Exam Details
Subject | computer science | |
Paper | paper 2 | |
Exam / Course | mcscc | |
Department | ||
Organization | manipur public service commission | |
Position | ||
Exam Date | 2013 | |
City, State | manipur, |
Question Paper
Com
1. a. I. Write the advantage of postfix expression over infix expression.
11. ii. Write 3 advantages and 3 disadvantages of index sequential access mechanism of
files
111. iii. Discuss the count to infinity problem of distance vector routing. Explain anyone
method to overcome the same.
lV. iv. Write two ways in which the OSI reference model and the TCP/IP Model are the same.
Also write two ways in which they differ.
b. b. 1. Explain the OOPS paradigm in brief. Explain how object orientation contributes to
Programming GUI Data Base Operating System
11. ii. What are the draw backs of E-R model? How could they be overcome using EER
model? Explain with example.
Il1. iii. In the context of concurrency control in DBMS, what are the problems of the basic
locking protocol and how 2PL is useful to overcome such problem?
2.
2 a. 1. Write an algorithm to delete a node from the binary search tree. Consider the following
binary search tree, delete node 6 from tree and reconstruct it.
<img src='./qimages/3399-2a-1.jpg'>
H. ii. Discuss any four factors that influence the choice of file organization and methods.
ii. ii. Explain the specific roles ofLLC and MAC sub layers of data link layer. lO IV DefineAmplitude, Period, and Phase for a periodic digital signal.
b 1. In structured programming paradigm differentiate the global and local variables by giving an example.
H. ii. Write 10 rules ofCODD and explain any three of them with example.
Ill. iii. What are the potential threat points in a database system? Explain any three of them.
3. 3 a. 1. Evaluate following postfix expression and Illustrate how this expression is represented in stack
100 8 3 50 2
100
II. ii. Write the advantage of threading a tree. Explain right threaded and left threaded binary tree with example of each.
HI. iii. State any two problems with SLIP protocoL State how they are overcome by PPP protocol.
b. 1b . Explain then necessity ofsubnetmaskwithIPaddress.
H. ii. For a programming language differentiate between semantics and syntax with example.
m. iii. Explain the components of domains definition. illustrate the domain constraints by taking a suitable example.
IV. iv. Explain the concept of cursor in Database,(ii)Explain any four cursor operations.
4. 4 a. 1. Convert following postfix expression to infix expression:
A C E
11. ii. Explain the genera] mechanism of sorting a linked list in ascending order using pointers.
111. iii. Define minimum spanning tree. Find all the spanning tree and minimum spanning tree off
following graph
<img src='./qimages/3399-4-3.jpg'>
IV Why do we need framing at data link layer? Explain any two methods to mark the start
and end of each frame.
b. 1. Why do we need fragmentation and defragmentation at network layer? Explain.
II. Differentiate between multiple inheritance and multilevel inheritance with example.
ll1. Explain terms cardinality and connectivity in context of E-Rdiagram.
IV ExplainTables, View and Index in DBMS,
Write 3 advantages of views. 12
5. a. 1. Write an algorithm to convert a postfix expression to infix expression. 6
11. Explain the mechanism of selection sort method.Show the process of sorting following sequence of numbers in ascending order using selection sort method. Show all the intermediate steps after each cycle by highlighting the two numbers exchanging their locations.
<img src='./qimages/3399-5a-2.jpg'>
111. Regarding IP address, give reasons for following statements:
All Os -Never a valid destination
AllIs -Never a valid source
(C)127. _._should not appear on network 9
IV For establishing TCP connection if there would be two way hand shake instead of three way, what problem may occur? Discuss.
b. 1. What is a sub program? Explain following parameter passing methods to and from sub program
Pass by value Pass by result Pass by reference
II. Define 3NF with the help of a suitable example. Explain temlS insertion anomalies, deletion anomalies, modification anomalies in the context onNF. 10 Ill. What will be the output of following query?
SELECT REPLACE(TRANSLATE(LTRIM(RTRIM('!! ATHEN FROM DUAL;
IV. Consider a schema and functional dependencies and Then the decomposition and is dependency preserving but not lossless join. Comment whether statement is True or False? Justify your answer.
6. a. 1. Write the characteristics of a binary tree and give one example of the same.
6 ll. Construct binary search tree from the following set of numbers given in the order
8 20,35, 14,31, 16, 13,30,35 Show the construct of tree in incremental order after each node insertion.
111. Comment on the efficiency of sequential file processing.
5
IV. While using analog signals to transmit digital data, what band width is required for data
3 being sent at a rate of 10 bps using analog signal? Assume that each signal element is one bit.
b. I. What is the advantage of multiplexing? Explain FDM and TDM.
II. What is late binding? Explain the difference between virtual function and pure virtual function.
lll. How are specialization/generalization constraints represented in the EER model? Explain.
IV. What is de-normalization? Why do we perform de-normalization?
7. a. i. Write and explain Algorithm to search a node in a linked list.
II. Define graph and explain its two applications. Show the adjacency list structure of following graph
<img src='./qimages/3399-7a-ii.jpg'>
iii. Explain following terms in context of network's perf0n11anCe
Throughput
Packet delivery ratio
Jitter
IV. Explain any three properties that are used in quality of service in the network layer.
b. I. Explain the concept of abstract data type with example.
II. Explain in brief any six causes of Database failure. Explain roll forward and roll back
concept of database recovery.
Ill. Explain database privilege, system privilege and object privilege in the context of data
protection.
8. a. I. What is a Circular-queue? What problem of linear queue can be resolved using Circular
queue?
II. Write an algorithm for computing a minimum spanning tree.
Ill. Write an algorithm to insert an element in a circularqueue.
IV. Explain any two differences between TCP and UDPprotocols.
V. Write three functions of data link layer and network layer as applicable to OSI model.
b. I. Discuss any three criteria of programming language evaluation.
II. What is the importance ofThomas's Write rule in Database concurency control? How
does the Thomas's write rule· modifies the checks for a write operation by a
TransactionT? 12
iii. Explain the difference between TRUNCATE and DELETE command of sql.
1. a. I. Write the advantage of postfix expression over infix expression.
11. ii. Write 3 advantages and 3 disadvantages of index sequential access mechanism of
files
111. iii. Discuss the count to infinity problem of distance vector routing. Explain anyone
method to overcome the same.
lV. iv. Write two ways in which the OSI reference model and the TCP/IP Model are the same.
Also write two ways in which they differ.
b. b. 1. Explain the OOPS paradigm in brief. Explain how object orientation contributes to
Programming GUI Data Base Operating System
11. ii. What are the draw backs of E-R model? How could they be overcome using EER
model? Explain with example.
Il1. iii. In the context of concurrency control in DBMS, what are the problems of the basic
locking protocol and how 2PL is useful to overcome such problem?
2.
2 a. 1. Write an algorithm to delete a node from the binary search tree. Consider the following
binary search tree, delete node 6 from tree and reconstruct it.
<img src='./qimages/3399-2a-1.jpg'>
H. ii. Discuss any four factors that influence the choice of file organization and methods.
ii. ii. Explain the specific roles ofLLC and MAC sub layers of data link layer. lO IV DefineAmplitude, Period, and Phase for a periodic digital signal.
b 1. In structured programming paradigm differentiate the global and local variables by giving an example.
H. ii. Write 10 rules ofCODD and explain any three of them with example.
Ill. iii. What are the potential threat points in a database system? Explain any three of them.
3. 3 a. 1. Evaluate following postfix expression and Illustrate how this expression is represented in stack
100 8 3 50 2
100
II. ii. Write the advantage of threading a tree. Explain right threaded and left threaded binary tree with example of each.
HI. iii. State any two problems with SLIP protocoL State how they are overcome by PPP protocol.
b. 1b . Explain then necessity ofsubnetmaskwithIPaddress.
H. ii. For a programming language differentiate between semantics and syntax with example.
m. iii. Explain the components of domains definition. illustrate the domain constraints by taking a suitable example.
IV. iv. Explain the concept of cursor in Database,(ii)Explain any four cursor operations.
4. 4 a. 1. Convert following postfix expression to infix expression:
A C E
11. ii. Explain the genera] mechanism of sorting a linked list in ascending order using pointers.
111. iii. Define minimum spanning tree. Find all the spanning tree and minimum spanning tree off
following graph
<img src='./qimages/3399-4-3.jpg'>
IV Why do we need framing at data link layer? Explain any two methods to mark the start
and end of each frame.
b. 1. Why do we need fragmentation and defragmentation at network layer? Explain.
II. Differentiate between multiple inheritance and multilevel inheritance with example.
ll1. Explain terms cardinality and connectivity in context of E-Rdiagram.
IV ExplainTables, View and Index in DBMS,
Write 3 advantages of views. 12
5. a. 1. Write an algorithm to convert a postfix expression to infix expression. 6
11. Explain the mechanism of selection sort method.Show the process of sorting following sequence of numbers in ascending order using selection sort method. Show all the intermediate steps after each cycle by highlighting the two numbers exchanging their locations.
<img src='./qimages/3399-5a-2.jpg'>
111. Regarding IP address, give reasons for following statements:
All Os -Never a valid destination
AllIs -Never a valid source
(C)127. _._should not appear on network 9
IV For establishing TCP connection if there would be two way hand shake instead of three way, what problem may occur? Discuss.
b. 1. What is a sub program? Explain following parameter passing methods to and from sub program
Pass by value Pass by result Pass by reference
II. Define 3NF with the help of a suitable example. Explain temlS insertion anomalies, deletion anomalies, modification anomalies in the context onNF. 10 Ill. What will be the output of following query?
SELECT REPLACE(TRANSLATE(LTRIM(RTRIM('!! ATHEN FROM DUAL;
IV. Consider a schema and functional dependencies and Then the decomposition and is dependency preserving but not lossless join. Comment whether statement is True or False? Justify your answer.
6. a. 1. Write the characteristics of a binary tree and give one example of the same.
6 ll. Construct binary search tree from the following set of numbers given in the order
8 20,35, 14,31, 16, 13,30,35 Show the construct of tree in incremental order after each node insertion.
111. Comment on the efficiency of sequential file processing.
5
IV. While using analog signals to transmit digital data, what band width is required for data
3 being sent at a rate of 10 bps using analog signal? Assume that each signal element is one bit.
b. I. What is the advantage of multiplexing? Explain FDM and TDM.
II. What is late binding? Explain the difference between virtual function and pure virtual function.
lll. How are specialization/generalization constraints represented in the EER model? Explain.
IV. What is de-normalization? Why do we perform de-normalization?
7. a. i. Write and explain Algorithm to search a node in a linked list.
II. Define graph and explain its two applications. Show the adjacency list structure of following graph
<img src='./qimages/3399-7a-ii.jpg'>
iii. Explain following terms in context of network's perf0n11anCe
Throughput
Packet delivery ratio
Jitter
IV. Explain any three properties that are used in quality of service in the network layer.
b. I. Explain the concept of abstract data type with example.
II. Explain in brief any six causes of Database failure. Explain roll forward and roll back
concept of database recovery.
Ill. Explain database privilege, system privilege and object privilege in the context of data
protection.
8. a. I. What is a Circular-queue? What problem of linear queue can be resolved using Circular
queue?
II. Write an algorithm for computing a minimum spanning tree.
Ill. Write an algorithm to insert an element in a circularqueue.
IV. Explain any two differences between TCP and UDPprotocols.
V. Write three functions of data link layer and network layer as applicable to OSI model.
b. I. Discuss any three criteria of programming language evaluation.
II. What is the importance ofThomas's Write rule in Database concurency control? How
does the Thomas's write rule· modifies the checks for a write operation by a
TransactionT? 12
iii. Explain the difference between TRUNCATE and DELETE command of sql.
Other Question Papers
Subjects
- agriculture
- anthropology
- botany
- civil engineering
- commerce & accountancy
- computer science
- economics
- education
- electrical engineering
- english literature
- essay
- general studies
- geography
- geology
- history
- law
- management
- manipuri
- mathematics
- medical science
- philosophy
- physics
- political science & international relation
- psychology
- public administration
- sociology
- zoology