V Sem Cse Exteranal QP
V Sem Cse Exteranal QP
205s13c
ITOUR YEAR B.TECH. DEGREE EXAMINATION. MAY 2023,
FIFTH SEMESTER EXAMINATION
ARTIFICIAL INTELLIGENCB (AI)
(scHBME - 2o2o)
(Common to CSB, CST)
(b) Bxplain the A. search and how heuristic function evaluate the cost of
path that passes through the particular state. (6)
UNIT IV
Or
UNIT V
Or
10. (a) What is the main role of upper ontology in Ontology Engineering? (6)
205 s t3 c
I I
Reg. No. : I
I
205 S 11
FOUR YEAR B.TECH, DBGREE EXAMINATION _ MAY 2023.
FIFTFI SEMESTER EXAMINATION
COMPUTER SCIENCtr AND BNGINEERING
DATA COMMUNICATION AI.ID COMPUTER NtrTWORKS (DCCNI)
(scI{EN{E - 2020)
UNIT I
Z. What is OSI Model? Explain the functions and protocols and services of each
(12)
layer.
UNIT II
UNIT III
b. Discuss connectionless oriented services of Network Layer to transport layer
(12)
with example.
Or
Turn Over
UI{IT IV
7. (a) What is l-,,oad Sheclding and. ,Iitter Control? Explain. (6)
Or
UNIT V
L (a) Give the format of TCP header and discuss the relevance of various
ficlds. (6)
Or
,
(12)
10. Describe DNS with d.iagrams and. real-time examples.
208 s lL
Reg. No:
205SO8508
LTNIT. I
LTNIT. II
LINIT - III
5. Define project? Discuss with examples, the process involved in project identification.
OR
6. Describe the formulation of the project report.
TINIT - IV
7 . Differentiate between co-operative and company type of ownership structures.
OR
8. List the challenges faced by women entrepreneurs in India.
LINIT -V
9. Write short notes on the following
(i) sFC (ii) srDC
OR
10. a) What is the need of institutional support to small entrepreneurs? Explain.
205 S 12
. F'OUR YEAR B.TBC}I. DEGREE EXAMINATION _ MAY 2023.
FIFTH SEMESTBR EXAMINATION
COMPUTER SCIENCE AND ENGINEERING
UNIT I
Or
2. (a) Construct DFA over I = {0, f } for all the strings having number of l's
divisible by 5 and number of 0's divisible by 3. (6)
(b) Differentiate between NDFA and DFA with suitable example. (6)
UNIT II
(6)
3. (a) Construct DFA for given regular expressior, (O * 1.1000(0 *.1).
'
.
(b) Design a Mealy machine for a binary input sequence such that if it has a
substring 101, ihe machine output A, if the input has substring 110, it
outputs B otherwise it outputs C. (6)
Or
(6)
4. (a) Construct smallest DFA for expression : a-b(a I bbl '
(6)
(b) Explain regular expressions, its algebraic laws and operations.
Turn Over
UNIT III
5. (a) Let G be the grammar S + aB/bA, A + a/aS/bAA, B + b/bS/aBB, for the
(6)
string aaabbabbba find the LMD and RMD.
(b) Construct CFG for following sets :
(6)
Or
6. (a) Show that id + id. id can be generated by two distinct leftmost derivation
in the grammar E->E+E lE*E l(E) lid. (6)
s->AB I ocz, A->oA1 I 01, B->LB?| L2, c->oc2 I oD1 | 01, D->0D1 I 01.
UNIT IV
7. (a) Cclnstruct PDA for L * b"b'" I ru >- r) and write its instantaneous
(6)
tlescnption.
(6)
(b) Give the formal definiti.on of a PDA.
Or
8. (a) Construct PDA for L = {xx' ! x belongs to (r, b)" } "rd write its
tion" (6)
instantaneous de scriP
(6)
(h) Convert following CF G into PDA : S->aS I aA A->bA I b.
UNIT V
(6)
(b) Explain Turing Machine with its formal definition.
Or
10. (a) Design a TM to recog rrrze all string consisting of even number of 1's and
(6)
even number of 0's"
(6)
(b) Explain following :
205 s 12
Reg. No:
205SOEs07
LINIT - I
LINIT - II
3. a) Explain about system hacking.
b) Discuss about fingerprinting services.
OR
4. a) Discuss in detail social engineering techniques.
b) Write about information gathering methodology.
LINIT - III
5. a) Differentiate Active sniffing with Passive sniffing.
b) Discuss various DOS attack categories.
OR
6. a) Write about the application layer hijacking.
b) Explain in detail about ARP poisoning and MAC flooding.
LINIT - IV
7. a) Explain various types of password attacks and password cracking tools.
b) Write short notes on various categories of SQL injection.
OR
B. a) Discuss the techniques needed for securing web servers.
b) Write about various SQL injection hacking tools.
LNIT -V
9. a) Write short notes on:
i) Protocol Analysis ii) Heuristic-based Analysis iii) Anomaly-based Analysis
b) Explain the process of encrypting a message
205SO8,509
LINIT -I
1. a) What are instruction categories? Explain with example. (6)
b) What is Addressing mode? Explain the following two addressing modes (6)
i) Direct addressing mode ii) Indirect addressing mode
OR
P.T.O
LINIT - IV
7. Create the following relation Employee ( 12 )
(Empno, Ename, Job, Hiredate, Salary, Deptno)
Perform various DDL and DML commands for Employee Relation
OR
8. Explain Aggregate functions and Set operations that are used in SQL with ( 12 )
examples?
LINIT - V
9' a) What is the purpose of Norm alization? Explain about First Normal Form and ( 6 )
Second Normal Form with an example.
b) List out the merits and demerits of Normalizatron ( 6 )
OR
10. Write the need forNormalization? Explain 3NF and BCNF with an example. ( 12 )
Reg.No. :
UNIT I
1. What are the basic building blocks of IJML? Explain the various types of UML
d.iagrams drawn to handle static and dynamic components of software under
development. Oz)
Or
UNIT II
B. Explain in detail about the interaction diagrams and also notations. (L2)
Or
4. What is UML Activity Diagram? Using an example explain the feature and
need of basic IIML activity diagram notation (12)
UNIT III
b. What do you understand by the term "Concurrency" in any transaction
system? Discuss the concept of Aggregation concurrency in state diagram. (12)
Or
6. (a) Describe the common modeling techniques for events andsignals. (6)
Turn Over
UNIT IV
Or
8. How can you model the collaboration of active and passive objects by using
collaboration diagrams? (12)
UNIT V
9. In the UML, how do you model the deployment view of a system by using
d,eployment d.iagrams? Explain with the help of an example. (12)
Or
10. (a) Explain the meaning of forward and reverse engineering. (6)