M.SC Computer Science
M.SC Computer Science
M.SC Computer Science
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
COMPUTER SCIENCE
Object Oriented Programming Using C++
Day & Date: Monday, 13-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Question 1 and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-1
9) What is Inheritance in C++?
a) Wrapping of data into a single class
b) Deriving new classes from existing classes
c) Overloading of classes
d) Classes with same names
10) How many specifiers are used to derive a class?
a) 1 b) 2
c) 3 d) 4
B) Fill in the blanks: 06
1) Each byte in memory is assigned a unique _____.
2) The _____ operator can be used to determine a variable's address.
3) _____ variables are designed to hold addresses.
4) Under older compilers, if the new operator cannot allocate the amount
of memory requested, it return _____.
5) Members of a class are called _____.
6) Member functions of a class are called _____ or _____.
Page 2 of 2
SLR-GG-2
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Advanced DBMS
Day & Date: Tuesday, 14-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos. 1 and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-2
10) SQL Stands for
a) Schema Query Language b) Structured Query Language
c) Self-Query Language d) None
B) Write True or False. 06
1) Information is processed data.
2) Database is a software for creating and managing databases.
3) A transaction is a unit of work that is performed against a database.
4) Table is the basic data storage unit in a Relational database.
5) In an enterprise-class database system, business users interact
directly with database applications, which directly access the database
data.
6) Structured Query Language (SQL) is an internationally recognized
standard language that is understood by all commercial database
management system products.
Page 2 of 2
SLR-GG-3
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Data Structures and Algorithms
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-3
10) Heap can be used as _____.
a) Priority queue b) Stack
c) A decreasing order array d) Normal Array
B) Write True or False. 06
1) ADT stands for Abstract data type.
2) Queue is liner data structure.
3) Stack follows LIFO principle.
4) A graph is collection of vertices and edges.
5) The time complexity of bubble sort algorithm is O(0Logn).
6) In post order traversal of binary tree right sub tree is traversed before
visiting root.
Page 2 of 2
SLR-GG-4
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Software Engineering
Day & Date: Thursday, 16-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos. 1 and 2 are Compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figure to right indicate full marks.
Page 1 of 2
SLR-GG-4
8) ______ of the following is/are White box technique.
a) Statement Testing b) Decision Testing
c) Condition Coverage d) All of the mentioned
9) ______ is a test case design method that exercises the logical
conditions contained in a program module.
a) Loop testing b) Unit testing
c) Condition testing d) None of these
10) ______ is performed to demonstrate to the client, on the real life data
of the client.
a) Unit testing b) System testing
c) Integration testing d) Acceptance testing
B) State true or false. 06
1) Software is a product and can be manufactured using the same
technologies used for other engineering artifacts.
2) Planning ahead for software reuse reduces the cost and increases
the value of the systems into which they are incorporated.
3) Software engineering team structure is independent of problem
complexity and size of the expected software products.
4) In collaborative development environments, metrics are used to
reward and punish team members.
5) ERD enables a software engineer to identify data objects and their
relationships using a graphical notation.
6) White Box testing sometimes called glass-box testing.
Q.2 Write Short Note on. 16
a) FTR
b) ERD
c) Transaction Mapping
d) Unit Testing
Q.3 Answer the following. 16
a) What is Software Engineering? Explain different development phases in
Software Engineering.
b) What is DFD? Explain with one example.
Q.4 Answer the Following. 16
a) Explain Software Prototyping in detail.
b) Explain data, functional and behavioral modeling in detail.
Q.5 Answer the following. 16
a) What is data design? Explain in detail.
b) Explain Abstraction and Refinement concept in detail.
Q.6 Answer the following. 16
a) What is Black-Box testing? Explain in detail.
b) What is object oriented analysis in detail?
Q.7 Answer the following. 16
a) Explain Waterfall model in detail.
b) Explain different myths in software engineering.
Page 2 of 2
SLR-GG-5
Seat
No. Set P
M.Sc. (Semester - I) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
UML
Day & Date: Thursday, 16-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Question 1and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-5
9) Which UML diagram is shown below?
a) Deployment diagram b) Collaboration Diagram
c) Object Diagram d) Class Diagram
10) What type of core-relationship is represented by the symbol in the figure
below?
a) Aggregation b) Dependency
c) Generalization d) Association
B) State True or False 06
1) Attributes are the data that represents characteristics of interest about
an object.
2) An object class is a set of object instances that share the same
attributes and behavior.
3) Behavior is the packaging of several items together into one unit.
4) Class diagrams model how events can change the state of an object
class over its lifetime.
5) An activity diagram can be used to model logic with the system
6) An abstract use case represents a form of "reuse."
Page 2 of 2
SLR-GG-6
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Java Programing
Day & Date: Monday, 20-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-6
10) Native-protocol pure Java converts _____ into the _____ used by
DBMSs directly.
a) JDBC calls, network protocol
b) ODBC class, network protocol
c) ODBC class, user call
d) JDBC calls, user call
B) Write True or False. 06
1) String is the wrapper class.
2) The ++ operator is concatenate two strings.
3) If m and n are ‘int’ type variables, then result of the expression m % n
when m = 5 and n = 2 is 0.
4) If a variable is declared final, it must include initial value.
5) It is an important feature of java that it always provides a default
constructor to a class.
6) A Boolean expressions are valid for an ‘if’ statement.
Page 2 of 2
SLR-GG-7
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Python Programming
Day & Date: Tuesday, 21-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Question no. 1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figure to right indicate full marks.
Page 1 of 2
SLR-GG-7
B) Fill in the blanks. 06
1) In python _____ method is used to execute SQL Command
2) _____ feature of OOP is used to hide internal details and show only
functionalities.
3) Django is a _____ Python Web framework.
4) The full form of WSGI is ______.
5) To install pandas module______ command is used.
6) To take checkbox ______ widget is used.
Page 2 of 2
SLR-GG-8
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Computer Communication Network
Day & Date: Wednesday, 22-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Question 1 and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-8
B) State True or False 06
1) Bluetooth is an example of Personal area network.
2) The term FTP stands for File transmission protocol.
3) In OSI model, Session layer provides dialog control and token
management.
4) MAN covers large geographical area, often a country or continent.
5) The ability of a single network to span multiple physical networks is
known as Subnetting.
6) The computation of the shortest path in OSPF is usually done by
Dijkstra’s algorithm
Page 2 of 2
SLR-GG-9
Seat
No. Set P
M.Sc. (Semester - II) (New) (CBCS) Examination: Oct/Nov - 2022
(COMPUTER SCIENCE)
Artificial Intelligence
Day & Date: Wednesday, 22-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. No. 1 & 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to 7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-9
8) ______ fuzzy input vectors to crisp outputs.
a) neuro - fuzzy b) Fuzzy - backpropagation
c) neuro - genetic d) fuzzy - genetic
9) DARPA, the agency that has funded a great deal of American
Artificial Intelligence research, is part of the Department of ______.
a) Defense b) Energy
c) Education d) Justice
10) In an artificial Neural Network. interconnected processing elements
are called ______.
a) nodes or neurons b) weights
c) Axons d) soma
Q.1 B) Fill in the blanks / Ture or False 06
1) An inference algorithm that derives only entailed sentences is called
sound or truth-preserving. (True / False)
2) The basic inference mechanism in the semantic network is to follow
the links between the nodes. (True / False)
3) The number of elements in a set is called its _______.
4) The structural constitute of a human brain is known as _______.
5) There are primarily two modes for an inference engine: forward
chaining and backward chaining. (True / False)
6) The space for all possible feasible solutions is called ______.
Page 2 of 2
SLR-GG-10
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
COMPUTER SCIENCE
Digital Image Processing
Day & Date: Monday, 13-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. 1 and 2 are compulsory.
2) Attempt any three questions from Q.3 to 7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-10
9) The _____technique is used to generate a processed image that
have a specified histogram.
a) Histogram equalization
b) Histogram processing
c) Histogram linearization
d) Histogram matching
10) If 𝑓(𝑥, 𝑦) is an image function of two variables, then the first order
derivative of a one dimensional function, 𝑓(𝑥) is
a) 𝑓(𝑥) − 𝑓(𝑥 + 1) b) 𝑓(𝑥 + 1) − 𝑓(𝑥)
c) 𝑓(𝑥) + 𝑓(𝑥 − 1) d) 𝑓(𝑥 − 1) − 𝑓(𝑥 + 1)
Q.1 B) Fill in the blanks. 06
1) Images with salt noise can be filtered using _________ values of
contra-harmonic mean filter.
2) The histogram of _____ image is concentrated low side of the grey scale.
3) Filter that replaces the pixel value with the medians of intensity
levels is known as _____.
4) The ringing effect are available in _____ low pass filter.
5) The _____ technique of gray-level transformation increases the
dynamic range of gray-level.
6) In _____ domain of image processing works directly on pixels.
Page 2 of 2
SLR-GG-11
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Open Source Technologies (PHP, MySql)
Day & Date: Tuesday, 14-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q.No.1 and 2 are compulsory.
2) Attempt any Three questions from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-11
10) _____ function is used to return a part of string.
a) str() b) substring
c) substr() d) strsub()
B) Fill in the blanks: 06
1) _____is the most popular Open Source SQL database management
system software.
2) _____ function checks whether a variable is an array or not.
3) Information sent from an HTML form with the _____ method is visible
to everyone.
4) PHP is an example of _____ scripting language.
5) A cookie is created with the _____ function.
6) PHP recognizes constructors by the name _____.
Page 2 of 2
SLR-GG-12
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Network Security
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Question 1 and 2 are compulsory.
2) Attempt any Three from Q.3 to Q.7
3) Figures to the right indicate full marks.
Page 1 of 2
SLR-GG-12
10) An electronic document that establishes your credentials when you are
performing transactions.
a) Digital code b) OTP
c) E-mail d) Digital certificate
B) Fill in the blanks: 06
1) The processed S/MIME along with security related data is called as _____.
2) The combination of key exchange, hash, and encryption algorithms
defines a _____ for each SSL session.
3) IPSec is designed to provide security at the _____.
4) _____ provides privacy, integrity, and authentication in e-mail
5) _____ is the first step in DES.
6) SSL primarily focuses on _____.
Page 2 of 2
SLR-GG-13
Set
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Cloud Computing
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. Nos. 1 and. 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7
3) Figure to right indicate full marks.
Page 2 of 3
SLR-GG-13
Q.6 Answer the following. 16
a) What is PaaS? State and explain features and advantages of Google App
Engine.
b) What do you mean by Virtualization? State and explain different approaches
to virtualization.
Page 3 of 3
SLR-GG-14
Seat
No. Set P
M.Sc. (Semester - III) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Mobile Computing
Day & Date: Wednesday, 15-02-2023 Max. Marks: 80
Time: 11:00 AM To 02:00 PM
Instructions: 1) Q. Nos. 1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7
3) Figure to right indicate full marks.
Page 1 of 2
SLR-GG-14
7) The _____ protocol solves the problem of hidden and exposed terminal.
a) PRMA b) DAMA
c) TDMA d) MACA
8) ISDN stands for _____.
a) Internet Switched Digital Network
b) Integrated Switching Dial Network
c) Integrated Switched Digital Network
d) Indian Switched Digital Network
9) Bluetooth is a _____ technology that connects devices in a small
area.
a) Wired LAN b) Wireless LAN
c) VLAN d) None of the above
10) Waves in the _____ range are used by submarines, because they
can penetrate water and can follow the earth surface.
a) Low Frequency b) High Frequency
c) Very High Frequency d) Ultra High Frequency
B) State True or False. 06
1) The MSC means Mobile Service and Switching Center.
2) The cell shape created by wireless transmission is hexagon in GSM.
3) A small division of a given geographical area is known as guard band.
4) In 1978 year was the communication in 2G launched in the market.
5) The full duplex channel is used for bidirectional communication
simultaneously.
6) CODA file system offers the same features that the Andrew File
System provides
Page 2 of 2
SLR-GG-15
Seat
No. Set P
M.SC. (Semester - IV) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
.Net Technology
Day & Date: Monday, 20-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any three questions from Q.No.3 to Q.No.7.
3) Figures to the right indicate full marks.
Page 1 of 2
SLR- GG-15
10) To create a database connection, _____ property must be specified.
a) bConnection b) dbSource
c) dataSource d) connectionString
Page 2 of 2
SLR-GG-16
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Machine Learning
Day & Date: Tuesday, 21-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7
3) Figure to right indicate full marks.
Page 1 of 4
SLR-GG-16
7) Having a rule in consideration, the main application is _____ : Once
we have a rule that fits the past data, if the future is similar to the
past, then we can make correct _____for novel instances.
a) Propagation b) Peripheral
c) Prediction d) Persistence
8) ______ learning, the aim is to learn a mapping from the input to an
output whose correct values are provided by a supervisor.
a) Unsupervised b) Warehouse
c) Supervised d) Semantic
9) A ______ program groups pixels with similar colors in the same
group, and such groups correspond to the colors occurring
frequently in the image.
a) Classification b) Clustering
c) Robust d) Identical
10) ______ is called discriminant analysis in pattern recognition
statistics.
a) Density analysis b) Continuous feature
c) Classification d) Standardization
Q.1 B) State True or False. 06
1) Machine learning is also related to artificial intelligence.
2) Scientists design experiments and make observations and collect
data.
3) In some applications, the output of the system is a sequence of
actions.
4) An interesting application of clustering is in image compression.
5) A robot navigating in an environment in search of a goal location is
another application area of Unsupervised learning.
6) Aim of machine learning is to understand the processes underlying
learning in humans and animals, but not to build useful systems, as
in any domain of engineering.
Page 2 of 4
SLR-GG-16
Q.3 Answer the following. 16
a) Define Dimension Reduction? Explain in detail various steps of PCA
algorithm?
b) State and explain Naive Bayes Classification for the given frequency
table and generate likelihood table for (P(x/c) = P(Hot | Yes) =?) and
(P(x/c) = P(Hot | No) =?).
Page 3 of 4
SLR-GG-16
Q.7 Answer the following. 16
a) Define Supervised Learning? Explain its various application with suitable
example?
b) Explain Apriori Association rule to predict the support value for the given
transancation with minimum support value of ‘2’?
Pass 1: {A}, {B}, {C}, {D}, {E}
Pass 2: {A,B}, {A,C}, {A,D}, {A,E}, {B,C}, {B,D}, {B,E}, {C,D}, {C,E}
Pass 3: {A,B,C}, {A,B,D}, {A,B,E}, {B,C,D),{B,C,E}, {C,D,E}
Transaction Itemset
T1 {B, C, D, E}
T2 {B, C, D}
T3 {A, B, D}
T4 {A, B, C, D, E}
T5 {A, B, C}
T6 {B, E}
Page 4 of 4
SLR-GG-17
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Data Warehouse & Mining
Day & Date: Wednesday, 22-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. Nos.1 and 2 are compulsory.
2) Attempt any three questions from Q. No.3 to Q. No.7.
3) Figure right indicate full marks.
Page 1 of 3
SLR-GG-17
7) The same minimum support threshold is used when mining at each
abstraction level is referred as: ______.
a) Reduced Support b) Same support
c) Uniform support d) Minimum support
8) The class label of each training tuple is not known, and the number
or set of classes to be learned may not to be learned may not be
known in advance is known as: ______
a) Unsupervised learning b) Self learning
c) Supervised learning d) None of these
9) ______ is the process of partitioning a set of data objects (or
observations) into subsets.
a) Classification b) Prediction
c) Clustering d) None of these
10) A divisive hierarchical clustering method employs a ____strategy.
a) Top-down b) Bottom-up
c) Random d) None of these
B) Write True/False 06
1) An OLAP system is customer-oriented and is used for transaction
and query processing by clerks, clients, and information technology
professionals.
2) A data cube allows data to be modelled and viewed in single
dimension.
3) The roll-up operation performs aggregation on a data cube, either
by climbing up a concept hierarchy for a dimension or by dimension
reduction.
4) An enterprise warehouse collects all of the information about
subjects spanning the entire organization.
5) Binary variables are continuous measurements of a roughly linear
scale.
6) DBSCAN grows clusters according to a density-based connectivity
analysis.
Page 2 of 3
SLR-GG-17
Q.4 Answer the following. 16
a) What is Data warehouse? Explain the difference between OLTP and OLAP.
b) Describe Data warehouse architecture with well labelled diagram.
Page 3 of 3
SLR-GG-18
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov - 2022
(COMPUTER SCIENCE)
Soft Computing
Day & Date: Thursday, 23-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. No. 1 & 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to 7.
3) Figures to the right indicate full marks.
Page 2 of 3
SLR-GG-18
Q.6 Answer the followings. 16
a) Calculate the Algebraic Sum, Algebraic Product, Bounded Sum and
Bounded Difference for following fuzzy sets.
A= {0.6/0 + 0.9/1 + 0.4/2 + 1.0/3 + 0.7/4}
B= {0.3/0 + 0.2/1 + 1.0/2 + 0.9/3 + 0.8/4}
b) Explain back propagation algorithm with example.
Page 3 of 3
SLR-GG-19
Seat
No. Set P
M.Sc. (Semester - IV) (New) (CBCS) Examination: Oct/Nov - 2022
(COMPUTER SCIENCE)
Block Chain Technology
Day & Date: Thursday, 23-02-2023 Max. Marks: 80
Time: 03:00 PM To 06:00 PM
Instructions: 1) Q. No. 1 & 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to 7.
3) Figures to the right indicate full marks.
Page 1 of 3
SLR-GG-19
8) EVM stands for _______.
a) Ethereum Virtual Machine
b) Electronic Virtual Machine
c) E Voting Machine
d) None of these
9) _______ is a distributed ledger that is not publicly accessible.
a) Permissioned Blockchain
b) Permission Less
c) Both of these
d) None of these
10) In ______ hackers generate numerous fake network nodes.
a) Sybil attack b) Phishing attack
c) Both of these d) None of these
Q.1 B) State true or false. 06
1) Once records are submitted on a blockchain, they can be altered.
2) An orphan block is only created when 51% attack is successful.
3) Verifiable random function (VRF) is a public-key pseudorandom
function that provides proofs that its outputs were calculated correctly.
4) Zero-Knowledge Systems is also known as Freedom Network.
5) In Bitcoin in order to communicate, the opcodes (OP CODES) not
used.
6) Hyperledger Fabric is not an open source framework.
Page 2 of 3
SLR-GG-19
Q.7 Answer the following. 16
a) Difference between Permissioned Blockchain and Permission less
Blockchain?
b) What is smart contract? How Turing Completeness work in Smart
Contract Language?
Page 3 of 3
SLR-GG-20
Seat
No. Set P
M.Sc. (Semester-IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
.NET Technology
Day & Date: Monday, 20-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Instruction: 1) All questions are compulsory.
2) Figures to right indicate full marks.
Page 1 of 3
SLR-GG-20
8) Which of the following is true when referencing master page from content
page?
a) Content pages can reference private indexer in the master page.
b) Content pages can reference private Properties in the master page.
c) Content pages can reference public Properties in the master page.
d) Content pages can reference private Methods in the master page.
9) Application_Start event is available in which file?
a) Global.asax b) Local.asax
c) Web.config d) None of the above
10) Which of the following works on server side?
a) ViewState b) HiddenField
c) Application and session d) All of the above
11) Which is the first method that is fired during the page load.
a) PreRender() b) Load()
c) Unload() d) Init()
12) Which is the DataType return in IsPostback property?
a) bit b) boolean
c) int d) object
13) How do you get information from a form that is submitted using the "post"
method?
a) Request.QueryString b) Request.Form
c) Response.write d) Response.writeln
14) Difference between Response.Write() and Response.Output.Write()
a) Response.Output.Write() allows you to buffer output
b) Response.Output.Write() allows you to write formatted output
c) Response.Output.Write() allows you to flush output
d) Response.Output.Write() allows you to stream output
Page 2 of 3
SLR-GG-20
Q.4 A) Answer the following (Any Two) 10
1) What are server side controls in asp.net? Explain.
2) Explain ASP.Net page life cycle with example.
3) Explain ADO.Net classes with suitable examples.
B) Answer the following (Any One) 04
1) What is a hidden variable in state management?
2) What is the use of HTTP handler in ASP.Net?
Page 3 of 3
SLR-GG-21
Seat
No. Set P
M.Sc. (Semester - IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Soft Computing
Day & Date: Tuesday, 21-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Q.1 Multichoice Questions. 14
1) The type of activation function expressed below is ______.
1 𝑖𝑓 𝑖 ≥ 0
𝑂={
−1 𝑖𝑓 𝑖 < 0
a) Linear b) Unipolar
c) Bipolar d) Hard limiter
2) A fuzzy relation R(X, X) is called compatibility relation if it is ______.
a) Reflective and symmetric
b) Reflective and transitive
c) Symmetric and transitive
d) Reflective, symmetric and transitive
3) The cordiality of a fuzzy set A is same as the Hamming distance
a) 𝑑(𝐴, 0) b) 𝑑(𝐴, 1)
c) 𝑑(𝐴, ф) d) 𝑑(𝐴, −1)
4) 1 ∈ _____.
a) [1,5] b) (1,5)
c) Both d) None
5) The way of defining the set as 𝐴 = {𝑥|𝑃(𝑥)} is known as:
a) Characteristic function b) Representation function
c) List method d) Rule method
6) Which of the following is not involutive class?
a) Sugeno class b) Yager class
c) Both d) None
7) Degree of subsethood S(A,B) is always _____.
a) 𝑆(𝐴, 5) ≤ 0 b) 0 ≤ 𝑆(𝐴, 𝐵) ≤ 1
c) −1 ≤ 𝑆(𝐴, 𝐵) ≤ 1 d) 𝑆(𝐴, 5) ≥ 1
8) Identify odd from the following:
a) Parallel distributed processors b) Neuro computers
c) Connection networks d) Neural networks
9) The relation ‘Taller than’ satisfies the property ______.
a) Reflective b) Symmetric
c) Transitive d) None
10) In genetic algorithm, the degree to which better individuals are selected is
known as ______.
a) Population diversity b) Selective pressure
c) Crossover d) Reproduction
Page 1 of 3
SLR-GG-21
11) Which of the following search and optimization methods mimics the
principle of natural genetics and natural selection for constituting a search
procedure?
a) Ant colony optimization b) Simulated annealing
c) Evolutionary strategies d) Cellular automata
12) In the value encoding system, a chromosome can have ______.
a) Integers b) Symbols
c) Strings d) All
13) Back propagation algorithm is an example of ______.
a) Supervised learning
b) Unsupervised learning-based
c) Reinforced learning
d) Hebbian learning
14) A fuzzy set A is known as subnormal if height of A is _____.
a) >1 b) <1
c) =1 d) ≥1
Page 2 of 3
SLR-GG-21
B) Attempt any one of the following questions. 04
1) For t-norm and t-conorm, find standard intersection, algebraic product,
bounded difference and drastic intersection for the following values of
𝑎, 𝑏 ∈ [0,1], 𝑎 = 0.1 and 𝑏 = 0.4
2) Given population with their fitness value, compute the percentage of
representation using Roulette-wheel selection method:
Population No. Population Fitness value
1 0000 0000 1
2 0110 0011 1.3
3 0101 0101 2
4 0111 0001 3.2
5 1011 1001 4.3
Page 3 of 3
SLR-GG-22
Seat
No. Set P
M.Sc. (Semester - IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Data Mining and Warehouse
Day & Date: Wednesday, 22-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Instructions: 1) All questions are compulsory.
2) Figure right indicate full marks.
Page 1 of 3
SLR-GG-22
8) The ______operation performs aggregation on a data cube, either
by climbing up a concept hierarch for a dimension or by dimension
reduction.
a) Roll-up b) Drill-down
c) Drill-rotate d) Rule-up
9) A _____ is a set of views over operational databases.
a) Enterprise warehouse b) Data Mart
c) Virtual warehouse d) Refresh
10) ______, which converts data from legacy or host format to
warehouse format.
a) Refresh Data b) Data Transformation
c) Data Cleaning d) Data Extraction
11) Concept hierarchy is a powerful form of ___________.
a) Task Relevant data b) Kinds of Knowledge
c) Interestingness measure d) Background Knowledge
12) Association rules that satisfy both the minimum confidence and
support threshold are referred to as_______.
a) Strong association rules b) Weak association rule
c) General Association Rule d) None of these
13) The same minimum support threshold is used when mining at each
abstraction level is referred as: _______.
a) Reduced Support b) Same support
c) Uniform support d) Minimum support
14) The class label of each training tuple is provided, this step is known
as : _______.
a) Supervised learning b) Self learning
c) Unsupervised learning d) None of these
Page 2 of 3
SLR-GG-22
Q.3 A) Answer the following. (Any Two) 08
a) What is data mining? Explain ‘Kind of knowledge to be mined’ as a
primitive.
b) What is Association Rule? Explain mining in multi-level hierarchy.
c) Explain various applications of data mining.
B) Answer the following. (Any One) 06
a) What is data cube? Explain different types of schemas for
multidimensional model.
b) Define Data warehouse. Explain various OLAP operations with
example.
Page 3 of 3
SLR-GG-24
Set
No. Set P
M.Sc. (Semester – IV) (Old) (CBCS) Examination: Oct/Nov-2022
(COMPUTER SCIENCE)
Network Security
Day & Date: Thursday, 23-02-2023 Max. Marks: 70
Time: 03:00 PM To 06:00 PM
Instructions: 1) All questions are compulsory.
2) Figure to right indicate full marks.
Page 1 of 3
SLR-GG-24
9) Which among the following is NOT true of modern cryptography?
a) Key is secret
b) Algorithm is secret
c) Works with bits
d) Provides not just confidentiality but also integrity land many
other things
10) Digital Signature provides
a) Authentication b) Non repudiation
c) both (a) and (b) d) Neither (a) nor (b)
11) What is the building block behind symmetric key algorithms?
a) Diffusion+Confusion
b) One-way functions with trap doors
c) One-way functions without trap doors
d) Two-way functions without trap doors
12) Which among the following is NOT a property of a good cipher?
a) Encryption with key is polynomial
b) Decryption with key is non-polynomial
c) Larger key space implies stronger cipher
d) Cipher should be computationally secure
13) When A wants to communicate with B using symmetric key
algorithms, how many keys are needed?
a) 1 b) 2
c) 4 d) 8
14) What is the key space of the mono-alphabetic cipher?
a) 26 b) 2^26
c) 26! d) 26^2
Page 2 of 3
SLR-GG-24
Q.4 A) Answer the following (any two) 10
a) Explain the concept of Cipher Block Chaining (CBC)
b) Write a note on “Packet filtering”
c) If A wants to send message to B then discuss the traditional
encryption and decryption technique.
B) Answer the following (any one) 04
a) How crypto analysis is done? Discuss.
b) What do you non repudiation? Explain.
Page 3 of 3