0% found this document useful (0 votes)
1K views

Ugc Net Paper 3

This document contains 115 questions related to various topics in computer science including databases, operating systems, computer networks, programming languages, algorithms and data structures, computer architecture, artificial intelligence, and graphics and multimedia. The questions cover concepts, terms, and techniques across these fields and ask the reader to explain, define, distinguish between, provide examples, draw diagrams, write programs or algorithms, and otherwise demonstrate their understanding of fundamental computer science topics.

Uploaded by

RajaReddy VN
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Ugc Net Paper 3

This document contains 115 questions related to various topics in computer science including databases, operating systems, computer networks, programming languages, algorithms and data structures, computer architecture, artificial intelligence, and graphics and multimedia. The questions cover concepts, terms, and techniques across these fields and ask the reader to explain, define, distinguish between, provide examples, draw diagrams, write programs or algorithms, and otherwise demonstrate their understanding of fundamental computer science topics.

Uploaded by

RajaReddy VN
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7

COMPUTER SCIENCE & APPLICATIONS

PAPER-III

1.
Hazard free two level AND-OR gate network
2.List and briefly describe four categories of databases and give an example
of each.

3.What are the responsibilities of DBA and how these can be implemented ?

4.Describe and contrast the concepts of aggregation and composition and


provide an example of each
5.Explain Z-buffer algorithm and its limitations.
6.Explain the following graphical interactive techniques. (i) Zooming (ii) Dragging

7.Explain the working of plasma panel display. Give its advantages and
limitations.
8.Explain the terms :
frame buffer
refresh rate
aspect ratio
resolution

6. Explain the following programming language concepts : (i) Polymorphism (ii) Lazy evaluation

7.Six nodes are equispaced and lie on a straight line. Using steiglitzs link
deficit algorithm, design a 3-connected starting network
8.Distinguish between public-key, private-key and secret-key with examples.

9.Define sockets. Discuss socket types. Draw and explain the operations for
socket system calls for connection-oriented and connectionless service
protocols.

9. Explain with examples the linearisation and renaming strategies of conflict


resolution in multiple inheritance.

10. Name three main methodologies for object oriented analysis and design.

11.Explain cyclic redundancy check code used in error detection mechanism


with an example. Compare this coding method with Huffman Coding
Method.
12. What is the purpose of Interrupt Flag (IF) and Trap Flag (TF).
13. Describe the purpose of normalizing data and also list out the dependencies involved

in the process of normalization.

14. What are distributed database design issues ?


15. Explain the terms : Refresh rate, Aspect ratio, Resolution.
16. Explain the need to overload the assignment operator.
17.What are the advantages of using UDP over TCP ?
18.Transport bridges are always superior to source routed bridges, Justify.
19.Describe how a validating parser is different from a non-validating parcer.
20.Differentiate between software verification and validation.
21.Give examples of the use of threads in a single user multiprogramming system.
22.If a process exits and there are still threads of that process running, will they continue

to run ? Justify your answer.

23.Write AO* search algorithm.


24.Can we increase reliability through testing ? Comments.
25.Define : Slack variables, Surplus variables, Basic solution, Basic feasible solution,

Optimal solution.
26.Explain Max-Flow, Min-cut theorem with example.
27. State perceptron learning Law. Write down on algorithm for perceptron network.

28.Explain with examples, the concept of generalization in feed forward Neural


Network.

29.What are desirable properties of activation function ? List the properties of


sigmodial and tan hyperbolic functions.

30.List out different methods of membership value assignments and explain each of

them in brief with appropriate schematics for membership function.

31.Discuss possibility distributions as fuzzy sets.


32. Write a program for echo server using thread and sockets.
33.List any four important files of Unix Kernel and explain functions of each.
34.What is multithreading ? Explain how thread synchronization can be achieved

using events.

35.Distinguish between model and modeless dialogs. Give the sequence of steps to

be followed to create nodel dialog application.

36.Compare in detail the Runtime behaviour of Dos and Windows.


37.Implement a half adder using only NOR gates.
38.State the advantages of 16 bit microprocessor over 8 bit microprocessor.
39.Why fragmentation and data replication are useful in Distributed DBMS ?
40.What are basic differences between optimistic concurrency control techniques and other

concurrency control techniques ?

41.Compare multipath routing with flow-based routing.


42.What different types of Messages SNMP protocol can handle ?
43.What is Clipping in applet ? What is the relationship between clipping and

repainting ?

44.What are the management functions of an operating system ?


45.Explain the concept of recovery from deadlock.
46. Describe MPEG1 and MPEG2 standards of compression.

47. Explain any one method of edge detection in image processing.

48.Implement a half subtractor using only NOR gates.


49.Distinguish between memory mapped I/O and I/O mapped I/O.
50.What are the differences between OSI and TCP/IP reference model ?
51.Explain how a semaphore that can hold an arbitrary value be implemented using only

binary semaphores and ordinary machine instructions.

52.What is an expert system ? How does it differ from a conventional computer program ?
53.Describe the waterfall model of a software process.
54.State the relative merits of digital vector generator and analog vector generator.
55.Compare Object Oriented DBMS with RDBMS.
56.What is encapsulation ? Explain the benefits with an example using private and public

keys.

57.State and explain Kuhn-Tucker conditions.


58.Describe the McCulloch - Pitts model of a neuron.
59. What is meant by portability ? How has it been made easy for porting UNIX to various

platforms ?

60. List out any 10 features of UNIX and explain any two of them.

61. Describe the two methods used in UNIX to change the access permissions.

62. Describe the differences between Windows 98 and Windows NT.

63. Using a neat sketch, describe the structure of Windows 2000.

64.What is partitioning in ORACLE ? What are its benefits ?


65.Describe the various methods of passing parameters in procedural programming

languages.
66.What are the advantages and disadvantages of prototyping model ?
67.List various types of coupling and explain three of them in detail.
68.What are the functions of data link layer ? Compare OSI data link layer with IEEE 802

with suitable examples.

69.What memory management technique is used in UNIX system ? How is system

performance maintained with the particular memory management technique ?

70. Distinguish between randomness and fuzziness.

71. Show that the EX-OR switching function is not linearly separable.

72. Explain the following statement :Fuzzy systems are shallow but fully interactive .

73. State and explain differential Hebbian Learning Law.

74. What are fuzzy cognitive maps ? Describe their use.

75. Describe which data structures are associated with processes. How are these affected

by exec, fork and exit system calls ?

76. Draw the block diagram of the structure of UNIX operating system and explain each

component of it.

77.What is a thread ? How is a thread created in windows operating system ? What are

priority class and thread priority class ? What are the advantages of using threads ?

Explain thread priority with an example.

78.What is the role of a microsequencer in Microprogramming Control Unit ?


79.Draw the states of a binary counter for 4 bits.
80.Justify that range queries can benefit, from cluster indexing.
81.Define : Referential Integrity and Self-referential Integrity.
82.What are the disadvantages of drawing a circle using polar co-ordinates method ?
83.Compare the scan line polygon fill with the boundary fill algorithm.
84.What do you mean by binary exponential back off ?
85.Write a function in C-language to find maximum of an arbitrary array having

n-elements.

86.What are the disadvantages of water-fall model ?


87.What are the necessary conditions for a deadlock ?
88.What are the functions of a distributed operating system ?
89. What is the syntax of “c reate “system call ? Write an algorithm for creating a file.

90. How do exec system calls works ? Explain in detail logical format of an executable

file.

91. Write a program to show that the parent and child get separate data segment.

92. What do you mean by object library, import libraries and dynamic link libraries in

Windows environment ?

93. Describe briefly six window functions usually called while creating a window.

94.Draw neat diagram of a BCD adder.


95.What is an attribute inheritance and why is it important ?
96.What are the different methods of maintaining synchronous replicas in a Distributed

DBMS ?

97.What are the limitations of Z-buffer algorithm ?


98.What is the use of SRS in software testing ?
99.How systems calls are executed in Unix Operating System, explain with an example ?
100. Give the classification and explain the separability of XOR problem.

101. Explain Auto-associative memories and Hetero-associative memories with examples.

102. What is a -cut of a fuzzy set A ? Does the a-cut of a fuzzy set A give us another fuzzy

set ? Explain.

Discuss the significance of Boltzmann learning Law and discuss its difficulties.

103.
What do you mean by closure of a fuzzy binary relation ? Give an example.

104. What are different Windows messages used in mouse processing ? Explain each
one of them.
105. Write program statements using windows functions to define an edit box of the
size of the client area. It should occupy the whole client area even when the
window size is changed.
106. What is an asynchronous socket ? How does it support synchronization ?
107. Explain, how to create a background process. How will you provide input to background
process ? How will you terminate background process ?
108 Define and differentiate among foreground, background and deamon processes.

109.What is thread ? How is it different from a process ?


110.What are the differences between simple paging and demand paging ?
111.What characteristics are common to traps, supervisory calls, and subroutine calls, but
different in interrupts ?

112.How can Fourier transformation be used to perform image restoration?

113. Discuss fractral image compression technique and give its advantages.

114. State perceptron learning law. Write learning algorithm for perceptron network.

115. Distinguish between Hebbian learning and competitive learning.

116. Describe Back propagation algorithm in a Neural Network. Mention one of its
applications.

117. What do you mean by fuzzy relation ? Illustrate fuzzy relation with simple example.

118.Explain three categories of files in UNIX.

119.What is the grep used for ? What are its various options ? Give the syntax of the grep
command.

120. What is the purpose of a nice command ?


What are the advantages of cpio over tar ?

121.Explain the role of X in running X clients Remotely.


122. With a neat diagram, explain components and functions of Expert Systems.

123.Write A* Search Algorithm. Mention advantages over any one search algorithm.

124.Write a recursive function in C or C++ to compute the number of nodes in a binary

tree.

125.Explain the meaning of message switched and packet switched networks. Give their

key differences also.

126.Describe Belady s anomaly.


127.Why is it that hill climbing techniques have a limited use in AI ?
28.Distinguish between a software process model and a software process.
129.State the major advantages and disadvantages of Network Data Model with a suitable

example.

130.What is function overloading in C++? Give an example program using function

overloading.

131.Define postfix notation of a general expression E.


132.Describe the advantages of OPEN systems. Does a common UNIX standard for OPEN

systems exist ?

133.Describe the commands a system administrator has to use in UNIX.

134.What are the four different versions of Windows 2000 ?

135.Why is it that in Windows 2000, the current priority is always greater than or equal to

the base priority ?

136.Explain a method of image compression which is a lossless compression


method.
137.Write complete tags to show Image, Hyper Reference, Performated Text
and List of items.
138.Describe the essential features of Booch methodology.

139. What is Software Quality? Can we measure software quality ? List the
various factors that affect the software quality.

140. What are Software Metrics ? Explain, how do Software Metrics help in
Software Project Management ? List some important Software Metrics for
Project Management.

141. What are the main objectives of Software Testing ? Explain the various
levels of Software Testing Signifying the importance of each level of testing.

You might also like