6th Sem All Sub Pyq

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Roll No. ...

Exam Code : M-23

Subject Code-13095
B. Tech. (CSE/IT) EXAMINATION
(Batch 2018 Onwards)
(Sixth Semester)
PYTHON PROGRAMMING

PCC-IT-308-T/PCC-CSE302-T
Time :3 Hours Maximum Marks : 70

Note : Atempt Five questions in all, selecting one


question from each Unit. 0. No. 1 is
compulsory. All questions carry equal marks.
1. (a) Differentiate between global and local
variables.
(b) Rewrite the following code in python
after removing all syntax error(s).
Underline each correction done in the
code :
(5-16-8-0523) J-13095 P.T.0.
30 = To 3. (a) Write Python Program to reverse
for K in range(0.To) number and also find the Sum of digits
if k% 4 = 0 : in the reversed number. Prompt the user

print (K*4) for input.


(b) Discuss the difference between local and
Else
global variable.
Print (K + 3)
(c) What is len function and explain how it Unit II

is used on strings with an example.


4. (a) What is the purpose of else clause for a
(d) What are the advantages of tuple over loop ? Explain how else works with while
list ?
and for loops with examples.
(e) What is chained conditional statement ? (b) What is a list in Python ? How to create
(f) Explain the use of Try-expect-else clause. nested lists ? Demonstrate how to create
(g) What are used-defined exceptions ? and print a 3-imensional matrix with
lists.
Unit I
5. (a) What is lamda function ? What are the
2. (a) Explain command line arguments and characteristics of a lambda function ?
write a program to demonstrate command Give an example.
line arguments. (b) Write a python program to calculate
(b) What is Python ? Describe its features factorial of given number using recursive
and applications. function.

J-13095 2 (5-16-9-0523) J-13095 3 P.T.0.


Unit III

6. Demonstrate implementation of hierarchical


inheritance in Python with a program.
7. (a) What happens if except clause is written
without any Exception type ? Explain
with an example.
(b) Discuss super) function using python.

Unit IV

8. What is dataframe in Pandas ? Discuss


significant features of the pandas library. Define
the different ways a dataframe can be created
in pandas.

9. (a) How to convert a numpy array to a


dataframe of given shape ?
(b) Write short notes on the following :
(i) DML
(ii) DDL operation with databases.

J-13095 4 100
2000 o|oo03
Roll No. ....esoeeoe0do0e Exam Code : M-23

Subject Code-13086
B.Tech. (CSE/IT) EXAMINATION

(Batch 2016 Onwards)


(Sixth Semester)
NETWORK ADMINISTRATION AND
MANAGEMENT

IT-308-LIOE-CSE-392L/PCC-IT-305-TPEC
CSB411-T

(Common with Open Elective for 2016-2017


batch students of other Departments)

Time :3 Hours Maximum Marks:70

Note : Attempt Five questions in all, seleçting one


question from each Unit. Q. No. 1 is
compulsory. All questionscarry equal marks.

(3-45-16-0323) J-13086 PT.O.


1. Short Answer Type Qucstions : 2x7=14 Unit II
(a) Define RARP.
4. (a) Explain the process of setting up an
(b) What is the minimum number of
internal NTP server.
partitions that need to install Linux ?
(c) What is meant by process ID number ? (b) List out all the steps used in hosting the
(d) How do you create a new user account ? HTTP website on the apache server.
7x2=14
(e) What are the two major versions of
GBUB available today ? 5. (a) What are system calls used for process
() Define routing algorithm. managerment in Linux ?
(g) What are the main tasks of LILO ? (b) Define resource sharing. How resources
are shared on networks ? 7x2=14
Unit I

2. (a) What is DNS ? How to configure a DNS Unit III

server on Windows 10 ?
6. (a) Describe all network management
(b) Explain the configuration process for the functions in detail.
Web Server. 7x2=14
(b) Explain thestandard SNMP model in
3. (a) Write the steps used for Proxy Server detail. 7x2=14
Configuration.
7. (a) What is the network management model ?
(b) What is troubleshooting ? Explain the
Explain each one in detail.
following TCP/IP troubleshooting
commands. 7x2=14
(b) Compare and contrast organizational and
informational models. 7×2=14
L13086 2 (3-45-17-0523) J-13086 3 PT.0.
Unit IV

8. (a) What is RMON ? Explain RMONI


statistic collection in detail.
(b) How is the Internet traffic managed by
using RMON ? 7x2=14

9. (a) Write a brief note on test and monitoring


tools.
(b) Compare and contrast web-based
enterprise management tools. 7x2=14

J-13086 4 100
(5-16-10-0523)
J-13093 1. Note: Hours
Time:3
..boo6|o003RolNol .
(iv) LALR(ii)Parsing Describe
buffering
(i) Inputi)
B.
question
compulsory. Tech.
Machine PCC-IT-306-T/PCC-CSE-401-T
Attempt
Subject
the COMPILER
DESIGN Onwards)
(Batch
2018
following from Five Semester)
(Sixth (CSEIIT)
depended All
questions Code-13093
questions each
: EXAMINATION
code Unit. Maximum
:70
in Marks
carry all, Exam
Q.
equal selecting Code
No.
PT.0. marks. M-23 :
1 one
14 is
J-13093 4. 3.
(a) (b) (a) (b) (a) (vi) SDT(v)
ABC ’S
Consider tObtain
he following Construct tools.Explainvarious What Role
following (a do of
regular | various phases you parsers.
the b)
regular a
Unit II minimal mean Unit I
following finite *
2 expression(ab)*b | of
expression compiler
compiler. by
automata state Compiler
grammar |
equivalent at DFAconstruction
(bb)* :
?
for Explain
14 to the 14

(5-16-11-0523)
J-13093 6. 5.
(a) B’E. EA S
’construct Test (b)
S the
4’B aS’A Construct ’ whether Eliminate B A
AaAb )grammar.
(ii) Describe C
following ’
’ ’ ’
XAy parsing
a Operator reduce
,Shift
Bb Aa
predictive the
BaBa Cc|
an UnitIII the left
XByXAz grammar f e |d
grammarSLR(1) precedence following recursion
3
parsing
is
parsing
: LL
table (1) : from
parsing.
table for or the
PT.0.
not
it above
for 14 : and
J-13093
8. 7.
(b) (a) (b) (a) (b)
thesegenerated table.
the Explainsymbol the What implemented How code
Triple generation
following What C CC LR
’S Check
compiler. various ’
errors ? is is Xgeneration (1)
syntax do cC whether
the = and or
during the data UnitIV (A
statements you
use Indirect ? b.| not
How ?
4
various structures of directed + Explain mean
?the
Explain B)*(C -
does the symbol schemes.
triple by following
various translation into various
we types
associated table withrepresentation intermediate
D)/E.
recover the
example. Convert
intermediate
phases of ? Quadruple, grammar
Explain scheme
from errors with
code
14 of 14 the 14
: is

J-13093 (a)9.
(b)
do
optimization
optimization Whatyouidentify by What
the
do
out term
you
? e
thleader
?
5 Explain What mean
basic
mean
?
blocks.Write do by
with
peepholeby you the
example. algorithm understand term

100 code
14 to
(3-26-12-0523)
J-13094 1. Attempt
Note : Time RolNo.l
(b) (a) INFORMATION
: EXAMINATION
(CSE/IT)
B.Tech.
3
DES. in questions question Hours ..OAOAS0003
Write Define swer
(Compulsory
Question) Onwards)
(Batch
2018
Code-13094
Subject
down threat type from Five (Sixth
carry PCC-IT-307-T Semester)
questions questions AND
the each
and equal
purpose Unit. CYBER
attack.
marks. is Marks:70
Maximum
in
Q. all, Code:
Exam
M-23
of compulsory. No. SECURITY
the selecting
1
S-Boxes of
P.T.0. short one
All
J-13094 3. 2.

(a) (b) (a) (g) () (e) (d) (c)


(b)
Discuss.
attack ? in Write block With it?What
steganography What What What What
algorithm In Explain
what detail.
a neat is is do is
cipher the is
way AES short cyber a you a
prone ilustrations phishing logic
Diffie Unit I
encryption note modes law and mean
2 bomb
to difference
exchange
Hellmankey on and
cryptography attack by
man of
Digital explain why internet ?
operation.
in and ?
the the do
decryption Signatures. we between fraud
various 7x2=14 ?
middle
need
6 8 4 10 ?

(3-26-13-0523)
J-13094 6. 5. 4.
(a) (b) (a) (b) (a)
cybercrime
example andof authentication.
each.for Explain the WhatModel.
Biba
(iii) (ii)Lattice
Modelmodels
() Explainintegrity program.
Discussvulnerabilities
What the Give What

Bell-LaPadula
Model
advantage form is is Some is
in inthreats themeant
different
detailthe UnitIII meant
authentication brief most Unit II
that
3 to
the common
by examples by
provide of Database Database affect
following program
using ? the
at Write security
categories Security. codeof
Security security security
least
P.T.O.
security
form down
one and
8 5 7 of
7 ? ?
J-13094 (a)8. 7.
(b) (b) (a) (b)
security. amendments
cyberthreats
of Discuss also. IT
What hacker.Steganography.
the What (ii) (ii) () Write property What
Act, roles
is is Virus Key short
for the the do
andEthical in
2000 ÜnitIV
organizations most objective responsibilities
andloggers notes cyberspace you
4 Hacking Worms
common ? on mean
and
Discuss and the
Spywares ?
in scope ? Discuss by
types Briefly following
the of
its an intellectual
context
of
of ethicaldiscuss in
majorIndian brief.
web :
6 8 5 6

9.
26-14-0523)
J-13094
(b) (a)

Whatcontext
punishment cyber is socialDiscussthe What

computing do
of you
under cyber
challenges mean
5
Indian security. for
terrorismand by
organizations social
IT associated
with
Act, computing
2000 in
100 its the
5 ? 9 ?
(6-2-3-0523)
J-13101 1. Note Hours
Time:3 HIGH
(CSE/IT)
Tech.No....b003
B. Roll
B-ISDN
(c) Ethernet
(b) (a)Define
:
Traffic ofother Q. SPEED
the the No.
(Compulsory
Question) four Onwards)
(Batch
2018
Code-13
Subject101
following remaining
management questions 1 NETWORKSSemester)
(Sixth
is PEC-IT-305-T
compulsory
: four EXAMINATION 2023
selecting
in Units. Maximum
Marks
:70
TECHNOLOGIES
ATM and Exam
one
attemptany Code
2x7-14
from
P.T.0.
each M-23 :
J-13101 Writethe 6. 5. 4. Discuss 3. 2.
architechure.
protocol
layered diagram.
suitable
Describe ISDN Draw protocol
layered
applications.
its Define
Ethernet IPvóg)UDP()GSM(eCDMA
) (d)
services.
andits and
detail ATM. fibre protocol
Gigabit
explain
channel
description Unit Discuss
Unit II
architecture. architecture Unit I
2
Ethernet.
III protocol with
the
about topologies
ATM
architectureof and
Explain
IEEE
cell also
and
802.16. with explain
ports, 10GB
14, 14 14 14 14
a

(6-2-4-0523)
J-13101
9. 8. 7
format
Describe
architecture. Draw down Draw

of and functionality IEEE


DNS about
explain 802.15
record DNS UnitIV
3 of
and the protocol
and each
e-Mail. TCP
messages. layer. stack
protocols
Explain
and
100 write
14 the 14and 14

You might also like