-lvlts
c/P/R EXAMS t
2o1,s 300078
Computer Science/Application
( Technical Paper !
Time:3hours] IFullMarks:lo0
PART-I
{ Marks:2Al
Notes,. {i) Answer ail questions.
(iL) Each question carries J mark.
1. What is the purpose of the COCOMO model?
2. Identify the desirable characteristics for design of modular software in terms of cohesion
and coupiing.
3. Consider the following statements related to regression testing in software development:
P. Regression testing is used on failed test cases only.
O. Regression testing cannot be automated. J
R. Regression testing does not verify software defects.
IJJ
Which of the above statement(s) islare true? U'
4. Specify the TCP/UDP port nurnbers of the foliowing services :
r, SMTP
rl, HT:rPS
rr,, DNS
(luJ TELNtrT
5. In JAVA, which operator is used to free the memory of, an object when it is no longer
needed?
6. The preorder and inorder traversals of a binary tree are given below :
Pre-order : 5, B, 7, 6. 1,2,4,3
In-order : 7,8, 7,6,5,4,3,2
Find the correct post-order traversal.
7. What is the output of the following Q++ program?
#include <iostream>
using namespace std;
int main{)
{
autoi:A'+1i
cout << i <<endl;
)
c/P/R trXAM-2019/2 1 lP.T.o
SEAL
Ei'E
UHX
8. Consider the following sta,tements about HTML POST method :
P. POST method can be used to send data to a server to update a resource.
Q. Results obtained from POST method can tre bookmarked.
R. POST method limits the length of values to be sent.
Which of the above statement(s) is/are true?
9. Consider the following JavaScript program below
var text = ,{.,employees,,:[,+
'.["FName" : "T afla", "LNarne" "Taku"],'+
:
1["FName" : "I)a.s", "LName":"Anita"],'+
'{"FName" "Ritra", "LName" "Karpi"].]}',
: :
JSON.parse(text);
What does the program do?
10. A processor has a TLB (Translation Lookaside Buffer) that cal store 256 page table entries.
TLB is 4-way associative. If page size is 2KB and virtua-l addresses generated by the
processor are 32-bit wide, then find the minimum size of TLB tag.
11. What is the output of the following C program?
#include <stdio.h>
void increment (int i) { i = ; + 1; 1
int mainfi
i
int i = 10; printf("o/od",r);
increment(i) ; printf("okd",i) ;
increment(i+ 1 ) ; printf("Yod",1) ;
t
12. trxplain the purpose of the JAVA Server Socket acceptfi method and illustrate its usage
with a sample JAVA program.
L3. In a database, give two examples of data integrity constraints.
L4. Prove that the sum of a full-adder circuit with inputs A, B and C can be given by the
Boolean function A@ B@ C.
15. What does the term SSD stand for? FIow'is it used in modern comouters todav?
16. In a database, explain the purpose of trigger procedures with a suitable example.
L7" Define the term 'fbreign key'in a database and illustrate it with a suiLable exampie.
c/P/R EXAM-2O7912 o
L8. Consider the following C program
int mainfi {
printf("A\n");
if (forkfl ==0) {
printf{"B\n");
forkfl;
printf("C\n");
I
I
)
How many times are A, B and C printed?
19. Why is 1\4ongoDB called NoSQL database?
24. Differentiate between TCP and UDP in computer networks.
PART-II
(Marks: 8O)
Notes : (i) Answer all questions.
(iil Each question carries lO mark.
1. (a) Write the binary search algorithm in pseudocode or a programming language
of vour choice. Illustrate its behaviour using a suitable example . A t^
atz
(bl Derive the asymptotic time complexity of the binary search algorithm and express
it in big O notation. 4
2. Design a 4-krit synchronous binary UP counter using T flip-flops. trlaborate your
design by employing state trasition diagram ancl excitation table for T flip-flop.
Use K-map for circuit rninimization, if required. l0
3. {") Compare and contrast the OSI architecture and TCPIIP architecture of computer
networks. 4
(b) A block of IPv4 addresses is allocated to an organization. The adclress of one
host is 126.133.L72.34119. Find the-
(iJ network address;
(ii) broadcast address of the given subnet;
(ltzl number of hosts. 2+2+2
clP/REXAM-2O1e/2 3 lP.T.O
SEAL
4. The relational database schema of an employee database is given below :
Eh{PLOYEE(trmpID : integer, ErnpName: string, age: integer, Salary: real)
WORKS(EmpID :integer, DeptID: integer, since : date)
DEPARTMENT(DepIID: integer, DeptName : name, Budget: real, ManagerlD: integer)
(a) Write the SQL statements to create the above relations, taking care to specify
primary key and foreign key constraints. 6
[bJ Write the SQL staternent to add employee named 'Iana Tatung'. aged 35 and
drawing a salary of f27,000 per rnonth. 2
(c) Write the SQL statement to implement a pay hike of Boh to a1l employees u,ith
salaries below f2O,OO0" 2
5. Design a Weh page that uses I{TML form a take two input va1ues-user name and
password. It should aiso have a 'Login'button which will send the given values to
the serwer for verification. 'For yolrr password?'and 'Register'are other two optlons
provided by your Web page" Explain how CSS can be used for Web site design. B+2
6 Write a C++ or JAVA program that illustrates-
{a) pararnet erized constructor;
(b) copy constructor;
J (c) rnethod/function overloading;
IU /dj class variable:
U'
/e/ instance variable.
Illustrate the working of your program with suitable examples 2xS
7. (a) Consider an operating system that uses pa$ng for memory management. Assume
that there are 4 page frames which are initially empty. If the page reference
string is 5, 1,2, 3, 4,7.2, 1, 5, 3, 2,4, 6, compute the number of page faults
using-"
(i) LRU;
{i4 optirnai replacement algorithms. 3+5
(b) trxplain the term 'Beiady's anomaly'. 2
8. [al Write a C++ program to iilustrate-
0 pass by value;
(i, pass by pointer;
(iii) pass by reference mechanisms that can be used in functions 3x3
{b) Define the term 'rvalue reference'in C++. 1
***
ci P/R EXAM-2Oie/2 4 ZZ9-
]V!IS