August 19, 2017

EMBEDDED SYSTEM - OVERVIEW OF 8051-MICRO CONTROLLER


EMBEDDED SYSTEM - OVERVIEW OF 8051-MICRO CONTROLLER

EMBEDDED SYSTEM - CHALLENGES IN EMBEDDED SYSTEM


EMBEDDED SYSTEM - CHALLENGES IN EMBEDDED SYSTEM

EMBEDDED SYSTEM - MICROCONTROLLERS AND EMBEDDED PROCESSORS


EMBEDDED SYSTEM - MICROCONTROLLERS AND EMBEDDED PROCESSORS

EMBEDDED SYSTEM - INTRODUCTION TO COMPUTING


EMBEDDED SYSTEM - INTRODUCTION TO COMPUTING

WEB TECHNOLOGY : WORKING WITH JDBC- PART-II


WEB TECHNOLOGY : WORKING WITH JDBC- PART-II

WEB TECHNOLOGY : JDBC- INTRODUCTION


WEB TECHNOLOGY : JDBC- INTRODUCTION

WEB TECHNOLOGY : XML RPC


WEB TECHNOLOGY : XML RPC

WEB TECHNOLOGY : RMI


WEB TECHNOLOGY : RMI

WEB TECHNOLOGY : JAVA UDP SOCKET PROGRAMMING


WEB TECHNOLOGY : JAVA UDP SOCKET PROGRAMMING

WEB TECHNOLOGY : JAVA SOCKET PROGRAMMING


WEB TECHNOLOGY : JAVA SOCKET PROGRAMMING

WEB TECHNOLOGY : JAVA NETWORKING


WEB TECHNOLOGY : JAVA NETWORKING

WEB TECHNOLOGY : JAVA NETWORKING - INTRODUCTION


WEB TECHNOLOGY : JAVA NETWORKING - INTRODUCTION

WEB TECHNOLOGY : JAVASCRIPT AND EVENT HANDLING


WEB TECHNOLOGY : JAVASCRIPT AND EVENT HANDLING

WEB TECHNOLOGY : JAVASCRIPT AND HTML DOM


WEB TECHNOLOGY : JAVASCRIPT AND HTML DOM

WEB TECHNOLOGY : JAVASCRIPT OBJECTS


WEB TECHNOLOGY : JAVASCRIPT OBJECTS

WEB TECHNOLOGY : HTML


WEB TECHNOLOGY : HTML

WEB TECHNOLOGY : MARKUP LANGUAGES


WEB TECHNOLOGY : MARKUP LANGUAGES

WEB TECHNOLOGY : SERVICES ON INTERNET


WEB TECHNOLOGY : SERVICES ON INTERNET

WWW (World Wide Web)


WWW (World Wide Web)

WEB TECHNOLOGY : INTRODUCTION


WEB TECHNOLOGY : INTRODUCTION

CRYPTOGRAPHY AND NETWORK SECURITY - CLASSICAL CRYPTOGRAPHY


CRYPTOGRAPHY AND NETWORK SECURITY - CLASSICAL CRYPTOGRAPHY

CRYPTOGRAPHY AND NETWORK SECURITY - INTRODUCTION TO NETWORK SECURITY


CRYPTOGRAPHY AND NETWORK SECURITY - INTRODUCTION TO NETWORK SECURITY
COMPUTER SCIENCE AND APPLICATIONS – MODEL QUESTIONS


1. Infrared signals can be used for short range communication in a closed area using _______ propagation.

(A) ground

(B) sky

(C) line of sight

(D) space

2. A bridge has access to _______address in the same network.

(A) Physical

(B) Network

(C) Datalink

(D) Application

3. The minimum frame length for 10 Mbps Ethernet is _______ bytes and maximum is _______ bytes.

(A) 64 & 128

(B) 128 & 1518

(C) 1518 & 3036

(D) 64 & 1518

4. The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is _______.

(A) 500 baud/sec

(B) 1000 baud/sec

(C) 3000 baud/sec

(D) 18000 baud/sec.

5. Match the following :

                 List – I                                              List – II

a. Physical layer                            i. Allow resources to network access

b. Datalink layer                            ii. Move packets from one destination to other

c. Network layer                            iii. Process to process message delivery

d. Transport layer                           iv. Transmission of bit stream

e. Application Layer                       v. Formation of frames

(ANS) iv v ii iii i

6. A grammar G is LL(1) if and only if the following conditions hold for two distinct productions A → α | β

I. First (α) ∩ First (β) ≠ {a} where a is some terminal symbol of the grammar.

II. First (α) ∩ First (β) ≠ λ

III. First (α) ∩ Follow (A) = φ if λ ∈ First (β)

(A) I and II

(B) I and III

(C) II and III

(D) I, II and III

7. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar ?

(A) Removing left recursion alone

(B) Removing the grammar alone

(C) Removing left recursion and factoring the grammar

(D) None of the above

8. A shift reduce parser suffers from

(A) shift reduce conflict only

(B) reduce reduce conflict only

(C) both shift reduce conflict and reduce reduce conflict

(D) shift handle and reduce handle conflicts

9. KPA in CMM stands for

(A) Key Process Area

(B) Key Product Area

(C) Key Principal Area

(D) Key Performance Area

12. Which one of the following is not a risk management technique for managing the risk due to unrealistic schedules and budgets ?

(A) Detailed multi source cost and schedule estimation.

(B) Design cost

(C) Incremental development

(D) Information hiding

COMPILER DESIGN - PARSING GENERATOR, SEMANTIC PHASE INTRODUCTION


COMPILER DESIGN - PARSING GENERATOR, SEMANTIC PHASE INTRODUCTION

COMPILER DESIGN - LALR PARSING


COMPILER DESIGN - LALR PARSING

COMPILER DESIGN - CALR PARSING


COMPILER DESIGN - CALR PARSING

COMPILER DESIGN - SLR PARSING


COMPILER DESIGN - SLR PARSING

COMPILER DESIGN – SLR PARSER - SLR PARSING TABLE


COMPILER DESIGN – SLR PARSER - SLR PARSING TABLE

COMPILER DESIGN – SLR(1) PARSERS, LR (0) ITEMS


COMPILER DESIGN – SLR(1) PARSERS, LR (0) ITEMS

COMPILER DESIGN – OPERATOR PRECEDENCE PARSING ALGORITHM


COMPILER DESIGN – OPERATOR PRECEDENCE PARSING ALGORITHM

COMPILER DESIGN – OPERATOR PRECEDENCE PARSER


COMPILER DESIGN – OPERATOR PRECEDENCE PARSER

COMPILER DESIGN – LEXICAL PHASES - NFA TO DFA


COMPILER DESIGN – LEXICAL PHASES - NFA TO DFA

COMPILER DESIGN – LEXICAL PHASES - AUTOMATA


COMPILER DESIGN – LEXICAL PHASES - AUTOMATA

COMPILER DESIGN – LEXICAL PHASES


COMPILER DESIGN – LEXICAL PHASES

COMPILER DESIGN – COMPILERS - PHASES


COMPILER DESIGN – COMPILERS - PHASES

COMPILER DESIGN – COMPILERS INTRODUCTION


COMPILER DESIGN – COMPILERS INTRODUCTION

SOFTWARE QUALITY MANAGEMENT - SOFTWARE CONFIGURATION MANAGEMENT


SOFTWARE QUALITY MANAGEMENT - SOFTWARE CONFIGURATION MANAGEMENT

SOFTWARE QUALITY MANAGEMENT - RISK MANAGEMENT


SOFTWARE QUALITY MANAGEMENT - RISK MANAGEMENT

SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY METRICS


SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY METRICS

SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY ASSURANCE


SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY ASSURANCE

SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING-10


SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING (Part-10)

SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING - 9


SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING (Part-9)

SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE-2


SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE-P5

SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE


SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE

SOFTWARE ENGINEERING – DEFINITIONS AND NOTATIONS


SOFTWARE ENGINEERING – DEFINITIONS AND NOTATIONS

SOFTWARE ENGINEERING - INTRODUCTION


SOFTWARE ENGINEERING - INTRODUCTION