0% found this document useful (0 votes)
12 views

Adobe Scan 31 Oct 2024

The document outlines the structure and content of various PG Semester End Examination papers for different courses at Dayananda Sagar College of Engineering, including Java Programming, Web Technologies, Artificial Intelligence and Machine Learning, Operating Systems, Blockchain, and Cloud Computing. Each course has a maximum score of 100 marks and requires students to answer five full questions, with all questions carrying equal marks. The document includes specific topics and programming tasks related to each subject, emphasizing practical applications and theoretical understanding.

Uploaded by

vvarshini279
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
12 views

Adobe Scan 31 Oct 2024

The document outlines the structure and content of various PG Semester End Examination papers for different courses at Dayananda Sagar College of Engineering, including Java Programming, Web Technologies, Artificial Intelligence and Machine Learning, Operating Systems, Blockchain, and Cloud Computing. Each course has a maximum score of 100 marks and requires students to answer five full questions, with all questions carrying equal marks. The document includes specific topics and programming tasks related to each subject, emphasizing practical applications and theoretical understanding.

Uploaded by

vvarshini279
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
Course: Java Programming Maximum marks: 100 10 DAYANANDA SAGAR COLLEGE OF EN (At tonne stn Aft o TC agen NS PG Semester End Examination, October 2023 Code: 22MCA21 Duration: 03 hours “Answer five full Questions. All questions carry equal marks Mi a Discuss the features of JAVA and also explain the architecture of VM.” b Explain the significance of Java Virtual Machine (JVM),Java Development KIT(JDK) and Java RunTime Environment(JRE). i ¢ Discuss the significance of identifier and variables in JAVA. 62 ‘ (oR) . € e a Discuss JVM Architecture in detail. os . b Discuss different data types supported in JAVA with exampl me NS a Define string? Write a program to illustrate stritig Comparison method with example. b Develop JAVA program to illustrate any $ the decision making statement. 4 . ‘a Develop a JAVA program to tug ingBuffer and StringBuilder class. b Differentiate between break and continu statements with a sample code snippet. a Develop a java program to find the largest of array elements by using “Enhanced for loo} on : b Demonstrate, method byetoading and method overriding with suitable examples. Ys (oR) a Discus{the different types of constructor in Java with example. b Develop a java program to illustrate Constructor Overloading with example. mr NL pW a java program to illustrate the concept of inheritance. » Polymorphism. Write a program to illustrate operator , (oR) overloading. a J a) Differentiate between method overloading and method overriding with example. fe. Write a simple program to illustrate b Differentiate between Class and Interfac Interface. a Define Exceptions. Write a program to demonstrate runtime exception. b Discuss different types of exceptions with — (o! i a Discuss two types of streams used In file handling, Explain different methods used in streams. b ne a program to illustrate different File operations in Java. Page 1of i jarks 08 08 04 10 10 10 10 10 10 10 10 10 10 10 10 “12 DAVANANDA SAGAR COLLEGE OF ENGINER RING PG Semester End Examination, October 1024 Course Web Technologies je paMeana Manitou ‘Aawwer live hall Quewtions All questions carry equal marks 184 Explain the following HTM cleeents amd ith attribatens ertth am weaewper UD tage HY Atti IHD SVG Hy) Canvas With examples explain the Claes Seler The Astan Gan for the events t Unclude image paragraph. te relectors ets) 41d setters tn CRE ost pe ie + Design a bon teat arma chetitines indi: ne etal at ft 2 2 Wdentity the necessary HTMLS tags which reiiitts ina better tri Write the ayntas for each one b Help afower shop keeper to display the warvety of flowers arvaitatole with term amt te design a form to place order tor haying has Mowers 1a Summartze the advantages of Bootstrap Explain the Bootstrap Container in deta b Explain the structure of bootstrap gFid system Outline Row the gre! ersten responsive and rearrange itxelf automatically and adjust to the screen site (on) 46 a Withan example, explain Rootstrap tables, Bootstrap Images and Bootstrap Betton b Outline the differem. types of layouts available in Bootstrap and explain show conceptual classes in Bootstrap. Infer the need of lavascript at client application. What is an Array in Jawascryt? Create an Artay to stare the details of Indian Cricket team and sort their names in alphabetica order 1b What is Angular JS? Explain its key features Distinguish the key differences betweer AngularlS expressions and Javascript expressions (or) 6 a Explain the following array methods with an example for each 1) Search & replace HM) join HH) Shce Iv) Sort v) tostring b> Explain the different types of directives in Angular [S and also explain how Angular |S integrates with HTML 7° 4 Describe tn detail about the XML and write a XML program to store the student database with minimum five fields using the CSS style sheet gett Explain the following 1) Features of SON HM) Outline the advantages of ISON over XML cow (oR) information in XML with DTD declarations ing XML schema for book store database a Create a program to store stude (Minimum five fields) and create a program uw with minimum 5 attnbutes. Page Lot? 10 10 DAYANANDA SAGAR COLLEGE OF ENGINEERING Can Autonomous Institute Affiliated to'VTU, Belogars) PG Semester End Examination, October 2023 Course: Artificial Intelligence and Machine Learning Code: 22MCA23 Maximum marks: 100 Duration: 03 hours ee EO Answer five full Questions. All questions carry equal marks 1 a What is Artificial Intelligence? Discuss all four approaches to Al that h: i by different people with different Methods. aera lowed b Illustrate with a neat Schematic diagram, the working of a simple reflew agent. (OR) ¢ Tad a Illustrate with a neat diagram the working of an agént and the. Environment using vacuum-cleaner world problem. yo b Elaborate the history of Al. e* YY 7 . a Differentiate traditional programming technique, 3 Machine Learning approach for solving spam filter problem. eae Ne b Compare supervised and unsupervised learning with n example between. (OR) ‘NX R) a Identify and discuss the main challengés,faced by Machine Learning. b Write python code to perférm the following operations. 1) Todisplay CSV's excel and text files ) To display top 3 and,3 bottom datasets ill) To display a Histogram fv) Todisplay the attributes in the dataset v) _ Todisplay,the summary of the dataset -~” a a Discuss the different approaches to evaluate performance of a classifier. b_ Discuss the need for Classification and types of classification. ~~ (OR) {1 Spxglain Regression Algorithm. Discuss the applications of Regression Algorithm. \b- Highlight the basic fundamentals of support vector machine. Discuss the pros and cons .. of SVM classifiers. a What is Decision tree? Discuss the Important features of Decision Tree. State 2 limitations of Decision tree. b Consider a binary classification Issu classes: "Positive" and "Negative". a "Positive" class and 4 have a place with the “Negative” class. c Explain the importance of CART. en a Analyze how Decision tree !s capable of performing regression tasks. b Write short notes on :1) Information Gain Al) Gini index Marks 10 10 10 10 10 10 10 10 10 10 10 10 1e where we have a dataset of 10 examples withtwo 05 Out of the 10 examples, 6 have a place with the 05 10 10 Page 1 of 2 10 on Mlustrate the Importance of Principal Component Analysis approach in reducing the ~ 19 dimensionality. Describe the working f K-means clustering algorithm. What are its limitations? (oR) Discuss the two main approaches In reducing the dimensionality. Bring out the significance of the Random Forest Algorithm in Machine Learning. Discuss few application of Random Forest Algorithm. 10 10 10 Cour: b Operating System and Unix Programming Cod Maxtmum marks 100 ww CTT TTT TTI DAYANANDA SAGAR COLLEGE OF ENGINEERING An Aatonomons institute Affibated to VTL Relagers PG Semester End Examination, October 2023 22MCA24 Duration 04h Answer five full Questions. All questions carry equal marks Explain in detail different types of Operating system with a neat diaproim Sununarize the commun services provided by the Operating systetnt (ony Explain interrupts and interrupt-vector with a neat 5 What is a System call? Identity and explain types of system tall What is critical section problem? Explain the Petrus solutions to address critical section problem ? Consider the following set of process with the given, priorities. arrival time and burs time. Draw a Gant chart for preemptive, Priority Scheduling(Consider the highest umber as high priority and lowegt number as Kemst priority Process cpr ee Speed | es 7 Pronty 6 (ft ]s [a 4 Arrival Time dg 23 fa fs ie Burst Time viz '3 Je Ts ‘ss fe (OR) Construct a (ant ehart tortie given set uf process using Round Robin scheduling and find out its average waiting time (consider the tume slice as 2 ms) [Process pio Tp? pa Burst time | 4 3 5 Explain in detail multsps fessor scheduling with a diagrat 4) What iS deadlock and what are the necessary condition for 4 dead lock to accur? WM) How to prevent the occurrence of deadlock, explain WJustrate with an example about internal and external fragmentation probleny encountered in continuous memory allocation (or) Wa memory with and optimal page Consider the page reference string 107102123032403621 res. Determine the number of faults and hits using FIFO, LRU replacement algorithm, Which algorithm is more elficieat? Nlustrate the mechanism of process creation with a neat diagram Write a detailed note on the Shell's Interpretive Cycie Waite a shell script ty list all the files ina directory whose file content 4s at least 10 characters (use expr command to check the leagth) (or) Page Lot? i w 10 0 |. Summarize on hard link an ML. Write note on three s soft lnk used in shell iidard files used in Unix shell programming, Write a shell script that accept one of more filenames as argument and convert them to uppercase, provided they exist in current directory Explain the shell process creation and process status, options associated with PS 10 command in detail Demonstrate with examples 1 System variables and environment variables 10 i, Demonstrate the usage of Logical operators. (OR) Explain the shell process creation and process status, options assocjated with PS 10 command in detail iMustrate the looping statements used in Unix programming with suitable sample 1 program Pape 2 ot 2 (USN LHL DAYANANDA SAGAR COLLEGE OF ENGINEERING (An Autonomous Institute Affiliated to VTU, Belagart) PG Semester End Examination, October 2023 Course: Block Chain Code: 22MCA252 Maximum marks: 100 _ pits Advantages. 10 tion: 03 hours ‘Answer five full Questions. All questions carry equal marks Marks ‘a Discuss the abstract models for block chain in general applications. (._ 10 b Elaborate on the architecture models for BLOCKCHAIN Application with ait example. 10 (OR) CoN @ Discuss Asynchronous / Synchronous Byzantine Agreementin Block chath Application. 10 b Demonstrate any one Consensus Algorithm used in authentication of process in Block = 10 chain Applications ~» \o a Paraphrase on Miner and Mining Process in POS- PQW as application in Block chain. 10 b Explain the cryptography used in crypto-currency/crypto-coins transactions. 10 (on) a Design Merkle tree architecture and. e4 ingplock chain with Process Diagram. 10 b_ Paraphrase on Hashing, OY ‘ion of hashing in crypto currency. 10 a Discuss how cyber security can be applied in block chain application in distributed 10 echanism used in Block chain 10 b Describe the Payment.and double spending control m\ applications. (oR) £ a Explain the Bistrib Notensusin used smart contract with shared environment. b Discuss £-Governanse application of in present Indian scenario w..t cryptocurrency ENS AN a Explain the terminology RAFT / POAX Consensus in which is used Block Chain Application with an example W Elaboratgén permissioned and permission Jess models in block chain applications and (oR) plications of Block chain in ERP - Banking payment in BC Application. } & Le Discuss the ap] b Elaborate on the distributed / shared consensus in open environment in BC applications. a Discuss the Hyperledger Composer components used smart contract application inary Block Chain application. ; : tb Paraphrase the terminology Burrow ~ Fabric- Indy ~ iroha, Sawtooth in Hyper Ledger Fabric. (on) a Paraphrase on Block chain Hyper ledger states with example. 1 nak chan b Discuss the smart contract with Hyperledger Fabric concepts use’ application. Page Loft 10 10 10 10 10 10 10 10 10 DAVANANDA SAGAR COLLEGE OF ENGINEERING " fiat Alege PG Semester End Examination, October 2024 (ode 22MCAI63 (ours: Cloud Computing Maximum marks 100 7 "ARSE Tive all Questions ATT questions varny wal movie NIST in lag ne What does NIST stand for? Define the key components of Md ving example fur (ory SUE OF web services and the diflerent cdanponents invetved dea b Explain differeat service models ur pie 1b Infer the usage of cloud cube model in detait 44 Explain the “law of behavior 10 bh What is meant by the term SLA? Discuss the bejpecang aie ns » 10R) 45a Waite a detaited note on the architecture oftie AWS along with its dhagram bb Discuss the various services provided by the gnvsson an dene ws 55a Summarae the significant cloud ser¥iees provided by the Goxgle clowd Pla services b Whats vendor locking period? How can companies avoid the risks of vendor locking? 16 (or) © 9 Outline the data stordige agg Mata backup applications of cloud services im detait 10 b Recall frontend and backend architecture of cloud computing with a neat diapram 4 7 a Explain the, responsibility shared between the cloud user and service provider along 10 with AWs-Shayed Responsibility Model diagram in detail b Explain N ther and Web-Queue architecture of cloud computing in detail 10 (oR) 86 a Summarize map reduce programming model with respect to cloud computing 10 b Interpret the centralized services provided by the Apache zookeeper 10 9 a Explain how virtualization is supported by the hypervisor’s hardware 10 b How does Identity Management and Access Control help in providing security 10 for cloud services (OR) 10a Describe Virtualization security management and discuss the virtual threats 10 related to it wo b Explain Vulnerability assessment and Security scanning process in detail Q fain Crain ud ¢ mae Page Lot.

You might also like