End Term 5th Sem
End Term 5th Sem
Q3 Q2 HoursPaper
Q9 Q8 07 Q6 Q5
(b) (a) (b) (a) (b) (a) (b) (a) (b) (a) (b) (i) Using {i)
Explain
Explain What What
algorithmswith Swapping
diagrarms. (iü) Explain
Demand
paging Write
(contiguous
i) mnemory What
ExplainSemaphores (i) Explain
Critical
section Write
(1) Briefly
FindWIrat
is short do
various the is a short ifnker's
Disk file?
FIFO you Producerexplain the are
various noteson: the
mean notes system
Discuss and algorithm,
file Deadlock contents
scheduling?
LRU on
access
directory by Consumer
the is
various page Paging? in
p-e methods. UNIT-IV UNIT-III following: recovery. safe
answer
need
of
structures OR replacement OR
Explain file allocation. Problem. OR state.
Compare
matrix? the
operations.
following
If
in any
it
algorithm Paging is,
detail.
find
three questions:
and the
s
disk Segmentation.
with safe
examples. sequence.
scheduling
(7.5) (7.5)
(5) (5 (7.5) (4.5)
(5(7.5)
) (5(7.8)
) (8)
Q2 Q1 Hours
Tine: 3 Paper (Please
Q3 compulsory.
Note:
ia Code: artte
a (b) a
Attempt our
73,28,54,68)
numbeTs:
IHustrate
best-cse algorithm
Dijkstra's
23,75,16,20,52,10,69] numbers
(48,Analyze 3.
step-by-step indicated
2.Teprescnting
1.Solve What indicated
3. 2.Tn) 1.SoBve Compare Explain
Differentiate
CompareP
Distinguish AIDS/AIML/
drewbacks.
Compare TËn)=4T{n/2)
Tin)=
T{nj=2T(n/3) T{n)=2Tn/2)
Tin)= Select EXAMINATION
TERM
END Rram
tbe is the fve
17
T{n/3)
the asymptotic 2T(n/2)3T(n/4)cn? + the the FIFTH
casescenarios. the Dijkstra following following Backtracking one Roll
Find ConvexBig-oh{O) questlons
Merge analysistimne the Greedy SEMESTER
+++ +3n², + Problems andNP question TOT-303 No.)
T(2n/3) n³ cn growth n²logn
out and complexity
recurrence analysis? recurrence
Sort
10 Hull
Approach
Bellman-Fordthe (Insertion T(1)=11 & and
+ rate Approach in
algorithm shortest
UNIT-I
n Branch
UNIT-I Little-oh any.from (B.TECH)
of of all
relations Discuss
functions. rclations with tncluding
Insertion
(Recurrence&
(Substitution
Method) TreeMethod)
(Master's
Method) (Iteration
Method)
(Recurrence
(Master's
Method)
Method)
Tree examnples.
and with each
Perlorm Selection with Subject:
and path
Algorithms Dynamic
techniques.
(o)
Bound notation.
JANUARY-2024
the an unit
analyze using using
on Sort& Cxample.
Merge
sort)
asymptotic question
Assume Algorlthm
the an an Programming. Design
with Selection Maximum
Marks:75 BramNo.
sort its following on appropriate appropriate
time their the
on notations mtssing no. &
complexity
the advantages
following
Sort. (3+3+3=9)
1 Analysls
graph (3+3+3=9) which
following method method
.0. (7) (8) Perform
(6) set
used data
using (6) (3) (3) (3 (3(3) is of
in & of as for as f
AIm/arDs
Q9 Q8 Q6 Q5
12
10
P.T.0.
using
(-2-1
the MST(8)
graph and find out
Consider the given weight of MST.
(a)
What is MST? Algorithm. Also, calculate the
05 Kruskal's &Prim's
9
I3
20
2 2
analyze
problem with an example. Also,
(b Discuss the traveling salesman (7)
its time complexity.
UNIT IV
a b) a) b) b) a)
a) b)
Q6
Q7 Q8 O9
Subfect:
Data
Mining
Maximum
Marks:
75 compulsory.
(3x3=13)
it ways an if
passenger
or data
determine
does withethical
(8)process.
(7) canstudent
(8)the(7) context
selecting
classification
removal
noise
two P.T.0.
(8) of Min(8)impact
(7)X={7,12,5,8,
any. Provide
predictiveassociated How Explain
beneficial.
different set
No.
ll
END
TERM
EXAMINATION How
regression. and A by
ñ analyze
mining education. the data potential
data, objectives. of responsible for data
ts mnining.
which the is to faces (KDD)? in techniques
and considerations to selection
X: ofthe
Exa 2024 missing clusteringa data attribute analysis
are linear wants its
techniques?
thethis descriptive
of used Databases Normalize
1 data and
JANUARYNo. primaryWhat this, ensurethe field any
Assume Explain Is step. be subset predictive
Q. station
where different X? dataset
lncluding
in
transformation? dodatabase. in thetechniques one13,3,4,5,13,8,7,6}
organizations
each set X Discuss
{115,233,484,543}.
its clustering
To ethical involved process. only for 1.0).
B.TECH regression?
analysis application Define in in feature
unlt. mining Discovery
data
deviation a -30
AT
explain screening
not. UNIT-I techniques?
illustrate UNIT-II
two includes for in
and OR the (0.0,
all each or
a evaluation?
steps classification
KDD of Discuss technique
OR
outcomes.
noise
8zMESTER data in of median? (range:
and of criminals challenges data significance
tn
from question Linear data
oftransformation?
data Justify.
task?
prediction
kept
real-world can to mean standard of
analysis
No.) questlonns concept
traditional security main the
Knowledge 12,
Mining mining
How exampleof data?
performance concept
role in
mining. 12,thethe A= normalization
Regression
Rol FrTH question useneed and
pattern involved subsets.
feature
12,19,7,the mining
|Paper
Code:
AIDS-305 ffve are the
mining. or given:
Bxam Data we we the a airport
the data an the the for is is the
fAve
Attempt
Note: scanned
passengers clustering What
What Find
any from of Discuss Describe is set techniques.
do
do example
Describe mining? of
ProvideExplore Explain
data Describe
data
your 3Hoursone
Time: DefineWhere is data stages
What data
5,9,13, is
Define
Attempt
differ Why What use data
wrlte of A max
Select An are ii) iii) on
i)
a) b) c) d) e)
Pleass n a) b) b)
a) a) b)
Q1 a) b)
Q2 Q3 Q4 Q5
(Please wrtte your Bxam Roll No.) Exam Roll No.
yThánge
(6xo-15)
(7)
(8)
(7)
(8)
(7)
(8)
(7)
(8)
(7)
(8)
(7)
(8)
USIT IY
(5)
(10)
(5)
(10)
(Please wrtte your Rxam Roll
No.) Exam Roll No.
AIDs/ArL 309