Download as pdf
Download as pdf
You are on page 1of 20
t least ONE qi Attempt FIVE questions in all. Question no, 1 is mandatory, attempt at from Section A, at least TWO from Section B, and select ONE question from any section. ‘+ Please be specific and legible in your answers. Start every question from a fresh page, * Q.1 (A): Mr. Hashim Raza works for an automobile manufacturer company as a junior graphics engineer. He is the member of a team that is working on a new car's design. The car is to be launched within ‘month, but 2 parts of the car have yet not been tested, Head of the team has much pressure to Taunch ‘the car on time. The head decides to assemble the parts without a prior test, because of shortage of time, Mr. Hashim knows that ean be dangerous for the car drivers and citizens. Mr. Hashim is also aware of the fact that he is junior and head of the team will ignore his suggestions. He is afraid that his interference can be harmful for his career at the organization ‘+ What should Mr. Hashim do? Support your answer with relevant ethical theories, PEC Code of Conduct and logie in the case {06 Marks] Q.1 (B): Elaborate with at least two examples the concept of gender discrimination and sexual harassment art work place. [06 Marks} SECTION A Q2 (A): Discuss importance of any three-non-verbal communication with particular reference to oral presentations. (06 Marks} Q2 (B): Idemtify barrier of communication in the following situations and concisely explain each barrier. [06 Marks} ‘* A manager used an idiom with her subordinate, the subordinate took literal meaning of the idiom and misunderstood the meanings. * A presenter from Japan was presenting in Pakistan, at the end of the session his audience interpreted the message differently than the presenter expected, ‘* Some construction work was in progress during class in a nearby building and the students could) ‘ot understand the lecture, ¥ Q3: Often employers look for a well-rounded personality in candidates and therefore they probe various aspects of interested candidates during interview. Considering yourself to be an employer, develop THREE questions from each of the four areas that you would like to ask candidates Trainee Engineer position. [12 Marks} a. Academic qualification b. Field experience ©, Working style 4, Career objective ie * Qets You ate the Managing Director of a pri t on-profit business that builds homes for needy fam! identified that there are many businesspersons, who C# Muhib Zia, CEO of Zia & Sons Ltd, DHA Phase a convince him, to sponsor your project and provide you suis studer % QS: Your department has set up a team of six nominated as head of the organizing team. a sve important issues related to the event (A) Draft agenda for the first meeting to discuss five imPo! Neal organization. 106 1 s held (B) Write minutes of the meeting ~ assume the meeting Wa: a i i for various Q46: AMAZON Corporation provides machinery, equipment, and engineering eee Hi industries, The AMAZON Corporation has now decided to expand business in Kara me ‘ae been considering the options of opening the new site office, which is closer to its © ts a Se them better. However, the management cannot find the suitable location for their site © es aa “The management of the company has requested to investigate the situation and conduct a SUE) & identify the best location. After conducting the survey, you have identified that Korangi Industrial area ts the most suitable location for the site oftice Write a short report on the survey of new site office in Korangi Industrial area, Write a brief introduction; describe the method; findings; analysis; conclusion; and recommendations. The findings and analysis section should provide details about the availability of space; opportunity for business growth in this area: and available facilities of electricity, telephone, transportation, and other utilities. The report should include graphs/charts/tables or other graphical representations. You may assume necessary details. [12 Marks] ‘ARMED FORCES INSTITUTE OF CARDIOLOGY THE MALL RAWALPINOL NITIES | omutenion | Suton 2 22}easn Sta elon &imlomorsion |. nia nove otubed ; wo ede amon PHP, Osacie form & ceports ete. ee ‘Apptcaton alongwith Photocopies of documents willbe submitedupto 8 Feb 0 ruary 2019, »b,_Tesvintenvew of siectedeandidates wile conducteion 13 Fabruary2013, & Otina documents snouabe pescedatnetinat enon NoTADA willbe piven tothe cancites for testiterviow. G80-1 (Admin) (AFICINIMD) feeds ‘Tho Malt Rawalpindi, Ph: 9271002 ¥ Q.7 (A): Prepare your Resume according to the above advertisement. Q.7 (By: Write a job application according to the above requirement, NOTE: Altemp! FIVE questions out of SEVEN, selecting any TWO questions ‘THREE questions trom section "8" SECTION-A (DIFFERENTIAL EQUATIONS) {22 Solve the folowing PDE's (9) (D%4DD'-60"2) 2= x+y bj (03-402'+400"2) z= 2anaxe2y) c) ¥Q=xp =z \-@2 Solve the following ODE's: } Sex tany dx + (1 eH) sectydy=0 b)edy ty x+y) dx=0 } dy/ax+ y secx. Q3 Solve the following ODE's: a) 4 9y =e b) x22 — x82 + y = sin(inx’) (Cauchy Euler's DE) By messee~ elhod of varalev el pararneten) SECTION-B (LINEAR ALGEBRA) Q4 {a} Use Gauss Jordan method to solve the system of near equation: XIFSXAADO=D | KH ROHTAI=G | BROKE 2 Discuss the Consistency of the following system of equations: AxtBytdz=1] ; xtSy+72=15 ; 3x+1 ly+132=25. In case the system is cons'stent.soive i. (a) Find the Eigen values & Sigen vectors of the matrix vs flo -1 @={1 21 pee 3! () Find the characteristic equation of the matrix o 12 -2 e=|1 1 1 | ;Hence find A%. By applying Cayley-Hamilton theorem. 1 3 @.6 (a} Define an orthogonal matrix, Prove that, -1 2 2 A=1/3| 2 2 |is orthogonal. De 2, 1 {b) The matrix A is defined os: Dai 2iya 3, 0 -2 6 |;Find the Eigen values of SA*+5A’+6A+1 0 0 ~3 Instructions: Answer 5 questions All questions carry equal marks. on. ‘UAE You have been appointed asa projet manager within an information sy ‘Your job is to build an application that is quite similar to others your tam has bul this one is larger and more complex, Requirements have been thoroughly doc ‘Customer. What software process madel(s) you choose and why? \-®istall the designs concepts and give description foreach Qe. Discuss how structural partitioning can help to make software more maintainable, 5. Write the advantages and disadvantages of waterfall and prototyping model. ©. What are the elements of analysis model? 83. <2 Assume that you are the project manager fora company that builds software for consumer ey Products, You have been contracted to build the software for home security system. Write a Statement of scope that describes the software. s \_b Refine software requirement engineering and describe the activities of software requirement [0S] engineering. fe Explain the inputs and outputs of Domain analysis 4. KA. Develop a Use case diagram, Use case text and Data low Diagram for network based course registration system of university \bDiscuss software engineering as a layered technology és. 42. Propose a specific software project that would be amenable to the spiral model, present a. E scenario for applying the model tothe software Requires an addition/subtraction of 3 for correction of invalid codes.) Works with most seven-segment displays Design ie 7 Li re mber and outputs " De decficpclit Using o|ROM. It accepts 2 three BIEN! be s a ‘2 combinational circuit usi . square, Question 3 ck diagram only). Design a MOD 4 binary asynchronous up counter (blos For the counter implemented in part a, ; What sequence of outputs (Qx2;00:) will be produced by the follow Assume initial state to be 0000):. External ‘lock Find values at all the output pins of the following ICs with the indicated inputs: (See IC Pin [5] diagrams on the last pages) i. 74138 ~ 3x8 line decoder: A, 8, C are kept high (1), and all enables are kept low. 1 74147 — Decimal to BCD priority encoder: All inputs are kept low (0) 74148 — Octal to binary priority encoder: E1, 00, 06 are kept high (2) and remaining inputs are kept low (0). 741944 bit bidirectional universal shift register: Positive edge is applied at the CLK input, 1 is kept high (2), all emaining inputs are kept low (0), 7490 — Decade counter: CLK Bis connected to QA, allremaining inputs are kept high (2) Question 4 Design a 2-bit up/down even sequence counter. Use SR fli flop, Map all unused states to don't aes cares. Complete the following waveform to show the output of a positive edge triggered JK flip flop. The PRE and CLR inputs to the flip flop are active low. Abc Pru iy b bast Ss re ¢ Find straight binary value of the following and convert it to gray code: 0010 0011 0100)sco dA digital system uses 12 special characters, which are coded in the forms of uni combinations of binary bits. The codes are assigned as follows: % Operator {th ]?/&[s[i) | se Code (in decimal) of1{2{3| 4 [6] 7 |8] 9/10} 41) a2 i, Design a simplified logic circuit to detect appearance of any invalid code at the input ii, Give NAND implementation for the logic expression obtained parti - IC Pin Diagrams 74148 - Octal to Binary Priority Encoder ‘74147 — Decimal to BCD Priority Encoder (0 70 9 — inputs to the encoder Az, Outputs (A being the LSB) E/—Enable input Time: 3 Hours () Attempt all questions. Q) All questions carry equal marks. (3) Give examples and draw diagrams where necessary No.1 __ Xa) Define engincering? 234%) Define functional and non-funetional goals. Define different goal gategories ©) Construct a goal gra ean (CLO3) iph of a Library Management System. The Parent goal from where _ uuld start is Achieve/BookRequestSatisfied] ’ “te goals? Explain the advantages of using goal-oriented requirements you sht BKIQING 2h = (a) Define stakeholder-driven re élicitation méthods. Exp! elicitation. / an & ‘quirements elicitation and artefact-driven requi lain in detail different methods of artifact-driven requirements (CLO2) \ Q.No.3 XG) Define Bk lon i. Fault trees ii. Product-related risks b) Construct a security threat tee for the risk of denial of service incurred by your * favourite e-mail server. (cLon, ON lee 543 +5) P f@) Explain the classical requirements engineering process, (b) Discuss a standardized template for organizing a requirements document. (CLO2)” 3 Nos (0) (a) Define Obstacles. Discuss why we liken obstacles to risks. Consider the goal AuthenticatedAccess is obstructed by the obstacle PasswordForgotten in a Web service, J that this obstacle is the indication of a risk and has to be mitigated. Explore goal countermeasures to this obstacle. * Attempt ALL questions. J Make neat and clean diagrams where necessary. * Questions can be attempted in any order but all parts of aq attempted together. There is a requirement to build web application “homesecurity.com”, Serve as the hub for product marketin, generation of securi i exists but a broad strategy and a few good ideas, The need is immediate, and a Web presence must be up and running as soon as possible. EXPLAIN how the Web Engineering framework activities will be conducted for the given scenario (1 iteration of WebE Process framework is required). [CLO-1] EXPLAIN how a website can be secured using the HTTPS protocol. [CLO-I] 2) z EXPLAIN the Web En; [CLO-1] gineering (WebE) process framework with the help of diagram, (b) | DIFFERENTIATE between 3-tier and 2-ti | ofdiagrams. [CLO-1] ier Web Application Architecture with the help Q3 | fa) | Briefly EXAMINE how Security testing is done to validate the security of a web application. There is a popular news site. At any given time, 5000 concurrent users submit a request (a transaction T) once every 20 seconds on average. Each transaction Tequires the WebApp to download a news article that averages 15 Kbytes in length, Calculate the throughput and Link Speed for this web application, [CLO-2] (b) | ANALYZE with the help of diagram the Database Testing mechanism for validating the [CLO-2] . fa) A simple web form takes input from the user. If the number is less than 10 or gt than 30, an error message will be displayed. ANALYZE this input validation usi Script Validation API, [CLO-2] e Dynamic Contents of Web Application. Highlight the main layers of interaction as well, | is a requirement . Form should have an embedded C8S for prcsctiston Often sft ‘© _ Input Validation should be done to minimize the load on the server. ANALYZE this scenario to build a form fulfilling the requirements using appropriate client-side technology. [CLO-2] either the MySQLi or PDO based object-oriented approach of PHP, how the fo data can be inserted in database, Write down the relevant code, Also, do the input validation for email field. [CLO-2] John Mike 10/07/2018 User id(primary Key) | Firstname | Lastname | Date 1 Sam Kim 11/07/2018 = With the help of simple PHP form that takes three input from user “name”, “password”, “email” ANALYZE the difference between GET and POST PHP methods of Data submission, [CLO-2] ‘+ Attempt all questions, Ail questions carry equal marks, + Avoid unnecessary details Draw the diagrams with pencils ‘Neat and clean work shall attract more marks Question#1 \4F Discuss the concept of data independence and explain its importance in a database environment. (6 marks) é -)-Compare and contrast the two-tier client-server architecture for traditional DBMSs with — the three-tier client-server architecture, (6 marks) ¢ ©) Discuss Fourth Generation Languages (4GLs)?_ (3 marks) Q_ Question#2 (CLO-1) a) Explain the relationships between mathematical relations and relations in the relational data model. (6 marks) @ b) Describe the relationships between mathematical relations and relations in the relational data model. (S marks) Q_ d) Discuss the advantage and disadvantages of DDBMS. (4 marks) 4 Question#3 (CLO-2) 4) Each|employes in an engineering company has at most one recognized skill) but a given, skill may be possessed by several employees. An employee is able to operate a given machine-type (e.g., lathe, grinder) if he has one of several skills, but each skill is associated with the operation of only one machine type. Possession of a given skill (@.2. mechanic, electrician) allows an employee to maintain several machine-types, although the problem of Inconsistent Analysis lack of Concurrency Control and also determine how the mechanism can be used to resolve this problem. (8 marks) i 3 4)" Given the following relation and example data: Determine third nomal form (NE) of the following table. 4)" Determine the approaches for securing DBMSs on the Web. are . ae het. (her B41) mssv “dn yoreo 0} Joyadwioo sty) 94) I [[IM Buo] Moy “(yyUOUT Jad 1) TOK Yovo ¢"] Jo 1o10Ry v Aq sonosdut UoNadutod arp J -s01NeduI09 (e €ON __ £91z-079] _uonsand O1 paddies Kiowur puw Oj paiwjosi wawiog aieMOIEHIG Onl -sgotaap Sundnuzaiut Furjnuapt jo skem quarayip arensnyiy (Pp soBejueapesip pue e fz] seBequeape sit aa18 pur owoyss uonrmiqm snq uleyo Asieq aquosop Ayotig, . Be ie. td siojourered soueuuojrad adéy mndySnomp SdO TAN Pur SAI axedu0D, cca uonewosaadas quaute|duoo $2 “AE uonequasaidar yuoutojdaios s,J “It t uonemuasoidos apnaqusieu -uBig uoneiuasaidas poudisu) souloyos SUIMOp]O} OH UE [zl sitq Z¢ Buisn poyuesaidar oq ueo yey) siaquinu jeunop Jo aBuBI ayy SUTLUNa}OC, os TON urexerp anos ut stig Jo squint ay} MOUS “SHA-p Jo Youe siaystBar g ar UWOROMAST, my sj TONTDOOAT SaTN a}OND a/TUIS soy THEdeIp UASaq_—_ BN a Kene 9180] o[qeuure:Soig Suisn 5 weur jo voneyuaWe|duN areNsn| SjouE “AL ‘MOHONASUT aug aesodI0IU! O1 [PUBIS 91S Dd_ AMpoW ‘wBisop ypedmep ut uoronnsut boq Joy [eUFIs god ateNSNAI] SS f udIsop jun joxoD weU Ur s[euats yosjUCO dun! pur YouEG Jo asn ay aquOseq| 3h, qu [onuOD UR Jo UBisap ayy ut sjeusis jonucs donTY Jo souRsyTUaIs ayy ureTxa a @ TON £0'[¢-OTo) _vonsand) 94 jsniu uonsonb v jo sued jye Ing Japz0 Aue ut pardusone 2q Kew suonsondy < ‘suonsanb qe iduiony < ‘suononnsur 1 ssemppe _jenuonbos ROU ay Supuy ur sdjoqy VST SaNA WI suononnsuE wBuE poxty (q lg . “spor, “Buissosppy-asegq asn Vs] Sql ul suononnsur aouazajar Lrowayy (Wy E) tel Ayalag Bumorjog amp ssnosiq. > ‘ayoeo ijds pur paryrun aredu0> “VIN Jo apout Surpeais [940 pue apowr ising alco aa enbruyoay O/| paururesBorg 4x0 O/t UaaUup dnssoiuy Jo oeyURApE ssnosiq, WEUTUIOD ‘snouomyouKse s} sng Oy searaym snouosyoUAs st sng AroW8UE QW) ~wsseoo1g -s2snq snouoryoussy pue snouoryousg woomiog orenuorayig fe SON, ZI'L-OTO]_Yonseng ‘durysenp wieldxq @ apin VG-CE are sassasppy “¢I9] Jo az1s our] yp ayovo padduyy i098] EZE -aaneinosse Ayny aur]/E1g ‘ayov9 Ey Ze “AlowoU UTE, EIA 91 yar spuom. AZ aatteioosse qos Aem-g ‘aury/spiom of ‘Kowayy UR spioM\ YOST ‘Soseo Butmo[joy ou Jo Yowa UI Suruonned ssouppe pury —_ (a Arowiaur sugz sasn ayovd aumssy “ayov NOUN SUDST pUuE 2ydeD YOR ut ouRUIIEC] “SY90]q ZT 21S POI FO AIOUIDU v WOT] S¥DOIq spfoy ey) Soul] ZE HIM ayoeD v rpIsuey —— (@—> UBOUIUaIS Sy aqUISSg AN ooovaogs xo + _ WULOY C7 AAAI Ul Woduodxa paseiq Jo 95 % i Pandan iayyeug I sanedouwoaey 950 1 282d Iq BUI U; Atinba s,sauMNo ayy Uo yayJ2 areipeLuLU! OU pey UORDeSUEN SIYL “Pp me WuIsng ay S¥eWs UO!}DesUeN S14 sOr;pa19 WHa}-OYs e Jo JUIOdmaIA ay WoLy “2 “000'OdsY Aq paseassuy sayayiiqer] jeioL “qk “000'021'sY Aq paseasouy syasse jeio, “e suondesued sit Jo 1NsaJ e sy “sAep OG U! anp aiqeded a30U OOO‘OL'SY IS PUE Used 000'0S'sy JO JUaWIAed Umop e Suryew OOO‘OZT’SY 40} daa! e paseyoind doysieog 4IeM “py sanuanai wiea 0} pouiad ayy SuLinp pauinou! sasuadx3 “Pp pouiad ay3 Bulinp saumo aya Aq suonnguyuey 2 pousad ay) Suuinp pauses sanuanay -q powad ayy jo pua ay ie aauejeq ysey “2 yuaurereys aw03u) pazedaid Aj291409 e ul puy 0} j2adxe NoA pjnom Bumo}joJ AYR JOUDIYM “€ “aiqentenas yuno22e QOO‘0OT'SY @ JO UoNDaI/09 “P. ‘ueo| xueq 000‘0OT'sY e Jo 1uswAeday 7 patosisap sem 0QO'OOT'Sy Jo3S09 e YIM yasse UY -q (000'001'sy 10) x9n13 Auanjap ejo aseysing -e :uaaq eney 19a JP103 UE s3955e [e103 430 UI ase9:99p QOO‘OOT'sy e PasNeD UONIesUER YZ ‘uotuido jeuosiad 10 sjesjesdde uodn “saoud yoysews Syasse yey awinsse squewunos2y 2 e101 undengns_-q~> Buo ale sassy -e quonenjenaasse 44d Bununosde paydaoae Ajjesaua8 Yp1m quaysisuc> you S| UaWOIe)s BUMO||O} By2JO YDIYAN “1 \ wean Ov aduiony Azosinduioo st *{ uonsand ‘syzew penbo Aue suonsonb 4¥¥9 J@pun awo2ui you jo wawiainseay, “p Bununos2e jo siseq jenso2e 2 saunua BuIso9_ sq sauua Sunsnipe -e id Suiyoreyy pue {drowsy wonvzyreay axp uodn pase 10u st SuumoTfog axp Jo Yor “OI “aUIOOU! 19U Jo yunow payodos ayp ezmuxEPY —p sexe} ouroou! azmutUTyy ‘9 P08 spoo8 Jo 1s09 ajetidoude we anuanos ysutede r98fJ0 -q astpuryoiotu Jo sun Jo moyy joorskyd axp jayjered -v 015! uonduinsse mo Aioyuanut ue Buisn yo asodind Asewuid ayy “6 asuadxa sayjddns -p anuanay pauseaun 2 vone!saidag parejnuinsoy sq asuadxa quay -e (1981109 aq Aew samsue auo vey) a1ow) pouad Suuno22e 9471 J0 pud a4} Je uN022" Arewwns awosU} B12 02 pasoj> 10U axe stuNoD2e ZUIMo}IO} a4 Jo YY “g ajdi2uud Aauasisuoy

won nquasip sua ul pue spuapinip 03 se seauaz9ja1d Buiney Alensn yo0as[edeD Jo sse}> (000‘04'sy Jo 3Un0238 aiqensa22y siUno22¥ 243 0241G2P ¥“P_ (000'04's4 Jo uN0Dde Ysea 02: vonisod je/sueuy 2y2 uo quaUOD (AL ways aouejeg quawiarers s8ujuse3 pauierey ( quawarers awoou) a1edald Auedusoa aun jo Aujigeiyo:d pue OzT'00E Ozt'00E ose ‘asuadxg 150010) 829'97 ‘asuadxg xe] WOU] (000°St ‘asuadxg a2uesnsul oor'6t asuadea Sal quauidinb3 rad puie sj003 :asuadx uonersesdag oso'T Zujpung:esuadya uoneivesdeq 00s asuadxg saljddns 0s'85, ‘suadxg sade, He 006'E ae ‘asuadxg SuIsiuaApy | 0009 pauses anuanay wey |000'zet z ‘anuanay $]2S YL 2 OOoT puapiaial~ 0 sdujuIe9 paulersy 000°00t ypois jeden 0009 7 . SRUSRSy Tay pauseaun ogs's 1 aigeked xe] awOouL ae ajqeAeg syunoDay ie a aideked SION quauidinb: = o00ZE | juawidinby pue sjooy x Buiping: uoneiseudaq paye|nuinaay 00SE SICH oo'es ni = wore —____s5uemnsuy paadxaun oe sayjddng S450 ie aigenraday siuno23y | use “102 te saquiaag souelee jeu parsnipy onesedio5 -ouy01 & (8) “stayrorg Vos 10) (yeLI05 SuIMo}]0 a43 0} SuIps0I2e) JaysyJOM UUUN|OD OT e a1edadd (2) Szr'69eT Street er S797 asuadxg 15910101 nose S5uadsa soem, (000'0s ‘sad BuISIIBAY 000'0ve Rie ‘anuaAay ainles Heday = 000°0E a BuImelg ily UEWON, 000'TS: BUIMeIG Hy UELSO 000°005 % ide 1) UeWEN 00s'r6L i Iv UewisO S7gt algeheg isaiatul 000°%8 ayqefeg siuno2ay 0070s, aigefed S3i0N [ooo’ozt TWauIdinbs SIO 000°08% Sulpng (000'609 pueT 000'ST sayddns doys 0056 ‘3yqensau IUNODIY (000°08 TAIPUARSIOD _aiaeiea SION 00056, W529 dar ins dou: DUNG ; 0 is 30 yusom goos'se 12412928 y ynyasn “poureus aun quails Busy 102 ‘Te 29qwWa220 ‘aouejed leu parsn{peun s194j019-UOWS 30 ay nzjen “siaypose-uowis so suenes yo yyuow ayy Sung s2e94 OF suet quauidinb>) oun L107 ‘(Hor ‘Te sequiazeg parep aouejed je Bulsoja saye ue aiederg — (9 ‘7g saquiedag Jo sainjua Bujsoj9 Avessaoau ayy asedarg — (e ai a eee - SSBdND OY BUUOSTT ponies —_____ asuadxe 3sou93uy oa ~_juauidinba casuadxe uomeroardaq: 00s ~__ asuedxq Susieapy 0061 iz asuedxg aouemnsuy 000771 5 asuedxg quay, | 006€ asuadxg Ajddng 000°s8 asuodxy Aiejeg Palle entigngy “WAG 000°9 SPueplAld SSurtues pourejoy pois eydED SNUSATY WIRD pouresuy a. a. [000%1 ei ———| 007i ———+ [ooo's ————_ [loop6 | [oo'ossy7-———_ “ay 21qeked Saxe; auIODUy 21qeabg Sonejeg aiqexeg junds

You might also like