Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

M.SC Computer Science

Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

SLR-GG-1

Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
COMPUTER SCIENCE
Object Oriented Programming Using C++
Day & Date: Monday, 13-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Question 1 and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) Which of the following is not correct for virtual function in C++?
a) Virtual function can be static
b) Virtual function should be accessed using pointers
c) Virtual function is defined in base class
d) Must be declared in public section of class
2) How can we make a class abstract?
a) By declaring it abstract using the static keyword
b) By declaring it abstract using the virtual keyword
c) By making at least one member function as pure virtual function
d) By making all member functions constant
3) How many specifiers are present in access specifiers in class?
a) 2 b) 1
c) 4 d) 3
4) Which of these following members are not accessed by using direct
member access operator?
a) Public b) Private
c) Protected d) Both B & C
5) Who invented C++?
a) Dennis Ritchie b) Ken Thompson
c) Brian Kernighan d) Bjarne Stroustrup
6) What is C++?
a) C++ is an object oriented programming language
b) C++ is a procedural programming language
c) C++ supports both procedural and object oriented programming language
d) C++ is a functional programming language
7) Which of the following is the correct syntax of including a user defined
header files in C++?
a) #include [userdefined] b) #include "userdefined"
c) #include <userdefined.h> d) #include <userdefined>
8) Which of the following is used for comments in C++?
a) /* comment */
b) // comment */
c) // comment
d) both // comment or /* comment */

Page 1 of 2
SLR-GG-1
9) What is Inheritance in C++?
a) Wrapping of data into a single class
b) Deriving new classes from existing classes
c) Overloading of classes
d) Classes with same names
10) How many specifiers are used to derive a class?
a) 1 b) 2
c) 3 d) 4
B) Fill in the blanks: 06
1) Each byte in memory is assigned a unique _____.
2) The _____ operator can be used to determine a variable's address.
3) _____ variables are designed to hold addresses.
4) Under older compilers, if the new operator cannot allocate the amount
of memory requested, it return _____.
5) Members of a class are called _____.
6) Member functions of a class are called _____ or _____.

Q.2 Answer the following. 16


1) Define Encapsulation and Data hiding.
2) Define Data members.
3) What do you mean by a token?
4) Differentiate between keyword and identifier

Q.3 Answer the following. 16


a) Write down the syntax and example to create a class.
b) What do you mean by operator precedence?

Q.4 Answer the following 16


a) What are the features of Object oriented programming?
b) Explain use of friend function with the help of suitable example

Q.5 Answer the following 16


a) Write a C++ program to calculate root of quadratic equations by initializing
the object using default constructor.
b) Write a program to add two complex numbers using object as arguments.

Q.6 Answer the following 16


a) State any four points of differentiation between compile time polymorphism
and run time polymorphism
b) Differentiate between do..while and while loops on the basis of syntax.

Q.7 Answer the following 16


a) Write a C++ program to overload area() function to calculate area of shapes
like triangle ,square, circle.
b) Demonstrate hybrid inheritance with the help of suitable example.

Page 2 of 2
SLR-GG-2
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Advanced DBMS
Day & Date: Tuesday, 14-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos. 1 and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) Which one of the following is used to define the structure of the relation,
deleting relations and relating schemas?
a) DDL (Data Definition Language)
b) DML (Data Manipulation Language)
c) Query
d) Relational Schema
2) The number of attributes in relation is called as its
a) Cardinality b) Degree
c) Tuples d) Entity
3) The database administrator who authorizes all the new users, modifies the
database and takes grants privilege is
a) Super user b) Administrator
c) Operator of operating system d) All of the mentioned
4) AS’ clause is used in SQL for
a) Selection operation b) Rename operation
c) Join operation d) Projection operation.
5) INSERT INTO EmpVALUES (102, ’Sagar’, ’Computer’,66000); What type
of statement is this?
a) Query b) DML
c) Relational d) DDL
6) In SQL the spaces at the end of the string are removed by _____ function.
a) Upper b) String
c) Trim d) Lower
7) _____ Clause is an additional filter that is applied to the result.
a) Having b) Group-by
c) Select d) Order by
8) The primary key must be
a) Unique b) Not null
c) Both Unique and Not null d) Either Unique or Not null
9) How can we specify a row-level trigger?
a) Using ON ROW b) Using FOR EACH COL
c) Using OR ROW d) Using FOR EACH ROW

Page 1 of 2
SLR-GG-2
10) SQL Stands for
a) Schema Query Language b) Structured Query Language
c) Self-Query Language d) None
B) Write True or False. 06
1) Information is processed data.
2) Database is a software for creating and managing databases.
3) A transaction is a unit of work that is performed against a database.
4) Table is the basic data storage unit in a Relational database.
5) In an enterprise-class database system, business users interact
directly with database applications, which directly access the database
data.
6) Structured Query Language (SQL) is an internationally recognized
standard language that is understood by all commercial database
management system products.

Q.2 Answer the following. 16


a) Explain the concept of Data independence.
b) Differentiate between where clause and group by clause
c) Explain about different DML operations.
d) What is a normal form? List the various normal forms.

Q.3 Answer the following. 16


a) What is Data Model? List and explain various data models used for
database design.
b) What is functional dependency? Explain its usage in database design.

Q.4 Answer the following. 16


a) Explain the merits and demerits of data base system.
b) Discuss in detail the operators SELECT, PROJECT, UNION with suitable
example.

Q.5 Answer the following. 16


a) Define the following terms and give examples.
1) Cardinality
2) unary relationships
3) aggregation
4) specialization
b) Describe the architecture for the Distributed database with necessary
diagrams.

Q.6 Answer the following. 16


a) Define transaction and explain desirable properties of transactions.
b) What is Database Recovery? Explain different recovery techniques.

Q.7 Answer the following. 16


a) What is a trigger? How to create it? Give an example of trigger.
b) What is 2-phase locking protocol? Compare 2PL with Strict 2PL protocol.

Page 2 of 2
SLR-GG-3
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Data Structures and Algorithms
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) Queue overflow condition occurs while performing _____ operation.
a) Status b) Remove
c) Insert d) is empty
2) ____is the prefix of infix expression (a * b) % c
a) *%abc b) *ab%c
c) %* abc d) %ab*c
3) A directed graph is _____ if there is a path from each vertex to every other
vertex in the digraph.
a) Weakly connected b) Strongly Connected
c) Tightly Connected d) Linearly Connected
4) In what tree, for every node the height of its left sub tree and right sub tree
differ at least by one
a) Binary search tree b) AVL tree
c) Threaded binary tree d) complete tree
5) A linear list in which each node has pointers to point to the predecessor
and successors nodes is called as _____.
a) Singly Linked List b) Circular Linked List
c) Doubly Linked List d) Linear Linked List
6) What is the order of a matrix?
a) Number of rows X number of columns
b) number of columns X number of rows
c) number of rows X number of rows
d) number of columns X number of columns
7) Selection sort first finds the _____ element in the list and put it in the first
position.
a) Middle element b) Largest element
c) Last element d) Smallest element
8) The data structure required for Breadth First Traversal on a graph is?
a) Stack b) Array
c) Queue d) Tree
9) The complexity of merge sort algorithm is
a) O(n) b) O(log n)
c) O(n2) d) O(n log n)

Page 1 of 2
SLR-GG-3
10) Heap can be used as _____.
a) Priority queue b) Stack
c) A decreasing order array d) Normal Array
B) Write True or False. 06
1) ADT stands for Abstract data type.
2) Queue is liner data structure.
3) Stack follows LIFO principle.
4) A graph is collection of vertices and edges.
5) The time complexity of bubble sort algorithm is O(0Logn).
6) In post order traversal of binary tree right sub tree is traversed before
visiting root.

Q.2 Answer the following. 16


1) Explain bubble sort with example.
2) What is height balance tree?
3) What is D-queue? What are the applications of queue?
4) What is a sparse matrix? Explain with suitable example.

Q.3 Answer the following. 16


a) Write a program for implementation of stack.
b) Explain radix sort algorithm with example.

Q.4 Answer the following. 16


a) What is binary tree? Explain types of binary tree.
b) Explain tree traversal algorithm with example.

Q.5 Answer the following. 16


a) Write a program for binary search method.
b) What is linked list? Explain types of linked list.

Q.6 Answer the following. 16


a) What is graph? Explain linked representation of graph.
b) What is array? Explain types of array with example.

Q.7 Answer the following. 16


a) Write an algorithm for converting infix expression to prefix expression.
b) Write an algorithm for inserting and deleting an element from circularly
linked list?

Page 2 of 2
SLR-GG-4
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Software Engineering
Day & Date: Thursday, 16-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos. 1 and 2 are Compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figure to right indicate full marks.

Q.1 A) Choose correct alternative (MCQ). 10


1) ______ is the main intent of project metrics.
a) For strategic purposes
b) To minimize the development schedule
c) To evaluate the ongoing project's quality on a daily basis
d) To minimize the development schedule and evaluate the ongoing
project's quality on a daily basis
2) Unit testing is done by ______.
a) Customer b) User
c) Developer d) None of the above
3) ______ in system modeling depicts the dynamic behavior of the system.
a) Context Model b) Behavioral Model
c) Data Model d) Object Model
4) Software Engineering:
a) Is a set of rules about developing software products
b) Has been around as a discipline since the early 50’s
c) Started as a response to the so-called ‘Software Crisis’ of the late 90’s
d) Is an engineering discipline concerned with all the aspects of
software production
5) Size and Complexity are a part of ______
a) Process Metrics b) Product Metrics
c) Project Metrics d) All of the mentioned
6) To handle change & rework request another process called _____ is
used.
a) Software configuration control process
b) Software configuration process
c) Software configuration management process
d) Software engineering process group
7) A quantitative measure of the degree to which a system, component,
or process possesses, a given attribute is called as _______.
a) Measure b) Metric
c) Indicators d) Software

Page 1 of 2
SLR-GG-4
8) ______ of the following is/are White box technique.
a) Statement Testing b) Decision Testing
c) Condition Coverage d) All of the mentioned
9) ______ is a test case design method that exercises the logical
conditions contained in a program module.
a) Loop testing b) Unit testing
c) Condition testing d) None of these
10) ______ is performed to demonstrate to the client, on the real life data
of the client.
a) Unit testing b) System testing
c) Integration testing d) Acceptance testing
B) State true or false. 06
1) Software is a product and can be manufactured using the same
technologies used for other engineering artifacts.
2) Planning ahead for software reuse reduces the cost and increases
the value of the systems into which they are incorporated.
3) Software engineering team structure is independent of problem
complexity and size of the expected software products.
4) In collaborative development environments, metrics are used to
reward and punish team members.
5) ERD enables a software engineer to identify data objects and their
relationships using a graphical notation.
6) White Box testing sometimes called glass-box testing.
Q.2 Write Short Note on. 16
a) FTR
b) ERD
c) Transaction Mapping
d) Unit Testing
Q.3 Answer the following. 16
a) What is Software Engineering? Explain different development phases in
Software Engineering.
b) What is DFD? Explain with one example.
Q.4 Answer the Following. 16
a) Explain Software Prototyping in detail.
b) Explain data, functional and behavioral modeling in detail.
Q.5 Answer the following. 16
a) What is data design? Explain in detail.
b) Explain Abstraction and Refinement concept in detail.
Q.6 Answer the following. 16
a) What is Black-Box testing? Explain in detail.
b) What is object oriented analysis in detail?
Q.7 Answer the following. 16
a) Explain Waterfall model in detail.
b) Explain different myths in software engineering.

Page 2 of 2
SLR-GG-5
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
UML
Day & Date: Thursday, 16-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Question 1and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) What does a simple name in UML Class and objects consists of?
a) Letters b) Digits
c) Punctuation Characters d) All of the mentioned
2) Which diagram in UML shows a complete or partial view of the structure of
a modeled system at a specific time?
a) Sequence Diagram b) Object Diagram
c) Class Diagram d) Collaboration Diagram
3) Which model describes the static structure of the system using object
classes and their relationships?
a) Sequence model b) Subsystem model
c) Dynamic model d) Structural model
4) Which of the following diagram is time oriented?
a) Collaboration b) Sequence
c) Activity d) None of the mentioned
5) Which of the following is a dynamic model that shows how the system
interacts with its environment as it is used?
a) system context model
b) interaction model
c) environmental model
d) both system context and interaction
6) Which of the following is not a user interface design process?
a) User, task, and environment analysis and modeling
b) lnterface design
c) Knowledgeable, frequent users
d) lnterface validation
7) RAD Software process model stands for _____.
a) Rapid Application Development
b) Relative Application Development
c) Rapid Application Design
d) Recent Application Development
8) Which model shows the flow of object interactions?
a) Sequence model
b) Subsystem model
c) Dynamic model
d) Both Sequence and Dynamic model

Page 1 of 2
SLR-GG-5
9) Which UML diagram is shown below?
a) Deployment diagram b) Collaboration Diagram
c) Object Diagram d) Class Diagram
10) What type of core-relationship is represented by the symbol in the figure
below?

a) Aggregation b) Dependency
c) Generalization d) Association
B) State True or False 06
1) Attributes are the data that represents characteristics of interest about
an object.
2) An object class is a set of object instances that share the same
attributes and behavior.
3) Behavior is the packaging of several items together into one unit.
4) Class diagrams model how events can change the state of an object
class over its lifetime.
5) An activity diagram can be used to model logic with the system
6) An abstract use case represents a form of "reuse."

Q.2 Answer the following: 16


a) What is transition?
b) What is Conceptual model of UML?
c) What is Events and signals?
d) What is use case?

Q.3 Answer the following: 16


a) Explain in Details Conceptual Modeling.
b) Explain about the architecture of the UML.

Q.4 Answer the following 16


a) Write about deployment diagrams. How to model a fully distributed system?
b) Explain class Diagram with example.

Q.5 Answer the following 16


a) Explain various phases of Software development Life cycle.
b) Explain Interaction Diagram with example.

Q.6 Answer the following 16


a) Write about deployment diagrams. How to model a fully distributed system?
b) Explain Sequence Diagram with example.

Q.7 Answer the following 16


a) Explain structural things in UML.
b) What is a package? Explain importing and exporting in packages.

Page 2 of 2
SLR-GG-6
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Java Programing
Day & Date: Monday, 20-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) Which of the following methods can be used to remove a component
from the display?
a) delete() b) remove()
c) disappear() d) hide()
2) Variable declared as _____ do not occupy on a per-instance basis.
a) static b) final
c) abstract d) code
3) A _____ an object cannot be modified after it is created.
a) double b) int
c) string d) main
4) Which of the following is not the Java primitive type?
a) byte b) float
c) character d) long double
5) The JDBC-ODBC bridge allows _____ to be used as _____
a) JDBC drivers, ODBC drivers
b) Drivers, Application
c) ODBC drivers, JDBC drivers
d) Application, drivers
6) All Java classes are derived from
a) java.lang.Class b) java.util.Name
c) java.lang.Object d) java.awt.Window
7) Which method will a web browser call on a new applet?
a) main method b) destroy method
c) execute method d) init method
8) When the operators are having the same priority, they are evaluated
from ______ in the order they appear in the expression.
a) right to left b) left to right
c) any of the order d) depends on the compiler
9) Which is the root class of all AWT events?
a) java.awt.ActionEvent b) java.awt.AWTEvent
c) java.awt.event.AWTEvent d) java.awt.event.Event

Page 1 of 2
SLR-GG-6
10) Native-protocol pure Java converts _____ into the _____ used by
DBMSs directly.
a) JDBC calls, network protocol
b) ODBC class, network protocol
c) ODBC class, user call
d) JDBC calls, user call
B) Write True or False. 06
1) String is the wrapper class.
2) The ++ operator is concatenate two strings.
3) If m and n are ‘int’ type variables, then result of the expression m % n
when m = 5 and n = 2 is 0.
4) If a variable is declared final, it must include initial value.
5) It is an important feature of java that it always provides a default
constructor to a class.
6) A Boolean expressions are valid for an ‘if’ statement.

Q.2 Answer the following. 16


1) Looping statements
2) Wrapper classes
3) Extending Interfaces
4) InetAddress class

Q.3 Answer the following:


a) What is Exception? Explain any three built-in exceptions. 10
b) How to define a package? How to access, import a package? Explain with 06
example.

Q.4 Answer the following.


a) What is constructor? Explain types of constructors. 10
b) Explain thread life cycle. 06

Q.5 Answer the following.


a) Explain user-defined exception handling with suitable example. 10
b) Define a Stream. Differentiate between a byte-oriented and a character- 06
oriented stream.

Q.6 Answer the following.


a) What do you mean by synchronization? Explain with example. 10
b) Explain Event Delegation Model in detail. 06

Q.7 Answer the following.


a) State features of the layout manager BorderLayout and explain how to 10
implement it.
b) Write a program for Array index out of bounds type of exception. 06

Page 2 of 2
SLR-GG-7
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Python Programming
Day & Date: Tuesday, 21-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Question no. 1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figure to right indicate full marks.

Q.1 A) Multiple choice questions. 10


1) ______ function raise the x value to next higher integer, if x is float.
a) ceil(x) b) floor(x)
c) round(x) d) trunc(x)
2) ______ of the following is not a sequence datatype.
a) str b) list
c) tuple d) dict
3) The element in the ______ can be modified.
a) list b) tuple
c) bytes d) none of these
4) ______ is a model or blueprint for creating objects.
a) structure b) variable
c) class d) method
5) In python ______ of the following is/are types of variable.
a) Instance variables b) Class Variable
c) Both a and b d) None of these
6) An Exception is ______ error which can be handled by the programmer.
a) Compile time error b) Runtime error
c) Logical Errors d) All of these
7) Binary files handle data in the form of ______.
a) Array b) Bytes
c) String d) List
8) What is the correct way of accessing the element Name of dictionary?
a) dict[‘Name’] b) dict(Name)
c) dict{‘Name’} d) dict(‘Name’)
9) To remove a directory, we can use ______ method of ‘os’ module.
a) removerDir() b) rmdir()
c) remdir() d) rem_dir()
10) ______ is a buit-in method useful to call the super class constructor or
methods.
a) static() b) super()
c) call_super() d) call()

Page 1 of 2
SLR-GG-7
B) Fill in the blanks. 06
1) In python _____ method is used to execute SQL Command
2) _____ feature of OOP is used to hide internal details and show only
functionalities.
3) Django is a _____ Python Web framework.
4) The full form of WSGI is ______.
5) To install pandas module______ command is used.
6) To take checkbox ______ widget is used.

Q.2 Answer the following 16


a) Define List. Explain any four functions of list.
b) Explain the use of raise keyword with example.
c) Explain any four functions of math module.
d) Write about various types of file opening modes.

Q.3 Answer the following. 16


a) What are Canvas Container? Explain how to draw line, oval, rectangle and
polygon on Canvas container.
b) Explain the different steps for connecting python application to database.

Q.4 Answer the following. 16


a) Write a python application to demonstrate difference between instance
method, class method and static method.
b) Explain the different ways of creation of thread with example.

Q.5 Answer the following. 16


a) What is DataFrame? Write the features of DataFrame. Explain how to create
a DataFrame from an Excel Spreadsheet.
b) What is numpy module? Explain indexing and slicing operations on numpy
array.

Q.6 Answer the following. 16


a) Explain different GUI Layout management methods.
b) What are the features of pandas module? Write a difference between pandas
Series and DataFrame.

Q.7 Answer the following. 16


a) Explain Django templates to create a template, modify view and change
settings.
b) Explain the python built-in functions map, reduce and filter with example.

Page 2 of 2
SLR-GG-8
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Computer Communication Network
Day & Date: Wednesday, 22-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Question 1 and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) A set of layers and protocols is called a _____.
a) Protocol b) Network architecture
c) Protocol stack d) Interface
2) _____ of the following device is used to connect two systems, especially if
the systems use different protocols.
a) Repeater b) Gateway
c) Bridge d) Hub
3) “Parity bits" are used for _____.
a) Encryption of data b) To transmit faster
c) To detect errors d) To identify the user
4) In OSI model, _____ layer provides dialog control and token management.
a) Session b) Transport
c) Network d) Data link
5) The device operation at data link layer is _____.
a) Repeater b) Router
c) Bridges d) Protocol
6) ICMP is mainly used for _____.
a) Routing b) Addressing
c) Forwarding d) error and diagnostic functions
7) _____ is the range of the class C addresses
a) 1-126 b) 129-193
c) 203-239 d) 192-223
8) _____ allows you to connect and login to a remote computer
a) FTP b) Telnet
c) HTTP d) SMTP
9) To access e-mail from any machine and anywhere, uses _____.
a) PEM b) PGP
c) IMAP d) None of these
10) _____ is a language for creating a static document.
a) XSL b) XML
c) HTML d) All of these

Page 1 of 2
SLR-GG-8
B) State True or False 06
1) Bluetooth is an example of Personal area network.
2) The term FTP stands for File transmission protocol.
3) In OSI model, Session layer provides dialog control and token
management.
4) MAN covers large geographical area, often a country or continent.
5) The ability of a single network to span multiple physical networks is
known as Subnetting.
6) The computation of the shortest path in OSPF is usually done by
Dijkstra’s algorithm

Q.2 Write Short Note on: 16


1) Jitter
2) HTTP
3) CRC (Cyclic Redundancy Check)
4) WAN
16
Q.3 Answer the following:
a) Explain the architecture of Internet.
b) Explain IP Protocol with header structure.

Q.4 Answer the following 16


a) Explain TCP/IP Reference Model in detail.
b) Explain Network Address Translation (NAT).

Q.5 Answer the following 16


a) What is SMTP? Explain in detail.
b) What is UDP? Explain in detail.

Q.6 Answer the following 16


a) Explain Berkeley Sockets in detail.
b) Explain Domain Name System (DNS) in detail.

Q.7 Answer the following 16


a) What is Computer Network? Explain different uses of Computer Network.
b) Explain Shortest Path Routing algorithm.

Page 2 of 2
SLR-GG-9
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov - 2022
(COMPUTER SCIENCE)
Artificial Intelligence
Day & Date: Wednesday, 22-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. No. 1 & 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to 7
3) Figures to the right indicate full marks.

Q.1 A) Choose the correct alternatives from the options. 10


1) In an artificial Neural Network, interconnected processing elements
are called _______.
a) nodes or neurons b) weights
c) axons d) soma
2) Conversion of a fuzzy set to a single crisp value is called ______.
a) fuzzification b) defuzzification
c) fuzzy logic d) fuzzy rule
3) Graph used to represent semantic network is _______.
a) Undirected graph
b) Directed graph
c) Directed Acyclic Graph (DAG)
d) Directed complete graph
4) Machine learning is _______.
a) The autonomous acquisition of knowledge through the use of
computer programs
b) The autonomous acquisition of knowledge through the use of
manual programs
c) The selective acquisition of knowledge through the use of
computer programs
d) The selective acquisition of knowledge through the use of
manual programs
5) Neuron can send ______ signal at a time.
a) multiple b) one
c) none d) any number of
6) Reproduction operator is also known as _______.
a) Recombination b) Selection
c) Regeneration d) none of the above
7) The performance of an agent can be improved by ______.
a) Learning b) Observing
c) Perceiving d) None of the above

Page 1 of 2
SLR-GG-9
8) ______ fuzzy input vectors to crisp outputs.
a) neuro - fuzzy b) Fuzzy - backpropagation
c) neuro - genetic d) fuzzy - genetic
9) DARPA, the agency that has funded a great deal of American
Artificial Intelligence research, is part of the Department of ______.
a) Defense b) Energy
c) Education d) Justice
10) In an artificial Neural Network. interconnected processing elements
are called ______.
a) nodes or neurons b) weights
c) Axons d) soma
Q.1 B) Fill in the blanks / Ture or False 06
1) An inference algorithm that derives only entailed sentences is called
sound or truth-preserving. (True / False)
2) The basic inference mechanism in the semantic network is to follow
the links between the nodes. (True / False)
3) The number of elements in a set is called its _______.
4) The structural constitute of a human brain is known as _______.
5) There are primarily two modes for an inference engine: forward
chaining and backward chaining. (True / False)
6) The space for all possible feasible solutions is called ______.

Q.2 Answer the following. 16


a) Discuss the Characteristics of a production system.
b) Explain Breadth-First Search.
c) Explain the issues in knowledge representation.
d) Explain the steps in natural language processing.

Q.3 Answer the following. 16


a) Explain the rule-based system with an example.
b) What is conceptual dependency and list its categories?

Q.4 Answer the following. 16


a) What is matching? Explain matching with an example.
b) State and explain the water jug problem with a suitable example.

Q.5 Answer the following. 16


a) Explain the Characteristics of a production system.
b) Discuss procedural versus declarative knowledge with suitable examples.

Q.6 Answer the following. 16


a) Define Artificial Intelligence. Discuss various task domains in Artificial
Intelligence.
b) Why there is a need for alpha-beta pruning? Explain with the example.

Q.7 Answer the following. 16


a) Explain heuristic search techniques.
b) Explain ISA relation with a suitable example.

Page 2 of 2
SLR-GG-10
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
COMPUTER SCIENCE
Digital Image Processing
Day & Date: Monday, 13-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. 1 and 2 are compulsory.
2) Attempt any three questions from Q.3 to 7
3) Figures to the right indicate full marks.

Q.1 A) Choose correct alternative. 10


1) The _____ are used to represent a boundary by a connected
sequence of straight-line segments of specified length and direction.
a) Polygonal Approximations
b) Polygonal codes
c) Chain Codes
d) Simple codes
2) The _____ is the most common approach for detecting meaningful
discontinuities in the gray level.
a) Line Detection b) Edge Detection
c) Point Detection d) Circle Detection
3) The _____ property of FT of a 2D image can be computed by two
passes of the 1D FT algorithm, one along the rows and the other
along the columns.
a) Periodicity b) Translation
c) Transformation d) Separability
4) _____ is the main application of Histogram Equalization.
a) Blurring b) Image enhancement
c) Contrast adjustment d) Image Segmentation
5) ____ is the dominant application of microwave in image processing.
a) radar b) medicines
c) Lens enhancement d) Medical diagnoses
6) The _____ filter passes low frequencies.
a) High pass b) Low pass
c) Band pass d) None of these
7) In _____ step of the image processing assigns a label to an object
based on its descriptors.
a) Object recognition
b) Representation & description
c) Morphological processing
d) Segmentation
8) The _____ filter is worked on the basis in Image formation model.
a) Homomorphic b) Gaussian Highpass
c) Ideal Low Pass d) Butterworth Highpass

Page 1 of 2
SLR-GG-10
9) The _____technique is used to generate a processed image that
have a specified histogram.
a) Histogram equalization
b) Histogram processing
c) Histogram linearization
d) Histogram matching
10) If 𝑓(𝑥, 𝑦) is an image function of two variables, then the first order
derivative of a one dimensional function, 𝑓(𝑥) is
a) 𝑓(𝑥) − 𝑓(𝑥 + 1) b) 𝑓(𝑥 + 1) − 𝑓(𝑥)
c) 𝑓(𝑥) + 𝑓(𝑥 − 1) d) 𝑓(𝑥 − 1) − 𝑓(𝑥 + 1)
Q.1 B) Fill in the blanks. 06
1) Images with salt noise can be filtered using _________ values of
contra-harmonic mean filter.
2) The histogram of _____ image is concentrated low side of the grey scale.
3) Filter that replaces the pixel value with the medians of intensity
levels is known as _____.
4) The ringing effect are available in _____ low pass filter.
5) The _____ technique of gray-level transformation increases the
dynamic range of gray-level.
6) In _____ domain of image processing works directly on pixels.

Q.2 Solve any Eight of the following. 16


a) What is blending? Explain in detail.
b) What is rolling ball analogy? Explain in detail.
c) Explain Relational Descriptors in detail.
d) Explain Linear and Nonlinear Operations in detail.

Q.3 Answer the following. 16


a) What are fundamental steps in Digital Image Processing? Explain in detail.
b) Explain region filling technique with example.

Q.4 Answer the following. 16


a) Explain different intensity transformations used in image processing in detail.
b) Explain Recognition based on decision- theoretic methods in detail.

Q.5 Answer the following. 16


a) Find out mean vector and covariance for following vector
X1=(0,1,1)T, X2=(1,1,0)T, X3=(0,1,0)T, X4=(1,1,1)T
b) What are different masks used for line detections? Explain in detail.

Q.6 Answer the followings. 16


a) Explain the terms dilation and erosion, opening and closing, hit miss
transformation in detail.
b) Explain Piecewise-Linear Transformation in detail.

Q.7 Answer the followings. 16


a) Explain Sharpening Frequency Domain Filters in detail.
b) What is Sampling and Quantization? Explain in detail.

Page 2 of 2
SLR-GG-11
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Open Source Technologies (PHP, MySql)
Day & Date: Tuesday, 14-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q.No.1 and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) Which one of the following method is responsible for sending the query to
the database?
a) query() b) send_query()
c) sendquery() d) query_send()
2) _____ method can be used to diagnose and display information about a
MySQL connection error?
a) connect_errno() b) connect_error()
c) mysqli_connect_errno() d) mysqli_connect_error()
3) Which of the following is correct way of creating an array?
a) $state[0] = "Solapur"; b) $state = array("Solapur");
c) Both A and B d) None of these
4) Which one of the following function is used to start a session?
a) start_session() b) session_start()
c) session_begin() d) begin_session()
5) Which two predefined variables are used to retrieve information from
forms?
a) $GET & $POST b) $_GET & $_POST
c) GET$ & POST$ d) GET & POST
6) Which of the following function returns the number of characters in a string
variable?
a) count($variable) b) len($variable)
c) strcount($variable) d) strlen($variable)
7) Which of the following function is capable of reading a specific number of
characters from a file?
a) fgets() b) fget()
c) fileget() d) filegets()
8) The filesize () function returns the file size in _____.
a) Bits b) Bytes
c) Kilobytes d) Gigabytes
9) Which of the following keyword is used to prevent a method from being
overridden by a subclass?
a) Final b) Protected
c) Sealed d) Abstract

Page 1 of 2
SLR-GG-11
10) _____ function is used to return a part of string.
a) str() b) substring
c) substr() d) strsub()
B) Fill in the blanks: 06
1) _____is the most popular Open Source SQL database management
system software.
2) _____ function checks whether a variable is an array or not.
3) Information sent from an HTML form with the _____ method is visible
to everyone.
4) PHP is an example of _____ scripting language.
5) A cookie is created with the _____ function.
6) PHP recognizes constructors by the name _____.

Q.2 Answer the following. 16


a) Characteristics of PHP
b) parent:: and self:: keyword
c) Differences between GET and POST methods
d) Associative Array

Q.3 Answer the following. 16


a) What is Cookies? Explain with suitable example.
b) What is abstract class? Explain it with suitable example.

Q.4 Answer the following. 16


a) What is $_POST? Explain with example.
b) Write a PHP script which takes the username, password and e-mail values
from user and checks whether the user has filled the textboxes or not. Also,
check the e-mail field whether it is incorrect format or not.

Q.5 Answer the following. 16


a) Write a program to create a session, to set a value in session, and to
remove data from a session.
b) Write the PHP code for fetching the data from a database to a webpage.

Q.6 Answer the following. 16


a) With a suitable example explain the different methods of reading and writing
into a file.
b) Explain Joomla framewok. Explain different steps to develop website.

Q.7 Write a note on. 16


a) Exceptions in PHP
b) Function overloading and overriding in PHP

Page 2 of 2
SLR-GG-12
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Network Security
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Question 1 and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.

Q.1 A) Choose Correct Alternative. 10


1) The Advanced Encryption Standard (AES), has three different configurations
with respect to the number of rounds and _____.
a) Data Size b) Round Size
c) Key Size d) Encryption Size
2) DES stands for _____.
a) Data Encryption Standard b) Data Encryption Subscription
c) Data Encryption Solutions d) Data Encryption Slots
3) Biometric authentication works on the basis of _____.
a) Human characteristics b) Password
c) Smart cards d) Pin
4) X.509 certificate recommends which cryptographic algorithm?
a) AES b) DES
c) RSA d) Rabin
5) Pretty good privacy (PGP) is used in _____.
a) Browser security b) Email security
c) FTP security d) Wi-Fi security
6) LDAP is an example of which of the following?
a) Directory access protocol
b) IDS
c) Tiered model application development environment
d) File server
7) Which of the following type of attack can actively modify communication or
data?
a) Passive attack b) Active attack
c) Both a & b d) None of these
8) _____ is the kind of firewall is connected between the device and the
network Connecting to internet.
a) Hardware Firewall b) Software Firewall
c) Stateful Inspection Firewall d) Microsoft Firewall
9) Secure Socket Layer is a predecessor of which cryptographic protocol?
a) IPSec b) Transport Layer Security
c) SSL3.0 d) HTTPS

Page 1 of 2
SLR-GG-12
10) An electronic document that establishes your credentials when you are
performing transactions.
a) Digital code b) OTP
c) E-mail d) Digital certificate
B) Fill in the blanks: 06
1) The processed S/MIME along with security related data is called as _____.
2) The combination of key exchange, hash, and encryption algorithms
defines a _____ for each SSL session.
3) IPSec is designed to provide security at the _____.
4) _____ provides privacy, integrity, and authentication in e-mail
5) _____ is the first step in DES.
6) SSL primarily focuses on _____.

Q.2 Answer the following. 16


1) What is mean by threat and attack? Explain types of Attack.
2) What is mean by Cryptography? Explain Secret Key and Public Key
Cryptosystems.
3) Define Network Security. Explain Network and Transport Layer Security.
4) What is mean by Proxy Severs? Explain Firewall setting in Proxy
Servers.
16
Q.3 a) Explain Network Security Architectures in details.
b) Briefly explain the design principles of block cipher.

Q.4 Answer the following 16


a) Briefly explain Data Encryption Standard (DES) in Cryptography.
b) Define the Firewall? Explain different types of firewall in details.

Q.5 Answer the following 16


a) What do mean by Authentication Mechanisms? List out different
Authentication Mechanisms? Explain Smart cards and Biometrics.
b) Briefly explain Model for Internet work Security in network security.

Q.6 Answer the following 16


a) Briefly explain SSL Encryption and TLS in web security.
b) Briefly explain Non- Interference and Role Base Model in Access Control
Mechanisms.

Q.7 Answer the following 16


a) Briefly explain Internet Standards and RFCs in network security.
b) Briefly explain E-mail security and PGPs / MIME in web Security.

Page 2 of 2
SLR-GG-13
Set
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Cloud Computing
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. Nos. 1 and. 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7
3) Figure to right indicate full marks.

Q.1 A) Choose correct alternative. 10


1) Cloud Computing denotes a model on which a computing
infrastructure is viewed as a “_____” from which businesses and
individuals access applications from anywhere in the world on
demand.
a) Data Center b) Cloud
c) Satellite d) Protocol
2) Computing itself, to be considered fully virtualized, must allow
computers to be built from, _____ components such as processing,
storage, data, and software resources.
a) Centralized b) Customized
c) Digitalized d) Distributed
3) _____ clouds are shared by several organizations and support a
specific group that has shared concerns.
a) Managed b) Virtual
c) Community d) Hybrids
4) _____ implementation involves a complex transition from legacy
information systems and business processes to an integrated IT
infrastructure and common business process throughout the
organization.
a) ERP b) FRP
c) DRP d) MRP
5) Typical _____ -type ERP components are sales and distributions
(SD), banking and financials, customer relationship management
(CRM) and supply chain management (SCM)
a) TLAP b) OLAP
c) JLAP d) CLAP
6) Enterprises were experimenting with _____ in various contexts for
examples R&D-type projects for testing new services and applications
and low-priority business applications.
a) EaaS b) IaaS
c) MaaS d) PaaS
7) _____ lays at the foundation of many public clouds, it provides a grid
operating system that includes workload distribution, metering, and
management of applications.
a) LockLogic b) TeraLogic
c) AppLogic d) SizeLogic
Page 1 of 3
SLR-GG-13
8) _____ customers are billed on a pay-per-use basis and by taking into
account the different services: compute, storage, bandwidth, and
storage transactions.
a) Azare b) Azuer
c) Azuret d) Azure
9) Secure Socket Layer (SSL) is widely used and ______.
a) Untrusted b) Trusted
c) Costly d) Reasonable
10) _____ is the illusion of infinite computing resources.
a) Cloud Computing b) Google Computing
c) Yahoo Computing d) Netflix Computing
B) Write True / False. 06
1) Clouds are hardware based services offering compute, network, and
storage capacity.
2) Cloud computing is an emerging research infrastructure that builds on
the achievements of different research areas, such as SOA, grid
computing, and virtualization technology.
3) The security of data storage is one of the necessary tasks to be
addressed before the blueprint for cloud computing is accepted.
4) Google AppEngine provides a set of APIs and an application model
that allow developers to take advantage of additional services
provided by Google such as Mail, Datastore, Memcache, and others.
5) An example of a non hosted integration technology is Informatica
PowerCenter Cloud Edition on Amazon EC2.
6) Constraining attributes of SaaS applications is that the massive
amounts of information that do not need to move between SaaS and
on-premise systems daily and the need not to maintain data quality
and integrity.

Q.2 Answer the following. 16


a) Explain in brief Community Clouds.
b) What do you mean by Virtual Machine (VM)?
c) What is SaaS?
d) What is Internet?

Q.3 Answer the following. 16


a) Explain in detail Application Level Security as Infrastructure Security.
b) What are various issues in Cloud Computing?

Q.4 Answer the following. 16


a) What is Cloud? Discuss in detail various types Cloud Service Models with
suitable example.
b) What do you mean by Amazon EC2-Renting and EC2 Compute Units?

Q.5 Answer the following. 16


a) Explain in detail major roles and advantages of Service Oriented
Architecture.
b) What do you mean by Cloud Deployment Model? State and explain various
models of it.

Page 2 of 3
SLR-GG-13
Q.6 Answer the following. 16
a) What is PaaS? State and explain features and advantages of Google App
Engine.
b) What do you mean by Virtualization? State and explain different approaches
to virtualization.

Q.7 Answer the following. 16


a) What do you mean by Cloud Computing? Explain its architecture and
various characteristics.
b) Discuss in detail Software as a Service (SaaS) with suitable example.

Page 3 of 3
SLR-GG-14
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Mobile Computing
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. Nos. 1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7
3) Figure to right indicate full marks.

Q.1 A) Choose the correct alternatives. 10


1) What is Mobile communication?
a) Allows to communicate from same locations with the use of
physical medium
b) Allows to communicate from different locations with the use of
physical medium
c) Allows to communicate from same locations without the use of
physical medium
d) Allows to communicate from different locations without the use
of physical medium
2) _____ stores the data related to the user and is relevant to GSM
mobile systems as well.
a) SIM (Subscriber Identity Module)
b) CMR (Customer- Managed Relationship)
c) VLR (Visitor Location Register)
d) HMR (Header Manipulation Rule)
3) Which type of multiplexing enables to use of the whole bandwidth
simultaneously?
a) FDMA b) CMDA
c) TDMA d) None of the above
4) Which of the following techniques utilizes a similar frequency in the
cellular network?
a) Frequency planning b) Frequency hopping
c) Frequency reuse d) All of these
5) Which of the following technology uses wireless communication mode
to exchange data or transfer data between several mobiles in the
short-range?
a) Mobile Computing b) Ad hoc computing
c) Bluetooth technology d) None
6) Which of the following can be considered as the primary function of
snooping TCP?
a) To buffer data close to the mobile host to perform fast local
retransmission in case of packet loss
b) Congestion control
c) Flow control
d) None of the above

Page 1 of 2
SLR-GG-14
7) The _____ protocol solves the problem of hidden and exposed terminal.
a) PRMA b) DAMA
c) TDMA d) MACA
8) ISDN stands for _____.
a) Internet Switched Digital Network
b) Integrated Switching Dial Network
c) Integrated Switched Digital Network
d) Indian Switched Digital Network
9) Bluetooth is a _____ technology that connects devices in a small
area.
a) Wired LAN b) Wireless LAN
c) VLAN d) None of the above
10) Waves in the _____ range are used by submarines, because they
can penetrate water and can follow the earth surface.
a) Low Frequency b) High Frequency
c) Very High Frequency d) Ultra High Frequency
B) State True or False. 06
1) The MSC means Mobile Service and Switching Center.
2) The cell shape created by wireless transmission is hexagon in GSM.
3) A small division of a given geographical area is known as guard band.
4) In 1978 year was the communication in 2G launched in the market.
5) The full duplex channel is used for bidirectional communication
simultaneously.
6) CODA file system offers the same features that the Andrew File
System provides

Q.2 Answer the following. 16


a) Mobility management
b) General packet radio service
c) Advance techniques in mobile computing
d) WML

Q.3 Answer the following. 16


a) Draw and explain the GSM Architecture in detail.
b) Write the quality of service in 3G.

Q.4 Answer the following. 16


a) Explain the Bluetooth technology and protocols.
b) Explain the case study for GLOBALSTAR system.

Q.5 Answer the following. 16


a) Draw and explain the Mobile TCP working in detail with advantages.
b) Explain the network signaling.

Q.6 Answer the following. 16


a) Draw and explain the WLL architecture in detail.
b) Explain the global satellite systems.

Q.7 Answer the following. 16


a) Explain in detail Mobile Terminated Call (MTC).
b) What is multiplexing? Explain the TDMA and CDMA techniques.

Page 2 of 2
SLR-GG-15
Seat
No. Set P
M.SC. (Semester - IV) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
.Net Technology
Day & Date: Monday, 20-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any three questions from Q.No.3 to Q.No.7.
3) Figures to the right indicate full marks.

Q.1 A) Choose correct alternatives. (MCQ) 10


1) What is false about the constructor?
a) Class name and Constructor name are same.
b) Constructor are return type.
c) Constructor are public.
d) Constructor are overloaded.
2) The _____state technique maintain data across users.
a) Application b) Session
c) Cookies d) Query String
3) _______is value type data type.
a) Class b) String
c) Struct d) Delegate
4) The ______method of command object supports forward-only, read-only
access to retrieve rows from the data source.
a) ExecuteReader() b) ExecuteNonQuery().
c) ExecuteScalar(). d) ExecuteReadOnly().
5) Suppose we want to validate entered value is divisible by 5 or not then ___
validation control is used.
a) RangeValidator b) CustomValidator
c) RegularExpressionValidator d) BaseValidator
6) The ______ property of calendar control is used to select entire week.
a) SelectedDate b) SelectedDates
c) SelectedWeek d) SelectionMode
7) _____ property of Textbox control does not allow updating of data.
a) Update b) Modify
c) ReadOnly d) Disable
8) _____ is a type of class that does not have its own objects but acts as a
base class for its subclass.
a) Static class b) Abstract class
c) Sealed class d) None of these
9) The ______ directive’s duration attribute determines how long the page is
cached.
a) @Cache b) @OutputCache
c) @OutCache d) @PageCach

Page 1 of 2
SLR- GG-15
10) To create a database connection, _____ property must be specified.
a) bConnection b) dbSource
c) dataSource d) connectionString

B) Fill in the blanks. 06


1) CTS stands for _____.
2) _____ namespace is required for DataTable.
3) _____ property of multiview control is used for active view.
4) _____ element need to specify for filtering advertises in AdRotator
control.
5) To limit the scope of cookies to a specific folder, _____ property is used.
6) Defining two methods with the same name but with different
parameters is called as method ______.

Q.2 Answer the following. 16


a) What is boxing and unboxing? Explain with example.
b) What is enum? Explain enum with example.
c) Explain global.asax file in detail.
d) Explain wizard control with example.

Q.3 Answer the following.


a) What is Indexer? Explain indexer with example. 10
b) Explain RegularExpressionValidation control and CustomValidation control 06
with example.

Q.4 Answer the following.


a) What is interface? Explain interface with example. 08
b) What is dynamic compilation? Explain in detail. 08

Q.5 Answer the following.


a) What are nested master pages? Explain event ordering in master pages. 08
b) Design windows application for select, insert and delete records. 08

Q.6 Answer the following.


a) What is delegates? Explain anonymous delegate with example. 08
b) What is state management? Explain client side state management 08
techniques in details.

Q.7 Answer the following.


a) What is use of \App_GlobalResource and \App_LocalResource folder? Explain 10
with example.
b) What is Abstract class? Explain with example. 06

Page 2 of 2
SLR-GG-16
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Machine Learning
Day & Date: Tuesday, 21-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7
3) Figure to right indicate full marks.

Q.1 A) Choose the correct alternatives from the options. 10


1) An _______ is a sequence of instructions that should be carried out
to transform the input to output.
a) Transformer b) Tester
c) Algorithm d) Agglomerative
2) In medicine, learning programs are used for medical _______.
a) Dilation b) Diagnosis
c) Drug Delivery d) Lincensy
3) The machine learning program should be able to assess the
goodness of policies and learn from past good action sequences to
be able to generate a policy. Such learning methods are called
_______ learning algorithms.
a) Strategic b) Reinforcement
c) Evaluative d) Supervised
4) If the system can ______ and adapt to environmental changes, the
system designer need not foresee and provide solutions for all
possible situations.
a) Learn b) Module
c) Analyse d) Design
5) ______ learning is programming computers to optimize a
performance criterion using example data or past experience.
a) Performance b) Database
c) Information d) Machine
6) There are many applications of machine learning in ______
recognition.
a) Project b) Data
c) Machine d) Pattern

Page 1 of 4
SLR-GG-16
7) Having a rule in consideration, the main application is _____ : Once
we have a rule that fits the past data, if the future is similar to the
past, then we can make correct _____for novel instances.
a) Propagation b) Peripheral
c) Prediction d) Persistence
8) ______ learning, the aim is to learn a mapping from the input to an
output whose correct values are provided by a supervisor.
a) Unsupervised b) Warehouse
c) Supervised d) Semantic
9) A ______ program groups pixels with similar colors in the same
group, and such groups correspond to the colors occurring
frequently in the image.
a) Classification b) Clustering
c) Robust d) Identical
10) ______ is called discriminant analysis in pattern recognition
statistics.
a) Density analysis b) Continuous feature
c) Classification d) Standardization
Q.1 B) State True or False. 06
1) Machine learning is also related to artificial intelligence.
2) Scientists design experiments and make observations and collect
data.
3) In some applications, the output of the system is a sequence of
actions.
4) An interesting application of clustering is in image compression.
5) A robot navigating in an environment in search of a goal location is
another application area of Unsupervised learning.
6) Aim of machine learning is to understand the processes underlying
learning in humans and animals, but not to build useful systems, as
in any domain of engineering.

Q.2 Answer the following. 16


a) Write a short note on Artificial Intelligence.
b) What do you mean by Machine Learning?
c) Explain in brief Over fitting?
d) What do you mean by Data cleaning?

Page 2 of 4
SLR-GG-16
Q.3 Answer the following. 16
a) Define Dimension Reduction? Explain in detail various steps of PCA
algorithm?
b) State and explain Naive Bayes Classification for the given frequency
table and generate likelihood table for (P(x/c) = P(Hot | Yes) =?) and
(P(x/c) = P(Hot | No) =?).

Frequency Table Play Cricket


Yes No
Hot 2 2
Temperature Mild 4 2
Cold 3 1

Q.4 Answer the following. 16


a) State and Explain Machine Learning vs Artificial Intelligence vs Deep
Learning?
b) What do you mean by Unsupervised Learning? Discuss steps of K-
Means Algorithm with suitable example?

Q.5 Answer the following. 16


a) What is KNN? Discuss working of KNN to classify a person having weight
‘57kg’ and Height ‘172cm’ as Normal or Underweight?

Weight Height Class


56 174 Underweight
58 169 Normal
55 170 Normal
57 173 Normal
51 167 Underweight
b) What do you mean by Reinforcement Learning? State and explain
various applications of Machine Learning?

Q.6 Answer the following. 16


a) What do you mean by Regression? Explain in detail Logistic regression
with example.
b) What are Machine Learning types? Explain in detail general process of
Machine Learning.

Page 3 of 4
SLR-GG-16
Q.7 Answer the following. 16
a) Define Supervised Learning? Explain its various application with suitable
example?
b) Explain Apriori Association rule to predict the support value for the given
transancation with minimum support value of ‘2’?
Pass 1: {A}, {B}, {C}, {D}, {E}
Pass 2: {A,B}, {A,C}, {A,D}, {A,E}, {B,C}, {B,D}, {B,E}, {C,D}, {C,E}
Pass 3: {A,B,C}, {A,B,D}, {A,B,E}, {B,C,D),{B,C,E}, {C,D,E}

Transaction Itemset
T1 {B, C, D, E}
T2 {B, C, D}
T3 {A, B, D}
T4 {A, B, C, D, E}
T5 {A, B, C}
T6 {B, E}

Page 4 of 4
SLR-GG-17
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Data Warehouse & Mining
Day & Date: Wednesday, 22-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any three questions from Q. No.3 to Q. No.7.
3) Figure right indicate full marks.

Q.1 A) Choose the correct alternative: 10


1) An ______collects all of the information about subjects spanning the
entire organization.
a) Enterprise warehouse b) Data Mart
c) Virtual warehouse d) Refresh
2) _____ which converts data from legacy or host format to warehouse
format.
a) Refresh Data b) Data Transformation
c) Data Cleaning d) Data Extraction
3) ____ is a visualization operation that rotates the data axes in view
to provide an alternative data presentation.
a) Slice b) Drill-down
c) Pivot (rotate) d) Dice
4) Association rules that satisfy both the minimum confidence and
support threshold are referred to as _______.
a) Strong Association rules
b) Weak Association rule
c) General Association Rule
d) None of these
5) ______ schema can be viewed as a collection of stars.
a) Star b) Snowflake
c) Fact constellation d) Hybrid
6) An ______system is market-oriented and is used for data analysis
by knowledge workers.
a) OLPP b) OLTP
c) OLEP d) OLAP

Page 1 of 3
SLR-GG-17
7) The same minimum support threshold is used when mining at each
abstraction level is referred as: ______.
a) Reduced Support b) Same support
c) Uniform support d) Minimum support
8) The class label of each training tuple is not known, and the number
or set of classes to be learned may not to be learned may not be
known in advance is known as: ______
a) Unsupervised learning b) Self learning
c) Supervised learning d) None of these
9) ______ is the process of partitioning a set of data objects (or
observations) into subsets.
a) Classification b) Prediction
c) Clustering d) None of these
10) A divisive hierarchical clustering method employs a ____strategy.
a) Top-down b) Bottom-up
c) Random d) None of these
B) Write True/False 06
1) An OLAP system is customer-oriented and is used for transaction
and query processing by clerks, clients, and information technology
professionals.
2) A data cube allows data to be modelled and viewed in single
dimension.
3) The roll-up operation performs aggregation on a data cube, either
by climbing up a concept hierarchy for a dimension or by dimension
reduction.
4) An enterprise warehouse collects all of the information about
subjects spanning the entire organization.
5) Binary variables are continuous measurements of a roughly linear
scale.
6) DBSCAN grows clusters according to a density-based connectivity
analysis.

Q.2 Answer the following. 16


a) What is Data Cleaning? Explain with suitable example.
b) What is data mining? Explain ‘Task Relevant Data’ as a primitive.
c) Explain Unsupervised learning with example.
d) Explain Divisive hierarchical clustering method with example.

Q.3 Answer the following. 16


a) What is cluster analysis? Explain various typical requirements of
clustering in data mining.
b) Explain decision tree induction method with example.

Page 2 of 3
SLR-GG-17
Q.4 Answer the following. 16
a) What is Data warehouse? Explain the difference between OLTP and OLAP.
b) Describe Data warehouse architecture with well labelled diagram.

Q.5 Answer the following. 16


a) Explain k-medoid algorithm with suitable example.
b) Explain Back Propagation method with suitable example.

Q.6 Answer the following. 16


a) What is data cube? Explain different schemas for multidimensional model.
b) What is association rule? Explain various applications of association rules.

Q.7 Answer the following. 16


a) Explain the procedure of Apriori algorithm with example.
b) Explain different Applications of Data Mining.

Page 3 of 3
SLR-GG-18
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov - 2022
(COMPUTER SCIENCE)
Soft Computing
Day & Date: Thursday, 23-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. No. 1 & 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to 7.
3) Figures to the right indicate full marks.

Q.1 A) Choose the correct alternatives from the options. 10


1) Algebraic sum of (0.6, 0.4) = ______.
a) 0.4 b) 0.6
c) 0.76 d) 1
2) Let A = {a,b,c} The power set of A is ______.
a) {{a},{b},{c}}
b) {ϕ, {a}, {b}, {c}}
c) {{a},{b},{c},{a,b},{a,c},{b,c},{a,b,c}}
d) {ϕ, {a}, {b}, {c}, {a, b}, {a, c}, {b, c}, {a, b, c}}
3) The input for any neuron from the other connected neurons are
received through _______.
a) dendrites b) synapse
c) axon d) soma
4) Mutation means element of _____ modified.
a) Chromosome b) Genome
c) DNA d) Genotype
5) ______ is the degree to which the better individual is selected.
a) Selective pressure b) Selection rank
c) Popularity diversity d) Offspring
6) A fuzzy set is said to be interval valued if ______ have lower and
upper bounds.
a) the fuzzy set
b) the input values of that fuzzy set
c) their fuzzy membership grades
d) all the above
7) Thresholding is one of the ______ used to generate output of a
neural network.
a) Quash function b) Active function
c) Transfer function d) Both (b) and (c)
8) A binary relation (𝑋,) is a compatibility relation if it is _______.
(i) Reflexive (ii) Transitive (iii) Symmetric
a) (i) and (ii) b) (i) and (iii)
c) (ii) and (iii) d) (i), (ii) and (iii)
Page 1 of 3
SLR-GG-18
9) The nonlinear function used to generate output of a neuron is ______.
a) Splash function b) Transfer function
c) Activation function d) (a) and (b)
10) Which of the following is not a traditional search and optimization
methods?
a) Cellular automata b) Genetic algorithms
c) Random cost d) Queuing
Q.1 B) Fill in the blanks. 06
1) Other than input and output layers, the number of layer(s) present in
a single layer feedback neural network is/are _______.
2) A 4-input neuron has weights 1, 2, 3, and 4. The transfer function is
linear, with the constant of proportionality being equal to 2. The
inputs are 4, 10, 5, and 20, respectively. The output will be: ______.
3) The chromosome is sequence of ______.
4) A fuzzy relation 𝑅(𝑥, 𝑦) ≠ 𝑅(𝑦, 𝑥) for some 𝑥, 𝑦 ∈ 𝑋, then the relation
is called as ______ relation.
5) Conversion of Fuzzy output set to crisp output by using _______.
6) Element in fuzzy set has membership degree between _______.

Q.2 Answer the followings. 16


a) Properties of Fuzzy set
b) Biological Neuron Verses Artificial Neuron
c) Strength of GA
d) Supervised and Unsupervised learning

Q.3 Answer the followings. 16


a) What is feed forward neuron network? For the given matrix
IP = [0.9, -0.2, 0.4] and Weight = [ 0.7, 0.8, -0.3], calculate the output of
neuron for sigmoidal function.
b) Write the different applications of neural network.

Q.4 Answer the followings. 16


a) Let A= {0.1,0.4,0.6, 0.7,0.8,1.0} and B= {0.1,0.2,0.5,0.7,0.8,0.9} be the
fuzzy sets. Calculate the(A ∩ B), (A ∪ B), (A − B) and (B − A). Also
calculate the alpha and strong alpha cut for above where
alpha= {0.1,0.4,0.6,0.9,1.0}
b) Calculate the Max-Min composition for following fuzzy relation.
R= {0.5/10 + 0.7/20 + 0.2/30 + 0.9/40},
S= {0.4/10 + 0.1/20 + 0.8/30 + 0.6/40}

Q.5 Answer the followings. 16


a) Draw the structure of Artificial Neuron and explain the different
components of it.
b) What is Crossover? Explain its types with example.

Page 2 of 3
SLR-GG-18
Q.6 Answer the followings. 16
a) Calculate the Algebraic Sum, Algebraic Product, Bounded Sum and
Bounded Difference for following fuzzy sets.
A= {0.6/0 + 0.9/1 + 0.4/2 + 1.0/3 + 0.7/4}
B= {0.3/0 + 0.2/1 + 1.0/2 + 0.9/3 + 0.8/4}
b) Explain back propagation algorithm with example.

Q.7 Answer the followings. 16


a) Roulette Wheel Selection.
b) Rank Selection

Page 3 of 3
SLR-GG-19
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov - 2022
(COMPUTER SCIENCE)
Block Chain Technology
Day & Date: Thursday, 23-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. No. 1 & 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to 7.
3) Figures to the right indicate full marks.

Q.1 A) Choose the correct alternatives from the options. 10


1) Fundamentals of block chain technology _______.
a) Decentralized b) Distributed Network Technology
c) Both of these d) None of these
2) Cryptography keys consist _______.
a) Private Key b) Public Key
c) Both of these d) None of these
3) Which of the following industry can use blockchain technology for
cyber security?
a) Logistics b) Healthcare
c) Critical infrastructure d) All of these
4) ______ is a hash function.
a) A fork
b) UTXO
c) Gas
d) Takes an input of any length and returns a fixed-length
5) When a record is on a blockchain, ______ can access it.
a) Multiple people simultaneously
b) One person at a time
c) Only the people involved in the transaction
d) Bank
6) P2P Stand for ______.
a) Password to Protect
b) Protection to Product
c) Peer to Peer
d) Private Key to Public Key
7) Smart contracts means ______.
a) Define the rules and penalties around a specific agreement
b) Define the procedure of using wallet
c) Define the standard operational procedures
d) None of these

Page 1 of 3
SLR-GG-19
8) EVM stands for _______.
a) Ethereum Virtual Machine
b) Electronic Virtual Machine
c) E Voting Machine
d) None of these
9) _______ is a distributed ledger that is not publicly accessible.
a) Permissioned Blockchain
b) Permission Less
c) Both of these
d) None of these
10) In ______ hackers generate numerous fake network nodes.
a) Sybil attack b) Phishing attack
c) Both of these d) None of these
Q.1 B) State true or false. 06
1) Once records are submitted on a blockchain, they can be altered.
2) An orphan block is only created when 51% attack is successful.
3) Verifiable random function (VRF) is a public-key pseudorandom
function that provides proofs that its outputs were calculated correctly.
4) Zero-Knowledge Systems is also known as Freedom Network.
5) In Bitcoin in order to communicate, the opcodes (OP CODES) not
used.
6) Hyperledger Fabric is not an open source framework.

Q.2 Answer the following. 16


a) Immutable Ledger
b) Hash Pointer
c) Digital Cash
d) Sharding

Q.3 Answer the following. 16


a) What is Blockchain Technology? Explain advantages and disadvantages.
b) What is How Byzantine Generals Problem? Bitcoin solves the Byzantine
Generals Problem?

Q.4 Answer the following. 16


a) State difference between Proof of Work (PoW) and Proof of Stake (PoS).
b) What are privacy issues in blockchain? Explain in detail.

Q.5 Answer the following. 16


a) What is Verifiable Random Functions (VRF)? Explain in detail.
b) What is difference between Blockchain 2 and Blockchain 3?

Q.6 Answer the following. 16


a) What is Hyperledger fabric? Explain benefits of Hyperledger fabric?
b) What is Hash functions? State Features of Hash Functions?

Page 2 of 3
SLR-GG-19
Q.7 Answer the following. 16
a) Difference between Permissioned Blockchain and Permission less
Blockchain?
b) What is smart contract? How Turing Completeness work in Smart
Contract Language?

Page 3 of 3
SLR-GG-20
Seat
No. Set P
M.Sc. (Semester-IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
.NET Technology
Day & Date: Monday, 20-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Instruction: 1) All questions are compulsory.
2) Figures to right indicate full marks.

Q.1 A) Choose the correct alternative: 14


1) Which of the following statements is correct about the .NET Framework?
a) .NET Framework uses DCOM for achieving language interoperability
b) .NET Framework is built on the DCOM technology
c) .NET Framework uses DCOM for making transition between managed
and unmanaged code.
d) .NET Framework uses DCOM for creating unmanaged applications
2) Which of the following jobs are done by Common Language Runtime?
a) It provides core services such as memory management, thread
management, and remoting
b) It enforces strict type safety
c) It provides Garbage Collection Services
d) All of the above
3) Which of the following statements are correct about JIT?
a) JIT compiler compiles instructions into machine code at run time.
b) The instructions compiled by JIT compilers are written in native code.
c) All of the above
d) None of these
4) Which of the following are the correct statements about delegates?
a) Delegates can be used to implement callback notification
b) Delegates permit execution of a method on a secondary thread in an
asynchronous manner
c) Delegate is a user defined type
d) All of the mentioned
5) C# does not support ______ constructors?
a) Parameterized b) Parameter-less
c) Class d) Method
6) C# supports a technique known as _____, which allows a method to
specify explicitly the name of the interface it is implementing.
a) Method Implementation
b) Implicit Interface Implementation
c) Explicit Interface Implementation
d) Iterative Interface Implementation
7) Boxing converts a value type on the stack to an ______ on the heap.
a) Bool type b) Instance type
c) Class type d) Object type

Page 1 of 3
SLR-GG-20
8) Which of the following is true when referencing master page from content
page?
a) Content pages can reference private indexer in the master page.
b) Content pages can reference private Properties in the master page.
c) Content pages can reference public Properties in the master page.
d) Content pages can reference private Methods in the master page.
9) Application_Start event is available in which file?
a) Global.asax b) Local.asax
c) Web.config d) None of the above
10) Which of the following works on server side?
a) ViewState b) HiddenField
c) Application and session d) All of the above
11) Which is the first method that is fired during the page load.
a) PreRender() b) Load()
c) Unload() d) Init()
12) Which is the DataType return in IsPostback property?
a) bit b) boolean
c) int d) object
13) How do you get information from a form that is submitted using the "post"
method?
a) Request.QueryString b) Request.Form
c) Response.write d) Response.writeln
14) Difference between Response.Write() and Response.Output.Write()
a) Response.Output.Write() allows you to buffer output
b) Response.Output.Write() allows you to write formatted output
c) Response.Output.Write() allows you to flush output
d) Response.Output.Write() allows you to stream output

Q.2 A) Answer the following (Any Four) 08


1) What is a MSIL code?
2) Write scope of the variable in C#.
3) What is language interoperability?
4) Write use of CLS and CTS.
5) How to turn off the Client-Side Validation.
B) Write Notes on (Any Two) 06
1) What are tracing and debugging in C#?
2) What is a reflection in C#? Explain with example.
3) Write ASP.Net master page events.

Q.3 A) Answer the following (Any two) 08


a) What are boxing and unboxing in C#?
b) How does CLR help in program execution? Explain.
c) What is the role of global.asax in ASP.Net?
B) Answer the following (Any One) 06
1) What is a master pages in ASP.Net? Explain with example.
2) Explain .Net framework with suitable diagram.

Page 2 of 3
SLR-GG-20
Q.4 A) Answer the following (Any Two) 10
1) What are server side controls in asp.net? Explain.
2) Explain ASP.Net page life cycle with example.
3) Explain ADO.Net classes with suitable examples.
B) Answer the following (Any One) 04
1) What is a hidden variable in state management?
2) What is the use of HTTP handler in ASP.Net?

Q.5 Answer the following (Any two) 14


a) Explain command line argument in C# with suitable example.
b) What is a state management in ASP.Net? Explain with suitable example
c) Explain connected and disconnected architecture of ADO.Net.

Page 3 of 3
SLR-GG-21
Seat
No. Set P
M.Sc. (Semester - IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Soft Computing
Day & Date: Tuesday, 21-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Q.1 Multichoice Questions. 14
1) The type of activation function expressed below is ______.
1 𝑖𝑓 𝑖 ≥ 0
𝑂={
−1 𝑖𝑓 𝑖 < 0
a) Linear b) Unipolar
c) Bipolar d) Hard limiter
2) A fuzzy relation R(X, X) is called compatibility relation if it is ______.
a) Reflective and symmetric
b) Reflective and transitive
c) Symmetric and transitive
d) Reflective, symmetric and transitive
3) The cordiality of a fuzzy set A is same as the Hamming distance
a) 𝑑(𝐴, 0) b) 𝑑(𝐴, 1)
c) 𝑑(𝐴, ф) d) 𝑑(𝐴, −1)
4) 1 ∈ _____.
a) [1,5] b) (1,5)
c) Both d) None
5) The way of defining the set as 𝐴 = {𝑥|𝑃(𝑥)} is known as:
a) Characteristic function b) Representation function
c) List method d) Rule method
6) Which of the following is not involutive class?
a) Sugeno class b) Yager class
c) Both d) None
7) Degree of subsethood S(A,B) is always _____.
a) 𝑆(𝐴, 5) ≤ 0 b) 0 ≤ 𝑆(𝐴, 𝐵) ≤ 1
c) −1 ≤ 𝑆(𝐴, 𝐵) ≤ 1 d) 𝑆(𝐴, 5) ≥ 1
8) Identify odd from the following:
a) Parallel distributed processors b) Neuro computers
c) Connection networks d) Neural networks
9) The relation ‘Taller than’ satisfies the property ______.
a) Reflective b) Symmetric
c) Transitive d) None
10) In genetic algorithm, the degree to which better individuals are selected is
known as ______.
a) Population diversity b) Selective pressure
c) Crossover d) Reproduction

Page 1 of 3
SLR-GG-21
11) Which of the following search and optimization methods mimics the
principle of natural genetics and natural selection for constituting a search
procedure?
a) Ant colony optimization b) Simulated annealing
c) Evolutionary strategies d) Cellular automata
12) In the value encoding system, a chromosome can have ______.
a) Integers b) Symbols
c) Strings d) All
13) Back propagation algorithm is an example of ______.
a) Supervised learning
b) Unsupervised learning-based
c) Reinforced learning
d) Hebbian learning
14) A fuzzy set A is known as subnormal if height of A is _____.
a) >1 b) <1
c) =1 d) ≥1

Q.2 A) Answer any four of the following. 08


a) Define Bremermann's limit.
b) Name any four reproduction methods.
c) Give an example each for supervised and unsupervised learning.
d) Define equilibrium point.
e) Define digraph.
B) Write note on any two 06
1) Briefly explain value encoding system?
2) Discuss Gradient descent learning.
3) List standard fuzzy operations with an example for each.

Q.3 A) Answer any two of the following 08


1) Describe alpha cut and strong alpha cut with example for each.
2) What is mutation? How it is performed? Explain.
3) Illustrate structure of a neuron with a figure.
B) Answer any one of the following 06
1) .6 .2 0 .2 0 .7 .1
Let 𝑃 = [. 3 . 7 . 2] , 𝑄 = [. 2 . 5 . 1 . 5] Find Domain, Range and
.5 .9 .6 0 .9 .4 .9
Hight of 𝑃 and 𝑄. Also find Standard composition, Sagittal diagram
and membership matrix for (a) 𝑃 and 𝑄 and (b) 𝑄 and 𝑃.
2) Compute the scalar cordiality, degree of subsethood and Hamming
distance between fuzzy sets defined by the following functions:
𝑥 𝑥2
𝐴(𝑥) = and 𝐵(𝑥) = 𝑥 3 +1 for 𝑥 ∈ |0,1,2, … ,10| = 𝑋
15

Q.4 A) Answer any two of the following. 10


1) What are the two ways of representing a fuzzy set using crisp set?
Illustrate.
2) What is crossover? What are its types? Explain with example for each.
3) Write back propagation algorithm.

Page 2 of 3
SLR-GG-21
B) Attempt any one of the following questions. 04
1) For t-norm and t-conorm, find standard intersection, algebraic product,
bounded difference and drastic intersection for the following values of
𝑎, 𝑏 ∈ [0,1], 𝑎 = 0.1 and 𝑏 = 0.4
2) Given population with their fitness value, compute the percentage of
representation using Roulette-wheel selection method:
Population No. Population Fitness value
1 0000 0000 1
2 0110 0011 1.3
3 0101 0101 2
4 0111 0001 3.2
5 1011 1001 4.3

Q.5 Answer any two of the following 14


a) Find 𝛼 cuts and strong 𝛼 cuts for the fuzzy following set for 𝛼 = 0.2, 0.5, 0.8
and 1.
𝑥 1
𝐴(𝑥) = 2 and 𝐵(𝑥) = 1 − for 𝑥 ∈ |0,1,2, … ,10| = 𝑋
𝑥 +5 𝑥+1
b) Two uniform bars are connected by pins at 𝐴 and 𝐵 and supported at 𝐴. A
horizontal force 𝑃 acts at 𝐶. Knowing the force, length of bars and its weight
determine the equilibrium configuration of the system if friction at all joints
are neglected, 0 ≤ 𝜃1 , 𝜃2 ≤ 90.

Randomly generated 8-bit strings representing angles 𝜃1 and 𝜃2 are :


1010 1001
0010 0011
0001 1110
1000 1101
Compute fitness function given following parmeters:
𝑃 = 3, 𝑊1 = 2, 𝑊2 = 2, 𝑙1 = 1, 𝑙2 = 1
c) For the problem in V(2) above compute the population using Tournament
selection method. Use following random selection of individuals: 4 and 2, 2
and 3, 1 and 3, 1 and 4.

Page 3 of 3
SLR-GG-22
Seat
No. Set P
M.Sc. (Semester - IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Data Mining and Warehouse
Day & Date: Wednesday, 22-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Instructions: 1) All questions are compulsory.
2) Figure right indicate full marks.

Q.1 Choose the correct alternative: 14


1) An agglomerative hierarchical clustering method uses a ______
strategy.
a) Top-down b) Bottom-up
c) Random d) None of these
2) A divisive hierarchical clustering method employs a __ strategy.
a) Top-down b) Bottom-up
c) Random d) None of these
3) AGNES stands for ________.
a) AGlomerative Next Searching
b) Advanced Group NESting
c) AGglomerative NESting
d) None of these
4) The deeper the abstraction level, the smaller the corresponding
threshold.
a) Reduced Support b) Same support
c) Uniform support d) Minimum support
5) An ______system manages current data.
a) OLAP b) OLTP
c) OLEP d) None of these
6) _____is a subjects-oriented, integrated, time-variant, non-
volatile collection of data in support of management’s decision
making process.
a) Data Mining b) Text Mining
c) Document Mining d) Data Warehouse
7) The _____ schema is a variant of the star schema model.
a) Snowflake schema b) Star schema
c) Fact constellation schema d) Hybrid schema

Page 1 of 3
SLR-GG-22
8) The ______operation performs aggregation on a data cube, either
by climbing up a concept hierarch for a dimension or by dimension
reduction.
a) Roll-up b) Drill-down
c) Drill-rotate d) Rule-up
9) A _____ is a set of views over operational databases.
a) Enterprise warehouse b) Data Mart
c) Virtual warehouse d) Refresh
10) ______, which converts data from legacy or host format to
warehouse format.
a) Refresh Data b) Data Transformation
c) Data Cleaning d) Data Extraction
11) Concept hierarchy is a powerful form of ___________.
a) Task Relevant data b) Kinds of Knowledge
c) Interestingness measure d) Background Knowledge
12) Association rules that satisfy both the minimum confidence and
support threshold are referred to as_______.
a) Strong association rules b) Weak association rule
c) General Association Rule d) None of these
13) The same minimum support threshold is used when mining at each
abstraction level is referred as: _______.
a) Reduced Support b) Same support
c) Uniform support d) Minimum support
14) The class label of each training tuple is provided, this step is known
as : _______.
a) Supervised learning b) Self learning
c) Unsupervised learning d) None of these

Q.2 A) Answer the following. (Any four) 08


1) What is Information gain?
2) What is Data Cleaning? Explain in short.
3) Explain operation-derived hierarchies.
4) What is Metadata Repository? Explain in short.
5) State and explain different types of data used cluster analysis in
short.
B) Write Notes on. (Any two) 06
a) Prediction
b) FP-Tree
c) Reduced support

Page 2 of 3
SLR-GG-22
Q.3 A) Answer the following. (Any Two) 08
a) What is data mining? Explain ‘Kind of knowledge to be mined’ as a
primitive.
b) What is Association Rule? Explain mining in multi-level hierarchy.
c) Explain various applications of data mining.
B) Answer the following. (Any One) 06
a) What is data cube? Explain different types of schemas for
multidimensional model.
b) Define Data warehouse. Explain various OLAP operations with
example.

Q.4 A) Answer the following. (Any Two) 10


a) Explain Decision tree induction method with example.
b) What is cluster analysis? Explain Agglomerative hierarchical
clustering method with example.
c) Explain the procedure of Apriori algorithm with suitable example.
B) Answer the following. (Any One) 04
a) Explain Market Basket Analysis in Association rule.
b) Explain different issues regarding with classifications.

Q.5 Answer the following. (Any Two) 14


a) Explain k-means algorithm with suitable example.
b) Explain the architecture of Data warehouse with well labelled
diagram.
c) What is classification?? Bayesian classification with suitable example.

Page 3 of 3
SLR-GG-24
Set
No. Set P
M.Sc. (Semester – IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Network Security
Day & Date: Thursday, 23-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Instructions: 1) All questions are compulsory.
2) Figure to right indicate full marks.

Q.1 Multiple Choice Questions. 14


1) Message _____ means that sender and receiver expect privacy.
a) Confidentiality b) Integrity
c) Authentication d) None of the above
2) Message _____ means that the data must arrive at the receiver
exactly as sent.
a) Confidentiality b) Integrity
c) Authentication d) None of the above
3) What is computer and network security about?
a) Protecting resources from attackers
b) Mitigating threats
c) Closing vulnerabilities
d) All of the above
4) Can encryption happen in parallel? Assume all the blocks are
available?
a) Yes b) No
5) Which among the following is a stream cipher?
a) Ceaser b) Vigenere
c) One Time Pad d) All of the above
6) Can decryption happen in parallel? Assume all the cipher text as
well as Vectors are available
a) Yes b) No
7) What are the number of possible keys for a key of length 128 bits?
a) 128 b) 128 * 8
c) 2^128 d) 128^2
8) Which among the following is an advantage of modern cryptography?
a) Analyzed by best minds
b) Low cost in implementation
c) Can work over images, not just text
d) All of the above

Page 1 of 3
SLR-GG-24
9) Which among the following is NOT true of modern cryptography?
a) Key is secret
b) Algorithm is secret
c) Works with bits
d) Provides not just confidentiality but also integrity land many
other things
10) Digital Signature provides
a) Authentication b) Non repudiation
c) both (a) and (b) d) Neither (a) nor (b)
11) What is the building block behind symmetric key algorithms?
a) Diffusion+Confusion
b) One-way functions with trap doors
c) One-way functions without trap doors
d) Two-way functions without trap doors
12) Which among the following is NOT a property of a good cipher?
a) Encryption with key is polynomial
b) Decryption with key is non-polynomial
c) Larger key space implies stronger cipher
d) Cipher should be computationally secure
13) When A wants to communicate with B using symmetric key
algorithms, how many keys are needed?
a) 1 b) 2
c) 4 d) 8
14) What is the key space of the mono-alphabetic cipher?
a) 26 b) 2^26
c) 26! d) 26^2

Q.2 A) Answer the following (any four) 08


a) Define Encryption.
b) Differentiate between Symmetric key and Asymetric key.
c) How digital signature works?
d) What do you mean by DES?
e) Write the Applications of Network Security.
B) Answer the following (any two) 06
a) What is hashing? Explain.
b) Write a note on “Threats and Risks”
c) How Internet security protocol works?

Q.3 A) Answer the following (any two) 08


a) Write a RSA algorithm.
b) Differentiate Hashes Vs Encryption
c) Explain the term “Kerberos”.

B) Answer the following (any one) 06


a) Describe the Services of firewall.
b) Discuss the significance of Totient function.

Page 2 of 3
SLR-GG-24
Q.4 A) Answer the following (any two) 10
a) Explain the concept of Cipher Block Chaining (CBC)
b) Write a note on “Packet filtering”
c) If A wants to send message to B then discuss the traditional
encryption and decryption technique.
B) Answer the following (any one) 04
a) How crypto analysis is done? Discuss.
b) What do you non repudiation? Explain.

Q.5 Answer the following (any two) 14


a) Describe the access control models.
b) What is encryption? Explain the different types of encryption techniques.
c) Describe the components of Web security.

Page 3 of 3

You might also like