Comp-Science Previous Year Paper Delhi University

You might also like

Download as pdf
Download as pdf
You are on page 1of 161
i # _léegc [This Questio Oo Paper PNtaing ¢ Printed pages. | Your Roll No... Sr. No. of Question Paper . 1045 Cc Unique Pape; Vode 32341109 Name of the Paper Computer rchitecture € Of the Course > BSc, (H) Computer Science 4 Semeste: I m2 3 Hours Maxannim Marks : 75 Ss for Candidates ; ‘our Roll No. on the top. immediar ely on Teceipt question eRe 1024 z {b) How can a D flip-flop be ; 5K firp-flop? Explaim with the help of 2 block > ¢)How meny 1288 memorn chi | provide a memory capacity of 209615" (2 L control unit? . @ Program Counter and @) 1 25 a floating The hormalized exponent has = as 2342011102 : B.Sc. (H) COMP gore Your Roll Noses" 1039 : Computer System Archit SCIENCE (NEP-UGCI 2022) (i) Instruction from memory wil] to this register, The address part of the memory-refer tion is transferred to this Tegister contains the addres i lion that will be executed (3 e-reference instruction? Give ame the addressing mode used ns? (G3) © Operation (-5) + (-6) af Mplement and 4-bit register 1039 3 de ; . and deo? (g) Write the microinstructions for fetch and ontrol rith © phase of the instruction cycle along with (4) Signals, : w is it (h) Briefly explain the working of encoder? Ho (4) different from decoder? : data (i) Explain control command, status commanes tion input command, data output command in (4) to I/O communication. 2. (a) Draw the logie diagram of a 8-to-1 line nultiP ee Explain its working with the help of func 2) table. § (b) Simplify the following Boolean function F, together with the don’t-care condition d in SOP form and draw the logic diagram for the simplified F. F(A, B, C, D) = E(4, 5,7, 12, 13, 14) d(A, B, cep) = 20.9,11, 15) (5) (c) An instruction at address 021 in the basic computer has 1=0, an operation code specifyin the AND operation, and an address part equal g 083 (all numbers are in hexadecimal), The me be word at address 083 contains the operand oy and the content of AC is A937. Go oy aF2 a instruction cycle and determine the cont er the acs hy the following registers: PC, AR, DR os of at the end of each timing signal starti and IR to the end of execute cycle, ing from rr. (6) ~ "tex 4 (a) Perform the following conversions - (i) Convert the decimal numbe, 24 hexadecimal. 5.25 t) - (ii) Convert (101101.11), to decimay ( 4) How many 2-to-4-line decoders wil] p. construct a 4-to-16-line decoder? Give ;, diagram of the same. Used to © block (3) insider the bus system shown below: (6) 1039 5 n in 4 , . ; tive ! (i) The following control inputs ar¢ 4 the given bus system ansfer For each case, specify the register f cloc that will be executed during the ne transition. a. Linea TR Read 5 b, 0 1 «0 AR i q c L © ay DR Write : ESOC OMMOMEEAC | 005 Add See (i) Write the microinstruction to set the flip- flop R to | including the control conditions. 4. (a) Write the excitation tables for the JK flip flop. How can you derive D flip-flop from a JK flip- flop? Show with the help of a block diagram. (4) (b) The memory unit of a computer has 256K words of 32 bits each. The computer has an instruction format with four fields: an operation code field, a mode field to specify one of seven addressing modes, a register field to processor registers ‘ pecify one of the 56 » and a memory aq : Specify the instructi ess. on format and the numb bits in each field if the instruction is a in One memory, word. pemory (3) (c) Assuming the time delay of the four’ . a pipeline are as follows - ‘Ur Segments in (, = 50 ns, t, = 30 ng, t, = 95 : - 2. 3 : \ interface registers delay time | = ore 38 6 would it take tO execute an Instruction over 109 ‘airs of data in the Pipeline? What Will be the eedup ratio if the time taken {o ex a ene “cute same instruction in a Hon-pipelined system is 300 ns, (6) List any four characteristics of GPU (4) hat is DMA? How cycle stealing js different burst transfer, (6) w the diagram fa 4-bit binary adder- tor. Explain its working with the help of an (6) the fourteen-bit control word for the basic er that must be applied to the processor to the following micro-operation, given the ode for the operations are as follows : B S-bit registers R,, R,, e the following unsigned ©0031, R,=001! 1010, 1039 7 i ; aa er Determine the 8-bit values in each register afte the i the f : ad jons in €Xecution of the following micro-operations Sequential manner: T Ty Ry OR AR. i Ry —(RyvR, Jar, (5) (c) Consider the fragment of memory as shown below - the addresses and register / sen eeend are in decimal. A two-word eon sol is stored at an address 600 with address a ae at address 601. The first word consists ‘mode bit’ and the op-code for ADD to AC es oni instruction, whereas second word of the struction contains the value 840. Further, the P,T.O, 8 content of Memory gy shown in the figure ab counter register with val purpose register with Index register with valu register with content 160. address and the content | Operation is performed for modes: Addresses is as . iS a a eae Blue 904, xR ig an 200. BR is the Base ermine the effective AC register after the ¢ following addressing (i) Direct Addcoesianl , (ii) Indirect Addressing iii) Relative 3 (iv) Indexed (6) (4) AB'C’ + A’BC + ABC’ ible of the function. ebraic expression. agram of the simplified NAND gates only. G) th the help of a m Interrupt driven. ; (6) (500) te [This Westio 3 ™ Paper Contains 6 printed pages.) Sr. No, of Question Paper ; Unique Paper Code Name of the Paper Name of the Course Semester Duration : 3 Hours o Your Roll No.0" 1058 D : 2342011103 Mathematics for Computing : BSc. (H) Computer Science a Maximum Marks : 90 Instructions for Candidates of this question paper. Write your Roll No, on the top immediately on receipt 2. The paper has two sections. Section A is compulsory. Each question is of 5 marks. ‘Attempt any four questions from Section B. Each tion is of 15 marks. 2 x, + 3%, + x, = 1 —4x, — 9x, + 2x, = -1 =3x, — 6x, = -3 ine a convex set. Show if C = {Xi 2x, + 3x, = 7} & R? is a convex set. (5) (c) Show that the transformation defined by T(x,. x,) i" = (2x, — 3x,, x, + 4, 5x,) is not linear. (5) (d) Find the characteristic polynomial of the following matrix (5) 14+2)+3k be two lot product of these ihe vectors (4, |, -° ’ basis of R’. 1058 3 i Section B 2, (8) For what values of and p do the following system Of equations is consistent. o fF xty+z=6 x + 2y + 3z = 10 K+ 2y+hiz=p 4 Apply Gram Schmidt orthonormal, ‘Allo » obtain an orthonormal basis fo, the .. Process ue ‘ “ generated by the vectors, (1, | 01,4, a of 0, 0), (8) 1) Space? Let Y be the set of vectors rm [a,0, b, 0]. Prove that ¥ isa (8) and divergence for the following (7) +x727k trix? Is the following (8) 1058 5 SG) Let a=(1,1,0), 6 = (3,2,1] and ¢ = [1% 2h Find the angle between: a, b and b, ©. (3) () If $(x,y,2) = 3x2y — y%2?, find Vo(gradd) at the Point (1, -2,-1), (4) (c) Diagonalize the matrix (8) 20 0 A=|1 4 4 3-4 4 7. ct space, then show that i> + b where 6 Beousity to Banks B and c. However, two-thirds of its investors, with the hing equally to Banks A anq C. keeps half of its investors, With itching equally to Banks A and bution of investors after two (8) : inted pages.] Abe sven, paper contains 4 psi" St. No. of Question Paper: 1295 Unique Paper Coge + 32343306 Name of the Paper Name of the Course . Web Design and Development B.Sc. (H) Computer Science Semester : I Duration ; 2 Hours Maximum Marks : 25 HStructions for Candidate Instructions for Candidates Write your Roll No. on the top immediately on receipt of this question paper. The Question paper consists of two sections. Section A is compulsory, Attempt any three questions from Section B. SECTION A (a) Differentiate between GET and pogy method? (2) (b) What are container tags? Explain with examples? (2) P.T.0. 1295 2 (c) Explain printr statement and foreach loop? (2) ‘to use css externally. Give syntax @) (ce) Give the output of the following code : (1) string is ‘No problem’.
”; String with the help of an qa) create the following (3) that displays ty, text b, = The first text 4, ‘OXC§ the double value of , first text box. ton is checked, the second the square of the number (3) Your Roll Now f Question Paper ; 1374 Cc per Code © : 32341301 + Data Structures : B.Sc. (Hons.) Computer Science + OT Maximum Marks : 75 the top immediately on receipt is compulsory. om Q, No. 2 to Q. No. tents of the queue with position of Rear after each of the following in sequence. alculati ng thematical 3 * (B-C) +D) $F+E) t ng device upon receiving the start converting it into a parenthesis, yA step by step using some algorithm’ it, Which data structure the would use in the algorithm. the Algorithm used by the and give the parenthesis free calculating device “would have (5) word's is to be searching is quick : ip,yogart,wolf, 1374 j _. (ii) Show diagrammatically, the dictionary created using your suggested data structure. a. _ (iii) Give the number of comparisons that would be done to search the word xor in the above dictionary. (3): the following member functions for a vector rt (i, €) to insert a new element ¢ into V at index i. move the element at index i (5) trick to store some numbers 9999] in a crate of size 20. te are numbered from 0 to decides where to put the number digits of the number. If is already occupied, in the next available a 1374 ¢ asked to pick up any number, the magician 1s able to pick up number without much searching. Devise - the trick used by magician and find out the locations - where the following numbers would have been Mere i226, 7242, 6867, $220, 1161, 4444, 6221, ; ? 65) H using following data : 49, 11, 22, 65, 30. sh insertion. - (5) @ 2D array A of 2 bytes of memory ; 2005. Write 6 der some students, seated randomly in , Ee $ udents are required to perform OM stage i . st ing order of their heights, such that e s dent is called on stage, the teacher ¢,)), ‘i tudent out of-all the remaining i, stage. ‘show, ae Steps of the = follows if the heights (jn the first 10 chairs seated on students i. ‘the. ‘output of the below function fund if is invoked as funel (p) where Pisa he function func? ; Void fun2(node *s) if(6==NULL) return; cout<< s->data; if(s->next!=NULL) fun2(s->next->next) cout<< s->data; ite functions for the following ; 1ove an element x from a doubly linked ‘list of integers. Gi) ‘ata singly linked lists: of j integer intowone list, (6 peHoe MB Tccursive function - (s - Double cale(int x, int n) wh _— iffin=0) return i > else L 3 ieticn x*cale(x,n-1); 1374 10 Iraverse(p->left); traverse(p->right); visit(p); ’ 5 Write NON-recursive/ iterative tree traveryn} tion to find in-order predecessor of a ry search tree. (5) n nting double ended queue (deque) ways using Array, singly linked list. Give running time below operations for all the i (5) 1 integers 3,8, 11, 13,5, 9,15, 18, 21, 1 of tree after each insertion. id show the tree after deletion. at (6) inary search tree (BST): by question paper contains 8 printed pages.) Your Roll Nov.csssseereree Sr. No. of Question Paper: 1402 Cc Unique Paper Code + 32341303 Name of the Paper : BHCS12 - Computer Networks : B.Sc. (A) Computer Science Name of the Course (CBCS-LOCF) dul Semester Duration : 3 Hours Maximum Marks : 75 Roll No. on the top immediately on receipt question paper. n A is compulsory and carries 35 marks. - questions from Section B. carry equal marks. ¢ repeat sliding window protocol ae KB to send data on a . atency of 50 msec. of 60%, what is the to represent the G3) P.T.O. 2 (b) Give any one difference between port address, physical address and logical address? (3) (c) Suppose the following character encoding is used f in a data link protocol : (2) Bi A: 11010111; B: 11101101; FLAG: 01111110; Esc: ' 10100011. Consider the character frame: A B ESC B ESC ESC FLAG Show the bit sequence transmitted (in binary) for ve character frame when Flag bytes with stuffing framing methods is used. ‘significance of the following special 2) (3) es resolved from a given (3) th a 100 KHz bandwidth | together. What is the e link if there is a need KHz bandwidth channels (2) : 3 ee J FLA) Bias. fl “3 — (h) In @ given modulation scheme, there are 4 % . eopbiide levels and 16 phase levels and the bit ) is 72 Kbps. Calculate the following: a G) Number of bits per baud (r) _ (ii) Baud rate (8) (2) True or False for each of the following : 8 in circuit-switched networks connection establishment and release, in circuit-switched networks do any information about the network to function correctly. (2) efit of “twisting” in twisted-pair (2) of PSH and SYN flag bits header? (2) mn by well-known ports? ned to HTTP and (@) ‘anged in a mesh needed for each Q) P.T.O, OE I 1402 : ws (a) Which of the four digital to analog mody| techniques (ASK, FSK, PSK) is most Susce to noise? Justify your answer, Allon Puble (2) (0) Map the following to a suitable layer of the Os] model : (@) Route determination Interface to transmission media li) Provides access to the end user @) SECTION B coding scheme with two legal 01010 and 10101. Hamming distance. bit errors can be detected by it errors can be corrected by (3) ode whose binary = at a@ receiver of the message? it is in error. § Explain and discuss the Yarious fields of Ip Header with the help Of a diagram (4) ) HyperTeat Transfer Protocol (HTTP) is a MMLGICKS Protocol, Justify. Q) ler has the following (CIDR) entries in its ig table : Q) Next hop Interface 0 Interface | Router | Router 2 lowing IP addresses, find the y the router? are each trying to After cach frame 6 Compare and contrast Transmission Con : protocol (TCP) and User Datagram Protoco) + 0 (UDP) with respect to the following Paramete A TS. tro] Connection ence of Data packets at the receive, Acknowledgement of the received packers (3) Nyquist Sampling rate for a signal idth of 200 KHz if the lowest 100 KHz. (2) en static and dynamic routing 01101 is transmitted using The generator polynomial is (342) itted bit string which e and CRC. bit from the left is ion. Show that this Teceiver’s end. 1 i wcan a machine with a single DNS name Multiple IP addresses? (2) ider the IP address 184.86.92.182, the class of the given IP address, if ‘we are using class-based addressing. ‘twork in part (a) is to be divided lifferent subnets, what would be the network address of the subnet address would be attached? » find the length of network in part (c). (1424241) nee of flow control in the ion? Suggest any the issue of flow (6) 7 PTO, i zo 8 i fe between Time Division and ion Multiplexing. Q) ‘ork shown below and assume ially knows the costs to each msider the distance vector d show the distance table entries at (4) m of an IP packet ) from source to (2) . DNS packet ery. Does this Arr question paper contains 8 printed pages-] Your Roll NoOvcececnertree’” Sr, No. of Question Paper: 1402 c Unique Paper Code + 32341302 Name of the Paper + Operating Systems Name of the Course : B.Se. (H) Computer Science Semester : Maximum Marks : 75 your Roll No. on the top immediately on receipt this question paper. 88 is Working ql) PT. 2 What is ‘Dirty bit’ in Demand paging? Where this bit is stored by the Operating System? (2) iv) Why command interpreter is usually placed separate from the kernel? (2) fv) Write any two problems that may occur in multiprogramming environment? (2) How degree of multiprogramming affects CPU : (2) type of fragmentation that occurs in (2) , how can we achieve the statement ‘a’ of process Pil *b’ condition of process 1402 3 mle | ce (xii) Write the bit vector representation for free spa list for a disk (10 blocks) where blocks 1+ and $ are free and rest of the blocks are allocated: Give one advantage of this representation. (2) (xii) Determine whether the deadlock occur in the given resource 3 allocation graph of three processes as P,, P, and P, and four resources as R, (one instance), R, (two instance), R, (one instance) and R, (3 instances)? Justify your answer, G) (xiv) How many child processes are created in the following fragment of code assuming essential header files are included? Explain the output with justification. int main() { for (int i=0;i<4;i++) fork(); return 0} } P.T.O 4 Consider a system of five Tesources (assuming every resource is having one instance only) and four processes where every process Tequires two tesources to Complete its work. Is there any ‘chance of deadlock in this scenario? Justify your answer after applying all the necessary conditions of deadlock. (3) Consider a logical address space of 512 pages h 4-KB page size, mapped onto a physical of 128 frames. many bits are required in the logical S are required in the physical (2+2) esses, with il time given Draw the Gantt chart illustrating the “execution of these processes using Shortest Remaining Time First (SRTF) algorithm? - (3) Based on the above obtained Gantt chart, culate the average turnaround time and average waiting time for the given Processes. (3) with an example if the wait and signal it executed atomically, then violated? (4) PEO, | ama 6 (c) Monolithic and Microkernel approach to P Operating system design (32) : (ii) Consider the following page reference string : 7,0,3,1,5,2,3.4,0,7,2,1,0,4,2,0,1,7 Assuming demand paging with three frames, how y page faults would occur for the following page replacement algorithms : )ptimal replacement replacement (4) g segment table: Length {a) 0,230 .., (3) Paged system, Translation Lookaside (TLB) hit ratio is 80%. Let RAM access’ 20 ns and TLB buffer access time, T Find out G) requirement of logical and physical ating system? (2) plain it with an example. (4) of 5000 cylinders, numbered (6) currently serving a request at PTO, (C-SCAN) mediate calculations, st the following : (4) iputing and Client-Server Task parallelism alization in cloud (4) time for a user Swapping memory store has 2 (2) Gs question paper contains 8 printed pages.] Your Roll No.......-0+0+ 4 Sr. No. of Question Paper: 1006 Cc Unique Paper Code : 32341501 Name of the Paper : Internet Technologies ae : Name of the Course + BSc. (H) Computer Science ; 0 W Maximum Marks : 75 Networking Protocols with (4) P.T.O 1006 2 {b) Write the network address, broadcast address, valid host addresses and subnet mask for the [p address, 198.2245 173/26 (4) {e) What do you understand by Proxy Server? Write any two advantages of using it. (4) (d) Explain setTimeout() and setInterval() functions with examples. (4) (e) Write any four differences between Forum and Blog. (4) (® Given the ISON object: (2) myJson = { “name” : “nested”, “marks” : 45, “Item” : [“food” , “clothes” , {*g” ; true}] } alue of a. Program to Greet the user based (3) e between static routing and (3) 0 You need to subnet a network that has 5 subnets, ‘each with at least 16 hosts. Which of the following subnet masks are valid in the above situation? (2) lain Sessions in a cookie. (3) and JSON.parse() (2) (10) 4 JQuery to Perform the d “Damon” in the above it list appears as foll 5 mes to the names in the list such that nt list appears as follows ; lame” to each of the list to the list. should change its oH 6 (b) What is a JSON object? Write the 8yntz i : ax t a JSON object to define a student having q 0 adq Cla i name of the student, university rol] Iiuinber, ils: co. Utse (5) ‘name, mobile number and email, following Bootstrap elements : (5) Server using Node.js which port 8000. Create auser.html ister and Login. On clicking ist search for credentials of ase. On successful login, displayed. On clicking ust insert the user's On successful urn to the user.htm! (3) Create an HTML page with one input field, one io button and a text field for display. The first input field will take a mathematical expression as in the text field. 6) that takes data about a customer. FirstName, LastName, Age, odPreferences. At the submission components of an email? ‘format of SMTP. Also alities of any TWO mail access (5) nTNn Cd. question paper contains 8 printed pages.] Your Roll Novssessecerree Sr. No. of Question Paper: 1042 € Unique Paper Code —-:-32341502 Name of the Paper + Theory of Computation me of the Course » B.Sc. (Hons.) Computer Science » V (Admissions 2019-2021) Maximum Marks : 75 answered together. all the questions unless 2 ‘Consider the following Context Free Grammar the language generated by given CFG. ‘two words of the language. (3) languages : {words in which a appears tripled (in of 3) if at all} with a and does not contain the (4) defined by each of the word in the language. (4) ts the language (4) 2 t (CFG) lowing finite lowing language of all the words ‘ing © = {a,b} comprising only empty string 2. Build a finite iccepts the given language and ie, (FA) *. (6) | non-deterministic finite finite automaton: (4) 5 ne Millewing pairs of FAs, build a finite pages are closed closure ‘using non- " where n=1, 2, 3,4, 5....} is non-context language. (4) Down Automata shown below : ribe the language accepted by it. the given PDA deterministic or non- a (4) 7 iruct a PDA for the language a"b%a" where and q=m+tn. (6) the following context free grammar : valent CFG by eliminating all % ert the resultant grammar into (4) , language containing all lindromes excluding the tree for the word (4) is ambiguous: (2) 8 initial configuration to be &LJw (if the INPUL jx b| j the output should be OL)’, where w' is the a, complement of w). Show the trace of above luring . ‘machine M on the string &10110, (5) that if a language is recursive, it is aleo ely enumerable, (2) the Turing Machine M =(K, ¥, 6, s, {h}), tation of Universal Turing (3) ie) i. paper contains § printed pages.] 4 : 1 1 Your Roll No......-....+.« Sr. No. of Question Paper: 1096 Cc rai . 494 2 Unique Paper Code , 32347508 Name of the Paper > Combinatorial Optimization of the Course : B.Sc. (H) Computer Science Vv Maximum Marks : 75 Roll No. on the top immediately on receipt paper. stion 1 (Part A) are compulsory. uestions from Part B. Part B carry equal marks. ar Program and an elp of an example. 2 How is infeasible solution detected in the simplex method? (3) (c) Let G be an arbitrary flow network, with source ' S, sink 1, and positive “integer” capacity c(e) fo, Vedge ¢. Consider a minimum s-t cut (S, T) G. Now construct G’ as the same graph a With capacity c'(e) = 2*c(c) (for each Now consider the cut (S,T) for G’. Is | minimum cut for G'? Explain with an é (3) feasible solution x of a linear program nal form is basic if and only if columns Mk are linearly independent where 2)... D}: xj> 0] (4) lowing linear program into (4) intersection two depots A and B with 7000L. and 4000L respectively. The suppl il to three petrol pumps yse requirements are 4500L, tively. The distance (in , lepots and the petrol pump on cost of 10L of uld the delivery 1096 4 (i) Delete the best set of edges to disconnect 1 ftom $, where best set is defined as the set of edges a with total minimum capacity. (5) Section B id max-flow theorem. (3) with distances as shown in vork. Find the Djikstra‘s (7) 1096 5 3. Solve the following Linear Programming problem using 2-phase simplex method. (10) Maximize Z = 2X, + 2X, + 4X, Subject to Ox, + X, + X, <= 2 3X, + 4X, + 2X, >= 8 Ke X20 late an Integer Program to determine a n independent set of the following graph relaxation condition also. (5) solved in the standard form and timal solution for the primal and have been determined. The rs have been listed next to each m 6 The Primal objective is given by x, and the yy, i] ‘objective is given by y, + y, + 2y,. Which of the following statements regarding the missing Dart: a we the above LPP graphically and find the al solution using the method of iso-profit line (7) nsider the following flow graph. Let the ity and current flow of edge e be denoted (€) and f(c) respectively. Further, let c(e,)=5, c(e,)=3, f(e,)=2, o(e,)=2, f(e,)=0, c(e,)=4, }=2, fle,)=2. Determine the max flow cut, (5) or disprove that i] solution by using the G) PTO. pare it with fractional solution. Cg i » Can integral optimal solution by solving 2 Justify your answer. (5) sible solutions of a rm, Then, show that for a point v < P are yhedron if ion of the linear \hni Westion Paper “Ontaings 12 printed pages.] Your Roll No......0 avec Sr.No. of ; ii Question Paper: 1920 D Unique P. a 7 in 2342011101 N ame of the Paper Programming using Python (DSC-1) Name of the Course : BSc. (H) Computer Science ‘ Semester A Duration ; 3 Hours Maximum Marks : 90 Write your Roll No. on the top immediately on receipt of this question paper. ion A is compulsory. yt any 4 questions from Section B. 2 i ec »{n) i function ch ckPrime(n) t0 check whether number 18 prime or n not. The functj n m 1 if the t ; l 4 Number n js Prime else jon in main( ) t0 check the number Ee -5 mary groupDict representing group. (4) as follows : : { ‘name’: 'Mike'’, : { physics’: 70, history’: 80 } 10 1020 : G) Access the value of the subject Chemistry. (i) Extract the value of the key group: and Use the defautt value as -1 if key is not found, (ii) Create g copy of a groupDict into a dictionary object newGroup. (iv) print the dictionary newGroup after removing the element with the key section. efine a class Rectangle having the following eure: (6) ibutes: length, breadth : _init_()) for initializing the attributes. getLength() which retums the length of the rectangle. 1020 5 (iv) monthDeys = (Janrays3lsPebmany 2 Mast 91 Month = monthDays Month{' February’) =! print('monthDays before clear", monthDays) print("Month before clear->’, Month) Month.clear() print(‘monthDays after clear—>’, month Days) print(Month after clear—>', Month) SECTION B Write a program that accepts x and n as input to compute the following series. (6) ame x? ce x at aa nterms ider the following code snippet Wesday’, 'Wednesday') Wunction swapTuple(T1, 12) : values of Ti and T2 ited output is as follows nday’, ‘Tuesday’, Wednesday’) 300) on mergeTuple(T1, 12) to uples containing the t from tuples Tl and at is as follows : (Tuesday’, 200), 7 der }i51 Li (9) as follows € code Snippets to create the following lists : i OT? a, shallow copy of Li G4) 13 3 2 deep copy of Li. mStrate the effect of the following Weations in 11, L2 and L3: @ L1[2] = 999 Gi) 1113}(0) = 790 : uNnction doubleDict() that creates the Dict! where the keys are numbers 1 and 5 and values are twice the keys. if the key is 5, its value is 10. The ould return Dict1. 1020 4 (b) Consider iwo lists Lst! nd Lt? declared follows Latl © ['green’, ‘bluc’) Lst2 = ["blue’, yellow’) Write a python Script to do the following (i) Convert list Lst! as set SI set $2. and Lst2 as (ii) Add the elements of the list {"black' to $2, yan’ d the symmetric dj fference t | and §2. bel Ween sets set newSet USIng ser ©) containing elements of $1 Gded at the end of each element, ould appear as: ‘greens'} e(marks, total) marks for (6) ry: Percent = (marks/total) * 100 except ValueError: Print('Value Error’) Pt TypeError: Print("Type Error’) ) xcept ZeroDivisionError: 10 (iii) percentage ('200.0°, 200.0) the following functions to Perform the On a String. (9) mtVowel(Str1) to Count the vowels in a © Call these functions and Provide ine given String Str]. G3) 1020 ri (6) Explain the typo of exeeption mised in the following statements ) (i) x=0 Print(S/x) (i) print(’Phe amount for the day is s+ 300) (il) int(‘Morning) (iv) Li = [11,22,33,44,38] print(Lt[5)) Desoribe the following methods for the class objects with suitable examples, (8) @ init 12 (10) rint the total number of lines in the file. y even lines of the file to a file named odd lines to another file named stion paper contains § printed pages.| Your Roll Noss p Paper: 1193 Cc Code : 32347504 : Microprocessor : B.Sc. (H) Computer Science: DSE OV Maximum Marks : 75 No. on the top immediately on receipt ions from Section-A. lestions from Section-B. nce between a program visible ter set? Give examples of at visible registers. (3) P.T.O. J — (b) What is the difference between 8086 and gogs ae i 4 microprocessors? rey i ) Are the following instructions valid? (i) PUSH 1234H (ii) MOV DS, AX MOV DS:(BX], 10H (3) *@ memory device of 400H. It has base the size of the memory device in starting address location and location? (3) G) 3 Explain direct data addressing mode with the help of an example. lain BOUND interrupt instruction. (2) Memory device with 10 address pins pins. What will be the size of the 2 G) JMP instruction (short, near, ‘or les for the following : @) istance is 0160H bytes istance is 10000H bytes ), DI = O1FFH, $1 = 0100H, value of SI and DI after instruction? Explain. (3) it pins of 8284A clock ral.0); (i) CLK (ii) PCLK (ili) OSC (3) Explain the concept of two memory banks in 8036 (3) SECTION B r a memory device, 256K X 8 DRAM. the number of data pins, address (243) 5 fer the following questions — (2) What happens in 8086/8088 when TEST ‘input is at logic 12 W many address pins are there in a 4K ry device? tween NMI pin and INTR pin. (3) nm Command Words (OCWI, ) of 8259A programmable interrupt (5) d mode of memory. If | descriptor table entry ill be the privilege (3) sembly language 6 EAX = 00000200, EBX = 00000250, DS = g300H, SS = 0440H, BP=0110H and ‘0010H. (3) the address accessed by each of the Fnstructions, assuming real mode ECX, [BP - 200H] DL, [BP +SI-10H] [SI + 100H] | [BAX + 2*EBX + 10] + 4*EBX], AL nce between far and near mptINTO. (3+2) ing pins of 8086 PPNOW eee eave Y Prediction Logic of Pentium Q) gical assembly instructions (5) Operation of Programmable ce 82055 with help of a diagram. (5) {This quebti QueHIbN Paper contains 12 printed pages] Your Roll NOs" Sr. No. of Question Paper; 1127 P Unique Paper Code : 2342571101 Name of the Paper : Programming Fundamentals Using C++ Name of the Course ; B.Sc. (Multidisciplinary Courses of Study with Three Core Disciplines under UGCF 2022) Semester : First (1) cs : 3 Hours ¥ Maximum Marks : 90 for Candidates Write your Roll No. on the top immediately on receipt his question paper. _A is compulsory. any four questions from Section B. question must be answered together. ogram statements in C++ language. ?.T.0. 2 Section A {a) Which of the following is a valid identifier in C+ Give reason, ( (i) protected (ii) 8years (iii) _myname © an assignment statement using a sing itional expression for the following co: 127 3 £ GOU<< "hn is yero"<=y); = couts2) arr{i]=2*arr[i}-arr[i-1 ]; 65 ntify the type of the following progran, ents. C¥+ program to'print the sum of odd ween | to 50 using a while loop (5) e the output of the following code (5) 1133 7 {c) Write & C++ program to create an array Studentmarks. Input total marks for 5 students and caleulate the average marks of all the students. (5) 4 program to create a class Arithmetic with ate data member numl and num2. Add the wing public member functions A default these functions will be called ain function, (10) al operator to set ticket to is greater than 55, and to 0 (iv) Set an integer constant to a value of {y) initialize 9m array of type double win, « values. n 10,000 then the employee gets an extra on salary. Calculate the bonus to the employee and display the sa loyee will get tween do..while and while loops an example. G d variable names and correct them (1000) K.. question paper contains 8 printed P ages) your Roll NOssesreesrerees ‘Sr. No. of Question Paper: 1140 » ‘Unique Paper Code : 7342201102 Name of the Paper : ‘Ale Programming Fundamentals using Python of the Course : B.A. Program v8 Maximum Marks : 90 Write your Roll No. on the top immediately on receipt of this question paper. Section A is compulsory. Attempt any four questions from Section B. Parts of a question must be answered together () oe ia Ph Below code. im case of 1140 3 : the Take the number of rows © 3 an input — (5) user. * oe 8 @ eee © © *“e*e*et ee @ @ & “ee e+ ee ee © -* ! (d) Write three differences between list and -" data structure used in python. (e) Write a python function findMax(), that take two integer parameters and return the maximum of the both numbers. GB ( With the help of suitable examples, explain the use of try and except blocks used in python for error handling. @) (g) Explain the use of following strings module functions using suitable example (3) (i) isdigit 0 (ii) swapease () (iii) split Q (a) What are mutable and immutable objects in python? Create a dictionary data type object 1 “why it is mutable? ? and pie Pre. ei 7 Section B USE Set data st ‘ 7 Tucture? Show in functions use d for set data (5) mee, 11, 88, 55, 23, 60, 70), code to perform following task - ; (0 list L1 in descending order lent “55° from the list L1 print alternate elements of mn list Ll in reverse order m of all element present in the [ suitable examples define a d explain the purpose of methods used for dictionary will be produced a n id ments, identify ng code seg (6) 1140 5 if y>2: z= Xx * 7 print("Z is: "» 2) else: print("x is: ", %) Gi) for i in range (1, aie j=0° ' while j : (a) HelloWorld eo (b) Hello, World (c) HelloWorld (d) None of the above ‘What will be the output of the following program? a (a) Hii ®veryone (b) Hello World (©) Hello World Hii everyone (4) None of the above r PHP What will be the output of the following code? 6 2113 (x) If $a = 12 what Will be returned when ($a & ses is executed? al @Xxpressions in PHP for € following conditions - (3) ater than 40,000 and less than le and Age is greater than 65 i variable $text] is greater than T Ea of the following PHP slep execution. (2) ee indexed arrays in PHP with the help of an (Q) function minimam(Snum1, Snum2) to St of the two numbers. Use this ind smallest of three numbers in PHP (3) ing language that generates web pay G) rogram to ulate the sum of (2) PTO. 8 ider the followin 8FAY where name, co, of various items 35 listed Fespectively de and {3) pray ("Printer",001,18000), atray(Monitor",002,10000), paTray(Laptop".003,40000), array("Mouse" 004.500) ) pents for each of the following : fer of products al cost of all the products e of Mouse to 700 logical and conditional operators (5) Ph (1500) question paper contains 4 printed pages.] Your Roll Nove i ‘Sr. No. of Question Paper: 2130 c ; ‘Unique ‘Paper Code + 62344330 ¢ of the Paper : Computer Network And HTML Course + B.A. Programme (LOCF) : I Maximum Marks : 75 Fiye Questions from Section B. A (Total 25 marks) yy used in a computer es and disadvantages 3) A P.7.0 2130 2 (©) Which connecting device is known as the three- layer connecting device. List the functions Performed by this device? G) (4) Differentiate between LAN, MAN and WAN. 3) (e) Explain simplex data flow. How is it different from half duplex communication. (3) (f) What is the purpose of COLSPAN option in HTML? Explain with an example. (2) (g) Explain the address depletion problem of IPv4 classful addressing. (2) (h) What are the data objects exchanged at the data link layer and the network layer of the TCP/IP protocol suite. (2) Explain the purpose of anchor tag? (2) lat is attenuation? (2) . 3 a IML code to design 4, 2 2139 4 I ywser- ®) Explain the different parts of your bro : URL “MEY and explain the different parts of sei/ “http://www collegedekho.com/comP 6 Main html”, ° = in its (8) What is transmission impairment? Explain (4) 'ypes, . Sadie (b) Differentiate between wired and wireles Media, Why should we use optical fibre for a . transmission? (6) 6. (a) Differentiate between IPv4 and IPv6 addressing. Convert the IPv4 address 130.24.24.18 into IPv6 address. (5) (b) What is a wireless LAN. How is it different from a wired LAN? (3) 7. (a) Explain the essential tial crite network must meet? a which a computer i (5) data te fresn paper contains 12 printed pages.) Your Roll Na... Sr. No. of Question Paper: 2060 Cc Unique Paper Code 62347502 | Name of the Paper : Programming with Python of the Course B.A. Programme (LOCF) f V Year of Admission 2019 onwards) Maximum Marks ; 75 your Roll No. on the top immediately on receipt lis question paper. on No. 1 is compulsory. t any 5 of Question Nos, 2 to 8 “question must be answered together identifier(s). Justify your answer : (4) P10: 2 (iv) Total_Marks (¥) Dob (vi) else (vii) Address 99 Construct logical expressions for representing the following conditions : (3) @) Salary is greater than 35000 and less than 45000. ender is female or Age is less than fable name is greater than 2060 3 (@) Differentiate between syntax errors and semantic errors with the help of an example of each. (4) (e) Find the output in each of the following code L (5) A. Consider the given list: ; Listl= [80,75,83] Listl=List1+[85] ‘print (List1) List=Listl List1[1]=90 print (List) der the given tuple: 4, 6, 8) t=(5,) #t{1:] print (t) print (t*2) P10. 2060 4 (p Write a python function named as Wordscoun: 6s) that take a string s as an argument and return + he number of words in that string. (3) (g) Given the following recursive function : (4) def foo(n): if (n<0): return -1 af (n==0); return 1 (n*foo(n-1)) by step execution of the function call will be the output of fo0 (6)? sh is defined as : (5) Web':28, 'March':30, 5 At (month, get ('Feb', 0) ) At (list (month. keys ())) ist (month.values ())) Program to calculate the grade of Ask user to enter marks and ling grade. following rules for grading system: Grade A (5) ) that takes a list the first and last list. For eg. , 80, the function 314,15]. The (5) P.T.O. 6 (b) Write a program using for loop to print the following pattern of n rows: (5) For example: ifn is 5, following 5 lines of pattern will be printed: the output of the following string functions tring colors: (5) green, blue, Red, Red, green’ lors.find (‘red’) ) a 7... \¢ whether it is prime number or is divisible only by itself and (5) of the following code snippet: 1 (2) that will be yw; (Justify if it4==0: add=add+i i=i+2 print (ada): va (c) Evaluate the following expressions: (4) @12 6 22 (ii) 5$10+10-25+8//5 >'héllo! or ‘bye '<' Bye' alues andsquares given (3) ‘python operator to OF squares. 8 is subset of values. is superset of squares. 10 7. (a) What output will be produced on execution of tt following code segment? ( (i) class Area: def init (self self.rad=10 self.a=0 def cal(self): a-self.rad*self.rad return a et ne line python code for- Q) ig {Wo numbers without using a third 9 the series 7, 14, 21,..., 70 ‘the range function. cimum (x, y) tocalculate f the two numbers x and y. (4) * that keeps tracks of ;in a school. (10) following data members: idering 500 as '$': Science - Marks \ 1 hie. for initializing the data members — Mame, marks & stream eam for displaying the stream of the @ for computing and printing the centage for the student. S$ to print the details of the student Num, name, marks and stream of class Student with the and name="Archit', Stream as ‘A’. Call d to calculate the percentage question paper contains § printed pages.] Your Roll No.. Question Paper: 1499 Cc Code : 42347501 Paper : Data Structure : B.Se. (P) LOCF (DSE) 2 V Maximum Marks : 75 for merging k for large 1499 2 {b) Consider the linear array 4 (8: (a) = 300 and w * 4 words per memory cell for j a, Find the address of a [15], a (35) (2) 50). Suppose base yin operations on a (c) Explain briefly the two ma stack. (2) ifferentiate between an array and a linked (2) a diagram fora complete binary tree having (2) e is more efficient, binary search or eee : Justify your answer. (2) the following code perform Explain (2) 4 H viroulay queue of capacity n elements nied With an ariay of W elements (the inadrtion avd deletion oparation fed Out Uning VIRB and LANT a» array en, respectively, Initially, VIMST = V. Write the vonditions to detect if the and the queue is empty, (4) ‘MOPH Of A stack While adding 679 (A) Or fh recursive function to of 4 number, (4) 4 (i) Insert A, B,C. D, E to the “CQueue (ii) Delete A, B from the “CQueuc” -. iii) Insert F Delete C, D, E, F the following arithmetic expression P postfix notation where |) D=2, E=1, F=5: into its equivalent infix expression (show the (6) fo large numbers (4) 5 ap the queue and stack in the fragment? w become push and vice ‘now becomes dequeue and vice can oceur in an array €? Give examples to error be avoided? id of a circular (6) 1499 6 6. (a) Consider the following sequence of operations performed on an initially empty doubly linked list : (i) addtohead (25), (i) addtohead (28), (ili) addtotail (23), addtotail (20), fromhead ( ), AIL, content of the list. and es after each operation. (6) Mode at the end of a (4) reorder, postorder ) give the height of a complete binary (2*mul(x-5)+7); ill be returned by function when mul ach step of recursion. (10) unction to calculate the GCD (4)

You might also like