0% found this document useful (0 votes)
22 views29 pages

6th Sem Mid B.tech. CS, It

Uploaded by

reshu111202
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views29 pages

6th Sem Mid B.tech. CS, It

Uploaded by

reshu111202
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

,,

Roll No .

TCS-.601
B. TECH. {CS/IT)
(SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
COMPILER DESIGN
Time: 1:30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two ~
, Sections.
(ii) Both Sections are compulsory.
jJ

I
Section-A
. \
1. True-False: (lx5=5 Marks)
(a) . One benefit of Intermediate Code
Generation is Retargeting.
r.
(b) Number of states in SLR and CLR are
always equal.
(c) Optimization phase in compiler IS
optional.
(d) A viable prefix of a right sentential form is
that prefix that contains a handle but no .
symbol to the left of the handle.
F. No. :a-2 P. T.O.

II
TCS-601 (3) TCS-601
(2)

(e) If the attribute value of a node in parse tree Section-B


is determined by the values at child nodes, 3. At~mpt any two parts of choice from (a), (b)
then this attribute is called as inherited and (c). (5x2=10 Marks)
attribute. (a) What is Transator ? Discuss the role of
2. Attempt anyfive parts: (3x5=15 Marks) various phases of compiler in translation
(a) Find the canonical collection of LR(O) of source code to target code.
(b) What are the different types of parsing ?
items for the following grammar :
Explain the shift-reduce parsing. Write the
S ~ AaAb IBbBa different operations that are performed in
A~E shift-reduce parsing. Show the uses of
B~E these operations on the following
I
.grammar. (Assume the input string is id +
(b) Differentiate Compiler and Interpreter. j~ h id - id) :
(c) Find the FIRST and FOl!,LOW function E ~ E+E'I E-E 1 id
for the following grammar: (c) Construct the LR(I) parsing table for the
E~E+TIT following grammar:
T~T*F IF S~CC
F~(E) 1 id C ~ cc l d
(d) Describe the various tasks performed by 4. Attempt any two parts of choice from (a), (b)
and (c). (5x2=10 Marks)
semantic analyzer.
(a) Define Handle, Handle Pruning and
(e) Write the design objectives of code
Viable prefix. Explain the importance of
optimization phase. , Handle and Viable prefix in Bottom up
(f) Describe the different types of Parsing.
attributes used in SDTS/SDDS·. with (b) Explain the different issues that are
examples. considered in selecting the intermediate
F. No. :0-2 P. T. o.
F. No. :a-2
(4) TCS-601

codes. Discuss the different types of


Intermediate Codes. Explain the different
factors that decide the number of passes in
compiler.
(c) Construct the LL(1) parsing table-for the
. following grammar:
S ~ aAClbB
A~eD
D ~ bEl E
E ~ eDldD
B ~ fig
C ~ hlI
~
5. Attempt any two parts of choice from (a), (b)
and (c). (5x2=10 Marks)
(a) What do you mean by Input Buffering '1
Explain the different techniques of input
buffering applied in compiler ?
(b) Write the algorithm for finding the
canonical of LR(O) items. Define the
closured) and goto(l, x) functions.
, (c) Construct the Predictive parsing table for
the following grammar:
A ~ iEtSS'1 a
S'~eS IE
E~b
TCS-60i •• 650
F. No. :a-2

/I
Roll No .

TCS-602
B. TECH. (CSE) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
I )
SOFlWARE ENGINEERING
Time : 1 : 30 Hours
Maximum Marks: 50
Note :(i) This question paper contains two
Sections.
(ii) Both Sections are compulsory. "'-
',.
Section-A
,1 1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) "Consider a system where, a heat sensor
detects an intrusion and alerts the security
company." What kind of a requirement the
system is providing either functional or
non-functional ? (True/False)
)'
(b), Process adopted for one project is same as
the process adopted from another project.
(TruelFalse)
(c) is a measure/study to 'assess how
practical and beneficial the software
project development will be for an
organization.
F. No, " a-10 P. T. o.
, ,
IA

(2) <, TCS-602 • r
(3) ,TCS-602
(d) mainly depends on data flow "4.' Attempt any two parts of choice from (a), (b)
diagrams and Data Dictionary.
""'"
.•.
and (c).' (5x2=10 Marks)
(e) is also known as functional testing.
(a) What is software testing ? Discuss its
2. Attempt anyfive parts : (3x15=15 Marks) types.
(a) What is Software Crisis ? Discuss the
(b) Give the outline structure of SRS. List out
problems and their causes.
the important characteristics of a good
(b) Differentiate between user and system :/
SRS. "
requirements.
(c) What is a data dictionary? Explain. (c) Discuss Agile Manifesto and principles.
(d) Explain Pair Programming and its benefits Explain the process of serum used for
(e) What is feasibility study and give its types. project management.
.•.
(f) What is Requirement Elicitation? Discuss 5. Attempt any two parts of choice from (a), (b)
important techniques for it.
I,
and (c). (5x2=10 Marks)
Section-B
(a) What is Requirement Engineering
3. Attempt any two parts of choice from (a), (b) Process? Elaborate.
and (c). (5x2=10 Marks)
(b) 'Classify 'the following as functional/non-
(a) Discuss Iterative software development
functional requirements for an Online
model with its merits and demerits.
Ticket Booking:
(b) What is Rational Unified Process (RUP) ?
Discuss the workflows. (i). System should only allow users to
(c) Differentiate between (any two) : move to payment only when
(i) Functional and Non-functional man~toty fields such as date, time,
requirements. location has been mentioned.
(ii) Decision Tree and Decision Table (ii) Use of captcha and encryption to
(iii) Program and Software. avoid bots from booking tickets.
F. No. :a-/O F. No. :a-/O P. T.O.
(4) TCS-602

(iii) Booking confirmation should be sent


to user to the specified contact details.
(iv) User should be helped appropriately
to fill in the mandatory fields, in case
'. of invalid input. '
(c) What is the purpose of Data Flow
Diagrams ? Explain by constructing a )
context flow diagram level-O DFD and
Level-l DFD for a Student Management
System.

~
r

)
/.'

TCS-602 600 A

F. No.: 0-10

II
Roll No .

TCS-604
,
B. TECH. (CS/IT) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
COMPUTER NETWORK-I
Time : 1 : 30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two'
sz:
Sections.
(ii) Both Sections are compulsory.
Section-A
1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) Physical addressing is a function of the
____ layer.
(b) We need reliable transport service at the
transport layer if data link transport on all
the links in the route is reliable.
(TruelFalse)
(c) One fundamental difference between
HTTP and FTP is ---
(d) Suppose a web server has 1000 outgoing
TCP connections. The number of server
side sockets used are --:-----
F. No. : a-IO P. T. o. ,.
;.

(2) TCS-604 '1, (3) TCS-604


(e) You c~nfigure your browser to open . (f) List five non-proprietary Internet
multiple simultaneous connections to a " applications and the application-layer
website? (TruelFalse) protocols that they use:
2. Attempt anyfive parts: (3x 15=15 Marks) Sectton-« B

(a) Two hosts are directly connected with 3. Attempt any two parts of choice from (a), (b)
each other by a 2 Mbps link. How does it and (c). ;' (5x2=10 Marks)
.take to send a 1.5 MB file? .
.. /
(a) When transferring-a file between two PCs,
I (at least) two acknowledgement strategies
, (b) What are headers and trailers and how do
are possible. First; the file is chopped up
they get added and removed? Explain.
into packets, which are .individually
(c) Why will two ISPs at the same level of the .. ';" acknowledged by the receiver, but the file
hierarchy often peer with each other ? transfer as a whole is not acknowledged.
How does an IXP earn money? Second, the packets are not acknowledged
individually, but the entire file is
.(d) What is the difference between network acknowledged when it arrives. What is
architecture and application architecture? your view regarding these two strategies ?
(e) Suppose Alice and Bob are sending Which one is best? Can we have any other
packets to each other over a computer alternative strategy ?
network. Suppose Trudy positions herself (b) Suppose two hosts, A and B, are separated
in the network so that she can capture all by 20000 kilometers and are connected by
the packets sent by Alice and send a direct link of R = 2 Mbps. Suppose the
whatever she wants to Bob; she can also propagation speed over the link is 2.5 x
capture all the packets sent by Bob and 108 metres/sec. Suppose now the file is
send whatever she wants to Alice. List broken up into 20 packets with each
three malicious things Trudy can do from packet containing 40000 bits. Suppose that
this position. each packet is acknowledged by , the
F. No. : a-10 F. No. :a-IO P. T.O.
;,

(5) TCS-604
(4) TCS-604
"'.
(b) Consider an application that transmits data
.•.
receiver and the transmission time of an at a- steady rate (for example, the sender
acknowledgment packet is negligible. generates an N-bit unit of data every k
Finally, assume that the sender cannot time units, where, k is small and fixed).
send a packet until the preceding one is Also, when such an application starts, it
I

acknowledged. How long does it take to will continue running for a relatively long
send the file? ) period of time.: Answer the following
'/
(c) A packet switch receives a packet and questions, briefly justifying your answer:
determines the outbound link to which the (i) Would a packet-switched network or
packet should be forwarded. When the a circuit-switched network be more
packet arrives,-one other packet is halfway appropriate for this application ?
done being transmitted on this outbound Why?
~
link and four other packets are waiting to (ii) Suppose that a packet-switched
be transmitted. Packets are transmitted in network is used and the only traffic in
order of arrival. Suppose all packets are this network comes from such
1500 bytes and the link rate is 2 Mbps.
applications as described above.
What is the queuing delay for the packet ?
Furthermore, assume that the sum of
More generally, what is the queuing delay
the application data rates is less than
when all packets have length L, the
the capacities of each and every link.
transmission rate is R, x bits of the
) Is some form of congestion control
currently-being-transmitted packet have
needed? Why ?
been transmitted, and n packets are already
(c) Match the following to one or more layers
in the queue? .
of the OS! model :
4. Attempt any two 'parts of choice from (a), (b) (i) Format and code conversion services.
and (c). (5x2=10 Marks) (ii) Establishes, manages, and terminates
(a) Explain Packet switching approaches sessions.
using examples. .•.
F. No.: 0-/0 P. T. O.

F. No. :0-/0
(6 ) TCS-604

(iii) Ensures reliable transmission of data.


(iv) Log-in and log-out procedures.
(v) Provides independence from
differences in data representation .
.
5. Attempt any two parts of choice from (a), (b)
'. and (c). (5x2=10 Marks)
(a) Translation, encryption and compression
are some of the duties of the presentation
layer in the OSI model. Which layer do
you think is responsible for these duties in
the Internet model ? Explain your answer.
Which layer is responsible for Dialog
control and synchronization in OSI model
and Internet Model? "'-

(b) What is meant by a handshaking


protocol? What is the difference between
non-persistent HTTP connection and
persistent HTTP connection?
(c) We need a three-stage space-division
.;: switch with N> 100. We use 10 crossbars
at the first and iliird stages and 4 crossbars
at the middle stage :
(i) Draw the configuration diagram.
(ii) Calculate 'the total number of cross-
points.
TCS-604 650 ...
'"
F. No, : 0-/0

'If "
,.
....

Roll No .

"
TCS-693/,
B. TECH. (CS/IT) (SIXTH SEMESTER)
• MID SEMESTER EXAMINATION, 2018
FULL STACK WEB DEVELOPMENT
Time: 1:30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two
Sections.
(ii) Both Sections are compulsory.
"'-
Section-A
1. Fill in the blanks/True-False: (1 x5=5 Marks)
(a) In HTML tag is used for horizontal
raw.
t'
(b) The TITLE tag can be placed anywhere in
) the HTML document. (TruelFalse)
(c) Tables are used to control the layout of
different visual elements. (TruelFalse)
(d) HTML tags tell a Web browser how to
render a Web page. (TruelFalse)
(e) Tags are used in pairs. (TruelFalse)

F, No. :0-2 P. T. o.
,

,.
TCS-69.3 (3) TCS-693·
(2)

2. Attempt anyfive parts : (3x5=15 Marks) (c) Design a HTML form :


"?

(Define/Short Numerical/Short Programming/ Fill the form, required field marked*

Draw) .-Contact information • I


Name * T--- -, I
(a) Write the structure ofHTML program. Telephone I · I~
(b) Write the neat block diagram, explain the F.mail * I . I
r- Personal information
CSS Box Model.
Age * I' : J
(c) What are the various styles in CSS ? Gender I~~. ·1
'(d) Write the difference between POST and \
GET methods.
List personal qualiIies I J
(e) What do you mean meta tags ? Shaw their .'"
[Cho''''~'"'"
II CSS 51 B.TML
I
- II JavaScript iI;lI PEP
meaning and use with example.
(f) Describe the function object in JavaScript Submit information.
with an example 4. Attempt any two parts of choice from (a), (b)
Section-B and (c), (5x2=10 Marks)
3. Attempt any two parts of choice from (a), (b) (a) Write a JavaScript code to test whether the
and (c). (5x2=10 Marks) ) given number is Armstrong number or not.
(a) Write and explain any five HTML form (b) Explain the following HTML tags with
elements that are required for obtaining their important attributes :
user details for a typical online user (i) < form >
registration process. (ii) < frameset >
(b) Write HTML 5 form elements and its (iii) < select>
attributes with suitable example.
(iv) < datalist >
F. No.: a-Z P.T.O.
F. No. : a-2
(4 ) TC8-693

(c) Write the code in HTML for the following


Table:
"
inn.dwtNo. Ques60D ~ Marla per ADswer ItTOtal Marlo'sl
~ L. Z'" 'r' __ ". J
1 Namclfne ~ haR.OM ~ .. S
p .. ,-~ -

~ Hefe ua siIIgIeDwer rnue -. 5 II

5. Attempt any two parts of choice from (a), (b)


and (c). (5x2=lO Marks)
(a) Write the code in HTML frame:
Page 3 *-

Page 1 Page 4
Page 5
Page 2
(b) Write an external cascading style sheet to
define the font, font colour, background
and foreground colours. Also use the CSS
to design a web page with tables. , )
(c) Explain CSS and its types with example.
Write about selectors in cascading style
sheet.

TCS-693 650

F.No. :a-2

/I
Roll No .

TCS-671
..
"
B. TECH. (CSE/IT)
') (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
BIG DATA STORAGE AND PROCESSING
Time: 1 : 30 Hours
Maximum Marks: 50
Note :(i) This - question paper contains two
Sections.
(ii) Both Sections are compulsory.
Section-A
1. Write True-False: (lx5=5 Marks)
(a) Visualizing Big Data presents no special
challenges.
(b) Hadoop Distributed File system was
invented by Google.
) . (c) Research can describe a Big Data
application that has a proven return on
investment (ROI) for an organization.
(d) The more data is available the most
successful with be the business
application.
(e) Google invented Big Data architecture
with search Query engine.
F. No.: a-/3 P. T. o.

~
II
t

(2) TCS-671 (3)

2. Attempt anyfive parts: (3 x 5 = 15 Marks) 4. Attempt any two parts of choice from (a), (b)
(Define/ShortNumerical/ShortProgramming!Draw) " 'and (c). (5x2=10 Marks)

(a) What kind of analysis can be done on Big (a) What are the design goals for HDFS ?
I. data? (b) What are some of the hottest technologies
visible in Big data processing?
(b) How does a master node differ from the (c) Differentiate OLTP, OLAP and RTAP.
worker node?
5. Attempt any two parts of choice from (a), (b)
(c) What is Data Analytics ? and (c). (5x2=10 Marks)
(d) What is a data ingest system ? Why is it an (a) What is Data Warehouse? Explain the
different approaches of creating Data
important topic?
Warehouse.
(e) What is MapReduce ? What are its l
CO) Explain the difference between Entity.
benefits? relationship modelling and Dimensional
.. modelling?
(f) Define Data Mining.
(c) How does HDFS ensure security and
Section-B
integrity of data?
3. Attempt any two parts of choice from (a), (b)
and (c). (5x2=10 Marks)
(a) What are Google's contribution to Big
data processing
(b) What is Big Data? Describe the 4V model
of Big Data?
(c) Describe the Big Data processmg
architecture. TCS-671 100
I

F. No . .-a-/3 F. No . .'a-13
Roll No .

TCS-691
'. B. TECH. (CS/IT)
(SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
IMAGE PROCESSING AND
COMPUTER VISION
Time : 1 : 30 Hours
Maximum Marks: 50 ~
..
Note: (i) This question paper contains two
, Sections.
(ii) Both Sections are compulsory.
(iii) Write to the point answer, writing more
will not fetch more marks.
Section-A
)
1. Fill in the blanks/ True-False: (lx5=5 Marks)
(a) Image is imported in form of matrix in
7'
MATLAB in which each cell is a pixel.
(TruelFalse)
(b) is the smallest unit of an image.
(c) A colour image can have dimensions.
F. No. :a-13 P. T.O.

/A
(2) TCS-691 (3) TCS-691

(d) 1 function in MATLAB can tell you (b) Write a MATLAB program that reads an
the number of dimensions of a matrix. image 'test.jpg' and apply a 3 x 3 mask to
(e) A pixel can have either or . remove the salt and pepper error.
value in case of black and white image. (c) Write the difference between image
2. Attempt anyfive parts. (3x15=15 Marks) restoration and image enhancement.
-L

(Write in 50-80 words) Attempt any two parts of choice from (a), (b)
(a) What is a Digital Image? and (c). (5x2=10 Marks)
(b) Write a MATLAB script to create an (a) Image subtraction is often used in
image which is invert of another image industrial applications for detecting
with name, 'nature.jpg". missing component in a product assembly.
(c) What is the Difference between the image The approach is to store a "golden" image
•• I •
formation in the photographic camera and corresponds to correct assembly; this
the human eye? image is then subtracted from incoming
(d) What is Weber's ratio? images of the 'same product. Ideally the
(e) Write a MATLAB code to change size of difference would be zero if the new
an image by a factor of 2 and 0.5 and then products are assembled correctly.
change the doubled and half image to . Difference images for products with
grayscale. missing components would be non zero in
(t) Write a MATLAB code to show different the area where they differ from the
planes of a colour image with name "golden" image. What condition do you
"someimage. png". think have to be met in practice for this
Section-B method to work?
3; Attempt any two parts of choice from (a), (b) (b) Show how a smoothening filter (mean
and (c). (5x2=10 Marks) filter or Gaussian filter) can be used to
(a) What are the fundamental steps of Digital sharp an image. Write the MATLAB code
. .
Image process mg. also.
F. No. : a-/3 F. No.: a-I] P. T: O.
{

( 4)

(c) What is normalization ? Explain with a


example.
5. Attempt any two parts of choice from (a), (b)
and (c). (Sx2=10 Marks)
'. (a) How is dilation different from erosion?
(b) Explain the following morphological \)
algorithms : \
(i) Thinning
(ii) Thickening
. (c) Explain about image sampling and
quantization.
"
"'-

TCS-691 650
F. No.: a-13

/A
Paper Code: TCS 651
ROIINO·U~

B. Tech (CSE (Cloud Computing»


Mid Semester Examination 2018
VI Semester, DEVOPS ON CLOUD
Time: 1:30 Hours MM: 50
Note:
(i) This question paper contains two sections.
"
(ii) Both sections are compulsory.----'-' ,
. .. Section-A l.- ... .. ._._... .
Q1. Fill in the blanks/ True-False

a) Services provided by cloud vendors such as AWS and GCP comes under _ service
model.
b) Is cloud computing distributed or parallel computing?
c) Is Python a compiled language?
d) Does Cloud Foundry comes under PAAS?
e) The IP of localhost server is __ . (There can be two answers, marks will be awarded to
both of them. Just name anyone).

Q2. Attempt any five questions.

a) What is the difference between distributed computing and parallel computing? Give
examples. -.
b) What is version control? Name a popular version control service.
c) What is the difference between IAAS and PAAS?
d) Explain a popular PAAS service.
e) What will be output of following code snippet?
• a=S
• print "hello", a
• c = a/O
• print III cloud"
f) Explain two popular IAAS services.

Section - B
Attempt any two parts from each of the following sections.

Q3.

a) Explain Git version control with a suitable diagram. What is the advantage of using Git
version control?
b) Write the commands for creating a repository on Github, downloading it on your local
machine, loading it back to Git server after some updates. (Be specific about the
commands).
c) Using Python - Define a function overlapping() that takes two lists and returns True if
they have at least one member in common, False otherwise. You may use your
is_member() function, or the in operator, but for the sake of the exercise, you should
(also) write it using two nested forloops.
U4.
a) What is Cloud Foundry service? Explain the steps for creating a website and deploying
on cloud foundry platform.
b) What is virtualization in cloud computing? Explain any two popular virtuallzatlon tools
available in the market.
c) In Python - Write a function translateO that will translate a text into "rovarspraket''
(Swedish for "robber's language"). That is, double every consonant and place an
occurrence of "0" in between. For example, translate{"this is fun") should return the
string "tothohisos isos fofunon".

us.
a) What is the role of hypervisor in virtualization? How do AWS, GCP and AZURE use
virtualization for providing their services to the people?
b) What are the pros and cons when creating cloud services such as IAAS and PAAS? Write
atleast 3 points for each. -..
c) Write BASH shell commands for ex~cuting following statements:
• Make a directory test3
• Create 3 empty files called test3a, test3b, test3c
• Copy file test3a to test3
• Rename test3a to temp2
" Roll No .

TCS-672
B. TECH. (CSE) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
MACHINE lEARNING-2
Time: 1 : 30 Hours
Maximum Marks: 50
Note :(i) This question paper contains two
Sections.
.<-..
(ii) Both sections are compulsory.
Section-s-A
1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) In case ofSVMs if the number of features
is much greater than the number of
samples, the method is like to give .
(superior/moderate/poor) performances.
(b) "Mapping to a Higher Dimensional Space
can be highly compute-intensive."
(TruelFalse)
(c) The maximum number of Principal
Components allowed by skleam if you
have a dataset with 100 training points and
4 features for each point is .
(4/25/100/400).
F. No.: 0-5 P. T. O.
, . /I
.
,
(2) TCS-672 (3) TCS-:672

(d) Once you have establishedit is a problem (e) Suppose you are using RBF kernel in
requiring a non-linear model and in SVM with high Gamma value. What does
absence of expert knowledge the ..... this signify ?
(Sigmoid/GaussainIRBF) kernel makes a (t) Consider applying a soft margin SVM to
good default kernel. the l-dimensional data shown below.
(e) "For very tiny values of C, you should get What will be the support vectors for c = 0
and c = 00 respectively ?
misclassified 'examples, often even if your
training data is linearly separable."
,,
..
(TruelFalse)
Xl Xl Xl X4 x, x,
2. Attempt anyfive parts : (3 x 5=15 Marks)
(Define/ShortNumericaVShortProgramminglDraw) ~ Fig. 1
(a) What makes facial recognition in pictures Section-B
good for PCA ? 3. Attempt any two parts of choice from (a), (b)
(b) Why does the kernel trick allow us to and (c). (5x2=10 Marks)
solve SVMs with high dimensional feature (a) Mention briefly the steps involved in PCA
spaces, without significantly increasing the staring with the data matrix X that is n*p
running time ? where n is the number of data points and p
is the number of dimensions. Include steps
(c) Mention a reasonable way to select the to show the reduction in dimensions for p
number of principal components k (Recall to k where k is the reduced dimension for
that n is the dimensionality of the input the data point. {k < p}.
data and m is the number of input
. (b) In the following diagram with two classes
examples).
(crosses and circles) with exactly one
(d) What do you understand by Delayed outlier and given that you want to ignore
Reward in MDP ? the outlier SVM which separator line
F. No. : 0-5 F. No. :a-5 P. T. o.
(4) TCS-672 (5 ) TCS-672

between A, Band C will you pick ? (ii) Reducing dimensions to make the
Explain your choice. supervised algorithm runs faster
(iii) To get more features to feed into a
learning algorithm
B (iv) As a replacement for linear
c regression.
) (c) Suppose we are using a linear SVM (i. e.,
no kernel), with some large C value, and
are given the following data set. (i) Draw
the decision boundary of linear SVM.
Give a brief explanation. (ii) Circle the
o a points such that removing that example
from the training set and retraining SVM,
we would get a different decision
Fig. 2 boundary than training on the full sample.
(c) In support vector machines (SVM) how You do not need to provide a formal proof,
can we adjust the parameter C ? Why is but give a one or two sentence
this parameter used? explanation.
4. Attempt any two parts of choice from (a), (b)
and fc). (5x2=10 Marks)
(a) What do you understand
r

Transformation, ?.
by Features

(b) Four different applications are mentioned.


J +
+ +
Discuss where you will use PCA and
where you, will nor use PCA. Give one-
+
two line explanations: I I I

2 3 4
(i) Compressing data to take less Xl

memory/space Fig. 3
F. No.: a-S F. No.: a-S P. T.O.
(6 ) TC~72

5. Attempt any two parts of choice from (a), (b)


and (c). (5x2=10 Marks)
(a) Differentiate between PCA and ICA.
(b) You are given the following plot, which
•• illustrates a dataset with two classes. Draw
the decision boundary when you train an
SVM classifier with linear, polynomial
(order 2) and RBF kernels respectively.
Classes have equal number of instances.
3. i '0 0 0 0 a ~ e 0 0 0 i , I
_ OCC 0000
00 00
0° 00
21- 00 00

~
~ °~ '"
~
1 s~ ~ , ~
'b
~ (

~ 0: ( )
R
_1~'bo
\" ./
!c
°~ ~ °
00 00
-2
00 00
00 00
00 00
-3'
-3
,
-2
00
,0
-1
° a Q 9 I!l9 Q
0
0 00,
1
00
,
2

3
X1

Fig. 4
(c) Discuss relative advantages and
disadvantages of SVM.
TC~72 200
F. No. :0-5

II
Roll No .

TIT-607
B. TECH. (IT) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
SOFTWARE VERIFICATION, VALIDATION
AND TESTING
Time : 1 : 30 Hours
Maximum Marks: 50
Note: (i) This question paper contains two
Sections.
(ii) Both Sections are compulsory.
Section-A '"

1. Fill in the blanks/ True-False: (1x5=5 Marks)


(a) Customer satisfaction and risk
management are goals of software
testing.
(b) Testing is a single-phase in SDLC.
(TruelFalse)
(c) The domain of possible inputs to the
software is too to test.
(d) means inability of a system or
component to perform a required function
according to its specification.
(e) is also known as functional testing.
F. No.: a-13 P. T. O.

1
II
~

(2) TIT-607 (3)

2. Attempt any five parts: (3x5=15 Marks) 4. Attempt any two parts of choice from (a), (b)
(a) Differentiate between error, bug, fault and \: and (c). (5x2=lO Marks)
failure. (a) Explain the different stages of Software
(b) "Testing is the process of executing a Testing Life Cycle (STLC).
'. "-
program with the intent of finding errors."
Comment on the statement.
(b) Discuss Verification activities in SDLC.

) (c) Which type of testing is possible with


(c) What are the factors for determining the Boundary Value Analysis (BVA) ? Give
limit of testing? an example.
(d) What is the need for validation ? 5. Attempt any two parts of choice from (a), (b)
(e) "V & V diagram is basis for every type of and (c). (5x2=10 Marks)
testing." Comment on this statement.
(a) Discuss Decision Table-based testing.
(f) What are the types of errors detected by t ,~.

(b) What is Path Testing ? Discuss the


white box testing?
guidelines and applications for Basic path
Section-B " r·~ testing.
3. Attempt any two parts of choice from (a), (b) (c) What is Mutation Testing ? How is it
and (c). (5x2=lO Marks) carried out?
(a) What are the evolutionary steps in
software testing? Discuss in detail.
(b) What are the short-term, long-term and
post-implementation goals of software
. ?
testmg.
(c) Differentiate between (any two) :
(i) Effective and Exhaustive testing
(ii) Verification and Validation
(iii) Static and Dynamic testing TIT-607 i
100

F. No. : 0-13 F. No. : 0-13


Roll No .

TIT--605
• B. TECH. (CSIIT) (SIXTH SEMESTER)
MID SEMESTER EXAMINATION, 2018
JAVA PROGRAMMING
Time : 1 : 30 Hours
Maximum Marks: 50
Note: (i) This -question paper contains two
Sections.
"'-
(ii) Both Sections are compulsory.
Section-A
1. Fill in the blanks/True-False: (lx5=5 Marks)
(a) Super class of all the classes is .
class.
)
(b) Multiple inheritance is possible using <

.(c) Static members will get memory at .


(d) Default value of Boolean type variable is '>'

(e) Scanner sc;


SC IS .

F. No. :a-10 P. T. O.

/I
"
(2) TIT-605 • , (3) TIT-605
,
2. Attempt any'five parts: (3x15=15 Marks) w
4. Attempt any two parts of choice from (a), (b)
c ,
.,
(a) Why we use constructor? Write difference and (c). ' (5x2=10 Marks)
between method and constructor. (a) List out any six features ofjava language.
(b) WAP to find gcd and lcm of two inputted (b) Write a 'java progtam for' the following :
numbers from user. Defme a class called "MyRectangle" with I
1
1
(c) What are usages of final keyword? instance variables called "length" and
./ }
(d) What are different ways to compare two "width" and methods setData( ) and
-' strings? . rectArea(). SetData( ) method inputs two ,

(e) WAP to show the usage for-each 10Qp. argument values from user for setting \
length and width of the rectangle. \
(f) WAP to show the usage of super keyword.
rectArea( ) calculates area of rectangle and
Section-B ilf:L;

returns it.
3. Attempt any two parts of choice from (a), (b) (c) What do understand· by the term
and (c). (5x2=lO Marks) overloading and overridding ?
(a) WAP to count how many objects are Demonstrate by an example.
created of a class.
5. Attempt any two parts of choice from (a), (b)
(b) What is difference between String and
) and
.
(c). (5x2=10 Marks)
.
. String Buffer class.
(a) With reverence to data type, what is
(c) WAP to take input-from user and print the
widening and narrowing? Give example.
variable length array:
(b) Write a. java program to covert
1234
temperature in Celsius to temperature in
456789 Fahrenheit and vice versa. Use inheritance
4568 to define a base class containing abstract

F. No. : a-10 F. No. : 0-10 P. T. O.


(4) TIT-605

method named convent). Define two


derived classes to override the convern)
method. One derived class will convert
Fahrenheit to Celsius and other will

'. perform vice versa,

(c) What is inheritance? Explain the types of


inheritance with block diagram,

{ .'

TIT-605 65!)
'"
.r... ••. rf"

,.

You might also like