BCA
BCA
Maximum Marks : 75
1 is compulsory. Attempt any quesfions from Questions No. 2 to s. Calculators are not qllowed.
l.
(a)
f(x): cos
sin x, x
-l
lO, ;)
is monotonic or not. (b) If f and g are functions defined on [a, b] such that f.g is continuous on [a, b], must f and g be continuous ? Give reasons for your answer. z
C5-60
pTn
(c)
If v-
. - 1x sln
, prove that
1-
x2
(1 -- *'\gn+2(d)
(e)
(f)
Does the line x + y + z: 0 touch the parabola find the point of contact' yz : 8x ? If ,yes, of Taking 6 subdivisions the interval [1, 71, find an
7
approximate
value
of
J l+x 1
l '=L
d x,
using the
TrapezoidalRule. k) solved by can the following system of equationsbi,e Cramer's Rule ? If Vs, apply this rule to solve it. method to solve the Otherwise,apply the Gaussian system. 2x y + z:0 3z: 7 3x + Y 7 3Y+52: x (h) Evaluate : x2+7 dx *4 -3x2 +1
2.
(a)
Find the upper and lower product sums of f defined by f(x) : J - w.r.t. the partitionP : 12,4, 6,81 x-1 of 12, 81.
(b)
Use the Mean Value Theorem, to prove that l s i n ( a b ) s i n ( a + b l)< a,bR. la-bl,where 4
zrx.
i 16 .
given that one of the roots is 1 (d) Prove that x T _clY t a n x , I J secx+cosx 0 3. (a)
=
n2 4
(c)
4 x 2+ 3 x + 2
CS-60
P.T.O
4.
(a)
-: lzxz (b)
Y--4:
withtheconicoid
l7y2 + 722 : 7.
(c)
to canonical form. Hence identify the conic it represents and draw its rough sketch.
5 . (a)
Show that
Vi+ ?12{l5+ +
(b)
(c)
+t6.
"'i/ 2
Find the equation of the cone, whose vertex is at (3, 2, 1) and the guiding curvei, y2: 4*, z: 0. Find length of an arch of the cycloid lhn x : a ( 0 + s i n 0 ) , y : a ( 1 + c o s0 ) .
(d)
C5-60
22.000
Mqximum Marks : 60
Qu estion no. l is compulsory. Answer rlny three questions from the rest. All algorithms should be 'C' Ianguage. written neerer to
1.
(a)
3 0
A :
4 1 8 9
6 8 4 2 5 3
7 9
would appear in memory when stored in (i) (ii) (iii) Row majol order Column major order Logical representation
10 P.T.O.
C5-62
(b)
Whqt is a Binary Search Tree (BST) z Write algorithms for inserting and deleting nodes in a BST. Explain them with the help of an example each. 10
(c)
diagonal elements.
2-
C5-62
(b)
For the digraph shown below find (i) (ii) (iii) (iv) the indegree and outdegree of each vertex its"adjacency matrix representation its adjacency list representation its strongly connected component
4.
(a)
Write an algorithm to construct a doubly linked list and search for a data.
(b)
5.
Define the following and give an example for each : (i) (ii) (iii) (iv) (v) UNION in C language Circular linked list Post order traversal of a binary tree Insertion sort K-way merging
10
C5-62
22,000
I .sql
BACHELOR IN COMPUTER APPLICATIONS Tenn-End Examination December, 2006
1.
(a)
Write an algorithm and then draw the flowchart for the calculating sum of the digits of a n digit number. What is a sernaphore? How is it used to solve mutual exclusion problem ? Explain this with the help of an example. Write a shell program to find the GreatestCommon Divisor (GCD)for any two given numbers. Write' UNIX commandsfor the following , (i) Removea directorywhich consists 10 files. of on UNIX.
(b)
(c)
5 5
(d)
C5-63
P.T.O.
(iii)
Make a link of a file named test.c in the sarne working directory. Write the contents of 3 files into a single file.
(iv)
2. -
(a)
Explain the algorithmof two passassembler. Mention at least two features of an assemblerwhich are machine independent.
(b)
what is the use of "ma,ke" command? Explain with the help of an example.
3.
(a)
What is paging ? Explain how the addressesare mapped in paging with the help of a block diagram. What is an inode ? What is its significance UNIX in file system ? What is the information that is stored init?
(b)
C5-63
4.
(a)
Mention at least four different functions of a system administrator,apart from the user creation. Also, explain how the user accountsare created by the .system administratorfor any OS
(b)
5.
(a)
Explain the functioning of the software tool 'UX', which is usedfor compiler construction. With the help of an example for each, explain the First Come First Served (FCFS) and Scandisk scheduling methods.
(b)
C5-63
13,000
BACHELOR IN COMPUTER APPLICATIONS Term-End Examination Decembet, 20A6 CS-64 : INTRODUCTION TO COMPUTER ORGANISATION
Time : 3 hours
Note ,
Mqximum Marks : 75
Answer any
1.
(a)
A machine uses a 32-bit two's complement representation integers.What is the largestinteger for that can be represent ? ed What is the represented ? smallest integer that can be
2 2 2
(b)
(c) (d)
How many different integers are represented? Give reasonswhy an ADD instructionthat is part of a stack-based instruction set would be smaller (require fewer bits to encode) than an ADD instruction in a general purpose instruction set architecture. Convert the two's complementnumber 1101 1010 to decimaleguivalent. 1
(e)
cs-64
P.T.O
(f)
Simplify the following boolean function using sum of product form, by K-map : F(A, B, C, D) : ) (0, 2, 4, 6, 9, 12, 14) and designthe circuit. ,
(g)
the Assumethat in a 8086 microprocessor registers have following values: BX : 6788H SI: 23A4H
: Offset/displacement 8085H Find the effectiveaddressusing the above data for the following addressing modes : (i) (ii) RegisterIndirect Addressing(usingSI) RegisterAddressing(usingBX)
(iii) Displacement Addressing using baseregisterBX (iv) Based-lndex Relative Addressing of microprocessor
(h)
8086
Why is a multiplexer required ? How is it different from a decoder ? Draw the circuit diagram of a 4 x 1 multiplexer and a 2 x 4 line decoder with enable input and also give the correspondingtruth tables.
2.
(a)
Why is parity bit required ? How is it used in correcting single bit errors ? Explain it with the help of an example.How do you determine sizeof SEC Code for 32 bit of data ?
C5-64
(b) 'Show that NOR is a functionally complete set of gates. (p) Design and draw a 4 bit Adder.
3.
Design a 4 bit ripple counter using J-K flip flops. Differentiateamong different.levels RAID. of Write an 8086 assembly language program to compare two strings.
4 5
4.
(a)
number
format
for
the
C5.64
P,T.O.
5 . (a)
Compare Polling and Daisy chaining mechanisms of arbitration and explain them with the help of a diagram.
(b)
Differentiate
versus
C5-64
15,000
CS-66 : MULTIMEDIA
Time : 2 hours Note r Maximurn Marks : 6a
Question number 1 is compulsory. Attempt any three questions from the rest.
1.
(a)
Discuss the hardware requirements of a multimedia computer through a diagram. Also explain various hardware requirements.
10
(b)
(c)
While designing multimedia applications, how does copyright issue play a crucial role ?
(d)
How do scripting languages serve as a useful tool for spreading interactive education ?
5 5
(e)
C5-66
P.T.O.
2.
(a)
Write at least 7 rules that need to be followed in the design of computer based instructions. (b) Name and describe at least 7 software tools that are related to multimedia application. 3. (a) (b) 4. (a) Explain five application areas of multimedia . State any five elements of hypertext, Discuss the planning process of a multimedia 5 5
application with the help of a figure. Also, explain the different phases of planning process. (b) Explain the role of multimedia in entertainment and business.
5.
(a)
publishing 6
(b)
C5-66
15,000
Maximum Marks : 75
Answer any
1.
(a)
List and describe five examples WAN applications of s you have seen. Explain the functioning of 7 layers of OSI model. What is the necessityof using 7 layers concept in 10 OSI model? How is Selective Repeatbetter than Go Back N ? Differentiatebetweenthe following (ii) IEEE 802'4 and IEEE 802'5 3 4
(b)
(c) (d)
(e)
Enlist two factors that cause congestion in ttre Subnet. Describebasictypes of ISDN services. Comp are and contrastPacketand Cell switching.
2 2 4
P.T.O.
2.
(a)
Explain how Slotted Aloha improves performance of system over Pure Aloha.
the 3 :Q
(b)
Explain the use of the following devicesin computer networks : (i) (ii) Hub Bridges
(iii) Switches (iv) Gateways (c) Let a system use 9600 bps channel for sending call setup requestto a base station. Supposethat packets are 720 bits long, that the time-out is 20 ms. What is maximum throughput possiblewith Aloha and with Slotted Aloha ? 3. (a) Explain the function of Modem with the help of a suitable diagram. Differentiate between Guided and Unguided transmissionmedia. Give one example of each. Also describeany one guided transmissionmedia in detail. Explain SlidingWindow Protocolwith the help of an appropriatediagram.
Explain the functioning of spanning treebridges. Define multiplexing. Discuss the need for 4
(b)
(c)
4.
(a) (b)
C5-68
5.
(a)
Differentiatebetween Virtual Circuit and Datagram Subnets. What is remote procedurecall ? With the help of a suitablediagramexplainhow it is established. How is the flow control at the transport layer different from data link layer ? Discuss.
(b)
(c)
C5-68
10,000
BACHELOR IN COMPUTER APPLICATIONS Trtr-End Examination December, 2006 CS-69 : TCPllP PROGRAMMING
Time : 3 hours Note Msximum Marks : 75
Quesf ion number 1 is compulsory. Answer any three questionsfrom the rest.
1.
(a) Identify the addressclassesof the following IP addresses : (i) 196.201.190.6 (ii) L20.10.10 .77 (iii) 772.196. 112.L9 (iv) 150.150.15.15 (b) How manynetworks eachIP address can A, Class B, C have? Also,find the number hostsper network of
in each given address class. (c) What is 3-way handshake mechanism ? Also, explain how the mechanism is used for establishing and terminating a TCP connection .
C5-69
P.T.O.
(d)
What is the maximum number of fragmentspossible from an IP datagram ? Write the five characteristicsof the User Datagram Protocol. How does TCP handle the flow control problem using sliding window protocol ? What is the main mechanism that TCP uses to create a reliable connection ? Explain with the help of a diagram. Design a TCP client-serveralgorithm, where the client shouldprompt a user to type a line of text and . send it to the selver. The server should print the text, number of characters the text and the client's in name on the screen. , 10 How does TCP handle multiplexingissue? Explain the concepts of IP subnet addressing and subnet masking with the help of an example for each. List the important characteristics UDP. In spite of of its drawbackswhy is it used ? Explain with the help of an example. 5
(e)
(0
(g)
2-
(a)
(b) 3. (a)
(b)
(c)
Why does lost acknowledgementnot necessarily force the re-transmission TCP data segment? 4 of
C5-69
4.
(a)
Explain the importanceof the following header fields used in TCP and IP : 1A (i) (ii) Sequencenumber Fragment offset
(iii) Urgent pointer (iv) Header checksum (v) (b) Option + padding
Write the differences and similarities between the TCPAP and OSI models. List the important domain names used in Internet. How does the name resolutiontake place in DNS ? Explain it with the help of a diagram. Explain the following terms with the help of an example for each : (i) (ii) Checksum Authentication
5.
(a)
(b)
C5-69
11 , 0 0 0
,
l i
Maximum Marks : 75
Answer
1.
(a)
Explain the role of the software development team. Normally, who is responsible to select and build the software team for a new project. Also, mention the various options that are available in order to assign /allocate "x" people to work for "y" years on a newly arrived software project. 10
(b)
Explain the significance of the project planning and control. Also, describe the four major steps for the project planning. 10
CS-70
P.T.O.
(c)
With the help of a suitable example, explain the c.oncept of re-application of the software modules.
(d)
What is a 4GL? List and explain different advantages of the 4GL over the 3GL.
List and explain the important qualities of the software product and the process. Describe the briefly integrated structured methodologies
10
3.
(a)
Consider to design a system for the inventory and billing operations of a "Retail Medical Outlet". Draw the context level and first level data flow diagrarns (DFDs) for the system and ailso prepare a SRS document.
(b)
4.
(a)
Describe the life cycle of a computer based system. Also explain the concept of Waterfall model of software life cycle.
(b)
List
various
management
risks in
the
Software
CS-70
5.
(a)
What are CASE tools ? Explain the hllo generations of the CASE tools. With the help of an example for each, explain the broad classification /categories of the CASE tools. 10
(b)
Describe the concept of software reliability, software reviews and software upgradation.
CS-70
10,000
BACHELOR IN COMPUTER APPLICATIONS : Term-End Examination December, 2OOG CS-71 : GOMPUTERORIENTED NUMERICALTECHNIOUES
Time : 3 hours Note r Maximum Marks ; 75
l.
(a)
(b)
Estimate the error in evaluating f(x, V) : *2 + y2 for x : 3'00 and y : 4'00. Derive Newfon Raphson formula using Taylor
(c)
alo t (1 -
ax) (1 d \ dx)
u*?) (1 4
(whereA:
CS-71
P.T.O.
(e)
Find a cubic polynomial which takes the following (x, f(x)) set of values.
X
0 1
2 1
3 10 5
f(x)
(g)
\ 2. (a)
Find the value of f(x) decimalplacesusing Newton Raphsonmethod. If a, b, c, d arethe arguments f(x) : of 1, show X
r that f(a, b, c, d) = r T
(b)
--. 1
' abcd
(c)
(ft)
0 47
10 58
20 64
30 65
40 67
50
60
v (ft/s)
CS-71
3.
(a)
Using Runge- Kutta method of fourth order, solve for y(0'1) giventhat y' : xy + yz, V(Qy 1. :
10 1
(b)
Givenif(x) :
t 10
S f t \ < F F n { A
s 0 0 4 2 6f,( x ) i
4
. , r ^
szsz4o,
L
7
(c)
A civil engineer has measuredthe height of a 10 floor building ,as 2950 cm and the working height of each beam as 35 cm while the true values Are 2945 cm and 30 cm. Compareabsolute and relative error.
4.
(a)
Determine stepsize to be used in the tabulationof h f(x) : sin x in [1,3] so that the linear interpolation will be correct to four decimalplaces. From the table below, for what value of x, is y minimum ? Also find this value of y.
x
(b)
v 0 . 2 0 5 0 . 2 4 0.259 0 . 2 6 2 0 . 2 5 0 . 2 2 4
(c)
Solve the following system of equationswith partial pivoting using Gausseliminationmethod. 2 x+ y + z : 1 0 3x + 2y + 3z = 18 x+ 4y+92:76
CS-71
P.T.O.
5.
(a)
Derive the Gauss- Seidelmethod in matrix form for the solution of the system of equations Ax : b . Hence,derive the matrix fo mulation of 'the Gauss- Seidel methrodfor the following system of equations(no iterationsare to be performed) :
I
l-4
1l [",-l l-r1
(b)
Perform three iterations to find the root of the 25 : 0 using method of false equation *2 position, with initial values2 and 7. Find the second order polynomial for the following data using Lagrahge'sinterpolation method.
X
(c)
0 1
2 55
f(x)
CS-71
10,000
Maximum Marks : 60
Attempt any
1-
(a)
Explain any five advantages of Object Oriented Programming. Explain the need of inheritance and list any three advantages of it. Explain the purpose of the following with a suitable example of each : (i) (ii) Use Case Diagram
v
s :
(b)
(c)
Interaction Diagram
(d)
Write C++ code to create a class dste. Using this class, calculate the age of a person as on the current date
CS-72
P.T.O.
(e)
List
various restrictions with operatqr overloading.Write a C++ program to illustratethe overloadingof incrementoperator. the Define the term exception handling. Write a program to raise an exceptionif an attempt is made to divide a number by zero.
2 . (a)
6 4
(b)
Give output of the following : { int a : 10, b : 20, d; d : b++; cout <<d<<b; d : **a; cout <<d<<a;
l
3.
(a)
Explain the purpose of function overloading. Write a C++ program that uses a function to check whether a given number is divisible by another number or not. Give proper comments whether the denominator number is a prime number or noti
I 2
(b) 4.
(a)
Explain briefly static data members. Define a friend function. Explain the relation of friend function with respect to Public, Private and Protected data members of the class
(b)
Write a C++ program to find the sum of all digits in a five digit number. (For example, if given number is 12345 then the output is I+2+3+4+5:15).
CS-72
5.
Define the followingwith an exampleof each : (i) . (ii) this pointer Destructor
10
CS-72
13,000
BACHELOR IN COMPUTER
,",ffiH:'::,,",,
December, 2OIOG CS-73 : THEORYOF COMPUTERSCIENCE
Time : 3 hours
Maximum Marks : 75
Attempt any
Nofe 3
1.
(a)
What is Kleene closure? Write Kleene closure of the following : (i) {bb, c} 2 + 1+ 7 : 4
(ii) {0, 1}
(b) What are primitive recursive functions ? Describe the initial functions and structuring rules used to obtain primitive recursive function. (c) (d) 2+4:6 5 5
Describe the concept of Universal Turing Machine. Write a short note on Post Correspondence Problem.
CS-73
PT.O.
(e)
Diagrammatically show the processingof 0Q101 through the state transitionmachineshown below.
(f)
2 . (a)
I 2
regular 2+3:5
Convert the following Moore Machine to equivalent Mealey Machine. Moore Machine
Current State
_) qo
Input Symbol a b
q1 q3 q2 q2 q1 q3
Output
1 0 1 1
q2 q3
q2 qo
CS-73
(b)
What is finite automata ? What are the applications of finite automata ? betweenCFG and CSG. Differentiate What is a NP completeproblem ? Explain how NP of completeness the problem can be established. Define Pumping Lemma. Let F(x) (i) (ii) F(x) = O(*n) for n > 4 F(x) : O(x3)
5 3
(c) 4.
(a)
6 4 5
(b) (c)
5.
(a)
Write a short note on halting problem of Turing Machine. of DescribeChomsky'sclassification grammars. betweenCNF and CFG. Describethe relationship
5 5 5
(b) (c)
CS.73
14,000
BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006 CS-74: INTRODUCTION INTERNET TO PROGRAMMING
Time : 3 hours Maximum Marks : 75
Note : Question number 1 fs compulsory. Answer qny three quesfionsfrom the rest. l' (a) What is the difference run-time polymorphism and in compile-timepolymorphism? Explain with the help of suitableexample. (b) What is the difference between Applets and an Application program in java ? Explain. What is the advantageof finally block in java ? Explain with suitableexample. Write a program for l/O operation using Buffered Input Stream and Buffered Output Stream Will an error occur if a classwith the same name exists in two different packages that you import using * form ? How can the error be avoided? 10
(c)
(d)
(e)
CS-74
P.T.O.
2.
(a)
Wiite a program in java to design a class complex for complex number of the form a + ib. Write an . overloadoperator + to add two complex numbers What is finalize() method in java ? Explain. Explain the use of this keyword in java with the help of a suitableexample.
I 3
(b) (c)
3.
(a)
Write a program in java to generatethe following array output, using two-dimensional 0 1 2 3 4 5 , 6 7 8 9 What is the use of super keyword in java ? Explain with suitableexample. What is package in java ? lf t class with default the access definedin a packagep1, discuss access is 'ights of this classin another packagep2.
(b)
(c)
4.
(a)
CS-74
(b)
Find the output of the following : (i) ClassX t staticinta:4; static int b; static void f (int x) ("x { system.out.println :" +x); ("a system.out.println =" +a); ("b system.out.println :" +b); ) static {
b : a > k 2 ;
l
) (ii) ClassBreak Demo { public static void main (string args il) { outer : for (int i - 0; i < 3; i++) { s y s t e m . o u t . p r( nP a s s " + i + " ' " ) ; i" t for (int j : 0; j < 100; j++) { if (j :: 10) break outer; "); (j system.out.print + ) (" system.out.println Break Demo" ); ) (" system.out.println Loops Complete"); )
4
CS.74
12,000
Answer qny Qu estion number 1 is compulsory' three questions from the rest'
"An Intranet uses the Internet technologies within an the organization to achieve better results than
I.
(a)
Give :ffiT::i:ffi;':iliffi::""0n""::; 5
Write and explain any five benefits of implementing Intranet in anY organization
(b)
(c)
also List any five security threats in an Intranet and of mention what can be the solution(s) for each them.
10
cs-75
P.T:O.
(d)
Mention the rore of the foilowing with exampre(s) for each of the following with respectto Intranet : (i) (ii) Servers Clients
10
what is Groupware ? List any five broad range of applicationsassociated with them. Mention the context where a database is required in the Intranet apprication(s). List any five databases (internal databases external or databases) which can be usedas Backendfor the apprications. AIso mention about the databaseconnectivityrequired to connect respective databases with the front end applications. what is encryption and decryption ? How can these be achievedusing the SSL ? what is Authentication? List and exprain any three 9pes of authentication mechanisms supported by WINDOWS 2000 Operating System what is an Intranet Authoring toor ? List any four authoringtools.
(b)
3 . (a)
(b)
(c)
CS-75
4.
(a)
Assume
network (HR,
of
an
organization
with
departments
Manufacturing,
Marketing,
Finance, Sales) and having sufficient number of computers in each. Configure an Intranet for the specifications of the company defined above. Also, list the applications which can be launched on the Intranet. Make any necessary assumptions. (b) Give five reasons why an organization should
5.
(a)
What
application servers that are available in the market. (b) What is an IP address ? Into how many classesis the static IP address divided ? Give their purpose of use and the respective address structures. (c) Write the full forms'for the following : (i) (ii)
5 2
CGI UDP
IMAP
CS-75
12,000
BACHELOR IN COMPUTER APPLICATIONS Term-End Examination December, 2006 CS-601r DSFERENTIAL AND INTEGRAL CALCUSUS WITH APPLICATIONS
Time : 2 hours Note t Maximum Marks : 60
Question number 1 is compulsory. Answer ony three questionsfrom the rest. Which of the following statements are true and which are false ? Give reasonsfor your answers. 10 (i) The tangent to the curve x: b s i ne a t 0 : + 2 is perpendicularto x-axis. a c o se , y :
l.
(a)
(ii)
,lg, #isequal
to
(iii) The function f given by f(x) = 2x3 is strictly decreasingin every interval.
cs-601
P.T.O.
is ]3, ""[.
b
(v)
(b)
1 1.5
2
3
5
4
6 4-5
7 6
2.5 4-7
Estimate the area bounded by the curve, x-axis and the lines x : 1, x = 7, using Simpson'sRule. (c) F i n d L ( p , f ) i f f ( x )= 2 x a partition of [1, 71. E andp - {1,3,5,7} is
3 3
with their
(d) (e)
Find f'(x), when (x) = sech (cot x). Match the following correspondingprimitives : f(x)
(i) (ii) (iii) (iv) (v) (vi)
Sln
functions
Jtet dx
x
(i) (ii) (iii) (iv) (v) log sec x + c log sin x + c log (sec x + tan x) + c cosx+c log (cosec x cot x) + c
cos x
tan x cot
X
sec x cosec x
(vi) sinx+c
cs-601
(0
Find all the asymptotesof the curve : (*2 3x - 4lv2: 4xz + 3x + 1. 1 2 when x w h e n0 when x
(g)
If f(x) :
3-x 3 x+1
lim
x-+0-
f(x) f(x)
lim
x-+1-
(iv)
2.
(a)
Find the volume of the solid of revolution obtained by revolving the triangle with vertices (0, 0), (0, 2) and (3, 0) around the axis of x. nl4
(b)
If
I- : n
ln*z+ In:
6 P.T,O.
cs-601
3.
(a)
dx'
3 4
(b)
, Evaluate : UJZ
f
l0 f f i d x
(c)
sin-^ x
4.
(a)
I
(b)
Find the value of log 2'9 rounded off to three places of decimal using Taylor's theorem. (Take : log 3 = 0'477Ll' Find the surface area' of the solid formed by the rotation of the arc of the cycloid x:a(0 +sine), y:a(1 + cos0) about the x-axis.
5.
(a)
(b)
Find all the extreme valuesof the function, f, defined by f(x) = (x 2f (x 3)3, Vx e R.
cs-601
2,000
Maximum Marks : 50
1.
Read the passagegiven below and answer the questions that follow : Sometimes solutionsto large problems can be fairly simple. Take th,e energy problem. Solutions focus on redesigningthe automobile, boosting the use of nuclear and other clean energy uld so on. But we could make a simpler start, says Matt Prescott, a British environmental scientist.He wants a completeban on the traditional light bulb. The cheapestway for developingcountriesto make optimum use of limited energy supplies, and for developed countries to achieve cuts in their carbon
cs-610
P . TO .
dioxide emission, says Prescott, is to augment energy efficiency. As a first step, he suggests making light bulbs
museum pieces. This could even encourage people to 'aim higher' in increasing efficiency in everyIhing from hot water systems to home insulation, thereby cutting Green House Gas (GHG) emissions.
After
all, it is domestic
energy consumption
that
causes more than 25 percent of the global GHG emission of carbon, sulphur and nitrogen digxide. Recent research 'green indicates that the wider use of lighting' can cut this dramatically. Compact fluorescent light bulbs, for
energy of
incandescent bulbs to produce the same number or more lumens. That they also last about ten times longer than regular bulbs is a bonus. Compact fluorescents may. be more expensive initially, but the long-term savings would surely offset this. Light emitting diodes (LEDs) also offer an excellent alternative to thg light bulb.
It makes sense in. energy-starved countries like India to have regulated energy -efficiency ,campaigns that could reduce waste and pollutioh, and stimulate innovation. Let's start with light. The public should be made aware of
cs-610
concepts like 'task lighting' : corcentrating light only where it's needed.This avoidswaste of energyand since task lighting uses lower watt bulbs, you don't annoy others in the area either with an intrusivelybright light. The government could kick off the process by providing
L..v lr. vvvgg
tax incentivesto manufacturersto market more efficient fluorescentbulbs. 0 What does the writer mean when he says that traditional light bulbs should be made 'museum pieces'? List three ways to conserve energyas suggestedby the writer.
(ii)
(iii) Give two reasons why compact fluorescent light bulbs are better. (iv) what does 'task lighting' mean ? what advantages ? 2. (a) are its
2 j+2
Change the following sentencds into the passive voice : (il (ii) The Presidentdeclaredthe exhibition open. My mother gave me a book on my birthday.
(b)
Fill in the blanks in the following sentences with the correct tense forms of the verbs given in brackets : (i) she
cs-610
P.T.O.
3.
Do as directed: (a) : Correct the following sentences (i) This novel is too interesting. 7
(b)
the following
r,,
(c) (d) .
Write a sentenceusing the phrasal verb Rewrite the following in indirect speech She said, "Father, I have got a job' "
4.
Write a paragraph in about 150 words on any one of the following : (i) (iil (iii) Mobile phones can be a source of great nuisance. Advantages and disadvantages of email. Computer games.
5.
(a)
Fill in the blankswith suitablearticles(o, an and the), : wherever necessary (0 (ii) He is honour to meet her. girl in blue is mY sister' '
(iii) It will be -
c s -6 1 0
(b)
Use the following words in one sentence each to bring out the difference in their meaning : (il (ii) except accept
6.
10
We all start life as weak, helpless creatures, totally dependent for both our physical and mental well-being upon those who care for us. It has been demonstrated that, from the very beginning of its separate existence, the baby requires more than simple attention to its physical heeds. If a baby is to develop satisfactorily,it is not enough merely to feed it and keep it warm; it needs a mother as a person whg will play with it, caressit, and show it affection in all the hundred ways in which mothers do show love towards a child which has been desiredand which is welcomed.Babieswho are cared for physically, but whose emotional needs are neglected,
c s -6 1 0
P.T.O.
develop rnore slowly and ffidV, in some instances,suffer permanent damage in that, in adult life, they may never be able to form close emotional ties with any other human being. Every psychiatrist has seen examples of people who were brought up in institutions and who, perhaps, were excellently led and clothed, but whose emotional needs were left quite unsatisfied.As a result, they grew up into a kind of person who can never keep a friend because the demands which they make upon others are not those of friendship, but rather those of a lost child looking for a parent who can neverbe found. (224 words)
cs -6 1 0
20,000
Maximum Marks : 6A
Attempt qny
l.
(a)
Differentiate
between
Microcomputers,
Minicomputers and Mainframes. (b) Draw and explain the basic Also, structure XPlain the of a key
Von-Neumann
machine.
features of a Von-Neumann machine' (c) Explain five types of media through which data may be communicated. (d) what is a screen saver ? How can we protect a
70
cs-611
P.T.O.
e .
(a)
What do you mean by Normal view and Page Layout view of a document? How do they differ from each other ? Define the term Parallelprocessor. Explain the four categories parallelprocessors. of Draw and explainany three topologies a LAN. of write the processof creating a folder in windows. How can you copy the files in an existing folder to the newly createdfolder ?
Explain the terms soft page break and Hard page break in MS-Word.
(b)
3-
(a) (b)
4.
(a)
(b)
the four categories of programming Ianguages. Also, indicate the category that is , perceived to be the hardest to prograrn,
Explain
5 . (a)
(b)
Define the term Wrus. Explain the features of at least four prevalent:viruses the computer: in industry. Define the term Multimedia. Explain any four multimediatools
cs-611
20,000
CS-612: PG SOFTWARESKILLS
Time : 2 hours Mqximum Marks : 60
Nofe :
Answer any
l.
(a)
A father has two sons. Four years ago, the father was three times as old as his eldest son and four years hence, the eldest son will be twice as old as the younger son. If the younger son is now 8 years old, find the father's present age.
(b)
the
working
of
any
two'
of
the
cs-612
P.T.O.
(c)
Explain the features of the following with example : (i) (ii) Goal Seek Solver
(d)
Suppose m & n are integers, such that n2 + 1 -.2m, Prove that m is the sum of squares of two integers. 4
(e)
names. (f) Explain,with example,how chartsin Excel are used in analysis. What do you understand by the term Internet Protocol ? Explain HTTP protocol and what it is used for. If three persons (equally able) can jointly finish /complete three jobs in three days, then 100 persons (of the same ability) can jointly do 100 such jobs in how many daYs? Explain the following functions giving exarnplesfor each : (i) LEN( ) (ii) FLOOR( ) (iii) CEILING( ) (b) Comment on the statement"Every graph is not an Euler's graph". Using a diagram, illustratedifferent parameterswhich decide that a graph can have an Eulerianwalk or not
2.
(a)
(b)
3.
(a)
c s -6 1 2
4.
(a)
What
Custom
(b) iT;j;r;:"
5.Writeshortnotesonanyfourofthefollowing:10 (a) (b) (c) (d) (e) Autofit E-commerce Auto templates DNS Pivot tables
cs -61 2
20,000
Qu estion number 1 is compulsory, Answer any three quesfions from the rest.
I,
(a)
List and explain features of any five toors of the Internet. write the step-by-step procedureto send a resume (which is saved as a word fire) as an attachment through an e-mailto the job_seeker. write the step-by-stepprocedure to search for a specific information of a University on the Internet through a searchengine.
10
(b)
10
(c)
10
2'
What is a Brows ? List any three browsers. er Also, explain the generalfeaturesand the various options on the main menu of any web_browser.
15
cc-09
P.T.O.
3.
involvedin booking a railway Explain the compl ete process about the ticket/airlines ticket/movie ticket online. write 15 securedelectronictransactionalso. of the List and explain any three functions in each 5x3:75 following menus of the NetscapeNavigator : (i) (ii) (iiil File View Go
4.
Explain the following : (i) (ii) Addressbook of e-mail Sn / File Transfer Protocol (FTP)
cc-09
2,000
C C - l1 : V I S U A L B A S I C
Time : 2 hours
Maximum Nlarks: 75
Note :
Qu estion number 1 is compulsory. Answer any three questionsfrom the rest. event procedure that accepts a string 10
1.
(a)
Write
(statement)as input and prints all words in it. Design the samplelayout also, 'the (b) Explain function of a Projecf Window. What rc are the various componentsin it ? Explain them. (c) Wiite the memory (in bytes) occupied by the following data types : Integer, Currency, and String through an event procedure. Design the sample layout also 10
CC-11
P.T.O.
2.
(a)
What is an MDI form ? How does it differ from SDI form ? Write a step by step procedureto create MDI form and selectsome controlson it. Write an event procedurethat simulatesa calculator which supports at least four basic arithmetic operations. Design the sample layout. Make necessary assumptions. 10 With the help of an example event-procedure, illustrate the use of the relational and logical ' operatorsof VB.
Write an ,event procedure for a command button to 'x', 'x1 display the factorial of where is a positive integer. Design a sample layout for the application that should include a splash screen.
(b)
3.
(a)
(b)
4.
(a)
Define an Index. Design a Visual Basic Application to autom ate the process of submission of examination form. Also, indicate the tables, forms, controls that are to be used, and information about the menu design. Make assumptions, whe rever necessary.
(b)
Explain the following terms : (i) (ii) (iii) Object Container Application Source Application
(iv) OLE
CC-11
5'
(a)
Write the process of creating an OLE object at designtime Write an event procedurefor computing the area of a rectangle. Also, design user interface for this applicationalong with a splashscreen.
(b)
CC-1 1
2,000
Maximum Marks : 75
Note t
Qu estion number I is compulsory. Answer any three questions from the rest. Use C++ whereuer lecessary.
1.
(a)
Write a function to swap the values of two integer variables. U:n call by reference" to pass parameters. 10
(b)
Write' the syntax for defining a class. Also, write syntax for declaring an object of a class. 6
(c)
Write a prograrn for the addition of two matrices. Define necessary classes 7
2-
(a)
Write a program for the addition of two complex numbers.Overloadthe '+' operator. 10
(b) :iffossible
3(a)
How can you pass objects as function arguments ? Explain with example. What is meant by data abstraction ? Give an example. Write a program that acceptsenrolment number as input and prints the student'saddressalong with the name of programmeof study. Use inheritance. 10 Write the syntax for defining an array of objects. Give example. .,' List any 10 operators that can be overloaded in C++. How does Object Oriented Programming paradigm differ from Proceduralprogrumming ? Explain with example.
(b)
4-
(a)
(b)
5.
(a)
1,0
(b)
CC.1 6
2,000
Qu estion number 1 is compulsory. Answer qny three questionsfrom the rest. What is the purpose of layering ? How many layers does the TCP /lP Protocol Suite contain ? Explain the functionsof each layer of TCP /lP Protocol Suite. 1 0
l.
(a)
(b)
? What is the need of IP addresses Which format is used to store the IP addresses ? Explain and differentiate different classesof IP addresswith an example of each.
10
(c)
of What are the functionalities primary and secondary DNS servers? How does the DNS server work ? Explain with the help of suitableexamplefor recursive and iterative solution.
10
BCS-061
P.T.O.
2.
(a)
What is Distancevector routing algorithm ? Explain its working with the help of a suitableexample.
jJlH.
3.
TELNET
Explainthe working of 5
What is Client/Server Computing ? Explain different characteristics client and serverprogram, that are useful of 10 for designing them. with Draw and explain the UDP Client/S erverarchitecture the sequenceof systemcalls.Also, give the justificationof
4-
5.
',70
,:
BCS-061
6,000