134
PGDCA / MCA (I Yr) I BcA Term-End Examination June, 2006 CS-O1 : COMPUTER FUNDAMENTALS Time: 3 hours Maximum Mqrks: 75 Note : Question number 7 is compulsory. Answer any three questions from the rest. 1. (a) Simplify the following expression using Karnaugh's map in product-of-sum form. F (A, B, C, D) - ) (0, 2, 8, 9, 10, 11, 14, 15) Also, draw the logic circuit for the simplified exnression. (b) What is a vector instruction ? Explain briefly the need of an array processorin the execution of a vector instruciion. 5 (c) Construct an 8 x 1 multiplexer, using two 4 x 1 I tt t - - multiplexers and a decoder. Make assumptions, it required. cs-01 P.T.O.

Mca

Embed Size (px)

Citation preview

Page 1: Mca

PGDCA / MCA (I Yr) I BcA

Term-End Examination

June, 2006

CS-O1 : COMPUTER FUNDAMENTALS

Time: 3 hours Maximum Mqrks : 75

Note : Question number 7 is compulsory. Answer any

three questions from the rest.

1. (a) Simplify the following expression using Karnaugh's

map in product-of-sum form.

F (A , B , C, D) - ) (0 , 2 , 8 , 9 , 10 , 11 , 14 , 15)

Also, draw the logic circuit for the simplified

exnression.

(b) What is a vector instruction ? Explain briefly the

need of an array processor in the execution of a

vector instruciion. 5

(c) Construct an 8 x 1 multiplexer, using two 4 x 1I t t t - -multiplexers and a decoder. Make assumptions, it

required.

cs-01 P . T . O .

Page 2: Mca

(d) What is cache coherence ? Why is it important for

shared-memory multi-processor systems ?. ' ' . . , : , : ; . . , ' . - . . ' . . : ; : ] . , .

('e) Write an 8086 adsembly laflguage program to find

the total number of occurrences of the characters

"a" and "t" in an array of characters stored in the

memory.

(f) Explain, with an example, one instruction of each of

the following types :

(i) Conversion

(ii) Input-output

(iii) Transfer of control

(iv) Arithmetic

2. (a) Write a program to evaluate the following expression

using an evaluation-stack architecture machine :

A x . B / D + E x F - G

Assume that the machine contains instructions for

PUSH, POP, ADD, SUBTRACT, MULTIPLY

and DIVIDE

(b) Construct a full-adder circuit using one or more

decoders.

(c) What is the set-associative mapping scheme for

memory ? Explain this with the help of a diagram. 4

cs-01

Page 3: Mca

3. Give at least three differences between each of the

following : 75

(i) Instruction pipeline vs' Floating point pipeline'

(ii) Horizontal microinstruction vs' Vertical

microinstruction.

(ii| Access methods of secondary storage vs' Access

methods of main memory.

(iv) Loosely coupled microprocessors vs' Tighily coupled

microprocessors.

(v) Flash memories vs. PROMs.

4. (a) Design a single precision floating point number

having the following characteristics :* The base of the number is 2'

o The mantissa can represent at least 5 decimal

digits correctlY.

* The exponent range is 10i 50'

Make suitable assumptions, if required' 5

(b) Write a program in 8086 assembly language that

adds two two-digit unpacked BCD numbers' 5

(c) What is the purpose of data-flow machines ? List at

least two advantages and two disadvantages of these

machines. 5

5. (a) Explain the role of the segment registers in 8086

microprocessors, with the help of an example for

each.

cs-01 P . T . O .

Page 4: Mca

(b) What are thabasic characteristics of RISC ?'Explainbriefly the reasons that make RISC based designsmore popular.

(c) An 8-bit register contains the binarv value11001011. Perform the following opnrufion, onthis :

(i) Mask the upper nibble of the register. (A nibbleis a 4-bit sequence.)

(ii) Insert a value 1101 at the upper nibble.

(iii) Perform circular shift right.

(iv) Perform arithmetic shift left.

(v) Perform logical shift right.

Make assumptions, if required.

4cs-01 12,000

Page 5: Mca

PGDCA / MCA (I Yr) / BCA

Term-End Examination

June, 2006

CS-02 : INTRODUCTION TO SOFTWARE

Time : 2 hours Maximum Mqrks : 60

Note : Question no. I is compulsciry. Attempt any

three questions from the rest.

l. (a) Write an algorithm and draw a flow chart to calculate

the factorial of a given number.

(b) What is a process ? Explain the various process

states with the help of a state diagram. Why is a

PCB required, and what is the information that a

PCB contains ?

(c) Write a shell program to convert an integer to its

binary equivalent.

(d) How is a client-server model different from the

stand-alone model ? Explain this with the help of a

suitable example of each.

(e) Explain the various phases of systems investigation,

with the help of a suitable example.

cs-02 P . T . O .

Page 6: Mca

2. (a) Construct context free grammar for the following 'C'

statements :

( i ) D o . . W h i l e

(ii) incrementoperator

(b) What is a project control system ? With the help of

an example of each, explain the Gantt chart and the

PERT chart scheduling techniques.

3. (a) Explain the CPU scheduling and memory

management in a UNIX operating system. 5

(b) Five jobs arrive in a system in the order given

below : 5

Process CPU time Priority

P 1 1 0 3

P 2 6 5

P 3 b z

P 4 4 1

P 5 8 4

5 is given the highest priority. Calculate thetumaround and waiting time for each process for thefollowing scheduling algorithms :

' (i) Shortest Job First

(ii) Round Robin (quantum 2)

cs-02

Page 7: Mca

4. (a) What are the main advantages of distributed OS ?

How are the file system and protection supported in

distributed OS ?

(b) Write UNIX commands for the following :

(i) To print how many users are working on thesystem.

(ii) To run a process in the background.

(iii) To print the file names and their file sizes in thecurrent directory.

(iv) To print a long listing of the directory.

(v) To print content of the "passwd" file.

5. (a) List the major activities performed in thedevelopment of a software product. Also mentionthe limitations of the development cycle.

(b) What is the significance of thrashing ? Write downthe steps performed in demand paging.

cs-02 4,000

Page 8: Mca
Page 9: Mca

PGDCA / MCA (I Yr) / BcA

Term-End Examination

June, ?OOG

CS-03 : FILE STRUCTURE ANDPROGRAMMING IN COBOL

Time : 2 hours Mqximum Mqrks:60

Note : Question number 1 is compulsory. Answer any

three ouestions from the rest.

1. (a) Write a program in COBOL, giving all the divisions,

to compute the total marks, average and the grade

as per the following record format :

7 - 6 R o l l N o .

7 - 30 Name of the student

31 - 33 Marks in English

34 - 36 Marks in Mathematics

37 - 39 Marks in Physics

40 - 42 Marks in Chemistry

43 - 45 Marks in Computer Science

46 - 48 Total marks

49 -57 Average

52 - 57 Grade

cs-03 P . T . O .

Page 10: Mca

If a student scores less than 40 in any subject, then printFAIL as the grade. Otherwise print the grade as per thefollowing conditions :

Average Grade

5 0 < m a r k s < 6 0 A

4 0 < m a r k s < 5 0 B

(b) Explain the use of the following with the help of oneexample of each i .

( i ) DIVIDE

(iD USAGE clause

(i i i ) REDEFTNES

(c) Write a COBOL program to simulate the billingapplication for a grocery store.

Note : Make suitable assumptions, if needed andmention them.

(d) Mention the purpose of using the RENAMESclause. Wrjte the format. Also, list some importantprecautions to keep in mind while using theRENAMES clause.

2. Write a program in COBOL to simulate a simple calculatorwhich performs the basic arithmetic operations likeaddition, subtraction, multiplication, and division. 10

1 0

1 0

cs-03

Page 11: Mca

3 . Write a COBOL program that converts a given date(specified as the values of DAY and MONTH) to the Juliandate and stores it in the data name Julian. Assume 28 davsin the February month.

Note z The value of DAY is the date of the month and' the value of MONTH is a value between 1 and72. A Julian date is a 3-digit date representingthe number of days counted from the first ofJanuary.

Write a COBOL program to calculate the equal instalmentamount to be paid to a nationalized bank every monthtaking the {ollowing points into consideration :

(i) Flat 60/o interest if the loan amount is to be clearedwithin one year.

(ii) Flat 7.2o/o interest if the loan amount is to be clearedwithin 18 months.

(iii) Flat 72o/o interest if the loan amount is to be clearedwithin 36 months.

Explain the use and syntax formats of the followingCOBOL statements,/clauses, with the help of an examplefor each '

( i ) REWRTTE

( i i ) TNSPECT . . . . TALLYTNG

(i i i ) STRING

(iv) SET

(v) GO TO

7 0

4 .

1 0

5 .

1 0

cs-03 6,000

Page 12: Mca
Page 13: Mca

PGDCA / MCA (I Yr)

Term-End Examination

June, 2006

CS-04 : DATA STRUCTURES THROUGH,,C' ' & , ,PASCAL"

Time : 2 hours Maximum Mqrks: 60

Note : Question number 7 is compulsory. Answer anythree questions from the rest. All algorithmsshould be written nearer to C or PASCALIanguage.

l. (a) Suppose the input to a stack is 7, 2, 3, 4, 5 in thisorder, i.e., 1 comes first, then 2, and so on. Whichof the following rearrangements can be obtained inthe output order ? For those that can, explain how,giving the sequence of operations. For those outputsthat cannot be so obtained, explain why, 6

( i ) r 2 4 5 3( i 0 2 r 4 3 5( i i i ) 2 7 5 3 4

( i v ) 3 1 2 4 5

cs-04 P . T . O .

Page 14: Mca

(b)

(c)

(d)

What is a circular queue ? Explain how it is

implemented, using an array.

Write functions to "insert" and "delete" for the

queue above.

Construct the binary tree whose Pre-order traversal

is ABCDEFGH and In-order traversal is

CBDAFEGH, where each letter stands for the

information stored in some node of the tree. Show

all the steps involved.

Write an algorithm to implement "insertion sort".

Explain how the algorithm works in sorting the input

l i s t 2 6 4 9 8 5 .

Distinguish between a graph and a tree.

Write a function, with appropriate type declaration,

to read the powers and co-efficients of different

terms of a polynomial and create the linkedlist.

(i) What is a Binary Search Tree ?

(ii) Write an algorithm to create a Binary Search

. Tree from an input list of integers.

(i) What is a linked list ?

(ii) Explain how linked lists can bepolynomials of arbitrary degree.

Explain, with an example, the

height-balancing while constructing a

Tree.

used to store

usefulness of

Binary Search

I

2(e)

2. (a)

(b)

3. (a)

(b)

2

cs-04

Page 15: Mca

(c) Construct an AVL tree from the following input list :6 4 2 12 10 3, applying appropriate rotation.

(i) Define the terms "lnternal path length" and"External path length" for a binary tree.

(ii) Prove that for any binary tree of n nodes theExternal path length : Internal path length + 2n.

What is a heap ? Write an algorithm for inserting anew element into a heap.

In C, how does 'union' differ from 'structure' in itsworking ?

Explain what an indexed sequential file organisationis. Also give two advantages each of sequential andindexed sequential file organisations.

What is meant by "Depth First Search" of a graph ?Consider the following graph :

Explain how a Depth First Search Scheme willtraverse the graph starting at node 1.

4. (a)

5. (a)

(b)

(b)

(c)

cs-04 7.000

Page 16: Mca
Page 17: Mca

PGDCA / MCA (I Yr)

Term-End Examination

June, 2OOG

CS-OS : ELEMENTS OF SYSTEMS" ANALYSIS & DESIGN

Time : 3 hours Mqximum Mqrks :75

Note : Question no, I is compulsory, Answer any three

questions from the rest.

1. (a) With the help of an example application, explain the

use of a data dictionary. 3

(b) Explain the use of requirement analysis in system

design. Make an SRS document for "School

6Management System".

(c) Briefly describe five types of documentation5techniques.

(d) Briefly explain five components of muliimedia. 5

(e) What is an MIS ? Give four features of a typical

MIS. Explain the steps followed in the development

of an MIS. 8

(f) Why is it essential to use systems analysis and design

methodologies to build a system ? Give three

reasoRs. 3

cs-05 P . T . O .

Page 18: Mca

2. (a) Design a EFD for a Banking Management System,

uPto' level 2- ' - ' ' ' l

(b) Explain the various types of files in which records are

rnaintained in a system. 6

(c) Describe three types of computer graphics software. 3

3. (a) Define the following : 6

(i) Peak load testing

(ii) Storage testing

(iii) Recovery testing

(b) Give two differences between DSS and KBS. 2

(c) How will you prepare a project request form ? What

are the techniques used to review these requests ?

Explain with an example. 7

4. (a) Give two symbols used in DFD, along with their

purpose.

(b) List four factors considered while designing a form.

Also give {our characteristics and two examples of

forms.

(c) Give, with justification, three different events that can

be considered as comnuter crimes. 3

(d) Explain two differences between unit and integration

testing. What is the use of procedure testing ? 4

cs-05

Page 19: Mca

5. (a) Describe the structure of a feasibility repori' 3

(b) List six considerations on which output to be

produced usuallY dePends. 3

(c) What is structured design ? Explain this with an'

example. 3

(d) What is the role played by user interface of the

software in system development ? Also explain four

steps of GUI develoPment. 6

cs-05 1 5 , 0 0 0

Page 20: Mca
Page 21: Mca

PGDCA / MCA (I Yr)

Term-End Examination

June, 2006

CS-O6 : DATABASE MANAGEMENTSYSTEM

Time :3 hours Maximum Mqrks : 75

Note : Question no. 1 is compulsory' Attempt any

three questions from the rest.

l. (a) With the help of a suitable example, explain a

hierarchical database model.

(b) Whai are the advantages of index-sequential file

organisation ? With the help of an example explain

the structure of index sequential file'

(c) Why are remote procedure calls used ? Why is a set

of DDE mainiained at application level ?

(d) Design an ER diagram for any of IGNOU's study

centres. Clearly indicate the entities, attributes,

relationships and the key constraints.

(e) With the help of two examples for each, explain the

use of multimedia databases and knowledge

databases.

CS-06 P . T . O .

Page 22: Mca

2. (a) Consider an employee file with the details givenbelow : -

Record

A

B

cD ,

E# Name Occup.DegreeSe> Location Salary

80cMilind Prog. M.E. M Delhi 10,00c510{dwet Analyst B.E. M Mumbai 15,00c200 Darronrl Analyst B.E. M Delhi 72,OOC

300 Vlukesh Prog. M.E. M Chennai 9,000

(i) Make a multi list representation of thisemployee Iile.

(ii) Write a query to retrieve the record ofSalary > 12,000, Degree = M.E.,Location = Delhi, Occupation = Analyst,Sex = M.

(b) What are the main features of client-server model ?Explain the stages involved in the developrnent of anapplication using this model.

3. (a) Why is the administration of a database systemrequired ? What are the various functions associatedwith database administration ?

(b) Define a data manipulation language. Write a.syntaxfor the following'and give an example for each :(i) Select statement

(ii) Update statement

. (iii) Delete statement

(iv) Insert statement

7 0

cs-06

Page 23: Mca

4. (a) With the help of an example relation and the

dependency diagram, explain ihe concept of

functional dependency.

(b) Explain the following tools with respect to

client-server environment :

(i) Dynamic data exchange

(ii) Object linking and embedding

Also mention the usage of these with an example

for each.

5. (a) Consider the schema given below :

Branch-scheme (Branch-name, asset, Branch-city)

Customer-scheme (Customer name, street,

customer-city)

Deposit-scheme (Branch-name, account-number,

customer-name, balance)

Borrow-scheme (Branch-name. loan-number,

customer-name, amount)

Client-scheme (Customer-name, banker-name)

Write the SQL statements for the following : 8

(i) Find all customers who have a balance of over

Rs. 1000.

(ii) Write the query to find the clients of banker

Patel, and the city they live in.

(iii) Write a statement to find all the customers who

have a loan amount of more than Rs. 1200'

CS-06 P . T . O .

Page 24: Mca

(iv) Write a statement to find all the customers

whose name starts with "R" and who have a

balance of more than Rs. 10,000.

(b) With the help of an example, explain the properties

of a Balanced sort tree.

CS-06 20.000

Page 25: Mca

ADCA / NICA (II Yr)

Term-End Examination

June, 2006

CS-07 : DISCRETE MATHEMATTCS

Time : 3 hours t ,I v rcXImUm lVarKS: /5

Note : Question number 7 is compulsory. Attempt anythree questions t 'rom the rest.

l. (a) Find the conjunctive normal form for the followinqformula :

l ( ( P ^ l e ) v ( p n e ) ) v l p

(b) Consider the following graph. Write down. itsadjacency matrix :

CS-07 P . T . O .

Page 26: Mca

(c) Let A = l\, 2, 3,4, 5). A ielation R is defined on A

s u c h t h a t a R b i f f a + b < 6 .

(i) Write the relation matrix R.

(ii) Make a digraph of the relation.

(iii) Check if R is reflexive.

(iv) Check if R is symmetric.

Make the figure of Konigsberg's 7-bridge problem,

and draw the corresponding multigraph.

Establish the following equivalence, using a truth

table :

P + Q v R = ( P = Q ) v ( P + R )

Construct a Hasse diagram for the poset ({a, b, cl, c ).Does it represent a lattice ? Give reasons for your

answer.

Find the boolean expression for the following gating

network (write the output of each gate).

(d)

(e)

(f)

G)

xl x2 x3 x4

cs-07

Page 27: Mca

(h) For the Fuzzy Set A of X :{7,2,3, 4, 5l given by

^ 10.2 03 0.4 0.2 07]^ : t t

' 2 ' i ' n ' TJ ' f ind the u-cut o f A

f o r each s e { 0 .1 , 0 ' 3 , 0 .7 } .

Find the minimum spanning tree for the followinggraph using Kruskal's algorithm :

(i) Express P v Q using f only.

(ii) Express P n Q using ,t only

Let g : R * R, where R is the set of real numbers,be defined by g(x) = x2 + 2. Check if g is

(i) one-one

(ii) onto

Check whether the following formulas are tautologiesor not :

( i ) ( P + Q ) = [ P v ( Q n n 1 < + e ^ p v R ) ]

( i i ) ( P v Q ) + ( Q = p )

2. (a)

3. (a)

(b)

(c)

CS.O7 P . T . O .

Page 28: Mca

(b)

(c)

In a single Venn diagram, show three sets A, B, C

a n d B \ C , A n C , A U ( B c ) .

Use the rules of inference to check the consistency

of the following argument. At each stage, mention

the rule you are applying

lf you send me sn e-mail message, then I will

finish writing the program. If you do not send me

sn e-mail message, then I will go to sleep early'

If I sleep early, then I wilt wqke up t'eeling

ret'reshed. Therefore, il I wqke up feeling

refreshed, then I haue t'inished writing the

progrqm.

Let R be a relation from the set A to A, where

A : {1, 2, 3, 41and a R b i l f a > b.

Find (i) R2, (ii) F, (iii) R-1.

Find the shortest path from a to f for the following

graph, using Dijkstra's algorithm. Show all the

intermediate steps.

Minimise the following function, using K-map :

f (w, x, y, z) : > (0, 4, 6, 7, 8, 70, 1 '2, 74)

Express I (=x flx)) using universal quantifiers' Justify

your answer.

(d)

4. (a)

(b)

(c)

cs-07

Page 29: Mca

5. (a) Construct a weighted connected graph on five

vertices that has exactly five minimum spanningtrees. Justify your answer.

(b) Express the number -87 using (i) 1's complementform, (ii) two's complement form, (ii i) sign magnituderepresentation. Use 8-bit representation.

(c) Draw the logic diagram of HA (Half Adder) anciusing HA construct FA (Full Adder).

(d) Define Well Formed Formula (WFF).

5

3

cs-07 1 5 , 0 0 0

Page 30: Mca
Page 31: Mca

ADCA / MCA (II Year)

Term-End Examination

Jurie, 2006

CS-08 : NUMERICAL & STATISTICALCOMPUTING

T)' i^" ,3 hours Maximum Marks: 75

Note : Question 7 is compulsory. Attempt any three

questions lrom the rest. Use of calculators is not

ql lowed.

1. (a) Write a FORTRAN 90 statement for each of the3following :

"*2 , in *

\'' ' J2""

/1 * r) '* l,r - 3)'( i i ) , = [ o

+ r ) + [ ' - b J

r M ) (., _ "' _ o'l( i i i ) 0 = [ ^ * j l t - ; " - e )

cs-08 P . T . O .

Page 32: Mca

(b) Which of the following are acceptable names ofinteger variables, real variables and unacceptable

names and why ?-

(i) 457.5

(ii) SUMMER

(iiil rNDrA

(iv) .ABC2

(c) Point out the errors in each of the following

statements, and correct them.

(i) Y/6.35 : Q

(ii) TEMP :.5 (TA - T2)/Z

( i i i ) Y : ( - 6 . 3 2 ) 5 ' 0 + X

(d) Write a FORTRAN program to compute the

equivalent resistance R for given 100 sets of values,

where you enter R, and R, from the key board. The

resistances R, and R, are connected in parallel andthe formula for the equivalent resistance is given

below :

1 1 1R R 1 R 2

cs-08

Page 33: Mca

(eJ An air foil is to be plotted with a "camber". Themean line of the foil js given by :

y = + e p x - x z ) f o r x < pp-

v = : o ( 1 + 2 p x - 2 p - * 2 ) f o r x > pI - p -

Write a program that reads 100 sets of data, of m,x and p each, and which computes and prints thevalues of y.

A town has two doctors, X and Y operatingindependently. If the probability that Doctor X isavailable is 0.9 and that Dr. Y is available is 0.8,then find the probability that at least one of them isavailable when needed.

Find the regression line of y on x for the given data :

(h) Fill in the blanks :

(i) Mr. Shiv Kumar calculated the mean of twentydifferent numbers. The calculated mean is72'14. But, while calculating, by mistake hetook the number 91., 75 and 82 instead of thecorrected value of \9, 57 and 28 respectively.The correct mean of twentv numbers is

(f)

(s)

X 2 4 5 6 8 1 1

v 1 B 7 2 1 0 8 .1 (

CS-08 P . T . O .

Page 34: Mca

(ii) If two regression coefficients are, --.- 0'1 and- O'9, the value of r is

(iii) The size of the variable which occurs most

frequently is known as -

(iv) The probabilities of occurring of two events E,

F are 0'25 and 0'5, respectively, and of both

occurring simultaneously is 0'14. Then the

probability of the occurrence of neither event is

equal to

2. (a) Two one-dimensional arrays C and D have 25

elements each. Write a computer program to

compute and print the quantities

25A = t ( c + d )

/ - t l I 'i.- 1

25B = > ( c - d i ) z

. i = 1

(b) Use the method of least squares to fii the curve

f(x) : c.x + .rfi fot the following data : 6

25P = I c ,d,

i = 1

X A 1 6 251

f(x) 14 7 2 1 0I 6

cs-08

Page 35: Mca

(c) Write a program segment to read formatted values ofA and B from a file, and to compute

S = A B

T = A + B

ST- x - = _

S + T

Also write the formatted values of S, T and X intoa file.

3. (a) Given a triangle with sides a, b, c, write a FORTRANprogram to find whether it is an isosceles triangle. 4

(b) Find the correlation coefficient between x and v fromthe given data : 6

x 1 3 4 6 8 9 1 1 7 4

v 1 2 4 4 5 8 9

(c) The ratio of relativistic to classical momentum as afunction of the speed of light is given by the formula

ratio = J==

I t - (Write a program that will compute and print a tableof the ratio for

f = 0 1 to 0.9 in steps of 0.1

f = 0191 to 0 .99 in s teps o f 0 .01 .

cs-08 P . T . O .

Page 36: Mca

4. (a) The ideal compressor outlet temperature and

efficiency for a gas turbine are given by

rp r *r = ro tfl , and

r o, )t;e f f i c i encY (e ) = 1 - l t l

\ ' 2 /

where To is the inlet temperature, P, the inlet

pressure, Prthe outlet pressure, and y, the ratio of

specific heats.

Write a program to compute and output T and e for

To = 450, P , = 10 , Pz= 55 , and Y = 1 '5 . 5

(b) For the following frequency distribution, compute the

mean, standard deviation and coefficient of variation' 5

Weight (in kS) 2 3 - 2 72 8 - 3 2 3 3 - 3 7 38-42

No. of persons 10 35 40 1 5

Wriie a program to calculate and print the value of

n !c ( n , k ) =

k ( n _ k ) l

Write a subroutine to calculate the factorial and call

it in the main program.

(c)

cs-08

Page 37: Mca

5. (a)

(b)

f n l

Identify errors, if any, in the following FORTRANstatements :

( i ) D o 8 . I = 1 , 3

(ii) Do 33 L = M, N(3), I

( i i i ) GIDAN = XYL + -N(3.2)

( iv) DO 44 K : 1. M+2, N

(v) C(1e) : B(- 4) + F13

Three machines, I, II, and III manufacturer e s p e c t i v e l y , 0 . 4 , 0 . 5 , a n d 0 . 1 o f t h e t o t a lproduction. The percentage of defective itemsproduced by I, II, and III is 2o/0, 4o/o and lo/orespectively. For an item chosen at random, what isthe probability that it is defective ?

An enquiry into the budget of the middle classfamilies in a certain city of India gave the followinginformation :

Expenses Price in 1998(in Rs.)

Price in 2000(in Rs.)

Food 40o/o 140 165

Fuel 10% 20 23

Clothing 20% 60 70

Rent 20o/o D U BO

Miscellaneous 1070 30 5 5

Compute the cost of living index number for 2000taking 1998 as the base vear.

CS-08 P . T . O .

Page 38: Mca

Assume that your stock of sales merchandise is

maintained based on the forecast demand' If the

distributor's sales personnel call on the first day of

each month, compute your forecast sales from the

given historical data.

Month Actual Demand

June

July

August

140

180

770

Using a simple three-month moving average'

what is the forecast for SePtember ?

Using a weighted moving average, with weights

of 0'20, 0'30, and 0'50 for June, July, and

August, respectively, what is the forecast for

September ?

cs-08 13 ,000

Page 39: Mca

ADCA / MCA (II Yr)

Term-End Examination

June, 2006

CS-O9 : DATA COMMUNICATION ANDNETWORKS

Time : 3 hours Msximum Marks , 75

Note : Question number 7 is compulsory. Answer any

three questions Jrom the rest.

1. (a) An analog signal is limited to 4 kHz. It is converted

to a PCM signal using 8 bitlsample. What is the bii

rate on the transmission line I 3

(b) Make a timing diagram and show the differences

between manchester encoding and differential

manchester encoding for the bit stream

1 0 0 0 1 0 1 1 0 1 1 .

(c) '

Calculate the number of networks that can exist in

Class A, B and C IP addresses. Also, calculate the

number of hosts a network in each class can have'

(d) What happens in a token bus network if a station

accepts the token and then crashes immediately ?

How does protocol handle this situation ?

CS-09 P . T . O .

Page 40: Mca

(e) Answer the following questions with respect to aTCP header :

(i) Why is the TCP header length required ?Explain this.

(ii) What is the need of a variable size slidingwindow ?

(0 What is a subnet ? How is subnetting implemented ?Explain this with the help of an example.

2. (a) Explairl the TCp connection establishmentprocedures both in the normal case and in thecall-collision case, with the help of a diagram each. s

(b) Explain two important reasons for having aminimum frame length in CSMA/CD. Explain this

5diagrammatically.

(c) Derive the throughput expressions for ALOHA andSlotted ALOHA. s

3. (a) Sketch a Network Address Translation (NAT) Box,and explain its operations. s

(b) Why is there a need for compression ? Differentiatebetween JPEG and MPEG standards. 4

(c) Give at least three functions of a modem 3

(d) How does UDP handle flow control, error control orretransmission upon receipt of a bad segment ? s

cs-09

Page 41: Mca

4.. (a) Explain the operation of an FDDI token ring, with

the help of a diagram. Also, list the two key

differences between FDDI and IEEE 802'5. 7

(b) Explain the functioning of the HDLC protocol for

the following : I

(i) Busy condition

- (ii) Error recovery using RFJ command

(iii) Two-way data exchange

(iv) Link setup and disconnection

5. Write any three differences between the following'pairs ' 75

(il Circuit switching and Packet switching

(ii) Connection oriented and Connectionless services

(iii) ARP and RARP

(iv) Upward multiplexing and Downward multiplexing

(v) X'25 and Frame relay

cs-09 20,000

Page 42: Mca
Page 43: Mca

ADCA / McA (II Yr)

Term-End Examination

June, 2006

CS-10 : SOFTWARE ENGINEERING

Time :3 hours Maximum Mqrks : 75

Note : Question no. I is compulsory. Answer any threequestions from the rest.

l. (a) A library of a University wants to automate lending

of books. The main objectives of the s/w are :

. On-line record of valid borrowers.

o Online record of books issued.

o Online reservation of books.

For the above mentioned system

(i) Develop a Software Requirement Specification.

(iil Design DFD upto two levels.

(iii) Construct the structure chart for this system.

(iv) Suggest a testing strategy for any two s/wmodules in (iii) above. 20

(b) Explain any five software quality parameters. s

cs-10 P . T . O .

Page 44: Mca

(c) Why is there often tension between a software

engineering group and an independent software

quality assurance group ? Is this healthy ? Justify your

answer.

User interfaces can be made effective by following

three important principles. Elaborate these

principles.

Differentiate between top down and bottom up

integration testing. Give one example of each.

What are the advantages and disadvantages of size

oriented metrics ?

What is cyclomatic complexity ? How can you relate

it to independent paths ? Explain with suitable

example.

What is risk estimation ? How is a risk table

prepared ?

Why is reliability a better measure of quality ? How

is it measured ?

Develop a use case diagram for an ATM system

where the withdrawal and deposit operations are

allowed.

What is Software Configuration Management(SCM) ? Explain the elements of a SCM system.

2. (a)

3. (a)

4. (a)

(b)

(c)

(b)

(c)

1 0

(b)

cs -10

Page 45: Mca

5. (a)

(b)

(c,

Develop a procedural design for an interactive user

interface that queries for basic "lncome Tax"

information. Derive your own requirements and

assume that all tax computations are performed by

other modules.

List and explain any three situations where dynamic

testing tools are better than the static testing tools'

Differentiate between an object used in OOA and an

object used during data modelling.

c s - 1 0 1 8 , 0 0 0

Page 46: Mca
Page 47: Mca

ADCA / MCA (III Year)

Term-End Examination

June, 2006

CS-12 : COMPUTER ARCHITECTURE

Time : 3 hours Maximum Mqrks : 75

Note : Question number 7 is compulsory. Answer any

three questions t'rom the rest.

1. (a) Explain a distributed memory multicomputer system,

with the help of an appropriate diagram.

(b) Consider the following two interleaved memory

organization for a main memory system with 16

memory modules. Each module is assumed to have a

c a p a c i t y o f l M b y t e .

Design 1 : 16-way interleaving with one memory

bank.

Design 2 : 8-way interleaving with two memory

banks.

For this system calculate the following :

(i) address format for each organization.

(ii) maximum memory bandwidth.

1 0

C S - 1 2 P.T.O.

Page 48: Mca

(c) Show the numerical analysis demonstrating the

perf.ormance degradation caused by branching in an

instruction pipeline. State all the assumptions and

explain each notation used. 8

(d) Derive the equations representing the following w.r.t.

superpipelined processors :

o Time required to exeiute N instructions

. The relationship between Speedup and Base

machine

Explicitly state the assumptions and explain each

7notation used.

2. (a) Explain any one directory-based protocol fof

network-connected multiprocessors, with the help of

a diagram.

(b) Explain five salient features of data flow computers. 5

(c) Consider the following pipeline reservation table :

1 2 3 4

Calculate forbidden latencies and greedy cycles for this

pipeline processor.

S1

s2

S3

X X

X

X

cs-12

Page 49: Mca

3. (a) List two differences between each of the following : 6(i) Crossbar versus multistage switches

(ii) Virtual channel vs. physical channel

(iii) Buffer deadlock vs. channel deadlock

(b) A computer system has a 12g byte cache. It uses a4-way set associative mapping with B bytes in eachblock. The physical address size is 32 btts. and thesmallest addressable unit is 1 byte. Answer thefollowing for this system :

. '(i) Show the mapping between physical addressesand cache addresses.

(ii) To what block frame of cache address will000010AF1u be assigned ?

(iii) If the addresses 00001OAFru and FFFFTAxyruare assigned to the same set, find the values ofx and y.

4. (a) Perform a data dependency analysis on the followingcode segment :

51 : Load R1, M(100)

52 : MOVE R2, R1

53 : Inc Rl

54 : Add R2, R1

55 : Store M(100), R1

Also draw the corresponding data dependencygraph.

cs-12 P.T.O.

Page 50: Mca

(b) Differentiate between a VLIW processor and a

superscalar processor' Also, explain the pipelining in

VLIW architecture, with the help of a diagram' I

5. (a) Explain the concept of overlapping register windows

in the SPARC architecture, with the help of 'a

diagram.

(b) What does 'context' mean with respect to a

multithreaded system ? With the help of a diagram'

explain multiple context prQcessors'

cs-12 25,000

Page 51: Mca

@lADCA / MCA (lll Year)

Term-End Examination

June, 2OOG

CS-l3 : OPERATING SYSTEMS

Time : 3 hours Mqximum Msrks: 75

Nofe : Question number 7 is compulsory. Answer anythree questions from the rest.

1. (a) What are the factors to be considered for an

effective disk space allocation strategy ? Also, explain

the indexing strategy for non-contiguous allocation of

disk space.

(b) Write and explain, Belady's Anomaly. Give an

example illustrating the anomalous behaviour of

FIFO.

(c) Explain the concurrent reader's and writer's

problem. Write an algorithm to solve it.

(d) Write and explain, Ricart and Agrawala's algorithm

for mutual exclusion in distributed svstems.

(e) Compare the LINUX opnruting system with

WINDOWS o/s with respect to features of open

source software.

cs -13 P . T . O .

Page 52: Mca

:

2. (a) Explain processor synchronization issues in a

Multiprocessor system with shared memory. 6

(b) Define process scheduling. What is the role of thescheduler ? List all the schedulers available, along

9with their working principles.

3. (a) Explain protection and sharing for the following : 8

(i) Paging system

(ii) Segmented system

(b) Write and explain an algorithm for deadlockprevention. 7

4. (a) Write and explain the Lamport's Bakery algorithm

Bfor inter-process synchronization.

(b) What is a digital signature ? Explain the method forgeneration and verification of digital signatures. 7

5. (a) Explain the Bell and La-Padula model of protection,

with an example.

(b) Explain the architecture of a Distributed File system,with special relerence to a client-server division oflabour.

c s - 1 3 20,000

Page 53: Mca

MCA (IIl Year)

Term-End Examination

June, 2006

CS-14 : INTELLIGENT SYSTEMS

Time : 3 hours Mqximum Marks : 75

Note : Question number 7 is compulsory. Attempt any

three questions lrom the rest.

1. (a) Define cognitive systems. Mention three differences

between cognitive systems and expert systems' 4

(b) Transform each of the following sentences into

disjunctive normal form ' 4

( i ) - ( P & Q ) & ( P v Q )

( i i l - P v - Q ) & ( R + S )

(c) Write three differences between Inductive Inference

and Abductive Inference mechanisms. Give one

application of each type of inferencing technique. 4

(d) Define the three Jechniques for indexing and retrieval

of knowledge from memorY. 3

(e) Explain 'script' in the context of knowledge

representation. Cteate a 'movie script'. Make

necessary assumptions. 5

cs-14 P . T . O .

Page 54: Mca

(f) How does the use of a heuristic function reduce thesearch space ? Suggest a good heuristic function foreach of the following : 6

(i) TravellingSalespersonproblem

(ii) 8 puzzle problem.

(S) Write an algorithm for matching substrings. 4

2. (a) Write a LISP code for finding roots of a quadratic

equation, ax2 + bx + c = 0, a # 0, a, b, c e R. 5

(b) Transform the following FOPL statements intoequivalent conceptual graphs : 5

(i) Vx Normal (x) & Grown (x) + Walk (x)'

(ii) Vy Haswings (y) & Layseggs (y) -+ Isbird (y).

(c) Explain the five levels of knowledge representation. 5

3. (a) Define objects and messages. Also give one examplefor each. 3

(b) Write a LISP function that will reverse the elements

of a list.

[eg. input l ist ((ab) (c(de))) , output l ist (((ed)c)(ba)) 5

(c) Name any four arc-relations used in an associativenetwork. Give an example displaying the three

4arc-relations.

(d) Apply the unification algorithm to the following set

of clauses :

l P ( X , Y ) n Q f i , j o e ) n R ( Y , Z ) ,

P (john, mary) n Q (john, A) n R (mary, A) ) 3

cs-14

Page 55: Mca

4. (a) Write and explain the various steps of the branch

and bound search technique. 5

(b) Define the following terms w.r't' heuristic search

algorithms ' 6

(i) Admissibility condition

(ii) Completenesscondition

(iii) Dominance property

(c) Give any four functions performed by a

comprehensive memory management system' 4

5. (a) What is a Distance Matrix ? How is it different from

the probabilistic'measures for matching ? 4

(b) Give ihe variable bindings, if any, which will make

each of the following pairs of lists match i 4

( i l ( .x ab(cd) .x), ((ef)ab .Y ef)

( i i ) (abc (da) f ) , (?x bc (d ?y) ?z)

(c) Consider the following problem :

You are given two jugs of capacity 4 gallons and

3 gallons. Neither has any measuring mark on it'

How can you get exactly 2 gallons of water into the

4 gallon jug ? Write production rules for the

problem and obtain the solution of this problem. 7

c s - 1 4 1 9 , 0 0 0

Page 56: Mca
Page 57: Mca

MCA (III Year)

Term-End Examination

June, ?OOG

CS-15 : RELATIONAL DATABASEMANAGEMENT SYSTEM

Time : 3 hours Mqximum Mqrks: 75

Note : Question no. I is compulsory. Answer ony threequestions from the rest.

1. (a) An organisation has multiple retail stores. Thesestores have to keep track of products, suppliers,customers and employees. Make an E-R diagram,

. stating the assumptions used, if any. I

(b) Explain multi-valued dependency with the help of anexample. How is it related to normalization ? Explainthis with the help of an example. 7

(c) Explain the major transaction states with a suitablediagram. Describe a suitable method using Locks, forhandling a large number of concurrent transactionsper minute in an online airline reservation svstem. 7

c s - 1 5 P . T . O .

Page 58: Mca

(d) Explain the significance and usage of views in . a

relational database system, with the help of suitable

examples. Explain any four constraints of updating a

fuple in a view.

2. (a) Define indices and their advantages in RDBMS.

Explain the concepts 'of

clustering and hashing

indices, using an example of each.

(b) Consider the relations :

GRADE (stud_id, subject_id, grade)

SUBJECT (subject-id, s-namd, teacher)

(i) Write the relational algebraic query for the

following :

. List the student number, subject names and

grades of the student whose id is 100.

' List the grades of all the students in the

subjects taught by teacher "XYZ".

(ii) Convert the queries above into an optimized

query graPh.

3. (a) Consider the following relations in the context of a

B P O :

Customer (C-code, C-name, C-phone)

Product (P-code, P-desc, P-price)

Call (Ca-id, C-code, P-code, Ca-result, Ca-date)

c s - 1 5

Page 59: Mca

Write the appropriate SQL commands for the

following :

(i) Find the name of customers to whom a call is

not made.

(ii) Find the total number of calls made to the

customer wn'ose name is 'Smith'.

(iii) List C-name and P-desc of the calls made

today.

(iv) Find the product details of those products

whose price is above average.

(b) A university maintains database tables about the

faculty and the students'

FACULTY (f-id, f-name, subject-id )

STUDENT (S-id, S-name, S-course, S-dob)

MARKS (S-id, subject-id, marks)

Constraints ' One faculty teaches only one subject'

(i) Identify suitable access rights for the faculty,

students and database administrator'

(ii) Create the access matrix for (i) above'

(iii) Write the query modification statement for the

students.

4. (a) Explain the three problems of concurrent

transactions in RDBMS, with suitable examples' 5

(b) What is a timestamp ? How does the system

generate timestamps ? Explain the timestamp

ordering protocol for concurrency control' 5

c s - 1 5 P . T . O .

Page 60: Mca

(c)

(d)

Explain the different time components involved inaccessing a disk block.

"The decomposition of a relation into BCNF isalways dependency preserving." Is this statementtrue ? Give reasons for your answer.

Explain the following terms with the help of anexample or diagram :

(i) Data independence

(ii) Security in statistical databases

(iii) Serialisability

(iv) Closure of an FD

Suppose the write ahead Log Scheme is being used.Give the REDO and UNDO processes in the strategyof writing the partial update made by a transactionto the database, as well as in the strategy of delayingall writes to database till the commit.

5. (a)

1 0

(b)

4cs-15 19,000

Page 61: Mca

ADCA / MCA (lll Yr)

Term-End Examination

June, 2OOG

CS-16 : OBJECT ORIENTED SYSTEMS

Time :3 hours Maximum Mqrks: 75

Note : Question no. I is compulsory. Answer any threequestions from the rest.

l. (a) A library in a university is having provision to issue

books to students and staff . It collects different

penalties from both categories in case of late return

of books. The library also manages different registers

which hold information about members, books,

magazines, newspapers, penalties collected, etc.,

manually. The library needs a system to maintain the

registers as well as for performing transactions such

as issue and return of books, etc. Identify classes for

the system and draw the class diagram. Add three

attributes and three operations to the classes. Explain

the classes as well as associations, if any.

Make assumptions, if necessary. 70

c s - 1 6 P . T . O .

Page 62: Mca

(b)

(c)

Identify at least five classes in a Railway ReservationSystem, and show their related associations.

Explain the following terms, with an example ofe a c h :

(i) State Diagrams

(ii) Generalization

(iii) Abstract Classes

Draw an E-R diagram and show the relationshipsbetween various entities like Student, College,Teacher, Hostel, Library of a IJniuersityInformation System. The diagram should alsoinclude attributes.

Make necessary assumptions wherever necessary.

Prepare an object diagram, showing at least fiverelationships among the following object classes :

School, Playground, Principal, Board, Classroom,Book, 'Student, Teacher, Cafeteria, Rest room,Computer, Desk, Chair, Ruler, Door, Swing.

Include associations, aggregations andgeneralizations. Use qualified associations and showmultiplicity balls in your diagrams. You do not needto show attributes of operations. Use associationnames where needed.

What is a Recursive aggregate ? Explain this with anexample.

(d)

2. (a)

1 0

(b)

cs-16

Page 63: Mca

3. (a)

4. (a)

5. (a)

(b)

Define a Scenario. Give an example of a Scenario.

Also, define an Event trace and give an example of

i t .

Draw a Data Flow Diagram for computing the

volume and surface area of a cylinder. Inputs are the

height and radius of the cylinder. Outputs are volume

and surface area. 1 0

(b)

Explain five differences between

methodology and the structured

development approach.

For each of the following systems,

relative importance of the three

modelling :

(i) Telephone Answering machine

(ii) Typewriter

an OMT

software

identify the

aspects of

1 0

What is Overriding ? How is it different from

Overloading of functions ? Explain two situations in

which one would need to use overriding, with an

example of each.

What is encapsulation ? Explain the need for

encapsulation, using an example.

1 0

(b)

c s - 1 6 23,000

Page 64: Mca
Page 65: Mca

ADCA / MCA (II Year)

Term-End Examination

June, 2006

CS-51 : OPERATIONS RESEARCH

Time: 3 hours Maximum Mqrks , 75

Nofe : Question number 7 is compulsory. Attempt any

three more questions from questions numbered

2 t o 5 .

1. (a) 3 items are to be loaded onto a truck whose capacity

is 10 tons. The weighi per unit (w,) and value per

unit (v,) of each item is given in the following table :

Assume that only integral units of the items can be

loaded. The value of the load carried is to be

maximised.

(i) Formulate this situation as an integer

programming problem.

(iil If the problem is to be solved by dynamic

programming, write the general recursion for this

problem. 4

i vi wi

1 5 2

2 6 3

3 4 1

CS-51 P.T.O.

Page 66: Mca

(b) Find the range of values of p and q"which will renderthe entry (2, 2) a saddle point for the game

Player B

81 82 83

A, 12 6 5-l' l lPlayer A O,

lo Z 101t l

A 3 L 6 p 4 )

Are there values for p, q that will make (3, 1) asaddle point ? Justify your answer . 4

(c) Which of the following statements are true ? Givereasons for your answers. j

(i) The feasible region for any Lpp is non-empty.

(ii) If a random variable takes two values 0 and 1

with probabilities 1 =

x und

11", then x can

2 2take any real value.

(iii) The function f, defined by (x) = /n x V x > 0,is a convex function.

(iv) For a two person zero sum game with thepay-off matrix A, max min a.. >* min max a...

i j ' J j i i j

cs-51

Page 67: Mca

(d) My diet requires that all ihe food I eat come

from one of the four "basic food groups" (ice cream,

soda,/cola, biscuits and cake). At present, the

following four food items are available for

consumption : biscuits, chocolate ice cream, cola and

cake. Each biscuit costs 50 p, each scoop of

chocolate ice cream costs Rs. 10, each bottle of cola

costs Rs. 10 and each piece of cake costs Rs. 5.

Each day, I must consume at least 500 calories,

6 grams of chocolate, 10 grams of sugar and

8 grams of fat. These contents per unit of each food

is given below.

Food CaloriesChocolate

(grams)

Sugar(grams)

Fatgrams)

Biscuit (,zunit)

Chocolate icecream (/scoop)

Cola (/bottle)

Cake (/piece)

400

200

150

500

3

2

0

0

2

2

4

4

2

4

1

5

Formulate an LP model that can be used to satisfy

my daily consumption requirement at minimum cost.

(e) Solve the following LPP by simplex method.

Max 4x, + 3x,

subject to x, + *2 . 8,

2 x r + x r > 1 0'

x 1 , x 2 > 0

4

7 0

CS-51 P.T.O.

Page 68: Mca

2. (a) Data are gathered on the sale of TV sets at a retail

shop over 100 days. They are compiled and

presented below.

No. of sets sold Frequency of days

1

2

3

4

5

6

7

5

15

20

30

1 8

9

3

Work out the expected (mean) number of sets sold

per day.

Solve the following LP by graphical method : -

M a x i m i z e z = x 7 + x 2

s.t. 2x, + 3x, < 16

x r + 4 x r > 1 0

x | x r 2 0

CS-51

Page 69: Mca

An average of 10 customers per hour arrive at abank with only one teller. The average service timefor each customer is 4 minutes. Assume that bothinter-arrival times and service times are exponentiallydistributed.

(i) Which category of queuing models does this

situation fall in ?

(ii) What is the probability that the ieller is idle ?

(iii) What is the average number of waitingcustomers ?

List three major limitations of the PERT model.

3. A car rental company is faced with an allocation problem

resulting from rental agreements that allows cars to bereturned to locations other than those at which theyoriginally rented. At the present time, there are twolocations (sources) with 15 and 13 cars surplus,respectively, and four locations (destinations) requiring 9, 6,7 and 9 cars, respectively. The transportation cost (in Rs.)of a car between the locations are as follows :

Formulate the above as an LP (Transportation Problem),

and obtain an initial basic feasible solution. Further,

identify the destination that will receive a supply less than

required, and the amount it receives. 15

(c)

5

3(d)

Destinations

CS-51 P.T.O.

Page 70: Mca

4. (a)

(b)

Four different jobs can be carried out on any of

the four machines. The matrix below gives the cost

(in Rs.) of processing job i on machine j.

How should the jobs be assigned to machines (one

iob to one machine) so that total processing cost is

minimum ?

A machine produces lOo/o defective items. Denote a

good unit by G and a defective unit by B. Carry out

simulation to identify each of the 15 coniecutive

units produced as G or B.

I Use the sequence of random digits :

4076486653 8950826528 4934582003 l

How many G's and B's are produced ?

A shopping plaza is in the shape of a rhombus with

vertices A (- 1, 0), B (0, 1), C (1, 0), D (0, - 1). A

phone booth is to be located at a point P in the

plaza so that the sum of the squares of its distance

from all the vertices is minimum.

(i) Formulate this situation as a quadratic

programming problem.

(ii) Write the Kr-rhn - Tucker conditions for this

problem.

(c)

Machine -+

Job JM 1 M2 M3 M4

J1 5 7 1 1 6

J2 8 5 9 6

J3 4 7 10 7

J4 1 0 4 8 3

CS-51

Page 71: Mca

5. (a)

(c)

The daily demand for a commodity is approximately100 units. Every time an order is placed, a fixed costof Rs. 100 is incurred. The daily holding cost per

unit inventory is Rs. 0.02. Determine the economiclot size.

Write down the dual of the following LP (primal)

problem :

Maximize z = l2xt + 3x, - x,

s. t . 10x, + 2x, + x, > 100

7 x r + 3 x " + 2 x r < 7 7

2 x r + 4 x r + x r < 8 0

* 1 a 0 , x , x r 2 0 .

Two companies A and B are competing for themarket of the same product. Their differentstrategies are given in the following pay-off matrix.

Company B

81 82 83

A1 12 -2 olCompany A | |

A2 L1 2 3l

Determine the best strategies, and find the value of

the game.

(d) Explain three limitations of operations research. 3

CS-51 17 ,000

Page 72: Mca
Page 73: Mca

ADCA / MCA (lI Year)

Term-End Examination

June, 2006

CS-54 : FINANCE & ACCOUNTING ONCOMPUTERS

Time :3 hours Mqximum Mqrks : 75

Note : Question number 5 is compulsory. Attempt any

three questions from the rest.

l. (a) Explain, in detail, the following accounting

concepts :

(i) Cost concept

(ii) Accrual concept

(iii) Consistencyconcept

(b) "Accounting is closely concerned with control"'

Explain the statement. Discuss the role of

accounting feedback in the process of control. 6

cs-54 P . T . O .

Page 74: Mca

2 . From the following balances taken from the books of M/s

Ram Kishore & Co, prepare a Trading and Profit & Loss

account for the year ending December 31tt, 2004 and

balance sheet as on that date. 1 5

ParticularsAmountRs. (Dr)

AmountRs. (Cr)

Stock (1.1.2004)

Debtors & Creditors

Purchases and Sales

Returns

Drawing and Capital

Fire insurance premium

Life insurance premium

Income tax paid

Bills receivable andpayable

Sales tax payable

Wages and Salaries

Telephone expenses

Sales promotionexpenses

Cash & Bank overdraft

Audit fees

17,000

25,000

89,000

17,000

8,000

2,000

5,000

10,000

14,000

18,000

3,000

21,000

5,000

8,000

22,O00

1 ,15 ,000

12,000

1,25,000

16,000

12,000

14,000

cs-54

Page 75: Mca

Particulars AmountRs. (Dr)

AmountRs. (Cr)

Discount

Investments

Interest on investment

Interest on bankoverdraft

Rent paid

Bad debts recovered

4,000

60,000

6,000

12,000

1,000

5,000

2 ,000

Total 3,24,000 3,24,000

Closing Stock as on 31st December. 2004 amounted toRs. 25,000.

3. Explain, in detail, the features of an appropriate capital

structure. Also explain the various factors which determine

and influence the capital structure of a firm. Js

4. (a) Examine different classes of capital projects.

Explain why they are approached differently.

(b) Explain the concept of Zero Base Budgeting, Also

give four of its advantages and three disadvantages.

I

.-'

cs-54 3 - P , T . O .

Page 76: Mca

5. (a) The following figures relate to a company

manufacturing a varied range of products :

ParticularsTotal Sales

(Rs.)Total Cost

(Rs.)

Year ended31't March. 2003

22,23,000 19,83,600

Year3 1' '

endedMarch, 2004

24.51.000 27.43,200

Assuming stability in price with variable costs carefully

controlled to reflect predetermined relationships and

an unvarying fixed cost, calculate

(i) . The Profit Volume ratio

(ii) Fixed Costs

(iii) Fixed Costs percentage to Sales

(iv) Break even Point(v) Margin of Safety for the year 2003 and 2004' 75

(b) XYZ Ltd. manufacturer of industrialvalves provides the

following information for the year ended 3ltt March,

2005.

Particulars Per unit Total

Sales (15,000 valves) (i)

Production Overheads

Variable

Fixed

(ii)

Gross Profit

Administration, selling anddistribution overheads (Fixed)

Net Profit

25 3,75,000

1 5

3

2,25,000

45,000

1 8 2,70,000

L,05,000

32,000

73,000

' 4cs-54

Page 77: Mca

Particulars Quarter Total

II II IV

OpeningStock

2,000 1 ,000 4,000

Production 6,000 4,000 5,000 3,000 18 ,000

Sales 4,000 5,000 2,000 4,000 15 ,000

ClosingStock

2,000 1,000 4,000 3,000 3,000

The actual Sales, Production and Stocks for the yeay are

as under :

You are required to prepare

profitability on the basis of

Marginal Costing.

quarterly

Absorption

statements of

Costing and

1 5

cs-54 18 ,000

Page 78: Mca
Page 79: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-O11 : PROBLEM SOLVING AND

PROGRAMMING

Time: 3 hours

Note : Question number 7 is compulsory. Attempt any

three questions from the rest'

1. (a) Design an algorithm, draw a corresponding flow chart

and write a program in C, to print the fibonacci

series.

(b) Write a program that does not use the inbuilt string

functions to perform the following :

(i) To compare two strings

(ii) To'copy a string

(c) Design an algorithm, and write a program to find ihe

factorial of a number using recursion.

Maximum Morks : 700

(Weightage 75o/o)

1 0

1 0

1 0

M C S - o 1 1 P . T . O .

Page 80: Mca

(d) A C program contains the following declarations :

int i, j;

long iX;

short S;

float X;

double dX;

char C;

Determine the resultantfollowing expressions :

( i ) i + C

( i i ) X + C

(iii) dX + X

(iv) ((int) dX) + iX

( v ) i + X

( v i ) S + j

(vii) iX + j

(viii) S + C

(ix) iX + C

( x ) i + j

data type of each of the

1 0

2. (a)

(b)

Summarize the purpose of the format strings (likeo/os, o/od, o/oc) that are' comrnonly used within theprintf function, with an example for each.

When can two matrices of order a x b and c x d besubtracted ? Also write a program in C to find thedifference of two such matrices.

1 0

M C S - o 1 1

7 0

Page 81: Mca

3. (a)

4. (a)

5. (a)

(b)

Design an algorithm, draw a corresponding flow

chart and write a C program to check whether agiven string is a palindrome or not.

Explain the meaning of each of the following

functions prototypes and mention the return data

type of each of them :

(i) double f(double a, int b);

(ii) void f(long a, short b, unsigned c);

(iii) unsigned f(unsigned a, unsigned b);

(iv) int (-f) (char*, int);

(v) int * f(charo, int);

What is the difference between a function and a

macro ? Find the largest number among two

numbers using a function definition as well as a

macro. Which is more efficient in terms of execution

time and code size ?

Write a program to sort a list of strings in

alphabetical order, using an array of pointers.

Wiite a program, using 'structures', to calculate the

gross salary and net salary, if the details of an

employee along with the basic pay, attendance and

deductions are given as input.

Write a program to count the number of characters,

number of words and number of lines in a given file.

1 0

7 0

1 t 1I U

1 0

1 nt v

1 n

(b)

(b)

M C S - o 1 1 1 1 , 0 0 0

Page 82: Mca
Page 83: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-012 : COMPUTER ORGANISATION &ASSEMBLY LANGUAGE PROGRAMMING

Time : 3 hours Mqximum Mqrks: 700

(Weightage 75o/o)

Alote : Question no. I is compulsory. Attempt anythree questions Jrom the rest.

l . (a) Construct the Karnaugh map for the following

function, and find the function in sum of producl

form. Draw the resultant logic diagram.

F(A, B , C, D) : > (0 , 2 , 4 , 5 , 6 , 7 , 8 , 70 , 13 , 15)

Draw the logic diagram for a 4 x 4 random accessmemory. Assume that the cells of RAM are made ofR - S flip-flop.

Seek time on a hard disk is 50 ms. It rotates at aspeed of 3000 rotations/sec. Each track on the diskhas 100 sectors. Find the average access time forthe disk.

(b)

(c)

MCS-O12 P.T.O

Page 84: Mca

(d) Explain, with an example of each call, any five DOS

function calls supported by INT 21H in the 8086

assembly language. 10

(e) Explain, with an examPle, the

logic-microoperations :

(i) Selective comPlement

(ii) Mask operations

following

(iii) Insert

(iv) Clear

What is the need of master slave flip-flop ? Explain

its functioning with the help of a suitable diagram'

Write a program to evaluate the following expression

using an accumulator machine :

A = B + C " D . E + F

How can ihe subtraction operation on binary numbers

be achieved by using addition operations only ?

Explain this, using a 4-bit binary number.

(0

(g)

2. (a)

(b) Construct a 4-bit right-shift register with serial

input-output using D flip-flops. Describe its

functioning.

(c) What is a micro-instruction ? Explain the three

micro-instruction formats, with the help of suitable

diagrams. 10

5

MCS-012

Page 85: Mca

3. (a)

4. (a)

(b)

5. (a)

(b)

(c)

Explain the process of handling an interrupt thatoccurs during the execution of a program, with thehelp of an example.

Write a program in 8086 assembly language thatchecks an input string against a password stringstored in the memory and outputs an appropriatemessage if the strings are not equal.

What is the significance of FAT ? What are thelimitations of FAT 16 ?

What is the sequence of micro-operations required tofetch an instruction ?

Explain any five addressing modes used in an 8086microprocessor, with the help of an example ofeach.

Assume a computer has 32 word RAM each havinga word of 16 bits and a cache memory of 4 blocks,with each block having 16 bits. Where can we find amain memory address 21 in the cache (if it exists) if

(i) Set associative mapping is used ?

(ii) Direct mapping is used ?

(iii) Associative mapping is used ?

Explain your answers with the help of a diagram ineach case.

Write an 8086 assembly language program that findsthe largest,'and the second largest number from a listof 10 numbers stored in the memorv.

(c)

1 0

MCS-012 P.T.O.

Page 86: Mca

(b) Draw the logic diagram of a full adder. Create a 2-bit

adder-subtractor circuit using the block diagram of

the full adder. 6

(c) Explain the following with the help of an example or

a diagram, whichever is appropriate : I

(i) Parity bit

(ii) Floating point notation

(iii) Refresh rates in video controllers

(iv) An l/O channel

MCS-O12 1 1,000

Page 87: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-013 : DISCRETE MATHEMATICS

Time : 2 hours Mqximum Marks: 50

Note : Question number 7 is compulsory. Attempt any

three questions from the rest.

l. (a) Prove (p + q) = (-p v q) using a truth table. 2

(b) Express the following statement using existential

quantifiers : 2

-(vx P(x))

(c) Give a direct proof of the statement "The cube of

an odd integer is odd". 4

(d) Find the logic circuit corresponding to the statement

( (x , v x r ) 'n (x , A x i ) ' ) ' S

(e) Let f and g be functions defined by f(X) = x2,

Sfi) = x * 1. Check whether foS(X) = gof(X). 3

MCS-o13 P.T.O.

Page 88: Mca

(0 In how many different ways can a 7-personcommittee be formed containing 3 women and4 men from amongst a group of 20 women and30 men ?

(g) How many numbers between 1 and 100, both

inclusive, are there which are divisible by 2 or 5 ? 3

2. (a) Let A and B be n x n matrices. Check the truth value

of the following statements : 5

( i ) l B v A 1 ( A + B ) = A l

(ii) lB VA [A + B = 1,.,1

where I,., is the n x n identity matrix.

(b) Let A = 17, 2, 3, 4, 5lr. Let R be a relation defined

on A such that aRb iII a + b. Check if R is a 3

(i) Reflexive relation

(ii) Symmetricrelation

(iii) Transitive relation

(c) For the sets A, B, C represent

. ( i ) A u ( B n C )

( i i ) A A B

using Venn diagrams. 2

3. (a) Prove by mathematical induction that

1 3 + 2 3 + 3 3 + . . . * n 3 _ n 2 ( n + 1 ) 24

MCS-O13

Page 89: Mca

(b) For the boolean algebra

( { 0 , 1 1 , A , V , ' )

evaluate the boolean expression

E(X1, X2, X3) = (X1 v X2) (X i vX;)n(X, vXr) '

f o r X r = 0 , X 2 = 1 , X 3 = 0 .

(c) Four cards are chosen randomly from a pack of

52 cards. What is the probability that all four are

kings ?

4. (a) Using truth tables, check if each of the following is

a tautology or not.,

( i ) ( q n p ) v ( q n - p )

(ii) p ^ -p

(iii) q -+ (q --> p)

(b) Differentiate between a theorem and a conjecture.

Also give an example of a famous conjecture which

is not a theorem.

(c) Use Pascal's triangle to find 7C'

(d) Define a multinomial coefficient.

MCS-013 P.T.O.

Page 90: Mca

5. (a)

(c)

(d)

For the following functions defined in tabular form

below, find the boolean expression in CNF and

DNF.

Show that in a group of 100 people we can alwaysfind 9 people who were bom in September.

Define a partition, and find Pu3.

Find the number of 4-letter words which can beformed using the English alphabet. How many will

begin with a vowel ?

x1 x2 x3 f(x1, x2, x3)

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 1

1 0 0 0

1 0 1 1I

1 1 0 1

1 1 1 0

MCS-O13 1 1,000

Page 91: Mca

\ MCA (Revised)

Term-End E>ramination

June, 2006

MCS-014 : SYSTEMS ANALYSIS ANDDESIGN

Time: 3 hours Maximum Mqrks : 700

(Weightqge 75o/o)

Note : Question number 7 Is compulsory. Answer any

three questions from the rest.

l. (a) What is a System ? List the various types of systems

and explain each of them in detail.

(b) Explain the role of a system analyst in software

development.

(c) Differentiate between the following :

(i) Coupling and Cohesion

(ii) Decision tree and Decision table

(iii) Alpha Testing and Beta Testing

(iv) Forward Engineering and Reverse Engineering

1 0

7 0

MCS.O14 P.T.O.

Page 92: Mca

(d) Consider the following situation :

A bank offers two types of savings accounts, Type A

and Type B. For the Type A account, the bank pays

a dividend on the account balance at the end of eachquarter. The balance can be insured. The insured

amount gets 8'750/o annual interest. The uninsured

amount gets 5'00o/o annual interest.

For the Type B account, dividends are paid monthly

on an average daily balance for that month. No

dividend is paid for a balance below Rs. 2,000,/-,

otherwise 50lo interest is paid on the first Rs. 5,000/-,

5'5%o on the next Rs. 20,000/- and 7o/o over

Rs. 25,000,/-.

Draw a decision table and a decision tree for this

situation.

What is a feasibility study ? Why is it important for

system design ? How does cost benefit analysis

contribute in it ?

Define logical design of a system. How is it

performed ? Describe the relationship between data

mining and logical design. Also, describe a tool for

data mining

What is a CASE tool ? How are CASE tools

important for an organization ? List the advantages

and disadvantages of CASE tools.

1 5

2. (a)

3. (a)

1 0

(b)

7 0

MCS-O14

Page 93: Mca

(b) What is the importance of studying the maintenanceof a system ? Explain the various types of systemmaintenance in SDLC.

(c) Explain information security architecture, with thehelp of a suitable diagram.

4. (a) What are the risks and threats involved in a systemsecurity ? Also, briefly describe 3 risks and 3 threats. 10

(b) What are the mbthods for gathering the userrequirement ? What problems are encountered whenusing these methods ? 10

5. (a) Explain five components required to construct aDFD.

(b) Construct the zero level and first level DFDs for theproblem of "on line examination".

(c) Explain four reasons for the need of documentationof a system.

MCS-O14 1 1,000

Page 94: Mca
Page 95: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-O15 : COMMUNICATION SKILLS

Time : 2 hours Mqximum Marks: 50

Note : Answer sll questions.

l. Read the following passage and answer the questions givenafter it :

Finally, a virus infects a worm and it has nothing to

do with computers. But it does have a lot to do withhumans. Courtney Wilkins, a microbiology andimmunology student at the University of Arkansas,

successfully infected the ... elegans earthworm with themammalian vesicular stomatitis virus and had it replicate.

Others had tried and failed before and Wilkins'

breakthrough will let researchers learn more about howviruses move from one host to another, and whatproteins they attach to in humans. Some cells in Celegans, a microscopic earthworm comrhonly used inbiomedical research, are similar to some human cells.

1 iM C S - o 1 5 P . T . O .

Page 96: Mca

"There were a lot of labs interested in whether this

could work, so it just seemed pretty exciting,l' she said.

Since January 2002, Wilkins began siudying whether she

could infect the worms with a virus and have the virus

spread. She usually worked with muscle or intestinal cells

and eventually settled on using the vesicular stomatitis

virus. The virus is related to rabies and similar to

foot-and-mouth disease and mostly infects livestock,

Wilkins said. It took three to four months to establish the

cell cultures. Khaled Machaca, one of Wilkins' advisers

and a professor of cell biology,. said the experiment

wasn't without its rough spots. He said that there were

points when he had to remind Wilkins that her decision

to undertake the research was a risky one, because it was

unknown whether it would work. And that meant Wilkins'

degree was at stake, because her career could be stopped

if nothing came of the research, he said.

After two years, it was clear that Wilkins was

successful in her experiment. Wilkins remeinbered

discovering about 9 pm, one night in 2004 that the VSV

had replicated inside the worm cell. She immediately

called Marie Chow, a professor of virology and another

advisor. "Courtney gets so excited that she starts to

stutter," Chow-said. "She couldn't get the words out, so

we knew there was something to it," she said.

MCS-o15

Page 97: Mca

(i) How was the research mentioned in the passage a

risky proposition ? 2

(iil Whai was the outcome of the research ? 1

(iii) What was the researcher's.reaction to the outcome

of the research ? Why was it so ? 2+2

(iv) Find out a word from the passage which has similar

meaning as 'spread'. 7

(v) Use 'livestock' and 'rough spots' in a sentence each

of your own to bring out their specific meanings. 2

2. Fill in the blanks choosing the most suitable word from the

choices given : 5

(i) They moved their new house two years

back. (round /on/over /into)

(ii) Be careful. Your gun should not go

accidentaily. (away I oII / ov er / on)

(iii) The Government was determined to push ihe

legislation . (through/in /on/oII)

(iv) I ran an old friend in Amsterdam.

(out/th rough / into / upi

(v) The flight could not take -- in time

because of the fog. (on,/off /up/awag)

3. Write down the text of a group discussion between four

participants on the need for more strict quality control

1 0measures in India. (About 500 words)

MCS-o15 P . T . O .

Page 98: Mca

4.

5 .

You are Nihal Chand, Managing Director, Purifiers IndiaLtd. Write a Memo to all the three Managers (Sales,

Production and Finance) to hold a meeting with them, in aweek's time, for the yearly review of the Company.

Write a letter of application, together with your CurriculumVitae (CV) for the job in response to the followingadvertisement :

"COBOL Programmers, with minimum 2 years'experience required by a well-known Data ProcessingCompany in Delhi. Apply within 10 days to Box 65, NewDelhi - 110068.

1 0

7 5

M C S - o 1 5 1 1 ,000

Page 99: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-021 : DATA AND FILE STRUCTURES

Time :3 hours

Note: Question number 7 is compulsory. Attempt any

three questions from the rest. AII algorithms

should be written nearer to 'C language.

1. (a) Calculate the complexity of the following code by

using Big 'O' notation :

1. scanf ("%d", &n);

2. for ( i :1, m=n+66; i<:m; i++)

3. pr int f ("%d\n", i ) ;

4. for (j:n/27, m:n/5; j<:m; j++)

5. printf ("%d\n", j);

Also compute the overall complexity of the given

code.

(b) Derive the expression for computing the height of a

complete binary tree. Also, compute the height of a

complete binary tree of 1024 nodes.

Maximum Marks : 700(Weightase 75%)

7 0

MCS-021 P,T.O.

Page 100: Mca

1 0

1 0

(c)

(d)

(e)

Write a program to delete the leftmost node from a

doubly linked list.

Construct a heap for the list given below. Clearly

indicate the changes in each step.

4 , 2 , 7 , 7 , 6 , 5 , 9 , 3 , 9 9 , I

Show that the lower orderefl terms and the constant

terms do not matter in computing the complexity of

the algorithm in Big 'O' notation.

Write a program to create an AVL binary tree, insert

an element into the tree and display the tree.

Write five differences between :

(i) Sequential file and Index file

(ii) Linear Data structure and

structure

Data

Consider the matrix

l z 3 1 lt tt l

A = 1 1 2 0 lt lL1 3 1Js . s

(i) Write the steps involved in calculating the ranlc

of A.

(ii) Write an algorithm to find the transpose of A.

Write an algorithm to implement binary search.

2. (a)

(b)

3. (a)

(b)

MCS-021

1 0

5+5

Nonlinear

5

5

1 0

Page 101: Mca

4. (a) (i) How does DFS algorithm differ from BFSalgorithm ?

(ii) What are the steps of DFS algorithm ?

(iii) Give two examples each of applications inwhich the BFS and DFS algorithms,respectively, are implemented. 10

(b) Write an algorithm each for PUSH & pop

operations on a stack, implemented using linked list. 10

5. (a) Explain Dijkstra's algorithm with the help of anexample. Which shortest path algorithm is the mostefficient ? And why ?

'

(b) Write the quick sort algorithm. Further, use the inputnumbers given below in the algorithm, and show-each and every step of the algorithm.

7 , 6 , 7 , 0 , g , 72 , 3 , 2 , 5 , 2g

1 0

1 0

MCS-021 5,000

Page 102: Mca
Page 103: Mca

MCA (Revised)

Term-End Examination' June, 2006

MCS-022 : OPERATING SYSTEMCONGEPTS AND NETWORKING

MANAGEMENT

Time : 3 hours Mqximum Marks: 700

Note : Question number f. is compulsory. Answer anythree questions t'rom the rest.

l. (a) Describe the structure of 5 classes of IP addresses. 5

(b) Differentiate between the following concepts : 6

(i) Multiprogramming

(ii) Multitasking

(iii) Multiprocessing

(c) Write a shell script that prints a list of every uniqueword in a file, in reverse alphabetical order. 6

(d) Explain the function of the following : 4

( i ) L S - L

(ii) /etc/shadow Iile

MCS-022 P.T.O.

Page 104: Mca

(e) Define the concepts of domains, workgroups and

trusted relationships in the context of Windows

2000.

(f) What is Kerberos ? Describe Kerberos management

in the Windows operating system.

k) Describe two types of back-ups.

(h) Differentiate between virtual circuit and datagram

approaches to packet switching.

2. (a) Explain four basic design issues in a multimedia

operating system.

(b) Differentiate between theTCP/lP and OSI relerence

models, and map the layers between the two

approaches.

(c) How would you set the IP address of a LAN card in

Lintx ?

3. (a) Describe the various security features in the Windows

2000 operating system. Further, explain the

difference between the security features of an OS and

of a network. 10

(b) Describe the steps needed to configure the network

file sewer in the LINUX operating system; .- 5

(c) Explain the drawback of LINUX. 5

6

5

MCS-022

Page 105: Mca

4. (a) Describe the GUI features of Linux. Also explain the

corresponding GUI features of Windows 2000.

Further, compare the usefulness of these features. 10

(b) Describe two features of the Intrusion Detection

5System (lDS).

(c) What are the requirements for a user to be able to

kill a process in Linux ? Write the necessary

commands. 5

5. Describe the following : 20

(i) Fault tolerant system

(i i ) sNMP

(iii) IPSec

(iv) Architecture of the Windows 2000 operating system

MCS.O22 5,000

Page 106: Mca
Page 107: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-023 : DATABASE MANAGEMENTSYSTEMS

Time : 3 hours Maximum Mqrks : 700(Weightage 750/o)

Nofe : Question no. I is compulsory. Attempt anythree questions from the rest.

1. (a) Consider the following requirements of a company :

(i) The company is organized into departments.

Each department has a name, a unique number,

and a particular employee who manages the

department.

(ii) A department controls a number of projects,

each of which has a name, a unique number

and a single location.

(iii) An employee has name, id#, address, salary,

sex, and bdate. An employee is assigned to one

department but may work on several projects.

MCS-023 P.T.O

Page 108: Mca

(b)

(iv) We are keeping track of the dependents of

each employee for insurance purposes. We

keep each dependent's name, sex, birthdate,

relationship to the employee. Draw the E - R

diagram for the company. Make suitable

assumptions, if any. Fxplain all the relationships

in your E - R diagmm w'r-t. relationship

cardinality and participation constraints'

Given the relation (R) shown below, state wh6iher

or not the following functional dependencies are

satisfied by the relation or cannot be determined. Give

reasons for your answers.

A + B, A -+ C, AB -+ C, C + A, BC -+ A,

A C - + B , B - + A

fxplain five differences between the' database

approach and the file based approach'

(c)

r(R)

A B C

1 4 2

3 5 6

J 4 6

7 3 8

9 1 0

MCS-023

Page 109: Mca

i

(d) Consider the following relational schema :

STUDENT (sname, Phone, dob, s-id)

COURSE (1$, c-tame, credit, teacher-id)

RESULT (s-id, c-id, marks)

Formulate the SQL queries for the following : 70

(0 Find the names of the students whose results are

not declared in anY course.

(ii) Find the teachers who are teaching more than

one course.

(iii) Display the name and marks of those students

who were born before '1-1-1985' and have

scored more than 80 mark in any course'

(iv) Find the details of students securing pass marks

(50%) in more than 3 courses.

(v) Find the total number of credits earned by a

student whose id is 10'

(e) What is serializability ? Explain this with the help of

an example. How is it related to concurrency

control ? 5

(fl What are two advantages and one disadvantage of

data replication ? Explain the classification of

replication. 5

2. (a) Consider a relation R with five attributes A, B, C, D

and E, having the following FD's :

A - + B , B C + E , a n d E D - + A .

(il List anY two candidate keYs of R'

(ii) Is R in 3NF ? ExPIain'

(iii) Is R in BCNF ? ExPlain. 10

MCS-023 P.T.O.

Page 110: Mca

(b)

(c)

Describe the 3-tier client-server architecfure. List 4advantages of client-server architecture.

What is data independence ? How can_you achieve

data independence ? Explain this with the help of anexample.

Explain primary, secondary and clustering indices,

with the help of an example each. Give a situationwith justification, in which multi-level indices arerequired.

Write a pseudocode of two different types ofconcurrent transactions that may be executed in aRailway reservation system. What are the concurrency

related problems that may be encountered inconcurrent execution of the transactions above ?

What is a checkpoint ? How is it useful for theprocess of recovery ? Explain this with the help ofsuitable example.

What is an Inverted file organization ? Explain thiswith the help of an example. What are itsadvantages ?

What are the different levels of security for databasesystems ? What is the relationship between securitgrand integrity ?

3. (a)

4. (a)

1 0

(b)

1 0

(b)

(c)

MCS-023

Page 111: Mca

5. Explain the following in the context of DBMS, with thehelp of an example or diagram :

(i) Views

(ii) Referentialintegrityconstraint

(iii) Database manager

(iv) Data dictionary

(v) Strict 2-phase locking

MCS-023 5,000

Page 112: Mca

J

Page 113: Mca

trcs{r-lMCA (Revised)

Term-End Examination

June, 2006

MCS-024 : OBJECT ORIENTEDTECHNOLOGIES AND JAVA

PROGRAMMING

Time : 3 hours Maximum Marks: 700

Note : Question number 7 is compulsory. Attempt any

three questions from the rest.

l. (a) Explain the concept of Polymorphism. Also, give an

example of a Polymorphism. 5

(b) What is an object ? How are objects and classes

associated with each other ? Also give two

advantages of messages passing between objects. 5

(c) When can an object be used as a reference of

another object ? What care should be taken in such

kind of referencing ? Your explanation should be

supported by an example. 5

(d) What is multilevel inheritance ? How does it differ

from multiple inheritance ? Also give an example of

multiple inheritance. 5

MC5-024 P.T.O.

Page 114: Mca

(e)

(f)

What are the five issues that are to be taken care of

while overriding a method ?

Explain the concept of Multithreading with the help

of a diagram. Also, give at least two advantages of

Multithreading.

Give the reasons why the main( ) method in Java is

defined as public and static. Also explain, why the

name of Java class containing the main( ) method

has the same name as the name of the file in which

it is stored.

Where does the Applet class appear in the

hierarchy of Java classes ? Show this through a class

hierarchy diagram.

Explain the eight basic features of Java.

What is a Package ? Explain the process of defining

your own package, with the help of an example.

Write the syntax, and explain, any four constructors

of the String class.

Explain the order of constructor calling in multilevel

inhefitance, with the help of an example

What is this pointer ? Explain its use'with the help

of an example.

What is the method to retrieve the colour of the

text ? Write a program to retrieve RGB values in a

given colour

What is a TCP socket ? Explain how a TCP socket

is different from a UDP socket.

k)

(h)

2- (a)

(b)

(c)

(d)

(e)

3. (a)

(b)

MCS-024

Page 115: Mca

(c) What is 'abstraction' ? Explain two advantages of

abstraction with an examPle.

4. (a) Consider the following definition :

1 public class exam I

2 Public int a = 1;

3 public int b : 2;

4 public void method (final int c)

5 { i n t d = 3 ;

6 class assign I

7 Private void iMethod (int e) {

8 // line 8

e l10 1

1 1 l

1 2 1

Write all the variables among a, b, c, d and e that

can be relerenced at Line 8.

(b) Write a program to compute the factorial of a given

number in Java.

(c) Explain the seven steps that are to be followed to

establish a connection from a Java program to a

database.

(d) Write an Applet in Java that will display the current

date.

MC5-024 P.T.O.

Page 116: Mca

5. (a)

(b)

(c)

(d)

What is a session ? Explain how hidden form fieldsare used for session tracking.

Write a program in Java using the StringBuffer classwhich reverses the string "IGNOU MCA student".

Write five differences between an interface and anabstract class.

What is method overloading ? Explain how a methodis overloaded in Java, with an example.

- MCS-024 5,000

Page 117: Mca

MCA (Revised)

Term-End Examination,

June, 2OOG

MCS-031 : DESIGN AND ANALYS|S OFALGORITHMS

Time :3 hours Maximum Mqrks : 700

Note : Question no. I is compulsory. Attempt anythree questions from the rest. All algorithmsshould be written neqrer to C/C++ Ianguage.

1. (a) (i) Show that for. any real constants a and b,where b > 0.

(n + a)b = @(nb). 6(ii) Give an analysis of the efficiency of ihe Binary

Search and Linear Search methods. 4

(b) What is Randomized euicksort ? Analyse iheexpected running time of Randomized euicksort,with the help of a suitable example. 7

(c) Explain the Greedy Structure algorithm. Give anexample in which the Greedy technique fails todeliver an optimal solution. s

MCS-031 P.T.O.

Page 118: Mca

(d)

(e)

(f)

Describe the two properties that characterise a good

dynamic programming Problem.

Define an NP-complete problem. Give examples of

two such problems.

Why does the complexity of an algorithm need to be

analysed ? Show that the Travelling Salesperson

problem is NP-comPlete.

What is the running time of heapsort on an array of

length n that is already sorted in increasing order ?

What about the time for decreasing order ?

What is the difference between dynamic programming

and the greedy choice approach to solve problems ?

Explain the significance of the notation ro' Consider

function f, defined by

f ( x ) = 5 * 3 + 3 x 2 + 1 0 '

Show that f(x) = trl(x2).

Design a TM to compute the binary function

MONUS, defined as follows.

M O N U S : N x N - - + N

[ m - n i f m > n

such that MONUS (m, n) = {| 0 otherwise

1 0

2. (a)

(b)

(c)

(d)

MCS-031

Page 119: Mca

3. (a) Show how a DFS (Depth First Search) works on the

graph below. Assume that the vertices are

considered in alphabetical order and assume that the

graph is represented using adjacency list

representation in which each adjacency list is ordered

alphabetically.

For each vertex, write the time it is discovered (i.e.,

it becomes known) to its left and the time it is visited

(i.e., its adjacent nodes are generated) to its right in

the diagram below. For each edge, write its

classification next to it in the diagram.

(b) Build regular expressions and corresponding Finite

Automata (FA) for the following languages over the

alphabet ) : {a, b}. 70

(i) Language having words in which total no. of a's

is a multiple of three.

(i0 Language having exactly two b's in any word.

find the ith order

(i.e., Randomized

1 0

4. (a) Write a randomized algorithm to

statistic in a set of n elements

Select). I

MCS-031 P,T.O.

Page 120: Mca

(b)

(c)

Write a recursive procedure to compute the factorial

of a number.

Design a Turing Machine that increments a binary

nurnber which is stored on the input tape.

Consider Best first search technique and Breadth first

search technique. Answer the following with respect

to these techniques. Give justif ication for your

answer in each case.

(i) Which algorithm has some knowledge of

problem space ?

(iil Which algorithm has the property that if a

wrong path is chosen, it can be corrected

afterwards ?

Write Kruskal's algorithm and use it to find a

minimal cost spanning tree of the following graph.

(Show the intermediate steps).

5. (a)

(b)

1 0

(c) How does alpha beta pruning improve the minimax

procedure ?

MCS-031 8.000

Page 121: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-032 : OBJECT ORIENTED ANALYS|SAND DESIGN

Time : 3 hours Maximum Msrks : 700

Note : Question number 7 is compulsory. Attempt onythree questions from the rest.

1. (a) A bank has branches in major cities of India. Theemployees working in the offices are categorised asBranch Manager and clerks. If needed, the Branch

Manager also has to work as a clerk. The bank deals

with its customers in terms of opening different typesof accounts, deposits and withdrawal of money. Thebank wishes to develop a system for each of itsbranches. Identify the classes in the system and drawa class diagram. Each class must have at least three

attributes and two operations. Make necessary

assumptions, if any.

(b) What is encapsulation ? Explain two benefits ofencapsulation with an example.

1 0

MCS-032 P.T.O.

Page 122: Mca

(c) What is a state diagrarn ? Explain the different

notations used in state diagram.

(d) What is a'use case ? Explain different components of

a use case.

(e) What is an association ? Explain the differences

between one-way association and two-way

association, with an example for each'

(fl What is an integrity constraint ? Explain 'referential

integrity constraint' with an example.

k) Explain why more emphasis is given on object

structure rather than on operation implementations

in object oriented systems development'

2. (a) Draw, and explain, a state diagram for an ATM

system. 70

(b) Explain the following in the context of a DFD ' 70

(i) Process

(ii) Data Flow

(iii) Actor

(iv) Data Store

Also, illustrate all these components in an example

DFD.

3. (a) What is concurrency in objects ? Explain, with an

example, how concurrency is identified in a dynamic

model.

MCS-032 2 +

Page 123: Mca

(b) Explain how associations are implemented as a class,

with diagrams and code written in C++dava' 10

(c) What is persistency ? Explain, with an example, how

persistent data are identified. 5

4. (a) What is a collaboration diagram ? Draw and explain

a collaboration'diagram for a l ibrary system' Make

necessary assumptions 10

(b) What is composition ? Take an example o{

composition and draw a UML diagram for it ' 5

(c) Explain generalization and specializatio.n, with an

example for each. 5

5. (a) What is an event ? Explain how concurrent events

are handled. 5

(b) With the help of a suitable example, explain how

objeci classes are mapped to tables. 5

(c) What is inheritance ? What is the need for

adjustment of inheritance ? Explain one way of

adjustment of inheritance, with an example. 10

MCS-032 8,000

Page 124: Mca
Page 125: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-033 : ADVANCED DISCRETEMATHEMATICS

Time : 2 hours Maximum Msrks: 50

Note : Question no. I is compulsory. Attempt any

hr"" t""ttr""t frt

1. (a) Check whether ," - |

62 - n + 2) is a solution to

the recurrence below or not.

an - 4a,,- 1 + 4an -z = 2n, n > 2.

Also check whether the recurrence is homogeneous. 3

(b) State Euler's formula for a planar graph. Give an

example of a planar graph with 6 vertices and

S-regions, and verify Euler's formula for your

example. 4

MC5-033 P.T.O.

Page 126: Mca

(c) A post office has stamps only in denominations ofRe. 1, Rs. 2 and Rs. 5.

(i) Find the generating function for the number ofways in which you can pay n rupees usingthesL stamps.

(ii) If the post office has only 20 stamps of Re. 1,10 stamps of Rs. 5 and 10 stamps of Rs. 2,find the number of ways in which you can paya postage of Rs. n.

Consider the following graph.

(i) Write down the degree sequence of the graph.

(ii) Draw the complement of the graph.

(iii) How many edges need to be removed to get aspanning tree of the graph ? 4

(e) Using an appropriate substitution, solve therecurrence

n - 1Yn =

n Vr,-1 + n for n t 1, go = 1

(d)

vJ

v4

MCS-033

Page 127: Mca

2. (a)

(b)

3. (a)

4. (a)

(b)

Let an be the number of subsets of l I , 2,3, . . . , nJwith at least two elements, n > 1.

(i) What are the values of. a, a, and a, ?

(ii) Set up a recurrence for an, and solve it.'The Petersen graph is bipartite.' True or false ?whv ?

Find the vertex chromatic and edge chromaticnumber of the following graph :

v4

Let A(x) be the generating function of a sequence{aO, a' uz, . . . l .Find the generat ing funct ion of thesequence {ao , ao * u l ,u1 + a2 , . . . } . Use th is todeduce the identity

C(n , r ) + C(n , r + 1 ) = C(n + 1 , r + 1 ) , r> 1 .

Define the edge connectivitgr ),(G) of a graph G.Give examples of graphs G, and G, such that),(G1) = d(Gr) and ),(G2) < 6(Gr). Is it possible to finda graph G with f(G) > 6(G) ? Justify your answer.

MCS-033 P.T.O.

Page 128: Mca

(b) Find the general form of the soluiion to a recurrence

relation with constant coefficients for which ihe

characteristic roots are 1 with multiplicity 2 and 2

with multiplicity 1. The relation also has a

non-homogeneous. part which is a linear combination

of n2 and 2".

Find the generating function of the sequence {a,.,},where an satisfies ar., - Sar.,_ 1

- 6un_r, Ior n> 2,

a n d a o = 1 , a r = 1 .

State Dirac's and Ore's sufficiency condition for agraph to be Hamiltonian. Which of the conditions is

stronger ? If neither of the conditions apply for a

graph, can you conclude that the graph is

non'Hamiltonian ? Justify your answer with

examples.

5. (a)

(b)

MCS-033 8.000

Page 129: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-034 : SOFTWARE ENGINEERING

Time: 3 hours Maximum Marks: 700

Nofe : Question no. I is compulsory. Attempt any

three questions from the rest.

l. (a) Explain the key process areas associated with the five

levels of Capability Maturity Model (CMM). 10

(b) What is the relationship on which estimation models

are based ? Explain the COCOMO model in detail,

with ihe hetp of an example. 70

(c) Define the term Sot'tware Quality. Explain any nine

attributes of software quality. 10

(d) What are CASE tools ? Explain the various categories

of CASE tools. Also, depict the positioning of CASE

tools in a Software Application development, with the

7 0help of an example.

MC5-034 P.T.O.

Page 130: Mca

2. (a)

(b)

3. (a)

(b)

4. (a)

(b)

5. (a)

Write the outline of Software RequirementSpecifications (SRS). With the help of a suitableexample, explain the different sections of an SRSdocument.

Draw, and explain, a risk analysis table.

What is the objective of data design ? What are theattributes that include the description of differentdata items ? Give an example data item indicating itsattributes.

Write any seven challenges faced by CBSE(Component Based Software Engineering).

Define Bqseline. Explain the process of makingchanges to a Baseline, with the help of a diagram.

Define Software Project Management. Explain anyfour elements of it.

What is SoJtware Project Verification ? Write all thetest case selection guidelines for Boundary ValueAnalysis, and illustrate them using an example.

Explain the factors that affect the task set for aproject.

1 2

8

1 3

1 0

1 0

1 2

(b)

MCS-034 8,000

Page 131: Mca

MCA (Revised)

Term-End Examination

June, 2006

MCS-035 : ACCOUNTING AND FINANCIALMANAGEMENT

Time :3 hours Msximum Mqrks : 100

Note : Question 7 is compulsory. Attempt any three

quest ions Jrom the remaining quest ions.

l. (a) From the following Trial Balance, prepare a Trading' Account, Profit and Loss Account for the year ended

37.72.2005 and a Balance Sheet as on that date : 30

Dr. Rs. Cr. Rs.

Investments 1,800 Sales 75,000

Plant and Discount onMachinery 6,000 purchases 1,200

cash 600 lt"yttlol .for bad debts 1,500

Sundry debtors 10,500 Capital 15,000

MCS-035 P.T.O.

Page 132: Mca

Dr. Rs. Cr. Rs.

stock 28.800 Sunlwcreditors 6,990

Wages 9,600 Bills payable 3,500

Railway State Bankcharges 1,500 A/c I ,2OO

Purchases 36,000

Return inward 300

Income tax 150

Insurance 1,500

Discount onsales 1,500

Repairs toplant 48O

Travellingexpense 1,500

Rent paid 600

Interest onoverdraft 60

Drawings 1,500

Advance (Dr) 2,000

MCS-035

Page 133: Mca

Adjustments :

(i) Closing stock Rs. 10,500.

(ii) Wages outstanding Rs. 900.

(iii) Rent is payable @ Rs. 60 per month.

(iv) Commission earned but not received Rs. 1,000.

(v) Write off bad debts Rs. 800 and adjust theprovisions for doubtful debts at 5%.

(vi) Depreciate plant at 10% p.a.

(vii) Interest on capital at 5%o p.a.

(viii) The proprietor introduced an extra Rs. 1,000capital on 1tt December.

(ix) Prepaid insurance amounted to Rs. 500.

(b) Shree Pipes Ltd. uses about 75,000 valves per year

and the usage is fairly cohstant at 6250 per month.

The valves cost Rs. 1.50 per unit when bought inquantities and the carrying cost is estimated to be20o/o of average inventory investment on annualbasis. The cost to place an order and process the

delivery is Rs. 18. It takes 45 days lo receive deliveryfrom the date of an order and a safety stock of3,200 valves is desired. You are required to

determine : 10

(i) The most economical order quantity and

frequency of orders.

(ii) The order point.

(iii) The most economical order quantity if the

valves cost Rs. 4.50 each instead of Rs. 1'50

each.

MCS:035 P.T.O

Page 134: Mca

2. Explain the meaning and significance of the following

accounting concepts, giving suitable examples for each : 20

(i) Business entity

(ii) Money measurement

(iii) Continuity

(iv) Cost

3. (a) Explain the concept of agency relationship, and

elaborate on the problems and cost associated with

it.

(b) Briefly explain the various evaluation criteria used for

evaluating capital projects.

4. What are the various sources of working capital ? Explaingiving suitable examples.

5. Highlight the main components of a credit policy. Briefly

discuss the different credit policy variables giving examples

of each. 20

6. What is treasury management ? What are the main

functions and focus areas of the treasury department ? 20

MCS-035

1 0

1 0

20

8,000