QPR668
QPR668
Page 1 of 2
truth table for the same.
F(A, B, C, D) = Σm(0, 1, 2, 5, 7, 8, 9, 10, 13, 15)
OR
6. a) Using K-maps, find the minimal Boolean expression for SOP representations and write the 9
truth table for the same.
f(w,x,y,z) = ∑ (1,3,4,6,9,11,14,15)
b) Simplify the following Boolean function, f(X, Y, Z) = ∏M (3,4,5,7) using K-map. 8
c) Write a Boolean expression for the output of the below circuit (figure 1) and simply using 8
Boolean laws.
Figure 1
UNIT – IV
7. a) List the differences between Combinational and Sequential Circuits. 6
b) Realize the truth table, Boolean expression, and logic circuit for Half subtractor & Half 10
Adder and explain the same
c) For the clocked D flip-flop, write the state table, draw the state diagram and the state 9
equation.
OR
8. a) Realize the truth table, Boolean expression, and logic diagram for Full subtractor and 8
explain the same.
b) Explain the 4-bit ring counter with a circuit diagram, truth table, and waveforms 9
c) Explain the 4:1 multiplexer with a circuit diagram, Boolean expression, and truth table. 8
Page 2 of 2
SRN
Page 1 of 2
OR
4. a) Build a JAVA program to create Bank class and a method will get input Bankname, 9
Customer name, Customer mobileno and Customer address, where Bank name should be
declared as static variable and display the output.
b) Constructors are used to construct new instances in java. Demonstrate the use of 6
parameterized constructor with an example.
c) Anonymous classes enable to make your code concise. What is anonymous class explain 10
with an example.
UNIT – III
5. a) Write a java program to create own exception for Negative Value Exception if the user 8
enter negative value.
b) What is inheritance? How inheritance is implemented in java? Develop aclass Book and 10
define display method to display book information. Inherit Reference Book and Magazine
classes from Book class and override display method of Book class in Reference Book and
Magazine classes. Make necessary assumptions required
c) Java finally block is a block that is used to execute important code. With syntax, 7
demonstrate the use of finally block with suitable example program.
OR
6. a) An exception is an unwanted event that interrupts the normal flow of the program. Define 10
exception. Why it is needed? Explain the different types of exceptions and the exception
hierarchy with appropriate examples using Java.
b) A child inherits the features of parents and also develops its own personality as it grows up 8
in the society, over a period of time. This situation can be represented by the concept of
multilevel inheritance in java programming. Apply the same concept in the car
manufacturing scenario in your own terms.
c) Enumeration means a list of named constant. Demonstrate program to show the working 7
of values(), ordinal() and valueOf() methods of enumeration
UNIT – IV
7 a) Generic functions can be called with different types of arguments based on the type of 8
arguments passed to generic method. Develop a JAVA program to show the working of user
defined generic functions
b) Generics helps to create classes, interfaces, and methods that can be used with different 9
types of objects (data). Hence, allows us to reuse our code. Explain restrictions and
limitations of generics
c) Set is an interface which extends Collection. It is an unordered collection of objects in 8
which duplicate values cannot be stored. Develop a Java code for adding elements in Set
OR
8 a) There may be times when you want to restrict the types that can be used as type 8
arguments in a parameterized type. Explain with a program example on how to implement
bounded types with generics.
b) The wildcard can be used in a variety of situations such as the type of a parameter, field, or 9
local variable; sometimes as a return type. Develop java program demonstrate Upper
Bounded Wildcards.
c) Illustrate the following, 8
i. Iterator ii. Collection interface iii. maps
***
Page 2 of 2
SRN
Page 1 of 2
b) Illustrate with example the basic operations of linked list. 7
c) Develop a C program to implement singly linked list with following operations: 10
i. Insert at beginning.
ii. Delete the specified node.
iii. Display elements in the linked list.
OR
6. a) Define Pointer in C. Explain pointer with an example C program 5
b) Very important predefined function used to allocate memory space dynamically is malloc( ). 10
Explain malloc( ) function with an example C program?
c) What is linked list? Explain the types of linked list in detail? 10
UNIT – IV
7. a) List and explain different types of representation of trees with an example? 10
b) What is binary tree? Explain the Properties and types of binary tree? 9
c) Define the following terms in tree traversal: 6
i) pre-order ii) post-order iii) in-order
OR
8. a) Define the following terminologies: 10
i. Tree ii. Binary Tree iii.Binary search Tree
b) Construct the binary tree from the following tree traversals: 5
Postorder: 8,4,5,2,6,7,3,1
Inorder: 4,8,2,5,1,6,3,7
c) Develop a C program to construct a Binary Search Tree using C. Print the elements in in- 10
order, preorder and post-order traversal techniques
***
Page 2 of 2
SRN
Page 1 of 2
UNIT – III
5. a) Specify the goals associated with Automating Agile ALM and evaluate their significance in 10
improving the software development process. Compare and contrast the outcomes of
adopting Automating Agile ALM with manual approaches?
b) Managing the software and systems lifecycle can be challenging. Discuss the managing 5
the lifecycle with ALM?
c) ALM tools should be used to manage the entire agile ALM. Discuss the broad scope of 10
ALM tools and how to achieve seamless integration?
OR
6. a) Discuss the systems and application design and code quality instrumentation in Agile 10
ALM?
b) The configuration management database (CMDB) is a great tool that many companies 10
have spent millions to implement. Discuss the concepts of supporting the CMDB and
driving DevOps in Agile ALM?
c) Illustrate how the Agile ALM deals with the Commercial versus Open-Source tools? 5
UNIT – IV
7. a) Explain in detail the goals of DevOps & why is DevOps important? 5
b) Quality assurance (QA) is any systematic process used to determine if a product or 10
service meets quality standards. Explain how QA is handled & the best practices adopted
in DevOps?
c) As part of your efforts to improve efficiency and reliability, you've decided to implement 10
Infrastructure as Code (IaC) practices. However, some team members are unsure about
what IaC entails and how it helps manage complexity in the DevOps environment.
Explain?
OR
8. a) Effective management and sharing of complex technical knowledge are a crucial aspect of 10
DevOps. Explain how knowledge is managed in DevOps?
b) A software development team tasked with migrating to DevOps practices within the 10
organization. Your team members are eager to understand the steps involved in
migrating to DevOps and implementing DevOps practices effectively. Elaborate the steps
involved in migrations & implementing DevOps?
c) What do we mean by “Shifting security to the left”? Explain in detail. 5
***
Page 2 of 2
SRN
Page 1 of 2
b) Explain the process of reading and writing to text files in python. 10
UNIT – IV
7. a) Illustrate how to handle data series in pandas with visualization. 10
b) Explain how to create arrays using python. 8
c) Explain any two universal array function in python. 7
OR
8. a) Illustrate how to handle data frames in pandas with visualization. 10
b) Explain how to indexing of arrays using python. 8
c) Explain processing of arrays with an example. 7
***
Page 2 of 2
SRN
q0 {q0,q1} {q0}
q1 Φ {q2}
q2 Φ Φ
OR
2. a) Construct DFA with transition tables over the binary language {0,1} to accept 9
i) L={W, and when interpreted as binary number must be a multiple of 2}
ii) Even number of zeros and odd number of ones
iii) Ends with 011
b) Convert the given NFA to DFA 7
Page 1 of 3
d) Define with examples i) Power set i)Language 4
UNIT – II
3. a) Regular Expressions are used for representing finite automata. Define Regular Expressions 6
b) Write Regular expressions for the following 6
i) Language starting with ‘a’ and ending with ‘b’
ii) Binary language having the third symbol from the right end is ‘0’
iii) Binary language strings having odd length
c) Design an epsilon NFA for the language ab(a+b)* 8
d) Convert the given automaton to regular expression by elimination of states method 5
OR
4. a) The Engineering students of a prestigious college want to obtain a regular expression for 6
the automata using elimination of states method. Help them
-> a a,b a
b) Design regular expressions for the following on {a,b} 6
i) L={W, and |W| mod 3 =0 }
ii) L={Starts and ends with different symbols}
iii) L={strings of length <=1}
Page 2 of 3
d) Find useless symbols, ϵ -productions and unit productions from the grammar with 7
productions and eliminate it.
S -> a | aA | B| C
A -> aB | ϵ
B -> aA
C -> cCD
D -> ddd
OR
8. a) Construct PDA for the language L= {0n1n | 0, 1 ϵ Σ and n>= 0}. 8
b) Define CNF and GNF. Convert the grammar into CNF 8
S -> aAD
A -> aB | bAB
B ->b
D ->d
c) Interpret the following grammar to CNF and GNF. 6
S -> aAS | bAB | aB | A
A -> bBB | aS | a |B
B -> bA | a
d) Find all ϵ- productions from the grammar and eliminate it. 3
S -> aS | AB
A -> ϵ
B-> ϵ
D -> b
***
Page 3 of 3
SRN
OR
2. a) Using truth tables, show that ( p q) r [( p r ) (q r )] 6
b) Construct the truth values for NAND and NOR. For any statements 𝑝, 𝑞 prove that 6
(i) ( p q) (p q) (ii)( p q) (p q)
c) Examine the validity of the following argument: 6
If I study, I will not fail in the examination.
If I do not watch TV in the evenings, I will study.
I failed in the examination.
…………………………
d) Prove that the following argument is valid where ‘c’ is the specification element of 7
Universe
x, p ( x) q ( x)
x, q ( x) r ( x)
r ( c )
p ( c )
Page 1 of 4
UNIT – II
3. a) Let A={1,2,3,4}, B={2,5}, C={3,4,7}. Write down the following: 6
A B , B A , A ( B C ) , ( A B) C
b) Let A={1,2,3,4,6} and R be a relation on A defined by aRb if and only if a is a multiple of b. 6
Represent the relation R as a matrix and draw its diagraph.
c) Let R be a relation on the set A={1,2,3,4} defined by xRy if and only if x divides y. Prove 6
that (A,R) is a POset. Draw its Hasse diagram.
d) Consider the Hasse diagram of a poset (A,R) given below. 7
d) ABC is an equilateral triangle whose sides are of length 1 cm each. If we select 5 points 7
inside the triangle, prove that at least two of these points are such that the distance
between them is less than ½ cm.
UNIT – III
5. a) Define with an example: Graph, multigraph, simple graph, directed graph, Complete 6
Graph, Bipartite Graph.
b) Determine |𝑉| for the following graphs. 6
i. G has nine edges and all vertices have degree 3
ii. G is 3-regular with 15 edges
iii. G has 10 edges with two vertices of degree 4 and all others of degree 3
c) Prove the following 6
i. A path with n vertices is of length n-1.
ii. If a cycle has n vertices, it has n edges.
Page 2 of 4
iii. The degree of every vertex in a cycle is 2.
d) In the graph given below find the number of paths from v1 to v8. How many of these 7
paths have length 5
OR
6. a) Explain the Konigsberg’s Bridge Problem and then give any one solution of the problem. 6
b) Prove that the number of vertices of odd degree in any graph is even. 6
c) Show that the following graphs are isomorphic 6
d) Define (i) connected (ii) not connected (ii) weakly connected and (iii) strongly connected 7
graphs with an example each.
UNIT – IV
7. a) Define with an example each Euler Trail, Euler circuit, Euler Graph, Hamiltonian path, 6
Hamiltonian Cycle, Hamiltonian Graph
b) Show that K5 (Kuratouski’s first graph ) is nonplanar graph. 6
c) Find the Chromatic number of the following graphs, 6
Page 3 of 4
d) State Max-flow and min-cut theorem and find the maximum flow possible Between the 7
vertices P and S in the network shown in figure.
18 Q 6 R
P
7 4 5
T 5 S
***
Page 4 of 4
SRN
Page 1 of 3
UNIT – III
5. a) Consider the following set of processes: 10
i. Draw Gantt Charts showing the execution of these processes using SRTF
ii. Compute the Average waiting time
iii. Calculate the average turnaround time
b) CPU scheduling more complex when multiple CPUs are available. Illustrate how Processor 10
affinity plays role in Multicore Processor Scheduling
c) List the different types of CPU Scheduling Algorithms? Briefly explain any one. 5
OR
6. a) Consider the following snapshot of a system 10
Page 2 of 3
c) Illustrate Deadlock detection 5
UNIT – IV
7. a) What is paging? With neat diagram explain the conversion of virtual address in paging 10
with suitable example.
b) With neat diagram, explain the structure of page table. 10
c) Illustrate how demand paging concept will work in Operating System. 5
OR
8. a) What is Memory Segmentation in Operating system, List out and explain the advantages 10
of memory segmentation?
b) When a file is used, information is read and accessed into computer memory and there 10
are several ways to access this information of the file. Explain methods used to access a
file in operating system.
c) Explain the various types of directory structures. 5
***
Page 3 of 3
SRN
OR
6. a) Explain knowledge engineering for planning. With an example of block world problem. 10
b) Define partial - order planning. Give the representation considering partial plans by 10
illustrating a problem
c) List the advantages and disadvantages of Bayesian Network 5
Page 1 of 2
UNIT – IV
7. a) Robotics is that branch of engineering that deals with conception, design, operation, and 10
manufacturing of robots. Discuss Issac’s three laws of Robotics
b) What is a robot sensor? How does a Robot Sensor Work? 10
c) Discuss the advantages and disadvantages of robot sensors. 5
OR
8. a) A robot is defined as a computer controlled machine that has the ability to move about in 10
its environment. Discuss some of the characteristics of the robot.
b) Road maps capture the connectivity of the robot’s free space in a network of one 10
dimensional curves or lines. Explain Road-Map Path Planning using visibility graph.
c) List and explain all the sensors used in autonomous vehicles 5
***
Page 2 of 2
SRN
OR
6. a) Explain knowledge engineering for planning. With an example of block world problem. 10
b) Define partial - order planning. Give the representation considering partial plans by 10
illustrating a problem
c) List the advantages and disadvantages of Bayesian Network 5
Page 1 of 2
UNIT – IV
7. a) Robotics is that branch of engineering that deals with conception, design, operation, and 10
manufacturing of robots. Discuss Issac’s three laws of Robotics
b) What is a robot sensor? How does a Robot Sensor Work? 10
c) Discuss the advantages and disadvantages of robot sensors. 5
OR
8. a) A robot is defined as a computer controlled machine that has the ability to move about in 10
its environment. Discuss some of the characteristics of the robot.
b) Road maps capture the connectivity of the robot’s free space in a network of one 10
dimensional curves or lines. Explain Road-Map Path Planning using visibility graph.
c) List and explain all the sensors used in autonomous vehicles 5
***
Page 2 of 2
SRN
4th Semester B.Tech (CSIT /AIML) Semester End Examination July 2024
Course Title: Computer Organization and Architecture
Course Code: B20EJ0401 – 85164
Time: 3 Hours Max. Marks: 100
Note:
1. Answer ONE FULL question from each unit.
2. Verify and ensure that question paper is completely printed before answering the question paper.
3. Any queries/discrepancies regarding the question paper, must be brought to the notice of the invigilator
4. Students must check the course title and course code before answering the question paper
UNIT – I Marks
1. a) Elaborate on the RISC and CISC features of ARM processors 4
b) Develop an ALP to find the sum of n numbers and store the result in a register. Check if 8
the result is odd or even. If odd store result in R2. Else in R5.
c) Discuss any three operating modes of ARM processor 9
d) List any 4 Assembler directives of ARM and mention the directions they give to the 4
Assembler
OR
2. a) Outline the Register structure of ARM Processor including CPSR 6
b) Explain the usage of Pre-indexed and Post-indexed addressing modes using LDR and STR 7
instructions
c) Highlight the action performed by the following instructions and assembler directives 8
supported by ARM processor
i. MOVS
ii. ERR
iii. BNE
iv. ENTRY
d) Develop an ALP to find the sum of odd numbers in the range 0 to 14 and store the result 4
in a register.
UNIT – II
3. a) Compute the product of 41 and 54 using a fast adder that adds summands by saving the 7
carry
b) Apply Booth’s Algorithm to find the product of +14 and +21 6
c) Show how (17.725)10 can be represented in 64-bit IEEE format 5
d) With the aid of the logic diagram of a sequential multiplier, demonstrate multiplication of 7
23 and 13.
OR
4. a) Apply Bit pair recoding multiplier Algorithm to find the product of -10 and +23 7
b) Demonstrate the division of 29 / 5 employing restoring division algorithm 6
c) Apply Non Restoring division Algorithm to perform division of 11 by 3 6
d) Derive the equations of Carry look ahead 4-bit adder and draw the circuit 6
UNIT – III
5. a) Discuss the distinguishing feature of Synchronous DRAMs. Compare the double data rate 8
SDRAMs and Rambus memory.
b) Develop Associative mapping function that maps 128 blocks of Cache with 2 blocks per 8
Page 1 of 2
set and a main memory having 4k blocks.
c) Outline the translation of Virtual address to Physical address by the MMU in Virtual 9
memory system.
OR
6. a) Memory Cells are organized in the form of an array. Show and explain the organization of 8
a 16* 8 Memory circuit.
b) Outline the organization of a 1K X 1 memory chip using static memory cells. How many 8
external connections does it provide?
c) Develop Set associative mapping function that maps 128 blocks of Cache with 2 blocks 9
per set and a main memory having 4k blocks.
UNIT – IV
7. a) Outline the Bus Arbitration scheme with the aid of a timing diagram for a case where 3 8
masters’ assigned priorities by the arbiter contend for the common bus.
b) Outline the read operation performed on a PCI bus for a 32-bit word transfer from 8
memory.
c) Detail the design interface for a 8-bit parallel output port used for connecting a display to 9
the Processor with the help of diagram.
OR
8. a) Stating the advantage of Asynchronous bus for data transfer, with the help of timing 8
diagram explain the input data transfer in an Asynchronous bus.
b) Demonstrate the serial interfacing of processor and I/O devices with the aid of a block 9
diagram.
c) Outline the concept of hardware multi-threading and compare and contrast UMA and 8
NUMA multiprocessors.
***
Page 2 of 2
SRN
Page 1 of 2
b) Apply the concept of Direct Memory Access (DMA) to optimize data transfer in a 8
multimedia processing application. Implement a DMA controller design that efficiently
transfers large amounts of data between external storage and memory, taking into
account data integrity and system resource management.
c) Develop set associative mapping function that maps 128 blocks of cache with 2 blocks per 8
set and a main memory having 4K blocks
OR
6. a) Analyze the memory hierarchy of a modern computer system and identify potential 6
bottlenecks. Propose optimization strategies, such as cache management policies or virtual
memory, to enhance overall system performance while considering trade-offs between
speed, cost, and complexity.
b) Outline the organization of 2MX32 memory that can be built using 512KX8 memory chips. 9
c) Sketch a Static RAM cell and a Dynamic RAM cell and discuss how read and write operation 10
can be performed by the cell?
UNIT – IV
7. a) 9
Demonstrate the Serial interfacing of keyboard to processor connection and display to
processor connection with the aid of a block diagram.
b) Implement an arbitration mechanism for a shared bus architecture used in a multi-core 8
processor. Analyze the performance of the arbitration scheme under different traffic loads
and contention scenarios, and propose optimizations to minimize latency and maximize
throughput.
c) Develop interface circuits for connecting peripheral devices to a computer system using 8
industry-standard protocols such as USB and PCIe. Optimize the design to ensure
compatibility with a wide range of devices while maintaining high-speed data transfer rates
and minimizing power consumption.
OR
8. a) Demonstrate the parallel interfacing of keyboard to processor connection and display to 10
processor connection with the aid of a block diagram.
b) Explain concept of master slave in read and write operation with a detailed timing diagram 8
for synchronous bus.
c) Explain in detail Ring based and crossbar inter connection networks 7
***
Page 2 of 2
SRN
Page 1 of 2
b) Outline the working of the following of the ARM Instructions with one example for each. 8
i. LDMIA ii. MVN iii. TST iV. BEQ
c) Explain each block of the architecture of an ARM processor with a figure and demonstrate 10
the fetch, decode, and execution phases of instruction execution in an ARM Processor.
UNIT – III
5. a) A main memory having 4K blocks and Cache with 128 blocks have to be mapped using Set 9
associative mapping function. Two adjacent blocks of the Cache form a set. Detail the
mapping function scheme that performs the mapping task.
b) Detail the registers of the DMA controller used for direct memory access by the processor 8
with a diagram.
c) Outline the memory organization of a 1K X 1 memory chip and how many external 8
connections is required.
OR
6. a) Sketch a Static RAM cell and a Dynamic RAM cell and discuss how Read and write 10
operations can be performed by the cell?
b) Show the Organization of 32M X 8 memory that uses Synchronous DRAMS. When do the 8
cells get refreshed?
c) Outline the memory hierarchy of different types of memory used in a memory system. 7
UNIT – IV
7. a) Define USB and explain about USB serial bus structure in detail 8
b) Outline the Bus Arbitration scheme with the aid of a timing diagram for a case where 3 8
masters’ assigned priorities by the arbiter contend for the common bus.
c) Demonstrate the serial interfacing of processor and I/O devices with the aid of a block 9
diagram
OR
8. a) Outline the PCI Interconnection standard and show the PCI express connections. 8
b) Explain with a neat sketch the working of a single bus structure 7
c) Demonstrate the Parallel interfacing of processor and I/O devices with the aid of a block 10
diagram
***
Page 2 of 2
SRN
cExplain the Decrease and Conquer Technique. What is Topological Sorting. With an 7
c)
cexample, illustrate the Source Removal Algorithm
Page 1 of 3
OR
4. a) Design an algorithm to sort n elements using Selection sort and analyze its time 10
complexity. Sort the given list using Selection sort 64, 25, 12, 22, 11
b) Outline the Brute force string matching algorithm and solve the following example using 8
below example and bring out its time complexity
Text: WELCOME_TO_REVA_UNIVERSITY Substring: NIV
c) Summarize the algorithm for Quick Sort and write its Time Complexity. 7
UNIT-III
5. a) Apply Warshalls algorithm to find the transitive closure of the relation R={(2,1) (2,3) (3,1) 10
(3,4) (4,1) (4,3)} on set A={1,2,3,4}. Draw the adjacency matrix and the Transitive closure
matrix. Determine the Time Complexity
b) What do you mean by Minimum Spanning Tree? Apply Kruskals Algorithm to obtain the 8
MST for the graph below. Obtain its Time Complexity
c) Using Floyds Algorithm, find the shortest distance between every pair of vertices 7
OR
6. a) Develop a Knapsack Algorithm and obtain its Time Complexity. Solve the Knapsack 10
problem having weights and profits as
Weights: { 3, 4, 6, 5}
Profits: { 2, 3, 1, 4}
The weight of the knapsack is 8 kg
The number of items is 4
b) Describe Dijkstra's Algorithm for finding the shortest path from a single source vertex to 8
all other vertices in a weighted graph. Discuss the time complexity of the algorithm
c) Explain Prim's algorithm for finding the Minimum Spanning Tree (MST) of a connected, 7
undirected graph. Provide a detailed step-by-step description of the algorithm.
Additionally, given the following weighted graph, apply Prim's algorithm to determine the
MST and specify the total weight of the MST. Choose B as the starting vertex,
Page 2 of 3
UNIT – IV
7. a) Explain the concept of Dynamic Programming? Write the algorithms for Comparison 10
Counting and Distribution Counting.
Sort the given list of numbers using Distribution Counting
13,11,12,13,12,12
b) Summarize on the topics (i) Dynamic programming (ii) Subset-Sum problem 8
c) Apply the branch and bound algorithm to solve the following travelling salesman problem 7
OR
8. a) Discuss the concept of Branch and Bound. Compared to backtracking, list the two 10
additional items needed by Branch and Bound. Apply Branch and Bound Technique to
solve the following assignment problem.
Job1 Job2 Job3 Job4
Person a 9 2 7 8
Person b 6 4 3 7
Person c 5 8 1 8
Person d 7 6 9 4
b) Outline the algorithm for backtracking. Draw the state space tree for solving four queens 8
problem by Backtracking
c) Outline Horspools Algorithm for String Matching 7
***
Page 3 of 3
SRN
Page 1 of 3
c) Solve the following recurrence relations using Master’s theorem. 5
(i) T(n)=2T(n/2)+1
(ii) T(n)=2T(n/2)+n
UNIT – III
5. a) Illustrate single source shortest path problem for the given graph to find the shortest 10
distance from source vertex to all other vertices. Assume vertex ‘5’ as source.
b) Illustrate with step by step procedure to construct minimum spanning tree of a graph 10
shown below, using an algorithm which visits source vertex first and visits next nearest
vertex later and so on. Consider vertex ‘a’ as the source.
c) In greedy approach, the problem is divided into small steps, in each step an optimal 5
solution is found, leading to overall global optimal solution when all the steps are solved.
Explain Knapsack algorithm, a greedy technique with an example.
OR
6. a) Solve all pairs shortest path problem for the given graph using Floyd’s algorithm. 10
b) Outline an algorithm to find transitive closure for a given directed graph and illustrate the 10
Page 2 of 3
same with step by step procedure to find path matrix for a given directed graph.
c) With an example graph, explain Kruskal’s algorithm used to find minimum spanning tree. 5
UNIT – IV
7. a) With pseudo code, explain how the searching for a pattern BARBER in the given text 10
JIM_SAW_ME_IN_BARBER_SHOP is performed using string matching algorithm which
shifts the pattern based on shift value.
b) Develop a sorting algorithm for a given set of positive integers which uses counting array 10
to sort the elements and analyze its time efficiency.
c) Explain travelling salesman problem with an example graph. 5
OR
8. a) With necessary state space tree diagram, illustrate the 4 queen’s problem which uses 10
backtracking technique.
b) Outline the backtracking method to solve the following instance of sum of subset problem: 10
S= {3, 5, 6, 7} and d=15.
c) Apply the sorting technique that uses the concept of comparison to sort the following 5
elements in ascending order.
92, 2, 39, 72, 41, 53
***
Page 3 of 3
SRN
Page 1 of 2
b) Explain the syntax and usage of the INSERT INTO statement in SQL. Provide examples of 7
inserting a single row, multiple rows, and inserting data from another table.
c) Describe the DELETE statement in SQL. What are the consequences of omitting the WHERE 8
clause in a DELETE operation? Provide an example to delete specific records and explain
how to delete all records in a table safely.
UNIT – IV
7. a) Explain about functional dependency and its impact on the database? 10
b) Describe the criteria that a table must meet to be in 2NF. Give example. 5
c) Given the following table, identify if it is in 3NF. If not, explain why and show how to convert it to 10
3NF.
CREATE TABLE Students (
Student ID INT,
Student Name VARCHAR(100),
Advisor ID INT,
Advisor Name VARCHAR(100)
);
OR
8. a) Demonstrate the 3NF and BCNF with example. 10
b) Describe about the main informal design guidelines for relational schemas in database 5
design?
c) Given the following table, identify if it is in 2NF. If not, explain why and show how to 10
convert it to 2NF.
CREATE TABLE Orders (
Order ID INT,
Product ID INT,
Quantity INT,
Product Name VARCHAR(100),
Product Price DECIMAL(10, 2)
);
***
Page 2 of 2
SRN
i. For every project located in ‘Stafford’, list the project number, the controlling
department number, and the department manager’s last name, address, and
birthdate.
ii. Retrieve the birthdate and address of the employee(s) whose name is ‘John B.
Smith’
iii. Retrieve the name and address of all employees who work for the ‘Research’
department.
iv. Retrieve the salary of every employee
v. Find the details of employees and number of hours who work on project
“Computerization”.
c) Illustrate SQL query with ‘group by’ and ‘having’ clauses. 5
OR
6. a) Discuss with illustration about nested subquery. 10
b) Consider the following schema for a LibraryDatabase. Write SQL queries for the given 10
schema:
BOOK(Book_id, Title, Publisher_Name, Pub_Year)
BOOK_AUTHORS (Book_id, Author_Name)
PUBLISHER (Name, Address, Phone)
BOOK_COPIES (Book_id, Branch_id, No-of_Copies)
BOOK_LENDING (Book_id, Branch_id, Card_No, Date_Out, Due_Date)
LIBRARY_BRANCH (Branch_id, Branch_Name, Address)
i. Retrieve details of all books in the library – id, title, name of publisher, authors,
number of copies in each branch etc.
ii. Get the particulars of borrowers who have borrowed more than 3 books, but from
Jan 2017 to Jun2017.
iii. Delete a book in BOOK table. Update the contents of other tables to reflect this
data manipulation operation.
iv. Create a view of all books and its number of copies that are currently available in
the library.
c) How are views created and dropped? 5
UNIT – IV
7. a) Explain the informal design guidelines used as measures to determine the quality of 10
relation schema design.
b) Discuss Insertion, deletion and updation anomalies. Why are they considered bad? 10
Illustrate with an example
c) Define Normalization process. What is the need for normalization? 5
OR
8. a) Define Normal form. Explain 1NF, 2NF and 3NF with suitable examples for each. 10
b) Define Functional Dependency with an example. Explain Armstrong’s Inference Rules. 10
c) Explain BCNF with suitable example. 5
***
Page 2 of 2
SRN
4th Semester B.Tech C & IT (AIML/CSIT/CSSE/ISE) Semester End Examination July 2024
Course Title: Programming with JAVA
Course Code: B22CI0404 - 24122407
Time: 3 Hours Max. Marks: 100
Note:
1. Answer ONE FULL question from each unit.
2. Verify and ensure that the question paper is completely printed before answering the question paper.
3. Any queries/discrepancies regarding the question paper, must be brought to the notice of the invigilator
4. Students must check the course title and course code before answering the question paper
UNIT – I Marks
1. a) Java is a feature rich language. Explain any 5 features of java and also demonstrate 10
execution procedure of simple java program.
b) Develop a Java program to input 5-digit integer and print the following 10
i. Sum and average of individual digits.
ii. Check whether input integer is palindrome or not.
c) Suppose one of your friends is having trouble compiling their Java program named 5
"CalculateArea.java". They keep getting an error saying "cannot find symbol" for the line
where they declare a variable. Illustrate some common reasons why this error might
occur, and how can they troubleshoot it?
OR
2. a) Compare While loop with for loop and demonstrate with java program to find factorial 10
of a number.
b) Define Arrays and its types. Explain the different methods to create and initialize the 10
types of arrays. Develop a JAVA program to create a bank database with
account_number, customer_name, branch_name, as its members. Create “n” customer
details using array of objects to input the values for data members by reading the input
from the user and display the same. Justify the output for at least 3 objects.
c) Rama wants to initialize a variable randomNumber with a random value between 1 and 5
100. Demonstrate how can he achieve this in Java?
UNIT – II
3. a) Illustrate a class and object; Construct a Book class with attributes title, author, isbn, 10
price; Demonstrate it by using parameterized constructor to assign and display 3 book
details.
b) Illustrate how to implement Static, Default and Private Methods in interface with 10
suitable example.
c) Outline inner class; Demonstrate with simple program. 5
OR
4. a) Demonstrate steps to create and run custom package and how to access from another 10
package.
b) Compare Interface with class. Justify with example program how to achieve abstraction 10
using interface.
c) Explain concept of lambda expression with syntax and example program. 5
Page 1 of 2
UNIT – III
5. a) Illustrate “final” keyword usage in variable, method and class with suitable example 10
program.
b) Differentiate method overriding and method overloading. Create a java program that 10
demonstrates method overriding.
c) Develop a java program to create own exception for Negative Value Exception if the user 5
enter negative value.
OR
6. a) What is inheritance? How inheritance is implemented in java? Develop a class Book and 10
define display method to display book information. Inherit Reference_Book and
Magazine classes from Book class and override display method of Book class in
Reference_Book and Magazine classes. Make necessary assumptions required.
b) super can be used to refer immediate parent class instance variable, parent class 10
method and parent class constructor ;justify with suitable example program.
c) Enumeration means a list of named constant. Demonstrate program to show the 5
working of values(), ordinal() and valueOf() methods of enumeration.
UNIT – IV
7. a) Demonstrate any 5 ArrayList collection methods with suitable program. 10
b) Develop a program to add 5 integers 10, 20, 30, 40, 50 to a List, Traverse the list using 10
iterator and remove the element if it equal to 30.
c) Generic functions can be called with different types of arguments based on the type of 5
arguments passed to generic method. Illustrate a JAVA program to show the working of
user defined generic functions.
OR
8. a) Define Iterator? Develop a program to iterate array of elements using collections. 10
b) The Java platform includes a collections framework. What is java collection framework? 10
Explain hierarchy of collection framework.
c) Generics helps to create classes, interfaces, and methods that can be used with different 5
types of objects (data). Hence, allows us to reuse our code. Explain restrictions and
limitations of generics.
***
Page 2 of 2
SRN
Page 1 of 2
c) What is custom exceptions? Develop a program to demonstrate the use of custom 10
exception
OR
6. a) Identify the various java exception class with neat sketch and explain the types of 10
exception handling.
b) Illustrate finally block with an example program 8
c) Compare throw and throws. Develop a java program to demonstrate the use of throw 7
and throws
UNIT – IV
7. a) Elucidate generic method. Write a java program to demonstrate generic method 7
b) Explain the restriction on generic 8
c) What are wildcards? explain different type of wild cards 10
OR
8. a) Develop a program to illustrate the use of both one type and two type parameter for 7
Generic classes. Justify the program with output.
b) Describe the hierarchy of collection frame work with neat sketch 8
c) Discuss the following with an example program 10
i. Maps
ii. Iterators
***
Page 2 of 2
SRN
b) Apply Newton – Rapson method to find an approximate root, correct to three decimal places 6
of the equation x – 3x - 5 = 0 which lies near x = 2.
3
c) Using Lagrange’s interpolation formula, find f(11) from the following data: 6
x 2 5 8 14
Page 1 of 3
d) A curve is drawn to pass through the points given by the following table 7
Using
(i) Weddle’s rule and,
(ii) Simpon’s 1/3rd rule find the area bounded by the curve, the x – axis and lines x = 1, x = 4.
OR
4. a) The area of a circle (A) corresponding to the diameter (D) is given below: 6
D 80 85 90 95 100
A 5026 5674 6362 7088 7854
Find the area corresponding to the diameter 105 using an appropriate interpolation formula.
y = f(x) 10 12 15 19
d) Given 7
x 1 2 3 4 5 6 7
y = f(x) 2.105 2.808 3.614 4.604 5.857 7.451 9.467
7
UNIT – III
5. a) Show that the intersection of any two subspaces of a vector space V over a field F is also a 6
subspace of V.
b) If , , are linearly independent in V(F), prove that the vectors , , 2 6
are also linearly independent.
c) If 𝑇: 𝑉3 (𝑅) → 𝑉3 (𝑅)is defined by 𝑇(𝑥, 𝑦, 𝑧) = (𝑥 + 𝑦, 𝑦 + 𝑧) ,show that T is the linear 6
transformation.
d) Given X1 = (1, 1, 1,1), X2 = (0, 1, 1,1), X3 = (0, 0, 1,1), use Gram-Schmidt process to find the 7
orthogonal and orthonormal basis.
OR
6. a) Prove that the set 𝑊 = {(𝑥, 𝑦, 𝑧): 𝑥 − 3𝑦 + 4𝑧 = 0} of the vector space 𝑉3 (𝑅) 6
is a subspace of 𝑉3 (𝑅).
b) Show that the set of vectors {(1,0,0), (0,1,0), (0,0,1)} is basis for three dimensional vector 6
space V[R].
Page 2 of 3
c) Find the matrix of the linear transformation 𝑇: 𝑉2 (𝑅) → 𝑉3 (𝑅)is defined by 6
𝑇(𝑥, 𝑦) = (𝑥 + 𝑦, 𝑥, 3𝑥 − 𝑦) with respect to basis 𝐵1 = {(1,1), (3,1)}
and 𝐵2 = {(1,1,1), (1,1,0), (1,0,0)}.
d) Given X1 = (1, 1, 1), X2 = (0, 1, 1), X3 = (0, 0, 1), use Gram-Schmidt process find the orthogonal 7
and orthonormal basis.
UNIT – IV
7. a) Solve the LPP by the graphical method, Minimize 𝑍 = 5𝑥 + 4𝑦 subject to the conditions 8
𝑥 + 2𝑦 ≥ 10, 𝑥 + 𝑦 ≥ 8, 2𝑥 + 𝑦 ≥ 12, where 𝑥, 𝑦 ≥ 0.
b) Find the basic feasible solution using North west corner method for the following 8
transportation problem.
Cost Matrix:
D1 D2 D3 D4 supply
S1 9 4 6 3 15
S2 2 7 5 8 25
S3 3 4 7 2 10
Demand 20 15 20 10
c) Solve the LPP by simplex method, Maximize 𝑍 = 𝑥 + 11𝑦 subject to the conditions 9
2𝑥 + 𝑦 ≤ 104, 𝑥 + 2𝑦 ≤ 76, 𝑥, 𝑦 ≥ 0.
OR
8. a) Use the Hungarian method to solve the given assignment problem stated in the table. The 8
entries in the matrix represent each man’s processing time in hours.
I II III IV V
1 20 15 18 20 25
2 18 20 12 14 15
3 21 23 25 27 25
4 17 18 21 23 20
5 18 18 16 19 20
b) Solve the LPP by the graphical method ,Maximize 𝑍 = 𝑥 + 1.5𝑦 subject to the conditions 8
𝑥 + 2𝑦 ≤ 160, 3𝑥 + 2𝑦 ≤ 240, 𝑥, 𝑦 ≥ 0
c) Solve the L.P.P. by Bigger method, Maximize 𝑍 = 𝑥 + 2𝑦 9
subject to the conditions : 𝑥 − 𝑦 ≥ 3, 2𝑥 + 𝑦 ≤ 10, 𝑥, 𝑦 ≥ 0
***
Page 3 of 3
SRN
Page 1 of 2
UNIT – III
5. a) Explain MAC Protocol and its application using a block diagram. 10
b) Bluetooth is a wireless LAN technology designed to connect devices such as telephones, 10
computers, cameras, printers and so on. Illustrate with neat diagrams the two types of
Bluetooth networks: piconet and scatternet.
c) Demonstrate on Geostationary Earth Orbit (GEO) Satellites. 5
OR
6. a) Analyze IPv4 using a representation of Datagram format and its role in a peer to peer 10
communication for large networking grounds
b) Explain Network Address Translation (NAT) using a case study or example. 10
c) Infer Border Gateway Protocol (BGP) 5
UNIT – IV
7. a) Solve a single source shortest routing protocol principles on the below mentioned graph, 10
with A as source
b) Demonstrate with a supporting diagram the Stop and Wait ARQ protocol. 10
c) Draw and label all the fields of TCP segment format. 5
OR
8. a) Consider the graph shown below, it has a source and route high-lighted for communication. 10
Justify the best shortest path using Bellman Ford approach.
***
Page 2 of 2
SRN
Day A1 A2 A3 Classification
1 True Hot High No
2 True Hot High No
3 False Hot High Yes
4 False Cool Normal Yes
5 False Cool Normal Yes
6 True Cool High No
7 True Hot High No
8 True Hot Normal Yes
9 False Cool Normal Yes
10 False Cool High No
Page 1 of 3
4. a) The following data gives data about stolen vehicles. Using Naïve bayes classifier, classify 10
the new data.
Color Type Origin Stolen
Red Sports Domestic Yes
Red Sports Domestic No
Red Sports Domestic Yes
Yellow Sports Domestic No
Yellow Sports Imported Yes
Yellow SUV Imported No
Yellow SUV Imported Yes
Yellow SUV Domestic No
Red SUV Imported No
Red Sports Imported Yes
b) Explain the concept of Support Vector Machine. With a code Snippet in python, Illustrate 8
the implementation of Support Vector Machine.
c) With an example, Illustrate Random Forest Algorithm. 7
UNIT – III
5. a) Explain K-Means Clustering Algorithm with an example. What are its Limitations. 8
b) Outline Agglomerative Hierarchical clustering algorithm, with different proximity clusters. 7
c) Apply linear regression to a given dataset of housing prices. Choose appropriate features, 10
interpret the coefficients, and predict housing prices for new data points. Discuss the
practical implications of the model's predictions.
OR
6. a) Demonstrate DBSCAN algorithm for clustering. 8
b) Illustrate Meanshift clustering algorithm 7
c) Train a random forest regression model on a dataset predicting energy consumption. 10
Analyze and interpret the feature important scores. Discuss how these scores can guide
decision-makers in identifying key factors influencing energy consumption patterns.
UNIT – IV
7. a) Imagine the most famous humanoid Robot Sophia and human by name Suman. Sophia 10
works with Artificial Neural Networks and Suman being human with Biological Neural
Networks. Illustrate how Sophia and Suman differ with respect to the characteristics
speed, size and complexity, storage and fault tolerance. Also list some commercial
practical applications of ANN.2
b) In Artificial neural networks, activation functions are one of the important concepts. They 8
may be used to calculate the output response of a neuron. There may be linear as well as
nonlinear activation functions. Describe and analyze the various linear and nonlinear
activation functions with necessary mathematical equations and diagram
c) Explain the characteristics of Back Propagation algorithm. 7
Page 2 of 3
OR
8. a) Sometimes in training the neural networks along with a series of sample inputs and 10
comparing the output with the expected responses, the neural networks are classified as
supervised training, unsupervised training and reinforcement training. Describe and justify
how these training methods are different. Give examples for each of these training
methods
b) Explain Gradient Descent algorithm and discuss its various types. 7
c) Demonstrate the applications of Neural Networks which is used for learning to steer an 8
autonomous vehicle.
***
Page 3 of 3
SRN
Page 1 of 2
b) A forensic analyst is working with a low-resolution surveillance image that contains 8
important details but is too blurry to identify the key features. How can high pass frequency
domain filters be used to sharpen the image and make the details more visible, and what
parameters of the filters should be adjusted to optimize the results?
c) An image is degraded by a blur caused by an out-of-focus camera lens. Examine how can 9
the Fourier transform be used to restore the image by removing the blur, and what
challenges might arise during the restoration process?
UNIT – III
5. a) In imaging, noise emerges as an artifact in the image that appears as a grainy structure 13
covering the image. discuss different types of noises can appear in the image.
b) Discover some of the band reject filters which is helpful for removing noise. 12
OR
6. a) Noise in an image is the presence of artifacts that do not originate from the original scene 10
content. Generally, noise is a statistical variation of a measurement created by a random
process. Explain Speckle Noise and Poisson Noise.
b) Compare the difference between bandpass filter and band reject filter 10
c) Analyze the gaussian noise with example 5
UNIT – IV
7. a) The skeleton features of objects can be obtained using dilation and erosion techniques. 10
Distinguish erosion and dilation techniques. Give example for each technique.
b) Describe the segmentation technique with the help of python program. 10
c) Explain the following color image processing techniques. 5
- Pseudo color image processing
- Full color image processing
OR
8. a) Color features of images play significant role in object detection and recognition tasks, can 13
you discover various color models of images.
b) Demonstrate Edge detection technique with the help of program. 12
***
Page 2 of 2
SRN
Page 1 of 2
b) Identify the common characteristics of multitenant applications and explain them. 10
c) Differentiate between On-premise IT resources and Cloud-based IT resources. 5
UNIT – III
5. a) Illustrate the concept of a Virtual server with neat sketches and also explain how virtual 10
servers are created via hypervisor and VIM (Virtualization Infrastructure Management).
b) Explain the concepts of Resource Management Systems and Billing Management Systems 10
with neat sketches.
c) Outline the mechanism of Audit monitor in cloud with neat diagram. 5
OR
6. a) Explain the concept of Resource Replication in cloud with neat sketches. 10
b) Discuss the concept of Load Balancer with respect to: 10
(i) Asymmetric distribution
(ii) Workload prioritization
(iii) Content-aware distribution
c) Illustrate the mechanism of SLA management mechanism with neat diagram. 5
UNIT – IV
7. a) Xen is a microkernel hypervisor, which separates the policy from the mechanism. Draw 10
and explain the architecture of Xen.
b) Explain OS-Level Virtualization. Also discuss on advantages and disadvantages of OS 10
Extensions.
c) Memory can be virtualized so that requirements of storage for huge number of consumers 5
can be fulfilled. Describe how memory can be virtualized using two level mapping diagram
OR
8. a) Illustrate Xen hypervisor, along with the Xen architecture’s special domain 0 for control 10
and I/O, and several guest domains for user applications.
b) Explain how CPU can be virtualized using example of Intel hardware- assisted CPU 10
virtualization
c) Describe on following terms: 5
(i) Full Virtualization
(ii) Host-Based Virtualization
***
Page 2 of 2
SRN
Page 1 of 2
OR
6. a) Explain about homogeneous Transformations in Robotics kinematics. 10
b) With suitable sketch, explain the principle of working of the following sensors: 9
(i) Touch Sensor (ii) optical sensor (iii) Tactile Sensors
c) Demonstrate the working principle of Range sensors. 6
UNIT – IV
7. a) Describe the various considerations taken into account for material handling. 8
b) Explain the functions of work cell controller with appropriate examples. 10
c) Interpret the requirements of Robot Spray Coating applications along with its benefits. 5
d) Differentiate palletizing and DE palletizing. 2
OR
8. a) Explain the working principle of Mobile robot cells. 8
b) Illustrate the desirable features of a robot for successful machine tool load/unload 5
applications?
c) Write a note on below stated robot applications
(i) Spray painting 12
(ii) Welding
(iii) Die casting
***
Page 2 of 2
SRN
Page 1 of 2
UNIT – III
5. a) A weather forecasting agency wants to analyze historical weather data from various sources 10
to improve the accuracy of its forecasts. How could MapReduce be used to process this vast
amount of data and generate more precise predictions?
b) In the context of MapReduce, data flows through various stages including mapping, 5
shuffling, and reducing. Outline the data flow for a single reduce task and multiple reduce
tasks in a MapReduce framework
c) Let us say we have a text file sample.txt with following words: Dear, Bear, River, Car, Car, 10
River, Deer, Car and Bear Using MapReduce find the word count. Using a diagram explain
each step followed during MapReduce process
OR
6. a) Shuffle phase in Hadoop transfers the map output from Mapper to a Reducer in 10
MapReduce. Sort phase in Map Reduce covers the merging and sorting of map outputs.
With the help of a neat diagram, illustrate the process of shuffle and sort in classic
MapReduce.
b) The combiner function is an optional intermediate step that runs on the output of the 10
mapper, before the data is shuffled and sent to the reducers. With the help of an example,
illustrate the functionality of combiner function used in Hadoop MapReduce Programs
c) Imagine you are working on a MapReduce job to analyze website access logs. Each log entry 5
contains the user's IP address, timestamp, and accessed URL. How does the shuffling and
sorting phase help in grouping together log entries from the same IP address and sorting
them based on the timestamp?
UNIT – IV
7. a) Hive supports various primitive and complex data types. Explore the different data types 5
supported by Hive
b) Explain the data types of PIG. Outline the different types of metastores and their relevant 10
functionalities that are used by Hive
c) In Hive, data units are organized into tables, which are then further subdivided into 10
partitions and buckets. Let's break down each of these data units: Explain the Data units of
Hive and also infer the usage of Partitioning and Bucketing with an example and diagram
OR
8. a) What is Pig? Explain the Anatomy of Pig 5
b) Create a data file for below schema: Customer: CustomerID, CustomerName, LifeTimeValue 10
Write a Pig Script to split customers for reward program based on their life time values by
considering the below input data. i. If Life Time Value is >1000 and <=20000 → Silver
Program ii. If Life Time Value is >20000 → Gold Program
CustomerID, CustomerName, LifeTimeValue
1, Alice, 1500
2, Bob, 8000
3, Charlie, 25000
4, David, 500
5, Eve, 18000
c) What is Apache PIG? Why we should use Apache PIG? Explain execution of PIG Latin script in 10
detail with an aid of diagram, Enumerate the DDL and DML statements that are used in Hive.
***
Page 2 of 2
SRN
Page 1 of 2
UNIT – III
5. a) Explain the architecture of a Recurrent Neural Network (RNN) and its components. 10
b) Compare and contrast Recurrent Neural Networks (RNNs) with Convolutional Neural 10
Networks (CNNs), highlighting their strengths and weaknesses.
c) Discuss the role of the output gate in Long Short-Term Memory (LSTM) networks. 5
OR
6. a) What is the vanishing gradient problem in Recurrent Neural Networks (RNNs), and how 10
does it affect training?
b) Discuss the Long Short-Term Memory (LSTM) architecture and its advantages over 10
traditional Recurrent Neural Networks (RNNs).
c) Explain the architecture of a Gated Recurrent Unit (GRU) cell and its key components. 5
UNIT – IV
7. a) What is the primary objective of a Generative Adversarial Network (GAN) and how does it 10
differ from traditional neural network models?
b) Describe the architecture of a Denoising Autoencoder. Explain the role of each component 10
c) What is the primary objective of a Graph Neural Network (GNN) and how does it differ 5
from traditional neural networks?
OR
8. a) Describe the architecture of a Generative Adversarial Network (GAN) and the role of each 10
component.
b) What is the fundamental objective of an autoencoder and how does it differ from other 10
generative models like GANs?
c) What are some common tasks that Graph Neural Networks (GNNs) are used for? 5
`***
Page 2 of 2
SRN
Page 1 of 2
Rule3: If B then E
Rule4: If G then D Prove “If A and B True, then D is True”
c) Discuss the advantages and limitations of production systems compared to other 5
approaches in knowledge-based systems.
UNIT – III
5. a) Frames are a fundamental concept in artificial intelligence and knowledge representation, 10
used to organize and store information about objects, concepts, or entities in a structured
manner. Explain the difference between generic frames and individual frames. Provide
examples to illustrate each type and discuss the significance of the :INSTANCE-OF and :IS-A
slots in these frames.
b) Discuss the importance of internal structure in noun phrases for capturing more nuanced 10
concepts, such as "a hunter-gatherer" or "a man whose children are all female."
c) Define the four types of logical symbols in the Description Logic (DL) language. 5
OR
6. a) Entailment (⊨) refers to the relationship between two statements where the truth of one 10
statement logically guarantees the truth of another statement. Explain how entailment is
determined in Description Logic (DL), considering a set of sentences S and an individual
sentence α, and discuss the condition for logical validity.
b) In Description Logics (DL), normalization refers to the process of transforming a knowledge 10
base or ontology into a standard form that adheres to certain conventions and guidelines.
Explain the concept of normalization in Description Logics (DL), highlighting its purpose
and key steps involved.
c) Define credulous reasoning, skeptical reasoning, and ideally skeptical reasoning in the 5
context of inheritance networks
UNIT – IV
7. a) Noncategorical reasoning refers to a type of reasoning that involves dealing with 10
uncertainty, vagueness, or partial information rather than absolute, categorical facts. How
can noncategorical reasoning be integrated into logical structures, and discuss the key
differences between objective probabilities, subjective probabilities, and vague predicates
in this context?
b) Explain the concept of vagueness in predicates and provide examples to illustrate how 10
vague predicates can be understood in degrees. How does the notion of degree curves
help in representing vague predicates such as "tall," "short," "very tall," and “fairly tall”?
c) Discuss the applications of Bayesian networks in various fields or domains. 5
OR
8. a) Illustrate with an example of how can you formulate the planning task for the robot in the 10
depicted simple world using the situation calculus?
b) Compare and contrast the strategies of avoiding redundant search and application- 10
dependent control in planning tasks. Discuss with examples how these strategies impact
the efficiency and effectiveness of planning systems.
c) Compare and contrast regressive planning with progressive planning in the context of 5
solving planning problems.
***
Page 2 of 2
SRN
Page 1 of 3
Reference:
b) With an example discuss principal functions for reading and writing data into R. 8
c) What is subsetting in R? Provide examples of how you would subset a vector and a data 7
frame.
OR
4. a) Discuss the purpose and usage of control structure in R. 10
b) Create a bar graph in R using both base graphics and ggplot2. Compare and contrast the 8
two approaches.
c) Explain the concept of correlation in statistics. Interpret the meaning of a correlation 7
coefficient of 0.75 between two variables.
UNIT – III
5. a) Use the k-means algorithm and Euclidean distance to cluster the following 8 examples into 10
3 clusters: A1=(2,10), A2=(2,5), A3=(8,4), A4=(5,8), A5=(7,5), A6=(6,4), A7=(1,2), A8=(4,9).
The distance matrix based on the Euclidean distance is given below:
A1 A2 A3 A4 A5 A6 A7 A8
A1 0 25 36 13 50 52 65 5
A2 0 37 18 25 17 10 20
A3 0 25 2 2 53 41
A4 0 13 17 52 2
A5 0 2 45 25
A6 0 29 29
A7 0 58
A8 0
Suppose that the initial seeds (centers of each cluster) are A1, A4 and A7. Run the k-means
algorithm for 1 epoch only. At the end of this epoch show
i) The new clusters (i.e. the examples belonging to each cluster)
ii) The centers of the new clusters
iii) Draw a 10 by 10 space with all the 8 points and show the clusters after the first
epoch and the new centroids.
Page 2 of 3
iv) How many more iterations are needed to converge? Draw the result for each
epoch.
b) Explain the concept of LASSO regression and how it is used to fit a linear model. 8
c) Describe the concept of Ensemble learning and how Bagging and Boosting techniques 7
improve model performance.
OR
6. a) What are the key characteristics of Random Forest and how does it differ from a single 10
Decision Tree? Explain with an example.
b) Explain how Jake can use Naive Bayes to classify articles into different categories and 8
outline the steps involved in implementing this solution.
c) Compare and contrast Logistic Regression and Decision Trees for classification tasks. 7
UNIT – IV
7. a) Explain the Bag-of-Words model in NLP and its basic assumptions. How does it represent 10
text data?
b) Discuss the advantages of using the mlr package compared to implementing machine 8
learning algorithms from scratch in R.
c) Describe the process of building and training a deep learning model using TensorFlow in R, 7
including data preprocessing, model architecture design, and training.
OR
8. a) Analyze the impact of hyperparameter tuning on the performance of deep learning models 9
trained with TensorFlow in R. Discuss strategies for optimizing hyperparameters
efficiently, considering computational constraints and model complexity.
b) Discuss the importance of feature engineering in the context of machine learning pipelines 8
implemented with the mlr package. Provide examples of feature engineering techniques
and explain how they can improve model performance.
c) How does word embedding (e.g., Word2Vec, GloVe) improve upon traditional Bag-of- 8
Words models? Explain the underlying principles and advantages of word embedding
techniques.
***
Page 3 of 3
SRN
***
Page 1 of 1
SRN
Page 1 of 2
b) Discuss the role of gradient-based techniques including Activation Maximization, Saliency 10
Maps, and Integrated Gradients in explaining deep learning models.
c) Elaborate on the concept of Pertubation 5
OR
6. a) Summarize the concept of DeepLIFT, SHAP, and DeepSHAP in the context of explainable 10
deep learning also highlight their importance.
b) Explore the role of Deconvolution, Guided Backpropagation, Layer-Wise Relevance 10
Propagation, and Excitation Backpropagation in explaining deep learning models.
c) Elaborate on the concept of Occlusion 5
UNIT – IV
7. a) Examine the evolution and diverse applications of large language models (LLMs) from 10
seminal research to modern implementations like ChatGPT, LaMDA, and Bing AI.
b) Evaluate the limitations and risks of LLMs, including ethical concerns and biases, proposing 10
strategies for responsible development and deployment.
c) List the advantages and disadvantages of BARD 5
OR
8. a) Briefly discuss the transformative impact of large language models (LLMs) across diverse 10
fields, analyzing their applications in healthcare, finance, and education while evaluating
associated benefits and challenges.
b) Explore the inherent limitations and risks of deploying large language models (LLMs), 10
proposing ethical guidelines and regulatory frameworks for responsible development and
use.
c) Examine the landscape of large language models (LLMs) for dialogue systems, including 5
ChatGPT, LaMDA, and LLaMa/Alpaca, evaluating their effectiveness in natural
conversations and discussing potential applications in human-computer interactions.
***
Page 2 of 2
SRN
Page 1 of 3
and what are the implications for data management strategies within organizations?
d) Conclude the most prevalent challenges and issues faced in contemporary data 6
warehousing initiatives, and how do organizations overcome these obstacles to achieve
successful implementation and utilization of data warehouse solutions?
OR
4. a) Explain the fundamental definitions and key concepts associated with data warehousing, 6
and how do these concepts shape the design and implementation of data warehouse
solutions within organizations?
b) Categorize the processes involved in data warehousing, including data extraction, 6
transformation, loading (ETL), and how these processes contribute to the creation of a
robust and efficient data warehouse ecosystem?
c) Explain how data integration contribute to the effectiveness of the Extraction, 7
Transformation, and Load (ETL) process, and what are the key considerations in ensuring
seamless data flow and consistency across diverse data sources?
d) Explain the specific case studies and examples that highlight successful data warehousing 6
implementations across various industries, showcasing the benefits, challenges faced, and
lessons learned from each scenario?
UNIT – III
5. a) Explain the current emerging trends in business intelligence implementation, and how do 6
these trends, such as augmented analytics, self-service BI, and embedded BI, impact
decision-making processes and organizational performance?
b) Explain in detail about the Development of a business intelligence 6
system.
c) Explain the potential challenges and considerations in establishing and maintaining 7
seamless connectivity between BI systems and diverse data sources, such as relational
databases, data warehouses, cloud-based platforms, and legacy systems?
d) Examine how do organizations ensure data security and compliance when connecting BI 6
systems to databases and other enterprise systems, and what measures are commonly
implemented to mitigate risks such as data breaches and unauthorized access?
OR
6. a) Assess how do organizations effectively integrate business intelligence (BI) solutions into 7
their existing systems and processes, ensuring seamless functionality and maximizing the
value derived from BI implementation?
b) Explain the strategies and best practices can organizations employ to streamline the 6
integration of BI solutions into existing systems and workflows.
c) Explain the emerging concepts such as explainable AI, ethical AI, and algorithmic 6
transparency influencing the development and adoption of BI solutions.
d) Analyze the ethical considerations and privacy concerns arise with the collection and 6
analysis of sensitive data in business intelligence (BI) initiatives, and what measures can
organizations implement to safeguard individuals' privacy rights while still extracting
valuable insights?
UNIT – IV
Page 2 of 3
7. a) Examine the primary components of Business Process Management (BPM) architectures, 6
and how do these components interact to support the modeling, execution, monitoring,
and optimization of business processes?
b) Evaluate the core components and characteristics of workflow management 7
architectures, and how do they facilitate the orchestration and automation of business
processes across diverse organizational functions?
c) Examine are the key components of a comprehensive overview of business process 6
methodologies, and how do different methodologies.
d) Explain the fundamental principles and concepts that define Robotics Process Automation 6
(RPA), and how does RPA differ from traditional automation methods?
OR
8. a) Explain the methodologies are commonly employed in designing and implementing BPM 6
architectures, and how do organizations select the most suitable approach based on their
specific business needs and objectives?
b) Explain the advantages and challenges associated with implementing flexible workflow 6
management solutions, particularly in industries with complex regulatory requirements or
rapidly evolving market dynamics?
c) Analyze the common approaches used in conducting surveys as part of business process 7
methodology, and how do organizations leverage survey data to identify process
inefficiencies, customer needs, and areas for improvement?
d) Infer the factors should organizations consider when selecting RPA tools, and how do 6
different RPA platforms vary in terms of features, integration capabilities, and scalability
to meet organizational needs?
***
Page 3 of 3
SRN
***
Page 1 of 1
SRN
c) What are the common reasons why digital products fail to meet 5 2 1-5, 12 L1
their objectives, and how can businesses prevent or mitigate these
failures?
OR
2. a) Demonstrate the businesses effectively apply theoretical models 10 2 1-5, 12 L3
and mental frameworks to improve decision-making processes and
enhance overall performance?
b) Conclude the primary objective of directed design, and how does it 10 3 1-5, 12 L5
contribute to the successful development of products or solutions?
c) Explain the user's goal, particularly in the context of product design 5 3 1-5, 12 L2
or user experience?
UNIT – II
3. a) Categorize the researchers effectively bridge the gap between 10 5 1-5, 12 L3
research and design to ensure that insights from research inform
and enhance the design process?
b) Examine how would you utilize narrative as a design tool to create 10 5 1-5, 12 L3
a compelling user experience that guides users seamlessly through
the application features and functionalities?
c) Describe the process of crafting a vision statement for a business or 5 2 1-5, 12 L3
project?
OR
4. a) How would you approach creating a robust design framework that 10 3 1-5, 12 L2
guides the development of user interfaces, interactions, and visual
Page 1 of 2
elements to ensure a cohesive and user-friendly experience for
customers?
b) Analyze the form and behavior models of a digital product be 10 3 1-5, 12 L3
refined to improve user experience and functionality?
c) Explain the process of validating and testing a design ensure its 5 5 1-5, 12 L2
effectiveness and user satisfaction in real-world scenarios?
UNIT – III
5. a) Mention role and importance of the scope plane in project 7 4 1-5, 12 L2
management and how does it contribute to project success?
b) Examine significance of the surface plane in design, and how does it 8 4 1-5, 12 L3
influence the overall user experience of a product or interface?
c) Explain the purpose and impact of the structure plane in the design 5 4 1-5, 12 L2
process, particularly in creating intuitive and functional user
experiences?
d) How would you utilize the strategy plane to define clear objectives, 5 4 1-5, 12 L2
identify market opportunities, and align resources to drive business
growth and innovation?
OR
6. a) Evaluate the different categories or classifications of goals that 7 5 1-5, 12 L5
businesses aim to achieve for their growth and success?
b) Analyze the significance of a strategy, especially when applied to 5 5 1-5, 12 L3
business operations and planning?
c) Explain the main components that make up the functionality of the 8 4 1-5, 12 L2
scope plane?
d) Demonstrate the meaning and purpose of functional 5 5 1-5, 12 L3
specifications?
UNIT – IV
7. a) Analyze the role does the skeleton plane play in the design process, 10 6 1-5, 12 L4
and how does it contribute to the overall structure?
b) Examine how does the surface plane influence the user experience 10 6 1-5, 12 L4
and visual appeal of a product or interface?
c) Explain the key considerations in interface design and navigation, 5 6 1-5, 12 L4
and what are the different types of interfaces?
OR
8. a) Explain the key steps and considerations involved in designing a 10 4 1-5, 12 L2
user interface (UI) specifically tailored for a desktop application?
b) Evaluate the fundamental principles and processes involved in the 10 4 1-5, 12 L5
collaboration between UI (User Interface) and UX (User Experience)
design to create a seamless and engaging digital product?
c) Explain the key principles and practices that drive the design of user 5 4 1-5, 12 L2
interface (UI) and user experience (UX) for mobile applications?
***
Page 2 of 2