CSS Computer Science Paper 2021
CSS Computer science paper 2021. Computer Science CSS Paper 2021. CSS 2021 Computer Science Paper.
Paper I
SECTION-A
Q. No. 2. (a) What are office productivity tools? Explain uses of any two productivity tools in your home or workplace.
(b) Write a detailed note on computer crimes and ethical challenges.
(c) What are the different types of computers? Explain the benefits of miniaturization.
Q. No. 3. (a) Describe any two of the following briefly: ISP, HTML, SSD, Cloud Computing.
(b) Write a program that should output the factors of the number passed as input – one factor on each line. Factors of a number, say x, are those whole numbers which can be multiplied with other whole numbers to get x.
(c) What are IDEs? How do they help in software development? List the IDEs you have ever used.
(d) Write a program in C/C++ to convert a decimal number to hexadecimal.
Q. No. 4. (a) Explain object oriented programming paradigm. Write a detailed note on any two of the principles of object oriented programming paradigm.
(b) Why do we need interfaces in OOP? How does it help in achieving abstraction? (c) What do you mean by runtime and compile time errors?
SECTION-B
Q. No. 5. (a) What is a tree in data structure? Describe its types with the help of examples.
(b) What is pass by value and pass by reference? Can we pass an object as a parameter to call a method in java?
(c) Convert following infix notation to prefix (i) (30+23)*(43-21)/(84+7) (ii) 2*(1+(4*(2+1)+3))
Q. No. 6. (a) Convert following NFA to DFA:
(b) Differentiate between overloading and overriding with the help of an example.
(c) What is recursion in data structures? Explain three conditions of a recursive function with the help of an example.
Q. No. 7. (a) Write detailed notes on any TWO of the following: i. PERT chart ii. Unified Modeling Language iii. AVL Trees
(b) What is a Software Process Model? Explain the Spiral model in detail.
(c) What do you mean by software quality? List at least five quality attributes.
Q. No. 8. (a) Consider the grammar S → cAd A → a b | a construct a top-down parse tree for the input string w = cad
(b) Is the above given grammar ambiguous or unambiguous? Justify your answer.
(c) Write similarities and differences of CFG and regular expression.
(d) Design grammar for the following language: “The set of all strings of 0s and 1s such that every 0 is immediately followed by at least one 1”.
(e) Write a note on Aspect Oriented Programming.
Paper II
SECTION – A
Q. 2. (a) The addressing in a typical instruction format are done by using different addressing modes. Examine any five addressing modes with an example based on the contents of address field, actual address and contents of memory location.
(b) The decimal value of address field in an instruction is 120. The addressing mode of the machine’s architecture is register direct and register indirect addressing. Calculate the address of corresponding operand.
(c) Compare the set of addressing modes of RISC and CISC machines. Give one example of addressing modes used in RISC and CISC respectively.
Q. 3. Memory managed by BITMAP is shown below: 1 1 1 1 1 0 0 1 1 0 0 0 1 0 0 1 1 1 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 1 1
(a) Show properly filled memory according to the BITMAP where memory index starts from zero.
(b) Insert a page H of size 3 allocation units in memory drawn in part ‘a’ using first-fit algorithm. Redraw memory and the BITMAP after insertion.
(c) Now insert another page K of size 2 allocation units in memory drawn in part ‘b’ using next-fit algorithm. Redraw memory and the BITMAP after insertion.
(d) Use linked list data structure for the above memory mapping (Only give equivalent figure).
(e) Use hash table to keep track of active pages in the above memory (Only give figure).
Q. 4. Do as directed:
(a) Calculate effective memory access time using following data: · TLB hit ratio is 85%, · TLB access time=20nsec · Memory access time=115nsec Effective memory access time=Hit rate * (TLB access time+ Mem access time)+(1-Hit rate)( TLB access time+Process_table access time+ Mem access time)
(b) Consider a logical address and physical address of 31 and 22 bits respectively. What will be total logical and physical address space?
(c) Does resource allocation graph shown below consist of a deadlock or not? Justify with reason. (Figure: Resource Allocation Graph)
(d) What is race condition? What are the different techniques to avoid race condition in the processes? Which one is optimal and why?
Q.5. (a) Compare Transmission Control Protocol and User Datagram Protocol. How they are used in wireless networks?
(b) What mechanism is used by TCP to protect itself from miss delivery?
(c) Calculate the TCP window size to fully utilize the line on which WAN link is 2 Mbps and RTT between source and destination is 300 msec.
SECTION – B
Q.6. Consider the following database schema and write the relational algebra expression for the following queries. Students (Stu_Reg, Stu_Name, Stu_Address) Instructor (Ins_ID, Ins_Name, Ins_Dept_ID) Course (Cr_Code, Cr_Title, Cr_CrHours) Dept (Dept_ID, Dept_Name) Results (Res_Stu_Reg, Res_Cr_Code, Res_Marks, Res_Ins_ID, Res_Grade) (a) Write relational algebraic expression for:
(i) To display all the students details in section BSSE.
(ii) To display all Instructor Names and their respective Department Names, (if an instructor is not assigned any Dept his name should be displayed as well).
(iii) To display Stu_Reg, Stu_Name, Cr_Code, Cr_Title and Res_Marks for students who got 75 or more marks.
(iv) To display Res_Stu_Reg, Ins_Name, Res_Grade for Instructors whose Dept_ID is 1.
(b) What is the concept of gerund in database? Give one example of gerund. Is this essential to eliminate gerunds from the database? If yes, how and if no, why?
Q.7. (a) Write code/pseudo code to locate all of the large boxes in the image below using morphological image processing.
(b) Is there a need for more than 1 color model? Mention different colors models and there uses.
(c) Explain CMY color model, its use and how is it different from CMYK?
Q.8. (a) Analyze the code and draw resulting table as drawing on the paper
(b) What is the role of requirement engineering in web engineering? List functional and non- functional requirements for a website.
(c) What are different security mechanisms used for encrypting the contents of a website? Explain one in detail.
Computer Science CSS Paper 2020
Leave a reply