C viva questions 1. Who Who develo develope ped d C lang languag uage? e? 2. How do do you make make commen comments ts in C program? program? 3. How How the the name name C is derive derived? d? 4. What hat is is K & R C? 5. What What is is prepr preproce ocessor ssor stateme statement? nt? 6. Differen Differentiat tiate e between between consta constant nt and variab variable. le. 7. What What is data data type type? ? 8. Name Name the the bas basic ic data data type types s of C. 9. Differentiate Differentiate between between string constant and characte characterr constant. constant. 10.What is the range of integer, char, float for a 16-bit computer? 11.What 11. What is a statement? statement? 12.What 12. What is a keyword? keyword? 13.Differentiate between keywords and identifiers. 14.What 14. What is the need for an escape sequences? sequences? 15.What 15. What is a symbolic constant? constant? 16.How 16. How do you classify C operators? operators? 17.What 17. What is the use of modulus operator? operator? 18.What is meant by mixed mode operation? 19.What 19. What are bitwise operators? operators? 20.What 20. What is unary operator? operator? 21.What 21. What is binary operator? operator? 22.What 22. What is typecasting? typecasting? 23.What is a conditional / ternary operator? 24.What 24. What is need for type conversion? conversion? 25.Different 25. Differentiate iate between && and &. 26.Differentiate between pre-increment/decrement & postincrement/decrement. 27.Differentiate between Unformatted and formatted i/o statements. 28.How 28. How do you classify the control statements? 29.Differentiate between while and do-while loop. 30.Different 30. Differentiate iate between break and continue. 31.When 31. When do you prefer for loop statement? 32.What is looping? 33.What is an array? 34.Give 34. Give the classification classification of arrays? 35.Differentiate between an array and an ordinary variable. 36.Array 36. Array variable variable is also called as ______. 37.What 37. What are character arrays? arrays? 38.When do you use two-dimensional character array? 39.Name 39. Name the different string handling functions? 40.What 40. What is meant by modularization? modularization? 41.Differentiate between standard functions & user-defined functions? 42.Differentiate between arguments and parameters. 43.Different 43. Differentiate iate between local and global variables.
44.Name the different methods of parameter passing? 45.How 45. How does the function definition differ from function declaration? 46.What 46. What is recursive function? function? 47.What is meant by scope of a variable? 48.What 48. What is a structure? structure? 49.Different 49. Differentiate iate between array and structure. 50.What 50. What are embedded structures? structures? 51.How 51. How do you access the member member of a structure? 52.What is union? 53.Different 53. Differentiate iate between union and structure. 54.What is a pointer? 55.Differentiate between address operator and dereferencing operator. 56.How 56. How do you declare a pointer variable variable CAO 1. Explain Explain the difference difference between between write write through through and write write back cache cache 2.
For a single single computer computer process processor or computer computer system, system, what what is the the purpose purpose of a processor processor cache cache ?
3. Explain the operation considering a two processor computer system with a cache for each processor. 4. what's the trade-of trade-offf of choosi choosing ng a bigger bigger or smaller smaller cache cache 5. Explai Explain n the concept concept of local locality ity of refere reference nce 6. Explai Explain n memo memory ry interl interleavi eaving? ng? 7. What What is bit bit sli slice ce?? 8. Difference Difference between between comput computer er architectur architecturee and computer computer organiza organization? tion? 9. What What is the the funct function ion of of Virtu Virtual al Memo Memory? ry? 10. What is the the difference between memory memory mapped i/o and i/o mapped i/o? i/o? 11. What is a Branch Branch Target Target buffer? buffer?
12. Advantage Advantage of using Booth algorith algorithm m 13. What is bit bit ORing ORing technique technique 14. What is is the use use of MFC MFC 15. Differentiate between Memory Memory access time time and Memory cycle time 16. What is the amount of time takes to transfer transfer a word of data to or from the memory. 17. Which type memory is used in cell phones, hand held computers, digital digital camera etc. 18. What is the concept concept behind emulation emulation 19. Explain the use of replacement algorithm in cache 20. Difference Difference between between interrupt interrupt and DMA 21. Difference between virtual address and physical address 22. What is the the advantage advantage of using TLB C++
1. What will be the output of the following program void main() { float a= 0.7; if (a < 0.7) printf("c"); else printf("c++"); } 2. Can stati staticc variabl variables es be declar declared ed in a header header file file ? 3. Can a variabl variablee be both both const constant ant and and volati volatile le ? 4. Can Can inclu include de files files be be neste nested? d? 5. What is the the output output of of printf printf("%d ("%d") ") ? 6. Find out out the equivalent equivalent pointer expression expression for referring referring the same same element element a[i] [j][k][l] ? 7. What is is the differ difference ence betwe between en const const char* char* p and and char const const* *p 8. Find the the equivalent equivalent expression expression for x%8 without without using using the modulo operator. operator. 9. Determine the output of the following program main() { if (!(1&&0)) { printf("OK I am done."); } else { printf("OK I am gone."); } } 10. Write a C program to print the following series 1 12 123 1234 12345 11. Nesting of loops in C may continue continue upto how many levels? levels? 12. What will will be the output of void main() { int a = (1,2,3); printf("%d",a); } Justify your answer. 13. Write a program to separate separate digits in a two-digit two-digit number entered through through keyboard, using bitwise operators only.
14. Write a program to extract extract a substring from a given string string VIVA QUESTIONS FOR AUTOMATA LANGUAGES AND COMPUTATION
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 12. 13. 14. 15. 16. 17. 18.
Why Why a fini finite te aut autom omat aton on is cal calle led d fini finite te?? What hat doe doess the the symbol mbol ∑ ;in the formal definition of finite automata ;denotes? The language language accepted accepted by a finite finite automaton automaton is is known known as a _________ _________ language. language. Different Differentiate iate between between regular regular expressio expressions, ns, regular regular languages languages and and regular regular grammar grammars? s? Define Define Klee Kleene ne closu closure re and and posi positi tive ve closu closure re of of a set. set. Explain Explain the difference difference between between context context sensit sensitive ive grammar grammarss and context context free free grammars. What What is a sen sente tent ntia iall for form? m? When When is a contec contecxt xt free free langua language ge called called inher inherent ently ly ambig ambigous? ous? When When do we say say that that a context context free free lang language uage is is in choms chomsky ky norma normall form? form? What are the the useless useless symbol symbolss of a grammar? grammar? Define Define unit unit produ producti ctions ons What hat are are ∈-productions? What does the the symbol symbol Г denotes in the definit definition ion of Pushdown Pushdown Automata? Automata? Different Differentiate iate between between multi-tape multi-tape Turing Machine and multi-trac multi-track k Turing Machine. What What is Choms Chomsky ky Hiera Hierarch rchy? y? Which is is the machine machine that accepts accepts context context sensit sensitive ive languages? languages? What are recursi recursively vely enumerable enumerable language languages? s? Mention Mention some application applicationss for automata automata languages languages and computation computation.. VIVA ANSWERS FOR AUTOMATA LANGUAGES AND COMPUTATION
1. 2. 3. 4.
5.
6.
Since Since the the numbe numberr of stat states es in an autom automato aton n are fini finite. te. An alp alpha habe bett call called ed the the inpu inputt alpha alphabe bet. t. Regular Regular Regular Languages Languages – languages languages that are accepted accepted by finite finite automata. automata. Regular Regular expressions – short hand notation for denoting regular languages. Regular grammars are restricted forms of context free grammars (left linear and right linear) which generates the regular languages The appl applica icati tion on of the the Kleene Kleene star star to a set set V is is writt written en as V*. V*. a. If V is a set of strings strings then then V* is defined defined as as the smalles smallestt superset superset of V that contains ε (the empty string) and is closed under the string concatenation operation. This set can also be described as the set of strings that can be made by concatenating zero or more strings from V. b. If V is a set set of symbols symbols or charact characters ers then V* V* is the set set of all strings strings over over symbols in V, including the empty string. If remove {∈} from V*, the resulting set denoted by V+ is called the positive closure. A context-f context-free ree grammar grammar is a grammar grammar in which which the the left-hand left-hand side of of each production production rule consists of only a single nonterminal symbol. This restriction is non-trivial; not all languages can be generated by context-free grammars. Those that can are called
7.
8. 9.
10. 10.
11. 12. 13. 14.
context-free languages. A context sensitive grammar has productions of the form α →β , where both of them are in (V∪T)*, In this a production will happen only in a particular context. A sententia sententiall form is the the start start symbol symbol S of a grammar grammar or any string string in (V (V union union T)* that can be derived from S. Consider the linear grammar ({S, B}, {a, b}, S, {S goes to aS, Sgoes toB, Bgoes tobB, Bgoes Bgo es toempty string}).A derivation using this grammar might look like this: S directly derives aS directly derives aB directly derives abB directly derives abbB directly derives abb Each of {S, aS, aB, abB, abbB, abb} is a sentential form. If all all the the grammar grammarss generati generating ng a Context Context free language language are ambigous ambigous then then the the language is said to be inherently ambigous. If all all the product productions ions in in that grammar grammar are either either in the the form form A→BC A→BC or A→a A→a and there are no other types of production, we can say that the given context free grammar is in Chomsky normal form. A symb symbol ol X∈V is useless if a. there is no derivation derivation from from X to any string string in the the language language (non(nonterminating) b. there is is no derivati derivation on from S that reaches reaches a sentential sentential form form containin containing gX (non-reachable) Production Productionss of the form form A → B. All other other productions productions includi including ng A→a are non-uni non-unitt Produc Productio tions ns of the form form A→ A→∈ Stac Stack k alph alphabe abett Multi-tape Multi-tape machine machine has multiple multiple tapes and separate separate heads for each tape, tape, multi-track multi-track machine has only a single tape divided in to multiple tracks and a single head to read all the tracks.
15.
16. Linear Linear bounded bounded auto automat maton on 17. A language language is recursively recursively enumerab enumerable le if some Turing Turing machine machine accepts it. it.
Computer graphics
1. Define Computer graphics. 2. What is meant by scan code? 3. What is meant by refreshing of the screen? 4. Define Random scan/Raster scan displays? 5. What do you mean by emissive and non-emissive displays? 6. What is persistence? 7. What is resolution? 8. What is Aspect ratio? 9. What is the difference between impact and non-impact printers? 10. Define pixel? 11. What is frame buffer?
12. What is bitmap and pixmap? 13. What is a Vector display or stroke writing or calligraphic display? 14. What do you mean by scan conversion? 15. What is run length encoding? 16. What do you mean by ‘jaggies’? 17. What is seed fill? 18. What is scan line algorithm? 19. What is a winding number? 20. What is Color Look up table? 21. Define bundled attributes? 22. What is aliasing? 23. What is antialiasing? 24. What is pixel phasing? 25. Distinguish between window port & view port? 26. What is covering (exterior clipping)? 27. Distinguish between uniform scaling and differential scaling? 28. Distinguish between bitBlt and pixBlt? 29. List out the various Text clipping? 30. What is a spline?
DBMS
1.What is the difference between DBMS and RDBMS? 2.What is referential integrity and how is it achieved? 3. What is Weak Entity set? 4.What is a view? How H ow it is related to data independence? 5. How does Tuple-oriented Tuple-oriented relational calculus differ from domain-oriented relational calculus 6. What is normalization? 7. What is Functional Dependency? Dependency? 8.What is Multivalued dependency? dependency? 9. What is Lossless join property? 10.What is Fully Functional dependency? dependency? 11.State 1NF,2NF and 3NF? 12.Examine the need for three schema architecture.
13.What are data models? 14. What is Data Independence? 15.What are the different types of join ? 16.Define data integrity.Explain various integrity constraints 17.Differentiate between DELETE and TRUNCATE command. 18.What is the basic difference between clustered and non clustered index 19. Differentiate between relation and relationship. 20.Why should relations be normalized? 21.What is the difference between conceptual model and logical model of a database. 22.What are the ideal features features of a database system. system. 23. Differentiate between primary key, candidate key & super key. 24. What is the difference between between the strong entity set and weak entity set ? 25. What do you mean by mapping cardinalities ? Explain various type of cardinalities. 26. What is difference between total and partial participation ? 27. Differentiate between Two phase locking and Rigorous two-phase locking. 28. What is Hashing ? 29.What is data dictionary?What are the information stored in the data dictionary? 30.What are Armstrong’s axioms? 31.What are aggregate functions.? 32.Explain the ACID properties of transaction. 33.Define view serializability and conflict serializability. 34.Distinguish between shared and exclusive locks.
35.What is role of checkpointing?
OS
1. What are the key object oriented concepts used by Windows NT? 2. What is multi multi tasking, tasking, multi multi programm programming, ing, multi multi threadin threading? g? 3. How are devices represented in UNIX? 4. What are the sub-components of I/O manager in Windows NT? 5. What is is a binary binary semap semaphore hore?? What What is its use? use? 6. Define Define latency, latency, transfe transferr and seek seek time with respec respectt to disk I/O. 7. How are the wait/signal wait/signal operations operations for monitor different different from from those for semaphores? 8. What are the four layers that Windows NT have in order to achieve independence? 9. What is the kernel? 10.What are privileged instructions? 11. What do you mean by system calls? 12. What are overlays? 13. Define spooling. 14. List the difference between monitor and semaphore. 15. What is a deadlock? 16. List the 4 necessary conditions for deadlock occurrence. 17. What is is inode? 18. Explain the functionality of long term, short term term and medium term scheduler. 19. Differentiate between turn around time and and waiting time. 20. Define thrashing. thrashing. 21. What are buddy buddy systems? 22. Differentiate between internal and external external fragmentation. 23. Which are the different ways of of achieving intercrosses communication? 24. Define race condition. 25. What do you mean by Belady's Anomaly.
26.What 26. What is an advantage of a large scheduling quantum? quantum? What is a disadvantage? 27. What is the difference between a ‘thread’ and a ‘process’ 28.What 28. What is the difference between a process and a program? 29.Explain 29. Explain the use of pipes in process communication. communication. 30.Explain 30. Explain the use of paging.
ADA
1. Illustrat Illustrate e backtrac backtracking king with with an an example. example. 2. Discuss Discuss the variou various s criteria criteria for analyzi analyzing ng an algorith algorithm. m. 3. Discuss Discuss the the 4 design design techniqu techniques es used in in algorithm algorithms. s. 4. What are are the mathemati mathematical cal notations notations used used in the analysis analysis of of algorithms. 5. List the propertie properties s of Red Black Black Trees. Trees. 6. Define Define amortized amortized time analysis analysis.. 7. Discuss Discuss the featu features res of quick quick sort. sort. 8. What is divide divide and and conquer conquer design design technique. technique. 9. State State Master Master theore theorem. m. 10.Define decision tree model. 11.Describe the working of quick sort algorithm. 12.Explain Depth first traversal in a graph. Which data structure is used in DFS? 13.Define i) Articulation point. ii) Bi connected connected component 14.Compare BFS and DFS 15.Explain strongly connected components of a graph. 16.Explain the physical significance of bi-connected components in a graph. 17.Explain the significance significance of approximation approximation algorithm 18.Explain bin packing problem 19.Explain graph coloring problem. 20.Explain Depth first traversal in a graph. Which data structure is used in DFS?
Mobile Computing 1. Discus Discusss the real life areas areas in which mobile mobile communi communicati cations ons can be applied applied (road traffic, emergencies,
2. Give Give a shor shortt revi review ew of the the evol evolut utio ion n of cell cellul ular ar netw networ orks ks.. Iden Identi tify fy the the different systems in each generation. 3. Identi Identify fy a mobil mobilee device device that is commonl commonly y used in attenda attendance nce monitor monitoring ing in corporate offices? Explain its working. 4. Differenti Differentiate ate mobile mobile communicati communication on and mobile mobile computing computing 5. In your your view view,, what what are are the the top top 3 stre streng ngth thss and and weak weakne ness sses es of wire wirele less ss systems? Discuss ways to address the weaknesses? 6. Discuss Discuss the key mobile mobile applicati applications ons that support support m-busi m-business, ness, m-govern m-government, ment, and mobile life? life? How? (SMS, MMS) 7. Supp Suppos osee you want want to watc watch h a movi moviee in TV usin using g VCR. How How can this this be achieved in a wireless environment? (UWB-media server- media player, High security, high data rate, in sort distances) 8. Suppose Suppose you want to organize organize a conference conference in in a hall where where there there are no wired wired syst system emss avai availa labl ble. e. What What kind kind of syst system em will will you you pref prefer er and and why? why? (WSN/MANET-on spot configuration) 9. Compare Compare 1G and 2G networks networks (Analog/ (Analog/Digit Digital, al, Only Only voice/voic voice/voicee and data…) data…) 10. Suppose Suppose that a Web service called called “ePurchase” “ePurchase” is available in Singapore. Singapore. A consumer in Detroit wants to invoke this service by submitting a purchase order (PO) by using a cellular phone. Illustrate the steps involved? (Mobile web services-Locate-UDDI, Learn-WSDL, Invoke, Transfer-SOAP, End) 11. Consider the case of accessing e mail using using your mobile phone. The rendering of contents will be different from a normal yahoo mail page in PC. How this is done? (WAP) 12. Suppose Suppose you want to use a mobile mobile device for internet internet browsing. browsing. What are the limitations that you experience? (memory, power, small display, connection issues) 13. Give Give 4 exampl examples es of mobil mobilee operati operating ng syste systems. ms. (Symbia (Symbian n OS, Palm OS, Windows CE, Linux for mobile) 14. While browsing through the personal banking pages of your bank, you can see see a lock symbol at the bottom of browser. What does this imply? Explain? (SSL Security)
15. Which are the internet security security protocols used in mobile computing? computing? (VPN and IPSec)
MICROPROCESSOR
1. Which Which type type of arch archite itectu cture re 8085 8085 has? has? 2. How many memory locations can be addressed by a microprocessor with 14 address lines? 3. 8085 is how many bit microprocessor? 4. Why is data bus bi-directional? 5. What is the function of accumulator? 6. What is flag, bus? 7. What are tri-state devices and why they are essential in a bus oriented system? 8. Why are program counter and stack pointer 16-bit registers? 9. What does it mean by embedded system? 10. What are the different addressing modes in 8085? 11. What is the difference between MOV and MVI? 12. What are the functions of RIM, SIM, IN? 13. What is the immediate addressing mode? 14. What are the different flags in 8085? 808 5? 15. What happens during DMA transfer? 16. What do you mean by wait state? What is its need? 17. What is PSW? 18. What is ALE? Explain the functions of ALE in 8085. 19. What is a program counter? What is its use?
20. What is an interrupt? 21. Which line will be activated when an output device require attention from CPU? 22. Differentiate between a microprocessor and microcontroller.
Object Oriented Programming 1. Distingui Distinguish sh between between procedure procedure oriente oriented d programmin programming g and object object oriented oriented programming 2. Give a real real world world example example to illust illustrate rate the concept concept of abstra abstraction ction and encapsulation 3. Differ Different entiat iatee class classes es and and objec objects ts 4. Give a mechanism mechanism that that enhances enhances the reusabil reusability ity of classes classes in in OOP (inheri (inheritance) tance) 5. Differ Differenc encee betwee between n struct structure ure and and union union 6. Explain Explain the functionalit functionality y of scope resolution resolution operator operator 7. Does OOP OOP have any any option option the initia initialize lize the the values values of the data members members of of a class? How that option can be explicitly provided? (constructors) 8. Different Differentiate iate formal formal argument argumentss and and actual actual argumen arguments ts 9. Explai Explain n functi function on overlo overloadi ading ng 10. Usually data members can be accesses by its member functions. But consider a scenario where two classes have to share a single function. What concept on o n OOP can be applied? Explain. (friend functions) 11. How can a private private member can be made inheritable (protected) (protected) 12. How exception handling is done in OOP (try, catch, throw) 13. Distingui Distinguish sh error and exception exception
SOFTWARE ENGINEERING
1
What hat u mean ean by CASE CASE??
Ans: CASE( Computer Aided Software Engineering) is a software system which are intended to provide automated au tomated support for software process and activities. CASE systems are often used for method support. 2
What What are are the the att attrib ributes utes of good softwa software? re? Ans: software should deliver the required functionality & performance to the user and should be maintainable, dependable and usable.
3
Name Name some some key chall challeng enges es facing facing in in softwa software re engine engineeri ering? ng? Ans: coping with increasing diversity, demands for reduced delivery times and developing trustworthy software.
4
Which model is used used to represent represent the the action action of human in softwar softwaree engineerin engineering? g? Ans: workflow model.
5
Name Name the princi principal pal techni techniques ques used used for Requi Requirem rement entss validat validation ion?? Ans: Requirements reviews and prototyping.
6
Name Name the the itera iterativ tivee proces processes ses of risk risk managem management? ent? Ans: Risk identification, Risk analysis and classification, Risk Decomposition and Risk reduction assessment.
7
In syste systems ms what what is is the the benefits benefits of using using immuni immunity ty require requirements ments?? Ans: It specifies how a system should, protect itself against viruses, worms and similar threats
8
Common Commonly ly wher wheree path path test testing ing techni technique quess are are used? used? Ans: During component testing.
9
What are are the the main benefits benefits of predicting predicting system system reliabil reliability ity from from a reliabili reliability ty growth model?
Ans: Planning of testing and customer negotiations 10 Why data data flow model is is known as as Activity Activity model? model? Ans: It represents the activity of the users or modules. 11 What are are the benefit benefitss of using using leveled leveled DFDs? DFDs? Ans: It shows the lower process in detail. 12 How data streams streams are are represented represented in FiniteFinite- State State mechanisms mechanisms?? Ans: By using regular expressions. 13 How a doma domain in error error can can occur occur?? Ans: When a program traverse the wrong path because of an incorrect predicate in a branching statement. 14 Based on what what theory theory predictive predictive models models are formed? formed? Ans: Statistical theory. 15 Where Acceptan Acceptance ce testing testing is typicall typically y performed? performed? Ans: Performed in quality assurance and or customer organizations. 16 Give disadvan disadvantages tages of of bottom bottom up testing. testing. Ans: The necessity to write write and debug test harnesses for the modules and sub systems into larger and larger units. 17 Name two two characteri characteristics stics of of software software risks. risks. Ans: Uncertainty and lose 18 In an area where, requirement requirementss are difficult difficult to establish establish in clear terms terms and software system design and development become very co stly operations, which model will use for development engineering? Ans: Evolutionary (Iterative) model.
19 When the users, users, customers customers or stakeholders stakeholders are not sure about about their requirement requirement then which software process model will use? Ans: Prototyping model. 20 In system system environment where where there is is a clarity and unanimity on the requirements and specifications which software process model is efficient? And: Linear sequential Model. 21 Suppose, Suppose, a user needs a system system which which is large, complex complex and full full fledged fledged in nature and having a lot of features and facilities from scratch. Then which software process model you will prefer? Ans: Spiral model. 22 Result Result of a testing testing methods are as follow follows, s, 1) Error in in data model. 2) Error Error in access to external data source. 3) Missing functions. Which testing will gives these results? Ans: Black Box Testing. 23 A test case case developed developed based on on pull down menus, menus, data data entry and and object operations. For which testing these test cases can use? Ans: GUI testing. 24 In object oriented oriented analysis, analysis, when the user user has a number of ideas, alternative alternatives, s, solutions and not so sure about confirming one of them, then which technique can use? Ans: Brainstorming.
DATA STRUCTURES AND ALGORITHMS
In an AVL tree, at what condition the balancing is to be done?
Answer : If the 'pivotal value' (or the 'Height factor') is greater than 1 or less than -1.
1.
What is the bucket size, when the overlapping and collision occur at same time? Answer: One. If there is only one entry possible in the bucket, when the collision occurs, there is no way to accommodate the colliding value. This results in the overlapping of values.
2.
Convert the expression ((A + B) * C - (D - E) ^ (F + G)) to equivalent Prefix and Postfix notations. Answer: Prefix Notation: ^ - * +ABC - DE + FG Postfix Notation: AB + C * DE - - FG + ^
3.
How many null branches are there in a binary tree with 20 nodes? Answer: 21
4.
What are the methods available in storing sequential files? Answer: The methods available in storing sequential files are: a. b. c. d.
5.
Stra Straig ight ht merg mergin ing, g, Nat Natural ural mer mergi ging ng,, Polyp olypha hase se sort sort,, Dist Distri ribu buti tion on of Ini Initi tial al run runs. s.
How many different trees are possible with 10 nodes ? (2n-n) Answer: 1014
6.
List out few of the Application of tree data-structure? Answer: The list is as follows: a. b. c.
7.
The mani manipul pulati ation on of Arit Arithme hmetic tic expr express ession ion,, Symb Symbol ol Tab Table le con const stru ruct ctio ion, n, Synta yntax x ana analy lysi sis. s.
List out few of the applications that make use of Multilinked Structures? Answer: The applications are listed below: a. b.
8.
Spars parse e matr matrix ix,, Inde Index x gene genera rati tion on..
In tree construction which is the suitable efficient data structure? Answer: Linked list is the efficient data structure.
9.
List out the areas in which data structures are applied extensively? Answer: The name of areas are:
a. b.
Com Compil piler Des Desig ign, n, Oper Operat atin ing g Syst System em,,
c. Database Management System, d. e. f. g. h.
Stat Statis isti tica call analy analysi sis s packa package ge,, Nume Numeri rica call Ana Analy lysi sis, s, Graphics, Arti Artifi fici cial al Inte Intell llig igen ence ce,, Simulation
10. What are the major data structures used in the following areas : RDBMS, Network data model & Hierarchical data model. Answer: The major data structures used are as follows: a. b. c.
RDBMS RDBMS - Array Array (i.e (i.e.. Array Array of of struc structur tures) es) Netw Networ ork k dat data a mod model el - Gra Graph ph Hier Hierar arch chic ical al dat data a mode modell - Tre Trees es
11. If you are using C language to implement the heterogeneous linked list, what pointer type will you use? Answer: The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.
12. Minimum number of queues needed to implement the priority queue? Answer: Two. One queue is used for actual storing of data and another for s toring priorities.
13. What is the data structures used to perform recursion? Answer: Stack. Because of its LIFO (Last In First Out) property it remembers its 'caller' so knows whom to return when the function has to return. Recursion makes use of sys tem stack for storing the return addresses of the function calls. Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used.
14. What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix forms? Answer: Polish and Reverse Polish notations.
15. What is the data structures structures stack
used to perform recursion? recursion?
Answer: Stack. Because of its LIFO (Last In First Out) property it remembers its 'caller' so knows whom to return when the function has to return. Recursion makes use of sys tem stack for storing the return addresses of the function calls. Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used.
16. Classify the Hashing Functions based on the various methods by which the key value is found.
Answer: The list of Hashing functions is as follows: a. b. c. d. e. f. g.
Direct me method Subt Subtra ract ctio ion n met metho hod d Modu Modulo lo-D -Div ivis isio ion n meth method od Digi Digitt-Ex Extr trac acti tion on meth method od MidMid-Sq Squa uare re meth method od Folding me method Pseu Pseudo do-r -ran ando dom m meth method od
17. What are the types of Collision Resolution Techniques and the methods used in each of the type? Answer: The types of Collision Resolution Techniques are: a.
b.
Open Open addr addres essi sing ng (clo (close sed d hashi hashing ng)) The methods used include: i. Over Overfl flow ow blo block ck Clos Closed ed addr addres essi sing ng (ope (open n hashi hashing ng)) The methods used include: i. Linked lilist ii. ii. Bina Binary ry tree ree
18. In RDBMS, what is the efficient data structure used in the internal storage representation? Answer: B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes.
19. What is a spanning Tree? Answer: A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized.
20. Does the minimum spanning tree of a graph give the shortest distance between any 2 specified nodes? Answer: No. Minimal spanning tree assures that the total weight of the tree is kept at its minimum. But it doesn't mean that the distance between any two nodes involved in the minimum-spanning tree is minimum.
21. Whether Linked List is linear or Non-linear data structure? Answer: According to Access strategies Linked list is a linear one. According to Storage Linked List is a Non-linear one.
Viva Questions - Computer Networks 1. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs? 2. What is a Management Information Base (MIB)?
3. What is the HELLO protocol used for? 4. What is traffic shaping? 5. What is the range of addresses in the classes of internet addresses? 6. What is the significance of the IP address 255.255.255.255? 7. Differentiate between ARP and RARP. 8. What is Beaconing? 9. Define VOIP communication technology 10.What is Wi-max technology? 11.What is supernetting and subnetting? 12. Which protocol is used by DNS name servers? 13. Differentiate between TFTP and FTP application layer protocols 14. What is NETBIOS and NETBEUI? 15. Compare IPv4 and IPv6 header formats. 16. Define CSMA/CD 17 .Distinguish between packet switching and circuit switching 18. Define RTT. 19. Differentiate between bridges switches and routers 20. Distinguish between unicasting and multiplexing 21. Compare TCP and UDP 22 What is IGMP. 23. What is NAT? 24. What is DHCP?
ACN 1. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs 10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling. 2. What is a Management Information Base (MIB) A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP.
3. What is the HELLO protocol used for The HELLO protocol uses time instead of o f distance to determine optimal routing. It is an alternative to the Routing Information Protocol. 4. What is traffic shaping One of the main causes cau ses of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.
5. What is the range of addresses in the classes of internet addresses Class A 0.0.0.0 - 127.255.255.255 Class B 128.0.0.0 - 191.255.255.255 Class C 192.0.0.0 - 223.255.255.255 Class D 224.0.0.0 - 239.255.255.255 Class E 240.0.0.0 - 247.255.255.255 6.What is the significance of the IP address 255.255.255.255? The limited broadcast address is utilized when an IP node must perform a one-toeveryone delivery on the local network but the network ID is unknown. 7.What is difference between ARP and RARP? The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address add ress of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
8.What is Beaconing? The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring w hen they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.
9.Define VOIP Communication Technology VOIP stands for Voice over IP and this technology is used for transmitted the voice over the IP based long distance network to make phone calls. VOIP phone calls are very cheap and a large number of the corporate offices and home users are using VOIP technology to make long distance phone calls. 10.What is Wi Max Technology? Wi Max is a wireless broadband technology and it is a advance shape of the Wi Fi (which was a base band technology). Wi Max supports data, video and audio communication at the same time at a very high speed up to 70 Mbps. 11.What is supernetting and subnetting?
When class B addresses are used by class C subnet mask then the result we get is known as subnets. There are many reasons for which we create subnets of an IP network. The basic purpose of subnet is to control con trol traffic over networks. To get the network and node parts of an address, we apply subnet mask to an IP address. 1 represents to network bit and 0 represents to node bit. To get ge t the network address, we apply an operation among the IP address and the subnet mask is known k nown as Bitwise Logical (AND). Super-netting is also known as Classes Inter-Domain Routing. The w ay through which multiple internet addresses of a class are combined together is known as Super-netting. Suppose we have two network addresses. One is 192.168.3.0/18 and other is 192.168.4.0/18. By using Super-netting, we can combine these two addresses into a single address as 192.168.3.0/17. Here H ere seventeen (17) is showing that first 17 bits are representing the network part of address (192.168.3.0/17). There are some protocols which are used Super-netting including BGP and OSPF. 12.What protocol is used by DNS name servers DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP. 13. Differentiate between TFTP and FTP application layer protocols The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information. 14. What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.
15. What is CSMA/CD?
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detect. Ethernet is a multiple access network (shared link) and the carrier sense means that all the nodes can distinguish between an idle and busy bus y link. Collision detect means that a node listens as it transmits and can therefore detect when a frame it is transmitting has interfered with a frame transmitted by another node. 16. Differentiate Bridges, Switches and Routers?
Bridges are Link level nodes they forward frame from one link to another to implement an extended LAN, Switches are network level nodes they forward datagram from one network to another a nother to implement a packet switched network and routers are internet level nodes they forward datagram from another to implement an internet.
VIVA QUESTIONS FOR COMPILER
1. What What are the the differe different nt phases phases of of compila compilatio tion? n? 2. Different Differentiate iate between between lexeme, lexeme, token and pattern. pattern. 3. How input input buffe bufferin ring g is perfor performed med in comp compile iler? r? 4. Why is the the input input buffer buffer organized organized into into two two halves? halves? 5. What is the the use use of sentinels sentinels in input input buffer buffering? ing? 6. What What is a regular regular expre expressi ssion? on? Give Give exampl examples. es. 7. Give Give the struct structure ure of of a lex lex progr program. am. 8. What What is the output output of a lex compil compiler. er. 9. What are the the differe different nt error error recover recovery y strate strategies? gies?
10. What is the problem of left recursion recursion and how can it be eliminated? 11. Differentiate between top top down and bottom up parsing. Give examples for each. 12. Distingui Distinguish sh between FIRST and FOLLOW. 13. What is the the significance of first & follow? 14. What do you mean mean by handle pruning? pruning? 15. Describe the the stack stack implementation implementation of shift reduce parsing. parsing. 16. Compare Compare SLR, CLR and LALR parsers. parsers. 17. What is the the difference between parse tree and syntax tree? 18. Distinguish between S-attributed grammar and L-attributed grammar. grammar. 19. Compare synthesized attributes and inherited attributes. attributes. 20. Describe how type type checking of an expression expression is specified. specified. 21. What are the different fields fields in an activation activation record? 22. What do you mean by dangling reference problem? problem? 23. What are the three representations of three address code statements? 24. What are the different optimization optimization techniques used in compilers? 25. What do you mean mean by dead code eliminati elimination? on? 26. What will will be the output file created created when yacc when yacc translate.y command is executed? 27. Differentiate between a compiler and assembler. 28. What is the significance of a language language processor? 29. Differentiate between interpreter interpreter & compiler.
VIVA QUESTIONS FOR SECURITY IN COMPUTING
1. If you have to both encrypt and compress data during transmission, which would you do first, and why? 2. Different Differentiate iate between between symmetr symmetric ic encryption encryption and asymm asymmetri etricc encryption. encryption. 3. What is is DE DES ? 4. Compare DES and RSA 5. When a combinati combination on of symmetri symmetricc encryption encryption and an error error control control code is used used for message authentication, in what order must the two functions be performed ? 6. What What is a fire firewa wall ll.? .? 7. What What are the the diffe differen rentt types types of fir firewal ewall? l? 8. Different Differentiate iate the differ different ent types types of attacks attacks on data data during transm transmissi ission. on. 9. Different Differentiate iate between between threat threat and vulnerabili vulnerability. ty. 10. Differentiate between attack, service and mechanism.
11. What are the major vulnerabilities vulnerabilities that a computer system system is subjected to? 12. What are the different mechanisms provided to assure security. 13. What are the 3 independent dimensions on which all cryptographic systems systems are characterized? 14. Differentiate the concepts unconditionally secure and computationally secure. 15. What is one time time pad technique. technique. 16. What are the different transpositions transpositions methods for encryption ? 17. What are the different techniques for steganography. 18. Differentiate between between encryption and decryption algorithms. 19. Differentiate the concepts confusion and diffusion with respect to to data security. 20. What do you you mean mean by avalanche avalanche effect. effect. 21. How can you provide provide authentication to your your messages using using public key cryptography? 22. How can you provide provide both secrecy and authentication to your messages using public key cryptography? 23. What is a public public key certific certificate? ate? 24. What is a digital digital signature? signature? 25. What is the the difference between direct direct and arbitrated arbitrated digital signature. 26. What is R64 conversion? How is is it useful for an e-mail application. 27. What are the two common techniques techniques used to protect a password file? file? 28. What is is a honeypot honeypot?? 29. What are the two common techniques techniques used to protect a password file? file? 30. What are the 3 different types of indruders.? indruders.? 31. What are the different different types types of virus? 32. Differentiate between email virus and macrovirus 33. What are the two categories of malicious program? 34. Diffrentiate between a logic bomb and time time bomb. 35. What is is Trojan Trojan horse. horse.
SYSTEM PROGRAMMING Can forward reference occurs in data items, if so how can we eliminate? 1. Define Define a macr macro o called called SQR SQR which which square squaress a number. number. Ans:
#define SQR(x) (x * x)
2. What will will happen if we drop drop the base base register register in the the program program which which contains contains only one base register? 3. Differe Differentia ntiate te Macro Macro & Sub Subrou routine tine.. 4. Let the the contents contents of the registers registers B,PC,X B,PC,X are 006000, 003000,000090 003000,000090 respectively ;the displacement be 0000 0011 0000;the 6 flags as:n=0,i=1,x=0,b=0,p=0,e=0;then what will be it target address?
A) 3600 B) 6390 C) 30 5. Name Name some some applicat application ion of Load Load and and Go Assemb Assemblers lers.. 6. What What is is it: it: =X’05 =X’05’’ mea means? ns?
A) Expr Expres essi sion on B) Symbol C) Lite Litera rall 7. What is the role role of 1)ORGIN 1)ORGIN2)EQU3) 2)EQU3)LTORG LTORG in an assembly assembly language language pgm. pgm. 8. Name Name the the reg regist ister er who whose se no= no=8. 8. A) X B) SW C) PC 9. Name the the special special type of of loader which is executing executing ,when a computer computer starts starts or restarted. 10. List out the variables variables used in linking linking loaders. loaders. A) PROGADDR,CSADDR & CSLTH B) LOCCTR C)SHLADDR & CSLTH 11. Differentiate Differentiate EXTDEF EXTDEF and EXT REF. REF. 12. How can we include library routine automatical automatically? ly? Also write the syntax. Ans: LIBRARY
MYLIB
13. Name three types types of Multiprocessor Multiprocessor Operating Operating System. 14. List out the data data structures structures used in macros. macros. A) ESTAB B) OPTAB & SYMTAB C) DEFTAB, NAMTAB & ARGTAB
.