6th Sem Mid B.tech. CS, It
6th Sem Mid B.tech. CS, It
Roll No .
TCS-.601
B. TECH. {CS/IT)
(SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
COMPILER DESIGN
Time: 1:30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two ~
, Sections.
(ii) Both Sections are compulsory.
jJ
I
Section-A
. \
1. True-False: (lx5=5 Marks)
(a) . One benefit of Intermediate Code
Generation is Retargeting.
r.
(b) Number of states in SLR and CLR are
always equal.
(c) Optimization phase in compiler IS
optional.
(d) A viable prefix of a right sentential form is
that prefix that contains a handle but no .
symbol to the left of the handle.
F. No. :a-2 P. T.O.
II
TCS-601 (3) TCS-601
(2)
/I
Roll No .
TCS-602
B. TECH. (CSE) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
I )
SOFlWARE ENGINEERING
Time : 1 : 30 Hours
Maximum Marks: 50
Note :(i) This question paper contains two
Sections.
(ii) Both Sections are compulsory. "'-
',.
Section-A
,1 1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) "Consider a system where, a heat sensor
detects an intrusion and alerts the security
company." What kind of a requirement the
system is providing either functional or
non-functional ? (True/False)
)'
(b), Process adopted for one project is same as
the process adopted from another project.
(TruelFalse)
(c) is a measure/study to 'assess how
practical and beneficial the software
project development will be for an
organization.
F. No, " a-10 P. T. o.
, ,
IA
•
(2) <, TCS-602 • r
(3) ,TCS-602
(d) mainly depends on data flow "4.' Attempt any two parts of choice from (a), (b)
diagrams and Data Dictionary.
""'"
.•.
and (c).' (5x2=10 Marks)
(e) is also known as functional testing.
(a) What is software testing ? Discuss its
2. Attempt anyfive parts : (3x15=15 Marks) types.
(a) What is Software Crisis ? Discuss the
(b) Give the outline structure of SRS. List out
problems and their causes.
the important characteristics of a good
(b) Differentiate between user and system :/
SRS. "
requirements.
(c) What is a data dictionary? Explain. (c) Discuss Agile Manifesto and principles.
(d) Explain Pair Programming and its benefits Explain the process of serum used for
(e) What is feasibility study and give its types. project management.
.•.
(f) What is Requirement Elicitation? Discuss 5. Attempt any two parts of choice from (a), (b)
important techniques for it.
I,
and (c). (5x2=10 Marks)
Section-B
(a) What is Requirement Engineering
3. Attempt any two parts of choice from (a), (b) Process? Elaborate.
and (c). (5x2=10 Marks)
(b) 'Classify 'the following as functional/non-
(a) Discuss Iterative software development
functional requirements for an Online
model with its merits and demerits.
Ticket Booking:
(b) What is Rational Unified Process (RUP) ?
Discuss the workflows. (i). System should only allow users to
(c) Differentiate between (any two) : move to payment only when
(i) Functional and Non-functional man~toty fields such as date, time,
requirements. location has been mentioned.
(ii) Decision Tree and Decision Table (ii) Use of captcha and encryption to
(iii) Program and Software. avoid bots from booking tickets.
F. No. :a-/O F. No. :a-/O P. T.O.
(4) TCS-602
~
r
)
/.'
TCS-602 600 A
F. No.: 0-10
II
Roll No .
TCS-604
,
B. TECH. (CS/IT) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
COMPUTER NETWORK-I
Time : 1 : 30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two'
sz:
Sections.
(ii) Both Sections are compulsory.
Section-A
1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) Physical addressing is a function of the
____ layer.
(b) We need reliable transport service at the
transport layer if data link transport on all
the links in the route is reliable.
(TruelFalse)
(c) One fundamental difference between
HTTP and FTP is ---
(d) Suppose a web server has 1000 outgoing
TCP connections. The number of server
side sockets used are --:-----
F. No. : a-IO P. T. o. ,.
;.
(a) Two hosts are directly connected with 3. Attempt any two parts of choice from (a), (b)
each other by a 2 Mbps link. How does it and (c). ;' (5x2=10 Marks)
.take to send a 1.5 MB file? .
.. /
(a) When transferring-a file between two PCs,
I (at least) two acknowledgement strategies
, (b) What are headers and trailers and how do
are possible. First; the file is chopped up
they get added and removed? Explain.
into packets, which are .individually
(c) Why will two ISPs at the same level of the .. ';" acknowledged by the receiver, but the file
hierarchy often peer with each other ? transfer as a whole is not acknowledged.
How does an IXP earn money? Second, the packets are not acknowledged
individually, but the entire file is
.(d) What is the difference between network acknowledged when it arrives. What is
architecture and application architecture? your view regarding these two strategies ?
(e) Suppose Alice and Bob are sending Which one is best? Can we have any other
packets to each other over a computer alternative strategy ?
network. Suppose Trudy positions herself (b) Suppose two hosts, A and B, are separated
in the network so that she can capture all by 20000 kilometers and are connected by
the packets sent by Alice and send a direct link of R = 2 Mbps. Suppose the
whatever she wants to Bob; she can also propagation speed over the link is 2.5 x
capture all the packets sent by Bob and 108 metres/sec. Suppose now the file is
send whatever she wants to Alice. List broken up into 20 packets with each
three malicious things Trudy can do from packet containing 40000 bits. Suppose that
this position. each packet is acknowledged by , the
F. No. : a-10 F. No. :a-IO P. T.O.
;,
(5) TCS-604
(4) TCS-604
"'.
(b) Consider an application that transmits data
.•.
receiver and the transmission time of an at a- steady rate (for example, the sender
acknowledgment packet is negligible. generates an N-bit unit of data every k
Finally, assume that the sender cannot time units, where, k is small and fixed).
send a packet until the preceding one is Also, when such an application starts, it
I
acknowledged. How long does it take to will continue running for a relatively long
send the file? ) period of time.: Answer the following
'/
(c) A packet switch receives a packet and questions, briefly justifying your answer:
determines the outbound link to which the (i) Would a packet-switched network or
packet should be forwarded. When the a circuit-switched network be more
packet arrives,-one other packet is halfway appropriate for this application ?
done being transmitted on this outbound Why?
~
link and four other packets are waiting to (ii) Suppose that a packet-switched
be transmitted. Packets are transmitted in network is used and the only traffic in
order of arrival. Suppose all packets are this network comes from such
1500 bytes and the link rate is 2 Mbps.
applications as described above.
What is the queuing delay for the packet ?
Furthermore, assume that the sum of
More generally, what is the queuing delay
the application data rates is less than
when all packets have length L, the
the capacities of each and every link.
transmission rate is R, x bits of the
) Is some form of congestion control
currently-being-transmitted packet have
needed? Why ?
been transmitted, and n packets are already
(c) Match the following to one or more layers
in the queue? .
of the OS! model :
4. Attempt any two 'parts of choice from (a), (b) (i) Format and code conversion services.
and (c). (5x2=10 Marks) (ii) Establishes, manages, and terminates
(a) Explain Packet switching approaches sessions.
using examples. .•.
F. No.: 0-/0 P. T. O.
F. No. :0-/0
(6 ) TCS-604
'If "
,.
....
Roll No .
"
TCS-693/,
B. TECH. (CS/IT) (SIXTH SEMESTER)
• MID SEMESTER EXAMINATION, 2018
FULL STACK WEB DEVELOPMENT
Time: 1:30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two
Sections.
(ii) Both Sections are compulsory.
"'-
Section-A
1. Fill in the blanks/True-False: (1 x5=5 Marks)
(a) In HTML tag is used for horizontal
raw.
t'
(b) The TITLE tag can be placed anywhere in
) the HTML document. (TruelFalse)
(c) Tables are used to control the layout of
different visual elements. (TruelFalse)
(d) HTML tags tell a Web browser how to
render a Web page. (TruelFalse)
(e) Tags are used in pairs. (TruelFalse)
F, No. :0-2 P. T. o.
,
,.
TCS-69.3 (3) TCS-693·
(2)
Page 1 Page 4
Page 5
Page 2
(b) Write an external cascading style sheet to
define the font, font colour, background
and foreground colours. Also use the CSS
to design a web page with tables. , )
(c) Explain CSS and its types with example.
Write about selectors in cascading style
sheet.
TCS-693 650
F.No. :a-2
/I
Roll No .
TCS-671
..
"
B. TECH. (CSE/IT)
') (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
BIG DATA STORAGE AND PROCESSING
Time: 1 : 30 Hours
Maximum Marks: 50
Note :(i) This - question paper contains two
Sections.
(ii) Both Sections are compulsory.
Section-A
1. Write True-False: (lx5=5 Marks)
(a) Visualizing Big Data presents no special
challenges.
(b) Hadoop Distributed File system was
invented by Google.
) . (c) Research can describe a Big Data
application that has a proven return on
investment (ROI) for an organization.
(d) The more data is available the most
successful with be the business
application.
(e) Google invented Big Data architecture
with search Query engine.
F. No.: a-/3 P. T. o.
~
II
t
2. Attempt anyfive parts: (3 x 5 = 15 Marks) 4. Attempt any two parts of choice from (a), (b)
(Define/ShortNumerical/ShortProgramming!Draw) " 'and (c). (5x2=10 Marks)
(a) What kind of analysis can be done on Big (a) What are the design goals for HDFS ?
I. data? (b) What are some of the hottest technologies
visible in Big data processing?
(b) How does a master node differ from the (c) Differentiate OLTP, OLAP and RTAP.
worker node?
5. Attempt any two parts of choice from (a), (b)
(c) What is Data Analytics ? and (c). (5x2=10 Marks)
(d) What is a data ingest system ? Why is it an (a) What is Data Warehouse? Explain the
different approaches of creating Data
important topic?
Warehouse.
(e) What is MapReduce ? What are its l
CO) Explain the difference between Entity.
benefits? relationship modelling and Dimensional
.. modelling?
(f) Define Data Mining.
(c) How does HDFS ensure security and
Section-B
integrity of data?
3. Attempt any two parts of choice from (a), (b)
and (c). (5x2=10 Marks)
(a) What are Google's contribution to Big
data processing
(b) What is Big Data? Describe the 4V model
of Big Data?
(c) Describe the Big Data processmg
architecture. TCS-671 100
I
F. No . .-a-/3 F. No . .'a-13
Roll No .
TCS-691
'. B. TECH. (CS/IT)
(SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
IMAGE PROCESSING AND
COMPUTER VISION
Time : 1 : 30 Hours
Maximum Marks: 50 ~
..
Note: (i) This question paper contains two
, Sections.
(ii) Both Sections are compulsory.
(iii) Write to the point answer, writing more
will not fetch more marks.
Section-A
)
1. Fill in the blanks/ True-False: (lx5=5 Marks)
(a) Image is imported in form of matrix in
7'
MATLAB in which each cell is a pixel.
(TruelFalse)
(b) is the smallest unit of an image.
(c) A colour image can have dimensions.
F. No. :a-13 P. T.O.
/A
(2) TCS-691 (3) TCS-691
(d) 1 function in MATLAB can tell you (b) Write a MATLAB program that reads an
the number of dimensions of a matrix. image 'test.jpg' and apply a 3 x 3 mask to
(e) A pixel can have either or . remove the salt and pepper error.
value in case of black and white image. (c) Write the difference between image
2. Attempt anyfive parts. (3x15=15 Marks) restoration and image enhancement.
-L
(Write in 50-80 words) Attempt any two parts of choice from (a), (b)
(a) What is a Digital Image? and (c). (5x2=10 Marks)
(b) Write a MATLAB script to create an (a) Image subtraction is often used in
image which is invert of another image industrial applications for detecting
with name, 'nature.jpg". missing component in a product assembly.
(c) What is the Difference between the image The approach is to store a "golden" image
•• I •
formation in the photographic camera and corresponds to correct assembly; this
the human eye? image is then subtracted from incoming
(d) What is Weber's ratio? images of the 'same product. Ideally the
(e) Write a MATLAB code to change size of difference would be zero if the new
an image by a factor of 2 and 0.5 and then products are assembled correctly.
change the doubled and half image to . Difference images for products with
grayscale. missing components would be non zero in
(t) Write a MATLAB code to show different the area where they differ from the
planes of a colour image with name "golden" image. What condition do you
"someimage. png". think have to be met in practice for this
Section-B method to work?
3; Attempt any two parts of choice from (a), (b) (b) Show how a smoothening filter (mean
and (c). (5x2=10 Marks) filter or Gaussian filter) can be used to
(a) What are the fundamental steps of Digital sharp an image. Write the MATLAB code
. .
Image process mg. also.
F. No. : a-/3 F. No.: a-I] P. T: O.
{
( 4)
TCS-691 650
F. No.: a-13
/A
Paper Code: TCS 651
ROIINO·U~
a) Services provided by cloud vendors such as AWS and GCP comes under _ service
model.
b) Is cloud computing distributed or parallel computing?
c) Is Python a compiled language?
d) Does Cloud Foundry comes under PAAS?
e) The IP of localhost server is __ . (There can be two answers, marks will be awarded to
both of them. Just name anyone).
a) What is the difference between distributed computing and parallel computing? Give
examples. -.
b) What is version control? Name a popular version control service.
c) What is the difference between IAAS and PAAS?
d) Explain a popular PAAS service.
e) What will be output of following code snippet?
• a=S
• print "hello", a
• c = a/O
• print III cloud"
f) Explain two popular IAAS services.
Section - B
Attempt any two parts from each of the following sections.
Q3.
a) Explain Git version control with a suitable diagram. What is the advantage of using Git
version control?
b) Write the commands for creating a repository on Github, downloading it on your local
machine, loading it back to Git server after some updates. (Be specific about the
commands).
c) Using Python - Define a function overlapping() that takes two lists and returns True if
they have at least one member in common, False otherwise. You may use your
is_member() function, or the in operator, but for the sake of the exercise, you should
(also) write it using two nested forloops.
U4.
a) What is Cloud Foundry service? Explain the steps for creating a website and deploying
on cloud foundry platform.
b) What is virtualization in cloud computing? Explain any two popular virtuallzatlon tools
available in the market.
c) In Python - Write a function translateO that will translate a text into "rovarspraket''
(Swedish for "robber's language"). That is, double every consonant and place an
occurrence of "0" in between. For example, translate{"this is fun") should return the
string "tothohisos isos fofunon".
us.
a) What is the role of hypervisor in virtualization? How do AWS, GCP and AZURE use
virtualization for providing their services to the people?
b) What are the pros and cons when creating cloud services such as IAAS and PAAS? Write
atleast 3 points for each. -..
c) Write BASH shell commands for ex~cuting following statements:
• Make a directory test3
• Create 3 empty files called test3a, test3b, test3c
• Copy file test3a to test3
• Rename test3a to temp2
" Roll No .
TCS-672
B. TECH. (CSE) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
MACHINE lEARNING-2
Time: 1 : 30 Hours
Maximum Marks: 50
Note :(i) This question paper contains two
Sections.
.<-..
(ii) Both sections are compulsory.
Section-s-A
1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) In case ofSVMs if the number of features
is much greater than the number of
samples, the method is like to give .
(superior/moderate/poor) performances.
(b) "Mapping to a Higher Dimensional Space
can be highly compute-intensive."
(TruelFalse)
(c) The maximum number of Principal
Components allowed by skleam if you
have a dataset with 100 training points and
4 features for each point is .
(4/25/100/400).
F. No.: 0-5 P. T. O.
, . /I
.
,
(2) TCS-672 (3) TCS-:672
(d) Once you have establishedit is a problem (e) Suppose you are using RBF kernel in
requiring a non-linear model and in SVM with high Gamma value. What does
absence of expert knowledge the ..... this signify ?
(Sigmoid/GaussainIRBF) kernel makes a (t) Consider applying a soft margin SVM to
good default kernel. the l-dimensional data shown below.
(e) "For very tiny values of C, you should get What will be the support vectors for c = 0
and c = 00 respectively ?
misclassified 'examples, often even if your
training data is linearly separable."
,,
..
(TruelFalse)
Xl Xl Xl X4 x, x,
2. Attempt anyfive parts : (3 x 5=15 Marks)
(Define/ShortNumericaVShortProgramminglDraw) ~ Fig. 1
(a) What makes facial recognition in pictures Section-B
good for PCA ? 3. Attempt any two parts of choice from (a), (b)
(b) Why does the kernel trick allow us to and (c). (5x2=10 Marks)
solve SVMs with high dimensional feature (a) Mention briefly the steps involved in PCA
spaces, without significantly increasing the staring with the data matrix X that is n*p
running time ? where n is the number of data points and p
is the number of dimensions. Include steps
(c) Mention a reasonable way to select the to show the reduction in dimensions for p
number of principal components k (Recall to k where k is the reduced dimension for
that n is the dimensionality of the input the data point. {k < p}.
data and m is the number of input
. (b) In the following diagram with two classes
examples).
(crosses and circles) with exactly one
(d) What do you understand by Delayed outlier and given that you want to ignore
Reward in MDP ? the outlier SVM which separator line
F. No. : 0-5 F. No. :a-5 P. T. o.
(4) TCS-672 (5 ) TCS-672
between A, Band C will you pick ? (ii) Reducing dimensions to make the
Explain your choice. supervised algorithm runs faster
(iii) To get more features to feed into a
learning algorithm
B (iv) As a replacement for linear
c regression.
) (c) Suppose we are using a linear SVM (i. e.,
no kernel), with some large C value, and
are given the following data set. (i) Draw
the decision boundary of linear SVM.
Give a brief explanation. (ii) Circle the
o a points such that removing that example
from the training set and retraining SVM,
we would get a different decision
Fig. 2 boundary than training on the full sample.
(c) In support vector machines (SVM) how You do not need to provide a formal proof,
can we adjust the parameter C ? Why is but give a one or two sentence
this parameter used? explanation.
4. Attempt any two parts of choice from (a), (b)
and fc). (5x2=10 Marks)
(a) What do you understand
r
Transformation, ?.
by Features
2 3 4
(i) Compressing data to take less Xl
memory/space Fig. 3
F. No.: a-S F. No.: a-S P. T.O.
(6 ) TC~72
~
~ °~ '"
~
1 s~ ~ , ~
'b
~ (
~ 0: ( )
R
_1~'bo
\" ./
!c
°~ ~ °
00 00
-2
00 00
00 00
00 00
-3'
-3
,
-2
00
,0
-1
° a Q 9 I!l9 Q
0
0 00,
1
00
,
2
•
3
X1
Fig. 4
(c) Discuss relative advantages and
disadvantages of SVM.
TC~72 200
F. No. :0-5
II
Roll No .
TIT-607
B. TECH. (IT) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
SOFTWARE VERIFICATION, VALIDATION
AND TESTING
Time : 1 : 30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two
Sections.
(ii) Both Sections are compulsory.
Section-A '"
1
II
~
2. Attempt any five parts: (3x5=15 Marks) 4. Attempt any two parts of choice from (a), (b)
(a) Differentiate between error, bug, fault and \: and (c). (5x2=lO Marks)
failure. (a) Explain the different stages of Software
(b) "Testing is the process of executing a Testing Life Cycle (STLC).
'. "-
program with the intent of finding errors."
Comment on the statement.
(b) Discuss Verification activities in SDLC.
TIT--605
• B. TECH. (CSIIT) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
JAVA PROGRAMMING
Time : 1 : 30 Hours
Maximum Marks: 50
Note: (i) This -question paper contains two
Sections.
"'-
(ii) Both Sections are compulsory.
Section-A
1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) Super class of all the classes is .
class.
)
(b) Multiple inheritance is possible using <
F. No. :a-10 P. T. O.
/I
"
(2) TIT-605 • , (3) TIT-605
,
2. Attempt any'five parts: (3x15=15 Marks) w
4. Attempt any two parts of choice from (a), (b)
c ,
.,
(a) Why we use constructor? Write difference and (c). ' (5x2=10 Marks)
between method and constructor. (a) List out any six features ofjava language.
(b) WAP to find gcd and lcm of two inputted (b) Write a 'java progtam for' the following :
numbers from user. Defme a class called "MyRectangle" with I
1
1
(c) What are usages of final keyword? instance variables called "length" and
./ }
(d) What are different ways to compare two "width" and methods setData( ) and
-' strings? . rectArea(). SetData( ) method inputs two ,
(e) WAP to show the usage for-each 10Qp. argument values from user for setting \
length and width of the rectangle. \
(f) WAP to show the usage of super keyword.
rectArea( ) calculates area of rectangle and
Section-B ilf:L;
returns it.
3. Attempt any two parts of choice from (a), (b) (c) What do understand· by the term
and (c). (5x2=lO Marks) overloading and overridding ?
(a) WAP to count how many objects are Demonstrate by an example.
created of a class.
5. Attempt any two parts of choice from (a), (b)
(b) What is difference between String and
) and
.
(c). (5x2=10 Marks)
.
. String Buffer class.
(a) With reverence to data type, what is
(c) WAP to take input-from user and print the
widening and narrowing? Give example.
variable length array:
(b) Write a. java program to covert
1234
temperature in Celsius to temperature in
456789 Fahrenheit and vice versa. Use inheritance
4568 to define a base class containing abstract
{ .'
TIT-605 65!)
'"
.r... ••. rf"
,.