Documente Academic
Documente Profesional
Documente Cultură
CAO
1. Explain the difference between write through and write back cache
2. For a single computer processor computer system, what is the purpose of a processor cache ?
3. Explain the operation considering a two processor computer system with a cache for each
processor.
4. what's the trade-off of choosing a bigger or smaller cache
5. Explain the concept of locality of reference
6. Explain memory interleaving?
7. What is bit slice?
8. Difference between computer architecture and computer organization?
C++
1. What will be the output of the following program
void main()
{
float a= 0.7;
if (a < 0.7)
printf("c");
else
printf("c++");
}
2. Can static variables be declared in a header file ?
3. Can a variable be both constant and volatile ?
4. Can include files be nested?
5. What is the output of printf("%d") ?
6. Find out the equivalent pointer expression for referring the same element a[i]
[j][k][l] ?
7. What is the difference between const char* p and char const* p
8. Find the equivalent expression for x%8 without using the modulo operator.
9. Determine the output of the following program
main()
{
if (!(1&&0))
{
printf("OK I am done.");
}
else
{
printf("OK I am gone.");
}
}
10. Write a C program to print the following series
1
12
123
1234
12345
11. Nesting of loops in C may continue upto how many levels?
12. What will be the output of
void main()
{
int a = (1,2,3);
printf("%d",a);
}
If remove {∈} from V*, the resulting set denoted by V+ is called the
positive closure.
6. A context-free grammar is a grammar in which the left-hand side of each production
rule consists of only a single nonterminal symbol. This restriction is non-trivial; not
all languages can be generated by context-free grammars. Those that can are called
context-free languages. A context sensitive grammar has productions of the form
α →β , where both of them are in (V∪T)*, In this a production will happen only in
a particular context.
7. A sentential form is the start symbol S of a grammar or any string in (V union T)*
that can be derived from S. Consider the linear grammar ({S, B}, {a, b}, S, {S goes
to aS, Sgoes toB, Bgoes tobB, Bgoes toempty string}).A derivation using this
grammar might look like this: S directly derives aS directly derives aB directly
derives abB directly derives abbB directly derives abb Each of {S, aS, aB, abB,
abbB, abb} is a sentential form.
8. If all the grammars generating a Context free language are ambigous then the
language is said to be inherently ambigous.
9. If all the productions in that grammar are either in the form A→BC or A→a and
there are no other types of production, we can say that the given context free
grammar is in Chomsky normal form.
10. A symbol X∈V is useless if
a. there is no derivation from X to any string in the language (non-
terminating)
b. there is no derivation from S that reaches a sentential form containing X
(non-reachable)
11. Productions of the form A → B. All other productions including A→a are non-unit
12. Productions of the form A→∈
13. Stack alphabet
14. Multi-tape machine has multiple tapes and separate heads for each tape, multi-track
machine has only a single tape divided in to multiple tracks and a single head to read
all the tracks.
15.
Computer graphics
DBMS
6. What is normalization?
18.What is the basic difference between clustered and non clustered index
23. Differentiate between primary key, candidate key & super key.
24. What is the difference between the strong entity set and weak entity
set ?
OS
1. What are the key object oriented concepts used by Windows NT?
2. What is multi tasking, multi programming, multi threading?
3. How are devices represented in UNIX?
4. What are the sub-components of I/O manager in Windows NT?
5. What is a binary semaphore? What is its use?
6. Define latency, transfer and seek time with respect to disk I/O.
7. How are the wait/signal operations for monitor different from those for
semaphores?
8. What are the four layers that Windows NT have in order to achieve
independence?
9. What is the kernel?
10.What are privileged instructions?
11. What do you mean by system calls?
12. What are overlays?
13. Define spooling.
14. List the difference between monitor and semaphore.
15. What is a deadlock?
16. List the 4 necessary conditions for deadlock occurrence.
17. What is inode?
18. Explain the functionality of long term, short term and medium term
scheduler.
19. Differentiate between turn around time and waiting time.
20. Define thrashing.
21. What are buddy systems?
22. Differentiate between internal and external fragmentation.
Mobile Computing
1. Discuss the real life areas in which mobile communications can be applied
(road traffic, emergencies,
2. Give a short review of the evolution of cellular networks. Identify the
different systems in each generation.
5. In your view, what are the top 3 strengths and weaknesses of wireless
systems? Discuss ways to address the weaknesses?
7. Suppose you want to watch a movie in TV using VCR. How can this be
achieved in a wireless environment? (UWB-media server- media player, High
security, high data rate, in sort distances)
8. Suppose you want to organize a conference in a hall where there are no wired
systems available. What kind of system will you prefer and why?
(WSN/MANET-on spot configuration)
11. Consider the case of accessing e mail using your mobile phone. The rendering
of contents will be different from a normal yahoo mail page in PC. How this is
done? (WAP)
12. Suppose you want to use a mobile device for internet browsing. What are the
limitations that you experience? (memory, power, small display, connection
issues)
13. Give 4 examples of mobile operating systems. (Symbian OS, Palm OS,
Windows CE, Linux for mobile)
14. While browsing through the personal banking pages of your bank, you can see
a lock symbol at the bottom of browser. What does this imply? Explain? (SSL
Security)
15. Which are the internet security protocols used in mobile computing? (VPN
and IPSec)
MICROPROCESSOR
7. What are tri-state devices and why they are essential in a bus oriented system?
21. Which line will be activated when an output device require attention from
CPU?
22. Differentiate between a microprocessor and microcontroller.
7. Does OOP have any option the initialize the values of the data members of a
class? How that option can be explicitly provided? (constructors)
10. Usually data members can be accesses by its member functions. But consider a
scenario where two classes have to share a single function. What concept on OOP
can be applied? Explain. (friend functions)
SOFTWARE ENGINEERING
are intended to provide automated support for software process and activities. CASE
Ans: software should deliver the required functionality & performance to the user
Ans: coping with increasing diversity, demands for reduced delivery times and
Ans: Risk identification, Risk analysis and classification, Risk Decomposition and
Ans: It specifies how a system should, protect itself against viruses, worms and
similar threats
9 What are the main benefits of predicting system reliability from a reliability
growth model?
Ans: Planning of testing and customer negotiations
Ans: When a program traverse the wrong path because of an incorrect predicate in
a branching statement.
Ans: The necessity to write and debug test harnesses for the modules and sub
software system design and development become very costly operations, which
21 Suppose, a user needs a system which is large, complex and full fledged in nature
and having a lot of features and facilities from scratch. Then which software
access to external data source. 3) Missing functions. Which testing will gives
these results?
23 A test case developed based on pull down menus, data entry and object
24 In object oriented analysis, when the user has a number of ideas, alternatives,
solutions and not so sure about confirming one of them, then which technique can
use?
Ans: Brainstorming.
Answer: If the 'pivotal value' (or the 'Height factor') is greater than 1 or less than -1.
1. What is the bucket size, when the overlapping and collision occur at same time?
Answer: One. If there is only one entry possible in the bucket, when the collision occurs, there is no
way to accommodate the colliding value. This results in the overlapping of values.
Postfix Notation: AB + C * DE - - FG + ^
3. How many null branches are there in a binary tree with 20 nodes?
Answer: 21
a. Straight merging,
b. Natural merging,
c. Polyphase sort,
d. Distribution of Initial runs.
5. How many different trees are possible with 10 nodes ? (2n-n)
Answer: 1014
a. Sparse matrix,
b. Index generation.
8. In tree construction which is the suitable efficient data structure?
9. List out the areas in which data structures are applied extensively?
Answer: The heterogeneous linked list contains different data types in its nodes and we need a link,
pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void
pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.
Answer: Two. One queue is used for actual storing of data and another for storing priorities.
Answer: Stack. Because of its LIFO (Last In First Out) property it remembers its 'caller' so knows
whom to return when the function has to return. Recursion makes use of system stack for storing
the return addresses of the function calls.
Every recursive function has its equivalent iterative (non-recursive) function. Even when such
equivalent iterative procedures are written, explicit stack is to be used.
14. What are the notations used in Evaluation of Arithmetic Expressions using prefix and
postfix forms?
Answer: Stack. Because of its LIFO (Last In First Out) property it remembers its 'caller' so knows
whom to return when the function has to return. Recursion makes use of system stack for storing
the return addresses of the function calls.
Every recursive function has its equivalent iterative (non-recursive) function. Even when such
equivalent iterative procedures are written, explicit stack is to be used.
16. Classify the Hashing Functions based on the various methods by which the key value is
found.
Answer: The list of Hashing functions is as follows:
a. Direct method
b. Subtraction method
c. Modulo-Division method
d. Digit-Extraction method
e. Mid-Square method
f. Folding method
g. Pseudo-random method
17. What are the types of Collision Resolution Techniques and the methods used in each of the
type?
Answer: B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching
easier. This corresponds to the records that shall be stored in leaf nodes.
Answer: A spanning tree is a tree associated with a network. All the nodes of the graph appear on
the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight
between nodes is minimized.
20. Does the minimum spanning tree of a graph give the shortest distance between any 2
specified nodes?
Answer: No. Minimal spanning tree assures that the total weight of the tree is kept at its minimum.
But it doesn't mean that the distance between any two nodes involved in the minimum-spanning
tree is minimum.
ACN
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per
segment.
8.What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the
network notify the other stations on the ring when they are not receiving the
transmissions. Beaconing is used in Token ring and FDDI networks.
9.Define VOIP Communication Technology
VOIP stands for Voice over IP and this technology is used for transmitted the voice over
the IP based long distance network to make phone calls. VOIP phone calls are very
cheap and a large number of the corporate offices and home users are using VOIP
technology to make long distance phone calls.
When class B addresses are used by class C subnet mask then the result we get is known
as subnets. There are many reasons for which we create subnets of an IP network. The
basic purpose of subnet is to control traffic over networks.
To get the network and node parts of an address, we apply subnet mask to an IP address.
1 represents to network bit and 0 represents to node bit. To get the network address, we
apply an operation among the IP address and the subnet mask is known as Bitwise
Logical (AND).
Super-netting is also known as Classes Inter-Domain Routing. The way through which
multiple internet addresses of a class are combined together is known as Super-netting.
Suppose we have two network addresses. One is 192.168.3.0/18 and other is
192.168.4.0/18. By using Super-netting, we can combine these two addresses into a
single address as 192.168.3.0/17. Here seventeen (17) is showing that first 17 bits are
representing the network part of address (192.168.3.0/17). There are some protocols
which are used Super-netting including BGP and OSPF.
1. If you have to both encrypt and compress data during transmission, which would
you do first, and why?
2. Differentiate between symmetric encryption and asymmetric encryption.
3. What is DES ?
4. Compare DES and RSA
5. When a combination of symmetric encryption and an error control code is used
for message authentication, in what order must the two functions be performed ?
6. What is a firewall.?
7. What are the different types of firewall?
8. Differentiate the different types of attacks on data during transmission.
9. Differentiate between threat and vulnerability.
10. Differentiate between attack, service and mechanism.
11. What are the major vulnerabilities that a computer system is subjected to?
12. What are the different mechanisms provided to assure security.
13. What are the 3 independent dimensions on which all cryptographic systems are
characterized?
14. Differentiate the concepts unconditionally secure and computationally secure.
15. What is one time pad technique.
16. What are the different transpositions methods for encryption ?
17. What are the different techniques for steganography.
18. Differentiate between encryption and decryption algorithms.
19. Differentiate the concepts confusion and diffusion with respect to data security.
20. What do you mean by avalanche effect.
21. How can you provide authentication to your messages using public key
cryptography?
22. How can you provide both secrecy and authentication to your messages using
public key cryptography?
23. What is a public key certificate?
24. What is a digital signature?
25. What is the difference between direct and arbitrated digital signature.
26. What is R64 conversion? How is it useful for an e-mail application.
27. What are the two common techniques used to protect a password file?
28. What is a honeypot?
29. What are the two common techniques used to protect a password file?
30. What are the 3 different types of indruders.?
31. What are the different types of virus?
32. Differentiate between email virus and macrovirus
33. What are the two categories of malicious program?
34. Diffrentiate between a logic bomb and time bomb.
35. What is Trojan horse.
SYSTEM PROGRAMMING
2. What will happen if we drop the base register in the program which contains
only one base register?
A) Expression
B) Symbol
C) Literal
A) X
B) SW
C) PC
9. Name the special type of loader which is executing ,when a computer starts
or restarted.
12. How can we include library routine automatically? Also write the syntax.
A) ESTAB
B) OPTAB & SYMTAB
C) DEFTAB, NAMTAB & ARGTAB
.