0% found this document useful (0 votes)
9 views11 pages

SPPU_Comp_2023-pages_20291_27426

The document consists of examination papers for various subjects in Computer Engineering, including Design and Analysis of Algorithms, Machine Learning, Blockchain Technology, Cyber Security and Digital Forensics, and Software Testing and Quality Assurance. Each subject includes a set of questions that students can choose from, covering a range of topics such as algorithms, regression analysis, clustering, digital evidence collection, and testing techniques. The papers are structured to assess students' understanding and application of concepts within a specified time frame.

Uploaded by

Abhijeet Wagh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views11 pages

SPPU_Comp_2023-pages_20291_27426

The document consists of examination papers for various subjects in Computer Engineering, including Design and Analysis of Algorithms, Machine Learning, Blockchain Technology, Cyber Security and Digital Forensics, and Software Testing and Quality Assurance. Each subject includes a set of questions that students can choose from, covering a range of topics such as algorithms, regression analysis, clustering, digital evidence collection, and testing techniques. The papers are structured to assess students' understanding and application of concepts within a specified time frame.

Uploaded by

Abhijeet Wagh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Total No. of Questions : 8] SEAT No.

:
P-6551 [Total No. of Pages : 3

[6181]-101
B.E. (Computer Engineering)
DESIGN AND ANALYSIS OF ALGORITHM
(2019 Pattern) (Semester-I) (410241)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates :
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right indicate full marks.
4) Assume suitable data, if necessary.

Q1) a) Write High-level description of job sequencing algorithm. Let number of


jobs (n)=5; Profit vector P={20, 15, 10, 5, 1); Deadline vector D={2, 2,
1, 3, 3) Find the feasible solutions. What is the optimal solution and
maximum profit? [9]
b) Consider the following instance of the knapsack problem. Find the optimal
solution by using dynamic programming approach. [9]
Item Weight Profit
1 2 $12
2 1 $10
3 3 $20
4 2 $15
Capacity of the knapsack = 5.
OR
Q2) a) What is Job scheduling algorithm? How job scheduling algorithm can be
solved using Greedy algorithmic approach? Explain your answer with
respect to Principle, control abstraction, time analysis of control
abstraction, of greedy approach for the following instance of Knapsack
problem. [12]
Each job is associated with a deadline and profit.
Job J1 J2 J3 J4 J5
Deadline 2 1 3 2 1
Profit 60 100 20 40 20
b) Write steps for Greedy approach for Job sequencing. [6]
P.T.O.
Q3) a) What is branch and bound algorithmic strategy? Apply branch n bound
algorithmic strategy to solve traveling salesman problem for [9]

b) Explain with suitable example Backtracking: Principle, control abstraction,


time analysis of control abstraction. [8]
OR
Q4) a) Explain the ‘branch and bound’ approach for solving problems. Write a
branch and bound algorithm for solving the 0/1 Knapsack problem. Use
the same algorithm to solve the following 0/1 Knapsack problem. The
capacity of the knapsack is 15 kg. [9]
Item A B C D
Profit(Rs.) 18 10 12 10
Weight (Kg.) 9 4 6 2
b) What is sum of subset problem? Solve sum of subset problem for following
instance using backtracking approach [8]
Input: set[ ] = {2, 3, 5, 6, 8, 10}, sum = 10

Q5) a) What is amortized analysis? Explain the aggregate method with example.[9]

b) What is Potential function method of amortized analysis? To illustrate


Potential method, find amortized cost of PUSH, POP and MULTIPOP
stack operations. [9]

OR

Q6) a) What are special needs of embedded algorithm? Which sorting algorithm
is best for embedded systems? Why? [6]

b) Explain Randomized and Approximate algorithms. [4]

[6181]-101 2
c) What is randomized algorithm? Give any example of randomized algorithm?
Also explain Random variable, Binomial random variable and-Mathematics
for Randomized algorithm. [8]

Q7) a) i) Explain an algorithm for Distributed Minimum Spanning Tree.

ii) Write and explain Rabin-Karp algorithm for string matching. [10]

b) With respect to Multithreaded Algorithms explain Analyzing multithreaded


algorithms, Parallel loops, Race conditions. [7]

OR

Q8) a) Write and explain pseudo code for Multi-threaded merge sort algorithm.
How parallel merging gives a significant parallelism advantage over Merge
Sort? [9]

b) For string matching, working module q = 11, how many spurious hits
does the Rabin- Karp matcher encounters in Text T = 31415926535.....[8]

i) T = 31415926535

ii) P=26

iii) Here T.Length = 11 so Q = 11

iv) And P mod Q = 26 mod 11 = 4

v) Now find the exact match of P mod Q...



[6181]-101 3
Total No. of Questions : 8] SEAT No. :

P-6552 [Total No. of Pages : 2


[6181]-102
B.E. (Computer Engineering)
MACHINE LEARNING
(2019 Pattern) (Semester - VII) (410242)

Time : 2½ Hours] [Max. Marks : 70


Instructions to the candidates:
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right side indicate full marks.
4) Assume suitable data if necessary.

Q1) a) Differentiate between overfitting and underfitting. [6]


b) The table below shows the number of grams of carbohydrates, X and
the number of Calories, Y of six different foods. Find linear regression
equation for this dataset. [8]
Carbohydrates (X) 8 9.5 10 6 7 4
Calories (Y) 12 138 147 88 108 62
Also find the value of Y for X = 12
c) Explain Bias Variance Trade off. [4]
OR
Q2) a) What is Linear Regression? Explain the concept of Ridge regression.
[9]
b) Explain the following Evaluation Metrics : [9]
i) MAE
ii) RMSE
iii) R2

Q3) a) Differentiate between bagging and boosting. [4]


b) What is ensemble learning? Explain the concept of Random Forest
ensemble learning. [9]
c) What is the relation between precision and recall? Explain with an
example. [4]
P.T.O.
OR
Q4) a) What is K-fold cross-validation? In K-fold cross-validation, comment
on the following situations [9]
i) When the value of K is too large
ii) When the value of K is too small.
How do you decide the value of k in k-fold cross-validation?
b) Explain i) Accuracy, ii) Precision, iii) Recall, and iv) F-Score [8]

Q5) a) Explain K-Means clustering in detail with a suitable example. [8]


b) What is outlier analysis? How is Local Outlier Factor detected? [5]
c) Explain Spectral Cluster in galgorithm. [5]
OR
Q6) a) Explain Hierarchical and Density-based Clustering approaches. [9]
b) Write short note on : [9]
i) Optimization of clusters
ii) K-Medoids
iii) Evaluation metrics

Q7) a) Write a note on Single Layer Neural Network. [4]


b) Explain Radial Basis Function networks in detail. [8]
c) Explain Recurrent Neural Networks and its applications in brief. [5]
OR
Q8) a) Explain the concept of Back Propagation in ANN with example. [8]
b) What is Functional Link Artificial Neural Network (FLANN)? Explain
its merits over other ANNs. [5]
c) What is Activation Function? Explain with a suitable example. [4]



[6181]-102 2
Total No. of Questions : 8] SEAT No. :
P6553 [Total No. of Pages : 2
[6181]-103
B.E. (Computer Engineering)
BLOCKCHAIN TECHNOLOGY
(2019 Pattern) (Semester - VII) (End Semester) (Elective) (410243)

Time : 2½ Hours] [Max. Marks : 70


Instructions to the candidates:
1) Attempt Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Figures to the right side indicate full marks.
3) Neat diagram must be drawn wherever necessary
4) Assume suitable data if necessary

Q1) a) Explain any two [6]


i) R3
ii) Ethereum
iii) Hyperledger
iv) Corda
b) Explain Proof of work with example. [6]
c) What is Byzantine General Problem? Explain its significance. [6]
OR
Q2) a) Explain any two Blockchain platforms. [6]
i) Public
ii) Private
iii) Consortium
b) Explain proof of stake with example. [6]
c) What is consensus in Blockchain? [6]

Q3) a) Discuss the concept of Cryptowallets? [6]


b) Discuss types of cryptocurrency? [6]
c) What is Metamask? [5]
OR

P.T.O.
Q4) a) Compare Coinbase and Binanace. [6]
b) What is the relevance of Crypto Usage. Discuss with example. [6]
c) What is bitcoin? Explain in detail. [5]

Q5) a) What is ethereum? What are the types of ethereum? [6]


b) Explain SWARM (Decentralized storage platform) in detail. [6]
c) What is the concept of smart contact? Discuss its types. [6]
OR
Q6) a) What is the significance of EVM( Ethereum Virtual Machine) [6]
b) Explain Whisper( Decentralized Messaging platform) [6]
c) Discuss how smart contracts are implemented using solidity. [6]

Q7) a) Discuss any use case of Blockchain integration with any other domain
like cloud. [6]
b) Explain use of Blockchain in Energy and utilities. [6]
c) Explain use of Blockchain in health sector. [5]
OR
Q8) a) Discuss any use case of Blockchain integration with any other domain
like Internet of things etc. [6]
b) What is the significance of adaption of Blockchain in banking and financial
services. [6]
c) Explain any one application of Blockchain in Government sector. [5]



[6181]-103 2
Total No. of Questions : 8] SEAT No. :
P-6556 [Total No. of Pages : 2

[6181]-106
B.E. (Computer Engineering)
CYBER SECURITY AND DIGITAL FORENSICS
(2019 Pattern) (Semester - VII) (410244 C) (Elective - III)
Time : 2½ Hours] [Max. Marks : 70
Instructions to the candidates :
1) Answer Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right indicate full marks.
4) Assume suitable data, if necessary.

Q1) a) What are the typical steps followed by computer forensics specialists in
an investigation? Explain any 2 in detail. [9]
b) In what ways can business benefit from computer forensics technology?
Explain in detail. [9]
OR
Q2) a) What kind of digital evidences can be collected in computer forensics?
Explain in detail. [9]
b) Why is data backup & recovery important in computer forensics? [9]

Q3) a) What is the primary purpose of collecting evidence in digital forensics?


Explain in detail. [9]
b) What are the typical steps involved in the collection of digital evidences?
[8]
OR
Q4) a) Explain the different types of digital evidence that can be collected in
computer forensics? [8]
b) What method & techniques are commonly used to verify & authenticate
computer images. explain any two in detail? [9]

P.T.O.
Q5) a) How do investigators determine which data is relevant to collect & analyze
in digital forensics investigation? [8]
b) What is the honeynet project, how does it contribute to network
forensics? [9]
OR
Q6) a) Why is data validation crucial in digital forensics & what methods are
commelily used for data validation? [8]
b) Describe the process of seizing digital evidence at a crime or incident
scene? [9]

Q7) a) How does email play a significant role in digital investigations? What
types of information can be obtain from email Header that may be relevant
in investigations? [9]
b) What factors should be considered when evaluating computer forensics
tool needs for an investigations. Explain any two in detail? [9]
OR
Q8) a) What is function e-mail server, how does it store & manage e-mail data?
[9]
b) Write short note (any one) : [9]
i) e-mail forensics tools.
ii) Computer forensics hardware tools



[6181]-106 2
Total No. of Questions : 8] SEAT No. :

P-6562 [Total No. of Pages : 2


[6181]-112
B.E. (Computer)
SOFTWARE TESTING AND QUALITY ASSURANCE
(2019 Pattern) (Semester - VII) (410245D) (Elective - IV)

Time : 2½ Hours] [Max. Marks : 70


Instructions to the candidates:
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Neat diagrams must be drawn wherever necessary.
3) Figures to the right side indicate full marks.
4) Assume suitable data if necessary.

Q1) a) Identify how the different Static Test Case Design Techniques are useful
for Software Testing? [6]
b) Interpret the different Dynamic Test Design Techniques. [6]
c) What do you think about static techniques. [6]
OR
Q2) a) Can you illustrate Adhoc Testing with example. [6]
b) How would you explain unit Testing and Integration Testing? [6]
c) State in your own words why Regression Testing in important? [6]

Q3) a) Illustrate different characteristics of software in detail. [6]


b) Identify different steps involved in Software Development Process.
[6]
c) Can you clarify different levels of CMM. [5]
OR
Q4) a) Why Software has Defects? Explain in details. [6]
b) Can you distinguish between Q.A. and Q.C. [6]
c) Explain in detail Pillars of Quality Management System. [5]
P.T.O.
Q5) a) How to choose an Automation tool? Explain in briefly. [6]

b) Illustrate selenium Tool suite in detail. [6]

c) How would you explain Robotic Process Automation (RPA). [6]

OR

Q6) a) Construct different automated testing process. [6]

b) What is selenium RC? Explain in detail. [6]

c) What do you understand selenium grid? Explain it. [6]

Q7) a) Can you illustrate Total Quality Management. Explain in detail. [6]

b) Illustrate Ishikawals 7 basic Tools in detail. [6]

c) What do you understand by software maintenance? Explain in detail.


[5]

OR

Q8) a) Can you Clarify Flow Chart. Run charts, control charts. [6]

b) What are the facts to achieving the software quality. Explain in detail.
[6]

c) What are the different task goal and metric in SQA? [5]



[6181]-112 2

You might also like