v.s.b. engineering college, karur department of computer … · 1.you are given a linked list l,and...

39
1 V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer Science and Engineering 2013 Regulations EVEN Semester Assignment Questions S.No. YEAR / SEMESTER NAME OF THE SUBJECT PAGE NO. 1 I / II Semester Programming and Data structures - I 2 2 II / IV Semester Computer networks 9 3 II / IV Semester Operating systems 12 4 II / IV Semester Design and analysis of algorithms 15 5 II / IV Semester Microprocessor and Microcontroller 18 6 II / IV Semester Software Engineering 21 7 III / VI Semester Distributed Systems 23 8 III / VI Semester Mobile computing 25 9 III / VI Semester Compiler Design 26 10 III / VI Semester Artificial intelligence 29 11 III / VI Semester Software testing 31 12 IV / VIII Semester Multicore architecture 35 13 IV / VIII Semester Software Project management 36

Upload: others

Post on 12-Mar-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

1

V.S.B. ENGINEERING COLLEGE, KARUR

Department of Computer Science and Engineering

2013 Regulations EVEN Semester Assignment Questions

S.No. YEAR /

SEMESTER

NAME OF THE SUBJECT PAGE NO.

1 I / II Semester Programming and Data

structures - I

2

2 II / IV Semester Computer networks 9

3 II / IV Semester Operating systems 12

4 II / IV Semester Design and analysis of

algorithms

15

5 II / IV Semester Microprocessor and

Microcontroller

18

6 II / IV Semester Software Engineering 21

7 III / VI Semester Distributed Systems 23

8 III / VI Semester Mobile computing 25

9 III / VI Semester Compiler Design 26

10 III / VI Semester Artificial intelligence 29

11 III / VI Semester Software testing 31

12 IV / VIII Semester Multicore architecture 35

13 IV / VIII Semester Software Project management 36

Page 2: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

2

Assignment Questions

CS6202-Programming and Data Structures I

1.You are given a linked list L,and another linked list P,containing integers,sorted in

ascending order.The operation print_lots(L,P) will print the elements in L that are in

positions specified by P.For instance,if P=1,3,4,6, the first,third,fourth and sixth

elements in L are printed. Write the routine prine_lots(L,P).

You should use only the basic list operations.What is the running time of your routine?

2.Given two sorted lists,L1 and L2 write a procedure to compute L1 and l2 using only

the basic list operations.

3.For each of the use cases below pick a data structure (from the ones you have seen in

the lecture) that is best suited for that use case,and explain your choice.If you think there

is more than one suitable data structure, briefly discuss the trade-offs.

a.You want to store the names of weekdays and access them by the number of a day

within the week.

b.You want to store the stations of a public transportation line.New stations can be

added to both ends of the line , but not between existing stations.You should be able to

traverse the line in both directions.

4.Write a program to find a particular element in a singly linked list.Do this both

recursively and non recursively, and compare the running times. How big does the list

have to be befor the recursive version crashes?

5.Write an array implementation of self adjusting lists. A self adjusting list is like a

regular list, except

That all insertions are performed at the front, and when an element is accessed by a find,

it is moved to the front of the list without changing the relative order of the other items.

6.An alternative to the deletion strategy we have given is to use lazy deletion.To delete

an element, we merely mark it deleted (using an extra bit field) . The number of deleted

and non deleted elements in the list is kept as part of the data structure. If there are as

many deleted elements as non deleted elements, we traverse the entire list, performing

the standard deletion algorithm on all marked nodes.

a.List the advantages and disadvantages of lazy deletion.

b.Write routines to implement the standard linked list operations using lazy deletion.

7.a.Write a program to convert an infix expression which includes ‗(‗,‘)‘,‘+‘,‘-‗,‘*‘ and

‗/‘ to

Postfix.

b.Add the exponentiation operator to your repertoire.

c.Write a program to convert a postfix expression to infix.

Page 3: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

3

8.For each of the use cases below pick a data structure that is best suited for that use

case,and explain your choice.If you think there is more than one suitable data structure,

briefly discuss the trade offs.

a.You want to store a sorted list of strings and support the operation of merging two

sorted lists into one,in place (without creating a copy of the lists).

b.You are writing software for a call center, When a client calls, his call should be stored

until there is a free operator to pick it up.Calls should be processed in the same order

they are received.

9.Show the result of running shell sort on the input 9,8,7,6,5,4,3,2,1 using the increments

{1,3,7}.

10.Show how heapsort processes the input

142,543,123,65,453,879,572,434,111,242,811,102.

11.Write a program to compute the number of collisions required in a long random

sequence of

Insertions using linear probing, quadratic probing, and double hashing.

12.Write a program to implement extendable hashing. If the table is small enough to

fit in main memory, how does its performance compare with open and closed hashing?

13.The larger binary trees were generated automatically by a program. This was done by

assigning an (x,y) coordinate to each tree node, drawing a circle around each coordinate

and connecting each node to its parent.Assume you have a binary search treestored in

memoryand that each node has two extra fields to store coordinate.

a.The x coordinate can be computed by assigning the inorder traversal

number.Write a routine to do this for each node in the tree.

b.The y coordinate can be computed by using the negative of the depth of the

node.Write a routine to do this for each node in the tree.

14.How different is that Poly_phase merge sort and the Multi_way merge sort from the

conventional algorithm.Write the algorithm and substantiate your answer.

15.Write a function to add two polynomials. Do not destroy the input. Use a linked list

implementation. If the polynomials have m and n terms respectively, What is the time

complexity of your program?

16.For each of the use cases below pick a data structure that is best suit for that use case

and explain your choice. If you think there is more than one suitable data structure,

briefly discuss the trade offs.

a.You want to store a phone book, which supports looking up a phone number by

name, as well as adding and removing entries.

b.You are looking for a way out of a maze, and you are not allowed to use

recursion. You have yourself in a dead-end and explore a new possibility from there.

17.Write routines to implement two stacks using only one array. Your stack routines

should not declare an overflow unless every in the array is used.

Page 4: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

4

18.A palindrome is a string that reads the same forwards and backwards. Using only a

fixed number of stacks and queues, the stack and queue ADT functions and a fixed

number of int and char variables, Write an algorithm to determine if a string is a

palindrome. Assume that the string is read from an input stream one character at a time.

The algorithm should output TRUE or FALSE as appropriate.

19.Write a macro definitions with arguments for calculation of Simple Interest and

Amount.Store these macro definitions in a file called ―interest.h‖. Include this file in

your program, and use the macro definitions for calculating simple interest and amount.

20.Write a function to compute the distance between two points and use it to develop

another function that will compute the area of the triangle whose vertices are A(x1,y1),

B(x2,y2), and

C(x3,y3). Use these functions to develop a function which returns a value 1 if the point

(x,y)

Lies inside the triangle ABC, otherwise returns a value 0.

21.Twenty five numbes are entered from the keyboard into an array.The number to be

searched is entered through the keyboard by the user. Write a program to find if the

number to be searched is present in the array and if it is present, display the number of

times it appears in the array.

22.The area of a triangle can be computed by the sine law when two sides of the triangle

and the angle between them are known.

Area=(1/2)ab sin(angle).

Given the following 6 triangular pieces of land, Write a program to find their area and

determine

Which is largest.

Plot No a b angle

1 137.4 80.9 0.78

2 155.2 92.62 0.89

3 149.3 97.93 1.35

4 160.0 100.25 9.00

5 155.6 68.95 1.25

6 149.7 120.0 1.75

23.Write a program that uses an array of pointers to strings str[]. Receive two strings

str1 and str2 and check if str1 is embedded in any of the strings in str[]. If str1[] is found,

then replace it with str2.

Char *str[]={ ―we will teach you how to…‖,

―Move a mountain‖,

―Level a building‖,

Page 5: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

5

―Erase the past‖,

―Make a million‖,

―..all through C‖

};

For example if str1 contains ―mountain‖ and str2 contains ―car‖, then the second string

in str should get changed to ―Move a car‖.

24.A factory has 3 divisions and stocks 4 categories of products. An inventory table is

updated for each division and for each product as they are received. There are three

independent suppliers of products to the factory.

(a) design a data format to represent each transaction.

(b) Write a program to take a transaction and update the inventory.

© Ifthe cost per item is also given write a program to calculate the total inventory

values.

25. An automobile company has serial number for engine parts starting from AA0 to

FF9. The other characteristics of parts to be specified in a structure are:Year of

manufacture, material and quantity manufactured.

(a) Specify a structure to store information corresponding to a part.

(b) Write a program to retrieve information on parts with serial numbers between BB1

and CC6.

26.There is a structure called employee that holds information like employee code,

name, date of joining. Write a program to create an array of structures and enter some

data into it. Then ask the user to enter current date. Display the names of those

employees whose tenure is 3 or more than 3 years according to the given current date.

27.Write a menu driven program that depicts the working of a library. The menu options

should be:

1.Add book information.

2.Display book information.

3.List all books of given author.

4.List the title of specified book.

5.List the count of boks in the library.

6.List the books in the order of accession nimber

7.Exit

28.A hospital keeps a file of blood donors in which each record has the format:

Name: 20 columns

Page 6: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

6

Address: 40 columns

Age: 2 columns

Blood Type: 1 column (Type 1,2,3 or 4)

Write a program to read the file and print a list of all blood donors whose age is below

25 and blood is type 2.

29.You are given a data file EMPLOYEE.DAT with the following record structure:

Struct employee {

int empno;

char name[30];

int basic,grade;

};

Every employee has a unique empno and there are supposed to be no gaps between

employee numbers. Records are entered in to the data file in ascending order of

employee number. It is intended to check whether there are missing employee numbers.

Write a program to read the data file recors sequentially and display the list of missing

employee numbers.

30.Write a program to carry out the following:

-To read a text file ―TRIAL.TXT‖ consisting of a maximum of 50 lines of text, each

line with a maximum of 80 characters.

-Count and display the number of words contained in the file.

-Display the total number of four letter words in the text file.

Assume that the end of a word may be a space, comma or a full-stop followed by one or

more spaces or a newline character.

31.Write a program to read and store information about insurance policy holder. The

information contains details like gender, whether the holder is minor/major, policy name

and duration of the policy.Make use of bit-fields to store this information.

32.Ramesh‘s basic salary is input through the keyboard. His dearness allowance is 40%

of basic salary, and house rent allowance is 20% of basic salary. Write a program to

calculate his gross salary.

33.The distance between two cities in km) is input through the keyboard. Write a

program to convert and print this distance in meters, feet, inches and centimeters.

34.If the marks obtained by a student in five different subjects are input through the

keyboard, Write a program to find out the aggregate marks and percentage marks

obtained by the student. Assume that the maximum marks that can be obtained by a

student in each subject is 100.

Page 7: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

7

35.In a town, the percentage of men is 52. The percentage of total literacy is 48. If total

percentage of literate men is 35 of the total population, write a program to find the total

number of illiterate men and women if the population of the town is 80,000.

36.A cashier has currency notes of denominations 10,50 and 100. If the amount to be

withdrawn is input through keyboard in hundreds, write a program to find the total

number of currency notes of each denomination the cashier will have to give to the

withdrawer.

37.A library charges a fine for every book returned late. For first 5 days the fine is 50

paise, for 6-10 days fine is one rupee and above 10 days fine is 5 rupees. If you return

the book after 30 days your membership will be cancelled. Write a program to accept the

number of days the

Member is late to return the book and display the fine or the appropriate message.

38.The policy followed by a company to process customer orders is given by the

following rules:

(a) If a customer order quantity is less than or equal to that in stock and his credit is

OJK, supply

His requirement.

(b) If his credit is not OK do not supply. Send him an information.

©If his credit is OK but the item in stock is less than his order, supply what is in stock.

Intimate to him the date on which the balance will be shipped.

Write a C program to implement the company policy.

39.Write a program to calculate overtime pay of 10 employees. Overtime is paid at the

rate of rs.12.00 per hour for every hour worked above 40 hours.Assume that employees

do not work for fractional part of an hour.

40.Write a program for a matchstick game being played between the computer and a

user. Your program should ensure that the computer always wins. Rules for the game are

as follows:

- There are 21 matchsticks

- The computer asks the player to pick 1,2,3, or 4 matchsticks.

-After the person picks,the computer does its picking.

-Whoever is forced to pick up the last matchstick loses the game.

41. Write a menu driven program which has following options:

1.factorial of a number

2.Prime or not

3.Odd or even

4.Exit

Page 8: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

8

Once a menu item is selected the appropriate action should be taken and once this action

is finished, the menu should reappear.unless the user selects the ‗Exit‘ option the

program should continue to work.Hint: make use of an infinite while and a switch

statement.

42.Write a program using command line arguments to search for a word in a file and

replace it with the specified word. The usage of the program is shown below.

c> change <old word> <new word> <filename>

43.Write a program that can be used at command prompt as a calculating utility. The

usage of the program is shown below:

c> calc <switch> <n> <m>

where, n and m are two integer operands. Switch can be any one of the arithmetic or

comparison operators. If arithmetic operator is supplied, the output shoud be the result

of the operation. If comparison operator is supplied then the output should be true or

false.

44.the information about colors is to be stored in bits of a char variable called color.The

bit number 0 to 6, each represent 7 colors of a rainbow, ie. Bit 0 represents violet, 1

represents indigo and so on. Write a program that asks the user to enter a number and

based on this number it reports which colors in the rainbow does the number represents.

45.Create an array of four function pointers. Each pointer should point to a different

function. Each of these functions should receive two integers and return a float. Using a

loop call each of these functions using the addresses present in the array.

46.Write a function that receives variable number of arguments, where the arguments

are the coordinates of a point. Based on the number of arguments received, the function

should display type of shape like a point, line, triangle, etc. that can be drawn.

47.Write a program, which stores information about a date in a structure containing

three members – day, month and year. Using bit fields the day number should get stored

in first 5 bits of day, the month number in 4 bits of month and year in 12 bits of year.

Write a program to read date of joining of 10 employees and display them in ascending

order of year.

48.Write a program, which displays ―hello‖ at any place in the window where you click

the left mouse button. If yo click the right mouse button, the color of subsequent

―hello‖s should change.

49.Write a program to create chessboard like boxes(8*8) in the client area. If the

window is resized the boxes should also get resized so that all the 64 boxes are visible at

all times.

50.Write a program that displays different text in different colors and fonts at different

places after every 10 seconds.

Page 9: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

9

Class:II Year/ IV Semester B.E., Computer Science and Engineering ‘A’ &‘B’

Section’s

Name of Subject: Computer Networks

Name of Faculty Member: I.Vasudevan

1. Use anonymous FTP to connect to ftp.isi.edu (directory in-notes), and retrieve the

RFC index. Also retrieve the protocol specifications for TCP, IP, and UDP.

2. Use a Web search tool to locate useful, general, and noncommercial information

about the following topics: M Bone, ATM, MPEG, IPv6, and Ethernet.

3. The UNIX utility who is can be used to find the domain name corresponding to an

organization, or vice versa. Read the man page documentation for who is an

experiment with it. Try who is princeton.edu and who is prince on, for starters.

4. What differences in traffic patterns account for the fact that STDM is a cost effective

form of multiplexing for a voice telephone network and FDM is a cost effective form

of multiplexing for television and radio networks, yet we reject both as not being cost-

effective for a general-purpose computer network?

5. Compare the channel requirements for voice traffic with the requirements for the real-

time transmission of music, in terms of bandwidth, delay, and jitter. What would

have to improve? By approximately how much? Could any channel requirements be

relaxed?

6. Suppose a shared medium M offers to hosts A1, A2, . . ., AN in round-robin fashion

an opportunity to transmit one packet; hosts that have nothing to send immediately

relinquish M. How does this differ from STDM? How does network utilization of this

scheme compare with STDM?

7. Modify the simplex-talk socket program so that each time the client sends a line to the

server, the server sends the line back to the client. The client (and server) will now

have to make alternating calls to recv() and send().

8. Investigate the different options and parameters that you can set for a TCP connection

(Do man tcp on Unix.) Experiment with various parameter settings to see how they

affect TCP performance.

9. The Unix utility trace route, or its Windows equivalent tracert, can be used to find the

sequence of routers through which a message is routed. Use this to find the path from

your site to some others. How well does the number of hops correlate with the RTT

times from ping? How well the number of does hops correlate with geographical

distance?

10. Suppose that one byte in a buffer covered by the Internet checksum algorithm needs

to be decremented (e.g., a header hop count field). Give an algorithm to compute the

revised checksum without rescanning the entire buffer. Your algorithm should

consider whether the byte in question is low order or high order.

11. The text suggests that the sliding window protocol can be used to implement flow

control. We can imagine doing this by having the receiver delay ACKs, that is, not

send the ACK until there is free buffer space to hold the next frame. In doing so,

each ACK would simultaneously acknowledge the receipt of the last frame and tell

the source that there is now free buffer space available to hold the next frame.

Explain why implementing flow control in this way is not a good idea.

12. Describe a protocol combining the sliding window algorithm with selective ACKs.

Your protocol should retransmit promptly, but not if a frame simply arrives one or

two positions out of order. Your protocol should also make explicit what happens if

several consecutive frames are lost.

13. Why is it important for protocols configured on top of the Ethernet to have length

field in their header, indicating how long the message is?

Page 10: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

10

14. What kinds of problems can arise when two hosts on the same Ethernet share the

same hardware address? Describe what happens and why that behavior is a

problem.

15. Ethernets use Manchester encoding. Assuming that hosts sharing the Ethernet are not

perfectly synchronized, why does this allow collisions to be detected soon after

they occur, without waiting for the CRC at the end of the packet?

16. What conditions would have to hold for a corrupted frame to circulate forever on a

token ring without a monitor? How does the monitor fix this problem?

17. Propose a mechanism that virtual circuit switches might use so that if one switch

loses all its state regarding connections, then a sender of packets along a path

through that switch is informed of the failure.

18. Propose a mechanism that might be used by datagram switches so that if one switch

loses all or part of its forwarding table, affected senders are informed of the failure.

19. Give an example of a working virtual circuit whose path traverses some link twice.

Packets sent along this path should not, however, circulate indefinitely.

20. Suppose a bridge has two of its ports on the same network. How might the bridge

detect and correct this?

21. Cell switching methods essentially always use virtual circuit routing rather than

datagram routing. Give a specific argument why this is so.

22. What aspect of IP addresses makes it necessary to have one address per network

interface, rather than just one per host? In light of your answer, why does IP

tolerate point-to-point interfaces that have non unique addresses or no addresses?

23. Why do you think IPv4 has fragment reassembly done at the endpoint, rather than at

the next router? Why do you think IPv6 abandoned fragmentation entirely? Hint:

Think about the differences between IP-layer fragmentation and link-layer

Fragmentation.

24. Having ARP table entries time out after 10–15 minutes is an attempt at a reasonable

compromise. Describe the problems that can occur if the timeout value is too small

or too large.

25. IP currently uses 32-bit addresses. If we could redesign IP to use the 6-byte MAC

address instead of the 32-bit address, would we be able to eliminate the need for

ARP? Explain why or why not.

26. IP hosts that are not designated routers are required to drop packets misaddressed to

them, even if they would otherwise be able to forward them correctly. In the

absence of this requirement, what would happen if a packet addressed to IP address

A were inadvertently broadcast at the link layer? What other justifications for

this requirement can you think of?

27. Read the man page or other documentation for the Unix/Windows utility netstat. Use

net stat to display the current IP routing table on your host. Explain the purpose of

each entry. What is the practical minimum number of entries?

28. Use the Unix utility traceroute (Windows tracert) to determine how many hops it is

from your host to other hosts in the Internet (e.g., cs.princeton.edu or

www.cisco.com). How many routers do you traverse just to get out of your local

site? Read the man page or other documentation for traceroute and explain how it is

implemented.

29. What will happen if traceroute is used to find the path to an unassigned address?

Does it matter if the network portion or only the host portion is unassigned?

30. The telephone system uses geographical addressing. Why do you think this wasn‘t

adopted as a matter of course by the Internet?

31. Determine if your site is connected to the MBone. If so, investigate and experiment

with any MBone tools, such as sdr, vat, and vic.

Page 11: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

11

32. MPLS labels are usually 20 bits long. Explain why this provides enough labels when

MPLS is used for destination-based forwarding.

33. MPLS has sometimes been claimed to improve router performance. Explain why this

might be true, and suggest reasons why in practice this may not be the case.

34. When closing a TCP connection, why is the two-segment-lifetime timeout not

necessary on the transition from LAST ACK to CLOSED?

35. A sender on a TCP connection that receives a 0 advertised window periodically

probes the receiver to discover when the window becomes nonzero. Why would the

receiver need an extra timer if it were responsible for reporting that its advertised

window had become nonzero (i.e., if the sender did not probe)?

36. Read the man page (or Windows equivalent) for the Unix/Windows utility net stat.

Use net stat to see the state of the local TCP connections. Find out how long closing

connections spend in TIME WAIT.

37. Suppose a host wants to establish the reliability of a link by sending packets and

measuring the percentage that are received; routers, for example, do this. Explain

the difficulty of doing this over a TCP connection.

38. Explain why TIME WAIT is a somewhat more serious problem if the server initiates

the close than if the client does. Describe a situation in which this might

reasonably happen.

39. What is the justification for the exponential increase in timeout value proposed by

Karn and Partridge? Why, specifically, might a linear (or slower) increase beless

desirable?

40. The Jacobson/Karels algorithm sets Time Out to be 4 mean deviations above the

mean. Assume that individual packet round-trip times follow a statistical normal

distribution, for which 4 mean deviations are π standard deviations. Using statistical

tables, for example, what is the probability that a packet will take more than Time

Out time to arrive

41. Write your own implementation of htonl. Using both your own htonl and (if little-

endian hardware is available) the standard library version, run appropriate

experiments to determine how much longer it takes to byte-swap integers versus

merely copying them.

42. What DNS cache issues are involved in changing the IP address of, say, a Web

server host name? How might these be minimized?

43. Discuss how you might rewrite SMTP or HTTP to make use of a hypothetical

general- purpose request/reply protocol (perhaps something like CHAN RPC).

Could an appropriate analog of persistent connections be moved from the

application layer into such a transport protocol? What other application tasks

might be moved into this protocol?

44. Most Telnet clients can be used to connect to port 25, the SMTP port, instead of to

the Telnet port. Using such a tool, connect to an SMTP server and send yourself (or

someone else, with permission) some forged email. Then examine the headers for

evidence the message isn‘t genuine.

45. What features might be used by (or added to) SMTP and/or a mail daemon such as

send mail to provide some resistance to email forgeries as in the previous exercise?

46. One of the central problems faced by a protocol such as MIME is the vast number of

data formats available. Consult the MIME RFC to find out how MIME deals with

new or system-specific image and text formats.

47. MIME supports multiple representations of the same content using the multipart/

alternative syntax; for example, text could be sent as text/plain, text/richtext, and

application/postscript. Why do you think plaintext is supposed to be the first

Page 12: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

12

format, even though implementations might find it easier to place plaintext after

their native format?

48. Consult the MIME RFC to find out how base64 encoding handles binary data of a

length not evenly divisible by three bytes.

49. Find out how to configure an HTTP server so as to eliminate the 404 not found

message and have a default (and hopefully friendlier) message returned instead.

Decide if such a feature is part of the protocol or part of an implementation, or is

technically even permitted by the protocol. (Documentation for the apache HTTP

server can be found at www.apache.org.)

50. Using the SNMP device and utilities of the previous exercise, fetch the tcp group

(numerically, group 6) or some other group. Then do something to make some of

the group‘s counters change, and fetch the group again to show the change. Try to

do this in such a way that you can be sure your actions were the cause of the change

recorded.

Operating Systems

1. Consider the following set of processes, with the length of the CPU-burst time given

in milliseconds:

Process Burst Time Priority

1. P1 10 0 3

2 .P2 29 1 1

3. P3 3 2 4

4. P4 7 3 5

5. P5 12 4 2

The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0.

a. Draw four Gantt charts illustrating the execution of these processes using FCFS,SJF,A

non preemptive priority (a smaller priority number implies a higher priority), and RR

(quantum = 1) scheduling.

b. What is the turnaround time of each process for each of the scheduling algorithms in

part a?

c. What is the waiting time of each process for each of the scheduling algorithms in Part

a?

d. Which of the schedules in part a results in the minimal average waiting time (over all

processes)?

2. Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2,

1, 2, 3, 6.

How many page faults would occur for the following replacement algorithms, assuming

one, two, three,

four, five, six, or seven frames?

Remember all frames are initially empty, so your first unique pages will all cost one

fault each.

LRU replacement

FIFO replacement

Optimal replacement

3. Consider the following page reference string:

1,2,3,4,2,1,5,6,1,2,3,7,6,3,2,1,2,3,6

Page 13: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

13

How many page faults would occur for the LRU, FIFO, LFU and optimal page

replacement algorithms assuming two and five frames?

4. Consider the following page reference string:

1,2,3,4,2,1,5,6,1,2,3,7,6,3,2,1,2,3,6

How many page faults would occur for the LRU, FIFO, LFU and optimal page

replacement algorithms assuming three and four frames?

5. Consider the following page reference string:

1,2,3,4,2,1,5,6,1,2,3,7,6,3,2,1,2,3,6

How many page faults would occur for the LRU, FIFO, LFU and optimal page

replacement algorithms assuming two and six frames?

6. Consider the following page reference string:

1,2,3,4,2,1,5,6,1,2,3,7,6,3,2,1,2,3,6

How many page faults would occur for the LRU, FIFO, LFU and optimal page

replacement algorithms assuming seven frames?

7. Consider the following page reference string: 7,5,7,8,6,0,1,8,9,7,5,4,3,2,1.

How many page faults would occur for the following replacement algorithms, assuming

one, two, three,

four, five, six, or seven frames?

Remember all frames are initially empty, so your first unique pages will all cost one

fault each.

LRU replacement

FIFO replacement

Optimal replacement

8. Consider the following page reference string: 8,5,6,4,7,2,1,9,7,2,0,1,6,8,9,0,1.

How many page faults would occur for the following replacement algorithms, assuming

one, two, three,

four, five, six, or seven frames?

Remember all frames are initially empty, so your first unique pages will all cost one

fault each.

LRU replacement

FIFO replacement

Optimal replacement

9. Consider the following set of processes, with the length of the CPU-burst time given

in milliseconds:

Process Burst Time Priority

1. P1 5 4 3

2 .P2 2 6 7

3. P3 8 2 4

4. P4 7 3 1

5. P5 6 4 3

The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0.

a. Draw four Gantt charts illustrating the execution of these processes using FCFS,SJF,A

non preemptive priority (a smaller priority number implies a higher priority), and RR

(quantum = 3) scheduling.

Page 14: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

14

b. What is the turnaround time of each process for each of the scheduling algorithms in

part a?

c. What is the waiting time of each process for each of the scheduling algorithms in Part

a?

d. Which of the schedules in part a results in the minimal average waiting time (over all

processes)?

10. Consider the following set of processes, with the length of the CPU-burst time given

in milliseconds:

Process Burst Time Priority

1. P1 4 6 7

2 .P2 3 2 0

3. P3 1 8 5

4. P4 7 9 8

5. P5 4 3 2

The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0.

a. Draw four Gantt charts illustrating the execution of these processes using FCFS,SJF,A

non preemptive priority (a smaller priority number implies a higher priority), and RR

(quantum = 2) scheduling.

b. What is the turnaround time of each process for each of the scheduling algorithms in

part a?

c. What is the waiting time of each process for each of the scheduling algorithms in Part

a?

d. Which of the schedules in part a results in the minimal average waiting time (over all

processes)?

11. Linux System

12. System Administration, Requirements for Linux System Administrator

13. Setting up a LINUX Multifunction Server

14. Domain Name System and Setting up Local Network Services

15. Virtualization

16. Setting Up Xen

17. VMware on Linux Host

18. Adding Guest OS

19. Windows 7

20. Windows 8

21. Windows 10

22. Consider the following set of processes, with the length of the CPU-burst time given

in milliseconds:

Process Burst Time Priority

1. P1 4 5 6

2 .P2 3 4 2

3. P3 7 8 9

4. P4 5 2 3

5. P5 4 3 1

The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0.

a. Draw four Gantt charts illustrating the execution of these processes using FCFS,SJF,A

non preemptive priority (a smaller priority number implies a higher priority), and RR

(quantum = 4) scheduling.

Page 15: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

15

b. What is the turnaround time of each process for each of the scheduling algorithms in

part a?

c. What is the waiting time of each process for each of the scheduling algorithms in Part

a?

d. Which of the schedules in part a results in the minimal average waiting time (over all

processes)?

23. Consider the following set of processes, with the length of the CPU-burst time given

in milliseconds:

Process Burst Time Priority

1. P1 4 3 5

2 .P2 8 9 7

3. P3 7 2 3

4. P4 1 2 4

5. P5 5 2 1

The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0.

a. Draw four Gantt charts illustrating the execution of these processes using FCFS,SJF,A

non preemptive priority (a smaller priority number implies a higher priority), and RR

(quantum = 1) scheduling.

b. What is the turnaround time of each process for each of the scheduling algorithms in

part a?

c. What is the waiting time of each process for each of the scheduling algorithms in Part

a?

d. Which of the schedules in part a results in the minimal average waiting time (over all

processes)?

24. Consider the following page reference string:

3,2,1,4,6,7,8,4,9,2,1,5,4,3,2,1

How many page faults would occur for the LRU, FIFO, LFU and optimal page

replacement algorithms assuming two, three, four and five frames?

25. Consider the following page reference string:

7,2,4,3,8,9,4,1,6,7,9,1,4,5,3,8,7,6,4,2,1,2.

How many page faults would occur for the LRU, FIFO, LFU and optimal page

replacement algorithms assuming three and five frames?

Class: II Year / IV Semester B.E. Computer Science and Engineering- ‘A’ and ‘B’

Name of Subject: Design and Analysis of Algorithm

Name of Faculty member: Ms.M.Meenakshi Dhanalakshmi

1. Estimate how many times faster it will be to find gcd (31415, 14142) by Euclid‘s

algorithm compared with the algorithm based on checking consecutive integers from

min{m, n} down to gcd(m, n).

2. Write down driving directions for going from your school to your home with the

precision required by Travelling salesman algorithm.

3. Suggest how any sorting algorithm can be augmented in a way to make the best-case

count of its key comparisons equal to just n − 1 (n is a list‘s size, of course). Do you

think it would be a worthwhile addition to any sorting algorithm?

4. Use the most appropriate notation among O, Θ, and Ω to indicate the time efficiency

class of sequential search

Page 16: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

16

a. in the worst case.

b. in the best case.

c. in the average case.

5. Design a recursive algorithm for computing 2n for any nonnegative integer n that is

based on the formula: 2n = 2n−1 + 2n−1.

6. Improve the implementation of the matrix multiplication algorithm by reducing the

number of additions made by the algorithm. What effect will this change have on the

algorithm‘s efficiency?

7. Consider the problem of counting, in a given text, the number of substrings that start

with an A and end with a B. (For example, there are four such substrings in

CABAAXBYA.)

(a) Design a brute-force algorithm for this problem and determine its efficiency class.

(b) Design a more efficient algorithm for this problem.

8. One can implement mergesort without a recursion by starting with merging adjacent

elements of a given array, then merging sorted pairs, and so on. Implement this bottom-

up version of mergesort in the language of your choice.

9. Apply mergesort to sort the list E, X, A, M, P, L, E in alphabetical order.

10. What is Travelling Salesperson Problem? Write about the branch and bound solution for

TSP. Solve the following TSP:

11. Give an example of an array of n elements for which the sentinel mentioned in the text is

actually needed. What should be its value? Also explain why a single sentinel suffices

for any input.

12. Apply quick sort to sort the list E, X, A, M, P, L, E in alphabetical order. Draw the tree

of the recursive calls made.

13. Traverse the following binary tree

a.. in preorder. b. in inorder. c. in postorder.

14. Shortest path around There is a fenced area in the two-dimensional Euclidean plane in

the shape of a convex polygon with vertices at points P1(x1, y1), P2(x2, y2), ..., Pn(xn,

yn) (not necessarily in this order). There are two more points, A(xA, yA) and B(xB,

yB), such that xA < min{x1, x2, ..., xn} and xB > max{x1, x2, ..., xn}. Design a

reasonably efficient algorithm for computing the length of the shortest path between A

and B.

Page 17: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

17

15. Explain how merge sort works? Sort the following sequence: { 17, 28, 31, 35, 65, 25,

42, 86, 45, 52 }. Write the Merge Sort Algorithm. Analyze the time complexity .

16. Apply insertion sort to sort the list E, X, A, M, P, L, E in alphabetical order.

17. Apply shellsort to the list

S, H, E, L, L, S, O, R, T, I, S, U, S, E, F, U, L

18. A graph is said to be bipartite if all its vertices can be partitioned into two disjoint

subsets X and Y so that every edge connects a vertex in X with a vertex in Y . (We can

also say that a graph is bipartite if its vertices can be colored in two colors so that

every edge has its vertices colored in different colors; such graphs are also called 2-

colorable). For example, graph (i) is bipartite while graph (ii) is not.

a. Design a DFS-based algorithm for checking whether a graph is bipartite.

b. Design a BFS-based algorithm for checking whether a graph is bipartite.

19. Construct a 2-3 tree for the list C, O, M, P, U, T, I, N, G.

20. Explain how hashing can be applied to check whether all elements of a list are distinct.

What is the time efficiency of this application?

21. A top-down 2-3-4 tree is a B-tree of order 4 with the following modification of the

insert operation. Whenever a search for a leaf for a new key encounters a full node (i.e.,

a node with three keys), the node is split into two nodes by sending its middle key to

the node‘s parent (or, if the full node happens to be the root, the new root for the middle

key is created). Construct a top-down 2-3-4 tree by inserting the following list of keys

in the initially empty tree:

10, 6, 15, 31, 20, 27, 50, 44, 18.

22. Discuss about Optimal Binary Search Trees with help of an example? Let n=4, and

(a1, a2, a3, a4) = (do, if, int, while), p(a:4)=(0.15,0.10,0.05,0.10,0.20) and q(0:4) =

0.05,0.10,0.05,0.05,0.10), generate the OBST.

23. Find a stable-marriage matching for the instance defined by the following ranking

matrix:

Page 18: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

18

24. Consider the problem of scheduling n jobs of known durations t1, ..., tn for execution

by a single processor. The jobs can be executed in any order, one job at a time. You

want to find a schedule that minimizes the total time spent by all the jobs in the system.

(The time spent by one job in the system is the sum of the time spent by this job in

waiting plus the time spent on its execution.

25. Consider the linear programming problem

Minimize c1x + c2y

subject to x + y ≥ 4

x +3y ≥ 6

x ≥ 0, y ≥ 0

where c1 and c2 are some real numbers not both equal to zero.

(a) Give an example of the coefficient values c1 and c2 for which the problem has a

unique optimal solution.

(b) Give an example of the coefficient values c1 and c2 for which the problem has

infinitely many optimal solutions.

(c) Give an example of the coefficient values c1 and c2 for which the problem does

not have an optimal solution.

Class: II Year IV Semester B.E. Computer Science and Engineering

Name of Subject: Microprocessor and Microcontroller

Name of Faculty member: Ms. G. Misal

1. Interface alpha numeric display with processor and display ―COMPUTER‖ word

in rotating mode.

2. Search a key element in a list of ‗n‘ 16-bit numbers using the Binary search

algorithm using 8086.

3. Sort a given set of ‗n‘ numbers in ascending order using the Bubble Sort

algorithm using 8086.

4. Read the current time from the system and display it in the standard format on

the screen. P4. Compute nCr using recursive procedure. Assume that ‗n‘ and ‗r‘

are non-negative integers.

5. Write a program to create a file (input file) and to delete an existing file.

6. Write two ALP modules stored in two different files; one module is to read a

character from the keyboard and the other one is to display a character. Use the

above two modules to read a string of characters from the keyboard terminated

by the carriage return and print the string on the display in the next line.

7. Reverse a given string and check whether it is a palindrome or not.

8. Read two strings, store them in locations STR1 and STR2. Check whether they

are equal or not and display appropriate messages. Also display the length of the

stored strings.Design XML Schema and XML instance document WSDL based:

Implement Arithmetic Service that implements add, and subtract operations /

Java based: Implement Trigonometric Service.

7. Read your name from the keyboard and display it at a specified location on the

screen after

Page 19: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

19

the message ―What is your name?‖ You must clear the entire screen before

display.

8. Read an alphanumeric character and display its equivalent ASCII code at the

center of the

screen.

9. Read a pair of input co-ordinates in BCD and move the cursor to the specified

location on

the screen.

10. Write a program to simulate a Decimal Up-counter to display 00-99.

11. Read the status of eight input bits from the Logic Controller Interface and display

‗FF‘ if it is

the parity of the input read is even; otherwise display 00.

12. Implement a BCD Up-Down Counter on the Logic Controller Interface

13. Read the status of two 8-bit inputs (X & Y) from the Logic Controller Interface

and display

X*Y.

14. Drive a Stepper Motor interface to rotate the motor in specified direction

(clockwise or

counter-clockwise) by N steps (Direction and N are specified by the examiner).

Introduce

suitable delay between successive steps. (Any arbitrary value for the delay may

be assumed

by the student).

15. Display messages FIRE and HELP alternately with flickering effects on a 7-

segment display

interface for a suitable period of time. Ensure a flashing rate that makes it easy to

read both

the messages (Examiner does not specify these delay values nor is it necessary

for the

student to compute these values).

16. Assume any suitable message of 12 characters length and display it in the rolling

fashion on

a 7-segment display interface for a suitable period of time. Ensure a flashing rate

that makes

it easy to read both the messages. (Examiner does not specify these delay values

nor is it

necessary for the student to compute these values).

17. Convert a 16-bit binary value (assumed to be an unsigned integer) to BCD and

display it

from left to right and right to left for specified number of times on a 7-segment

display

interface.

Page 20: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

20

18. Scan a 8 x 3 keypad for key closure and to store the code of the key pressed in a

memory

location or display on screen. Also display row and column numbers of the key

pressed.

19. Generate the Sine Wave using DAC interface (The output of the DAC is to be

displayed on

the CRO).

20. Generate a Half Rectified Sine wave form using the DAC interface. (The output

of the

DAC is to be displayed on the CRO).

21. Generate a Fully Rectified Sine waveform using the DAC interface. (The output

of the DAC

is to be displayed on the CRO).

22. Drive an elevator interface in the following way:

i. Initially the elevator should be in the ground floor, with all requests in OFF

state.

ii. When a request is made from a floor, the elevator should move to that floor,

wait there

for a couple of seconds (approximately), and then come down to ground floor

and stop.

If some requests occur during going up or coming down they should be

ignored.

23. Design a microcontroller based automobile alarm system. Give a general block

diagram,

circuit diagram and program. The purpose of the system is to prevent intruders

from stealing

the car or any other items in the vehicle.

24. Write a program using 8086 for copying the 12 bytes of data from source to

destination and

verify.

25. Implementation of temperature sensor using Nuvoton board.

26. Write a program for digital clock using design using 8086.

27. Write an assembly language program based on 8085 microprocessor to

implement a look-up

table translation to generate the codes for seven-segment display with our digits.

(Assume

INPUT PORT O D 6 H, and OUTPUT PORT OD 4H).

28. a. Given that the stack segment register is pointing to location 1105h, the stack

pointer

register contains 001Ah, AX = 2456h, BX = 4562h, indicate the address of

the bottom of

the stack, and the address of the top of the stack. If the instruction PUSH AX

Page 21: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

21

followed

by instruction PUSH BX are performed, calculate the new value of SP and

indicate how

the values of AX and BX are stored in memory.

28.b. Given that the stack segment register is pointing to location 2408h, the stack

pointer

register contains 000Ah, location 2408Ah contains 8934h and location 2408Ch

contains

1243h, indicate the address of the bottom of the stack, and the address of the

top of the

stack. If the instruction POP AX followed by instruction POP BX are

performed, calculate

the new value of SP and the values of AX and BX.

29. Write ALP to find mean, median and mode of the given series of number.

30. Write a program to transfer 5 words from starting source address 8000ch to the

starting

destination address 80010h, all the memory segments should be overlapped.

CS6403 Software Engineering

1. What IBM Enterprise IT Automation Services can do for software engineering?

2. Give a detail study about Automating outcomes versus automating processes.

3. Influence of IBM Watson in automation of software engineering.

4. What is the scope of Software Engineering? What‘s going on in software

engineering? What‘s the current ―next big thing?‖

5. Explain future trends in Software Engineering Research for Mobile Apps.

6. What makes automation possible? Why semi-automation is better than full

automation? So, when is full automation preferable to semi-automation?

7. What's the use of PEGA technology (Business Process Management tool)?

8. What are Software Analysis Tools? How software analysis work throughout the

development cycle?

9. Why Testing Tools are used? Give examples of widely used Testing Tools.

10. You have been appointed a project manager for a major software products company.

Your job is to manage the development of the next generation version of its widely

used word-processing software. Because competition is intense, tight deadlines have

been established and announced. What team structure would you choose and why?

What software process model(s) would you choose and why?

11. Assume that you are the technical manager of software of a software development

organization. A client approached you for a software solution. The problems stated

by the client have uncertainties which lead to loss if it not planned and solved.

Which software development model you will suggest for this project – Justify.

Explain that model with its pros and cons and neat sketch.

12. For a case study of your choice show the architectural and component design.

13. Why does software fail after it has passed from acceptance testing?

14. Draw the diagram which represent ―Translating requirements model into design

model‖.

15. Consider a program for determining the previous date. Its input is a triple of day,

month and year with the values in the range 1 <-month <=12,

Page 22: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

22

1<=day<=31,1990<=year<=2014. The possible outputs would be previous date or

invalid input date. Design the boundary value test cases.

16. A program specs state the following for the input field. The program shall accept an

input value of 4-digit integer equal or greater than 2000 and less than or equal 8000.

Determine the test cases using

17. Equivalence class partitioning

18. Boundary value analysis.

19. Mr.Koushan is the project manager on a project to build a new cricket stadium in

Mumbai, India. After six months of work, the project is 27% complete. At the start

of the project, Koushan estimated that it would cost $50,000.000, What is the Earned

Value?

20. Suggest three measures, three metrics, and corresponding indicators that might be

used to assess the service department of an automobile dealership.

21. Apply Spiral model or Waterfall model for the development of the Railway

Reservation System.

22. Consider a University registration system. The system is to handle student

registration for various courses offered by the university as well as for examinations.

Identify the risks associated with such a software system.

23. You are developing a safety critical system which will control the operations at a

nuclear power plant. Which software development model will you use and why?

24. A software development company is developing a website for FIFA Soccer world

cup 2016. The web site will remain operational for 3 months. What process model

should be used for software development? Justify your answer.

25. An Educational Institute requires a library management system and has contacted

your firm. You have 25 programmers, out of which 18 are busy with other projects

for the time being. The Institute intends to acquire library books and other

equipment, which they want to interface with the computer system. The annual

evaluation of the Institute is due soon, in which computerization initiatives are

appreciated.

i. List the process model that you think will be most appropriate for

the following situation. Also list your reasons for choosing the

process model and any assumptions that you make.

ii. List three reasons not to choose

Spiral Model

iii. List three reasons not to choose RAD Model

26. You are the project manager for a new management accounting system that will

provide monthly profit and loss accounts to a chain of 30 computer dealerships, each

of which is franchised to its local owner/manager. They have all done their own

accounting before. What change issues would you expect to encounter? Does the

fact that they are PC dealerships make any difference? Why might they have joined

together in the chain?

27. Consider the organization that employs you or where you study. What is its culture?

Why does it have that particular culture? What organizational culture would give

you most satisfaction as an employee? Where might you find such an employer?

Given your preferred organizational culture, what would it mean for you as an

employee in terms of your responsibilities and obligations?

28. If you knew about an organization‘s strategy, could you suggest IS applications that

would support it? For example, how could a large supermarket chain use information

systems for cost reduction, or for a strategy based on differentiation?

29. What would you say are the principal advantages and disadvantages of the sequential

approach to system development offered by the waterfall and ‗V‘ lifecycle models?

Page 23: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

23

30. Increasing interest is being taken in the use of rapid application development. Why is

this, and are there any dangers associated with the RAD approach?

31. Consider how you would organize your project team for a RAD-type project. What

leadership practices would it require from the project leader and what would the

team members have to do? How, and at which points, would you involve the users?

32. The Delphi technique aims to achieve a consensus estimate from the efforts of a

number of estimators. How is this achieved and what is the advantage of the Delphi

technique over, for example, a round-table discussion?

33. Scheduling a project involves understanding the degree to which project tasks can be

partitioned. What is meant by this term and what effect does partitioning have on the

scheduling process?

34. What do you understand by the term project milestone? How would you decide how

many milestones to show on your project plan?

35. Your project is behind schedule and you are considering adding extra staff to the

team. What would be the potential advantages and disadvantages of this approach?

36. If you had to develop a strategy for a small software house employing 50 or so

professional computer people, how would you go about it? What criteria would you

use to test whether or not the strategy was sound?

Class: III Year VI Semester B.E. Computer Science and Engineering – ‘A’ & ‘B’ Sections

Name of Subject: Distributed Systems

Name of Faculty member: Mrs.M.Mythili

1. Develop a program for concurrent echo client server application using C.

2. Develop a program for concurrent day time client server application using C.

3. Test and Configure following options on server socket: SO_KEEPALIVE,

SO_LINGER, SO_SNDBUF, SO_RCVBUF, TCP_NODELAY.

4. Design a program to Incrementing a counter in shared memory.

5. Create CORBA based server client application.

6. Design XML Schema and XML instance document WSDL based: Implement

Arithmetic Service that implements add, and subtract operations / Java based:

Implement Trigonometric Service]

7. Build a program to implement sin and cos operations.

8. Test and Configure reliability and security options in sockets using Java.

9. Monitor SOAP request and response packets. Analyze parts of it and compare

them with the operations (java functions) headers.

10. Design and test BPEL module that composes Arithmetic Service and

Trigonometric Service.

11. Design a program that offers an electronic postcard service using the existing

components.

i. a client for card database and card write

ii. Server for the web browser

12. Develop the user interface in HTML three web pages.

i. First webpage presents all cards in the database a as thumbnails

ii. Second page has the image choose cards and text fill to input quality

message

Page 24: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

24

iii. Third page consists of card with message embedded in card

13. Create a program to simulate the functioning of lamports logical clock using C

and java.

14. Create a program to simulate the distributed mutual exclusion in C & Java.

15. Design a CORBA mechanism by using C++ in one end and Java program at

other end.

16. Test a program to implement a distributed chat server using TCP sockets in C.

17. Give five types of hardware resources and five types of data or software

resources that can usefully be shared. Give examples of their sharing as it occurs

in distributed systems.

18. Give an example of a URL. List the main components of a URL, stating how

their boundaries are denoted and illustrating each one from your example. To

what extent is an URL location transparent?

19. Consider a simple server that carries out clients requests without accessing other

servers. Explain why it is generally not possible to set a limit on the time taken

by such a server to respond to a client request. What would need be done to

make the server able to execute requests within a bounded time?

20. Define the integrity property of reliable communication and list all the possible

threats to integrity from users and from systems components. What measures

can be taken to ensure the integrity property in face of each of these sources of

threats?

21. Develop a distributed program that has multiple clients and a database server.

The database server manages a single table of records. Clients are allowed to

select, insert, delete, or update records in the table. The table can be accessed by

at most one client at a time. An operation (select, insert, delete, update) is

blocking for the client, that is, it must wait for and receive a reply confirming

the operation has completed.

You must assume that the table is initially empty.

The table has the following structure:

(supp_no int,

supp_name string[30],

supp_city string[30],

primary key (supp_no))

The select operation requires a primary key value to identify a record.

The delete operation can use a primary key to delete a single record, or no

primary key value to delete all records.

The insert operation requires a value for the primary key, but other fields are

optional.

The update operation requires a primary key value and optionally values for

other fields.

22. Compare connectionless (UDP) and connection oriented (TCP) communication

for the implementation of each of the following application level or presentation

level protocols:

Page 25: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

25

i. virtual terminal access (For example, telnet);

ii. file transfer (For example, FTP);

iii. user location (For example rwho, finger);

iv. information browsing (For example, HTTP);

v. remote procedure call�

IT 6601 MOBILE COMPUTING - ASSIGNMENT TOPIC

Assignment notice : Feb 06th

, 2016

Assignment Due : Mar 20th

, 2016

Team Size : 04 members per team

Total points : 10 [Video: 3 points, Code and implementation: 7 points]

What to submit: Create and submit an android project as tar.gz file. The assignment

should be completed in group of four. In addition to the source code, submit a video

describing the features of application. The video can be uploaded in YouTube and needs

to be shared. The best project would receive 5 extra credits.

Assignment Description: In this assignment a simple application has to be build that

acts as a diary for faculty members in our institution. The assignment will help to

understand about design activities and building simple user interfaces. Throughout the

assignment, the design may be UI flexible. Use your creativity to design the UI

elements. There are no constraints on what UI elements are allowed. An example UI will

be provided that can be used to test the application.

Initially, the application will start with a main screen, where it will show the following

options: Contact, Courses Taught, Events, and News. Each of these options represents a

separate activity of the application. More details on each of these modules are provided

below:

1. Contact will display information about the faculty member. The information will

contain the following: Office Address, contact email, office hours, and course offering

this semester. The app should have the option to edit this Contact information.

Following is the format of the ―contact‖ information in the provided XML file. The App

needs to load this information from the provided XML file and update the xml file if any

user makes changes.

<contact type="faculty"

name="Dr. Nilanjan Banerjee"

position="Assistant Professor"

office="ITE 362"

email="[email protected]"

phone="999999999"

office hour="10-11am Mon,thursday">

<course name="Wireless Network and Systems"

CRN="CS 795"/>

<course name="App Development for Smart Devices"

CRN="CS 495"/> </contact>

2. The Courses activity will display a list of courses that are offered by the faculty

member during the current semester. It will show the following information about

Page 26: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

26

courses: Course number (CN), Course Title, Credit Hours, Days (Class day), and Time

(class time). The user should be able to edit this information corresponding to each

course. Following is the format of the ―courses‖ tag in the input XML file. The App will

load this information from the provided XML file and update it if any changes were

made.

<courses CN="16746"

courseTitle="Database Concept"

creditHours="3.00"

Days="TR"

Time="1:30-2:45pm" />

3. In the Events module, the faculty member should be able to add/delete/edit their own

events, for example, classes. Following is the format of the ―events‖ in the input XML

file. The app will load this information from the provided XML file and update it if any

changes are made by the user.

<events

type="class"

time="1:30-2:45pm"

day="TR"note="

Class Database" />

<events

type="appointment"

time="1:30-2:45pm"

day="W"

note="TA Database" />

4. The news module will show recent news about the faculty. Basically, it will show

recent research activities/grants/achievements. The user should be able to edit news

information. Following is the format of ―news‖ in the XML file. App needs to load this

information from the provided XML file and update it if any changes are done.

<news

title="Title: Machine Learning in Vision and Brain Analytics"

keyword="Machine Learning"

highlights="Shuiwang Ji" />

Class: III Year VI Semester B.E. Computer Science and Engineering

Name of Subject: Compiler Design

Name of Faculty member: Mr. Prabakaran S

1. Given the following CFG grammar G = ({S,A,B}, S, {a, b, x), P) with P:

(1) S→A

(2) S →xb

Page 27: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

27

(3) A→aAb

(4) A →B

(5) B →x

For this grammar answer the following questions:

9. Compute the set of LR(1) items for this grammar and the corresponding DFA.

Do not forget to augment the grammar with the default initial production S‘ →S$

as the production (0).

10. Construct the corresponding LR parsing table.

11. Would this grammar be LR(0)? Why or why not? (Note: you do not need to

construct the set of LR(0) items but rather look at the ones you have already

made for LR(1) o answer this question.

12. Show the stack contents, the input and the rules used during parsing for the input

string w = axb$e)

13. Would this grammar be suitable to be parsed using a top down LL parsing

method? Why?

Syntax-Directed Translation

2. Consider the following syntax-directed definition over the grammar defined by G =

({S, A, Sign}, S, {‗,‘, ‗-‗, ‗+‘, ‗n‘}, P) with P the set of production and the

corresponding semantic rules depicted below. There is a special terminal symbol ―n‖

that is lexically matched by any string of one numeric digit and whose value is the

numeric value of its decimal representation. For the non-terminal symbols in G we

have defined two attributes, sign and value. The non-terminal A has these two

attributes whereas S only has the value attribute and Sign only has the sign attribute.

S →A Sign || S.val = A.val; A.sign = Sign.sign; print(A.val);

Sign →+ || Sign.sign = 1

Sign →- || Sign.sign = 0

A →n ||A.val = value(n)

A →A1 , n || A1.sign = A.sign;

if(A.sign = 1) then

A.val =min(A1.val,value(n));

else

A.val =max(A1.val,value(n));

For this Syntax-Directed Definition answer to the following questions:

a) Explain the overall operation of this syntax-directed definition and indicate (with a

brief explanation) which of the attributes are either synthesized or inherited.

b) Give an attributed parse tree for the source string―5,2,3-― and evaluate the

attributes in the attributed parse tree depict ing t he order in wh ich the a t tribu tes

need to be evaluated (if more than one order i s po ss i b le i ndicate one .)

Page 28: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

28

c) Suggest a modified grammar and actions exclusively using synthesized attributes.

Explain its basic operation.

3. Suppose that your language supports the dynamic allocation of single-dimensional

vectors or arrays and that the grammar productions are as shown below:

vec_expr →id [ expr ]

expr →id

S →id = vec_expr

S→vec_expr = expr

where expr is a generic expression with attributes place and code that indicate,

respectively the temporary variable where the result of the evaluation of the

expression will reside and the corresponding code. Note that because an array

reference might

appear on the left - hand-side or on the right-hand-side of an assignment, you need to

use a base address and an index to evaluate the expression in the context of an

assignment statement.

Regarding the code generation for these array accesses answer the following

questions:

a) Define an SDT for the generation of intermediate code that computes the value of

vec_expr. Given that the sizes of the array are only known at run-time (after

allocation) you need to have access to a dope vector structure. Assume you know

the address of this vector given by the variable reference ―dyn_vec(id.name)‖. The

first location of this auxiliary array holds the base address of the vector (and index

0) and the second location of this vector holds the size of the single dimension of

the vector (at index 1).

b) Show the results of your work on the statement ―v = a[i]‖indicating the AST with

the values of the attributes.

c) Redo a) for the case where you want to include code that checks the bounds of the

accesses to the vector. For instance when generating code for ―a[i]‖ you need to

check if the index value (in this case ―i‖) is both non-negative and less than the

dimension of the vector.

4. Explain about the Java layer compiler design.

5. Consider the production. S → aAb A → cd | c show that recursive descent parsing

fails for the input string ―acdb‖ also explain recursive descent algorithm

6. Consider the production given below

S→CC | CSC Prof. James want to parse the input string CCCCCC using recursive

descent parsing. Is it possible to do that? Justify your answer

7. Discuss about the Compiler construction and Boot strapping.

8. Find the First and Follow for the given grammars

(a) Stmt_sequence → stmt stmt_sequence‘

Stmt_sequence‘→ ; stmt_sequence | ε

(b) S → ,GH;

G → aF

F →bF | ε

H → KL

Page 29: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

29

K → m | ε

L → n | ε

9. Explain about the optimization techniques of P3 Compiler.

10. Construct the LR (0) parsing table for the following grammar

S → Ac

A → AB| ε

B → aB | b.

11. Write a description of translation of pascal to EM code in the ACK Pascal

Compiler.

12. Write an algorithm for computation of CLOSURE of LR (0).

13. Explain about the BISON parser generator.

14. Discuss about FORTRON I Compiler.

15. What do you mean by inter procedural analysis? Discuss in detail.

Class: III Year/ V Semester B.E. Computer Science and Engineering – ‘A’

SectionName of Subject: Artificial Intelligence

Name of Faculty member: A.P.V.Raghavendra

1. Design and Implementation of an Acoustical Transmission Protocol

2. Evaluation of Multi-Agent Platforms for Ubiquitous Computing

3. Rapid Development of Realistic UAV Simulations

4. A machine learning approach in financial markets

5. Background Analysis and Design of ABOS, an Agent-Based Operating System

6. Intelligent Tourist Information System

7. Large Scale SLAM in an Urban Environment

8. Integrating actions of perception to the electric field approach

9. Performance Comparison of AI Algorithms – Anytime Algorithms

10. Software Process Improvement Using Groupware – Supporting Distributed

Cooperation in Software Development

11. Plan-Based Configuration of a Group of Robots

12. Automated Theorem Proving – Resolution vs. Tableaux

13. A Multi-Agent System for playing the board game Risk

14. Navigation for Autonomous Wheelchair Robot

15. Classification of objects in images based on various object representations

16. Visual Semantic Web Ontology based E-learning management system

17. An Electric Field Approach – A Strategy for Sony Four-Legged Robot Soccer

18. A method for collision handling for industrial robots

19. Controlling a Robot Hand in Simulation and Reality

20. Laser feedback control for robotics in aircraft assembly

21. Real Time Speech Driven Face Animation

22. The State of the Art in Distributed Mobile Robotics

23. Functional Approach towards Approximation Problem

24. Evaluation of a Machine Learning Approach To Heat Prediction

25. The Use of Case-Based Reasoning in a Human-Robot Dialog System

26. Electronic Contracting for Inter-Enterprise Collaboration

27. Intelligent decision support system for transport infrastructure investment with

emphasis on joint logistic

28. Simulation-based evaluation of berth allocation policies of container terminals

Page 30: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

30

29. Optimizing Genetic Algorithms for Time Critical Problems

30. Load Control Management in Intelligent Networks

31. Data mining algorithms to analyze medical data

32. Face Detection by Image Discriminating

33. Directory scalability in multi-agent based system

34. AI (Artifical Intelligence) Based Image Capturing and transferring to PC/CCTV

using Robot

35. Material Dimensions Analyzing Robot

36. An intelligent mobile robot navigation technique using RFID Technology

37. IVRS Based Robot Control with Response & Feed Back

38. Library Robot – Path Guiding Robotic System with Artificial Intelligence using

Microcontroller

39. Wireless Artificial Intelligence Based Fire Fighting Robot for Relief Operations

40. A Humanoid Robot to Prevent Children Accidents

41. Motion Detection, Robotics Guidance & Proximity Sensing using Ultrasonic

Technology

42. Robust Sensor-Based Navigation for Mobile Robots

43. Visual tracking control to fast moving target for stereo vision robot

44. A Voice Guiding System for Autonomous Robots

45. Artificial Intelligent based Solar Vehicle

46. Mobile robot control based on information of the scanning laser range sensor

47. Walking Robot with Infrared Sensors / Light Sensors / RF Sensor / Tactile

Sensors

48. IVRS Based Control of Three Axis Robot With Voice Feed back

49. Intelligent Mobile Robot for Multi Specialty Operations

50. Sensor Operated Path Finding Robot (Way Searching)

51. Design and Development of Obstacle Sensing and Object Guiding Robot

52. SMS controlled intelligent searching and pick and place moving robot

53. Artificial Intelligence Based Image Capturing and Transferring to PC using

Robot

54. Artificial Intelligent Based Remote controlled Automatic Path finding Cum

Video Analyzing Robot

55. Wall Follower Robot with The Help of Multiple Artificial Eyes

56. Sensor Operated Automatic Punching robot

57. Fire Fighting Robotics with AI (Artifical Intelligence) and WAP

58. Intelligent Robot with Artificial Intelligence computer Brain system

59. Remote controlled Pneumatic Four Axis Material Handling Robot

60. Advanced Robotic Pick and Place Arm and Hand System

61. Voice Controlled Material handling Robot

62. A Hands Gesture Control System of for an Intelligent Robot

63. Robotic Vision and Color Identification System with Solenoid Arm for Colored

Material Separation

64. Artificial Intelligence Based Fire fighting AGV

65. SMS controlled video analyzing robot

66. Staircase Climbing Robot – Implemented in Multi-Domain Approach

67. Fully Automated Track Guided Vehicle (ATGV) Robot

68. PC based wireless Pick and Place jumping robot with remote control

69. Three Axis Robotics With Artifical Intelligence (AI)

70. Gesture sensing robots

Page 31: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

31

Name of the Course (Subject): Software Testing

Name of the Faculty member: Yuvarani A

Class / Semester: III Year/VI Semester B.E. Computer Science and Engineering

‘A’ & ‘B’ Sections

1. You are to write a program that adds two two-digit integers. Can you test this program

exhaustively? If so, how many test cases are required? Assuming that each test case can

be executed and analyzed in one second, how long would it take for you to run all tests?

2. We argued that the number of defects left in a program is proportional to the number

of defects detected. Give reasons why this argument looks counter intuitive. Also, give

practical reason why this phenomenon causes problems in testing.

3. Write a simple factorial and sum of positive integers program and try to take care of

as many valid and invalid conditions as possible. Identify what test data would you use

for testing program. Justify your answer.

4. For the program of standard deviation draw the flow graph and hence calculate the

Cyclomatic complexity of the program.

5. Consider the C program for deleting an element from a linked list. Suggest a set of

test data to cover each and every statement of the program.

6. Write a simple biggest among three numbers and reverse the string program and try to

take care of as many valid and invalid conditions as possible. Identify what test data

would you use for testing program. Justify your answer.

7. Discuss the pros and cons of function coverage with other forms of coverage.

8. Write a simple matrix multiplication program and try to take care of as many valid

and invalid conditions as possible. Identify what test data would you use for testing

program. Justify your answer.

9. Consider the C program for deleting an element from a linked list. What are the

boundary value conditions for that example? Identify test data to test at and around

boundary values.

10. Programmer A and Programmer B are working on a group of interfacing modules.

Programmer A tends to be a poor communicator and does not get along well with Programmer B.

Due to this situation, what types of defects are likely to surface in these interfacing modules?

11. Your organization has worked very hard to improve its testing process. The most

recent test process assessment using the Testing Maturity Model showed that you are at

TMM level 3. How would you describe your current testing process based on that

assessment? What are the maturity goals that you have achieved at that TMM level?

12. Suppose you were developing a stub that emulates a module that passes back a hash

value when passed a name. What are the levels of functionality you could implement for

this stub? What factors could influence your choice of levels?

13. An air-traffic control system can have one or many users. It interfaces with many

hardware devices such as displays, radar detectors, and communications devices. This

system can occur in a variety of configurations. Describe how you would carry out

configuration tests on this system.

Page 32: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

32

14. From your experience with online and/or catalog shopping, develop a use case to

describe a user purchase of a television set with a credit card from a online vendor using

web-based software. With the aid of your use case, design a set of tests you could use

during system test to evaluate the software.

15. You are developing a module whose logic impacts on data acquisition for a flight

control system. Your test manager has given you limited time and budget to test the

module. The module is fairly complex; it has many loops, conditional statements, and

nesting levels. You are going to unit test the module using white box testing approaches.

Describe three test adequacy criteria you would consider

applying to develop test cases for this module. What are the pros and cons for each.

Which will have the highest strength?

16. Suppose you have developed a module with the following conditional statement:

if (value < 100 and found __ true)

call (enter_data (value))

else

print (‗‗data cannot be entered‘‘)

Create tables as shown in the text containing test data that will enable you to achieve

(i) simple decision coverage, (ii) condition coverage, and (iii) decision/condition

coverage.

17. The following is a pseudocode fragment that has no redeeming features except for

the purpose of this question. Draw a control flow graph for the example and clearly label

each node so that it is linked to its corresponding statement. Calculate its cyclomatic

complexity. How can you use this value as a measure of testability? Describe how a

tester could use the cyclomatic complexity and the control flow graph to design a set of

white box tests for this module that would at least cover all its branches.

/* a[] and b[] are global variables */

begin

int i,x

i _1

read (x)

while (i < x) do begin

a[i] _ b[i] * x

if a[i] > 50 then

print (‗‗array a is over the limit‘‘)

else

Page 33: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

33

print (‗‗ok‘‘)

i _ i _1

end

18. The following is a unit that implements a binary search. It decides if a particular

value of x occurs in the sorted integer array v. The elements of v are sorted in increasing

order. The unit returns the position a value between 0 and n _1 if x occurs in v, and _1 if

not. Draw a control flow graph for the example, and clearly label each node to show its

correspondence to a statement. Calculate its cyclomatic complexity. How many test

cases are needed to adequately cover the code with respect to its branches? Develop the

necessary test cases using sample values for x, n, and v as needed and show how they

cover the branches.

int binsearch (int x,int v[], int n)

{

int low, high, mid;

low _ 0;

high _ n-1;

while (low <_ high) {

mid _ (low_high)/2

if (x < v[mid]

high _ mid&ndash;1;

else if (x > v[mid])

low _ mid_ 1;

else /* found match*/

return mid;

}

return–1; /* no match*/

}

19. Using your original (untested) version of the coin program, design a set of test cases

based on the branch adequacy criterion. Be sure to develop tables that identify each

branch and the test cases that are assigned to execute it. Run the tests on the original

code. Be sure that your tests actual execute all the branches; your goal is 100%

coverage. If your original set is not adequate, add more tests to the set. Compare the

defects you detected using the branch adequacy criterion in terms of number and type to

results from each of the black box testing technique. What differences were apparent?

20. For following looping construct, describe the set of tests you would develop based

on the number of loop iterations in accordance with the loop testing criteria

Page 34: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

34

for (i _ 0; i < 50; i__)

}

text_box[i] _ value[i];

full _ full–1;

}

21. A programmer using a mutation analysis tool finds that a total of 35 mutants have

been generated for a program module A. Using a test set she has developed she finds

after running the tests the number of dead mutants is 29 and the number of equivalent

mutants is 2. What is the mutation score (MS) for module A. Is her test set for module A

mutation adequate? Should she develop additional test cases? Why?

22. A project manager estimates that the total costs of a project as $375,000. The project

is a business application. There are security, performance, and configuration

requirements (the latter due to devices that will interface with the software system). The

testers are experienced and have tool support and training. The number of test

procedures is estimated at 670, with a ratio of 5.9 hours/test procedure from the

historical database of similar projects. Assume that the salary of the testers is $37/hour.

Estimate the costs of test for this project in as many ways as you can use the information

given. Compare the results of the estimates. Which result do you have more confidence

in?

23. The implementation of a defect-prevention program is a maturity goal at TMM level

5. However, an organization on a lower level of the TMM, for example, on level 2, may

decide to try to implement such a program. Do you think that this is a wise decision?

What types of problems is the organization likely to encounter as it tries to implement

the program? Given the limited capabilities of an organization at TMM level 2, what are

some of the first steps they could take to set up a foundation for such a program?

24. Suppose you are a test manager and you observe that many defects appear in the test

procedures developed by your testing team. You decide to apply defect causal analysis

techniques to try to prevent these defects from reoccurring. Your test team consists of

many new hires. They have attended a few training sessions; most do not have advanced

degrees. Some of the team members have had extensive

development experience; others have not. Develop a fishbone diagram to trace the

causes of these defects based on the above scenario. You may need to make some

assumptions about the testing environment to supplement the information given.

25. A test engineer has just started to record defect data for her process. She spends the

bulk of her time developing test harness code. The following defect data was collected

from 10 recent projects she has worked on. The defect types are: 10, documentation; 20,

syntax; 30, build; 40, assignment; 50, interface; 60, checking; 70, data; 80, function; 90,

system; 100, environment.

Defect type Number of occurrences

_____________________________________

10 5

Page 35: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

35

20 40

30 5

40 22

50 14

60 9

70 11

80 38

90 2

100 1

Name of the Course (Subject) : Multi-Core Architectures and Programming

Name of the Faculty member : Mrs.R.Kohila

Class/Semester: IV Year/VIII Semester B.E. Computer Science and Engineering

1. Sketch a four-dimensional hypercube and Use the inductive definition of a

hypercube to explain why the bisection width of a hypercube is p=2.

2. Explain why the performance of hardware multithreaded processing core might

degrade if it had large caches and it ran many threads.

3. Is a program that obtains linear speedup strongly scalable? Explain your answer.

4. Write a program that can be used to determine the cost of changing the

distribution of a distributed data structure. How long does it take to change from

a block distribution of a vector to a cyclic distribution? How long does the

reverse redistribution take?

5. Explain how a queue, implemented in hardware in the CPU, could be used to

improve the performance of a write-through cache.

6. Explain why the performance of hardware multithreaded processing core might

degrade if it had large caches and it ran many threads.

7. Derive formulas for the total number of links in the various distributed- memory

interconnects

8. A parallel program that obtains a speedup greater than p—the number of pro-

cesses or threads—is sometimes said to have super linear speedup. However,

many authors don‘t count programs that overcome ―resource limitations‖ as

having super linear speedup. For example, a program that must use secondary

storage for its data when it‘s run on a single processor system might be able to

fit all its data into main memory when run on a large distributed-memory

system. Give another example of how a program might overcome a resource

limitation and obtain speedups greater than p.

Page 36: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

36

9. Modify the mutex version of the calculation program so that the critical section

is in the for loop. How does the performance of this version compare to the

performance of the original busy-wait version? How might we explain this?

10. Write a Pthreads program that finds the average time required by your system to

create and terminate a thread. Does the number of threads affect the average

time? If so, how?

11. Run the basic serial n-body solver for 1000 timesteps with a stepsize of 0.05, no

output, and internally generated initial conditions. Let the number of particles

range from 500 to 2000. How does the run-time change as the number of

particles increases? Can you extrapolate and predict how many particles the

solver could handle if it ran for 24 hours?

12. Parallelize the reduced version of the n-body solver with OpenMP or Pthreads

and a lock/mutex for each particle. The locks/mutexes should be used to pro-tect

access to updates to the forces array. Parallelize the rest of the solver by

parallelizing the inner for loops. How does the performance compare with the

performance of the serial solver? Explain your answer.

13. Modify the Pthreads implementation of static tree search so that it uses a read-

write lock to protect the examination of the best tour. Read-lock the best tour

when calling Best tour, and write-lock it when calling Update best tour. Run the

modified program with several input sets. How does the change affect the

overall run-time?

14. If there are many processes and many redistributions of work in the dynamic

MPI implementation of the TSP solver, process 0 could become a bottleneck for

energy returns. Explain how one could use a spanning tree of processes in which

a child sends energy to its parent rather than process 0.

15. Write an MPI program in which each process generates a large, initialized m-

dimensional array of doubles. Your program should then repeatedly call MPI

Allgather on the m-dimensional arrays. Compare the performance of the calls to

MPI Allgather when the global array (the array that‘s created by the call to MPI

Allgather) has

1. a block distribution, and

2. a cyclic distribution

Name of the Course (Subject) : Software Project Management

Name of the Faculty member : S.Gunasekaran

Class/Semester : IV Year / VIII Semester B.E. CSE 'A' Section

1. An employee of a training organization has the task of creating case study exercises

and solutions for a training course which teaches a new systems analysis and design

method. The person‘s work plan has a three week task learn new method. A colleague

suggests that this is unsatisfactory as a task as there are no concrete deliverable or

products from the activity. What can be done about this?

2. In order to carry out usability tests for a new word processing package, the software

has to be written and debugged. User instructions have to be available describing hoe the

package is to be used. These have to be scrutinized in order to plan and design the tests.

Subjects who will use the package in the test will need to be selected. As part of this

selection process, they will have to complete a questionnaire giving details of their past

experience of, and training in , typing and using word processing package. The subjects

will carry out the required tasks using the word processing package. The tasks will be

Page 37: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

37

timed and any problems the subjects encounter with the package will be noted. After the

test, the subject will complete another questionnaire about what they felt about the

package. All the data from the tests will be analyzed and a report containing

recommendations for changes the to package will be drawn up. Draw up a product

Breakdown Structure, A product Flow Diagram and a preliminary activity network for

the above.

3. Identity the actions that could prevent each of the following risks from materializing

or could reduce the impact if it did occur.

(a) a key member of the programming team leaving

(b) a new version of the operating system being introduced which has errors in it.

(c) a disk containing copies of the most up to date version of the software under

development being corrupted.

(d) system testing unearths more errors than were expected and takes longer than

planned.

(e) the government changes the taxation rules which alter the way that VAT is to be

calculated in an order processing system under development.

4. Working in a group of three or four imagine that you are about to embark upon a

programming assignment as part of the assessed work for your course. Draw up a list of

the risks that might affect the assignment outcome. Individually classify the importance

and likelihood of each of those risk as high, medium or low. When you have done this

compare your results and try to come up with an agreed project risk matrix.

5. A software package is to be designed and built to assist in software cost estimation. It

will input certain parameters and produce initial cost estimates to be used at bidding

time.

(a) It has been suggested that a software prototype would be of value in these

circumstances. Explain why this might be.

(b) Discuss how such prototyping could be controlled to ensure that it is conducted in an

orderly and effective way and within a specified rime span.

6. Consider the details held about previously developed modules shown in table. Anew

module has seven inputs, one entity type access and seven outputs. Which of the

modules a to ‗e‘ is the closest analogy in terms of Euclidean distance?

Data concerning previously developed modules.

Module Entity Types

Accessed

Inputs Outputs

Days

A 1 2 10 2.60

B 10 2 1 3.90

C 5 1 1 1.83

D 2 3 11 3.50

E 1 2 20 4.30

7. A report in a college time – tabling system produces a report showing the

students who should be attending each time tables teaching activity. Four files are

Page 38: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

38

accessed. The staff file, the student file, the student option file and the teaching activity

file. The report contains the following information.

For each teaching activity:

Teaching activity reference

Topic name

Staff Forename

Staff Surname

Title

Semester( 1 or 2)

Day of week

Time

Duration

Location

For each student

Student Forename

Student Surname

Calculate both IFPUG and Mark II FPs that this transaction would generate. Can you

identity the factors that would tend to make the two methods generate divergent counts?

8. Identity size and productivity effort drivers for the following activities:

1. Installing computer workstations in a new office.

2. Transporting assembled personal computers from the factory where they were

assembled to warehouse distributed in different parts of the country.

3. Typing in and checking the correctness of data that is populating a new database.

4. System testing a newly written software application.

9. In each of the following cases discuss whether the type of application software to be

adopted would be most likely to be bespoke, off-the-shelf or COTS.

(a) A college requires a student fees application. It is suggested that the processes

required in the application are similar to those of any billing system with some

requirements that are peculiar to the administration of higher education.

(b) A computer based application is needed at IOE to hold personnel details of staff

employed.

(c) A national government requires a system that calculates records and notifies

individual tax payers about income tax charges.

(d)A hospital needs a knowledge based system to diagnose the causes of eye complaints.

10. An organization has detected low job satisfaction in the following departments.

The system testing group.

The computer applications help desk

Computer batch input.

11.Three different mental obstacles to good decision making were identified in the text.

faulty heuristics, escalation of commitment and information overload. What steps do

you think can be taken to reduce the danger of each of these?

12. Compute the effort estimate for the following specification using intermediate

COCOMO model, state any assumptions made clearly. The software is to be developed

for a ―communication Processing‖ function using microprocessors. The size of the

embedded software is 10KLOC . The product complexity is rated to be very high, the

programmer capability rated as low and the main storage constraint is high and the

respective efforts multipliers can be taken 1.30, 1.17 and 1.06. All other cost drivers are

assumed to take their normal values.

Page 39: V.S.B. ENGINEERING COLLEGE, KARUR Department of Computer … · 1.You are given a linked list L,and another linked list P,containing integers,sorted in ascending order.The operation

39

13. As a project manager you are requested to perform the effort estimation for a Air

traffic control project

The following project related information are available to you;

The software has three modules with 5KLOC, 2KLOC and 3KLOC respectively.

The effort multipliers for

(1) Data base size

(2) Product complexity and

(3) Programmer capability are given as 0.95, 1.25 and 0.8 respectively.

All other cost drivers have only nominal effect, hence the effort multiplication

factor for each of them can be assumed to be 1.0.

14. A list of your top ten risks. These should be placed in order, with your biggest

risk first—and don‘t forget to describe how you ranked them. For each risk, describe:

1. what the risk is?

2. a mitigation strategy for the risk?

3. a contingency plan for the risk?

4. how you will know when to invoke the contingency plan?

15. A description of the process you will use for managing risk. This can be

relatively brief (less than one page of text), but should be detailed enough so that each

member of the team understands his/her role in managing risk.

For example,

1. How will your team monitor risk?

2. What process will you use for deciding when to invoke a contingency plan?

3. How will you handle emergencies?

4. Will individual members of the team be authorized to carry out parts of your risk

management strategy, or will the whole team need to meet and agree each

action?

5. How often will you update your list of top ten risks?

16. To help you manage risks, you need to take regular measurements of the status of

your project. Choose a suitable set of project metrics that you will collect during your

project, to help you monitor risk. Describe five of these metrics in detail, including:

1. What you think it might tell you?

2. Whether it is a measure of your product , or a measure of the development

process?

3. How frequently you plan to collect the data?

4. How much effort you think it will take to collect (e.g in minutes per week)?

5. Whether the method for making the measurements is algorithmic or subjective?

6. Whether the scale used for the metric is nominal, ordinal, interval, or ratio?

17. You have been appointed as a project manager within an information system

organization. Your job is to build an application that is quite similar to others your team

has built,although this one is larger and more complex. Requirements have been

thoroughly documented by the customer. What team structure would you choose and

why? What software process model(s) would you choose and why?