0% found this document useful (0 votes)
16 views24 pages

Dec 2022

The document contains a series of examination questions related to Artificial Intelligence and Cryptography, covering various topics such as planning, search algorithms, knowledge representation, and security mechanisms. It includes specific problem-solving tasks, theoretical explanations, and practical applications of concepts like A* search, alpha-beta pruning, and RSA algorithm. The questions are structured to assess understanding of both foundational principles and advanced techniques in these fields.

Uploaded by

SHREYA BHUVAD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views24 pages

Dec 2022

The document contains a series of examination questions related to Artificial Intelligence and Cryptography, covering various topics such as planning, search algorithms, knowledge representation, and security mechanisms. It includes specific problem-solving tasks, theoretical explanations, and practical applications of concepts like A* search, alpha-beta pruning, and RSA algorithm. The questions are structured to assess understanding of both foundational principles and advanced techniques in these fields.

Uploaded by

SHREYA BHUVAD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Paper / Subject Code: 89284 / Artificial Intelligence

Dec22
(dec24 baki)

Q1. Solve any four from following. [20]


a. Compare the importance of Partial order planning over Total order planning.
b. What data is used to evaluate award and punishment of robot navigation?
c. Explain the categorization of Intelligent System.
d. How AI will help in the Robotics application.
e. Generate the parse tree for a sentence “The cat ate the fish”.
f. What do you mean by state space representation? Explain with example the necessity
of it

Q2. a. What actions would you take to prove “Some who are intelligent can’t read” using
prepositional logic [10]
1. Whoever can read is literate.
2. Dolphins are not literate.
3. Some dolphins are intelligent.

b. Solve the Air cargo transport problem using Planning. It involves loading and
unloading cargo onto and off of planes and flying it from place. Initial State is
cargo 1 and plane 1 is at Mumbai airport, cargo 2 and plane 2 is at Delhi
airport. Goal State is cargo 2 should be at Mumbai airport and cargo 1 should
be at Delhi airport. [10]

Q3. a. Apply A* algorithm on the following graph. Heuristic values are


h(S) = 15, h(A) = 14, h(D) = 12, h(B) = 10, h(E) = 10, h(C) = 8 , h(F) = 10,
h(G) = 0. [10]
S is the start node and G is the goal node.

b. Explain the Depth Limit search and Depth first iterative deepening search. [10]

12281 Page 1 of 2

22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence

Q4. a. Apply the alpha beta pruning on following example by considering the root node a max.
[10]

b. Explain PEAS descriptors also state PEAS description for online English tutor.
[10]

Q5. a. Explain Problem formulation also give the initial state, goal test, successor function, and
cost function for the following.
Choose the formulation that is precise enough to be implemented.
Problem statement: A 3 foot tall monkey is in a room where some bananas are
suspended from the 8 foot tall ceiling. He would like to get bananas. The room
contains two stackable, movable, climbable 3 foot high crates. [10]

b. Explain the concept of PAC learning [10] Q6

.Write detailed note on following. (Any two) [20]


a. Hill Climbing Algorithm and it’s Limitations.
b. Forward and Backward Chaining
c. Language models of Natural Language Processing

22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence

May23
Q1) Solve any four of the following:
a) Describe different categories of AI [5]
b) Describe the characteristics of a medical diagnosis system using the PEAS properties [5]
c) Explain Goal based Agent with a block diagram [5]
d) Compare and contrast propositional logic and first order logic [5]
e) What do you mean by hill climbing. Explain. [5]

Q2)
a) Perform α - β pruning on the following graph, clearly indicating the
α and β cuts and the final value of root node. [10]

A
MAx

B C
MIN

D F G H I
E
MAX

6 4 8 3 2 4 7 9 8 4 2 3 4 1 7 9 8
5

J K L M N O P Q R S T U V W X Y Z a

b) What do you understand by informed and uninformed search methods? Explain in detail
with example. [10]

Q3)
a) Consider the following statements: [10]
a) All people who are earning are happy
b) All happy people smile
c) Someone is earning
Perform the following tasks:
i) Represent above statements in FOL
ii) Convert each to CNF
iii) Prove that someone is smiling using resolution technique. Draw the resolution tree

b) What do you understand by forward chaining and backward chaining. Explain in detail
[10]

26341 Page 1 of 3

22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence

Q.4

a) For the given graph, the table below indicates the path costs and the heuristic values. S is the
start node and G1, G2 and G3 are the goal nodes. Perform A* search to find the shortest distance
path from S to any of the goal nodes. [10]

D
A

E
B C
G1

G3
G2

Edge Cost Edge Cost Edge Cost


SA 5 BA 2 DS 1
SB 9 BC 1 DC 2
SD 6 CS 6 DE 2
AB 3 CG2 5 EG3 7
AG1 9 CF 7 FD 2
FG3 8

Node Heuristic Node Heuristic Node Heuristic


S 5 D 6 G1 0
A 7 E 5 G2 0
B 3 F 6 G3 0
C 4

b) What is planning in AI? Discuss partial order planning and hierarchical planning in detail [10]

22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence

Q 5)

a) Explain the concept of genetic programming [10]


b) What is formulation of a problem. Formulate the Wumpus world problem in terms of
following components: initial state, actions, successor function, goal test, path cost. [10]

Q.6 Write short notes on : [20]

a) Applications of AI
b) Simulated annealing

Dec23

Q1) Solve any four of the following:


a) Describe different types of environment of AI agents [5]
b) What do you mean by Total Turing test. Explain. [5]
c) Explain Utility based Agent with a block diagram [5]
d) Formulate the 8 puzzle problem [5]
e) Describe the characteristics of a part picking robot using the PEAS properties [5]

Q2)
a) What do you understand by Min Max Search and alpha beta search? Explain in
detail with example. [10]
b) What do you understand by A* search? Is it informed or uninformed search
Justify.

Q3) a) Explain steps involved in converting propositional logic statement into


CNF with suitable example [10]
b) What do you understand by forward chaining and backward chaining.
Explain in detail [10]

Q4) a) Explain various methods of knowledge representation. [10]


b) What are local search algorithms? Explain any one in detail.

Q5) a) What is planning in AI? Discuss partial order planning and hierarchical planning
in detail [10]
b)What do you understand by Reinforcement learning. Explain in detail.

22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence

Q6) Write short notes on any two of the following: [20]

a) Wumpus World Environment


b) Applications of AI
c) Natural Language Processing

May24

1 (a) Explain the Learning Agent with suitable block diagram. 5

(b) Give difference between Informed Search and Uninformed search 5


Algorithms.

(c) Give PEAS and state space description for “Automobile Driver Agent” 5

(d) Explain different quantifiers with example.

2 (a) Explain various properties of task environment with suitable examples 10

(b) What is Game Playing Algorithm? Draw a game tree for Tic-Tac-Toe 10
problem.

3 (a) Illustrate forward-chaining and backward-chaining algorithm with suitable


example.

(b) Explain Hill Climbing Algorithm and problems that occurs in hill climbing
algorithm?

4 (a) What do you mean by Resolution? Also discuss the steps in Resolution. 10

(b) Consider problem of changing a flat tire. The goal is to have a good spare
tire properly mounted on to the car’s axle, where the initial state
has a flat tire on the axle and a good spare tire in the trunk. Give
the ADL description for the problem and also discuss the solution

5 (a) Explain Partial-order planning with suitable example. 10

(b) Define Belief Network. Describe the steps of constructing belief network
with an example.

22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence

6 Write short notes on any Two of following:

(a) Explain different applications of AI in Healthcare, Retail and Banking.

(b) Alpha Beta Pruning

(c) Wumpus world Environment

22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89282 / Cryptography & System Security

(dec24 baki)

Dec22

1 Attempt any FOUR [20]


a Explain with examples keyed and keyless transposition ciphers.
b Explain the different modes of block ciphers.
c Differentiate between SHA-1 and MD5
d What is Buffer overflow attack?
e Explain ARP spoofing.

2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
attacks on it. Consider the example where A and B decide to use the Diffie
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
that they share.
b Explain AES algorithm. Highlight the difference between AES and DES. [10]

3 a Explain various types of firewalls. [10]


b Discuss various attacks on digital signatures and the methods by which they
[10]
can be overcome.

4 a Elaborate the sign and verification process of RSA as a digital signature scheme. [10]
b Write short notes on
[10]
1. Packet sniffing
2. SQL injection

5 a State the rules for finding Euler’s phi function. Calculate [10]
a. φ(10)
b. φ(49)
c. φ(343)
b Explain Kerberos as an authentication service. [10]

6 a Enlist the various functions of the different protocols of SSL. Explain the phases [10]
of handshake protocol.
b How does ESP header guarantee confidentiality and integrity of packet payload? [10]
What is an authentication header (AH)? How does it protect against replay
attack?

A79F679C53B79281A1E552B45071A2A6
May23

1 Attempt any FOUR [20]


a Explain the relationship between Security Services and Mechanisms in detail.
b Explain ECB and CBC modes of block cipher.
c Define non-repudiation and authentication. Show with example how it can be achieved.
d Explain challenge response-based authentication tokens.
e Explain buffer overflow attack.

2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the public [10]
key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’. What is
the cipher text for M=10 using the public key.

b Discuss DES with reference to following points [10]


1. Block size and key size
2. Need of expansion permutation
3. Role of S-box
4. Weak keys and semi weak keys
5. Possible attacks on DES

3 a What goals are served using a message digest? Explain using MD5. [10] b
What is DDOS attack? Explain how is it launched. [10]

4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
in digital certificates? Explain any one digital signature algorithm.
b How does PGP achieve confidentiality and authentication in emails? [10]

5 a State the rules for finding Euler’s phi function. Calculate [


a. φ(11) 1
b. φ(49) 0
]
c. φ(240)
b Explain Kerberos. Why is it called as SSO? [10]

6 a Enlist the various functions of the different protocols of SSL. Explain the phases of
handshake protocol.
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of AH and
ESP.

Dec23

1 Attempt any FOUR [20]

A79F679C53B79281A1E552B45071A2A6
a Give examples of replay attacks. List three general approaches for dealing with
replay attack.
b Explain key rings in PGP.
c What are the different protocols in SSL? How do client and server establish SSL
connection?
d Explain TCP/IP vulnerabilities layer wise.
e What is the purpose of S-boxes in DES? Explain the avalanche effect.

2 a What is need for message authentication? List various techniques used for [10]
message authentication. Explain any one.
b What characteristics are needed in secure hash function? Explain secure hash [10]
algorithm on 512 bit.

3 a Use Hill cipher to encrypt the text “short”. The key to be used is hill. [10]
b Explain man in middle attack on Diffie Hellman. Explain how to overcome the
[10]
same.

4 a Explain IPSec protocol in detail. Also write applications and advantages


of IPSec.
b What are different types of firewall? How firewall is different from IDS.
[10]

5 a Explain Kerberos in detail.


b Provide a comparison between HMAC, CBC-MAC and CMAC.

6 a What is PKI? List its components.


b What is digital certificate? How does it help to validate authenticity of a
user.
Explain X.509 certificate format.

May24

1 Attempt any FOUR [20]


a Explain Euclidean Algorithm.
b Explain RC4 stream cipher.
c Differentiate between SHA-1 and MD5
d Explain worms and viruses
e Discuss RSA as a digital signature algorithm.
2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible attacks Thei
on it. Consider the example where A and B decide to use the Diffie Hellman r
algorithm to share a key. They choose p=23 and g=5 as the public parameters. secre
A79F679C53B79281A1E552B45071A2A6
t keys are 6 and 15 respectively. Compute the secret key that they share
[10]
b Explain Advanced Encrypted Standards (AES) in detail. [10]
3 a Explain cryptographic hash functions with properties of secure hash function. [10]

b What is ICMP flood attack? Explain in detail. [10]


4 a Explain Public Key Distribution in detail. [10]
b Encrypt the string “The Key is hidden under the door” with Play fair cipher using
the keyword “domestic”. [10]
5 a What are the different components of IDS? List and explain different approaches
of IDS. [10]
b Explain Needham-schroeder authentication protocol. [10]
6 a Write a short note on
1. Packet Sniffing.
2. ARP spoofing.
b Discuss various attacks on
Digital signatures.

A79F679C53B79281A1E552B45071A2A6
Statistical Learning for Data Science

Mobile computing
(may23 , dec24 baki)
Dec22

1 Attempt any FOUR [20]


a Explain different types of Antenna used in mobile communication. 5
b What is co-channel interference? 5
c What is reverse tunneling? 5
d Describe use of Cellular IP. 5

e Compare various Telecommunication Generations 5

2 a Explain protocol architecture of WLAN and its different types. [10]


b What is the use of different interfaces used in the global system for
[10]
mobile communication (GSM) with appropriate diagram?

3 a What are different security algorithms used in GSM? [10]


b How is packet delivery achieved to and from mobile nodes? [10]

4 a Explain Wireless LAN threats. [10]


b What is the responsibility of MAC management in IEEE 802.11? [10]

5 a Explain selective retransmission process at TCP. [10]


b Explain self-organizing networks (SON) for heterogeneous Networks. [10]

6 a Explain agent registration process in mobile communication. [10]


b What is micro mobility and its approaches? [10]

*********

567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science

Dec23

Q1 a) What are various Mobile Communication and Application Environments for the
Following: 10
i) Business
ii) Location Based Services.
iii) Banking Services
iv) Vehicles
b) Explain Various Types of antennas along with their Radiation Pattern. 10
Q2 a) What is Spread Spectrum? What are the various advantages for the same? 5
b) What are Various Advantages and Disadvantages of Small Cells in Cellular system
5
c) Explain DSSS and FHSS in detail. 10

Q3 a) What do you mean by hidden & Exposed station Problem? How they can be
avoided. 10
b) Explain GSM System Architecture in Detail 10
Q4 a) Why it is necessary to have Handover Mechanism in GSM? Explain possible
handover scenarios in short. 10
b) List various Security services offered by GSM. Explain A3 A5 and A8 Algorithm in
brief. 10
Q5 a) Explain Packet Delivery Mechanism “To and From Mobile Node” with the help of
Mobile IP Network Diagram. 10
b) Explain Tunnelling and Encapsulation in brief. What are the various types of
Encapsulation techniques. 10
Q6. Write a Short Note on the Following. (ANY FOUR). 20
a) Bluetooth
b) HIPERLAN
c) IPV6
d) CDMA
e) Snooping TCP

May24

567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Q1. Attempt any FOUR Questions 20
a) Explain the concept of frequency reuse with clustering.
b) Compare LTE and LTE advanced.
c) What is Hidden and Exposed station problem?
d) What are the roles of EIR and HLR entities in a GSM network?
e) Discuss about the mobile services and data services in GSM.

Q2 a) What do you mean by Self Organizing Networks. Explain the architecture of SON. 10
Q2 b) What is a need of Micro Mobility? Explain Cellular IP in detail. 10

Q3 a) What are the different Handover mechanism in GSM? Explain each handover mechanism 10
in brief.
Q3 b) Explain the protocol architecture of IEEE 802.11 with diagram. 10

Q4 a) Explain the GPRS architecture, explain each block in detail. 10


Q4 b) Explain snooping TCP and mobile TCP with their merits and demerits. 10

Q5 a) What is spread spectrum? Why is it used? Explain any one of the spread spectrum 10
techniques.
Q5 b) Explain Mobile Terminated Call and Mobile Originated Call. 10

Q6 a) Explain the mechanism for IP packet delivery using mobile IP. 10


Q6 b) Discuss in detail about Wi-Fi security protocol.

Iot internet of things


(dec22,may24,dec24 baki)
May23

Q. 1 a) Discuss IOTWF Standardized Architecture. (5 M)


b) Explain Raspberry Pi with diagram. (5 M)
c) Describe Zigbee protocol stack using IEEE 802.15.4. (10 M)

567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Q.2 a) What are gateways and backhaul sub layers? (5 M)
b) Briefly explain Adapting SCADA for IP. (5 M)
c) What do you mean by SoC? Also explain its applications. (10 M)

Q.3 a) Describe various health & lifestyle domain specific IOT. (5 M)


b) Explain the different pin/parts of Arduino Uno board. (5 M)
c) Describe data vs. network analytics for an IoT network. (10 M)

Q.4 a) Write short notes on BLE. (5 M)


b) Differentiate between Sensors and actuators with neat diagram. (5 M)
c) What is IoT? Explain IoT blocks in detail. List out the different IOT Challenges. (10 M)

Q.5 a) Explain IOT Application layer with a neat diagram. (5 M)


b) Discuss the concept of Edge computing. (5 M)
c) Explain MQTT. Compare - COAP and MQTT. (10 M)

Q.6 a) Describe Architecture of Wireless Sensor Network. (5 M)


b) Explain different Energy related IOTs Domain with example. (5 M)
c) What are IOT software platform? Explain in short with an example. (10 M)

567ED5B2149E1166C0258390CBB9A47D
Dec23
Q.1 (a) Give the function of each layer of a seven-layer IoT architectural
10
reference model published by IoTWF architectural committee.
(b) What is meaning of Smart object? Give the Security and privacy concerns 05
of Smart objects in Internet of things.
(c) Explain the characteristics of Smart object. Give the trends in smart 05
objects.

Q.2 (a) Explain the architectural classification of smart objects according to 10


Things: Sensors and Actuators Layer. Give the classification of networks
according to access technologies and distances considering in IoT based
applications.
(b) What are the factors based on the type of device involved and the function
it will perform helps to choose right protocol for a particular IoT
application?
(c) Compare with suitable parameters COAP and MQTT application 05
protocols used for IoT applications.

Q.3 (a) Describe top 10 applications of IoT in existing market place. 10


(b) Compare with suitable parameters between Raspberry Pi and Arduino. 05
(c) Why RESTful JSON is a popular choice for IoT applications? 05

Q.4 (a) What is Fog Computing? Give advantages and disadvantages of Fog 05
computing.
(b) What is Edge Computing? Give advantages and disadvantages of Edge 05
computing.
(c) Explain the different types of sensors are used for measuring one of the 10
physical properties and give its representative examples.

Q.5 (a) Explain in detail about Smart services in IoT system. 05


(b) Write a short note on “Data Analytics Versus Business Benefits”. 05
(c) (10)Draw and explain neat diagram of Protocol Stack for Transporting
Serial DNP3 SCADA over IP. Give meaning of a master/slave
relationship in DNP3.

Q.6 (a) Explain at least five use cases where IoT involvements will convert cities 10
into smart cities.
(b) Compare any Five IoT software platforms with suitable parameters. 10

2C4E54A85DC280446DC2BCFEDD431B03
spcc
dec22
(dec24 baki)
==================================================================

Q.1. A. Differentiate between Application Software and System Software. 5


B. What are the functions of a Loader? Enlist the loader schemes. 5
C. Explain Macro and Macro Expansion with example. 5
D. Compare Bottom-Up and Top-Down Parser. 5

Q.2. A. Explain with flowchart design of two pass assembler. 10


B. Construct Three address code for the following program 10
For(i=0;i<10;i++)
{
If (i<5)
a=b+c*3;
else
x=y+z;
}

Q.3. A. Explain different features of macros with suitable example. 10


B. Design LL(1) parsing table for the given grammar: 10
S  Ad
A  aB | BC
Bb
Ce|Ɛ
Also state that whether the given grammar is LL(1) or not.

Q.4. A. Explain the working of a Single-pass macro processor with neat 10


flowchart.
B. What are the different ways of representing Intermediate code? 10
Explain with suitable example.

Q.5. A. Explain different issues in code generation phase of compiler. 10


B. Construct DAG for the following expression 10
x= m+p/q – t+ p/q *y

Q.6. A. Explain Direct Linking Loader in Detail. 10


B. Explain the different phases of a compiler with suitable example. 10

2C4E54A85DC280446DC2BCFEDD431B03
May23

Q.1. A. What is three-address code? Generate three-address code for – 5

B. Compare between Compiler and Interpreter. 5


C. Explain absolute loader. State its advantages and disadvantages. 5
D. Discuss with example ‘forward reference’. 5
Q.2. A. Construct SLR parser for the following grammar and parse the input 10
“( )( )”: S → (S)S | .
B. State and explain with examples, different types of statements used in 10
assemblers with respect to system programming.
Q.3. Explain the concept of basic blocks and flow graph with example the 10
A. three-address code.
B. Explain with help of a flowchart, the first pass of two-pass macro 10
processor.
Q.4. A. Explain the phases of a compiler. Discuss the action taken in various 10
phases to compile the statement:
a=b*c+10, where, a, b, c are of type real.
B. Write short note on: 10
(i) Syntax-directed Translation, (ii) Macro facilities
Q.5. A. What is code optimization? Explain with example, the following code 10
optimization techniques:
(i) Common sub-expression elimination (ii) Code motion
(iii) Dead code elimination (iv)Constant propagation
B. Explain Direct Linking Loader in suitable example. 10
Q.6. A. Test whether following grammar is LL(1) or not. If it is LL(1), construct 10
parsing table for the same:
S1AB| A1AC|
0C
B0S
C1
B. Draw and explain the flowchart of Pass-I of two pass assembler with 10
suitable example

2C4E54A85DC280446DC2BCFEDD431B03
Dec23

Q.1.
a) Define “System Programming”. Differentiate between system software & application
software. [05]
b) Explain in brief “forward reference problem”. Explain how TII handles forward reference
problem in single pass assembler. [05]
c) Explain conditional macro with suitable example. [05]
d) Compute FIRST and FOLLOW for the following grammar: [05]
S → Aα
A → BD
B → b|ε
D → d|ε

Q.2.
a) Draw the flowchart of pass1 of assembler and explain its working with the databases. [10]
What are the different ways of Intermediate code representation? Explain with example. [10]

Q.3.
a) Construct the necessary data structures after compiling the following code by Pass1 of two-
pass macro processor: [10]

markdown
CopyEdit
1. MACRO
2. COMPUTE &x, &a, &p
3. MOVER &a, &x
4. MULT &a, ='4'
5. MOVEM &a, &p
6. MEND
7. MACRO &g, &k, &r
8. MOVER &r, &k
9. SUB &r, ='4'
10. MEND

b) Construct LR(0) parsing table for the following grammar and analyze the contents of stack
and input buffer and action taken after each step while parsing the input string "abbcde": [10]
S → αCDe
C → Cbc
C→b
D→d

Q.4.
a) State and explain the types of assembly language statements with examples. [10]
b) Discuss the databases used in direct linking loader. [10]

2C4E54A85DC280446DC2BCFEDD431B03
Q.5.
a) Generate 3-address code for the following C program and construct flow graph with the help
of basic blocks: [10]

cpp
CopyEdit
i=1; j=1; x=5;
while(i<3) {
switch(i) {
case 1: a[i++][j]=i+x;
break;
case 2: a[i++][j]=i-x;
break;
}
i++;
}

b) What are the phases of compiler? Give working of each phase for the following statement:
P = Q + R - S * 3 [10]

Q.6.
a) Explain Dynamic Linking Loader in Detail. [10]
b) Explain different Code Optimization Techniques in detail. [10]

2C4E54A85DC280446DC2BCFEDD431B03
May24

Q.1. a) Differentiate between System software & Application software. [05]


b) What is Left recursion? Check if the following grammar is left [05]

𝑆𝑆𝑆 + |𝑆𝑆 * |𝑎
recursive, and take necessary action if it exists:

c) Discuss the forward reference problem in assembler with [05]


suitable example.
d) Explain different functions of loader in detail. [05]

Q.2. a) Explain any five code optimization in compiler designing with [10]
suitable example.
b) Explain with the help of flow chart the working of two pass [10]
assembler along with databases used.

Q.3. a) Explain Design of Direct Linking Loader. [10]

𝑆 𝑎𝐵𝐷ℎ
b) Construct LL(1) parsing table for the following grammar: [10]

𝐵  𝑐𝐶
𝐶 𝑏𝐶 |
𝐷 𝐸𝐹
𝐸 𝑔 | 
𝐹 𝑓 | 

Q.4. a) Generate 3-address code for the following C program and construct [10]
flow graph with the help of basic blocks : (assume 4 memory locations
for integer ):

b) With reference to MACRO, explain the following tables with suitable [1


example: 0]
i) MNT ii) MDT iii) ALA

2C4E54A85DC280446DC2BCFEDD431B03
Q.5. a) Explain design issues in code generation in detail. [10]

𝑎 = 𝑎 * 𝑏- 5 * 3/𝑐
b) Explain Phases of compiler with following example [10]

Q6. Write short note on:

a) Three address code representation


b) YACC
c) Parameterized Macros
d) Syntax directed translation

2C4E54A85DC280446DC2BCFEDD431B03
Paper / Subject Code: 89281 / System Programming & Compiler Construction

81A25C470EC1D85158D58F2940E4782C
Paper / Subject Code: 89281 / System Programming & Compiler Construction

81A25C470EC1D85158D58F2940E4782C

You might also like