Question Bank S5-Computer Science and Engineering
Question Bank S5-Computer Science and Engineering
QUESTION BANK
1
CS301 THEORY OF COMPUTATION
MODULE 1
2
CS301 THEORY OF COMPUTATION
15 Write the notation for the language defined by a DFA. Write a string belong to the 3 DEC 19
language L3 if L={0,1}
MODULE 2
5 Construct a regular expression for the language that consist of all 3 APR 18
strings ending with 00 .Assume∑={0,1}
6 Define regular grammar with suitable example 3 APR 18
7 Prove the equivalence of non deterministic finite automata with regular 9 APR 18
expression
8 Construct a non-deterministic automata with ɛ moves for regular 4 APR 18
expression (0+1)*1
9 Compare and contrast Mealy and Moore Machines (Justify with 5 APR 18
Diagrams)
10 What is the regular expression for the DFA APR 18
11 Can we use finite state automata to evaluate 1's complement of a binary 3 DEC 18
number? Design a machine to perform the same
12 What is a Moore machine? How is it different from mealy machine 3 DEC 18
13 Prove the equivalence of regular expression and Finite state automata 4.5 DEC 18
14 What is Myhill Nerode Theorem? 4.5 DEC 18
15 Write regular expression for the language L={1n 0 m |n>=1, m>=0} 3 DEC 19
16 Differentiate Moore machine from Mealy machine. Write the tuple 3 DEC 19
representation for both machines
17 Construct NFA without ϵ – transitions from the following NFA. 6 DEC 19
M=({q0, q1, q2}, {a, b, c}, δ , q0, {q2}) and δ(q0 , a) = {q0}, δ(q0
, b) = {q1}, δ(q0 , c) = {q2} δ(q1 , ϵ) = {q0}, δ(q1 , a) = {q1}, δ(q1
, b) = {q2}, δ(q2 , ϵ) = {q1}, δ(q2 , a) = {q2}, δ(q2 , c) = {q0}.
18 Minimize the following DFA. 6 DEC 19
MODULE 3
MODULE 4
reverse of w is dented as wR
b. Describe all Instantaneous description from Initial ID ( start
state, abcba,initial stak symbol)|- to final ID(state,ɛ,ɛ) with
respect to constructed push down automata
7 Prove the equivalence of Push down automata and Context Free 9 APR 18
Grammar
8 What is the difference between NPDA and DPDA 3 DEC 18
9 Is the language wwR where w is string of zeroes and ones, accepted by 3 DEC 18
DPDA? Why
10 Construct the PDA for the language(0n1n)* 4.5 DEC 18
11 Give the formal definition of an NPDA 3 DEC 18
12 Show that NPDA and CFG are equivalent 6 DEC 18
13 Write the conditions for a pushdown automaton to be considered as 3 DEC 19
deterministic.
14 Which are the methods to accept a string in a PDA? Whether both type 3 DEC 19
of PDAs can define the same language. Justify your answer. 3 10
MODULE 5
State
9 Construct a Turing machine that recognizes the language L= {anbncn | 10 DEC 17
n>0}
10 Do the following 6 APR 18
a. Design Turing machine to compute addition of twonumbers.
Assume unary notation for number representation 4
b. Describe all instantaneous descriptions (ID) from initial ID:
q0010 to Final ID: 00 with respect to constructed Turing
Machine (assume q0as initialstate.)
11 Design a Turing machine that determines whether the binary input 5 DEC 18
string is of odd parity or not
12 Design a Turing machine that accepts anbmwhere n>0 and m>0 5 DEC 18
13 a. Whatisacontextsensitivegrammar(CSG). Design a CSG to 6 DEC 17
accept language Y= {0n1n2n |n>0}
b. Define Linear BoundAutomata 4
14 Which are the methods to accept a string in a PDA 4.5 DEC 19
15 Whether both type of PDAs can define the same language. Justify 4.5 DEC 19
your answer.
MODULE 6
explanation is sufficient).
7 What is nondeterministic Turing Machine? 5 DEC 18
8 How does the Universal Turing machine simulate other Turing 5 DEC 18
machines
CS 303-SYSTEM SOFTWARE
MODULE 1
8 Write a subroutine for SIC/XE that will read a record into a 4 APR
buffer. The record may be any length from 1 to 100 bytes. The 18
end of record is marked with “null” character (ASCII code 00).
The subroutine should place the length of record into a variable
named LENGTH. Use immediate addressing and register –to –
register instructions to make the process efficient aspossible.
9 Write a sequence of instructions for SIC to set ALPHA = 3 DEC
BETA*9 + GAMMA 18
10 List out the various used in SIC along with their purpose 3 DEC
18
11 Distinguish between Application software and system software. 3 DEC
18
12 What are the functions of operating systems 3 DEC
18,
13 A,Let
B and
A, BC and
are array
C are of
array
10 words
of 10 words
each. Write
each. Write
a SIC/Xeprogramto
a SIC/XEprogramto 6 MAY
6 add the18
correspo
6 add the corresponding elements of A & B and store the resu
MODULE 2
2 Describe data structures used in the two pass SIC assembler 3 DEC 17
program Give algorithm for pass 1 of a two pass SIC assembler
With suitable examples, how the different instruction formats and DEC 17
3 5
addressing modes of SIC/XE are handled during assembling
DEC 17
4 Describe the format of object program generated by the two-pass 5
SIC assembler algorithm
5 DEC 17
Explain the format of the object program generated by a two pass 5
SIC assembler ,highlighting the content of each record type
DEC 17
6 Explain the datastructures used and their purposes in a 3
two- pass assembler
7 With the aid of an explain the second pass of a two pass 6 MAY 19
algorithm
8 Explain the working of any one type of one pass Assembler 6 DEC 18
What will be the address value assigned to the symbol NEW during
pass 1?
Suppose the address associated with the symbol RETADR is 0030 and
11 the machine equivalent code for STL is 14. Assemble the given 5 SEP 20
SIC/XE instruction, by clearly indicating the instruction format,
addressing mode and the setting of different flag bits, given the address
value assigned to RETADR is 0030.
MODULE 3
1 Write notes on multi pass assembler with example 5 APR18,
DEC17
MODULE 4
Give algorithm for an absolute loader 3 DEC
1
17,
APR
18,
MA3Y
19
Write notes on Dynamic linking. Explain with exa 4 APR18,
2
MAY19
Draw the structure of a typical text editor and describe the 10 DEC
8
functions of each block. List out the main four tasks 18
associated with the documented editing process.
List out the criteria that should be met by the user interface 4 DEC
9
18
of an efficient debugging system
MODULE 1
5 With the help of an example state the differences in the 3 KTU-Apr. 2018
functioning aspects of the instructions SHR and SAR of
8086.
6 Describe any three addressing modes used in 8086. 3 KTU-Apr. 2018
7 Write an 8086assembly language program to check 9 KTU-Apr. 2018
whether a string is palindrome or not. Assume that the
string and its length are stored at known memory
locations.
8 Write 8086 assembly language program to find the count 9 KTU-Dec. 2018
of even and odd numbers from a set of 10 sixteen bit
numbers stored in location staring from a known address.
Store the results in two different locations.
9 What is the difference in the execution of an 8086 3 KTU-Dec.2018
intersegment and intrasegment CALL instruction?
10 Define the functions of the following 8086 assembler 3 KTU-Dec.2018,
directives: a) ASSUME b) EQU c) OFFSET ,SEGMENT KTU-Dec 2020
11 Explain the working of the following instructions with 3 KTU-Dec 2020
suitable example. a) IN b)SAR
21 Differentiate 8086 and 8088 microprocessors. 4 KTU-Dec 2020
MODULE 3
1 Mention the salient features of basic I/O mode operation 3 KTU- Dec.2017
of 8255. KTU-Dec 2020
2 Compare I/O mapped and memory mapped interfacings. 3 KTU- Dec.2017
3 Draw the internal architecture of 8279 and explain. 9 KTU- Dec.2017
KTU-Dec 2020
4 Describe different modes of operation of peripheral 6 KTU- Dec.2017,
ICs:8255 and 8259. KTU Dec2020
5 What is DMA? State the sequence of operations 3 KTU-Apr.2018
performed by DMA controller in DMA transfer operation.
6 What are the different operational modes of 8279. 9 KTU-Apr.2018
7 List any four features of 8257 DMA controller. 4 KTU-Apr.2018
8 Write notes on scanned keyboard with 2-key lock out of 3 KTU-Dec.2018
8279 keyboard/display controller.
9 Describe the control word format of 8255 PPI. 4 KTU-Dec.2018
10 Design an interface with an 8086 CPU and two chips of 9 KTU-Dec.2018
16*8 EPROM and two chips of 32*8 ROM.Select the
starting address of EPROM suitably.The RAM address
must start at 00000H
11 Explain output modes of 8279, programmable 3 KTU-Dec 2020
keyboard/display interface.
12 Interface two numbers of 16Kx8 EPROM and 2 numbers 9 KTU-Dec.2020
of 4Kx8 RAM to 8086. Select suitable address map.
MODULE 5
MODULE 1
28
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS 307 DATA COMMUNICATION
11 Differentiate attenuation and Delay Distortion. 3 DEC 18
12 Discuss time domain and frequency domain concept of a signal . Draw 3 MAY 19
the frequency domain plot of a periodic signal.
13 What are the various transmission impairments and explain how they 9 MAY 19
affect performance of a communication link?
14 Define Channel Capacity. Calculate the appropriate bit rate and signal 5 MAY 19
levels for a channel with 100 Mhz bandwidth and SNR of 255.
15 Define frequency, phase and wavelength of a signal 3 DEC 19
16 Explain the three most significant transmission impairments. 3 SEP 20
MODULE 2
MODULE 3
30
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS 307 DATA COMMUNICATION
6 Describe the scrambling technique B8ZS 5 DEC 17
7 State Sampling theorem. With help of suitable diagrams, explain the 5 DEC 17
process of transforming analog data in to digital signal using Pulse 3 SEP 20
Code Modulationtechnique.
8 Indicate some significant differences between broadcast radio and 3 DEC 17
microwave.
9 Find the Bandwidth for a signal transmitting at 12 Mbps for QPSK. 3 DEC 18
The value ofd=0.
10 Encode the given bit stream using NRZ-I. 100010001111 5 DEC 18
11 What is polar NRZ line encoding? What are its variations? 5 DEC 18
12 Differentiate amplitude modulation and frequency modulation 8 DEC 18
13 Encode the bit stream 10101010 into the following line coding 6 MAY 19
schemes assuming that the last signal level has been negative:
i) NRZ-I
ii) NRZL
iii) Manchester
iv) Differential Manchester
v) Bipolar AMI
vi) Pseudoternary
14 Convert the bit stream 101010 in to analog signals by using ASK, 3 MAY 19
Binary FSK and Binary PSK
15 With neat diagram, explain delta modulation technique. 6 MAY 19
16 Encode the bit pattern 01001100011 using Differential Manchester 3 DEC 19
encodingtechnique.
17 Define Sampling Theorem 3 DEC 19
18 Differentiate between NRZL and NRZI encoding techniques with 3 DEC 19
examples.
19 With neat diagram, explain delta modulation technique. 6 MAY 19
MODULE 4
31
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS 307 DATA COMMUNICATION
Sl. Questions Mar KTU/KU
No ks Month/Year
1 What type of multiplexing is preferred in optical fiber communication? 3 DEC 17,
Justify your answer APR 18
2 What do you meant by single bit error and burst error 3 APR 18
3 Explain time domain and frequency domain concept of a signal in a 5 DEC 17
communication system
4 How Time division Multiplexing (TDM) handle disparity in the input 5 DEC 17
data rate, if data rate of all input lines are not same?
5 Explain major types of noise occur during data transmission, which 5 DEC 17
causes errors.
6 What are the advantages of using multiplexing in data communication? 5 DEC 17
7 How does a synchronized time division multiplexer stay synchronized 3 DEC 17
with de-multiplexer on receiving end?
8 Explain the frame format of Synchronous Optical Network (SONET) 4 DEC 17
for the version SDH. 3 DEC 19
9 With suitable examples explain sliding window error control 5 DEC 18
mechanism in datacommunication.
10 What is CDMA? Explain. 5 KU
11 Explain Space Division Multiplexing. 5 DEC 17
12 Differentiate between Synchronous TDM and Statistical TDM. Why is 5 DEC 17
a statistical time division multiplexer more efficient than a synchronous
time division multiplexer?
13 With a neat Sketch discuss the various steps involved in PCM 5 DEC 17
14 Given the bit pattern 101110001. Encode the stream using BFSK and 5 DEC 18
QPSK.
15 Explain frequency division multiplexing. How is interference avoided 5 DEC 18
by using FDM? 6 MAY 19
16 Discuss Digital Carrier Systems. 3 MAY 19
32
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS 307 DATA COMMUNICATION
18 What is byte interleaving technique in Time Division Multiplexing 3 DEC 19
MODULE 5
33
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS 307 DATA COMMUNICATION
15 Using CRC, given the dataword 1010011110 and the divisor 10111 10 MAY 19
i. Show the generation of the codeword at the sender site
ii. Show the checking of the codeword at the receiver site
16 What is the Hamming distance for each of the following codewords: 4 MAY 19
a. d (10000, 11000)
b. d (10101, 10010)
c. d (11111,11111)
d. d (000, 100)
17 In a CDMA process two users are having the codes as given below. 5 DEC 19
User1: 1,1,1,1
User2: 1,-1,-1,1
Explain the data transmission process if user1 wants to transmit a bit 0
and user2wants to transmit a bit1.
18
MODULE 6
34
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS 307 DATA COMMUNICATION
7 Discuss synchronous transmission. How is synchronization provided 10 DEC 18
for synchronous transmission? What is a major disadvantage of
asynchronoustransmission?
8 Explain the difference between datagram and virtual circuit operation 7 DEC 18
5 MAY 19
9 What is the significance of packet size in a packet-switching network? 3 DEC 17
10 What are the advantages of packet switching compared to circuit 7 DEC 17
switching.
11 What is meant by setup phase in circuit switching? 3 DEC 17
12 Explain the following terms: i) DSSS ii) FHSS 10 DEC 18
13 Discuss Frequency hopping spread spectrum technique 10 MAY 19
5 DEC 19
14 What is Circuit switching? Explain the three phases in Circuit 10 MAY 19
switching with suitable diagrams
15 With the help of a neat block diagram, explain the structure of a packet 5 MAY 19
switch.
16 Generate the CRC code for the data word of 110010101. The divisor is 5 DEC 19
10101.
35
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS309 GRAPH THEORY AND
COMBINATORICS
MODULE 1
1 Consider a graph G with 4 vertices: vl, v2, v3 and v4 and the degrees 3 DEC 17
of vertices are 3, 5, 2 and 1 respectively. Is it possible to construct such
a graph G? If not,why?
2 Draw a disconnected simple graph Gl with 10 vertices and 4 3 DEC 17
components and also calculate the maximum number of edges possible
in Gl.
3 What are the basic conditions to be satisfied for two graphs to be 6 DEC 17
isomorphic? Are the two graphs below isomorphic? Explain with valid
reasons.
8 Prove that in a simple with n vertices and K components can have at 3 Model
most (n-k)(n-k+1)/2 edges. Question
9 Prove that if a connected graph G is decomposed into two subgraphs gl 3 DEC 18
and g2 there must be at least one vertex common between gl and g2.
10 Write a note on Konigsberg Bridge Problem 3 Model
Question
11 A graph has exactly 10 vertices, 4 vertices of degree 3, 4 vertices of 3 Model
degree 2 and 2 isolated vertices. How many edges the graph have? Question
12 19 students in a nursery school play a game each day, where they hold 4 Model
hands to form a circle. For how many days can they do this, with no Question
students holding hands with the same playmates more than once?
Substantiate your answer with graph theoretic concepts.
13 Differentiate walk , path and circuit. 3 Model
Question
14 Using the graph classify each sequence as a walk, a path or a circuit 4.5 Model
Question
MODULE 2
MODULE 3
MODULE 4
4 Draw two Kuratowski’s graphs and also prove that Kuratowask’s first 4 DEC 17
graph is non planar using appropriate inequality.
5 Draw a geometric dual (G*) of G given and also write about the 6 DEC 18
relationship between a planar graph G and its dual G*
6 Prove the statement “Every circuit has an even number of edges in 4 DEC 18
common with any cut-set”.
7 Define edge connectivity and vertex connectivity. 3 Model
Question
8 Show that a vertex v in a connected graph G is a cut vertex iff there 5 Model
exist two vertices x and y in such that every path between x and y Question
passes through v.
9 State and prove Cayley’s theorem. 9 Model
Question
10 Prove that : A graph has a dual if and only if it is planar. 7 Model
Question
MODULE 5
8 Let A and B be, respectively, the circuit matrix and incidence matrix of 4 DEC 17
a self-loop-free graph G.Prove that A x BT=0 (mod 2)
9 Explain circuit matrix and its properties. 5 Model
Question
10 Let B and A be the circuit matrix and incidence matrix whose columns 5 Model
are arranged using the same order of edges. Show that every row of b Question
is orthogonal to every row A.
11 Write the properties of incidence matrix. 5 Model
Question
12 Explain cut set matrix and path matrix. 5 Model
Question
13 Define adjacency matrix and construct a graph from the following 4 DEC 17
adjacency matrix:
MODULE 6
3 Write the Dijkstra’s shortest path algorithm. Apply this algorith to find 10 DEC 17
the shortest path between v1 and v6.
4 Write the Dijkstras Shortest Path Algorithm and apply this algorithm to 6 DEC 17
find the shortest path between a and z.
weighted graph
8 Write an algorithm for the shortest path between all pairs of vertices 7 Model
Question
9 Write an algorithm for Depth- first search on a graph 10 Model
Question
10 Explain planarity with example. 5 Model
Question
11 Explain cut-vertices and blocks bridges. 5 Model
Question
12 Explain computer representation of a graph. 3 Model
Question
46
CS 361 Soft Computing
MODULE 1
MODULE 2
9 Explain the architecture and training algorithm of Back Propagation 9 Sep 2020
network. Describe the various terminologies used in the algorithm
10 Explain the difference between Adaline and Perceptron nets. (with 3 Sep 2020
network diagram)
56
CS 361 Soft Computing
11 Give the Perceptron training algorithm for single output class. 3 May 19
56
CS 361 Soft Computing
12 Describe the sigmoidal activation function. List the drawbacks. 5 SEP 2020
MODULE 3
4 Why the excluded middle law does not get satisfied in fuzzy sets. 3 Dec 2020
Describe with an example
56
CS 361 Soft Computing
5 Consider the two fuzzy sets. Perform the Cartesian product over these 3 Dec 2018
given fuzzy sets.
6 Let U be the universe of military aircraft of interest as defines as below 4 Dec 2018
U = {a10,b52,c130,f2,f9}.
7 Law of contradiction and law of excluded middle cannot be applied to 3 Dec 2020
fuzzy sets. Give proper justification to the statement
56
CS 361 Soft Computing
9 What are tolerance and equivalence relations? Given a relation R, 9 MAY 19,SEP
check whether R is equivalent. Else transform the relation to an 2020
equivalencerelation.
12 Represent the standard fuzzy set operations using Venn diagram 3 MAY 19,SEP
2020
13 What is cardinality of a fuzzy set.Whether a power set can be formed 4 MAY 19
for a fuzzy set.Justify your answer
14 7 Dec 2020
56
CS 361 Soft Computing
15 4 DEC 17
16 3 SEP 2020
MODULE 4
56
CS 361 Soft Computing
2 Using the intuition method develop fuzzy membership functions for 3 DEC 18,SEP
the following shapes. (a) Trapezoid. (b) Gaussian function. (c) 2020
Isosceles triangle.
3 With the help of a figure, explain the features of fuzzy membership 3 MAY 19
functions.
4 Using inference approach , find the membership values for each of the DEC 18
triangular shapes (I,R,IR,E,T) for a triangle with angles 55°, 45°, 80°. 4
5 What is meant by Lambda-Cuts for Fuzzy Sets? 3 Sep 2020
56
CS 361 Soft Computing
8 5 DEC 17
10 5 DEC 17
11 4.5 DEC 17
12 4.5 DEC 17
13 Using the inference approach, obtain the membership values for 6 MAY 19
the triangular shapes,(I,R,T) for a triangle with angles 40,60,80.
MODULE 5
Sl.No Questions Mar KTU/KU
ks Month/Year
56
CS 361 Soft Computing
56
CS 361 Soft Computing
2 Mention the general forms that exist for a linguistic variable 5 DEC 18
3 Differentiate between Mamdani FIS and Sugeno FIS 5 DEC 18/
MAY19,SEP
2020
4 Explain how can one perform the aggregation of fuzzy rules 4 DEC 17
5 With the help of necessary block diagram,compareMamdani and 10 DEC 17
Sugeno fuzzy inference systems
6 With the help of examples,explain the various fuzzy propositions 6 DEC 17
7 Explain the different methods for fuzzy approximate reasoning. 4 DEC 17
8 Formulate a problem that can derive inference through fuzzy system 4 DEC 17
MODULE 6
56
CS 361 Soft Computing
56
CS 361 Soft Computing
8 Illustrate the different steps in genetic neuro-hybrid systems with the 6 DEC 17
help of a neat block diagram
9 With the help of examples,explain the various crossover techniques 10 DEC 17
employed in genetic algorithms.
10 Distinguish between the process of tuning and learning in genetic – 4 DEC 17
fuzzy rule based systems
11 Explain the different methods of encoding that are possible in genetic 6 DEC 17
algorithm
12 Describe five types of crossover. 5 MAY
19,SEP 2020
13 Explain Stochastic Universal Sampling with example 4 MAY 19
14 Explain the steps of genetic algorithm 4 MAY 19
(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)
56