 10
allegedly sending threatening text messages to Bollywood actress. The
accused sent four messages to the actress, threatening to kill her children if
she did not pay him, say sources. How to do mobile device forensics on this
case?

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 identify the effect of cybercrime in forensic computing
CO2 infer digital forensic evidences and investigate the contents
CO3 choose and apply current computer forensics tools.
CO4 analyze the nature of cyber terrorism and its effects
CO5 devise basic computer and network forensic analysis
CO6 summarize the technical and legal aspects related to cyber crime

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 16 16
CO2 16 16
CO3 6 20 6 32
CO4 16 10 10 36
CO5 8 8 16
CO6 10 6 16
132
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS3009 Duration 3hrs


Course Name INFORMATION SECURITY MANAGEMENT SYSTEM Max. Marks 100

Q.
B
N Questions CO M
L
o.
PART – A (5 X 16 = 80 MARKS)
(Answer any five from the following)
1. a Explain the different information security characteristics integrated CO U 1
. into the development of Smart Cities. Include key features related 1 0
to data protection, network security, privacy measures, and any
other aspects crucial for ensuring a secure and resilient information
environment in the context of Smart City development.
b Discuss about the contribution towards classification of CO U 6
. information in information security measures, and identify the 1
criteria and methodologies are commonly used to classify sensitive
data within an organization's information security framework.

2. a Discuss the CIA Triad (Confidentiality, Integrity, and Availability) CO U 1


. and its application in the client-server model. Explain the merits 2 0
and demerits of implementing the CIA Triad in this specific
computing architecture, highlighting how it contributes to the
overall security of data and services in a client-server environment.
b Discuss the various security goals that align with / conflict with the CO U 6
. business objectives in an IT sector. Identify the strategies to which 2
how an organization can employ to strike a balance between
maximizing business efficiency and maintaining robust security
measures.

3. a Examine the working concept of Penetration Testing within the CO A 1


. framework of Distributed Computing. Highlight the unique 3 0
challenges, strategies, and considerations involved in conducting
effective penetration tests in a distributed computing environment.
b Discuss the primary techniques, procedures, and methods CO U 6
. employed in cybersecurity to combat a range of threats and attacks, 3
and identify the strategies adapt to evolving cyber threats and
emerging attack vectors

4. a Show a comprehensive analysis of risk management practices CO U 1


. within the IT sector. Discuss the key risk factors specific to the 4 0
industry, the strategies employed for risk identification, assessment,
and mitigation, and the role of risk management in ensuring the
security and resilience of IT systems. Identify the internal and
external factors that contribute to the dynamic risk landscape in the
IT sector.
b Discuss how an organization systematically analyze security CO U 6
. incidents to identify the root cause of various security breaches in 4
information security to ensure effective remediation and prevention
of future incidents

5. a Discuss the role of cryptography, digital signatures, and access CO U 1


. control techniques that which contribute to the information security 5 0
incident management process, and identify the specific roles in
ensuring the integrity, authenticity, and controlled access to
sensitive data during incident response and resolution.
b Explain the various protocols and mechanisms to implement and CO U 6
. assess audit records for identifying security breaches, and strategies 5
that are employed to effectively mitigate and address the security
breaches once detected.

6. a Examine a multinational corporation is planning to enhance its CO A 1


. information security by considering and implementing ISO 27001 4 0
and ISO 27002 standards. Describe the key differences between
ISO 27001 and ISO 27002, including their respective focuses,
objectives, and implementation processes, and explain how each
standard contributes to strengthening the organization's overall
information security posture.
b Discuss the physical and environmental security that are involved CO U 6
. to safeguard critical infrastructure and assets in an IT sector. 4
Identify the key measures and considerations, including access
controls, surveillance systems, environmental monitoring, and
disaster preparedness strategies.

7. a Examine a government agency is evaluating its information CO A 1


. security framework using NSA Triad and CIA Triad. Describe the 1 6
differences between the two triads, including their respective
components, objectives, and areas of emphasis. Identify the factors
that might influence the agency's decision in selecting the most
suitable framework for their security needs.
PART – B (1 X 20 = 20 MARKS) [Compulsory Question]
8. a Discuss the ethical challenges that arise when balancing the needs CO U 2
. and interests of different organizations while maintaining 6 0
confidentiality, integrity, and availability of shared data and
resources. In addition, explore the role of ethical frameworks,
professional codes of conduct, and collaboration agreements in
promoting trust and accountability among the participating
organizations.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED
COURSE OUTCOMES
CO
Describe the need for development of information security policies, and identify guidelines and models for writing policies.
1
CO
Understand risks and threats to information security and the need for good information security practices.
2
CO
Apply the techniques, procedures, methods for combating these threats and attacks.
3
CO
Analyze the security incidence and identify the root cause for various security breaches.
4
CO
Evaluate the performance of the Information Security Management Systems by controls and audit methods.
5
CO
Create Information System Policy and procedures and contingency plans.
6
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 16 16 32
CO2 16 16
CO3 6 10 16
CO4 22 10 32
CO5 16 16
CO6 20 20
132

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 21CS3010 Duration 3hrs


Course Name NATURAL LANGUAGE PROCESSING AND ITS APPLICATIONS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Discuss the potential benefits and drawbacks of using NLP for CO U 10
. machine translation. 1
b Design a spam filtering algorithm for email communication and CO C 10
. explain the key components. Consider the trade-offs between 1
accuracy and efficiency.
(OR)
2. a Compare and contrast the two different types of corpora used in CO U 10
. NLP. 1
b Evaluate the efficiency of morphological analysis using finite state CO E 10
. transducers in NLP applications. 1

3. a Examine the role of finite state automata in morphological analysis. CO A 10


. 2
b Describe the steps involved in using Finite State Automata (FSA) CO U 10
. to perform morphological analysis on a large corpus of product 2
reviews.
(OR)
4. a Explain the role of collocations to improve the accuracy of CO U 10
. language models. 2
b Review the performance metrics perplexity and entropy used to CO U 10
. evaluate the performance of the N-gram Model. 3

5. a CO E 10
Critique the effectiveness of n-gram models over sparse data.
. 3
b Design an experiment using Pearson’s chi-square test to analyze CO C 10
. collocations in a large corpus. 3
(OR)
6. a Develop a comprehensive plan for implementing a supervised word CO A 10
. sense disambiguation system. Include the steps for training, feature 4
selection, and performance evaluation methods.
b Apply a Hidden Markov Model to a given corpus text for POS CO A 10
. tagging. 4

7. a Explain multiple document text summarization with a neat CO U 10


. diagram. 5
b Describe different ways of building belief models in a CO U 10
. conversational agent. 5
(OR)
8. a Illustrate with a neat diagram how a typical NLP system is CO A 20
. organized. 6
COMPULSORY QUESTION

9. a Propose a comprehensive design for a social media sentiment CO C 10


. analysis application. 6
b Discuss the applications of information extraction, text mining, and CO U 10
. information retrieval in NLP. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Apply the principles and Processes of Human Languages such as English and other Indian
Languages using computers.
CO2 Realize semantics and pragmatics of the English language for text processing
CO3 Check a current method for statistical approaches to machine translation.
CO4 Perform POS tagging for a given natural language and select a suitable language modelling
technique based on the structure of the language.
CO5 Demonstrate the state-of-the-art algorithms and techniques for text-based processing of natural
language for morphology.
CO6 Develop Statistical Methods for Real World Applications and explore deep learning-based NLP

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 - 20 - - 10 10 40
CO2 - 20 10 - - - 30
CO3 - 10 - - 10 10 30
CO4 - - 20 - - - 20
CO5 - 20 - - - - 20
CO6 - 10 20 - - 10 40
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1001 Duration 3hrs


Course Name DIGITAL SYSTEM DESIGN Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
CO
1. State associative law. R 1
1
CO
2. Convert binary number 11011110 into gray code. U 1
2
Identify the combinational circuit that converts binary CO
3. U 1
information from 2n input lines to an ‘n’ output line. 3
CO
4. Define data distributor. R 1
3
CO
5. Infer the characteristic table of T flip-flop. An 1
4
CO
6. Sketch the graphic symbol of JK flip flop. A 1
4
Determine the number of flip flops required to design 3-bit CO
7. A 1
synchronous up-counter. 4
CO
8. Identify the basic building block of a Sequential circuit. R 1
4
Interpret the primary model recommended for designing CO
9. U 1
synchronous systems. 5
CO
10. Develop the Verilog code for 2 x 4 Decoder. A 1
6
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
CO
11. Write the truth table of EX-OR and NAND gate. A 3
1
Illustrate the logical expression for a Half adder using K- CO
12. A 3
map. 2
CO
13. Define set-up time and Propagation delay. R 3
3
CO
14. List the applications of shift register. R 3
4
Differentiate synchronous and asynchronous sequential CO
15. U 3
circuits. 6
Categorize the types of Verilog modelling with suitable CO
16. An 3
examples. 5
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Solve the following Boolean expression using K-Map

𝐹 (𝐴, 𝐵, 𝐶, 𝐷) = 𝛴 (0, 1, 2, 3, 7, 8, 10) + 𝑑 (5, 6,


method. CO
17. a. A 8
2
11, 15)
Predict the simplified expression for the given Boolean
CO
b. function using K-Map method. A 4
2
F (X, Y, Z) = Σ (0,2,3,4,5,6)

Design an 8 x 1 Demultiplexer from its truth table and CO


18. a. C 7
draw the logic diagram. 3
Explain the logical operation of a half-Subtractor with CO
b. U 5
a neat diagram. 3

Develop a 3-bit Asynchronous Up-Counter. Explain its CO


19. a. A 8
operation with a Timing Diagram. 4
Illustrate the characteristic table and output expression CO
b. U 4
of JK flip flop. 4

Explain the working of 4-bit SISO and SIPO shift CO


20. a. A 8
registers. 5
Categorize the different types of triggering techniques CO
b. An 4
in clock pulse. 5

Sketch and explain a 3 bit Synchronous Up-Down CO


21. a. A 12
Counter using T-Flip Flop with its timing diagram. 4

Sketch the symbols, truth tables and output expressions CO


22. a. A 8
of all the basic logic gates. 1
Compute the simplified Boolean expressions for the
following expression using Boolean laws. CO
b. A 4
a) A’B+BC’+BC+AB’C’ 1
b) X’Y’Z+X’YZ+XY’Z’+XY’Z+XYZ

Design a one-bit magnitude comparator with its truth CO


23. a. C 6
table and logical equation. 2
Develop an 8 x 3 encoder with its truth table and CO
b. A 6
logical diagram. 2
COMPULSORY QUESTION
Design a Verilog code for two-bit magnitude
CO
24. a. comparator in any one of the condition (a=b or a>b or C 12
6
a< b) using any one modelling techniques.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL


COURSE OUTCOMES
CO1 Describe the basic postulates of Boolean algebra and the operation of logic gates.
CO2 Select an optimal method for simplification of Boolean expressions.
CO3 Construct and distinguish various combinational logic circuits.
CO4 Identify suitable methods for designing various sequential logic circuits.
CO5 Illustrate the design of simple logic circuits using HDL codes.
CO6 Experiment combinational and sequential circuit using HDL codes.
Assessment Pattern as per Bloom’s Taxonomy
CO / BL R U A An E C Total
CO1 1 - 15 - - - 16
CO2 - 1 21 - - 6 28
CO3 4 6 - - - 7 17
CO4 4 4 22 1 - - 31
CO5 - 1 8 7 - - 16
CO6 - 3 1 - - 12 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1003 Duration 3hrs


Course Name MICROPROCESSOR AND MICROCONTROLLER Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO U 1
Identify the address bus size of 8086 microprocessor. 1
2. Recall the processor that supports pipelined architecture is CO R 1
____________. 1
3. Examine the mode of 8086 if the pin MN/MX is connected to the CO R 1
ground (0v). 2
4. Recognize the addressing mode for the given instruction MOV AX, CO R 1
[2500H] in 8086. 2
5. Name the internal register that can be programmed to determine the CO U 1
functions of the ports of 8255 IC. 3
6. CO R 1
List the number of counters present in the 8254 IC. 3
7. CO U 1
Predict the port that doesn’t have any alternate function in 8051. 4
8. CO R 1
Examine the signal used to demultiplex address bus and data bus. 4
9. Interpret the number of rows and columns present in a 16 * 2 CO U 1
alphanumeric LCD. 5
10 RISC stands for ___________. CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO A 3
. Write the functions of the EU in 8086. 1 n
12 CO U 3
. Sketch the block diagram for a closely coupled configuration. 2
13 CO U 3
. Illustrate the control word format of 8255 PPI IC. 3
14 Write an Assembly language program to count the number of 1’s in a CO A 3
. byte ‘AA’ and store it in a register R5. 4 n
15 Summarize the importance of Interrupt and the different sources of CO A 3
. interrupts of 8051. 5 n
16 CO U 3
. List any three features of CISC architecture. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Discuss the various addressing modes of 8086 microprocessor with CO R 1
. . an example. 1 0
b The Value of DS register is 3032H and BX register contains an CO A 2
. offset value of 3032H. Compute the 20-bit physical address of the 1
memory pointed by DS register.

18 a Sketch and discuss briefly the different bus signals of maximum CO R 1


. . mode configuration of 8086 microprocessor. 2 0
b CO U 2
. List any two assembler directives of 8086 microprocessor. 2

19 Explain briefly the various modes of 8254 Timer IC with its timing CO A 1
. diagram. 3 2

20 Explain the internal architecture of 8051 microcontroller with a neat CO U 1


. block diagram. 4 2

21 Sketch the interface diagram of 4x4 keypad with 8051 CO A 1


. microcontroller. Discuss briefly the LCD pin description, 5 2
advantages, and applications.

22 a Consider a system with 8Kb memory space implemented using two CO A 1


. . 4Kb memory IC’s (EPROM and RAM). Sketch the interface 5 n 0
diagram of EPROM and RAM with 8051 microcontroller.
b CO U 2
. Compare microprocessor and microcontroller. 5

23 Explain briefly the different modes of 8051 Timers with necessary CO U 1


. diagrams. 5 2
COMPULSORY QUESTION
24 Discuss briefly the internal architecture of Pentium processors with CO U 1
. its block diagram. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
Write the assembly language coding using 8086 microprocessors.
1
CO
Apply interfacing techniques for various applications.
2
CO
Explain the concepts of 8051 and interfacing with 8051.
3
CO
Develop microprocessor and Microcontrollers based systems.
4
CO
Select the Microprocessor with proper specifications for various applications.
5
CO
6 Review the concepts of advanced microprocessors and microcontrollers.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 11 1 2 3 - - 17
CO2 11 5 - - - - 16
CO3 1 4 12 - - - 17
CO4 1 13 - 3 - - 17
CO5 - 15 12 13 - - 40
CO6 - 17 - - - - 17
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1005 Duration 3hrs


Course Name PROGRAMMING FOR PROBLEM SOLVING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO R 1
Define flowchart.
1
2. CO R 1
Identify the use of header file. 1
3. Write the C statement to find whether the person is eligible for vote or CO A 1
not using conditional operator. 2
4. CO A 1
Write the syntax of “do - while” loop.
2
5. CO R 1
Name a string function which is used to join two strings.
3
6. CO R 1
How would you initialize an array while declaring it?
3
7. CO R 1
List the types of functions.
4
8. CO R 1
Define recursion. 4
9. CO R 1
How will you declare an array of char pointers?
5
10 CO R 1
Define structure.
. 6
PART – B (6 X 3 = 18 MARKS)
11 Construct the flowchart to input two numbers from the user and display CO A 3
. the largest among them. 1
12 Write the output of the following C code. CO A 3
. #include <stdio.h> 2
int main()
{
int a = 8, b = 2;
printf("a & b = %d ", a & b);
return 0;
}
13 Illustrate how the initialization of a 1D-array takes place during its CO U 3
. runtime by a C program. 3
14 Describe the need of C function. CO U 3
. 4
15 Predict the output of the following C code. CO U 3
. #include <stdio.h> 5
int main (){
int var;
int *ptr;
int **pptr;
var = 3000;
ptr = &var;
pptr = &ptr;
printf("Value of var = %d\n", var );
printf("Value available at *ptr = %d\n", *ptr );
printf("Value available at **pptr = %d\n", **pptr);
return 0;
}
16 CO U 3
. Differentiate between the array and structure. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Construct a C program that demonstrates the various format CO A 6
. . specifiers used in C language. 1
b CO A 6
Explain the structure of C program with an example.
. 1

18 a Discuss the following operators in C language with example. CO U 1


. . a) Increment and decrement operators. 2 2
b) Logical operators.

19 a Write a C program that adds two matrices using multidimensional CO A 1


. . arrays. 3 2

20 a Develop a C program that calculates the factorial of a given number CO A 6


. . using a recursive function. 4
b Prepare a C program to find the area and circumference of a circle CO A 6
. using function. 4

21 a Write a C program to swap two values using call-by-reference CO A 6


. . mechanism with using a third variable. 5
b Develop a C program to create a file named customer.txt and store CO A 6
. the content of any two customer’s information. (Name, Address, 5
contact no, Customer ID ).

22 a Construct a C program to find out the total marks obtained by the CO A 6


. . student. Assume that the maximum marks that can be obtained by a 1
student in each subject are 100.The marks obtained by a student in
five different subjects are input through the keyboard.
b Illustrate a C program to find the size of int, float, double and char CO U 6
. data types. 2

23 a Write short notes on following: CO A 6


. . d) strlen() 3
e) strcpy()
f) strcat()
b CO A 6
. Construct a C program for sum of natural numbers using recursion. 4
COMPULSORY QUESTION
24 a Write a C program to store student’s information using structure. CO A 6
. . 6
b Write a C program to calculate an electricity bill as follows CO A 6
. i) if it is domestic use, unit cost as given in the table. 6
ii) if it is commercial use, unit cost is doubled.
Get the units used as input for domestic / commercial usage.
Unit range Unit cost
1-100 Rs. 0
101-200 Rs. 2.50
201-400 Rs. 5.00
>400 Rs. 10.00

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO understand the basics of computer programming concepts and write own programs
1
CO apply the operators and conditional statements to represent the real time programs
2
CO prepare solutions for the problem using array and strings
3
CO decompose a problem into functions and synthesize a complete program using divide and
4 conquer approach using functions
CO formulate algorithms and simple programs using arrays and pointers
5
CO create a new application to solve real world problems using structures and unions
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 - 21 - - - 23
CO2 - 18 5 - - - 23
CO3 2 3 18 - - - 23
CO4 2 3 18 - - - 23
CO5 1 3 12 - - - 16
CO6 1 3 12 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1007 Duration 3hrs


Course Name PYTHON PROGRAMMING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the Python function used to convert the string '123' to an CO R 1
integer. 1
2. Predict the output for the following program. CO U 1
print(19//2**3*2) 1
3. Infer the output for the following Python code. CO U 1
li = [2, 12, 22, 32, 42, 52, 62, 72] 2
print(li[-2])
4. Trace the output for the following program. CO U 1
Str = “Karunya” 2
print(Str*3)
5. CO R 1
Name the function used as a constructor of a class. 3
6. Interpret the type of inheritance from the following code. CO U 1
class A(): 3
pass
class B(A):
pass
class C(B):
pass
7. Infer the output of the following code snippet. CO U 1
4
import turtle
t=turtle.Pen()
for i in range(0,6):
t.forward(100)
t.left(60)
8. Name the function which retains the most important aspects of an CO R 1
image even after reducing its size. 4
9. Identify the property used to add horizontal padding between the CO U 1
boundaries of the widget and its cell boundaries. 5
10 CO R 1
. List two methods in socket module. 6
PART – B (6 X 3 = 18 MARKS)
11 CO U 3
. Discuss the characteristics of membership operator with an example. 1
12 Construct a Python code to create a dictionary where the keys are CO A 3
. numeric indices from 1 to 4, and the corresponding values are names 2
('Annet', 'Ukesh', 'Steffana', 'Judah'). Then, access the third key of the
dictionary and print it along with its corresponding name.
13 CO U 3
. Differentiate between serialization and deserialization. 3
14 Illustrate how to open an image ‘carimage1.png’ using PIL and store CO A 3
. that image in ‘Img_data.png’ using Python code. 4
15 Explain the grid and pack layout managers with its attributes in Tkinter CO U 3
. module of python. 5
16 CO A 3
. Write a Python code to create a thread. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Explain various control statements in python with suitable CO
. . examples. U 6
1
b For a given integer N, print all the squares of integer numbers from CO
R 6
. 1 to N. 1

18 a fruits = ["Grapes", "Guava", "Custard Apple", "Kiwi"]. CO U 6


. . 2
Express the code segment to do the following operations and show
the list ‘fruits’ elements after each operation:
 Add an element “Berry”.
 remove the element “Custard Apple”.
 Add “Avocado” at the index location 1.
 Update the “Guava” as “Pink Guava”.
b Construct a tuple with five items and perform the following CO A 6
. operations: 2
 Iterate through the tuple.
 access items using negative indexing.
 add items to tuple.
 remove an item from the tuple.

19 a CO U 6
. . Illustrate the multilevel inheritance with suitable example program. 3
b Write Python code to overload ‘ + ’, ‘ – ’ and ‘ * ’ operators by CO A 6
. providing the methods __add__, __sub__ and __mul__. 3
20 a Express the representation of the Indian National Flag using CO U 6
. . Python's Turtle graphics. 4

b Explain the following operation using Python code with PIL CO U 6


. package. 4
i) Change the image format.
ii) Crop an image to (65,200,120,220).
iii) Flip Image to top to bottom.

21 a Represent whether an individual is classified as a child, adult or CO U 6


. . elder based on their age using the GUI window and display the 5
result in a pop-up information message
box.

b Develop a Python code to maintain a Library database. The program CO A 6


. should allow the users to 5
1) Add new book with its title and IDs.
2) Display book details based on ID.
3) Update book title based on ID.

22 a Write a Python code to find the factorial of a number using a loop. CO A 6


. . 1
b List out the different data types in python and explain them with CO R 6
. example. 1

23 a Interpret the output for the following list operations: CO U 6


. . i) len([12,16,56]) 2
ii) [100,200] + [50,60,70]
iii) ['Hi!'] * 3
b Show how to count the number of lines from a text file "story.txt" CO U 6
. which is not starting with an alphabet "T" using a function in 2
python.

The file "story.txt" contains the following lines:

A boy is playing there.


There is a playground.
An aeroplane is in the sky.
The sky is pink.
Alphabets and numbers are allowed in the password.
COMPULSORY QUESTION

24 Illustrate with a Python code to implement a TCP socket program CO U 1


. for sending data from server to client. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Select the basic programming constructs of Python suitably.
1
CO Infer the concepts of string processing, Encryption, file I/O, lists and dictionary.
2
CO Apply modules for reusability and the object-oriented principles for modeling and developing
3 software system.
CO Experiment the power of graphics for processing images.
4
CO Construct applications with graphical user interface.
5
CO Develop software solutions using multi-threading, networking and client-server concepts.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 13 10 6 - - - 29
CO2 - 20 9 - - - 29
CO3 1 10 6 - - - 17
CO4 1 13 3 - - - 17
CO5 - 10 6 - - - 16
CO6 1 12 3 - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024
Course Code 23CS1009 Duration 3hrs
Course Name ARTIFICIAL INTELLIGENCE IN IOT Max. Marks 100

Q. CO BL M
Questions
No.
PART – A (10 X 1 = 10 MARKS)
1. Identify the various sensors in smart phones. CO1 R 1
2. Define Non-Invasive Sensors. CO1 R 1
3. Recall different IoT based systems in Smart Buildings. CO2 R 1
4. State the primary purpose of the IEEE 802.15.4 standard. CO2 R 1
5. Define embedded computing and provide an example of an embedded system. CO3 R 1
6. Identify the specific interface on the Raspberry Pi that can be controlled or CO3 U 1
accessed using Python programming.
7. Define Attack-as-an administration (Aaas). CO4 R 1
8. List the approaches in Knowledge representation. CO4 R 1
9. Enumerate the role of machine learning in agriculture. CO5 R 1
10. List few problems in conventional medical systems. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Explain SANET. CO1 U 3
12. Explain the characteristics of Low Power and Lossy Networks (LLNs). CO2 U 3
13. Differentiate Microcontroller and Microprocessor. CO3 U 3
14. List security and privacy issues in IOT based systems. CO4 R 3
15. Illustrate about expert system. CO5 A 3
16. Discuss the security requirement of AI/IOT medical devices. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Examine a scenario: A leading smartphone manufacturer that has CO1 A 12
developed a new flagship smartphone model with advanced health and
fitness tracking capabilities. The company aims to leverage IoT technology
to empower users to monitor and improve their health and well-being using
their smartphones. Discuss the various sensors used for smart phone iot
application

18. a. Discover the major building blocks of IoT. CO1 U 6


b. Discuss the various actuator used for IOT applications. CO1 U 6

19. Explain Physical, Mac layer, Topology and Security standard of IEEE CO2 U 12
802.11

20. a. Explain the components of the Arduino board with a neat diagram. CO3 U 6
b. Write an Arduino Sketch for blinking LED. CO3 A 6

21. a. Summarize the Architecture of Internet of Things. CO3 U 6


b. Identify the applications of IOT in wearable. CO4 R 6

22. Articulate a scenario where a 20-story office building located in a bustling CO4 A 12
urban area. The building owner is committed to implementing sustainable
and cost-effective practices while ensuring a comfortable and productive
work environment for tenants. Design an IoT-based smart building
management system using the various methods of design methodology.

23. Examine the role of AI and IOT based knowledge representation for the CO5 A 12
below case study:
Consider a hypothetical scenario involving a 65-year-old patient named
Sarah who has been diagnosed with congestive heart failure (CHF). Sarah's
healthcare provider has prescribed a remote monitoring system to track her
vital signs and symptoms on a daily basis, allowing for timely intervention
in case of any anomalies.
COMPULSORY QUESTION
24. a. Discuss the types of medical devices. CO6 U 6
b. Discuss the critical issues and challenges of internet of things in medical CO6 U 6
devices and systems.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Recognize the hardware and software components of IoT
CO2 Interpret technologies and protocols in IoT
CO3 Operate the tools in design and development
CO4 Demonstrate the practical applications and real-world scenarios
CO5 Relate security issues in IoT
CO6 Develop solutions to real time projects and case studies

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 15 12 - - - 29
CO2 2 15 - - - - 17
CO3 1 16 6 - - - 23
CO4 11 - 12 - - - 23
CO5 1 - 15 - - - 16
CO6 1 15 - - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1011 Duration 3hrs


Course Name ARTIFICIAL INTELLIGENCE Max. Marks 100

Q.
Questions CO BL Marks
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define the term ‘Artificial Intelligence’. CO1 R 1
Predict the environment in which the agent engages in a series of connected
2. CO1 U 1
episodes.
3. List the two types of elements in a graph structure. CO2 R 1
4. Express the term ‘state space’ in the context of problem-solving. CO2 U 1
Recognize the learning problem when the output is one of a finite set of
5. CO3 R 1
values.
6. Represent the ‘measure of success’ in a learning problem. CO3 U 1
Show the precondition for ‘deliver coffee (dc)’ action of delivery robot
7. CO4 U 1
using STRIPS representation.
8. Give examples for progression planning in AI. CO4 U 1
9. Indicate one key application of language models in real-world scenarios. CO5 U 1
List two examples of virtual assistants, assisting the users in their daily
10. CO6 R 1
tasks.

PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Discuss the four distinct perspectives on AI, each falling into one of two
11. CO1 U 3
key dimensions.
12. Differentiate ‘cycle’ and ‘tree’ representation of search problem in AI. CO2 U 3
13. Represent the components of learning problem in AI CO3 U 3
14. Predict the challenges of representing the state space explicitly. CO4 A 3
Identify any three basic image processing operations in remote sensing
15. CO5 U 3
applications.
16. Indicate the main functions of a medical diagnostic agent. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Explain the different types of environments in which intelligent agents CO1 U 12
17.
operate.

18. Describe the concepts of "problem space" and "state space" in the CO2 U 12
context of problem-solving by search, with examples.

Distinguish between supervised and unsupervised learning using an CO3 U 12


19.
illustrative example.

Discuss forward planning with a delivery robot example and examine CO4 U 12
20.
the challenges of implementing it.

Describe text classification in natural language processing, and provide CO5 U 12


21. an example of a real-world application where text classification is used
to solve a specific problem.

22. Analyze the issues in AI based Learning in detail. CO3 An 12

23. Represent STRIPS planning for State based search with neat diagrams CO4 U 12
COMPULSORY QUESTION
Show an example of a real-time application where intelligent agents are CO6 U 6
24. a. used to enhance decision-making or automation, and discuss the
specific tasks and benefits they bring to this application.
Analyze the main functions of a virtual assistant, in assisting the users CO6 An 6
b
in their daily tasks.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 define AI as intelligent agent that receive precepts from the environment
CO2 select different search algorithms to reach the goal in state-space problems.
CO3 infer modern learning strategies to acquire knowledge from the environment.
CO4 generalize the planning methods with certainty factors for problem solving in AI.
CO5 identify the communicating and perceiving agents in the AI field.
CO6 focus on the real-time applications of AI in various fields.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 1 16 - - - - 17
CO2 1 16 - - - - 17
CO3 1 16 - 12 - - 29
CO4 - 26 3 - - - 29
CO5 - 16 - - - - 16
CO6 1 9 - 6 - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1012 Duration 3hrs


Course Name COMPUTER ORGANIZATION AND ARCHITECTURE Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. CO U 1
Differentiate between hardware and software interrupts. 1
2. CO U 1
Draw the diagrammatic representation of the Instruction Cycle. 1
3. CO R 1
List any two elements in the cache memory. 2
4. Calculate the number of check bits needed, if the 8 bit code is 1101 CO A 1
1100. 2
5. CO R 1
List out the various addressing modes. 3
6. CO R 1
List the various types of computer functions. 3
7. CO R 1
List out the types in displacement addressing. 4
8. Perform the 2’s complement subtraction of smaller number (101011) CO R 1
from larger number(111001). 4
9. CO R 1
List the types of control and status registers. 5
10 Predict the method used to implement control logic in a hardwired CO U 1
. control unit. 6
PART – B (6 X 3 = 18 MARKS)
11 CO R 3
. Describe the different types of system bus. 1
12 Differentiate between centralized and distributed bus arbitration CO U 3
. mechanisms. 2
13 CO R 3
. Describe the DMA operations. 3
14 Consider the following integer values (+12) and (-5) Perform 2’s CO U 3
. complement addition between above integer values. Note: above 4
integer values need to be converted into binary representation.
15 Distinguish between write after read and read after write data hazard CO A 3
. with a neat diagram. 5 n
16 CO R 3
. State the implementation of the control unit along with its advantage. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Compare and contrast the structures of Von Neumann and IAS CO U 6
. . architectures highlighting the architectural design that impacts the 1
functionality and program execution.
b Describe how interrupts can improve processing efficiency of the CO U 6
. processor. Illustrate the program flow of control with interrupts 1
using short and long I/O wait.

18 a Explain the direct and associative mapping techniques of cache CO R 6


. . memory mapping techniques with suitable examples. 2
b Calculate the size of main memory, tag directory size by CO A 6
. considering a direct mapped cache of size 512 KB with block size 1 4
KB, 7 bits in the tag.

19 Describe the procedures involved in the execution of I/O operations CO R 1


. by means of Programmed I/O and Interrupt-Driven I/O. 3 2

20 a Compute the product p x q of the given values using Booth’s CO A 6


. . algorithm for multiplication. p = 0011, q = 0110. 4
b Compute the subtraction of -2 from -5 using 2’s complement CO A 6
. method. 2

21 Consider the Data bits: 00001111. While writing this data bit into CO A 1
. the memory, how many check bits are required. While reading the 3 2
same data bit, the following is received from the memory:
00001110. Apply the syndrome word calculation error detection
method to detect the error bit position and rectify the same. Sketch
the necessary diagram for the above calculation.

22 a Illustrate the concept of immediate addressing mode, direct CO U 8


. . addressing mode 5
In direct addressing mode and register addressing mode with a neat
diagram.
b Explain the operations of the Instruction Cycle with proper State CO U 4
. Diagram 2

23 Draw the typical block diagram of a DMA controller and explain CO U 1


. how it is used for direct data transfer between memory and 3 2
peripherals.
COMPULSORY QUESTION
24 Describe the various stages of pipelining illustrating how the CO U 1
. instructions flow through them. Identify the types of hazards which 6 2
may occur during pipelining and propose suitable solutions to
overcome the hazards.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO explain function of the Central Processing Unit.
1
CO
develop algorithms for error correction for memory modules (main and cache memory).
2
CO
design and understand various input and output modules for central processing unit.
3
CO
select and use standard addressing modes for logical and physical memory addressing.
4
CO
list and define various stages of instruction pipelining in processor.
5
CO
6 explore various ways to implementing the micro instruction sequencing and execution.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 4 13 - - - - 17
CO2 7 8 6 - - - 21
CO3 16 13 12 - - - 41
CO4 1 4 12 - - - 17
CO5 1 8 - 3 - - 12
CO6 3 13 - - - - 16
124

END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1013 Duration 3hrs


Course Name ETHICS IN INFORMATION TECHNOLOGY Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
CO
1. Define Integrity. 1 R 1
CO
2. List the characteristics of organizational culture. 1 R 1
CO
3. Name the types of attacks. 2 R 1
CO
4. Give examples of Identity theft. 2 U 1
CO
5. List the types of work that can be copyrighted. 3 R 1
CO
6. Identify the necessary conditions to grant a patent. 3 U 1
CO
7. Name the different types of software product liability. 4 R 1
CO
8. Define Teleworking. 4 R 1
CO
9. Give examples of social network advertising strategies. 5 U 1
10 CO
. State the main components of ISO 27001 framework. 6 R 1
PART – B (6 X 3 = 18 MARKS)
11 Sketch the fishbone diagram for the following statement: CO A 3
. “Late to work” 1
12 CO A 3
. Classify the types of perpetrators of computer crime. 2 n
13 CO R 3
. Describe the terms copyright, patent and trade secret. 3
14 CO A 3
. Write the cause of poor-quality software developed by programmers. 4
15 CO U 3
. Discuss the advantages and disadvantages of offshore outsourcing. 5
16 CO U 3
. Describe the need for ISMS for any organization. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a CO
U 6
. . Summarize the OCTAPACE of an organization culture. 1
Describe the different leadership styles, focusing on understanding
b CO
their key characteristics and the impact on various organizational R 6
. 2
contexts.

Attackers find and exploit system flaws in the applications using a


18 CO 1
number of different strategies. Describe the various kinds of U
. 3 2
exploits in detail.

19 CO 1
R
. Describe the key issues that are prevalent with intellectual property. 4 2

20 a Explain the importance of software quality and the software CO


U 6
. . development process with its essential steps. 4
b Analyze and explain the use of Industry 4.0 standards in providing CO A
6
. quality healthcare. 4 n

21 a CO
U 6
. . Explain the various social networking ethical issues in detail. 5
b Discuss the following Non-traditional workers. CO U 6
. i. Contingent workers 5
ii. H-1B workers.

22 a Sketch the CIA security triad and explain the layers of protective CO
A 6
. . measures. 3
b Discuss the different types of software testing used in software CO U 6
. development. 4

23 Explain the PDCA cycle and sketch the tools used for continuous CO 1
A
. improvement with examples. 1 2
COMPULSORY QUESTION
24 a Summarize the business benefits that a company can achieve with CO U 6
. . the implementation of information security standards. 6
b CO U 6
. Discuss the various threats in Business Continuity Planning. 6

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Observe professional ethics and organizational culture and climate in information technology.
CO2 Identify the various leadership styles and the suitability for the specific organization.
CO3 Survey the possible computer crimes and the rules and regulations for protection.
CO4 Appraise various types of IPR and the procedures for obtaining IPR.
CO5 Categorize various types of social networking and ethical issues.
CO6 Articulate the standards for Information Security Management Systems.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 6 15 23
CO2 7 1 3 11
CO3 4 13 6 23
CO4 14 12 3 6 35
CO5 16 16
CO6 1 15 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1014 Duration 3hrs


Course Name GEOMETRIC MODELLING AND DESIGN THINKING Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
List any two attributes of text primitive. CO R 1
1. 1
Name any two professional 3D modelling tools. CO R 1
2. 1
Calculate and write the number of rectangular faces in the triangular CO A 1
3. prism. 2
Differentiate right-handed and left-handed coordinate systems. CO U 1
4. 2
Compare object space and world space in 3D. CO U 1
5. 3
Name the different types of color models. CO R 1
6. 3
List the factors that affect illumination in 3D environments. CO R 1
7. 4
State a few common 3D model file extensions. CO R 1
8. 5
Recall the latest version of open-source Blender software. CO R 1
9. 5
10 Describe the explicit goal of design thinking. CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 CO
Explain how geometric modelling is used for scientific visualization. U 3
. 1
12 CO A
. Illustrate the principles of geometric modelling. 2 n 3
13 CO
Infer on window-to-viewport transformation with an example figure. C 3
. 3
14 CO
Indicate the significance of shadows in 3D mapping. U 3
. 4
15 CO
Summarize the steps to design and render a 3D model. E 3
. 5
16 CO
Discuss the concept of ideation in the design thinking process. U 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Discuss the applications of geometric modelling in the animation CO U 1
. and gaming industry with real-world examples. 1 2

18 Review the various methods and operations in Constructive Solid CO U 1


. Geometry (CSG) with suitable examples. 2 2

19 a CO A 6
Solve and derive the Cohen-Sutherland line clipping algorithm.
. . 2
b Apply the midpoint algorithm to find the intersection points of a CO A 6
. line starting at (1,1) and ending at (9,6). 2

20 Explain the following 3D transformations: scaling, rotation, CO U 1


. shearing, and reflection. 3 2

21 a Discuss the common modelling techniques: revolve, extrusion, and CO U 6


. . sweeps. 5
b CO A 6
Infer on lofts and boundary surfaces with diagrams.
. 5 n

22 CO A 1
Illustrate Flat, Gouraud and Phong 3D shading models in detail.
. 4 2

23 a CO E 6
. . Evaluate the error analysis and editing techniques in Blender 3D. 5
b CO A 6
. Sketch an example for environment and bump mapping in 3D. 5
COMPULSORY QUESTION
24 Explain the various stages involved in the design thinking process CO U 1
. with examples. 6 2

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO Examine the fundamental principles of geometric modelling.
1
CO Analyze the design problems from a geometric perspective.
2
CO Identify the mathematical models and algorithms involved in geometric modelling.
3
CO Exhibit proficiency in using geometric modelling software tools to develop 3D models.
4
CO Apply design thinking methodologies to innovate and solve problems creatively.
5
CO Develop design concepts and ideas through sketches, models, and presentations.
6

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 2 15 - - - - 17
CO2 - 15 8 6 - - 29
CO3 1 13 - - - 3 17
CO4 1 3 12 - - - 16
CO5 2 6 6 6 9 - 29
CO6 - 16 - - - - 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1015 Duration 3hrs


Course Name C PROGRAMMING AND APPLICATIONS Max. Marks 100

Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
1. Define operating system. CO1 R 1
2. Differentiate between variable and constant. CO2 An 1
3. Define Non-Volatile Memory. CO1 R 1
4. Show the general form of for statement. CO3 R 1
Evaluate the following expression:
5. CO2 U 1
50 % 2 / 3 + 2
6. List the Unconditional Statements used in C Programming. CO3 R 1
Predict the output of the following Code:
main()
{
7. char x; CO2 A 1
x = ‘a’;
printf(“%d\n”, x);
}
8. Show a C function to compare two strings. CO5 R 1
9. Recall the syntax of structure declaration. CO6 R 1
10. Define recursive function. CO4 R 1
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
Differentiate between System software and Application
11. CO1 An 3
software.
12. List the different types of tokens available in C language. CO2 R 3
13. Show the differences between while and do-while statements. CO3 An 3
14. Define function with its syntax. CO4 R 3
15. Declare and initialize two dimensional array. CO5 R 3
16. State the use of & and * operator with respect to pointer. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
Write algorithm for finding biggest number among 3
17. a. CO1 U 6
numbers.
Define flowchart and list the different symbols used for
b. flowchart. Draw flow chart to find the average of three CO1 R 6
numbers.

Explain the various Input and Output statements used in C


18. a. CO2 R 5
with example.
Illustrate the following operators in C language with
example.
b. a. Ternary Operator CO2 R 7
b. Relational operators
c. Logical operators

Illustrate the various Conditional Branching Statements


19. a. CO3 R 7
used in C with its syntax and flow diagram.
b. Write a program to generate n Fibonacci numbers. CO3 A 5

20. a. Develop a C program to add two integers using functions. CO4 A 5


Explain the various categories of functions in C with
b. CO4 R 7
examples.

Write a C program to take 5 values from the user, store


21. a. CO5 A 7
them in an array and print the values.
Write a C program to find whether a given string is
b. CO5 A 5
palindrome or not.

22. a. Define a structure called student that would contain name,


regno and marks of five subjects and total. Write a
program to read the details of name, regno and marks of CO6 A 7
five subjects for 5 students, calculate the total and display
the name, regno, marks of the subjects and sum.
b. Explain array of pointers with suitable example. CO6 R 5

Construct a “nested for” loop statement in C to print a


23. a. CO3 A 6
multiplication table for a given number.
b. Describe IF-ELSE ladder with suitable example. CO3 R 6
COMPULSORY QUESTION
24. a. Describe the four basic functional units of Computer. CO1 R 7
Define type conversion and explain two types of
b. CO2 U 5
conversion with examples.
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Understand the basic organization of computer and the ability to represent algorithms using
flowcharts and pseudocode.
CO2 Comprehend the structure of C programming and to utilize different datatypes and operators to
solve basic problems.
CO3 Implement conditional statements and looping to control program flow and repetition
respectively.
CO4 Demonstrate the concept of reusability through functions and recursion.
CO5 Develop 1D, 2D arrays and string operations in C.
CO6 Apply the pointers in C for memory manipulation and efficient data access.

Assessment Pattern as per Bloom’s Taxonomy


CO / P R U A An E C Total
CO1 15 6 3 24
CO2 15 6 1 1 23
CO3 15 11 3 29
CO4 11 5 16
CO5 4 12 16
CO6 6 3 7 16
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS1017 Duration 3hrs


Course Name CODING FOR PROBLEM SOLVING - PYTHON Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the output of the following code snippet. CO R 1
print("Hello", end=" ") 1
print("World")
2. CO
R 1
State the use of in operator in python programing. 1
3. Predict the result of the following expression. CO
U 1
print(5*3**2//2) 1
4. Name the function used to convert string numerical value to integer CO
R 1
value 3
5. Identify the output for the following code. CO U 1
str1 = "Hello" 3
print (str1*3)
6. Consider the variable data refers to the list [10, 20, 30,40,50] then CO U 1
predict the result of the following expression. 4
print(data[2:4])
7. CO
U 1
Differentiate formal and actual arguments in user defined function. 5
8. CO
R 1
Identify the function used to find the number characters in a string data. 3
9. CO
U 1
Indicate the operator used for integer division. 1
10 State the function name used to create a new folder or directory using CO
R 1
. os module. 6
PART – B (6 X 3 = 18 MARKS)
11 Write a program to display the area of a rectangle for the given inputs CO A 3
. length and breadth. 1
12 CO
. Illustrate the any two bitwise operators with example programs. 2 U 3
13 CO
. Describe the slicing concept in List data with an example code. 3 U 3
14 Illustrate a program to store five numbers in a Tuple and display the CO U 3
. same using for loop. 4
15 CO
. Define default arguments in user defined function with example. 5 R 3
16 Write a program to display all the files and folders names from a CO
. specified directory. 6 A 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the comparison and boolean logical operators used in CO R 6
. . python. 1
b Write a program to read an integer N and perform the following CO A 6
. operations using if conditional statements. 1
 If N is odd, print Weird
 If N is even and in between 5 to 9, print Not Weird
 If N is even and in between 8 to 24, print Weird

18 a Write a program to check the given number is prime or not. CO A 6


. . 2
b Explain the looping statements in python with suitable example CO U 6
. programs. 2

19 a Develop a program to read the given string paragraph as input and CO A 6


. . perform the following operations. 3
 Display the total number of vowels
 Display the total number of consonants
b Describe the following List operations with example code snippets. CO U 6
. i) append ii) extend iii) insert iv) pop v) sort vi) 4
remove

20 a Write a program to store 10 integer numbers in a list variable and CO A 1


. . check each number is an even or odd. 4 2
 If the number is odd, replace the number by 1
 If the number is even, replace the number by 0
 Finally display the updated list items

21 a Given the following dictionary: CO U 6


. . inventory = { 5
'gold' : 500,
'pouch' : ['flint', 'twine', 'gemstone'],
'backpack' : ['xylophone', 'dagger', 'bedroll', 'bread loaf']
}
Illustrate the following tasks and display the dictionary after every
operation:
 Add a key "shells" to inventory.
 Set the value of 'shells' to be a list ['snail shell', 'clam shell',
'tusk shell','rock shell']
 sort the items in the list stored under the 'backpack' key.
 Then remove 'bedroll' from the list of items stored under the
'backpack' key
 Add 45 to the number stored under the 'gold' key.
b Explain any six string handling functions with suitable programs CO
U 6
. each. 3

22 a Prepare a user defined function to calculate the drag force of an air CO A 6


. . plane for the given input such as velocity, area and drag coefficient 5
as per the below formula (Assume the density = 1.22)
FD = drag force
p = density
v = velocity
CD = drag coefficient
A = area
b Explain recursive function with suitable example program. CO
U 6
. 5

23 a Describe the following string formatting with suitable example CO U 6


. . programs. 1
 f - strings
 % formatting
 format()
b Illustrate a program to find the factorial of a given user input CO
A 6
. number using looping statements. 2
COMPULSORY QUESTION
24 a Develop a program to perform the following file handling tasks: CO A 1
. . • Read a text file 6 2
• Display the entire contents of that file.
• Indicate the total count of alphabetical characters present.
• Find the quantity of numerical digits within the file.
• Display the number of spaces encountered within the file
• Predict the total count of words within the file.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO
Examine the basic syntax and semantics of Python Programming language for problem solving.
1
CO
Infer the concepts of operators and control statements.
2
CO
Apply Programming concepts for string manipulation.
3
CO
Select appropriate data structures available in python language for solving problems.
4
CO
Design Python functions for real life problems.
5
CO
6 Develop software solutions using file handling concepts.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 8 8 9 - - - 25
CO2 - 9 12 - - - 21
CO3 2 4 6 - - - 12
CO4 - 10 12 - - - 22
CO5 3 13 6 - - - 22
CO6 7 - 15 - - - 22
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS2057 Duration 3hrs


Course Name FUNDAMENTALS OF PROGRAMMING Max. Marks 100

Q.
B
No Questions CO M
L
.
PART – A (10 X 1 = 10 MARKS)
(Answer all the questions)
If s = 'Monty Python' then calculate the output for the following CO
1. U 1
comments >> print s[8:] 1
Find the output of the following comment.
CO
2. a = " Hello, World! " R 1
1
print(a.strip())
List=[“G”,”O”, “O”, “D”] CO
3. R 1
print(List(2)) = ? 2
CO
4. A 1
Convert the number system (12)10 to its octal number system. 2
CO
5. U 1
Calculate the output of the expression: len(["hello",2, 4, 6]). 3
myString = “GATTACA” Find the output of the following CO
6. U 1
>>> myString[4:]. 3
CO
7. R 1
Mention the use of comparison operator in python programming 4
CO
8. R 1
Write the syntax and usage of for loop. 4
CO
9. U 1
List_var=[ 23, ‘ March’, 14.7]. Compute len(List_var). 5
10 CO
U 1
. Print Dictionary using loop. 5
PART – B (6 X 3 = 18 MARKS)
(Answer all the questions)
11 CO
List out the standard data types used in python programming. R 3
. 1
12 CO
U 3
. Define Tuple. 2
13 CO
U 3
. Mention the rules for naming a variable. 3
14 CO
R 3
. Classify the different types of operators which supports python. 4
15 CO
R 3
. Define python dictionary with suitable example. 5
16 CO
R 3
. Name any three Modes to open a file in python. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a. List the Five Generations of Computers and their CO
U 6
. Applications. 1
b. Draw the architecture of the computer and explain the CO
A 6
basic terminology. 1

18 a. Convert the given decimal system 123 in to binary, octal CO


A 6
. and hexadecimal system. 2
b. Write the python program to find the type of cake to
make for given temperature.
Temperature Cake type Temperature Cake type
( o C) ( o C) CO
U 6
>=95 Banana >=65 & < 75 Strawberry 2
>=85 & <95 Plum >=50 & < 65 Not possible
>=75 & < 85 Chocolate
>=65 & < 75 Vanilla

19 a. Illustrate the following string functions with suitable


CO
. example a) string slicing b) string comparison c) String A 6
3
split.
b Perform the Following List operation with suitable
CO
example A 6
3
(i) comparison (ii)Slicing (iii) append

20 a. With suitable example perform the following operation


CO
. in List R 6
2
(i)Concatenation (ii) Repetition (iii) membership
b. Name and explain various built-in functions that are CO
U 6
used in Tuple. 2

21 a. Calculate the output of following python statements


CO
. i). print(23 // 5) ii). print(2 << 2) iii). print(2 >> 0) U 6
4
iv). print(2 ^ 2) v). print(2 != 2) vi). print(2 < 0)
b. Differentiate between List, Tuple & Dictionary based on
CO
any two Python built-in data structures with suitable A 6
4
examples of each.

22 a. A dictionary variable d = {1: 10, 2: 20, 3: 30, 4: 40, 5:


. 50, 6: 60} is given. Perform the following operation.
CO
(i) Existence of given key A 6
5
(ii) Remove any one key
(iii) Pop( )
b. List some few common Exception types and explain CO
U 6
when they occur. 5

23 a. Create a String and access its elements in python and CO


R 6
. explain with an example. 5
b. Explain the following with suitable example CO R 6
(i) call by value and call by reference in python 3
function
(ii) Arguments in python function
COMPULSORY QUESTION
24 a. Illustrate the use of importing packages and modules in CO
R 6
. Python 6
b. Illustrate about the following methods associated with
the file object CO
R 6
i) read() ii) readline() iii) readlines() iv) tell() v) seek() 6
vi) write()
CO – COURSE OUTCOME BL – BLOOM’S LEVEL
COURSE OUTCOMES
CO1 Describe the fundamentals concepts of computer programming.
CO2 Infer the concepts of data types and expressions in python.
CO3 Demonstrate the usage of conditional and control statements in python
CO4 Illustrate strings, tuples and set with applications.
CO5 Solve problems using list and dictionaries.
CO6 Apply functions and modules for real-world applications.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 10 7 6 23
CO2 7 9 13 29
CO3 11 12 23
CO4 5 6 11
CO5 9 8 6 23
CO6 15 15
124
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS3001 Duration 3hrs


Course Name BLOCKCHAIN TECHNOLOGIES AND APPLICATIONS Max. Marks 100

Q.
C B
N Questions M
O L
o.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
1. a Discuss the importance of communication protocols in distributed CO U 10
. systems and compare different communication models. 1
b Explain the structure of a blockchain, including blocks, CO R 10
. transactions, cryptographic hashes, and the concept of a distributed 1
ledger.
(OR)
2. a Describe the lifecycle of a blockchain application, including the CO R 10
. stages of development, deployment, and operation. 1
b Compare traditional fault tolerance mechanisms such as CO U 10
. redundancy, and error correction codes with Byzantine fault 1
tolerance mechanisms in distributed systems.

3. a Describe different types of transactions commonly supported by CO R 10


. blockchain platforms. 2
b Explain the concept of cryptographic hashing and its role in CO U 10
. blockchain technology. 2
(OR)
4. a Illustrate an overview of Bitcoin as the first decentralized CO A 10
. cryptocurrency and its significance in developing blockchain 2
technology. Explain how Bitcoin addresses the problem of double
spending and ensures the security and integrity of transactions
without relying on a central authority.
b Determine the advantages and disadvantages of PoW and PoS CO A 10
. regarding security, decentralization, energy efficiency, and 2
scalability.

5. a Examine the high-level design architecture of the Ethereum CO A 10


. blockchain platform. 3
b Compare and contrast the key features and objectives of the Bitcoin CO U 10
. and Ethereum blockchain platforms. 3
(OR)
6. a Explain Decentralized Autonomous Organizations (DAOs) and CO U 10
. their role in facilitating decentralized governance and decision- 4
making.
b Identify key characteristics of Distributed applications (Dapps). CO R 10
. 5

7. a Describe the syntax and structure of Solidity smart contracts, CO U 20


. including declarations, functions, and modifiers. Also, appraise the 5
common security vulnerabilities and risks associated with Solidity
smart contract programming.
(OR)
8. a Explain the components of the Hyperledger Fabric architecture and CO U 20
. how they interact with each other during transaction processing. 4

COMPULSORY QUESTION
9. a Assume you are a blockchain compliance officer responsible for CO A 20
. ensuring Know Your Customer (KYC) compliance in a 6
decentralized finance (DeFi) platform. A user, Sarah, has initiated a
transaction involving a significant amount of cryptocurrency.
However, Sarah's identity verification process has raised red flags,
as her provided documents do not match the information stored on
the blockchain's immutable ledger. Additionally, there are
suspicions of Sarah's involvement in illicit activities based on
transaction patterns. Illustrate how you would address this KYC
compliance issue within the decentralized nature of the blockchain
while upholding regulatory standards and mitigating potential risks.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL M – MARKS ALLOTTED

COURSE OUTCOMES
CO1 Demonstrate the significance of decentralized systems, blockchain as a technology and its real
world use cases.
CO2 Illustrate the working principle of bitcoin and cryptocurrency.
CO3 Develop applications using the solidity programming language for ethereum.
CO4 Examine the functionalities and the working model of hyperledger.
CO5 Formulate privacy using channels and private data collections.
CO6 Design end to end business flow of an hyperledger application.

Assessment Pattern as per Bloom’s Level


CO / BL R U A An E C Total
CO1 20 20 - - - - 40
CO2 10 10 20 - - - 40
CO3 - 10 10 - - - 20
CO4 - 30 - - - - 30
CO5 10 20 - - - - 30
CO6 - - 20 - - - 20
180
END SEMESTER EXAMINATION – APRIL / MAY 2024

Course Code 23CS3003 Duration 3hrs


Course Name VIRTUAL REALITY TECHNOLOGY FOR INDUSTRY 4.0 Max. Marks 100

Q.
B
No Questions CO M
L
.
PART – A (4 X 20 = 80 MARKS)
(Answer all the Questions)
a Explain the role of input devices in allowing users to interact CO1 U 10
1.
. with virtual environments and control their actions.
b Illustrate the major challenges associated with implementing CO1 U 10
. immersive virtual reality systems for consumer use.
(OR)
a Discuss the concept of presence in VR and why it is a CO1 U 10
2.
. critical factor for creating immersive experiences.
b Express the significance of four key elements in creating an CO1 U 10
. immersive VR experience.

Discover the applications for HMDs, visual displays, and CO2 A 20


a sensual technology in fields such as gaming, education, or
3.
. healthcare, and discuss how each enhances the user
experience.
(OR)
Predict the role of sound displays in creating immersive CO2 A 20
a
4. multimedia experiences in gaming, virtual reality, and
.
entertainment.

Illustrate a real-world scenario where hand tracking CO3 A 20


a
5. technology is used for manipulation in VR in architectural n
.
design, and discuss its impact.
(OR)
Analyze the challenges and drawbacks of using anaglyph CO3 A 10
a
6. technology in VR, such as color limitations and potential eye n
.
strain.
b Explain the advantages of integrating geometric and CO3 A 10
. kinematics modeling in industrial robot design. n

Summarize the key milestones and developments in the CO4 U 10


a
7. history of virtual reality, from early experiments to
.
contemporary consumer VR.
b Explain the role of CFD in various engineering applications, CO4 U 10
. such as aerospace, automotive design, and environmental
studies.
(OR)
Assess the role of VR developers, hardware manufacturers, CO5 E 20
a and educators in promoting and enforcing VR usage
8.
. guidelines to ensure safe and enjoyable experiences.

PART – B (1 X 20 = 20 MARKS)
COMPULSORY QUESTION
Justify how Industry 4.0 is revolutionizing traditional CO6 E 20
a
9. industrial processes, with a focus on smart factories and
.
supply chain optimization.

CO – COURSE OUTCOME BL – BLOOM’S LEVEL

COURSE OUTCOMES
CO1 Identify the commercial applications of virtual technology and the effective usage of input
devices.
CO2 Distinguish the essential output devices, sound displays and graphics architecture and examine
the safety concerns related to VR.
CO3 Illustrate the VR hardware and the adaptability with Mobile devices.
CO4 Apply the VR Authoring and Computing architecture for VR.
CO5 Identify the VR Health and safety issues and the guidelines for proper VR usage.
CO6 Design the real-time applications using Virtual Reality for industry 4.0.

Assessment Pattern as per Bloom’s Taxonomy


CO / BL R U A An E C Total
CO1 - 40 - - - - 40
CO2 - - 40 - - - 40
CO3 - - - 40 - - 40
CO4 - 20 - - - - 20
CO5 - - - - 20 - 20
CO6 - - - - 20 - 20
180

You might also like