0% found this document useful (0 votes)
22 views

5th sem paper

Paper

Uploaded by

Gurdeep Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
22 views

5th sem paper

Paper

Uploaded by

Gurdeep Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
V-B.Tech, CSE ESE- 02-2022-CUK Code: BTCS 501, Title: Computer Architecture Marks: 60 Time (Hrs) : 02% Note: Do any four questions. All questions carry equal marks QU) A) Why is it necessary to store the retum auldess before shifting control of execution from main rogram to subroutine? What are different options which ean be used to store the return address? 'B) The content ofthe top of a memory stack is 2343,The content ofthe sack pointer SP is 1001. A call subroutine instruction is located in memory at address 1120 with address field of 3042, Assuming that the return address is stored on top of the slack and stack grows with decrease in address .What are the contents of PC, SP, and top of the stack, Before the call instruction is fetched, After the call instruction is executed, After the return from subroutine? (5 +10 =15 Marks] 2B Draw the flow chart and explain the instruction cycle of a hypothetical computer with the help of 'mierooperations for each timing signal [15 Marks] 93) Explain the concept of pipelining. Draw the space time diagram of five stage pipeline and show that the speedup of a K stage pipelined computer to the non pipelined computer is equal to K. [15 Marks] Q4)A) What are various addressing modes. Explain each with the help of an example, 8) A relative mode branch instruction is stored in memory at address (620)io. The branch is made to location (530). The address fel address field in the instruction? in the instruction is 10 bits long. What is the binary value of [1O+S= 15 Marks} .05) Explain with the help of diagram, the prine ile of Daisy chaining priority scheme. Draw another diagram to explain one stage of the daisy-chain priority arrangement, {15 Marks} Q5}-A) Design Parallel Priority Interrupt hardware fora system with four interrupt sources and explain how. 7 it works? By What i the difference between Isolated UO and memory mapped 10? [10+S= 15 Marks) QD) A Set Associative Cache memory consists of 128 blocks divided into four block sets, The main memory consists of 16384 blocks and each block contains 256 eight bit words ‘A) How many bits are required for addressing the main memory’? 'B) How many bits are needed to represent the tag, set and word fields? (15 Marks) (Q8) Consider a machine with » byte addressable main memory of 2" bytes and block size of 8 bytes, ‘Assume that a direct mapping cache consisting of 32 lines is used with this machine. ‘A) How isthe 16 bit memory address divided into tag, Line number and word No B) Imo what line would bytes with each of the following addresses be stored. = 0001 0004 1001 1011 = 1100 0011 0010 0100 ©) How many total bytes of memory ean be stored in the cache? [5+5+5=15 Marks} Scanned with CamScanner V-B.Tech CSE ESE-022022-cuk Code: BTCS-S03 Max. Marks: 60 System Analysis & Design Time: 02% Hours Note: Students are required to attempt Four questions. All questions carry equal mz: (a) What is SDLC? Explain various phases of SDLC. (b) Explain the role of system analyst in y phase of system development proc Develop a context diagram and level 0 DED for the system made up of the following: Company X is a mail-order company that distributes CDs, DVDs of soft discount prices to club members. + When an order processing clerk.receives an order form, he or sh sender is a club membet,by checking the member file. If the sender is not a member, the clerk returns the order along with membership application form. fies that the Ifa customer is @ member, the clerk verifies the order item data by checking the item file. — * Then the clerk enters the order data and saves it to the Daily Order file. The clerk also Prints an invoice and shipping list for each order, which are forwarded to Order Fulfillment Department. Q3: - (a) How do coupling and cohesion measure the strengin of Module Desizn? (b) Explain File design and data base design in project development. (Q4: ~(a) Discuss the various levels of Quality Assurance. In what way is it different from Quality Control? (©) Define System Testing and explain its types. Also discuss the contents of atest case’? (QS: - (a) What is software maintenance? Describe various categories of maintenance. Which category consumes maximum effort and why? (b) Explain the issues to be considered in testin, and main ss ie ‘management. 8 tenance phases for project (a) Explain the role of functional independence, couplings sony modular design, ©, coupling and cohesion with respect to (0) Discuss various design issues to be considered while designing system Page 1 of 2 Scanned with CamScanner V-B.Tech CSE ESE-02-2022-CUK Code: BTCS-502 Loader ‘Title: Database Management Svstems Hime: 244 Hours Note: Candidates are required to attempt Four questions, All questions carry equal marks Qi. (@) What is three Tier architecture? What are its advantages over two tier architecture, Explain any three Codd’s rules. - ; (&) Explain various anomalies in relational database. List and explain any four adh of RDBMS over file processing system. a (8 + 7)Marks Q2. (a) Define entity integrity constraint and complex attribute, Explain various components of ER Model with suitable example. (b) Derive the expression for the possible number of candidate keys in the Following relation. R(AI,A2,3,A4,...An) where A1 acts as primary key. @ (@) Define referential integrity constraint. Explain, how integrity and consistency of data between two relations is maintained, (b) Explain lossless join decomposition with suitable example, State the use of Projection ‘operation in Relational Algebra with example. (10+ 5)Marks (7+ 8)Marks 4. (@) Explain the use of functional dependency in database design. What is the number of candidate keys in R(ABCDE) if AB acts primary key? (b) Explain BCNF. Normalize R(ABCDEFGHU) into BCNF based on the following functional dependencies: FD:{AB>C, ADE, BF, FIGH, D1) @s (649) Marks (a) What is neet'SFTocks in DBMS? Explain shaf€and exclusive Tock mechanisms. (b) What istransaction? Explain ACID propsdies®T transaction. (8 + 7)Marks es. (a) Explai conflict seriflizability with suitable example. What cathe necessary conditions that make two operations conflict itions? + an (9+ 6)Marks (a) Explain various architectuses-offollel databases () What is 2Bhas€"Locking protocol? Also discuss how it jsastd to handle concurrent execution of transactions, a (7+ 8)Marks (a) What ig gedilock? Explain various featurgs gSm66ile databases. () Explain diny read problesf with suitable example i (8 + 7)Marks Scanned with CamScanner V-B. Tech CSE ESE-022022-CUK Code: BTCS-S04 tle Java Programming Note: Candidates are required to attempt Four questions. All questions carry equel marks. Ql. a, Howiasai erent rom CH a ; '), Write a program on swapping of swe fumbers without using third variable? . (7.5+4,7.5=15 marks) QQ. a). Whataredifleretypes of ays in ava? Write aprogram to creqteasraffay of'S integers?” 1), What are different iteratinestements in java? Write a program on one of the iteration statement which will print first fivg¥en numbers? (7.547. 5=15 marks) QB. «), What are different types-ofGonstuctors in Java? Waite a progyge6n constructor Overloading? 1) Whatis Meade fing ow the concept with the bso a program. (15+75=15 marks) Q4. 2), How exception sarfally thrown in java, explain the concept with te help of 2 ‘Program? b). Difference berweepat@ract clases pad interfacesiffava? How multiple intttance is achieved in java, explain the with the Belp of program. (75+75=15 marks) ferent from Method Sverloading? Explain QS. @). What are mutable strings? Explain any seven operations on strings with the help of a program? »). How thread i created in java? Explain the concept with te help ofa program. (75+75=15 marks) Q6. What are Applets in java? How Applets are created? Explain applet lifecycle withthe help 2 program? (15 marks) QU. _s)Explain AWT hierarchy in java? Write a program on how to create Frames in java? '), What are labels in java? Write a program on how to create labels in java? (10+5=15 marks) Q8. a). What are /O Streams in java? Explain Byte, character and Data Streams? ’). Explain TCPAP Server Sockets in Java? (SH0=15 marks) (15x 4= 60) Marks Scanned with CamScanner Code: BTCS ~ 501 Max Marks: 1 Title: Computer Architecture Vime: 1:30 Nove: Aueimpt any Two questions Qn “AY With the help of a diagram: explain how hardwired comteol unit works (269 Marks) 8) A computer uses a memory of 65536 words with eight bits in each word. It has following registers: PC, AR, TR (16 bits each), and AC, DR, IR (eight bits each). A memory reference instruction consists of thle words an 8 bit operation code (one word) and 16 bit aldress(next two words). All operands are eight bits. There is no field for addressing mode. List the sequence of micto-operations for fetching # memory reference instruct the operand in DRE start fron ting signal To Bowes) ; Q n and then pl>cing (92) A) Register A holds the 8 bit binary 11011002. Determine the B operand and the logic micro-aperstions to be perlermed in order to change the value in Ao: Honori01 w) 111101 (2.6 Marks) ait CAI AQF OC2 18) The Contents of memory at address GfEs EBRF. The contents of memory at address BSF is OD53. The content of memory at address DS3 is FFFF. Cvaluate and show the contents in hexadecimal of registers PC, AR, DR and IR of the "asic Computer" when an 1SZ instruction is fetched and “ “al contents ol PC is UFF. Give the answer in a table with five columns, one for executed. the nach ropister and a row for eact lining signal 18 Marks) 'A) Explain Instruction cycle with the help of a flow chart and micro-ope ations associated with each phase ot the struction cycle VF 6G Marks) 18) The contents of PC in the "basic computer" is 3BE_ The content of AC ig 72E1. The contents of memory are as follows ia 193 Address Contents aor.p) ¢ 32> 326 O3AC BAC Guu i What is the instruction that will be fetched and executed next and give the contents of registers PC, AR, DR, AC and IR in hexadecimal and the values of &, and sequence counter in binary al the end of instruction (4 Marks Scanned with CamScanner Central University ef Kashmir Department {nformation Technology CIA, B-Tech CSE 5"" Sem -2021 December Duration: hour Course Code: BTCS 503 Maximum Marks:10 system Analysis and Design Roll No: Attempt any five Questions Q1) Enlist the steps for building the Information System? (2) Q2) Define traditional System Development Life Cycle? (Q) Q3) What is Technically Feasibility define Briefly? (2) Q4) Draw the working diagram of prototyping process? @ Q5) Why is it important to understand the customer’s problem before creating a software solution? @) Q6) Enlist Eight Principles, that software Engineer shall adhere for making the analysis, specifications, design, development, testing and maintenance of software a beneficial and respected profession. @) Scanned with CamScanner CENTRAL UNIV ERSITY OF KASHMIR Department of information Technology Continuou: Internal Assessment Semester: 5" Maximum Marks: 10 Course Code: BTCS 504 Attempy all questions - GM: Q.2. Write a prograni which will demonstr: te the conce| pt of lo and global variables in java. (2 Marks) Q.3. What will be oucput of following cade snippet: 234.05 float (= H+; €ystem.out.printin(s (1 Marky 2 Marks) (1 Mark) 1 of Wo umber using third QS. What docs Strongly typed I Hage mn | Q-6. What will be the output of the followin code on snippet: s Test Public statie void in(string ary |) { system.outPr rk) n(rjavays }} (LN Scanned with CamScanner

You might also like