0% found this document useful (0 votes)
169 views76 pages

BCA

Check whether the function, f, given by f(x): cos is monotonic or not. If f.g is continuous on [a, b], must f and g be continuous? Give reasons for your answer.

Uploaded by

Arvinder Singh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
169 views76 pages

BCA

Check whether the function, f, given by f(x): cos is monotonic or not. If f.g is continuous on [a, b], must f and g be continuous? Give reasons for your answer.

Uploaded by

Arvinder Singh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 76

BACHELOR IN COMPUTER APPLICATIONS

Term-End Examination December, 2006

CS-60 : FOUNDATIONCOURSEtN MATHEMATTCS GOMPUT|NG tN


Time : 3 hours
Note t Qu estion No. three

Maximum Marks : 75

1 is compulsory. Attempt any quesfions from Questions No. 2 to s. Calculators are not qllowed.

l.

(a)

Check whether the function, f , given by

f(x): cos

sin x, x

-l

lO, ;)

is monotonic or not. (b) If f and g are functions defined on [a, b] such that f.g is continuous on [a, b], must f and g be continuous ? Give reasons for your answer. z

C5-60

pTn

(c)

If v-

. - 1x sln

, prove that

1-

x2

(1 -- *'\gn+2(d)

(2n + 3) x Vr,+1 (n + 1)2yr, : 0.

Prove that cos 50 : .or5 o (1 10 tan2e + 5 tanae).

(e)

(f)

Does the line x + y + z: 0 touch the parabola find the point of contact' yz : 8x ? If ,yes, of Taking 6 subdivisions the interval [1, 71, find an
7

approximate

value

of

J l+x 1

l '=L

d x,

using the

TrapezoidalRule. k) solved by can the following system of equationsbi,e Cramer's Rule ? If Vs, apply this rule to solve it. method to solve the Otherwise,apply the Gaussian system. 2x y + z:0 3z: 7 3x + Y 7 3Y+52: x (h) Evaluate : x2+7 dx *4 -3x2 +1

2.

(a)

Find the upper and lower product sums of f defined by f(x) : J - w.r.t. the partitionP : 12,4, 6,81 x-1 of 12, 81.

(b)

Use the Mean Value Theorem, to prove that l s i n ( a b ) s i n ( a + b l)< a,bR. la-bl,where 4

(c) sorve the:T:J'*


\

zrx.
i 16 .

given that one of the roots is 1 (d) Prove that x T _clY t a n x , I J secx+cosx 0 3. (a)
=

n2 4

Find the tangent planes to the sphere

r r;' {c w h i^ ; o o ' ^r,:J : :r 3 ; f r ; i ; : s ' s


(b) Describethe sets,P U R, Q n R and Q', where P : {x N I x is a factor of 50} a : {x e Z I x is a multiple of 5 and I x | < 25t R:t0,3, 5,L15) and : Universalset I.J' {x I I I is the set of integers}. of Find all the asymptotes the curve, z y
(d)

(c)

4 x 2+ 3 x + 2

Find the derivative of * * (sin *)log + (log *)tut W.f;t. X. 5

CS-60

P.T.O

4.

(a)

Find the points of intersection of the line

-: lzxz (b)

Y--4:

withtheconicoid

l7y2 + 722 : 7.

Find the angle of intersection the curves, of *2 y2:8, xy:3.

(c)

Reducethe equation 5*2-6xy+ Syz*22x 26y+ 29=0

to canonical form. Hence identify the conic it represents and draw its rough sketch.

5 . (a)

Show that

Vi+ ?12{l5+ +
(b)
(c)

+t6.

"'i/ 2

l Find lim l+ - 1 *-g L"-3

z I 11itLexists. | r' r -ax+3J *2

Find the equation of the cone, whose vertex is at (3, 2, 1) and the guiding curvei, y2: 4*, z: 0. Find length of an arch of the cycloid lhn x : a ( 0 + s i n 0 ) , y : a ( 1 + c o s0 ) .

(d)

C5-60

22.000

BACFIELOR IN COMPUTER APPLICATIONS


Term-End Fxamination December, 2006 A C S - 6 2= ' C ' P R O G R A M M I N G N D D A T A STRUCTURE
Time : 2 hours Nofe ,

Mqximum Marks : 60

Qu estion no. l is compulsory. Answer rlny three questions from the rest. All algorithms should be 'C' Ianguage. written neerer to

1.

(a)

Show how the array,

3 0
A :

4 1 8 9

6 8 4 2 5 3

7 9

would appear in memory when stored in (i) (ii) (iii) Row majol order Column major order Logical representation

10 P.T.O.

C5-62

(b)

Whqt is a Binary Search Tree (BST) z Write algorithms for inserting and deleting nodes in a BST. Explain them with the help of an example each. 10

(c)

AssumeAisaNxNsquarematrix.Writethe algorithm for the followingoperationsin the matrix A. 10


(i) (ii) Find the product of the diagonal elements of A. Find the sum of the elements above the

diagonal elements.

2-

(a) Construct HeightBalanced a Treefor the following list of elements : 2 , 6 , 1 3 , g , 4 , 3 , 1 9 , 7, 1 , g , 1 1


(b) Write an algorithm to convert an infix expression to a postfix expression. Also, explain the logic with the help of an example. (Use stack irnplementation)

3 (a) H::,Jl #l?::",*n"n:il:,,,*"'n


!

where this can be used

C5-62

(b)

For the digraph shown below find (i) (ii) (iii) (iv) the indegree and outdegree of each vertex its"adjacency matrix representation its adjacency list representation its strongly connected component

4.

(a)

Write an algorithm to construct a doubly linked list and search for a data.

(b)

Write an algorithm for addition and deletion of element into a queue.

5.

Define the following and give an example for each : (i) (ii) (iii) (iv) (v) UNION in C language Circular linked list Post order traversal of a binary tree Insertion sort K-way merging

10

C5-62

22,000

I .sql
BACHELOR IN COMPUTER APPLICATIONS Tenn-End Examination December, 2006

CS-63 : INTRODUCTION TO SYSTEM SOFTWARE


Time : 2 hours
Note : Maximum Mqrks : 60 Answer any

Ques tioin number 1 is compulsory. three questions from the rest.

1.

(a)

Write an algorithm and then draw the flowchart for the calculating sum of the digits of a n digit number. What is a sernaphore? How is it used to solve mutual exclusion problem ? Explain this with the help of an example. Write a shell program to find the GreatestCommon Divisor (GCD)for any two given numbers. Write' UNIX commandsfor the following , (i) Removea directorywhich consists 10 files. of on UNIX.

(b)

(c)

5 5

(d)

C5-63

P.T.O.

(iii)

Make a link of a file named test.c in the sarne working directory. Write the contents of 3 files into a single file.

(v) ::n';:1" ffil'ffi:'.;J" ;il"":;u,il


permissions on this file and others will have only read permission. (e) Write regular expressions for ' the following statements of C language : (i) (ii) (iii) Assignment statement GOTO statement Unsigned number

(iv)

2. -

(a)

Explain the algorithmof two passassembler. Mention at least two features of an assemblerwhich are machine independent.

(b)

what is the use of "ma,ke" command? Explain with the help of an example.

3.

(a)

What is paging ? Explain how the addressesare mapped in paging with the help of a block diagram. What is an inode ? What is its significance UNIX in file system ? What is the information that is stored init?

(b)

C5-63

4.

(a)

Mention at least four different functions of a system administrator,apart from the user creation. Also, explain how the user accountsare created by the .system administratorfor any OS

(b)

What is X-Windows ? Mention at least four features

5.

(a)

Explain the functioning of the software tool 'UX', which is usedfor compiler construction. With the help of an example for each, explain the First Come First Served (FCFS) and Scandisk scheduling methods.

(b)

C5-63

13,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination Decembet, 20A6 CS-64 : INTRODUCTION TO COMPUTER ORGANISATION
Time : 3 hours
Note ,

Mqximum Marks : 75
Answer any

Qu estion number 1 is compulsory. three questions from the rest.

1.

(a)

A machine uses a 32-bit two's complement representation integers.What is the largestinteger for that can be represent ? ed What is the represented ? smallest integer that can be

2 2 2

(b)

(c) (d)

How many different integers are represented? Give reasonswhy an ADD instructionthat is part of a stack-based instruction set would be smaller (require fewer bits to encode) than an ADD instruction in a general purpose instruction set architecture. Convert the two's complementnumber 1101 1010 to decimaleguivalent. 1

(e)

cs-64

P.T.O

(f)

Simplify the following boolean function using sum of product form, by K-map : F(A, B, C, D) : ) (0, 2, 4, 6, 9, 12, 14) and designthe circuit. ,

(g)

the Assumethat in a 8086 microprocessor registers have following values: BX : 6788H SI: 23A4H

: Offset/displacement 8085H Find the effectiveaddressusing the above data for the following addressing modes : (i) (ii) RegisterIndirect Addressing(usingSI) RegisterAddressing(usingBX)

(iii) Displacement Addressing using baseregisterBX (iv) Based-lndex Relative Addressing of microprocessor
(h)

8086

Why is a multiplexer required ? How is it different from a decoder ? Draw the circuit diagram of a 4 x 1 multiplexer and a 2 x 4 line decoder with enable input and also give the correspondingtruth tables.

2.

(a)

Why is parity bit required ? How is it used in correcting single bit errors ? Explain it with the help of an example.How do you determine sizeof SEC Code for 32 bit of data ?

C5-64

(b) 'Show that NOR is a functionally complete set of gates. (p) Design and draw a 4 bit Adder.

3.

(a) (b) (c)

Design a 4 bit ripple counter using J-K flip flops. Differentiateamong different.levels RAID. of Write an 8086 assembly language program to compare two strings.

4 5

4.

(a)

Design a floating print following requirements : base 2

number

format

for

the

possible maximum number possibleminimumnumber

1 x 1015 -1x 1015

The mantlssa of number should be large enough to

*J,T:,;j* "?i:'1"J1 :;;:'::' 1::J ":: H,


support at least two equivalent decimal digits after should be biased exponent. 6 (b) Write an assembly program for evaluating A + B x C/D (c) E using one address instructions. 6 Why are coprocessors required ? Draw a general structure of CPlJ-coprocessor. 3

C5.64

P,T.O.

5 . (a)

Compare Polling and Daisy chaining mechanisms of arbitration and explain them with the help of a diagram.

(b)

Differentiate

between Associative memory

versus

Interleaved memory. (c) Explain logic micro-operations and their

implementation on at least two inputs.

C5-64

15,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006

CS-66 : MULTIMEDIA
Time : 2 hours Note r Maximurn Marks : 6a

Question number 1 is compulsory. Attempt any three questions from the rest.

1.

(a)

Discuss the hardware requirements of a multimedia computer through a diagram. Also explain various hardware requirements.

10

(b)

How does multimedia support e-commerce based applications in businesspromotion ?

(c)

While designing multimedia applications, how does copyright issue play a crucial role ?

(d)

How do scripting languages serve as a useful tool for spreading interactive education ?

5 5

(e)

How does QuickTime software work ?

C5-66

P.T.O.

2.

(a)

Define the term

"Multimedia Interface Design".

Write at least 7 rules that need to be followed in the design of computer based instructions. (b) Name and describe at least 7 software tools that are related to multimedia application. 3. (a) (b) 4. (a) Explain five application areas of multimedia . State any five elements of hypertext, Discuss the planning process of a multimedia 5 5

application with the help of a figure. Also, explain the different phases of planning process. (b) Explain the role of multimedia in entertainment and business.

5.

(a)

How did multimedia transform the industry? Indicateat least 5 changes.

publishing 6

(b)

Explain the use of four communicationtechnologies 4 in multimediaservices.

C5-66

15,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examinatkrn cembet,zQ,ffi CS-68 : COMPUTER ]\FfWORKS


Time : 3 hours
Note : Question number 1 is complsory. three questions from the rest.

Maximum Marks : 75
Answer any

1.

(a)

List and describe five examples WAN applications of s you have seen. Explain the functioning of 7 layers of OSI model. What is the necessityof using 7 layers concept in 10 OSI model? How is Selective Repeatbetter than Go Back N ? Differentiatebetweenthe following (ii) IEEE 802'4 and IEEE 802'5 3 4

(b)

(c) (d)

(e)

Enlist two factors that cause congestion in ttre Subnet. Describebasictypes of ISDN services. Comp are and contrastPacketand Cell switching.

2 2 4

(f) (g) C5-68

P.T.O.

2.

(a)

Explain how Slotted Aloha improves performance of system over Pure Aloha.

the 3 :Q

(b)

Explain the use of the following devicesin computer networks : (i) (ii) Hub Bridges

(iii) Switches (iv) Gateways (c) Let a system use 9600 bps channel for sending call setup requestto a base station. Supposethat packets are 720 bits long, that the time-out is 20 ms. What is maximum throughput possiblewith Aloha and with Slotted Aloha ? 3. (a) Explain the function of Modem with the help of a suitable diagram. Differentiate between Guided and Unguided transmissionmedia. Give one example of each. Also describeany one guided transmissionmedia in detail. Explain SlidingWindow Protocolwith the help of an appropriatediagram.
Explain the functioning of spanning treebridges. Define multiplexing. Discuss the need for 4

(b)

(c)

4.

(a) (b)

multiplexing in networked system. (c) Describe the format of TCP Header.

C5-68

5.

(a)

Differentiatebetween Virtual Circuit and Datagram Subnets. What is remote procedurecall ? With the help of a suitablediagramexplainhow it is established. How is the flow control at the transport layer different from data link layer ? Discuss.

(b)

(c)

C5-68

10,000

BACHELOR IN COMPUTER APPLICATIONS Trtr-End Examination December, 2006 CS-69 : TCPllP PROGRAMMING
Time : 3 hours Note Msximum Marks : 75

Quesf ion number 1 is compulsory. Answer any three questionsfrom the rest.

1.

(a) Identify the addressclassesof the following IP addresses : (i) 196.201.190.6 (ii) L20.10.10 .77 (iii) 772.196. 112.L9 (iv) 150.150.15.15 (b) How manynetworks eachIP address can A, Class B, C have? Also,find the number hostsper network of
in each given address class. (c) What is 3-way handshake mechanism ? Also, explain how the mechanism is used for establishing and terminating a TCP connection .

C5-69

P.T.O.

(d)

What is the maximum number of fragmentspossible from an IP datagram ? Write the five characteristicsof the User Datagram Protocol. How does TCP handle the flow control problem using sliding window protocol ? What is the main mechanism that TCP uses to create a reliable connection ? Explain with the help of a diagram. Design a TCP client-serveralgorithm, where the client shouldprompt a user to type a line of text and . send it to the selver. The server should print the text, number of characters the text and the client's in name on the screen. , 10 How does TCP handle multiplexingissue? Explain the concepts of IP subnet addressing and subnet masking with the help of an example for each. List the important characteristics UDP. In spite of of its drawbackswhy is it used ? Explain with the help of an example. 5

(e)

(0

(g)

2-

(a)

(b) 3. (a)

(b)

(c)

Why does lost acknowledgementnot necessarily force the re-transmission TCP data segment? 4 of

C5-69

4.

(a)

Explain the importanceof the following header fields used in TCP and IP : 1A (i) (ii) Sequencenumber Fragment offset

(iii) Urgent pointer (iv) Header checksum (v) (b) Option + padding

Write the differences and similarities between the TCPAP and OSI models. List the important domain names used in Internet. How does the name resolutiontake place in DNS ? Explain it with the help of a diagram. Explain the following terms with the help of an example for each : (i) (ii) Checksum Authentication

5.

(a)

(b)

(iii) Port (iv) Z-wayhandshake

C5-69

11 , 0 0 0

,
l i

BACHELOR IN COMPUTER APPLICATIONS


Term-End Examination December, 2006

CS-70 : INTRODUCTION TO SOFTWARE fNGINEERING


Time : 3 hours
Nofe 3

Maximum Marks : 75
Answer

Question number 1 is compulsory. qny three questions from the rest,

1.

(a)

Explain the role of the software development team. Normally, who is responsible to select and build the software team for a new project. Also, mention the various options that are available in order to assign /allocate "x" people to work for "y" years on a newly arrived software project. 10

(b)

Explain the significance of the project planning and control. Also, describe the four major steps for the project planning. 10

CS-70

P.T.O.

(c)

With the help of a suitable example, explain the c.oncept of re-application of the software modules.

(d)

What is a 4GL? List and explain different advantages of the 4GL over the 3GL.

List and explain the important qualities of the software product and the process. Describe the briefly integrated structured methodologies

10

3.

(a)

Consider to design a system for the inventory and billing operations of a "Retail Medical Outlet". Draw the context level and first level data flow diagrarns (DFDs) for the system and ailso prepare a SRS document.

(b)

Explain the software crisis from the programmer's point of view.

4.

(a)

Describe the life cycle of a computer based system. Also explain the concept of Waterfall model of software life cycle.

(b)

List

various

management

risks in

the

Software

Engineering and the corresponding techniques to manage them.

CS-70

5.

(a)

What are CASE tools ? Explain the hllo generations of the CASE tools. With the help of an example for each, explain the broad classification /categories of the CASE tools. 10

(b)

Describe the concept of software reliability, software reviews and software upgradation.

CS-70

10,000

BACHELOR IN COMPUTER APPLICATIONS : Term-End Examination December, 2OOG CS-71 : GOMPUTERORIENTED NUMERICALTECHNIOUES
Time : 3 hours Note r Maximum Marks ; 75

Qu estion number 1 is compulsory Attempt any three questionsfrom 0 2 to O 5


Find the number of terms of the exponential series reir sum gives the value of e* correct to six decimal Places at x : 1. 4

l.

(a)

(b)

Estimate the error in evaluating f(x, V) : *2 + y2 for x : 3'00 and y : 4'00. Derive Newfon Raphson formula using Taylor

(c)

Series expansion (d) Evaluate

alo t (1 -

ax) (1 d \ dx)

u*?) (1 4

(whereA:

CS-71

P.T.O.

(e)

Find a cubic polynomial which takes the following (x, f(x)) set of values.
X

0 1

2 1

3 10 5

f(x)

(f) ffii,:::l#':*:1: ;:;:lr;h;;::0 5


1

(g)

Find the approximatevalue of I :

jL using l' J 1+x 0 4

\ 2. (a)

trapezoidal rule. obtain the bound for errors. - ln Z: 0.693). (Given I

Find the value of f(x) decimalplacesusing Newton Raphsonmethod. If a, b, c, d arethe arguments f(x) : of 1, show X
r that f(a, b, c, d) = r T

(b)

--. 1

' abcd

(c)

The velocity v of a particle at distance s from a point on its path is given by


S

(ft)

0 47

10 58

20 64

30 65

40 67

50

60

52 38 Estimate time takento travel60 ft usingSimpson's 3 ,


g rule.

v (ft/s)

CS-71

3.

(a)

Using Runge- Kutta method of fourth order, solve for y(0'1) giventhat y' : xy + yz, V(Qy 1. :
10 1

(b)

Givenif(x) :
t 10
S f t \ < F F n { A

s 0 0 4 2 6f,( x ) i
4
. , r ^

szsz4o,

L
7

f(x): I752I2, f(10) 40365,findf(1). : 5

(c)

A civil engineer has measuredthe height of a 10 floor building ,as 2950 cm and the working height of each beam as 35 cm while the true values Are 2945 cm and 30 cm. Compareabsolute and relative error.

4.

(a)

Determine stepsize to be used in the tabulationof h f(x) : sin x in [1,3] so that the linear interpolation will be correct to four decimalplaces. From the table below, for what value of x, is y minimum ? Also find this value of y.
x

(b)

v 0 . 2 0 5 0 . 2 4 0.259 0 . 2 6 2 0 . 2 5 0 . 2 2 4
(c)

Solve the following system of equationswith partial pivoting using Gausseliminationmethod. 2 x+ y + z : 1 0 3x + 2y + 3z = 18 x+ 4y+92:76

CS-71

P.T.O.

5.

(a)

Derive the Gauss- Seidelmethod in matrix form for the solution of the system of equations Ax : b . Hence,derive the matrix fo mulation of 'the Gauss- Seidel methrodfor the following system of equations(no iterationsare to be performed) :
I

| ' - 4- 1 | t l l l ,l l - 1 | 1 1 _4)l L.rJ.:,L-r)I L


7

l-4

1l [",-l l-r1

(b)

Perform three iterations to find the root of the 25 : 0 using method of false equation *2 position, with initial values2 and 7. Find the second order polynomial for the following data using Lagrahge'sinterpolation method.
X

(c)

0 1

2 55

f(x)

CS-71

10,000

BACHELOR IN COMPUTER APPLICATIONS Trrr-End Examination December, 2006

CS-72 : G++ AND OBJECT ORTENTED PROGRAMMING


Time : 2 hours
Nofe :

Maximum Marks : 60
Attempt any

Ques tion number 1 is compulsory. three questions from the rest.

1-

(a)

Explain any five advantages of Object Oriented Programming. Explain the need of inheritance and list any three advantages of it. Explain the purpose of the following with a suitable example of each : (i) (ii) Use Case Diagram
v

s :

(b)

(c)

Interaction Diagram

(d)

Write C++ code to create a class dste. Using this class, calculate the age of a person as on the current date

CS-72

P.T.O.

(e)

List

various restrictions with operatqr overloading.Write a C++ program to illustratethe overloadingof incrementoperator. the Define the term exception handling. Write a program to raise an exceptionif an attempt is made to divide a number by zero.

2 . (a)

6 4

(b)

Give output of the following : { int a : 10, b : 20, d; d : b++; cout <<d<<b; d : **a; cout <<d<<a;

l
3.
(a)

Explain the purpose of function overloading. Write a C++ program that uses a function to check whether a given number is divisible by another number or not. Give proper comments whether the denominator number is a prime number or noti

I 2

(b) 4.
(a)

Explain briefly static data members. Define a friend function. Explain the relation of friend function with respect to Public, Private and Protected data members of the class

(b)

Write a C++ program to find the sum of all digits in a five digit number. (For example, if given number is 12345 then the output is I+2+3+4+5:15).

CS-72

5.

Define the followingwith an exampleof each : (i) . (ii) this pointer Destructor

10

(iii) Typecasting (iv) Abstract class (v) ParameterizedConstructor

CS-72

13,000

BACHELOR IN COMPUTER

,",ffiH:'::,,",,
December, 2OIOG CS-73 : THEORYOF COMPUTERSCIENCE
Time : 3 hours

Maximum Marks : 75
Attempt any

Nofe 3

Question number 1 is compulsory. three quesfions from the rest,

1.

(a)

What is Kleene closure? Write Kleene closure of the following : (i) {bb, c} 2 + 1+ 7 : 4

(ii) {0, 1}
(b) What are primitive recursive functions ? Describe the initial functions and structuring rules used to obtain primitive recursive function. (c) (d) 2+4:6 5 5

Describe the concept of Universal Turing Machine. Write a short note on Post Correspondence Problem.

CS-73

PT.O.

(e)

Diagrammatically show the processingof 0Q101 through the state transitionmachineshown below.

(f)

Differentiate between Moore Machine and Mealey Machine. (Diagram is must)

2 . (a)

Construct the finite automata corresponding to the following regular expression :

(O+ 1)-(00 + 11)(0 + 1).


(b) (c)
Define Godel number. Prove the following properties of

I 2
regular 2+3:5

expressions : (i) R+R:R (ii) 3. (a) R(S + T) : RS + RT

Convert the following Moore Machine to equivalent Mealey Machine. Moore Machine

Current State
_) qo

Input Symbol a b
q1 q3 q2 q2 q1 q3

Output

1 0 1 1

q2 q3

q2 qo

CS-73

(b)

What is finite automata ? What are the applications of finite automata ? betweenCFG and CSG. Differentiate What is a NP completeproblem ? Explain how NP of completeness the problem can be established. Define Pumping Lemma. Let F(x) (i) (ii) F(x) = O(*n) for n > 4 F(x) : O(x3)

5 3

(c) 4.
(a)

6 4 5

(b) (c)

5.

(a)

Write a short note on halting problem of Turing Machine. of DescribeChomsky'sclassification grammars. betweenCNF and CFG. Describethe relationship

5 5 5

(b) (c)

CS.73

14,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006 CS-74: INTRODUCTION INTERNET TO PROGRAMMING
Time : 3 hours Maximum Marks : 75

Note : Question number 1 fs compulsory. Answer qny three quesfionsfrom the rest. l' (a) What is the difference run-time polymorphism and in compile-timepolymorphism? Explain with the help of suitableexample. (b) What is the difference between Applets and an Application program in java ? Explain. What is the advantageof finally block in java ? Explain with suitableexample. Write a program for l/O operation using Buffered Input Stream and Buffered Output Stream Will an error occur if a classwith the same name exists in two different packages that you import using * form ? How can the error be avoided? 10

(c)

(d)

(e)

CS-74

P.T.O.

2.

(a)

Wiite a program in java to design a class complex for complex number of the form a + ib. Write an . overloadoperator + to add two complex numbers What is finalize() method in java ? Explain. Explain the use of this keyword in java with the help of a suitableexample.

I 3

(b) (c)

3.

(a)

Write a program in java to generatethe following array output, using two-dimensional 0 1 2 3 4 5 , 6 7 8 9 What is the use of super keyword in java ? Explain with suitableexample. What is package in java ? lf t class with default the access definedin a packagep1, discuss access is 'ights of this classin another packagep2.

(b)

(c)

4.

(a)

Differentiatebetween interfacesand abstract classes 8 in java with the help of suitableexample.

r'ewhere (b) T ff: H::,T'ffl,: ,i;;:l;.:T::"1


5. (a) Write a program in java to sort a list of n numbers using any sorting method for a given input n. 6

CS-74

(b)

Find the output of the following : (i) ClassX t staticinta:4; static int b; static void f (int x) ("x { system.out.println :" +x); ("a system.out.println =" +a); ("b system.out.println :" +b); ) static {
b : a > k 2 ;

) public static void main (string args I J) { f (20);

l
) (ii) ClassBreak Demo { public static void main (string args il) { outer : for (int i - 0; i < 3; i++) { s y s t e m . o u t . p r( nP a s s " + i + " ' " ) ; i" t for (int j : 0; j < 100; j++) { if (j :: 10) break outer; "); (j system.out.print + ) (" system.out.println Break Demo" ); ) (" system.out.println Loops Complete"); )

4
CS.74

12,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006

CS-75 : INTRANET ADMINISTRATION


Time : 2 hours Note , Maximum Marks : 60

Answer qny Qu estion number 1 is compulsory' three questions from the rest'
"An Intranet uses the Internet technologies within an the organization to achieve better results than

I.

(a)

Give :ffiT::i:ffi;':iliffi::""0n""::; 5
Write and explain any five benefits of implementing Intranet in anY organization

(b)

(c)

also List any five security threats in an Intranet and of mention what can be the solution(s) for each them.

10

cs-75

P.T:O.

(d)

Mention the rore of the foilowing with exampre(s) for each of the following with respectto Intranet : (i) (ii) Servers Clients

10

(iii) Securip systems (iv) Protocols 2. (a)

what is Groupware ? List any five broad range of applicationsassociated with them. Mention the context where a database is required in the Intranet apprication(s). List any five databases (internal databases external or databases) which can be usedas Backendfor the apprications. AIso mention about the databaseconnectivityrequired to connect respective databases with the front end applications. what is encryption and decryption ? How can these be achievedusing the SSL ? what is Authentication? List and exprain any three 9pes of authentication mechanisms supported by WINDOWS 2000 Operating System what is an Intranet Authoring toor ? List any four authoringtools.

(b)

3 . (a)

(b)

(c)

CS-75

4.

(a)

Assume

network (HR,

of

an

organization

with

departments

Manufacturing,

Marketing,

Finance, Sales) and having sufficient number of computers in each. Configure an Intranet for the specifications of the company defined above. Also, list the applications which can be launched on the Intranet. Make any necessary assumptions. (b) Give five reasons why an organization should

5.

(a)

What

is an Application Server ? List any four

application servers that are available in the market. (b) What is an IP address ? Into how many classesis the static IP address divided ? Give their purpose of use and the respective address structures. (c) Write the full forms'for the following : (i) (ii)

5 2

CGI UDP

(iii) IIS (iv)

IMAP

CS-75

12,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006 CS-601r DSFERENTIAL AND INTEGRAL CALCUSUS WITH APPLICATIONS
Time : 2 hours Note t Maximum Marks : 60

Question number 1 is compulsory. Answer ony three questionsfrom the rest. Which of the following statements are true and which are false ? Give reasonsfor your answers. 10 (i) The tangent to the curve x: b s i ne a t 0 : + 2 is perpendicularto x-axis. a c o se , y :

l.

(a)

(ii)

,lg, #isequal

to

(iii) The function f given by f(x) = 2x3 is strictly decreasingin every interval.

cs-601

P.T.O.

(iv) The maximum possibledomain of I defined by f(x) :


b

is ]3, ""[.
b

(v)
(b)

f(a + b - x) dx is equalto I fk) dx.


t "

A curve is drawn to passthrough the points given by


the following table :
X

1 1.5

2
3

5
4

6 4-5

7 6

2.5 4-7

Estimate the area bounded by the curve, x-axis and the lines x : 1, x = 7, using Simpson'sRule. (c) F i n d L ( p , f ) i f f ( x )= 2 x a partition of [1, 71. E andp - {1,3,5,7} is

3 3
with their

(d) (e)

Find f'(x), when (x) = sech (cot x). Match the following correspondingprimitives : f(x)
(i) (ii) (iii) (iv) (v) (vi)
Sln

functions

Jtet dx
x
(i) (ii) (iii) (iv) (v) log sec x + c log sin x + c log (sec x + tan x) + c cosx+c log (cosec x cot x) + c

cos x
tan x cot
X

sec x cosec x

(vi) sinx+c

cs-601

(0

Find all the asymptotesof the curve : (*2 3x - 4lv2: 4xz + 3x + 1. 1 2 when x w h e n0 when x

(g)

If f(x) :

3-x 3 x+1

Find : (i) (iil


(iii)

lim
x-+0-

f(x) f(x)

lim
x-+1-

lim f(x) x-+1+ lim x+0* f(x)

(iv)

2.

(a)

Find the volume of the solid of revolution obtained by revolving the triangle with vertices (0, 0), (0, 2) and (3, 0) around the axis of x. nl4

(b)

If

I- : n

l' tann 0 de, show that J 0

ln*z+ In:

Hence deduce the value of 15.

6 P.T,O.

cs-601

3.

(a)

Show that y = x + tan x satisfiesthe differential equation


.9 .or2* gry + 2V- y):=0.

dx'

3 4

(b)

, Evaluate : UJZ
f

l0 f f i d x
(c)

sin-^ x

Find the equation of the normal to the curve, ( . c) 2 xy=c- at lct,Tl. t) \

4.

(a)

Find the value of

I
(b)

(x-1) Jtn'- 6x+2 dx.

Find the value of log 2'9 rounded off to three places of decimal using Taylor's theorem. (Take : log 3 = 0'477Ll' Find the surface area' of the solid formed by the rotation of the arc of the cycloid x:a(0 +sine), y:a(1 + cos0) about the x-axis.

5.

(a)

(b)

Find all the extreme valuesof the function, f, defined by f(x) = (x 2f (x 3)3, Vx e R.

cs-601

2,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006

COURSEIN CS-610: FOUNDATION ENGLISHFOR COMPUTING


Time : 2 hours
Nofe 3 Attempt all the questions.

Maximum Marks : 50

1.

Read the passagegiven below and answer the questions that follow : Sometimes solutionsto large problems can be fairly simple. Take th,e energy problem. Solutions focus on redesigningthe automobile, boosting the use of nuclear and other clean energy uld so on. But we could make a simpler start, says Matt Prescott, a British environmental scientist.He wants a completeban on the traditional light bulb. The cheapestway for developingcountriesto make optimum use of limited energy supplies, and for developed countries to achieve cuts in their carbon

cs-610

P . TO .

dioxide emission, says Prescott, is to augment energy efficiency. As a first step, he suggests making light bulbs

museum pieces. This could even encourage people to 'aim higher' in increasing efficiency in everyIhing from hot water systems to home insulation, thereby cutting Green House Gas (GHG) emissions.

After

all, it is domestic

energy consumption

that

causes more than 25 percent of the global GHG emission of carbon, sulphur and nitrogen digxide. Recent research 'green indicates that the wider use of lighting' can cut this dramatically. Compact fluorescent light bulbs, for

instance, use only about a quarter of the

energy of

incandescent bulbs to produce the same number or more lumens. That they also last about ten times longer than regular bulbs is a bonus. Compact fluorescents may. be more expensive initially, but the long-term savings would surely offset this. Light emitting diodes (LEDs) also offer an excellent alternative to thg light bulb.

It makes sense in. energy-starved countries like India to have regulated energy -efficiency ,campaigns that could reduce waste and pollutioh, and stimulate innovation. Let's start with light. The public should be made aware of

cs-610

concepts like 'task lighting' : corcentrating light only where it's needed.This avoidswaste of energyand since task lighting uses lower watt bulbs, you don't annoy others in the area either with an intrusivelybright light. The government could kick off the process by providing
L..v lr. vvvgg

tax incentivesto manufacturersto market more efficient fluorescentbulbs. 0 What does the writer mean when he says that traditional light bulbs should be made 'museum pieces'? List three ways to conserve energyas suggestedby the writer.

(ii)

(iii) Give two reasons why compact fluorescent light bulbs are better. (iv) what does 'task lighting' mean ? what advantages ? 2. (a) are its

2 j+2

Change the following sentencds into the passive voice : (il (ii) The Presidentdeclaredthe exhibition open. My mother gave me a book on my birthday.

(b)

Fill in the blanks in the following sentences with the correct tense forms of the verbs given in brackets : (i) she

cs-610

P.T.O.

3.

Do as directed: (a) : Correct the following sentences (i) This novel is too interesting. 7

(b)

Add a suitable tag-question to


::"tt"t"

the following

You have paid him fullY 'look after' . 1 1

r,,

(c) (d) .

Write a sentenceusing the phrasal verb Rewrite the following in indirect speech She said, "Father, I have got a job' "

4.

Write a paragraph in about 150 words on any one of the following : (i) (iil (iii) Mobile phones can be a source of great nuisance. Advantages and disadvantages of email. Computer games.

5.

(a)

Fill in the blankswith suitablearticles(o, an and the), : wherever necessary (0 (ii) He is honour to meet her. girl in blue is mY sister' '

(iii) It will be -

c s -6 1 0

(b)

Use the following words in one sentence each to bring out the difference in their meaning : (il (ii) except accept

6.

Write an essay of about 300 words on any one of the followingtopics :


(i) (ii)

10

My Vision of India in 2020 Influence of TelevisionSerials on our life

(iii) Computers have turned the world into a global village


7. Read the following passage and summ arize it to one-third of its length. Give a suitable title. 8+2:70

We all start life as weak, helpless creatures, totally dependent for both our physical and mental well-being upon those who care for us. It has been demonstrated that, from the very beginning of its separate existence, the baby requires more than simple attention to its physical heeds. If a baby is to develop satisfactorily,it is not enough merely to feed it and keep it warm; it needs a mother as a person whg will play with it, caressit, and show it affection in all the hundred ways in which mothers do show love towards a child which has been desiredand which is welcomed.Babieswho are cared for physically, but whose emotional needs are neglected,

c s -6 1 0

P.T.O.

develop rnore slowly and ffidV, in some instances,suffer permanent damage in that, in adult life, they may never be able to form close emotional ties with any other human being. Every psychiatrist has seen examples of people who were brought up in institutions and who, perhaps, were excellently led and clothed, but whose emotional needs were left quite unsatisfied.As a result, they grew up into a kind of person who can never keep a friend because the demands which they make upon others are not those of friendship, but rather those of a lost child looking for a parent who can neverbe found. (224 words)

cs -6 1 0

20,000

BACHELOR IN COMPUTER APPLICATIONS


Term-End Examination Decernber, 2006

GS-611 t CorvlpUTERFUNDAMENTALS AND PC SOFTWARE


Time : 2 hours
Nofe r

Maximum Marks : 6A
Attempt qny

Qu estion number 1 is compulsory. three questions from the rest,

l.

(a)

Differentiate

between

Microcomputers,

Minicomputers and Mainframes. (b) Draw and explain the basic Also, structure XPlain the of a key

Von-Neumann

machine.

features of a Von-Neumann machine' (c) Explain five types of media through which data may be communicated. (d) what is a screen saver ? How can we protect a

70

Screen Saver using a Password ?

cs-611

P.T.O.

e .

(a)

What do you mean by Normal view and Page Layout view of a document? How do they differ from each other ? Define the term Parallelprocessor. Explain the four categories parallelprocessors. of Draw and explainany three topologies a LAN. of write the processof creating a folder in windows. How can you copy the files in an existing folder to the newly createdfolder ?
Explain the terms soft page break and Hard page break in MS-Word.

(b)

3-

(a) (b)

4.

(a)

(b)

the four categories of programming Ianguages. Also, indicate the category that is , perceived to be the hardest to prograrn,

Explain

5 . (a)
(b)

Define the term Wrus. Explain the features of at least four prevalent:viruses the computer: in industry. Define the term Multimedia. Explain any four multimediatools

cs-611

20,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006

CS-612: PG SOFTWARESKILLS
Time : 2 hours Mqximum Marks : 60

Nofe :

Ques tion number 7 is compulsory. three questions from the rest.

Answer any

l.

(a)

A father has two sons. Four years ago, the father was three times as old as his eldest son and four years hence, the eldest son will be twice as old as the younger son. If the younger son is now 8 years old, find the father's present age.

(b)

Summ arize following : (i) (ii) E-rnail Telnet

the

working

of

any

two'

of

the

(iii) Search Engine

cs-612

P.T.O.

(c)

Explain the features of the following with example : (i) (ii) Goal Seek Solver

(d)

Suppose m & n are integers, such that n2 + 1 -.2m, Prove that m is the sum of squares of two integers. 4

(e)

What is domain nam e ? Name any four top domain

names. (f) Explain,with example,how chartsin Excel are used in analysis. What do you understand by the term Internet Protocol ? Explain HTTP protocol and what it is used for. If three persons (equally able) can jointly finish /complete three jobs in three days, then 100 persons (of the same ability) can jointly do 100 such jobs in how many daYs? Explain the following functions giving exarnplesfor each : (i) LEN( ) (ii) FLOOR( ) (iii) CEILING( ) (b) Comment on the statement"Every graph is not an Euler's graph". Using a diagram, illustratedifferent parameterswhich decide that a graph can have an Eulerianwalk or not

2.

(a)

(b)

3.

(a)

c s -6 1 2

4.

(a)

What

do you understand by the term

Custom

Controls ? List the sequence of steps involved in creating iustom controls.

(b) iT;j;r;:"

anv use FrP ? Discuss three FrP

5.Writeshortnotesonanyfourofthefollowing:10 (a) (b) (c) (d) (e) Autofit E-commerce Auto templates DNS Pivot tables

cs -61 2

20,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006 CC-09 : INTERNETAWARENESS


Time : 2 hours
Note ; Mqximum Marks : 75

Qu estion number 1 is compulsory, Answer any three quesfions from the rest.

I,

(a)

List and explain features of any five toors of the Internet. write the step-by-step procedureto send a resume (which is saved as a word fire) as an attachment through an e-mailto the job_seeker. write the step-by-stepprocedure to search for a specific information of a University on the Internet through a searchengine.

10

(b)

10

(c)

10

2'

What is a Brows ? List any three browsers. er Also, explain the generalfeaturesand the various options on the main menu of any web_browser.

15

cc-09

P.T.O.

3.

involvedin booking a railway Explain the compl ete process about the ticket/airlines ticket/movie ticket online. write 15 securedelectronictransactionalso. of the List and explain any three functions in each 5x3:75 following menus of the NetscapeNavigator : (i) (ii) (iiil File View Go

4.

(iv) OPtions (v) 5. Directory 5x3:75

Explain the following : (i) (ii) Addressbook of e-mail Sn / File Transfer Protocol (FTP)

(iii) TCP/rP (iv) Telnet . (v) Archives '

cc-09

2,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006

C C - l1 : V I S U A L B A S I C
Time : 2 hours

Maximum Nlarks: 75

Note :

Qu estion number 1 is compulsory. Answer any three questionsfrom the rest. event procedure that accepts a string 10

1.

(a)

Write

(statement)as input and prints all words in it. Design the samplelayout also, 'the (b) Explain function of a Projecf Window. What rc are the various componentsin it ? Explain them. (c) Wiite the memory (in bytes) occupied by the following data types : Integer, Currency, and String through an event procedure. Design the sample layout also 10

CC-11

P.T.O.

2.

(a)

What is an MDI form ? How does it differ from SDI form ? Write a step by step procedureto create MDI form and selectsome controlson it. Write an event procedurethat simulatesa calculator which supports at least four basic arithmetic operations. Design the sample layout. Make necessary assumptions. 10 With the help of an example event-procedure, illustrate the use of the relational and logical ' operatorsof VB.
Write an ,event procedure for a command button to 'x', 'x1 display the factorial of where is a positive integer. Design a sample layout for the application that should include a splash screen.

(b)

3.

(a)

(b)

4.

(a)

Define an Index. Design a Visual Basic Application to autom ate the process of submission of examination form. Also, indicate the tables, forms, controls that are to be used, and information about the menu design. Make assumptions, whe rever necessary.

(b)

Explain the following terms : (i) (ii) (iii) Object Container Application Source Application

(iv) OLE

CC-11

5'

(a)

Write the process of creating an OLE object at designtime Write an event procedurefor computing the area of a rectangle. Also, design user interface for this applicationalong with a splashscreen.

(b)

CC-1 1

2,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Fxamination December, 2006

TO CC-16 : INTRODUCTION G++


Time : 2 hours

Maximum Marks : 75

Note t

Qu estion number I is compulsory. Answer any three questions from the rest. Use C++ whereuer lecessary.

1.

(a)

Write a function to swap the values of two integer variables. U:n call by reference" to pass parameters. 10

(b)

Write' the syntax for defining a class. Also, write syntax for declaring an object of a class. 6

(c)

Write a prograrn for the addition of two matrices. Define necessary classes 7

an (d) ::r;i ::ff*'11 3';'"[,f:ffi:oo'u"7


CC-16 P.T.O.

2-

(a)

Write a program for the addition of two complex numbers.Overloadthe '+' operator. 10

(b) :iffossible
3(a)

to nestclasses c++ ? tf es,give in

How can you pass objects as function arguments ? Explain with example. What is meant by data abstraction ? Give an example. Write a program that acceptsenrolment number as input and prints the student'saddressalong with the name of programmeof study. Use inheritance. 10 Write the syntax for defining an array of objects. Give example. .,' List any 10 operators that can be overloaded in C++. How does Object Oriented Programming paradigm differ from Proceduralprogrumming ? Explain with example.

(b)

4-

(a)

(b)

5.

(a)

1,0

(b)

CC.1 6

2,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006

BCS-061: TGPtlP PROGRAMMING


Time : 2 hours Nofe r
Maximum Mqrks : 60

Qu estion number 1 is compulsory. Answer qny three questionsfrom the rest. What is the purpose of layering ? How many layers does the TCP /lP Protocol Suite contain ? Explain the functionsof each layer of TCP /lP Protocol Suite. 1 0

l.

(a)

(b)

? What is the need of IP addresses Which format is used to store the IP addresses ? Explain and differentiate different classesof IP addresswith an example of each.

10

(c)

of What are the functionalities primary and secondary DNS servers? How does the DNS server work ? Explain with the help of suitableexamplefor recursive and iterative solution.

10

BCS-061

P.T.O.

2.

(a)

What is Distancevector routing algorithm ? Explain its working with the help of a suitableexample.

jJlH.
3.

TELNET

Explainthe working of 5

What is Client/Server Computing ? Explain different characteristics client and serverprogram, that are useful of 10 for designing them. with Draw and explain the UDP Client/S erverarchitecture the sequenceof systemcalls.Also, give the justificationof

4-

5.

Explainthe syntaxof followingsystemcalls :

',70

(U) accept() (c) (d) htonl( ) inet-ntoa()

,:

BCS-061

6,000

You might also like