Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

T.E (2019 Pattern) May 2022

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Total No. of Questions : 8] SEAT No.

:
P805 [5870]-1125
[Total No. of Pages : 2

T.E. (Computer Engineering)


DATABASE MANAGEMENT SYSTEMS
(2019 Pattern) (Semester-I) (310241)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Attempt Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Figures to the right indicate full marks.
3) Neat diagrams must be drawn wherever necessary.
4) Assume suitable data if necessary.

Q1) a) Explain 3NF and BCNF and give its example. Also enlist their differences.
[8]
b) What are the desirable properties of decomposition? Explain it with
example. [9]
OR
Q2) a) Explain partial and transitive dependencies with example. [8]
b) Explain why database normalization is required for good relational database
design? Explain with example requirements of different normal forms
like 1NF, 2 NFand 3NF. [9]

Q3) a) What is conflict serializability? How to check schedule is conflict


serializable schedule. Give one example. [9]
b) During execution, a transaction passes through several states, until it
commits or aborts. List all possible sequence of states through which
transaction may pass. Explain the situation when each state transition
occurs. [9]
OR
Q4) a) Consider the following two transactions: [9]
T31: read(A);
read(B);
if A = 0 then B:=B+1;
Write (B)
T32: read(B);
read(A);
if B= 0 then A: = A+1;
write (A).
Add lock and unlock instructions to transactions T31 and T32, so that
they observe the two phase locking protocol. Can the execution of these
transactions result in a deadlock?
P.T.O.
b) To ensure atomicity despite failures we use Recovery Methods. Explain
in detail log based recovery method. [9]

Q5) a) Explain following NOSQL database types with examples and also state
the scenario where it is useful [9]
i) Column-oriented
ii) Graph
iii) Document -oriented
b) Explain CAP theorem and BASE properties. [8]

OR
Q6) a) Describe distributed database. Explain System architecture of distributed
transaction. [8]
b) Explain following types of data with example [9]
i) Structured
ii) Semi-structured
iii) Unstructured

Q7) a) Write short note on [9]


i) Active database
ii) Deductive database
b) Explain how encoding and decoding of JSON object is done JAVA with
example. [9]

OR
Q8) a) Write short note on [9]
i) Geometric data
ii) Geographic data
b) What is object relational database? What are its advantages and
disadvantages? [9]



[5870]-1125 2
Total No. of Questions : 8] SEAT No. :
P806 [5870]-1126
[Total No. of Pages : 2

T.E. (Computer Engineering)


THEORY OF COMPUTATIONS
(2019 Pattern) (Semester-I) (310242)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Figures to the right side indicate full marks.
3) Neat diagrams must be drawn wherever necessary.
4) Assume suitable data, if necessary.

Q1) a) Write a grammar G for generating the language [9]


i) L={w belongs to {a,b}* | w is an even length palindrome with
|w|>0}
ii) Set of odd length strings in {0,1}* with middle symbol ‘1’

b) Simplify the following grammar [9]


S 0A0|1B1|BB
A C
B S|A
C S|€

OR
Q2) a) Reduce the following grammar to Greibach Normal form. [9]
S AA | 0
A SS | 1
b) Construct a DFA for the following left linear grammar. [9]
S C
 
 C
C A0

Q3) a) Construct a context free grammar which accepts N(A), where [9]
A = ({q0,q1}, {0,1}, {Z0,Z}, , q0, Z0,  }where  is given by
q0, 1, Z0) = {(q0, ZZ0)}
q0, Z0) = {(q0,)}
q0, Z) = {(q0, Z Z)}
q0, Z) = {(q1, Z)}
q1, Z) = {(q1, )}
(q1, Z0) = {(q0, Z0)}

P.T.O.
b) Construct a PDA that accept the language generated by grammar [8]
i) S 0S1| A, A  1A0|S|€
ii) S aABB|aAA, A  aBB|a,B  bAA|A
OR
Q4) a) What is NPDA? Construct a NPDA for the set of all strings over {a,b}
with odd length palindrome. [9]
b) Design a push down automaton to recognize the language generated by
the following grammar: [8]
SS+S|S S|4|2
Show the acceptance of the input string 2 + 2*4 by this PDA.

Q5) a) What is a Turing Machine? Give the formal definition of TM. [9]
Design a TM that replaces every occurrence of abb by baa.
b) What are the different ways for extension of TM? Explain. [9]
Design TM for language L = {a^i b^j | i<j}
OR
Q6) a) What is TM? Design TM to check well formedness of Parenthesis. Expand
the transition for (())() [9]
b) Elaborate the following terms [9]
i) Universal Turing Machine (UTM)
ii) Recursively Enumerable Languages
iii) Halting Problem of Turing Machine

Q7) a) Justify “Halting Problem of Turing machine is undecidable”. [9]


b) Define the Class P and Class NP and Problem with their example in
detail. [8]

OR
Q8) a) Explain Satisfiability Problem and SAT Problem and comment on NP
Completeness of the SAT Problem. [9]
b) What do you mean by polynomial time reduction? Explain with suitable
example. [8]



[5870]-1126 2
Total No. of Questions : 8] SEAT No. :

P807 [Total No. of Pages : 2

[5870]-1127
T.E. (Computer Engineering)
SYSTEMS PROGRAMMING AND OPERATING SYSTEM
(2019 Pattern) (Semester - I) (310243)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right indicate full marks.
4) Assume suitable data if necessary.

Q1) a) Explain Differences between static link library and dynamic link library.[8]
b) What are the different types of Loaders? Explain compile and Go loader
in detail. [9]
OR
Q2) a) List and explain different loader schemes in detail. [9]
b) Explain Design of Direct linking loaders and explain required data
structures. [8]

Q3) a) Compare Compilers and Interpreters. [8]


b) What is LEX? Explain working of LEX with suitable diagram. [9]
OR
Q4) a) Define token, pattern, lexemes & lexical error. [8]
b) What is a compiler? Explain any two phases of compiler with suitable
diagram. [9]

Q5) a) What is the need of Process synchronization? Explain Semaphore in


detail. [9]
b) What is Operating System? Explain various operating system services in
detail. [9]

P.T.O.
OR
Q6) a) Explain preemptive and Non preemptive scheduling in detail. [9]
b) Explain any two scheduling algorithm with suitable example. [9]

Q7) a) What is virtual memory management? Explain address translation in paging


system. [9]
b) Write proper examples and explain memory allocation strategies first fit,
best fit and worst fit. Also explain their advantages and disadvantages.[9]
OR
Q8) a) Explain any two page replacement strategies in detail. [9]
b) What is TLB? Explain the paging system with the use of TLB? What are
the advantages of TLB? [9]



[5870]-1127 2
Total No. of Questions : 8] SEAT No. :
P808 [5870] - 1128
[Total No. of Pages : 3

T.E. (Computer)
COMPUTER NETWORK AND SECURITY
(2019 Pattern) (Semester - I) (310244)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Attempt Q1, or Q.2, Q.3 or Q.4, Q.5or Q.6, Q.7 or Q.8.
2) Neat diagrams must be drawn wherver necessary.
3) Figures to the right indicate full marks.
4) Use of Calculator is allowed.
5) Assume suitable data is necessary.

Q1) a) Explain distance vector routing algorithm. [6]


b) A host was given the 192. 168.2.64 /25 IP address, indicate: [6]
i) Net mask of the network in dotted decimal notation.
ii) The network address to which the host belongs.
iii) The network broadcast address to which the host belongs.
iv) The total number of hosts available in the network.
c) Explain IPv4 header format in detail [6]
OR
Q2) a) What is ARP? How it works? [6]
b) Suppose a router has built up the routing table as shown in the following
table. The router can deliver packets directly over interfaces eth0 and
eth1, or it can forward packets to other routers in the table. [6]
Destination Netmask Gateway
156.26.10.0 255.255.255.192 Eth0
156.26.10.128 255.255.255.128 Eth1
156.26.0.0 255.255.0.0 156.26.10.1
0.0.0.0 0.0.0.0 156.10.1.30
Describe what the router does with a packet addressed to each of the
following destinations
i) 156.26.10.66
ii) 156.26.10.226
iii) 168.130.12.27
c) Explain Network Address Translation (NAT) process. [6]
[5870] - 1128 1
P.T.O.
Q3) a) For each of the following applications, determine whether TCP or UDP
is used as the transport layer protocol and justify the reason(s) for your
choice. [5]
i) File Transfer
ii) Watching a real time streamed video
iii) Web browsing
iv) A Voice over IP (VoIP) telephone conversation.
v) YouTube video
b) Explain TCP state transition diagram? [6]
c) Define Socket? Explain Socket primitives at client and server side for
TCP communication with diagram. [6]

OR
Q4) a) Explain TCP connection establishment process with suitable diagram.[5]
b) What causes silly window syndrome? How is avoided? Explain. [6]
c) Following is a dump of UDP header in Hexadecimal format [6]
06 32 00 0D 00 1C E2 17
i) What is source port number?
ii) What is destination port number?
iii) What is total length of the user datagram?
iv) What is the length of the data?
v) Is packet directed from a client to server or vice versa?
vi) What is the client process?

Q5) a) What is the difference between persistent & non persistent HTTP? Explain
HTTP Request & Response message format. [6]

b) Explain working of DHCP. [6]


c) Differentiate between POP & IMAP protocol. [6]

OR

Q6) a) Explain how DNS query resolved? [6]


b) Explain FTP w.r.t. control and data connection? Explain any two FTP
commands. [6]
c) When web pages containing emails are sent out, they are prefixed by
MIME Header, why? Explain MIME Header. [6]

[5870] - 1128 2
Q7) a) Draw and explain Operational Model of Network Security. [5]
b) Discuss the working of IPSec? What are the different security services
offered by IPSec? [6]
c) Differentiate between Active attacks and Passive Attacks. [6]

OR

Q8) a) List and explain various elements of Information Security. [5]


b) Compare Symmetric Key and Asymmetric key encryption techniques.[6]
c) Explain Secure Socket Layer handshake Protocol. [6]



[5870] - 1128 3
Total No. of Questions : 8] SEAT No. :
P809 [5870] - 1129
[Total No. of Pages : 2

T.E. (Computer Engineering)


INTERNET OF THINGS AND EMBEDDED SYSTEMS
(2019 Pattern) (Semester - I)(Elective - I) (310245A)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q. 1 or Q. 2, Q. 3 or Q. 4, Q. 5 or Q. 6, Q. 7 or Q. 8.
2) Neat diagrams must be drawn wherever necessary.
3) Assume suitable data, if necessary.

Q1) a) Demonstrate the working of Publish-Subscribe Communication model


using Diagram with suitable application. [6]

b) Illustrate REST based Communication API with Suitable IoT System.[6]

c) Classify the four pillars of IoT. [6]

OR

Q2) a) Illustrate steps of IoT design methodology for smart irrigation system.[6]

b) Demonstrate the use of SCADA with the help of suitable IoT Application.
[6]

c) Categorize different connectivity technologies required for IoT system


development and explain any one of them in brief. [6]

Q3) a) Illustrate different issues with standardization of IoT Protocols. [6]

b) Clssify the different Topology of IEEE 802.15.4 and explain with suitable
diagram. [6]

c) Show the use of LoRa protocol in any suitable IoT application


development. [5]

OR
[5870] - 1129 1 P.T.O.
Q4) a) Classify between RFID and SCADA Protocol. [6]
b) Illustrate the various IoT applications developed using IP based protocols.
[6]
c) Show with suitable reasons why Zigbee is popular than Wi - Fi and
Bluetooth in IoT. [5]

Q5) a) Demonstrate Python Web Application Framework - Django with the


suitable example. [8]
b) Use the knowledge of Cloud Computing to demonstrate
i) Amazon Auto Scaling.
ii) Xively Cloud for IoT. [10]

OR
Q6) a) Show that WAMP and its key concepts are useful in Cloud based IoT
application Development. [8]
b) Apply the concept of cloud computing to design the smart irrigation
system with proper explanation. [10]

Q7) a) Predict the possible challenges in designing secure IoT applications.[8]


b) Illustrate the classic pillars of information assurance while securing the
IoT application. [9]

OR
Q8) a) Illustrate the threat model in securing IoT applications. [8]
b) Use security concepts to identify different threats (at least 03 in each) in
the following IoT applications:
i) Smart Home Automation
ii) Smart Parking System
iii) Smart Irrigation System [9]



[5870] - 1129 2
Total No. of Questions : 8] SEAT No. :
P810 [5870] - 1130
[Total No. of Pages : 2

T.E. (Computer Engineering)


HUMAN COMPUTER INTERFACE
(2019 Pattern) (Semester - I)(Elective - I) (310245B)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q. 1 or Q. 2, Q. 3 or Q. 4, Q. 5 or Q. 6, Q. 7 or Q. 8.
2) Figures to the right side indicate full marks.
3) Neat diagrams must be drawn wherever necessary.
4) Make suitable assumption wherever necessary.

Q1) a) Explain interaction styles:


i) Command - line and
ii) Menu Selection [6]
b) Which are the characteristics of Graphical User Interface? Explain. [6]
c) Write down about software life cycle importance in HCI. [6]
OR
Q2) a) Explain interaction styles:
i) Form fill - in and
ii) Direct Manipulation [6]
b) Which are the characteristics of Web User Interface? Explain. [6]
c) Write down about Iterative design and Prototyping in detail. [6]

Q3) a) Describe Usability Assessment and common usability problems with


example. [6]
b) Write short note on :
i) Formative evaluation
ii) Summative Evaluation. [6]
c) Elaborate Heuristic Evaluation with example. [5]
OR
[5870] - 1130 1 P.T.O.
Q4) a) Describe Practical and objective measures of Usability in detail. [6]
b) Write short note on :
i) Universal Design
ii) Multi-modal Interaction [6]
c) Elaborate Cognitive Walkthrough. [5]

Q5) a) List down paradigms used for Interaction in HCI. Explain any five
Paradigms. [6]

b) Explain ubiquitous computing in detail. [6]

c) Explain role of Machine learning in HCI with example. [6]

OR

Q6) a) What is mean by framework in HCI? Explain Five - Stage search


framework. [6]
b) Explain dynamic queries and faceted search used in HCI. [6]

c) Explain pattern recognition process with suitable example. [6]

Q7) a) Describe Mobile form factors using suitable mobile app developed using
HCI. [6]

b) Discuss Navigation and toolbars in detail. [6]

c) Write down about designing for automotive interfaces in HCI. [5]

OR

Q8) a) Describe Tablet format app using suitable mobile app developed using
HCI. [6]

b) Discuss Tap - to reveal and direct manipulation in detail. [6]

c) Write down about designing for audible interfaces in HCI. [5]


[5870] - 1130 2
Total No. of Questions : 8] SEAT No. :
P1009 [Total No. of Pages : 2

[5870]-1131
T.E. (Computer Engineering)
DISTRIBUTED SYSTEMS
(2019 Pattern) (Semester - I) (Elective - I) (310245C)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates :
1) Answer Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6 and Q.7 or Q.8.
2) Neat diagrams must be drawn wherever necessary.
3) Assume suitable data wherever necessary.

Q1) a) Why clock synchronization is important in distributed system with suitable


example? Describe two clock synchronization algorithms. [9]
b) What is mutual exclusion? Compare and contrast mutual exclusion
algorithms. [9]
OR
Q2) a) Describe the purpose of election algorithm in distributed system. Describe
the bully election algorithm. [9]
b) Describe gossip-based contribution in detail. [9]

Q3) a) Describe File service architecture in distributed system. [9]


b) Explain in detail suns network file system. [8]
OR
Q4) a) Why naming is important in distributed system? Explain flat naming and
structured naming. [9]
b) Describe Andrew file system in detail. [8]

P.T.O.
Q5) a) Explain the reasons of replication? Describe replica management in
distributed system. [9]
b) Describe data-centric consistency model in detail. [9]
OR
Q6) a) Describe replication as scaling technique in distributed system. Describe
how replicated objects can be managed? [9]
b) Describe client-centric consistency model in detail. [9]

Q7) a) What is mean by process resilience? Explain process resilience techniques


in distributed system. [9]
b) Describe RPC semantics in the presence of failures. [8]
OR

Q8) a) Describe various failure models in distributed system. [9]


b) Describe how reliable group communication achieved in distributed
system. [8]



[5870]-1131 2
Total No. of Questions : 8] SEAT No. :
P811 [5870] - 1132
[Total No. of Pages : 2

T.E. (Computer Engineering)


SOFTWARE PROJECT MANAGEMENT
(2019 Pattern) (Semester - I)(Elective - I) (310245)(D) (Theory)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q. 1 or Q. 2, Q. 3 or Q. 4, Q. 5 or Q. 6, Q. 7 or Q. 8.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right side indicate full marks.
4) Assume Suitable data, if necessary.

Q1) a) Enlist and explain the 4 types of activity relationships? [8]


b) Explain various steps involved & the objectives of activity planning in
detail. [10]
OR
Q2) a) Explain following in detail:
i) Scheduling
ii) Types of Scheduling
iii) Benefits of scheduling [10]
b) Discuss the network model represented by the CPM network. [8]

Q3) a) Discuss the Contract Management in detail. [8]


b) Outline the various steps involved in a Change Control Procedure. [9]
OR
Q4) a) Explain the level of Monitoring with examples. [8]

b) Define Contract. Explain the typical terms of a Contract. Give Examples.


[9]

[5870] - 1132 1 P.T.O.


Q5) a) What are software development approaches? Explain agile project
management in detail. [8]

b) Explain Scrum framework in detail. [10]

OR

Q6) a) Explain in detail advantages and disadvantages of agile methodology.[10]

b) Write short note on :

i) Estimation

ii) Product backlog [8]

Q7) a) Explain the importance of working together as a team and the various
aspects of team development. [9]

b) Define motivation. Explain the different models of motivation. [8]

OR

Q8) a) What is stress? Mention the important causes of stress encountered in


projects. [8]

b) Discuss leadership models. Explain function of a leader with an example.


[9]



[5870] - 1132 2
Total No. of Questions : 8] SEAT No. :
P812 [5870] - 1133
[Total No. of Pages : 2

T.E. (Computer Engineering)


DATA SCIENCE AND BIG DATA ANALYTICS
(2019 Pattern) (Semester - II) (310251)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.
1) Neat diagrams must be drawn whenver necessary.
2) Figures to the right side indicate full marks.
3) Use of logarithmic tables slide rule, mollier charts, electronic pocket calculator
and steam tables is allowed.
4) Assume suistable data, if necessary.

Q1) a) What is driving data deluge? Explain with one example. [9]

b) What is data science? Differentiate between Business Intelligence and


Data Science. [9]

OR

Q2) a) What are the sources of Big Data. Explain model building phase with
example. [9]

b) Explain big data analytics architecture with diagram. What is data


discovery phase. Explain with example. [9]

Q3) a) Explain various data pre-processing steps. Discuss essential python


libraries for preprocessing. [8]

b) What are association rules? Explain Apriori Algorithm in brief. [9]

OR

Q4) a) Explain the following

i) Linear Regression

ii) Logistic Regression [8]

b) Explain scikit-learn library for matplotlib with example. [9]

[5870] - 1133 1 P.T.O.


Q5) a) Write short note on

i) Time series Analysis

ii) TF - IDF. [9]

b) What is clustering? With suitable example explain the steps involved in


k - means algorithm. [9]

OR

Q6) a) Write short note on

i) Confusion matrix

ii) AVC - ROC curve [9]

b) Discuss Holdout method and Random Sub Sampling methods. [9]

Q7) a) With a suitable example explain Histogram and explain its usages. [8]

b) Describe the Data visualization tool “Tableau”. Explain its applications


in brief. [9]
OR

Q8) a) With a suitable example explain and draw a Box plot and explain its
usages. [8]

b) Describe the challenges of data visualization. Draw box plot and explain
its usages. [9]



[5870] - 1133 2
Total No. of Questions : 8] SEAT No. :

P2310 [Total No. of Pages : 2


[5870]-1134
T.E. (Computer Engg.)
WEB TECHNOLOGY
(2019 Pattern) (Semester - II) (310252)

Time : 2½ Hours] [Max. Marks : 70


Instructions to the candidates:
1) Solve Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right side indicate full marks.

Q1) a) What is difference between server side scripting language and client side
scripting language. [5]
b) Describe servlet architecture in detail. [4]
c) Explain DTD in XML with schemes, elements & attributes. [9]
OR
Q2) a) What is session? How cookies & URL rewriting for session management
in servlet. [9]
b) Write short note on : [9]
i) AJAX
ii) XML transformation

Q3) a) Explain life cycle of JSP. Write advantages of JSP over servlet. [9]
b) Write a short notes on : [8]
i) SOAP
ii) WSDL
OR
Q4) a) Explain streets framework with its components. Also explain interceptors.
[9]
b) Explain JSP support for MVC i.e. model, view controller for developing
web application. [8]

P.T.O.
Q5) a) Identify and explain steps involved in connecting to mySQL with PHP.
[9]
b) Write short notes on : [9]
i) Overview of ASP. NET
ii) Overview of C#
OR
Q6) a) Explain in detail WAP Architecture & WML. [9]
b) Explain functions in PHP with example & session management. [9]

Q7) a) Explain classes and objects in Ruby with appropriate examples. [9]
b) Introduce the concept of Rails application. Describe layouts & stylesheet
in Rail. [8]
OR
Q8) a) Explain the scalar types & their operations in Ruby. [8]
b) Explain Architecture of EJB & explain types of EJB in detail. [9]



[5870]-1134 2
Total No. of Questions : 8] SEAT No. :
P814 [5870] - 1135
[Total No. of Pages : 2

T.E. (Computer Engineering)


ARTIFICIAL INTELLIGENCE
(2019 Pattern) (Semester - II) (310253)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q 1 or Q 2, Q 3 or Q 4, Q 5 or Q 6, Q 7 or Q 8.
2) Neat diagrams must be drawn whenever necessary.
3) Assume suitable data if necessary.

Q1) a) Explain Alpha - Beta Tree search and cutoff procedure in deatil with
example. [9]

b) What are the issues that need to be addressed for solving esp efficiently?
Explain the solutions to them. [9]

OR

Q2) a) Explain in detail the concepts of back tracking and constraint propagation
and solve the N-queen problem using these algorithms. [9]
b) Write a short note on Monte Carlo Tree search and list its limitations. [5]

c) Apply constraint satisfaction method to solve following Problem

SEND + MORE = MONEY. (TWO + TWO = FOUR, CROSS+


ROADS= DANGER) [4]

Q3) a) List the inference rules used in prepositional logic? Explain them in detail
with suitable example. [9]
b) Explain syntax and semantics of First Order Logic in detail. [8]

OR

Q4) a) Detail the algorithm for deciding entailment in prepositional logic. [8]

b) Explain knowledge representation structure and compare them. [9]

[5870] - 1135 1 P.T.O.


Q5) a) Explain Forward and Backward chaining. What factors justify whether
reasoning is tobe done in forward or backward chaining. [9]

b) What are the reasoning patterns in propositional logic? Explain them in


detail. [9]

OR

Q6) a) Explain unification algorithm with an example. [8]

b) Explain knowledge representation structures and compare them. [7]

c) What do you mean by Ontology of situation calculus? [3]

Q7) a) Analyse various planning approaches in detail. [9]

b) Discuss AI and its ethical concerns. Explain limitations of AI. [8]

OR

Q8) a) Explain the terms for time and schedule from perspective of temporal
planning. [9]
b) Write a detailed note on AI Architecture. [8]



[5870] - 1135 2
Total No. of Questions : 08] SEAT No. :
P815 [5870]-1136
[Total No. of Pages : 2

T.E. (Computer Engineering)


INFORMATION SECURITY
(2019 Pattern) (Semester-II) (Elective II) (310254 A)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Attempt Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.
2) Neat diagram must be drawn wherever necessary.
3) Assume suitable data, if necessary.

Q1) a) Explain El-Gammal Algorithm in detail. [6]


b) Consider a Diffie -Hellman Scheme with a common prime q = 71 and a
primitive root   7 [6]
i) If user A has private key XA = 5, what is A’s public key yA?
ii) If user B has private key XB = 12, what is B’s public key YB?
iii) What is the shared secret key K?
c) Differntiate between Asymmetric key cryptography and symmetric key
cryptography. [6]

OR
Q2) a) Discuss elliptic curve cryptography in detail. [6]
b) Perform encryption and decryption using RSA algorithm for the following:
[6]
P = 3 ; q = 11; d = 7; M = 5
c) Explain Fermat’s theorem with example. [6]

Q3) a) What is Message Digest? Compare MD-5 with SHA-I. [6]


b) What is S/MIME? Explain working of S/MIME in detail. [5]
c) What is digital signature? Explain the use of digital signature. [6]
OR
Q4) a) What is the difference between a message authentication code and a
one-way hash function? [6]
b) Explain the steps to create the digital certificate. [5]
c) What services are provided by IPSec? What is the difference between
transport mode and tunnel mode in IPSec? [6]

P.T.O.
Q5) a) Explain access control and its types in detail. [6]
b) What are the functions of Intrusion detection system? [5]
c) Differentiate between Packet filtering firewall and proxy (Application-
level Gateway) [6]
OR
Q6) a) Discuss various flooding attacks. [6]
b) Differentiate between Host based Intrusion detections system and
Network based Intrusion detection system. [5]
c) What are the functions of an Intrusion prevention system? [6]

Q7) Write short note on any three [18]


a) Cyber Terrorism
b) Types of Cyber Crime
c) Information Security Life Cycle
d) Indian IT act

OR
Q8) Write short note on any three [18]
a) Botnet
b) Examples of Cyber Crime
c) Cyber Stalking
d) Social Engineering



[5870]-1136 2
Total No. of Questions : 08] SEAT No. :
P816 [5870]-1137
[Total No. of Pages : 2

T.E. (Computer Engineering)


AUGMENTED AND VIRTUAL REALITY
(2019 Pattern) (Semester-II) (Elective II) (310254B)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Attempt Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.
2) Figures to the right indicate full marks.
3) Neat diagram must be drawn wherever necessary.
4) Assume suitable data, if necessary.

Q1) a) What are different representation issues related to Virtual Reality? [9]
b) Explain features of Haptic representation in Virtual Reality [9]

OR
Q2) a) Explain different methods of Aural rendering systems. [9]
b) List out different methods for simplifying the amount of information
needed to pass between simulation and haptic rendering. Explain any
three in detail. [9]

Q3) a) Explain different methods of manipulation a virtual world. [8]


b) List out different properties of manipulation a virtual world. Explain any
four in detail. [9]
OR
Q4) a) Explain physical and mental immersion in detail. [8]
b) Explain different types of virtual world physics. [9]

Q5) a) Explain different categories of sensors used in Augmented Reality. [9]


b) Write short note on
i) Visual Depth Cues in AR.
ii) Auditory Depth Cues in AR. [9]
OR
Q6) a) Write short note on
i) Spatial Multiplexing
ii) Temporal Multiplexing [9]
b) List the different ingredients of an Augmented Reality applications. Explain
any three in detail. [9]

P.T.O.
Q7) a) Explain the software functional components involved directly in
Augmented Reality applications. [8]
b) What is Mobile Augmented Reality? Write down different advantages
and disadvantages of Mobile Augmented Reality. [9]

OR
Q8) a) Write short note on [8]
i) Realistic and Abstract representation.
ii) Physical & Conceptual representation
b) Explain the following terms related to interaction in virtual world. [9]
i) Manipulation
ii) Communication
iii) Navigation



[5870]-1137 2
Total No. of Questions : 8] SEAT No. :
P817 [5870]-1138
[Total No. of Pages : 2

T.E. (Computer Engg.)


CLOUD COMPUTING
(2019 Pattern) (Semester-II) (Elective II) (310254 C)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q.1 or Q.2, Q.3 or Q.4 Q.5 or Q.6. Q.7 or Q.8.
2) Neat diagrams must be drawn wherver necessary
3) Figures to the right side indicate full marks.
4) Assume Suitable data, if necessary.

Q1) a) Define Virtualization? Explain different types of Virtualizations? [8]


b) Discuss Virtualization in Grid and Virtualization in Cloud? [9]

OR
Q2) a) Differentiate between full and para virtualization? [8]
b) Explain the functionality of hypervisor? What is typel and type 2
hypervisor? [9]

Q3) a) Enlist the different services offered by Amazon web Service? Explain it?
[8]
b) Discuss Amazon Dynamo Database Service in detail? [9]
OR
Q4) a) Explain Microsoft Windows Azure Platform? [8]
b) Elaborate the unique features Google App Engine with suitable example?
[9]

Q5) a) Discuss the various Cloud Security Services with its necessity? [9]
b) What are different risks in cloud computing and how to mange them?[9]
OR
Q6) a) Explain security authorization challenges in cloud computing? [9]
b) Discuss how we need to perform secure cloud software testing? [9]

P.T.O.
Q7) a) Discuss Energy Aware Cloud Computing with suitable example? [9]
b) Explain with example, working of Docker? [9]

OR
Q8) a) How the Cloud and IoT together works for Home Automation? [9]
b) Differentiate Distributed Cloud Computing Vs Edge Computing? [9]



[5870]-1138 2
Total No. of Questions : 8] SEAT No. :
P818 [5870]-1139
[Total No. of Pages : 3

T.E. (Computer Engineering)


SOFTWARE MODELING AND ARCHITECTURES
(2019 Pattern) (Semester-II) (Elective II) (310254 D)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates:
1) Answer Q.1 or Q.2, Q.3 or Q.4 Q.5 or Q.6. Q.7 or Q.8.
2) Neat diagrams must be drawn wherever necessary
3) Figures to the right side indicate full marks.
4) Assume Suitable data, if necessary.

Q1) a) Explain Fork and Join concept in Activity diagram with a suitable example
[6]
b) Explain Communication diagram with example [6]
c) Draw state machine diagram for coffee vending machine [6]

OR
Q2) a) Explain the importance of Interaction diagram [6]
b) Explain the significance of timing diagram with a suitable example [6]
c) Write short note on timing diagram [6]

Q3) a) What is architecture pattern? What is significance of architecting software


product? [8]
b) Company XYZ Integrated Solutions Pvt Ltd is responsible to develop a
reusable system architecture for high-tech medical test equipment. Some
of the key functionality requirements and features are listed below: [9]
i) Performs measurements at a stipulated time interval
ii) Ability to fix and correct errors and bring back to the system
extremely fast as it deals with real time users and instrumentation
iii) Interface to a network of workstations, instruments
iv) Ability to work with multiple types of mobile phones and digital
devices
v) Sophisticated user interface with colour displays
vi) Touch panel screen

P.T.O.
vii) Built - in help facilities
viii) Support for novice and expert users
ix) Support for multiple languages and interface for voice enabled inputs
and outputs
x) Should be used only by certified authorities and the sensitive data
should be taken care with utmost care.
. List the key quality attributes that will be addressed by the
application.
. Identify which attribute relates to each of the requirements listed.
. Which is the Most Architecturally Significant Attribute?
. What tactics would you recommend addressing this requirement?

OR
Q4) a) What is the software architecture? What are the three different views of
an architecture? [8]
b) SAR is a software company who is in to the business of helping customers
move their stores or put ones business on the e-commerce platform.
SAR had recently received a project from the Government of India -
Horticulture department to design and implement a software system to
integrate farmers and consumers on the web allowing the procurement
and selling of vegetables and fruits at wholesale prices to the general
public. you and your team has been chosen to come up the architectural
design for the system to be developed. How would you use the Business
goals to arrive at the ASR for this project?
Capture the ASR on the Utility Tree list a few quality attributes and
prioritize them based on the business value and architectural impact [9]

Q5) a) Explain Client Server architecture for Software Design [6]


b) Explain the importance of Object oriented software architecture and its
applicability in software development [6]
c) Explain the broker pattern for desing of service oriented architecture[6]
OR
Q6) a) Explain the real time software architecture with a suitable example [6]
b) Explain synchronous communication pattern in Client server architecture
with example? [6]
c) Explain Location & Platform transparency in service oriented architecture
[6]

[5870]-1139 2
Q7) a) What is the Design pattern? What is the purpose of design patterns?
What are the different types of design patterns? What is purpose of each
type of design pattern? [9]
b) What are the different creational Pattern? Explain any three creational
pattern in short [8]

OR
Q8) a) What are the benefits of Design Patterns? Explain Factory and abstract
factory patterns in detail with comparison between them and application
of factory and abstract factory pattern [9]
b) What are the different structural pattern? Explain any three structural
pattern in short [8]



[5870]-1139 3

You might also like