STUDENT HANDBOOK - MLRIT

240
III-B.Tech STUDENT HANDBOOK A.Y.2017-18/I SEM Department of CSE MARRI LAXMAN REDDY INSTITUTIONS MLR Institute of Technology Dundigal (V), Quthbullapur (M), R.R Dist, Hyderabad – 500043, A.P www.mlrinstitutions.ac.in

Transcript of STUDENT HANDBOOK - MLRIT

III-B.TechSTUDENT HANDBOOK

A.Y.2017-18/I SEM

Department of CSE

MARRI LAXMAN REDDY INSTITUTIONS

MLR Institute of TechnologyDundigal (V), Quthbullapur (M), R.R Dist,

Hyderabad – 500043, A.Pwww.mlrinstitutions.ac.in

VISION STATEMENT

VISION STATEMENT OF MLRIT

To create and nurture competent Engineers and managers who would be enterprise leaders in all parts of the world with aims of reaching the skies and touching the stars and yet feet firmly planted on the ground – good human beings steeped in ethical and moral values.

MISSION STATEMENT

MISSION STATEMENT OF MLRIT

MLR Institute of Technology is committed to providing a positive, professional and conducive learning environment where all students are inspired to achieve their potential and strive for excellence in a global society as dignified professionals with the cooperation of all stakeholders.

GOALSOF MLRIT

GOALS OF MLRIT

Goals of Engineering education at undergraduate / graduate level:

Equip students with industry – accepted career and life skills

To create a knowledge warehouse for students

To disseminate information on skills and competencies that are in use and in demand by the industry

To create learning environment where the campus culture acts as a catalyst to student fraternity to understand their core competencies, enhance their competencies and improve their career prospects.

To provide base for lifelong learning and professional development in support of evolving career objectives, which include being informed, effective, and responsible participants within the engineering profession and in society.

To prepare students for graduate study in Engineering and Technology.

To prepare graduates to engineering practice by learining from professional engineering assignments.

Our Pioneers…

MARRI LAXMAN REDDY – CHAIRMANSri Marri Laxman Reddy, the founder Chairman of MLR Institutions has been in the field of education for the last 22 years with the aim of spreading quality education among children at the school & college levels. MLR Institute of Technology is the culmination of his dreams. He is also founder chairman of Marri Laxman Reddy Institute of Technology & Management, MLR Institute of Pharmacy, St. Martin’s Engineering College and St. Martins Schools at Balanagar, Chintal and Malkajgiri. He is a veteran athlete of international repute.

MARRI RAJASEKHAR REDDY – SECRETARYSri Marri Rajashekar Reddy, the Secretary of MLR Institutions has the distinction of establishing the Institute of Aeronautical Engineering, MLR Institute of Technology, MLR Institute of Pharmacy, Vardhaman Engineering College, Vidyanjali Grammar School at L.B.Nagar and Institute of Aircraft Maintenance Engineering, approved by DGCA. He is also Treasurer of Indo-US Collaboration for Engineering Education of A.P. Chapter.Mr. M. Rajasekhar Reddy, a person with remarkable abilities and great acumen and a dynamic leader. He is known to be the dynamic mentor of

MLR Institute of Technology who is always on the sprit to take the institute to newer levels in every aspect of an \"Ideal Institution\" and strives hard to make every dream a reality.He likes his father Mr. M. Laxman Reddy, who has a credit of establishing Institute of Aeronautical Engineering adding a new flavor to St. Martins group of Institutions and Vidyanjali Grammar School. His ability to turn adversities into opportunities is unquestionable. The Secretary has a vision of establishing MLR Institute of Technology as a brand. He strives hard to initiate various industry oriented programs for the benefit of the students and he envisions his students to be present at the top most position in the industry

Dr. P. BHASKARA REDDY – DIRECTOR Dr. P. Bhaskara Reddy, B.E.(ECE), M.Tech., Ph.D., F.I.S.E.E., MCSI, MISTE, MIETE,MEMCE. the Director of MLR Institute of Technology, is a young and dynamic Professor of ECE, has 26 years of Industry,Teaching, Research and Administrative experience in Reputed Engineering Colleges.In 24 years of experience served various positions from Asst.Professor to Principal. Research & Guidance: Published 1 Book (International Edition) "Information Technology in Technical Education - Economic Development by "LAMBERT Academic Publishing" Publishied 9 Laboratry Manuals, 84 Research papers at National and International Level on Education, Electronics Communication, I.T, Computer Networks, E-Commerce etc. Guided 5 Reserach Scholars for their Doctorates, about 50 M.Tech., M.C.A and B.Tech projects. Symposiums Conducted: 11 National Level Technical Symposiums on various topics in Electronics & Communications, Computers etc.Awards Received: 1) Bharath Jyothi Award in 2003 from IIFS, New Delhi, 2) Rastraprathiba Award in 2004 from ICSEP, New Delhi, 3) Knowledge Award from Alumni of SVHCE for the year 2001.

TABLE OF CONTENTS

S.No. Content Page No.

1

1. General Information About the college 1.0.Beautiful campus 1.1.Autonomous status 1.2.Performance 1.3.Faculty 1.4.Infrastructure 1.5.Laboratories 1.6.CAT Centre 1.7.English Language Laboratory

2

1.8.R&D Cell 1.9.Library 1.10.National Programme on Technology Enhanced Learning (NPTEL) 1.11.Co-Curricular Activities 1.12.Professional bodies 1.13.Extra curricular activities

3 1.14.In House projects 1.15.MOUs

4 1.16.Student achievements 1.17.Alumni Outreach

5 1.18.Contact information

2. Placement and Higher Studies2.1.Industry Grade skills required for Employment2.2.Important criteria for employment 2.3.Higher Studies2.4.Various Scholarships available in India

6

2.5.Various International Scholarships available in India

7 3. Student Career Oriented Professional Certification Courses3.1 Help Desk4. Performance Monitoring and Guidance4.1. Student Feedback4.2.Class Teacher4.3.Class Representatives and their roles4.4. Performance Counseling8

4.5. Remedial Classes / Tutorial / Revisions4.6. Backlog Management4.7. Correspondence with Parents

5. Rules & Regulations for students5.1. Administrative 5.2. Academic5.3. Dress Code5.4. Discipline & Punctuality

5.5. Lab Classes5.6. Fee5.7. Transport5.8. Library Rules5.9. General

9

5.10. Ragging

10

6. Academic Regulations 2013 for B.Tech. Regular6.1. Award of B.Tech. Degree6.2. 6.3. Credits6.4. Distribution and Weightage of marks

6.5. Attendance Requirements11

6.6. Minimum Academic Requirements

12 7. Course Calendar for the Year 1-2

8. B.Tech. III Year Course Structure (R13) 3

13

9. PRINCIPLES OF PROGRAMMING LANGUAGES - A105649.0 COURSE DESCRIPTION 9.1. COURSE OVERVIEW9.2. PREREQUISITE(S):9.3. CMARKS DISTRIBUTION9.4. EVALUATION SCHEME COURSE OBJECTIVES9.5. COURSE OUTCOMES 9.6 HOW PROGRAM OUTCOMES ARE ASSESSED:9.7. SYLLABUS:9.8 COURSE PLAN:9.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES: 9.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF

PROGRAM OUTCOMES:9.11 OBJECTIVE QUESTIONS:9.12 TUTORIAL QUESTION BANK 9. 13 ASSIGNMENT QUESTIONS:

4-35

14

10. LINUX PROGRAMMING - A1052010.0 COURSE DESCRIPTION 10.1. COURSE OVERVIEW10.2. PREREQUISITE(S):10.3. MARKS DISTRIBUTION10.4. EVALUATION SCHEME COURSE OBJECTIVES10.5. COURSE OUTCOMES 10.6 HOW PROGRAM OUTCOMES ARE ASSESSED:10.7. SYLLABUS:10.8 COURSE PLAN:10.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES: 10.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES:10.11 OBJECTIVE QUESTIONS:10.12 TUTORIAL QUESTION BANK 10. 13 ASSIGNMENT QUESTIONS:

36-71

15 11. WEB TECHNOLOGIES - A1052111.0 COURSE DESCRIPTION 11.1. COURSE OVERVIEW11.2. PREREQUISITE(S):11.3. MARKS DISTRIBUTION11.4. EVALUATION SCHEME COURSE OBJECTIVES11.5. COURSE OUTCOMES 11.6 HOW PROGRAM OUTCOMES ARE ASSESSED:11.7. SYLLABUS:11.8 COURSE PLAN:11.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES: 11.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES:11.11 OBJECTIVE QUESTIONS:11.12 TUTORIAL QUESTION BANK 11. 13 ASSIGNMENT QUESTIONS:

72-102

16 12. COMPILER DESIGN - A1052212.0 COURSE DESCRIPTION 12.1. COURSE OVERVIEW12.2. PREREQUISITE(S):12.3. MARKS DISTRIBUTION12.4. EVALUATION SCHEME COURSE OBJECTIVES12.5. COURSE OUTCOMES 12.6 HOW PROGRAM OUTCOMES ARE ASSESSED:12.7. SYLLABUS:12.8 COURSE PLAN:12.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES: 12.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES:12.11 OBJECTIVE QUESTIONS:12.12 TUTORIAL QUESTION BANK 12. 13 ASSIGNMENT QUESTIONS:

103-146

17 13. E-COMMERCE - A1120613.0 COURSE DESCRIPTION 13.1. COURSE OVERVIEW13.2. PREREQUISITE(S):13.3. MARKS DISTRIBUTION13.4. EVALUATION SCHEME COURSE OBJECTIVES13.5. COURSE OUTCOMES 13.6 HOW PROGRAM OUTCOMES ARE ASSESSED:13.7. SYLLABUS:13.8 COURSE PLAN:13.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES: 13.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES:13.11 OBJECTIVE QUESTIONS:13.12 TUTORIAL QUESTION BANK 13. 13 ASSIGNMENT QUESTIONS:

147-179

18 14. COMPUTER NETWORKS - A1051914.0 COURSE DESCRIPTION 14.1. COURSE OVERVIEW14.2. PREREQUISITE(S):14.3. MARKS DISTRIBUTION14.4. EVALUATION SCHEME COURSE OBJECTIVES14.5. COURSE OUTCOMES 14.6 HOW PROGRAM OUTCOMES ARE ASSESSED:14.7. SYLLABUS:14.8 COURSE PLAN:14.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES: 14.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES:14.11 OBJECTIVE QUESTIONS:14.12 TUTORIAL QUESTION BANK 14. 13 ASSIGNMENT QUESTIONS:

180-208

15. LINUX PROGRAMMING LAB – A1052715.1.Syllabus

19

15.2.Lab Schedule209-210

16. WEB TECHNOLOGIES LAB - A1052616.1.Syllabus

20

16.2.Lab Schedule211-213

MLR Institute of TechnologyDundigal, Quthbullapur Mandal, R.R. Dist.- 500 043.

Ph: 08418 – 204066, 204088, 9866755166

1.GENERAL INFORMATION

ABOUT THE COLLEGE

1.0 BEAUTIFUL CAMPUS:Set in Sylvan surroundings away from the hustle & bustle of city life yet only 4 km away from Mahindra Satyam Technology Park on Balanagar – Narsapur state highway, the Institute is extremely conducive to academic, co-curricular and extra-curricular activities. It has large and well ventilated buildings with modern equipment in place and “State of the art”, sports facilities.

HIGHLIGHTS:

1.1 AUTONOMOUS STATUSMLR Institute of Technology is now an Autonomous Institution!!Under the UGC Autonomous College Scheme for a period of Six Years

1.2 PERFORMANCEThe college has been AA rated under colleges in AP by Careers360 magazine. Also, the college has been ranked at 126 by the week magazine in the Best colleges Survey-2013.

1.3 FACULTY: The College is proud to have the best faculty, a blend of experienced and academics with eminent academicians team IIT’s, NIT’s and other reputed organizations teaching at the Institute that makes MLRIT as one of the best Institute pursue B.Tech, M.Tech,MCA and MBA as one of the under JNTU Hyderabad. The faculty is constantly encouraged to upgrade their qualifications and a number of them have enrolled for Ph.D. Most of the faculty members have been empowered with High Impact teaching under Wipro Mission 10X program.

1.4 INFRASTRUCTURES: Spacious campus and natural surroundings with plenty of greenery College Transport facilities from twin cities for students and staff from all corners of the

city Air Conditioned auditorium for organizing events, workshops and seminars Good Canteen facility HDFC Bank ATM in the campus Fully equipped Laboratories with the state-of-art equipments

1.5 LABORATORIES: The Institute has State of the art laboratories with 1000 plus Branded Systems equipped with latest hardware and software with online testing facility catering to the needs of CSE, IT. The Institute also has well equipped Electronic Labs, Aeronautical Engineering Labs and Workshops for ECE and Aeronautical Engineering Students. The college has recently established Microsoft, IBM for CSE/IT cadence lab for VLSI design and CATIA Aeronautical Design Lab.

1.6 CAT Centre: The Institute is an Authorized IIM Cat Centre, which will conduct tests all through the year as per the IIM schedule.

1.7 ENGLISH LANGUAGE LABORATORY: The Institute has established Ultramodern Computerized English language Laboratory with 60 plus Computer Systems loaded with latest Software to enhance the Softskills of Students to make the Students Industry ready.The Library also have the previous University Exam Question papers and previous project reports from all the departments. The library contains recorded lectures of all IIT professors from NPTEL.

1.8 R&D Cell: The Institute has an R&D Cell under the Chairmanship of ?. The R&D cell undertakes externally funded R&D projects from agencies like AICTE, DST, UGC and other similar state, private and society / trust bodies. It also undertakes research publications and interactions of faculty members with outside world.

1.9 LIBRARY: The Institute Library has over 29000 books and 244 National and International journals and 15 Magazines that are required to all branches of Engineering. The Institute has the unique distinction of becoming Member of DELNET, Infotrac engineering online journals that connects more than 700 libraries in Asia Pacific Region. The Library has 35 Computers with 10 MB PS, Internet Facility that makes our knowledge Savvy Students to be technically competent on par with Industry professionals. NPTEL Videos and e-books, MIT courses also available.

1.10 National Programme on Technology Enhanced Learning (NPTEL)The main objective of NPTEL program is to enhance the quality of engineering education in the country by developing curriculum based video and web courses. This is being carried out by seven IITs and IISc Bangalore as a collaborative project. In the first phase of the project, supplementary content for 129 web courses in engineering / science and humanities have been developed. Each course contains materials that can be covered in depth in 60 or more lecture hours. In addition, 110 courses have been developed in video format, with each course comprising of approximately 60 or more one-hour lectures. In the next phase other premier institutions are also likely to participate in content creation.

1.11 Co-Curricular Activities: The Institution organizes Local Industrial Visits to Organizations like DOORDARSHAN, BSNL, and to Student Conferences like HYSEA,Student Conference at INFOSYS, Gachibowli Campus, and Government Sponsored Summits like INDO SOFT IT Summit at Hitex City Convention Centre to Interface with the Industry for Career Planning and to make them Industry Ready. The Institute focuses on Techno Management Events like Technonium and Zavtra to enhance the Technical Skills and Soft Skills to make them Employable.

1.12 Professional Bodies: MLR Institute of Technology has the unique distinction of becoming Institutional Member in Professional bodies such as Confederation of Indian Industry (CII), Aeronautical Society of India (AeSI), Computer Society of India (CSI), Institute of Electronics and Telecommunication Engineering (IETE), Indian Society of Technical Education (ISTE), ELIAP and Hyderabad Management Association.(HMA)

1.13 Extra-Curricular Activities: MLRIT has State of the art facilities like Olympic Style Basketball Court, Volleyball Court,

Gymnasium, Indoor Stadium, Cricket Stadium with Lush Green Outfields and 400 meter excellent track for Athletic meet. MLR Institute of Technology has been regularly conducting JNTU Zonal Games and Annual Open Invitational Volleyball, Football, Cricket Tournaments.

The Institute also organizes various Cultural Events like Traditional Day for freshers, “ZAVTRA” A National Level Technical Fest, TRISHNA - The Annual Day Celebrations, ECSTASY – A Cultural Nite by Vishal & Shekhar, Indian Idol Sri Ram, Farewell Party for final year students, Alumni Meet for Ex. Students and Graduation Day for graduated students every year to imbibe a spirit of Oneness.

NSS Activities:A Sense of social responsibility is inculcated in Young Minds by organizing Plantation Programmes, Health Awareness Camps, Blood Donation Camps, Flood Relief Camps, Distribution of Books to School Children under Digital Literacy Programme of Microsoft by MLRIT NSS Volunteers.

1.14 In House Projects:The students are taking part in International Project competitions hosted by major MNCs, like IBM, Microsoft and Infosys. The Great Mind Challenge hosted by IBM, Microsoft Imagine Cup and project work as part of foundation programme conducted under the aegis of Infosys are some of the important projects presently being undertaken by the students of MLRIT. Further, the students are encouraged to do In House Projects under the supervision of expect faculty members.In addition,students are encouraged to give innovative ideas and do projects under the aegis of Microsoft academic innovative alliance.

1.15 MOUs: BOEING Tech Mahindra Infotech Enterprises Ltd. IBM Oracle Sun Microsystems Infosys CA Labs Tata Advanced Systems Microsoft Globarena Wipro IUCEE

For giving special training programmes to engineering students and Faculty members of the institute

1.16 Student Achievements: Our College students got 2nd Place out of 2100 colleges in E-Plus Challenge 14 conducted

by The Hindu in Hyderabad in March 2014. MLR Institute of Technology students have been securing JNTUH ranks regularly right

from 1st batch itself, reflecting the core competencies of the faculty and dedicated efforts of the students.

Mr Venkata Rama Varma student of 3rd year Aero has participated and stood 3rd in National Aero-Modeling competition conducted by Boeing held during Techfest 2014 at IIT Madras.

Mr. Venkata Rama Varma student of 3rd year Aero has participated and stood 3rd in Avion-E and Hower Mania held during Techfest 2013 at NIT Warangal.

Mr Venkata Rama Varma and NAM Sai Teja students of 3rd year Aero have been selected for Boeing National Aeromodeling Competition which will be held at IIT Delhi next Month.

Mr. Venkata Rama Varma student of 3rd year Aero has participated and stood 1st in Aero-Modeling Competition held during Techfest 2013 at Christ University

Mr Venkata Rama Varma student of 3rd year Aero has participated and stood 3rd in Blitz Krieg Design Challenge held during Techfest 2013 at IIT BOMBAY.

Mr.Varma and team III-Aeronautical students got 2nd Prize in ICRAMAV-2013 organized by JNTUH for their MAV (Micro Aerial Vehicle).

Mr.Eshwer Reddy student of 4th year Aero has participated and stood 2nd Prize in Working Models competition organized by Rotary Club.

Three of 2nd Aero students got Rs. 5000/- cash prize in Design Competition organized Engineers CAD Centre Hyderabad

1.17 Alumni Outreach The Institute has Alumni Association under the name and Style of MLR Alumni Association

and conducted the First Alumni Meet on 14th Feb 2009 with the first batch 0f 2008 passed out MBA students attending the meet.

The Association has honoured the 2009 batch B.Tech, MCA along with MBA students by conducting the Second Alumni Meet at hotel Blue Fox on 13th March 2010 where more than 200 students participated in the Meet.

The Association conducted 3rd Alumni meet for 2010 batch B.Tech, MCA & MBA students on 16th April 2011 at our college Auditorium.

The Association conducted 4th Alumni meet for 2011 batch B.Tech, MCA & MBA students on 14th July 2012 at our college Auditorium.

The Association conducted 5th Alumni meet for 2012 batch B.Tech & MBA students on 11th May 2013 at our college Auditorium.

The Association conducted 6th Alumni meet for 2013 batch B.Tech, M.Tech & MBA students on 14th Feb 2015 at our college Auditorium.

1.18 Contact InformationPrincipal - Dr. P. Bhaskara Reddy - 9866678599

Dean (CS) - Prof. K. L. Chugh - 9866666601

Department Head CSE - Dr.N.Chandra Sekhar Reddy - 9618880606

Department Head IT - Dr.KVSN Rama Rao - 9848292046

Department Head ECE - Mr. S.V.S Prasad - 9440840483

Department Head AERO - Dr.M.Satyanarayana Gupta - 9848339384

Department Head MECH - Dr.S.Madhu - 9160404635

Department Head MBA - Mrs. Suneetha - 9160404639

Department Head H&S - Dr. V. Radhika Devi - 9848472797

Sr.Administrative Officer - Mr.Prabhakar Reddy - 9866675818

2. PLACEMENT & HIGHER STUDIES

MLR Institute of Technology has a unique distinction of placing their First Batch of B.Tech Students in their prefinal year of Study and MBA Students in Multi National Companies. The Institute has so far interacted with more than 69 Companies and 233 Selections from B.Tech/MCA and MBA Programmes have taken Place.

In this direction Apart from the Placements the Institute has arranged Summer Internship Programmes with Companies like Computer Amociates, Mind Tree M/s Infotech Enterprises Ltd, Mahindra Finance, Max New York Life Insurance, Nokia Ltd , Mahindra Finance, Bajaj Capital Ltd, Reliance Money and Tata AIG for Engineering and MBA Students to develop Mentor Relationships and to get to know about the Work Culture and gain Competencies to make them Industry Ready during their Study period.

The Institute has arranged Campus Recruitment drives Infosy, Mind Tree Ltd, Oracle, ADP, Mahindra Satyam, Infotech Enterprises Ltd, Keane India Ltd (NTT), IBM Technologies Pvt Ltd, Tata Advanced Systems, IBM, Syntel Inc, Tech-Synergy Pvt Ltd, Adithya Software Solutions, HDFC Bank Ltd, Medha Servo drives. NR Radio & Switches Pvt.Ltd. OsiTechnologies Ltd, Genpact, Reliance Money, Nagarjuna Caments Ltd & Oasis Software Informatics, Shoppers Shop, Trident Micro Systems India, SnapDeal.com, India Mart Ltd, Power Tech, Suchir India, Quartz Infra and Engineering Pvt Ltd, Gobrah Technologies Pvt Ltd, Elbit Diagnostics, Eprism Solutions, Geo Meme Strategic Consulting, India Info Line, Water Shed project of Govt of AP, Ocean Ship Maritime etc.

The CSE students visited Infosys Infosys for the SPARK Programme which is an orientation programme on Information Technology Space.

2.1 Industry Grade Skills required for EmploymentBehavioral and Communication Skills are recognized as important elements in professional development of an Engineer including English for specific purposes. Employers give considerable value to these diverse set of skills at the time of interviews.

In addition to course curriculum, every student will gain the following skills during the study period: Analytical and Problem solving skills Subject – specific knowledge Research and improved decision making abilities Oral communication skills Managerial skills Understanding of other cultures Confidence and competence to work in International environment

As students are the future leaders, the Responsibility, Accountability and exhibiting the leadership skills should start from the first year of engineering. Every student is advised to read / practice from the following books; Verbal and Nonverbal by RS Agarwal Baron GRE Wren and Martin English Grammer Book

2.2 Important criteria of EmploymentIn addition to the industry grade skills required for employment, the most important criteria for employment is that the student should get a minimum of 60% in academics with no backlogs to make them eligible for campus recruitments. In the recent past, many companies stipulated a cut

of 68% for attending the interview / writing the test. Every student should Endeavour to achieve a minimum of 68% with no backlogs to make them suitable for picking up by good companies.

Job Portals:1. www.freshersworld.com2. www.monster.com3. www.naukri.com

2.3 Higher StudiesM.TechThe Graduate Aptitude Test in Engineering (GATE) is an all-India examination administered and conducted in eight zones across the country by the GATE Committee comprising faculty from Indian Institute of Science, Bangalore and seven Indian Institutes of Technology on behalf of the National Coordinating Board - GATE, Department of Education, Ministry of Human Resources Development (MHRD), and Government of India.

Objective To identify meritorious and motivated candidates for admission to Post Graduate Programmes in

Engineering, Technology, Architecture and Pharmacy at the National level. To serve as benchmark for normalization of the Undergraduate Engineering Education in the country.

This provides an opportunity for advanced engineering education in India. An M.E or M.Tech degree is a desirable qualification for our young engineers seeking a rewarding professional career. Engineering students, while in the final year of their degree course, spend considerable time in seeking an opening for studies in foreign universities.The students are advised to pursue M.Tech in IIT’s/NIT’s/University Colleges.

MBAEarning a Master’s of Business Administration (MBA) degree can provide you with management skills and business expertise that open new career opportunities to you. An MBA program will also launch you into the much higher pay range that upper level managers and executives enjoy. Furthermore, in the high-level positions, an MBA degree will allow you to hold and your work will often be more interesting and rewarding.The students are advised to pursue M.BA in IIM’s/XLRI/Reputed Business Schools.

Higher Studies AbroadTOEFL is mandatory for seeking admission in any academic course at any level- undergraduate, graduate or post graduate, in USA and Canada. Similarly UK Universities ask for IELTS for seeking admission to graduate and past graduate courses.

GRE The Graduate Record Examination (GRE) is administered by the Educational Testing Services (ETS) for admission into all graduate academic programs (except management) in universities across USA and Canada and some selected universities across the world including India. The exam is a Computer Adaptive Test and is administered at any of the Sylvan testing centers in the country after prior registration.

The GMAT is a Computer Adaptive Test administered online by Educational Testing Services (ETS) through Sylvan testing centers located in all the major cities in India. Those who wish to enroll for courses in Business Management in American universities have to take the GMAT test and submit their scores to the department.

2.4 Various Scholarships Available In IndiaBharat Petroleum Scholarship For Higher Studies | Balarama Digest Scholarship | Central Institute of Indian Languages | Fair & Lovely Foundation - Project Saraswati Scholarships | Government Of India Office of the Director General of Civil Aviation Scholarship | Homi Bhabha Centre For Science Education Tata Institute of Fundamental Research Research Scholarships | HSBC Scholarships | Indian Council Of Agricultural Research Award Of National Talent Scholarship In Agriculture | Indian Institute Of Geomagnetism Research Scholars | Invention Awards For School Children | Indian Oil Corporation Ltd (IOCL) - Scholarships | Jawaharlal Nehru Memorial Fund Jawaharlal Nehru Scholarships For Doctoral Studies | Junior Research Scholarships For Cancer Biology Tata Memorial Centre & Tata Memorial Hospital | Jaigopal Garodia Vivekananda Trust Scholarships | Lalit Kala Akademi - Scholarship | Mahindra All India Talent Scholarships For Diploma courses In Polytechnics | National Brain Research Centre Scholarships | NTPC Scholarships | National Institute Of Science Communication And Information Resources(NISCAIR) | National Board For Higher Mathematics(NBHM) | National Thermal Power Corporation Ltd.Scholarships | National Olympiad Programme | National Level Science Talent Search Examination - 2005 | Narotam Sekhsaria Scholarship Programme | National Brain Research Centre Scholarships, Post Doctoral Fellowships | National Aptitude Test | NIIT National IT Aptitude Test | Oil And Natural Gas Corporation Ltd (ONGC) Scholarships To SC/ST Students | Office Of The Director General of Civil Aviation Scholarships Stipend to the SC/ST Candidates | Rashtriya Sanskrit Sansthan - Scholarships | Scholarships To Young Artistes | Saf-Madanjeet Singh Scholarship | Sports Authority Of India - Sports Scholarships | SAF-Madanjeet Singh Scholarship | Spic Macay Scholarships | The Childrens Foundation - Scholarships | The L&T Build-India Scholarship | The Hindu-Hitachi Scholarships | The Paul Foundation Scholarships | Technology Information Forecsting and Assessment Council(TIFAC) Women Scientist Scholarship Scheme | The Young Talent IT Scholarship The Dr.GB Scholarships Foundation |

2.5 Various International Scholarships Available In IndiaA * STAR India Youth Scholarship | A.M.M. Arunachalam-Lakshmi Achi Scholarship For Overseas Study | British Chevening Scholarships | Bharat Petroleum - Scholarships for Higher Studies | Cambridge Nehru Scholarships | Commonwealth Scholarship and Fellowship | Czech Government Scholarship | Chevening Technology Enterprise Scholarship Programme | Chinese Government Scholarship | Greek Government Scholarships | Israel Government Scholarship | Iranian Government Scholarship | Offer of Italian Government Scholarship | Japanese Government Scholarships | K.C.Mahindra Scholarships For Post-Graduate Studies Abroad | Lady Meherbai D.Tata Scholarships | Mexican Government Scholarship | Norwegian Government Scholarships | National Overseas Scholarships/Passage Grant for ST Candidates | Portuguese Government Scholarships | Sophia Merit Scholarships Inc | Slovak Government Scholarship | SIA Youth Scholarships | The Rhodes Scholarships India | The Ramakrishna Mission Institute Of Culture Award of Debesh-Kamal Scholarships For Studies Abroad | The Inlaks Foundation - Scholarships |

Website for Higher Studies:1. www.higherstudyabroad.org2. www.highereducationinindia.com

3. STUDENT CAREER ORIENTED PROFESSIONAL CERTIFICATION COURSES

As per the career plan for students of MLR Institute of Technology with a view to bridge the gap between Industry and Academia, it has been planned to equip every student with at least three International / National certification by the time he / she completes the course of study. The details of the certification courses are given below:

Branch Year Name of the Certification Course

2nd Year Certificate Information Technology

3rd Year IBM Certified DB2 Database Associate, Infosys Campus Connect

4th Year IBM Certified Rational Application Developer

Computer Science and Engineering / IT / MCA

4th Year SUN Certified Java Programmer

2nd Year Institute of Electronics and Telecommunication Engineering

3rd Year Motorola @ CAMPUSElectronics and

Communication Engineering

4th Year IBM Certified DB2 Database Associate

2nd Year Certificate in AutoCAD

3rd Year Certificate in HighPerMeshAeronautical Engineering

4th Year Certificate in CATIA

2nd Year Certificate in AutoCAD

3rd Year Certificate in HighPerMeshMechanical Engineering

4th Year Certificate in CATIA

3.1 Help DeskThe college has set up a Help Desk for Career Guidance and overseas education. The aim of the

Help Desk is to provide a flatform for the students to choose the Right Destination. The students can reach the Help Desk in person or through mail at email id [email protected]

4. PERFORMANCE MONITORING AND GUIDANCE

4.1 Student FeedbackIn case the students find it difficult to cope up / understand a particular subject, they areadvised to discuss it with

a. The Concerned Teacherb. The Class Teacherc. The Department Headd. The Principal

Students can use the suggestion boxes for communicating feedback. Students should mention their names so that they can be informed of the progress / more details / clarifications can be obtained.

4.2 Class TeacherEvery class is assigned a Class Teacher (a faculty member). Students can directly discuss their college related or personal problems related to studies with them. The Class Teachers are accessible to the students and they can talk to the Class Teacher or whenever they are free from class / lab work. Class Teacher will meet with the class representative on daily basis to discuss their day-to-day difficulties if any.

4.3 Class Representatives and their rolesTwo students from each class are selected as the Class Representatives from the department basing on their academic performance and discipline. Department Head makes the selections.

Responsibilities of the Class Representatives: Collection of MIS format from Class Teacher daily. Communicating the departmental / college directives & information to the

students. Collecting the feedback of difficulties faced by the students and communicating

Suggestions for improvements. Coordinating academic events and co-curricular activities. Encourage students to interact for better studies, sharing books and notes. Compilation and submission of MIS form to class teacher at the end of the period.

4.4 Performance CounselingMentors will evaluate the student individually for the following:

a. Less marks in internal examsb. Continuous absence (3 days) and shortage of attendancec. Not understanding the subjectd. Students from Telugu mediume. Assistance for back log subjects etc.f. Communication with parentsg. Provide help to back log students

4.5 Remedial Classes / Tutorial / RevisionsRemedial Classes are conducted for students who are weak and who do not perform well in their internal examinations / class tests or for the students who want extra help. Slots in the time table

have been reserved for Tutorial where in the students are helped to solve the question in the class itself.

4.6 Backlog ManagementThe Mentors maintain a complete record of Examination results of each student and they counsel and guide them in preparing for backlogs. Students are provided with material and important questions are discussed.

4.7 Correspondence with parentsParents will be informed about the performance of their ward from time to time in the semester. However, parents are requested to be in touch with the Student mentor / Department Head on a regular basis. Further, parents are sent sms on daily bases if their wards do not attend the college.

5. RULES AND REGULATIONS FOR STUDENTS

5.1 Administrative:1. Students, admitted into this College, are deemed to have agreed to the rules and

regulations of the college, as laid down by the College Authorities from time to time, and the rules lay down in this leaflet, issued at the time of admission.

2. Students should inform any changes in the addresses/Phone No. of their parents / guardians to the college office.

3. The college shall communicate to the parents \ guardians of the students from time to time regarding the regularity and performance in the examinations of their wards. The case of serious indiscipline on the part of the students (s) may also be communicated to parent (s) \ guardian (s).

5.2. Academic:1. Students should attend the classes in - time. Late- comers shall not be permitted to enter

the class room and they are likely to loose the attendance.2. Students are expected to be regular to the classes. The students Shall not absent

themselves for classes without prior approval. Prior permission shall be taken from concerned counselor and submitted to the Head of the Department.

3. In case of ill-health, the student should submit the medical certificate along with prescription, etc., from a registered medical doctor. The student should get the medical certificate within two days from the date of reporting to the college after iII health and also produce a letter from Father/ Mother regarding ill-health. Permission on medical grounds shall not be granted for one or two days.

4. The students should come to the laboratories with the prescribed uniform.5. If a student disturbs the class or makes mischief, he / she will be marked absent and

may be expelled from the class.6. Students shall spend their leisure time in the library/computer center.7. Students are expected to put up the minimum aggregate percentage of attendance

(75%) as laid down by the JNT University. Students, falling short of 75% of attendance shall not be promoted to the next Semester \ Class.

8. Parents \ guardians of the students can contact the college authorities either in person or by post regarding discipline, regularity in attending classes, performance in the examinations, etc., of their wards.

5.3 Dress Code:1. Students are expected to attend the college properly dressed. They should wear the

prescribed uniform while attending laboratory classes.2. Students are expected to carry the identity cards, issued by the college, in the campus.

They are required to show the identity cards at the library, computer center, office, etc. Students without Identity Cards are not allowed in to the laboratory classes.

5.4 Discipline & Punctuality:1. No student shall enter or leave the class room without the permission of the teacher.2. Calling students out of their class rooms while the lecture is in progress is prohibited.3. Students are required to help in keeping the rooms, buildings, and premises clean and tidy.

Writing or sticking up of posters and notices on the walls is strictly prohibited.4. Smoking, Consumption of alcohol, intoxicating drinks or drugs is strictly prohibited in and

around the college premises. Those indulging in such activities will be put severely or expelled.

5. Students are expected to behave well with the staff, other students and the general public. Any misbehavior, coming to the notice of the college authorities, will be severely dealt with.

6. The conduct of the students should be exemplary not only within the premises of the college but also outside. This will help in maintaining the image and status of the college.

7. Students are required to observe silence at all times in the college campus. They shall not talk in loud tone or call each other by shouting.

8. Students are prohibited from loitering in the verandahs / campus during class hours, and sitting on the steps, stair-cases or parapet walls.

9. Students are not permitted to resort to strikes and demonstrations within the campus.Participation in such activity entails their dismissal from the college. Any problem they face may be represented to the Counselor / Head of the Department / Principal.

10. Students are prohibited carrying Cell Phones and organizing any meeting or entertainment in the college campus without the permission of the college authorities.

11. The entry of outsiders without permission is prohibited. Any student found responsible for bringing outsiders into the campus for settling personal disputes with other students, shall be expelled from the college.

12. The college is entitled to take any disciplinary action, which is deemed necessary in the case of any indiscipline on the part of the students. The same will be reflected on the Conduct Certificate issued at the time of leaving the college.

13. No Student Unions, except Professional Associations, are permitted in the college.14. If the students cause any damage to the college property knowingly or unknowingly

individually or in a group they have to pay 5 times to cost of property damaged them. All the students are collectively responsible for the proper maintenance college property i.e. building, furniture, lab equipment, garden, playgrounds, etc., recovery, calculated on semester to semester basis, will be collected along with examination fee for the semester.

15. Students should keep their vehicles only at the parking place allotted for the purpose. Vehicle riding in the campus is strictly prohibited.

16. Sitting on the parapet wall and Riding beyond the parking limits, the fine will be imposed to Rs.100.00

17. Breakage or loss of equipment /property as decided by the appropriate authority18. The Principal/Director may, on the recommendation of the Head of the Department, or

otherwise, inflict the following punishments in the interests of the student discipline and the Institution: fined, curtailment attendance, denial of promotion to next semester, suspension, expulsion or such other action as deemed necessary for the maintenance of discipline in the campus.

5.5. Lab Classes:All students must attend lab classes without fail. Those absent shall follow this procedure laid down in the prescribed format explaining valid reasons and obtain permission to attend the future classes.

5.6 Fee:1. All students admitted into this college, will be required to pay the prescribed tuition fee and

other specified fees. Failure of the same will result in the cancellation of admission. No portion of fees will be refunded under any circumstances. If any student wishes to change the college or discontinue the course at any point for any reason, he \ she shall not be permitted to do so unless he \ she pays balance amount of four years fees which he \ she would have to pay, if he \she continued till the completion of the course. His \ Her original certificates including I.e., etc., will be issued only after all the dues as stated above, are cleared by the students. All senior students must pay the college fee every year on or before the 15th of July irrespective of the reopening of the college. If they fail the fine will be imposed as per norms of the management.

2. Miscellaneous fee paid for expenditure related to training programs i.e., technical or soft skills

11

etc., is not refundable.3. Other than the above, if any fees are levied by the University the student has to be pay the

same.

5.7. Transport:All students who are availing the college bus facility must carry the bus-pass and must produce when demanded, failing which they will not allowed to travel in the bus. All students must travel in the allotted bus and routes. They should not change but occupy only their allotted seats throughout. Unauthorized students caught in the bus for not having the bus pass, should pay even if they traveled for one day also. First and second year are not allowed to bring two-wheelers.

5.8. Library Rules1. Library Books will be issued for 15 days time and renewal depends upon the demand of the

book.2. Silence should be strictly maintained in the library.3. Students are responsible for the library borrower card issued to them. Loss of the library card

should be reported in writing to the circulation section immediately. Duplicate library borrower card will be issued on payment of Rs.150/- after a week time from the date of application for duplicate cards.

4. The Library borrower card is not transferable.5. Library books must be returned on or before the due date. Any student failed to do so,

1st week –Rs.1/-per day/per book, 2nd week – Rs.2/-per day/per book and 3rd week –Rs.3/-per day/per book penalty will be imposed From 4th week-Rs.5/-per day/per book penalty will be imposed.

6. Students shall not make any sort of conversation in any part of the library, causing inconvenience to others.

7. Students shall not bring their belongings inside the library and should keep them outside the library.

8. Students leaving from the library should be checked at the exit.9. Tearing of pages/stealing of books will invite suspension from using of the library facilities and

further disciplinary action will be taken against such students, as per college norms.10. The borrower shall replace the New book within 7 days, otherwise, he/she has to pay 3

times of the book cost, along with fine. In case of lose of book.

5.9. General:1. All the students admitted in this college have to give an undertaking to abide by the rules

and regulations of this college in prescribed format given by the college.2. All the students should attend the college after vacations (Dasara / Sankranthi / Christmas /

Semester term / summer) on the re-opening day without fail. 3. Students must deposit all the relevant original certificates and documents at the time of

the admission Office and they will not be returned until completion of the course.4. Admission of any student can be cancelled by the Management at any point during the course

for reasons which are not in consonance with the rules and regulations and which are detrin the reputation of the college.

5. All the Students are here by informed that college authorities will not take any responsibility for loss or theft of your valuable items and money kept in your bags or some where else. Hence I request all the students are not to keep your valuables in class room or anywhere without your presence.

6. Fee For Issue Of Duplicatesa) Duplicate Hall ticket Rs. 100.00

b) Duplicate Identity Card Rs. 100.00c) Duplicate College Bus Pass Rs. 50.00d) Duplicate Study Certificate for same purpose Rs. 50.00e) Xerox copies of OD’s Rs. 50.00

All Breakage etc., penalties will be displayed on the Notice Board, and must be paid by the student and no student will be allowed to write examination or internal test or laboratory test, if penalties are not paid by the due date specified in the notice or circular.

5.10. RaggingRagging in any form inside or outside the college campus is banned/Prohibited vide Ragging Act 26 of AP. legislative Assembly 1997. Those who indulge in this uncivilized activity are liable for severe disciplinary actions besides being liable for prosecution.

SALIENT FEATURES

Ragging means doing an act which causes or is likely to cause insult 'or annoyance or fear or apprehension or threat or intimidation or outrage of modesty or injury to a student.

S. No. Nature of Ragging Punishment

1 Teasing, Embarrassing and Humiliating Imprisonment Upto 6 Month or Fine Upto Rs 1000/- or Both.

2 Assaulting or using criminal Force or criminal intimidation

Imprisonment Upto 1 Year or Fine Upto Rs 2000/- or Both.

3 Wrongfully restraining or Confining or causing hurt

Imprisonment Upto 2 Years or Fine Upto Rs 5000/- or Both.

4 Causing grievous hurt kidnapping Or raping or committing unnatural offence

Imprisonment Upto 5 Years or Fine Upto Rs 10000/- or Both

5 Causing death or abating Suicide Imprisonment Upto 10 Years or fine Upto Rs. 50000/- or Both

Note:1. A student convicted of any of the above offences, will be, dismissed from the college2. A student imprisoned for more than six months for any of the above offences 'will not be

admitted in any other College.3. A student against whom there is prima facie evidence of ragging in any form will be

suspended from the college immediately.

Prohibition of Ragging1. Ragging is prohibited as per act 26 of AP. Legislative assembly, 1997.2. Ragging entails heavy fines and/or imprisonment.3. Ragging invokes suspension and dismissal from the college.

4. Outsiders are prohibited from entering the college premises without permission.

5. All students must carry their identity cards and show them when Demanded.6. The principal and staff will visit and inspect the rooms at any time.7. Suspended students are debarred from entering the campus except when required to attend

enquiry and to submit an explanation .

6. ACADEMIC REGULATIONS R13 FOR B.TECH. (REGULAR)Applicable for the students of B.Tech. (Regular) from the Academic year 2013-14 and onwards

6.1. Award of B.Tech. DegreeA Student will be declared eligible for the award of the B.Tech. Degree if he fulfills the following academic regulations:

i) Pursued a course of study for not less than four academic years and not more than eight academic years.

ii) Register for 224 credits and secure 216 credits.6.2. Students, who fail to fulfill all the academic requirements for the award of the degree within

eight academic years from the year of their admission, shall forfeit their seat in B.Tech Course.

6.3. Credits

I Year Semester

Periods / Week Credits Periods /

Week Credits

03+1/03 06 04 04Theory

02 04 --- ---

Practical 03 04 03 02

Drawing 02T/03D 06 0306

0204

Mini Project --- ---- --- 02

Comprehensive Viva Voce --- -- --- 02

Seminar --- --- 6 02

Project --- --- 15 10

6.4. Distribution and Weight age of Marksi. The performance of a student in each semester / I year shall be evaluated subject –

wise with a maximum of 100 marks for theory and 75 marks for practical subject. In addition, Industry oriented mini-project, seminar and project work shall be evaluated for 50,50 and 200 marks respectively.

ii. For theory subjects the distribution shall be 25 marks for Internal Evaluation and 75 marks for the End-Examination.

iii. For theory subjects, during the semester there shall be 2 midterm examinations. Each mid term examination consists of objective paper for 10 marks and subjective paper for 15 marks with a duration of 1 hour 50 minutes (20 minutes for objective and 90 minutes for subjective paper).

iv. For practical subjects there shall be a continuous evaluation during the semester for 25 sessional marks and 50 end examination marks. Out of the 25 marks for internal, day-to-day work in the laboratory shall be evaluated for 15 marks and internal examination for practical shall be evaluated for 10 marks conducted by the concerned laboratory teacher. The end examination shall be conducted with external examiner and laboratory teacher. The external examiner shall be appointed from the cluster of colleges as decided by the University examination branch.

v. For the subject having design and / or drawing, (such as Engineering Graphics, Engineering Drawing, Machine Drawing) and estimation, the distribution shall be 25 marks for internal evaluation (15 marks for day-to-day work and 10 marks for internal tests) and 75 marks for end examination. There shall be two internal tests in a Semester and the better of the two shall be considered for the award of marks for internal tests. However in the I year class, there shall be three tests and the average of best two will be taken into consideration.

vi. There shall be an industry-oriented mini-project, in collaboration with an industry of their specialization, to be taken up during the vacation after III year II semester examination. However, the mini project and its report shall be evaluated with the project shall be submitted in report form and should be presented before the committee, which shall be evaluated for 50 marks. The committee consists of an external examiner, head of the department, the supervisor of mini project and a senior faculty member of the department. There shall be no internal marks for industry oriented mini project.

vii. There shall be a seminar presentation in IV year II semester. For the seminar, the student shall collect the information on a specialized topic and prepare a technical report, showing his understanding over the topic, and submit to the department, which shall be evaluated by the Departmental committee consisting of Head of the department, seminar supervisor and a senior faculty member. The seminar report shall be evaluated for 50 marks. There shall be no external examination for seminar.

viii. There shall be a comprehensive Viva-Voce in IV year II semester. The Comprehensive Viva-Voce will be conducted by a Committee consisting of (i) Head of the Department (ii) two Senior Faculty members of the Department. The comprehensive Viva-Voce is aimed to assess the students’ understanding in various subjects he/she studied during the B.Tech course of study. The comprehensive Viva-Voce is evaluated for 100 marks by the Committee. There are no internal marks for the comprehensive viva-voce.

ix. Out of a total of 200 marks for the project work, 50 marks shall be for Internal Evaluation and 150 marks for the End Semester Examination. The End semester Examination (viva-voce) shall be conducted by the same committee appointed for industry oriented mini project. In addition the project supervisor shall also be included in the committee. The topics for industry oriented mini project, seminar and project work shall be conducted at the end of the IV year. The Internal Evaluation shall be on the basis of two seminars given by each student on the topic of his project.

x. Laboratory marks and the sessional marks awarded by the college are not final. They are subject to scrutiny and scaling by the University wherever necessary. In such cases, the sessional and laboratory marks awarded by the College will be referred to a Committee. The Committee will arrive at a scaling factor and the marks will be scaled as per the scaling factor. The recommendations of the Committee are final and binding. The laboratory records and internal test papers shall be preserved in the respective institutions as per the University norms and shall be produced to the Committees of the University as and when the same is asked for.

6.5. Attendance Requirements:i. A student shall be eligible to appear for University examinations if he acquires a minimum

of 75% of attendance in aggregate of all the subjects.ii. Shortage of Attendance below 65% in aggregate shall in NO case be condoned.iii. Condonation of shortage of attendance in aggregate up to 10% (65% and above and below

75%) in each semester or I year may be granted by the College Academic Committee.iv. A student will not be promoted to the next semester unless he satisfies the attendance

requirement of the present semester / I year, as applicable. They may seek re-admission for that semester / I year when offered next.

v. Students whose shortage of attendance is not condoned in any semester / I year are not eligible to take their end examination of that class and their registration shall stand cancelled.

vi. A stipulated fee shall be payable towards condonation of shortage of attendance.

6.6. Minimum Academic Requirements:The following academic requirements have to be satisfied in addition to the attendance requirements mentioned in item no.6i. A student shall be deemed to have satisfied the minimum academic requirements and

earned the credits allotted to each theory or practical design or drawing subject or project if he secures not less than 35% of marks in the end examination and a minimum of 40% of marks in the sum total of the internal evaluation and end examination taken together.

ii. A student shall be promoted from II to III year only if he fulfills the academic requirement of 37 credits from one regular and one supplementary examinations of I year, and one regular examination of II year I semester irrespective of whether the candidate takes the examination or not.

iii. A student shall be promoted from third year to fourth year only if he fulfills the academic requirements of total 62 credits from the following examinations, whether the candidate takes the examinations or not.a) Two regular and two supplementary examinations of I year.b) Two regular and one supplementary examinations of I semester.c) One regular and one supplementary examinations of II year II semester.d) One regular examination of III year I Semester.

iv. A student shall register and put up minimum attendance in all 200 credits and earn the 200 credits. Marks obtained in all 200 credits shall be considered for the calculation of percentage of marks.

v. Students who fail to earn 200 credits as indicated in the course structure within eight academic years from the year of their admission shall forfeit their seat in B.Tech course and their admission shall stand cancelled.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 2

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 3

8. III YEAR CSE COURSE STRUCTURE

CODE SUBJECT L T/P/D C

A50564 PRINCIPLES OF PROGRAMMING LANGUAGES 4 - 4

A10520 LINUX PROGRAMMING 4 - 4

A10521 WEB TECHNOLOGIES 4 - 4

A10522 COMPILER DESIGN 4 - 4

A11206 E-COMMERCE 4 - 4

A10519 COMPUTER NETWORKS 4 - 4

A10527S LINUX PROGRAMMING LAB - 3 2

A10526 WEB TECHNOLOGIES LAB - 3 2

Total 24 6 28

Note: All End Examinations (Theory and Practical) are of three hours duration. T – Tutorial L-Theory P- Practical C – Credits

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 4

9. PRINCIPLES OF PROGRAMMING LANGUAGES (A10564)

9.0 COURSE DESCRIPTION

Course Title PRINCIPLES OF PROGRAMMING LANGUAGES

Course Code A10564

Regulation MLR-15Lectures Tutorials Practical’s Credits

Course Structure3 1 - 3

Course Coordinator Mr.E.Amarnath Reddy Asst.Professor CSETeam of Instructors Mrs. Rajani , Asst. Professor

9.1 COURSE OVERVIEW: This course is designed about principles, concepts, and ideas that underling

programming languages. The course covers many aspects of using, understanding, and reasoning about programming languages (e.g., syntax, scoping, induction, data types, and typing). We will build up a set of mathematical tools for careful discourse. A significant part is devoted to abstraction, that is, how languages help programming in the large (e.g., sub typing polymorphism, parametric polymorphism, modules, and objects).

9.2 PREREQUISITES:

Level Credits Periods/Weeks PrerequisitesUG 3 5 Basic programming concepts, Object Oriented Programming concepts.

9.3. A) MARKS DISTRIBUTION:

Session Marks University EndExam Marks Total Marks

Mid Semester TestThere shall be two midterm examinations.Each midterm examination consists of subjective type and objective type tests.The subjective test is for 10 marks of 60 minutes duration.Subjective test of shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.AssignmentFive marks are earmarked for assignments.There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.

75 100

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 5

9.3 B) Expected Learning Outcomes and Methods for Assessing

S. No Expected Learning Outcomes Assessment method (s)

a Demonstrating the use of scripting languages. Assignment and exercises

b Analyzing the skills and using the features of programming languages. Case studies

c Differentiating between logic programming and functional programming languages. Assignments and test

d Finding various data types of different programming languages. Assignments

9.4 EVALUATION SCHEME:

S. No Component Duration Marks1 I Mid Examination 90minutes 202 I Assignment 53 II Mid Examination 90minutes 204 II Assignment 55 External Examination 3 hours 75

COURSE OBJECTIVES: The course objective is to:

I. To familiarize various programming methodologies II. To explain merits and demerits of various programming patterns

III. To teach new programming practices IV. To familiarize various debugging techniques.

9.5 COURSE OUTCOMES:After completing this course students will be able to:

BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: Apply, developBL 4: Analyze BL 5: Evaluate

Course Outcomes Blooms Level

a. Analyze fundamental concepts of most programming languages & the tradeoffs Programming Languages between language design and implementation.

BL 1

b. Compare programming languages assess programming languages critically and scientifically. BL 2

c. Use formal description for a programming language and the essence of program execution by evaluators: interpreter, compiler. BL 3

d. Apply different programming paradigms: analyze the principles of imperative, object-oriented, functional and logic programming. BL 4

e. Design a new programming language in principle BL 5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 6

9.6 HOW PROGRAM OUTCOMES ARE ASSESSED:

Program Outcomes Level Proficiencyassessed by

A An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems. S Assignment,

Exercises

B An ability to design and conduct engineering experiments, as well as to analyze and interpret data S Exercises

C An ability to design and construct a hardware and software system component, or process to meet desired needs, within realistic constraints. S Exercises

D Graduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. S Exercises

EAn ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipment’s necessary to analyze computer engineering Problems

H Exercises

F An understanding of professional, social and ethical responsibility N .......

GAn ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirement

N .......

H The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context S Seminars,

Discussions

IGraduate will develop confidence for self-education and acquire new knowledge in the computing discipline and ability and practice for Multi-disciplinary tasks as a member within the teams

H Exercises

J To communicate effectively S Seminars, PaperPresentation

K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. H Exercises,

Discussions

L Graduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc. S Exams, Discussions

M An ability to setup an enterprise. N .......

NThe use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.

S Exercises

N = None S = Supportive H = Highly Related

9.7 SYLLABUS:

UNIT -IPreliminary Concepts: concepts of programming languages, Programming domains, Language Evaluation Criteria, influences on Language design, Language categories, Programming Paradigms – Imperative, Object Oriented, functional Programming , Logic Programming. Programming Language Implementation – Compilation and Virtual Machines, programming environments.

UNIT II Syntax and Semantics: general Problem of describing Syntax and Semantics, formal methods of describing syntax - BNF, EBNF for common programming languages features,

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 7

parse trees, ambiguous grammars, attribute grammars, denotation semantics and axiomatic semantics for common programming language features.

UNIT IIIData types: Introduction, primitive, character, user defined, array, associative, record, union, pointer and reference types, design and implementation uses related to these types. Names, Variable, concept of binding, type checking, strong typing, type compatibility, named constants, variable initialization.

UNIT IV Expressions and Statements: Arithmetic relational and Boolean expressions, Short circuit evaluation mixed mode assignment, Assignment Statements, Control Structures – Statement Level, Compound Statements, Selection, Iteration, Unconditional Statements, guarded commands.

UNIT-V Subprograms and Blocks: Fundamentals of sub-programs, Scope and lifetime of variable, static and dynamic scope, Design issues of subprograms and operations, local referencing environments, parameter passing methods, overloaded sub-programs, generic sub-programs, parameters that are sub-program names, design issues for functions user defined overloaded operators, co routines.

TEXT BOOKS 1.Concepts of Programming Languages Robert .W. Sebesta 6/e, PearsonEducation.2.Programming Languages –Louden, Second Edition, Thomson..

REFERENCES 1. Programming languages –Ghezzi, 3/e, John Wiley.2. Programming Languages Design and Implementation – Pratt and Zelkowitz, Fourth

Edition PHI/Pearson Education.3. Programming languages –Watt, Wiley Dreamtech.4. LISP Patric Henry Winston and Paul Horn Pearson Education.5. Programming in PROLOG Clocksin, Springer.

9.8 COURSE PLAN:The course plan is meant as a guideline. There may probably be changes

Lecture No.

Course Learning Outcomes

Blooms Levels Topics to be covered Reference

1 T1 pg:1.2

2

Reviews the concepts of

Remembering / Knowledge

Reasons for studying, concepts of programming languages. http://nptel.ac.in/courses/106102067/1Progamming domains. T1 pg:1.5

3-5 T1 pg:1.7-1.19

6

To Devalop the Programming

languages

Applying / Application

Language Evaluation Criteria, influences on Language design.http://nptel.ac.in/courses/106102067/1Language categories. T1 pg:1.22

7-8List out various programming

paradigms.

Remembering / Knowledge

Programming Paradigms – Imperative ,Object Oriented, functional Programming , Logic Programming.http://nptel.ac.in/courses/106102067/1

T1 pg:1.25

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 8

9-10Recall the design

issues of implementation.

Remembering / Knowledge

Programming Language Implementation – Compilation and Virtual Machines,

T1 pg:2.2-2.22

11-12 Programming environments T1 pg:1.32

13-15

General Problem of describing Syntax and Semantics,1)http://nptel.ac.in/courses/106102067/22)http://nptel.ac.in/courses/106102067/53)http://nptel.ac.in/courses/106102067/6

T1 pg:3.3

16-18

Formal methods of describing syntax -BNF, EBNF for common programming languages features.http://nptel.ac.in/courses/106102067/38

T1 pg:3.5

19

Recall various programming environments.

Remembering / Knowledge

parse trees, ambiguous grammars.http://nptel.ac.in/courses/106102067/4

T1 pg:3.6-3.7

20 Attribute grammars.http://nptel.ac.in/courses/106102067/3 T1 pg:3.20

21-24

Elaborates the features of attribute

grammars.

Understanding / Comprehension denotational semantics and axiomatic semantics

for common programming language features. T1 pg:3.27

25-26 Introduction, primitive, character.http://nptel.ac.in/courses/106102067/12 T1 pg:6.4

27-29 User defined, array.http://nptel.ac.in/courses/106102067/12 T1 pg:6.13

30-32 Associative, record, union.http://nptel.ac.in/courses/106102067/12

33-35

Introduction, primitive, character.http://nptel.ac.in/courses/106102067/12pointer and reference types, design and implementation uses related to these types.http://nptel.ac.in/courses/106102067/1 T1 pg:6.452

T1 pg:6.41

36 T1 pg:5.2-5.8

37-40

List out various data types

Understanding / Comprehension

Names, Variable, concept of binding, type checking, strong typing, type compatibility, named constants, variable initialization.http://nptel.ac.in/courses/106102067/10http://nptel.ac.in/courses/106102067/21

T1 pg:6.58

41 Arithmetic relational and Boolean expressions.http://nptel.ac.in/courses/106102067/9

T1 pg:7.3-7.17

42-44Short circuit evaluation mixed mode assignment, Assignment Statements.http://nptel.ac.in/courses/106102067/9

T1 pg:7.19

45Control Structures – Statement Level, Compound Statements.http://nptel.ac.in/courses/106102067/23

T1 pg:8.2

46 Selection, Iteration.http://nptel.ac.in/courses/106102067/23 T1 pg:8.4

47-50

Use expressions and statements in

a program.

Analyzing / Analysis

Unconditional Statements, guarded commands.http://nptel.ac.in/courses/106102067/13 T1 pg:8.32

51Fundamentals of sub-programs, Scope and lifetime of variable.http://nptel.ac.in/courses/106102067/19

T1 pg:9.2

52Static and dynamic scope, Design issues of subprograms and operations.http://nptel.ac.in/courses/106102067/37

T1 pg:9.13

53

Tabulate different

parameter passing

techniques.

Analyzing / Analysis

local referencing environments T1pg:9.14

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 9

54-56 Parameter passing methodshttp://nptel.ac.in/courses/106102067/39 T1 pg:9.16

57 T1pg: 9.39-9.41

58-59 T1pg: 9.37

60

Differentiate sub-program and co-

routines.

Analyzing / Analysis Differentiate sub-program and co-routines.

T1pg: 9.50

SESSION PLANNER

Unit Class TopicText/

Reference book

Session Objectives Dateplanned

DateConducte

d1. By the end of the session student will identify concepts of PPLL1 Preliminary Concepts:

Introduction T1 2.. By the end of the session student will understand concepts of PPL1. By the end of the session student will identify concepts of for studying PPLL2 Reasons for studying

PPL T2 2.. By the end of the session student will understand concepts of for studying PPL1. By the end of the session student will identify concepts of Programming domains

L3

Concepts of programming languages, Programming domains

T1 2.. By the end of the session student will understand concepts of Programming domains1. By the end of the session student will identify concepts of Language Evaluation CriteriaL4,

L5Language Evaluation Criteria T1 2.. By the end of the session

student will understand concepts of Language Evaluation Criteria1. By the end of the session student will identify concepts of Influences on Language designL6 Influences on

Language design T1 2.. By the end of the session student will understand concepts of Influences on Language design1. By the end of the session student will identify concepts of Language categories

I

L7

Language categories &Programming Paradigms –imperative, object oriented

T1 2.. By the end of the session student will understand concepts of Language categories

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 10

1. By the end of the session student will identify concepts of functional Programming , Logic Programming

L8functional Programming , Logic Programming

T1 2. By the end of the session student will understand concepts of functional Programming , Logic Programming1. By the end of the session student will identify concepts of Syntax and SemanticsL9,

L10

Programming Language Implementation – Compilation and Virtual Machines, programming environments

T1 2.. By the end of the session student will understand concepts of Syntax and Semantics

CLASS TEST UNIT -11. By the end of the session student will identify concepts of Syntax and Semantics

L11

Syntax and Semantics: Introduction ,general Problem of describing Syntax and Semantics

T2 2.. By the end of the session student will understand concepts of Syntax and Semantics1. By the end of the session student will identify concepts of Formal methods of describing syntaxL12

L13

Formal methods of describing syntax – BNF and context free grammar, Fundamentals, list, derivations

T1 2.. By the end of the session student will understand concepts of Formal methods of describing syntax1. By the end of the session student will identify concepts of Parse trees , Ambiguous grammars, Operator precedence, Associativity of operator, Unambiguous grammarL14,

L15

Parse trees , Ambiguous grammars, Operator precedence, Associativity of operator, Unambiguous grammar

T1 2.. By the end of the session student will understand concepts of Parse trees , Ambiguous grammars, Operator precedence, Associatively of operator, Unambiguous grammar1. By the end of the session student will identify concepts of EBNFL16 EBNF T1 2.. By the end of the session student will understand concepts of EBNF1. By the end of the session student will identify concepts of Attribute grammars

L17 Attribute grammars T1 2.. By the end of the session student will understand concepts of Attribute grammars

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 11

1. By the end of the session student will identify concepts of Semantics, Operational semanticsL18 Semantics,

Operational semantics T1 2.. By the end of the session student will understand concepts of Semantics, Operational semantics1. By the end of the session student will identify concepts of Axiomatic semantics ,Denotational semantics

L19Axiomatic semantics ,Denotational semantics

T1 2.. By the end of the session student will understand concepts of Axiomatic semantics ,Denotation semantics1. By the end of the session student will identify concepts of operational and denotation semanticsL20

Differences between operational and denotation semantics

T1 2.. By the end of the session student will understand concepts of operational and denotation semantics1. By the end of the session student will identify concepts of Data types: Introduction, primitive, character, user definedL21

Data types: Introduction, primitive, character, user defined

T1 2.. By the end of the session student will understand concepts of Data types: Introduction, primitive, character, user defined1. By the end of the session student will identify concepts of ArrayL22,

L23 Array T1 2.. By the end of the session student will understand concepts of Array1. By the end of the session student will identify concepts of Associative, Record, UnionL24,L

25Associative, Record, Union T1 2.. By the end of the session

student will understand concepts of Associative, Record, Union1. By the end of the session student will identify concepts of PointerL26 Pointer and reference

types T1 2.. By the end of the session student will understand concepts of Pointer

II

L27Names, Variables, Concept of binding, Type checking

T1

1. By the end of the session student will identify concepts of Names, Variables, Concept of binding, Type

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 12

checking2.. By the end of the session student will understand concepts of Names, Variables, Concept of binding, Type checking1. By the end of the session student will identify concepts of Strong typing, Type compatibility, Named constants, Variable initializationL28

Strong typing, Type compatibility, Named constants, Variable initialization

T2 2.. By the end of the session student will understand concepts of Strong typing, Type compatibility, Named constants, Variable initialization

CLASS TEST UNIT 31. By the end of the session student will identify concepts of Expressions and StatementsL29

Expressions and Statements: Arithmetic relational and Boolean expressions

T1 2.. By the end of the session student will understand concepts of Expressions and Statements1. By the end of the session student will identify concepts of Short circuit evaluation

L30Short circuit evaluation , mixed mode assignment

T1 2.. By the end of the session student will understand concepts of Short circuit evaluation1. By the end of the session student will identify concepts of Assignment Statements, Control Structures Statement Level, Compound statements

L31

Assignment Statements, Control Structures Statement Level, Compound statements

T1 2.. By the end of the session student will understand concepts of Assignment Statements, Control Structures Statement Level, Compound statements1. By the end of the session student will identify concepts of Selection, Iteration

L32 Selection, Iteration T1 2.. By the end of the session student will understand concepts of Selection, Iteration1. By the end of the session student will identify concepts of Unconditional Statements

L33 Unconditional Statements T1 2.. By the end of the session

student will understand concepts of Unconditional Statements

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 13

1. By the end of the session student will identify concepts of guarded commands-selection, iteration

L34 guarded commands-selection, iteration T1 2.. By the end of the session

student will understand concepts of guarded commands-selection, iteration

CLASS TEST UNIT-21. By the end of the session student will identify concepts of Subprograms and Blocks: Fundamentals of sub-programsL35

Subprograms and Blocks: Fundamentals of sub-programs

T2 2.. By the end of the session student will understand concepts of Subprograms and Blocks: Fundamentals of sub-programs1. By the end of the session student will identify concepts of Scope and lifetime of variable, static scope

L36 Scope and lifetime of variable, static scope T1 2.. By the end of the session

student will understand concepts of Scope and lifetime of variable, static scope1. By the end of the session student will identify concepts of dynamic scopeL37 dynamic scope T1 2.. By the end of the session student will understand concepts of dynamic scope1. By the end of the session student will identify concepts of subprograms and operationsL38

Design issues of subprograms and operations

T1 2.. By the end of the session student will understand concepts of subprograms and operations1. By the end of the session student will identify concepts of Local referencing environmentsL39 Local referencing

environments, T1 2.. By the end of the session student will understand concepts of Local referencing environments1. By the end of the session student will identify concepts of parameter passing methods

III

L40L41

parameter passing methods T1 2.. By the end of the session

student will understand concepts of parameter passing methods

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 14

1. By the end of the session student will identify concepts of overloaded sub-programs ,generic sub-progsL42

overloaded sub-programs ,generic sub-progs

T1 2.. By the end of the session student will understand concepts of overloaded sub-programs ,generic sub-progs1. By the end of the session student will identify concepts of parameters that are sub-program names, design issues for functionsL43

parameters that are sub-program names, design issues for functions

T1 2.. By the end of the session student will understand concepts of parameters that are sub-program names, design issues for functions1. By the end of the session student will identify concepts of user defined overloaded operators, co routines

L44user defined overloaded operators, co routines

T1 2.. By the end of the session student will understand concepts of user defined overloaded operators, co routines

CLASS TEST FOR UNIT-31. By the end of the session student will identify concepts of ADTL45

Abstract Data types: Abstractions and encapsulation

T1 2.. By the end of the session student will understand concepts of ADT1. By the end of the session student will identify concepts of data abstraction, design issuesL46

introductions to data abstraction, design issues

T1 2.. By the end of the session student will understand concepts of data abstraction, design issues1. By the end of the session student will identify concepts of different languages

L47 language examples T1 2.. By the end of the session student will understand concepts of different languages1. By the end of the session student will identify concepts of ADTL48 C++ parameterized

ADT T1 2.. By the end of the session student will understand concepts of ADT1. By the end of the session student will identify concepts of OOPS

IV

L49object oriented programming in small talk ,C++,

T1

2.. By the end of the session

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 15

student will understand concepts of OOPS1. By the end of the session student will identify concepts of Java, C#, Ada 95ConcurrencyL50

,L51

Java, C#, Ada 95Concurrency: Subprogram level concurrency

T2 2.. By the end of the session student will understand concepts of Java, C#, Ada 95Concurrency1. By the end of the session student will identify concepts of ConcurrencyL52

Concurrency: Subprogram level concurrency

T1 2.. By the end of the session student will understand concepts of Concurrency1. By the end of the session student will identify concepts of semaphores, monitors, massage passingL53 semaphores, monitors,

massage passing T1 2.. By the end of the session student will understand concepts of semaphores, monitors, massage passing1. By the end of the session student will identify concepts of Java threads, C# threads

L54 Java threads, C# threads T1 2.. By the end of the session

student will understand concepts of Java threads, C# threads

CLASS TEST UNIT-41. By the end of the session student will identify concepts of EHL55

Exception handling : Exceptions, exception Propagation Exception handler in Ada

T1 2.. By the end of the session student will understand concepts of EH1. By the end of the session student will identify concepts of C++ and JavaL56 C++ and Java T1 2.. By the end of the session student will understand concepts of C++ and Java1. By the end of the session student will identify concepts of LPLL57

Logic Programming Language : Introduction and overview of logic programming

T1 2.. By the end of the session student will understand concepts of LPL1. By the end of the session student will identify concepts of prologL58 basic elements of

prolog, T2 2.. By the end of the session student will understand concepts of prolog

L59 application of logic programming

T1 1. By the end of the session student will identify concepts of LP

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 16

2.. By the end of the session student will understand concepts of LP1. By the end of the session student will identify concepts of FPLL60

Functional Programming Languages: Introduction, fundamentals of FPL

T1R5 2.. By the end of the session

student will understand concepts of FPL1. By the end of the session student will identify concepts of LISP, MLL61 LISP, ML T1

R5 2.. By the end of the session student will understand concepts of LISP, ML1. By the end of the session student will identify concepts of HASKELLL62

HASKELL, Scoping rule in common LISP,ML AND HASKELL,

T1R5 2.. By the end of the session

student will understand concepts of HASKELL1. By the end of the session student will identify concepts of Applications of FPL

L63

Applications of FPL, Comparison of FPL and imperative languages

R5 2.. By the end of the session student will understand concepts of Applications of FPL1. By the end of the session student will identify concepts of Scripting language

L64Scripting language: introduction, Key concepts

R5 2.. By the end of the session student will understand concepts of Scripting language1. By the end of the session student will identify concepts of PYTHON

V

L65 Case study: PYTHON R5 2.. By the end of the session student will understand PYTHON

9.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Course OutcomesCourse Objectives a b c d e

fI H H H H HII H S S SIII H H SIV S S

S=Supportive H=Highly Related KS

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 17

9.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Program OutcomesCourse Outcomes A B C D E F G H I J K L M N

a. S S H S Sb. H S H S Hc. S S S S H S Sd. Se. S S S S H S S

S=Supportive H=Highly Related

9.11 OBJECTIVE BITS

UNIT-11. Which of the following language is widely used for Scientific Applications?

[March 2000] A. ALGOL60 B. COBOL C. LISPD. FORTRAN Answer : C

2. Which of the following languages support Independent Compilation? [ ] [March 2005]A. ADAB. FORTRAN90 C. FORTRAN II to FORTRAN77 D. C++ Answer: C

3. According to Von Neumann architecture, the central feature of imperative Languages is [March2009]A. registers B. variables C. identifiers D. keywordsAnswer: C

4. ________ is the first functional programming language [ ] [March 2011]A. AdaB. LISPC. prolog D. noneAnswer : B

5. The following is the widely used programming language developed for Artificial Intelligence [ ] [March 2007] A. LISP B. FORTRAN C. COBOLD. ALGOL 60Answer : A

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 18

6. What is the post condition for x = 2 * y + 3 { x> 25 } [ ] [March 2005]A. y>11 B. x > 25 C. y > 14 D. y > 13Answer: B

7. Which of the following is a device that can be used to generate the sentences of a ______language? [ ] [March 2013]A. Language generator B. Language recognizersC. Program generator D. Sentence generatorAnswer A

8. When a grammar rule has its LHS also appearing at the beginning of its RHS called [ ] [March 2011]A. Right recursive B. Left recursive C. Recursion D. A&BAnswer B

9. Which attributes are used to pass semantic information up a parse tree [ ] [March 2005] A. Synthesized attributesB. Inherited attributes C. Hirarchial attributes D. None Answer A

10. Which parser trace and build the parse tree in preorder [ ][March 2000]A. Bottom up B. Top downC. Only up D. Up and downAnswer B

11. ________ refers to a collection of tools used in the development of software programs [ ][March 2009]A. Programming EnvironmentB. Programming C. Aliasing D. Environment Answer B

12. An ____ is a logical statement that is assumed to be true[ ] [March 2011]A. Axiom B. Socket C. Stack D. StaticAnswer A

13. The Logical expressions are called [ ] [March 2013]A. Assertions B. Semantics C. Strings

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 19

D. SymbolsAnswer A

14. The abstractions in a BNF description or grammar are often called __________ [ ] [March2014]A. Rules B. Conditions C. Non terminals D. TerminalsAnswer C

15. A Sentence generation is called a ___________ [ ] [March 2006]A. StatementB. Token C. Derivation D. BNFAnswer C

16. The __________ of a language is category of its lexemes [ ] [March 2009]A. StringB. Statements C. TokenD. None of the aboveAnswer C

17. Which of the following is a natural notation for describing syntax [ ] [March 2011]A. Regular grammar B. Automata C. Context-free grammarD. Backus-Naur Form Answer D

18 Which of the following gather the characters of the source program into lexical units [ ] [March 2009]A. Lexical AnalyzerB. Syntax Analyzer C. Parse Tree D. Code Generator Answer A

19. Languages designed on Von Neumann architecture are called as [ ] [March 2005]A. Imperative Languages B. OOPL C. Explicit Languages D. Prolog Language Answer A

20. List of commands put in a file is known as [ ] [March 2000]A. Tag B. Language C. Script D. ProgramAnswer C

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 20

UNIT II1. In c and C++ the asterisk (*) denotes the operation. [ ] [March 2005]

A. dereferencing B. negationC. referencing D. addressAnswer A

2. The ------- of a variable is the time between creation and termination [ ] [March 2009]A. Context B. Scope C. RangeD. Life timeAnswer D

3. The associatively of postfix + + operator in C + + is [ ] [March 2011]A. Right B. depends on expressionC. any order D. LeftAnswer A

4. The following Type compatibility is described in Semantics [ ] [March 2013] A. structuredB. static C. denotionalD. dynamicAnswer B

5. The following type is one in which the variables have arrange of values that consists of memory addresses and a special value nil [ ] [March 2011] A. EnumeratedB. Pointer C. Derived D. Linked ListAnswer B

8. The following language has pointer concept [ ] [March 2009]A. Java B. C++C. DHTML D. HTMLAnswer B

9. The first high level programming to include pointer variables was [ ] [March 2005]A. FortranB. PL/1 C. ALGOL 60 D. ADAAnswer B

10. _____data type specifically available in a language for business applications [March 2000]A. IntB. Double C. Decimal

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 21

D. FloatAnswer C

11. The following type stores values as sequences of characters [ ] [March 2009]A. BooleanB. Float C. IntD. StringAnswer D

12. __________is the first functional programming language [ ] [March 2011]A. ADAB. LISP C. PROLOG D. NoneAnswer B

13. A _________is a type whose variables are allowed to store different type values in same memory [ ] [March 2009]A. RecordB. Union C. Associative array D. ArrayAnswer B

14. Dynamic type checking allowed in [ ] [March 2010]A. C B. PHP C. JAVA SCRIPT D. B&CAnswer D

15. Variables that are dynamically allocated from the heap is called [ ] [March 2013] A. Static VariablesB. Dynamic variables C. Heap dynamic variables D. A&BAnswer C

16. The following language does not use the equals sign for assignment operator [ ] [March2012]A. ALGOL 6 0 B. C C. BAS CD. C++Answer A

17. In FORTRAN 90, Loop parameters are evaluated [ ] [March 2011]A. Thrice B. Only once C. Twice D. Every timeAnswer B

18. Logical expressions are called [ ] [March 2009]A. Axioms B. Conditions C. Assertions

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 22

D. SubjectsAnswer C

19. The equality operator in Fortran95 is _______________. [ ] [March 2005]A. EQ B. EQUALC. == D. NoneAnswer A

20 __________ is bound to value only once [ ] [March 2000]A. Static variable B. Dynamic variable C. Named constantD. Both (a) & (b)Answer C

UNIT III1. The first actual parameteris bound to the first formal parameter and so forth,

such parameters are called POSITIONAL PARAMETERS.[March 2000]2. An OVERLOADED SUBPROGRAM is one that has the same name as another

subprogram in the same referencing environment. [March 2005] 3. A GENERIC sub program is one whose computation can be done on data of different

types in different calls. [March 2009] 4. The three semantic models are IN MODE, OUT MODE, INOUT MODE. 5. C uses PASS-BY-VALUE and pass-by-reference semantics is achieved by using

POINTERS as parameters. [March 2011] 6. An OVERLOADED SUBPROGRAM is a subprogram that has the same name as

another subprogram in the same referencing environment. [March 2009] 7. The invocation of a co routine is called a RESUME. [March 2010] 8. Only one processor but all of the executing programs in such a system appear to run

concurrently, while sharing the process this is called as QUASI-CONCURRENCY. [March 2011]

9. A POLYMORPHIC subprogram takes parameters of different types on different activations. [March 2005]

10. Overloaded subprograms provide a particular kind of polymorphism called AD HOC POLYMORPHISM. [March 2000]

11. Block concept was introduced by [ ] [March 2009] A. Fortran B. ALGOL60C. PL/ID. ADAAnswer B

12. Multiple selector statement in C is [ ] [March 2013]A. Case B. Switch C. Go ToD. ContinueAnswer C

13. Parameters in subprogram header are called [ ] [March 2012]A. Formal Parameters B. Actual Parameters

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 23

C. Local VariablesD. Global Variables Answer A

14. Loop.. end loop is used in [ ] [March 2010]A. FORTRAN B. PASCAL C. ADAD. CAnswer C

15. In FORTRAN , global variables are [ ] [March 2009]A. COMMON B. GLOBAL C. STATIC D. REGISERSAnswer A

16. In Ada, call-by-value parameter passing mechanism can be identified using [ ] [March 2013]A. Out B. In out C. In D. None of the aboveAnswer C

17. In C, arrays are passed as parameters using [ ] [March 2012]A. Call-by-value B. Call-by-referenceC. Call-by-nameD. Call-by-resultAnswer B

18. Elseif is used in [ ] [March 2011]A. ALGOL60 B. FORTRAN C. PL/ID. ADAAnswer D

19. In FORTRAN 77, the default parameter passing mechanism is [ ] [March 2009]A. Call-by-value B. Call-by-referenceC. Call-by-nameD. Call-by-resultAnswer B

20. Down to is used in the for loop of the following language [ ] [March 2000]A. FORTRAN B. PASCAL C. AdaD. C++Answer B

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 24

UNIT-IV1. An ABSTRACTION is a view or representation of an entity that includes only the

most significant attributes. [March 2000] 2. The concept of PROCESS ABSTRACTION is the oldest in programming language

design. [March 2005] 3. An instance of an abstract data type is called an OBJECT. [March 2009] 4. The concept of data abstraction had its origins in SIMULA 67. [March 2005] 5. The encapsulating constructs in ADA are called PACKAGES. [March 2011] 6. Package that provides interface of the encapsulation is called SPECIFICATION

PACKAGE. [March 2012] 7. Package which provides implementation of entities in specification package are called

BODY PACKAGE. [March 2013] 8. Data defined in C++ class are called DATA MEMBERS and the functions defined in a

class are called MEMBER FUNCTIONS. [March 2011] 9. Heap-Dynamic class objects are created with the NEW operator and destroyed with the

DELETE operator. [March 2005] 10. Object oriented programming has its roots in SIMULA 67. [March 2000] 11. The special processing that may be required when an exception is detected is called

EXCEPTION HANDLING. [March 2009] 12. In some situations it is necessary to complete some computations regardless of how

subprogram execution terminates such a computation is called FINALIZATION. [March 2013]

13. The java system includes two predefined exception classes that are subclasses of Throwable, ERROR and EXCEPTION. [March 2009]

14. Programming that uses a form of symbolic logic as a programming language is called LOGIC PROGRAMMING. [March 2011]

15. The form of implementation of prolog is sometimes called as EDINBURGH SYNTAX. [March 2012]

16. The first implementation of Edinburg syntax is done on DEC system10. [March 2014] 17. All the statements in prolog are constructed from TERM. [March 2011] 18. In rule statement the left part representing then statement is called CONSEQUENT

where as if part at the right side is called the ANTECEDENT. [March 2009] 19. PROPOSITIONS are the logical statements that may evaluate either true or false.

[March 2005] 20. Queries in prolog are called GOALS, when a goal is a composite proposition its facts

are called SUBGOALS. [March 2000]

UNIT-V1. In FPL a mathematical function is a plot between members of two sets called

DOMAIN SET and RANGE SET. [March 2000] 2. A method called as the Lambda notation is used for defining NAMELESS functions. 3. (car L)= (car(car L)). [March 2005]4. Original LISP contains two types of data ATOMS and LISTS. [March 2009] 5. ML has EXCEPTION HANDLING and a MODULE facility for implementing

abstract data types. [March 2011] 6. ML is a STRONGLY typed language. [March 2010] 7. Haskell uses NON STRICT semantics. [March 2011] 8. ML uses STRICT SEMANTICS. [March 2009] 9. HASKELL is designed by THOMPSON 1999. [March 2005]10. In LISP ,function calls are specified using [ ] [March 2000]

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 25

A. Postfix B. Cambridge PolishC. Infix D. Reverse PolishAnswer B

11. In the original LISP the number of data types available was [ ] [March 2011]A. 1B. 2 C. 3D. 4Answer B

12. CAR in LISP returns the following element of a list [ ] [March 2010]A. First B. LastC. Tail D. SecondAnswer A

13. Following is the keyword used to defina a function in LISP [March 2012]A. FUNB. DEFINEC. CARD. LISTAnswer B

14. Function declaration in ML can be done using the keyword [ ] [March 2013]A. FUNCTION B. PROCEDURE C. DEFINED. FUNAnswer D

15. The method of defining infinite lists in Haskell is [ ] [March 2014]A. Linked ListB. Lambda Expression C. List Comprehension D. Not PossibleAnswer C

16. For logic programming, following symbolic logic is used [ ] [March 2011]A. IntegrationB. Relational Algebra C. Relational CalculusAnswer C

17. A function is [ ] [March 2011]A. Parameter B. Function Symbol C. Compound Term D. NoneAnswer B

18. “implies” logical connections is represented using [ ] [March 2009] A. CB. „E C. E‟

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 26

D. ø Answer B

19. CDR in LISP returns the following element of a list [ ] [March 2005] A. Last and first elements B. Last but one element C. remainder of a given list after CAR is removed D. Entire list except the last elementAnswer C

20. Which of the following are scripting languages [ ] [March 2000]A. HTML B. C C. ADA D. COBOLAnswer A

9.12 TUTORIAL QUESTIONSPART-A (SHORT ANSWER QUESTIONS)

S. No QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT –I1. Define Programming Language. Knowledge a2. Difference between sentence and sentential form. Analysis b3. Define Syntax and Semantics. Knowledge a4. Differentiate between Syntax and Semantics. Analysis b5. Write BNF notation for i) For loop ii) if-else condition Synthesis c6. Give grammars for simple assignment statements. Comprehension c7. Give an un ambiguous grammar for if-then-else. Comprehension c8. Define Parse trees. Knowledge a9. Define Denotational semantics. Knowledge a10. Define Operational semantics. Knowledge a11. Define Axiomatic semantics. Knowledge a12. Differentiate compiler and interpreter. Analysis b13. Describe language recognizers. Knowledge a14. Describe generators. Knowledge a15. Distinguish simplicity and orthogonally Comprehension c

UNIT –II1. Distinguish static and dynamic scoping. Comprehension c2. Define associative arrays. Knowledge a3. Define guarded commands? Knowledge a4. Distinguish named type and structure type compatibility. Comprehension c5. List the merits of sub range types. Knowledge a6. Differentiate union and enumeration. Analysis b7. Define data type. Knowledge a8. List the merits of type checking. Knowledge a9. Define user defined data type. Knowledge a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 27

10. Define widening and narrowing conversions? Knowledge aUNIT –III

1. Define scope and lifetime of a variable. Knowledge a2. Differentiate shallow and deep binding. Analysis b3. Define subprogram. Knowledge a4. Define procedures. Knowledge a5. Define local referencing environment. Knowledge a6. Differentiate static and dynamic binding. Analysis b

UNIT –IV1 Define an exception. Knowledge a2 Define a thread. Knowledge a3 Define concurrency. Knowledge a4 Define binary semaphore. Knowledge a5 Define monitors. Knowledge a6 Define mutual exclusion. Knowledge a7 Define deadlock. Knowledge a8 Define an abstract data type. Knowledge a9 Define logic programming language. Knowledge a

10 Define data abstraction. Knowledge aUNIT –V

1 Give the meaning of lazy evaluation mean. Comprehension c2 Define procedural abstraction. Knowledge a3 List few characteristics of Python language. Knowledge a4 Define functional language. Knowledge a5 Define imperative language. Knowledge a6 Give the meaning of scripting language. Comprehension c7 List few examples of scripting languages. Knowledge a8 List keywords of Python language. Knowledge a9 List data types of Python language. Knowledge a

10 Define the term separate compilation in Python. Knowledge a

PART – B LONG ANSWER QUESTIONS

S.No Question Blooms

Taxonomy LevelCourse

OutcomeUNIT –I

1. Discuss language evaluation criteria and the characteristics that affect them. Comprehension c

2. List the potential benefits of studying programming language concept. Knowledge a

3. Explain syntax of a “for” statement in PASCAL using BNF notation and syntax graphs.

Comprehension, Synthesis, Evaluation

b/c/d

4. Explain syntax of declaration statement in PASCAL using BNF notation and syntax graphs.

Comprehension, Synthesis, Evaluation

b/c/d

5.

Compute the weakest precondition for each of the following simple assignment statements and post conditions.a=2*(b-1)-1{a>0}b=(c+10)/3 {b>6}

Application e

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 28

a=a+2*b-1 {a>1}X=2*y+x-1 {x>11}

6. Write BNF notation for following:a)For loop b)If-else condition c)Structure definition

Application, Synthesis d/e

7

Define left most derivation. Prove that the following grammar is ambiguous.<program>->begin<stmt_list>end<stmt_list>-><stmt>|<stmt>;<stmt_list><stmt>-><var>=<expression><var>-> A|B|C<expression>-><var>+<var>|<var>-<var>|<var>

Knowledge a

8

State the given grammar is ambiguous.<assign> -><id>=<expr><id>->A|B|C<expr>-><expr>+<expr>|<expr>*<expr>|(<expr>)|<id>

Knowledge a

9 List the three general methods of implementing a programming language. Knowledge a

10 Explain different aspects of the costs of a programming language.Comprehension,

Synthesis, Evaluation

b/c/d

UNIT –II1. Define heterogeneous array. Discuss the design issues of arrays. Knowledge a

2. Explain in detail the design issues of arithmetic expressions.Comprehension,

Synthesis, Evaluation

b/c/d

3. Discuss structural and name equivalence for types. Give an example of a language used for each approach. Comprehension c

4. Define a variable and what the attributes of a variable are. Elaborate on address of a variable. Knowledge a

5. Write a note on Boolean and relational expressions. Application, Synthesis d/e

6. Explain the different types of relational operators used in C, Ada and Fortran 95.

Comprehension, Synthesis, Evaluation

b/c/d

7 What are the advantages and disadvantages of mixed mode arithmetic expressions? 6

8Define array and record. Classify arrays based on storage allocation. What are the advantages and disadvantages of allocation memory during compilation time and run time.

Knowledge a

9 Define static, fixed stack dynamic, stack dynamic, fixed heap dynamic and dynamic arrays. What are the advantages of each? Knowledge a

10 List the design issues of pointers. Explain. Knowledge aUNIT –III

1.Define subprograms. What are the advantages of subprograms? Explain different methods of parameter passing mechanisms to subprograms.

Knowledge a

2. Explain the design issues of subprograms.Comprehension,

Synthesis, Evaluation

b/c/d

3 Discuss about procedures and functions in subprograms. Comprehension c

4 Define shallow and deep binding for referencing environment of subprograms that have been passed as parameters. Knowledge a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 29

5 Discuss with suitable examples static and dynamic scope. Knowledge a6 Discuss generic subprograms in C++. Comprehension c

7 Explain about Co routines.Comprehension,

Synthesis, Evaluation

b/c/d

8. Discuss generic subprograms in java. Comprehension c9. Discuss the importance of Co routines of Lua language. Comprehension c10. Discuss the importance of generic subprograms. Comprehension c

UNIT –IV

1. Describe how exception is handled in ADA with an example.Knowledge,

Comprehension, Evaluation

c

2. Describe briefly about Semaphores.Knowledge,

Comprehension, Evaluation

c

3. Describe briefly about Monitors.Knowledge,

Comprehension, Evaluation

d

4. Discuss Object Oriented Programming in SMALLTALK. Comprehension c

5. Write about goal statements and simple arithmetic in PROLOG. Application, Synthesis d/e

6. Define binary semaphore. What is counting semaphore? What are the primary problems with using semaphores to provide synchronization? Knowledge a

7

Explain the following terms:• process synchronization• race condition• binary semaphores• MIMD

Comprehension, Synthesis, Evaluation

b/c/d

8 Explain different types of propositions present in logic programming.Comprehension,

Synthesis, Evaluation

d

9 Describe the cooperation synchronization and competition synchronization in message passing.

Knowledge, Comprehension,

Evaluationd

10 Discuss how dining philosopher’s problem and producer consumer problem are solved using concurrency in Ada. Comprehension c

UNIT – V

1 Write about control constraints in Python. Application, Synthesis d/e

2 Write about data abstraction in Python. Application, Synthesis d/e

3 Write about data types and structures of LISP and LISP interpreter. Application, Synthesis d/e

4 List the ways in which ML is significantly different from scheme. Knowledge a

5 Describe the scoping rule in common LISP, ML and HASKELL.Knowledge,

Comprehension, Evaluation

c

6 Explain the characteristics of scripting languages.Comprehension,

Synthesis, Evaluation

c

7 Discuss in detail about the python primitive types. Comprehension c

8 Explain about LISP functional programming language.Comprehension,

Synthesis, Evaluation

b

9 Discuss and trace the Python code to find the factorial of a number. Comprehension c

10 Discuss and trace the Python code to print the Fibonacci series between the given ranges of numbers. Comprehension c

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 30

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S.No Questions

Blooms Taxonomy

Level

Course Outcome

UNIT –I

1Give some reasons why computer scientist and professional software developers should study general concepts of language design and evaluation.

Comprehension c

2 Write reasons for the statement: “Exception handling is very important, but often neglected by programming languages”.

Application,Synthesis d/e

3

Write reasons for the statement: “A programming language can be compiled or interpreted”. Give relative advantages and disadvantages of compilation and interpretation. Give examples of compiled and interpreted languages.

Application,Synthesis d/e

UNIT – II

1 List what advantages does java’s break statement have over C’s and C++’s break statement. Knowledge A

2 State whether static binding is more reliable or dynamic binding. Explain why. Knowledge A

UNIT –III

1. Compare the parameter passing mechanisms of ALGOL and ADA. Analysis ,Evaluation c/d

2. State the importance of Local Referencing Environments with suitable examples. Knowledge A

3. Discuss about different parameter passing methods of Ada language. Comprehension C

UNIT –IV

1.Discuss the reasons for using exception handlers in a programming language. What if there exist programming languages with no exception handlers.

Comprehension C

2. Give the sample code to factorial of a number in PROLOG language. Comprehension C

3. Sketch the importance of logic programming languages over functional programming languages. Understand A

UNIT –V

1. Write features of Haskell that makes very different from schema. Application,Synthesis d/e

2. List the ways in which ML is significantly different from scheme. Knowledge A

3. Prove the advantages of Python scripting language over other scripting Languages Understand A

4. Give example of Python code to find the roots of quadratic equation Comprehension C

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 31

9.13 ASSIGNMENT QUESTIONSPART – A (SHORT ANSWER QUESTIONS)

S.No Questions

BloomsTaxonomy

Level

CourseOutcome

UNIT –I1 Define Programming Language. Knowledge A

2 Difference between sentence and sentential form. Analysis B3 Define Syntax and Semantics. Knowledge A4 Differentiate between Syntax and Semantics. Analysis A5 Write BNF notation for i) Forloop ii) if-else condition Synthesis B6 Give grammars for simple assignment statements. Comprehension C7 Give an un ambiguous grammar for if-then-else. Comprehension C8 Define Parse trees. Knowledge A9 Define Denotational semantics. Knowledge A

10 Define Operational semantics. Knowledge A11 Define Axiomatic semantics. Knowledge A12 Differentiate compiler and interpreter. Analysis B13 Describe language recognizers. Knowledge A14 Describe generators. Knowledge A

15 Distinguish simplicity and orthogonality Comprehension CUNIT –II

1 Distinguish static and dynamic scoping. Comprehension C2 Define associative arrays. Knowledge A3 Define guarded commands? Knowledge A4 Distinguish named type and structure type compatibility. Comprehension C5 List the merits of sub range types. Knowledge A6 Differentiate union and enumeration. Analysis B7 Define data type. Knowledge a8 List the merits of type checking. Knowledge a9 Define user defined data type. Knowledge a

10 Define widening and narrowing conversions? Knowledge aUNIT –III

1 Define scope and lifetime of available Knowledge a2 Differentiate shallow and deep binding. Analysis b3 Define subprogram. Knowledge a4 Define procedures. Knowledge a5 Define local referencing environment. Knowledge a6 Differentiate static and dynamic binding. Analysis b

UNIT –IV1 Define an exception. Knowledge a2 Define a thread. Knowledge a3 Define concurrency. Knowledge a4 Define binary semaphore. Knowledge a5 Define monitors. Knowledge a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 32

6 Define mutual exclusion. Knowledge a7 Define deadlock. Knowledge a8 Define an abstract data type. Knowledge a9 Define logic programming language. Knowledge a

10 Define data abstraction. Knowledge aUNIT –V

1 Give the meaning of lazy evaluation mean. Comprehension c2 Define procedural abstraction. Knowledge a3 List few characteristics of Python language. Knowledge a4 Define functional language. Knowledge a5 Define imperative language. Knowledge a6 Give the meaning of scripting language. Comprehension c7 List few examples of scripting languages. Knowledge a8 List keywords of Python language. Knowledge c9 List data types of Python language. Knowledge c

10 Define the term separate compilation in Python. Knowledge c

PART – B (LONG ANSWER QUESTIONS)

S. No QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT –I1 Discusslanguageevaluationcriteriaandthecharacteristicsthataffect them. Comprehension c2 List the potential benefits of studying programming language concept. Knowledge a

3 Explain syntax of a “for” statement in PASCAL using BNF notation and syntax graphs.

Comprehension, Synthesis, Evaluation

b/c/d

4 Explain syntax of declaration statement in PASCAL using BNF notation and syntax graphs.

Comprehension, Synthesis, Evaluation

b/c/d

5

Compute the weakest pre condition for each of the following simple assignment statements and post conditions.a=2*(b-1)-1{a>0} b=(c+10)/3{b>6}a=a+2*b-1 {a>1} X=2*y+x-1{x>11}

Application e

6 Write BNF notation for following: a) For loop b)If-else condition c) Structure definition

Application,

Synthesise/b

7

Define left most derivation. Prove that the following grammar is ambiguous.<program>->begin<stmt_list>end<stmt_list>-><stmt>

|<stmt>;<stmt_list><stmt>-><var>=<expression><var>->A|B|C<expression>-><var>+<var>

|<var>-<var>|<var>

Knowledge a

8 State the given grammar is ambiguous.<assign>-><id>=<expr> Knowledge a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 33

<id>->A|B|C<expr>-><expr>+<expr>

|<expr>*<expr>|(<expr>)|<id>

9 List the three general methods of implementing a programming language. Knowledge a

10 Explain different aspects of the costs of a programming language.Comprehension, Synthesis, Evaluation

b/c/d

UNIT –II1 Define heterogeneous array. Discuss the design issues of arrays. Knowledge a

2 Explain in detail the design issues of arithmetic expressions.Comprehension, Synthesis, Evaluation

b/c/d

3 Discuss structural and name equivalence for types. Give an example of a language used for each approach. Comprehension c

4 Define a variable and what the attributes of a variable. Elaborate on address of a variable. Knowledge a

5 Write a note on Boolean and relational expressions.Applicatio

n, Synthesis

e/b

6 Explain the different types of relational operators used in C, Ada and Fortran 95.

Comprehension, Synthesis, Evaluation

b/c/d

7 What are the advantages and disadvantages of mixed mode arithmetic expressions? Knowledge a

8Define array and record. Classify arrays based on storage allocation. What are the advantages and disadvantages of allocation memory during compilation time and runtime?

Knowledge a

9 Define static, fixed stack dynamic, stack dynamic, fixed heap dynamic and dynamic arrays. What are the advantages of each. Knowledge a

10 List the design issues of pointers. Explain. Knowledge aUNIT –III

1 Define sub programs. What are the advantages of sub programs? Explain different methods of parameter passing mechanisms to sub programs. Knowledge a

2 Explain the design issues of subprograms.Comprehension, Synthesis, Evaluation

b/c/d

3 Discuss about procedures and functions in sub programs. Comprehension c

4 Define shallow and deep binding for referencing environment of subprograms that have been passed as parameters. Knowledge a

5 Discuss with suitable examples static and dynamic scope. Knowledge a6 Discuss generic subprograms in C++. Comprehension c

7 Explain about Co routines.Comprehension, Synthesis, Evaluation

b

8 Discuss generic subprograms in java. Comprehension c9 Discuss the importance of Co routines of a language. Comprehension c10 Discuss the importance of generic sub programs. Comprehension c

UNIT –IV

1 Describe how exception is handled in ADA with an example.Knowledge,

Comprehension, Evaluation

c

2 Describe briefly about Semaphores. Knowledge, Comprehensio c

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 34

n, Evaluation

3 Describe briefly about Monitors.Knowledge,

Comprehension, Evaluation

c

4 Discuss Object Oriented Programming in SMALL TALK. Comprehension c

5 Write about goal statements and simple arithmetic in PROLOG.Applicatio

n, Synthesis

e/b

6 Define binary semaphore. What is counting semaphore? What are the primary problems with using semaphores to provide synchronization? Knowledge a

7

Explain the following terms:• Process synchronization• race condition• binary semaphores• MIMD

Comprehension, Synthesis, Evaluation

d

8 Explain different types of propositions presenting logic programming.Comprehension, Synthesis, Evaluation

d

9 Describe the cooperation synchronization and competition synchronization in message passing.

Knowledge, Comprehension, Evaluation

c

10 Discuss how dining philosopher’s problem and producer consumer problem are solved using concurrency in Ada. Comprehension c

UNIT –V

1 Write about control constraints in Python. Application, Synthesis d/e

2 Write about data abstraction in Python. Application, Synthesis d

3 Write about data types and structures of LISP and LISP interpreter. Application, Synthesis d

4 List the ways in which ML is significantly different from scheme. Knowledge a

5 Describe the scoping rule in common LISP, ML and HASKELL.Knowledge,

Comprehension,Evaluation d

6 Explain the characteristics of scripting languages.Comprehension, Synthesis, Evaluation d

7 Discuss in detail about the python primitive types. Comprehension d

8 Explain about LISP functional programming language.Comprehension, Synthesis, Evaluation c

9 Discuss and trace the Python code to find the factorial of a number. Comprehension b

10 Discuss and trace the Python code to print the Fibonacci series between the given ranges of numbers. Comprehension b

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S.No Question

Blooms Taxonomy

Level

Course Outcome

UNIT –I

1Give some reasons why computer scientist and professional software developers should study general concepts of language design and evaluation.

Comprehension d

2 Write reasons for the statement: “Exception handling Is very important, but often neglected by programming languages”.

Application,Synthesis c

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 35

3

Write reasons for the statement: “A programming language can be compiled or interpreted”. Give relative advantages and disadvantages of compilation and interpretation. Give examples of compiled and interpreted languages.

Application,Synthesis c

UNIT –II

1 List what advantages does java’s break statement have over C’s andC++’s break statement. Knowledge b

2 State whether static binding is more reliable or dynamic binding. Explain why. Knowledge b

UNIT –III

1 Compare the parameter passing mechanisms of ALGOL and ADA. Analysis , Evaluation c

2 State the importance of Local Referencing Environments with suitable examples. Knowledge b

3 Discuss about different parameter passing methods of Ada language. Comprehension cUNIT –IV

1Discuss the reasons for using exception handlers in a programming language. What if there exist programming languages with no exception handlers.

Comprehension b

2 Give the sample code to factorial of a number in PROLOG language. Comprehension c

3 Sketch the importance of logic programming languages over functional programming languages. Understand d

UNIT –V

1 Write features of Haskell that makes very different from schema. Application, Synthesis b

2 List the ways in which ML is significantly different from scheme. Knowledge c

3 Prove the advantages of Python scripting language over other scripting languages Understand d

4 Give example of Python code to find the roots of quadratic equation Comprehension c

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 36

10. LINUX PROGRAMMING (A10520)

10.0 COURSE DESCRIPTION

Course Title LINUX PROGRAMMINGCourse Code A10520Regulations MLR-15

Lectures Tutorials Practical’s CreditsCourse Structure

4 - - 4Course Coordinator T Chandra Shakar Reddy Assoc Professor CSE

Team of Instructors Mr Dayakar Reddy Assoc. Professor/Mrs Prameela Asst.Professor/Mr.Amarendar Reddy Assoc. Professor CSE

10.1 COURSE OVERVIEW:

This course explains the fundamental ideas behind the open source operating system approach to programming. Knowledge of Linux helps to understand OS level programming. Like the successful computer languages that came before, Linux is the blend of the best elements of its rich heritage combined with the innovative concepts required by its unique environment. This course involves kernel concepts, basics commands, shell scripting, file processing ,Socket programming ,multithreading, Processes, Inter process communication. This course is presented to students by power point projections, course handouts, lecture notes, course handouts, assignments, objective and subjective tests

10.2 PREREQUISITES:

Level Credits Periods/Weeks PrerequisitesUG 3 5 UNIX, AND NETWORK PROGRAMMING

10.3. MARKS DISTRIBUTION:

Session Marks University EndExam Marks Total Marks

Mid Semester TestThere shall be two midterm examinations.Each midterm examination consists of subjective type and objective type tests.The subjective test is for 10 marks of 60 minutes duration.Subjective test of shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.AssignmentFive marks are earmarked for assignments.There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.

75 100

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 37

10.4 EVALUATION SCHEME:

S. No Component Duration Marks1 I Mid Examination 90minutes 202 I Assignment 53 II Mid Examination 90minutes 204 II Assignment 55 External Examination 3 hours 75

COURSE OBJECTIVES:

I. To teach principles of operating system including File handling utilities, Security by file permissions, Process utilities, Disk utilities, Networking Commands, Basic Linux commands, Scripts and filters.

II. To familiarize fundamentals of the Bourne again shell (bash), shell programming, pipes, input and output redirection Control structures, arithmetic in shell interrupt processing, functions, debugging shell scripts.

III. To impart fundamentals of file concepts kernel support for file, File structure related system calls (file API‘s).

IV. To facilitate students in understanding Inter process communication. V. To facilitate students in understanding semaphore and shared memory.

VI. To facilitate students in understanding multithreading and process.

10.5 COURSE OUTCOMES:Upon successful completion of the course, the student should be familiar with and be able to:

a. Ability to use various Linux commands that are used to manipulate system operations at admin level and a prerequisite to pursue job as a Network administrator.

b. Ability to write Shell Programming using UNIX commands. c. Ability to design and write application to manipulate internal kernel level Linux File

System. d. Ability to develop IPC-API‘s that can be used to control various processes for

synchronization. e. Ability to develop Network Programming that allows applications to make efficient

use of resources available on different machines in a network.

10.6 HOW PROGRAM OUTCOMES AREASSESSED:

Program Outcomes Level Proficiency assessed by Blooms Level

A

An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.(Fundamental engineering analysis skills).

HSolving Gate and Text book Problems

Apply

BAn ability to design and conduct engineering experiments, as well as to analyze and interpret data. (information retrieval skills).

SSolving Gate and Text book Problems

Apply

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 38

CAn ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. (Creative skills).

H Assignment andGate questions

Apply andAnalyze

DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. (team work)

S Mini and Micro Projects Apply

E

An ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.(Engg. Problem solving Skills)

SMicro Project Models/ Gate questions

Apply

F An understanding of professional, social and ethical responsibility N ------- --------

G

An ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements. (Engg. Application Skills)

SMicro Projects models / Gate questions

Analyze and Justify

HThe broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.

H Assignment andGate questions Analyze

I

Graduate will develop confidence for self education and acquire new knowledge in the computing discipline and ability and practice for Multidisciplinary tasks as a member within the teams

S Class Test & Seminars Analyze

J To communicate effectively S Seminars Understand & Analyze

K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. S

Class Tests & Group Activity inclass room

Apply

LGraduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc.(Continuing Education )

H GATE Apply

M

The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.

SText Book Problems as part of Assignment

Apply

N An ability to setup an enterprise.(Employment Skills) S Placement Design and Develop

10.7 SYLLABUS

UNIT - I INTRODUCTION TO LINUX AND LINUX UTILITIES: A brief history of LINUX, architecture of LINUX, features of LINUX, introduction to vi editor. Linux commands- PATH, man, echo, printf, script, passwd, uname, who, date, stty, pwd, cd, mkdir, rmdir, ls, cp, mv, rm, cat, more, wc, lp, od, tar, gzip, file handling utilities, security by file permissions, process utilities, disk utilities, networking commands, unlink, du, df, mount, umount, find, unmask, ulimit, ps, w, finger, arp, ftp, telnet, rlogin.Text processing utilities and backup utilities , detailed commands to be covered are tail, head , sort, nl, uniq, grep, egrep, fgrep, cut, paste, join, tee, pg, comm, cmp, diff, tr, awk, cpio

UNIT - II Introduction to Shells: Linux Session, Standard Streams, Redirection, Pipes, Tee Command, Command Execution, Command-Line Editing, Quotes, Command Substitution, Job Control,

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 39

Aliases, Variables, Predefined Variables, Options, Shell/Environment Customization. Filters: Filters and Pipes, Concatenating files, Display Beginning and End of files, Cut and Paste, Sorting, Translating Characters, Files with Duplicate Lines, Count Characters, Words or Lines, Comparing Files.

UNIT - III Grep: Operation, grep Family, Searching for File Content.Sed :Scripts, Operation, Addresses, commands, Applications, grep and sed.FILE STRUCTURE: Introduction to UNIX file system, inode (Index Node), file descriptors, system calls and device drivers, File Management :File Structures, System Calls for File Management – create, open, close, read, write, lseek, link, symlink, unlink, stat, fstat, lstat, chmod, chown, Directory API – opendir, readdir, closedir, mkdir, rmdir, umask.

UNIT - IV PROCESS AND SIGNALS: Process, process identifiers, process structure: process table, viewing processes, system processes, process scheduling, starting new processes: waiting for a process, zombie processes, fork, vfork, exit, wait, waitpid, exec, signals functions, unreliable signals, interrupted system calls, kill, raise, alarm, pause, abort, system, sleep functions, signal sets. Filelocking: creating lock files, locking regions, use of read and write with locking, competing locks, other lock commands, deadlocks.

UNIT - V INTER PROCESS COMMUNICATION: Pipe, process pipes, the pipe call, parent and child processes, and named pipes: fifos, semaphores: semget, semop, semctl, message queues: msgget, msgsnd, msgrcv, msgctl, shared memory: shmget, shmat, shmdt, shmctl, ipc status commands. INTRODUCTION TO SOCKETS: Socket, socket connections - socket attributes, socket addresses, socket, connect, bind, listen, accept, socket communications.

TEXT BOOKS: 1. W. Richard. Stevens (2005), Advanced Programming in the UNIX Environment, 1st

edition, Pearson Education, New Delhi, India. 2. UNIX and shell Programming Behrouz A. Forouzan, Richard F. Gilberg. Thomson.

REFERENCES: 1. Linux System Programming, Robert Love, O’Reilly, SPD. 2. Advanced Programming in the UNIX environment, 2nd Edition, W.R. Stevens,

Pearson Education. 3. UNIX Network Programming, W.R. Stevens, PHI. 4. UNIX for Programmers and Users, 3rd Edition, Graham Glass, King Ables, Pearson

Education.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 40

10.8 COURSE PLAN:The course plan is meant as a guideline. There may probably be changes

S.No

Course LearningOutcomes

LectureNo.

BloomsLevel Topics to be covered Reference

1 Classify history of Linux and Its features 1-2 Apply

[Level 3]

A brief history of Linux, architecture of Linux, features of Linux http://nptel.ac.in/courses/117106113/1

T2: Ch 1.1, 2.1-2.2

R7 Ch1.1,1.2

2Examine system level scripts to create and manage simple file processing operations.

3-4 Evaluate[Level 5]

Linux utilities-File handling utilities, Security by file permissions http://nptel.ac.in/courses/117106113/1 http://nptel.ac.in/courses/117106113/2

T2: Ch4.7-4.8,5.3-5.4

R7 Ch 3 &4

3 Evaluate manipulating of information. 5-6 Understand

[Level 2]

Process utilities, disk utilities, Networking commands, Filters http://nptel.ac.in/courses/117106113/2 http://nptel.ac.in/courses/117106113/3 http://nptel.ac.in/courses/117106113/4

T2:Ch3.10,15.6,17.5-17.6

R7 Ch6

4 Determine restoring and retrieving text. 7-8 Evaluate

[Level 5]

Text processing utilities, Backup Utilitieshttp://nptel.ac.in/courses/117106113/4

T2: Ch12.3-12.9,15.9-

15.10R7 Ch3,10

5 Apply two data buffers: the active pattern space. 9-10 Apply

[Level 3]

sed– scripts, operation, addresses, commands, applications http://nptel.ac.in/courses/117106113/4

T2:Ch 13.4

R7 Ch11

6Distinguish pattern scanning and processing in problem solving.

11-12 Understand[Level 2]

awk– execution, fields and records, scripts, operation, patterns, actions, Functions, using system commands in a wk. http://nptel.ac.in/courses/117106113/7 http://nptel.ac.in/courses/117106113/4

T2: Ch18.1-18.12

R7 Ch12

7 Classify basic shell scripting. 13-14 Create[Level 6]

Working with the Bourne again shell(bash): introduction, shell responsibilities, pipes and input Redirection, output redirection

T2: Ch8.5

R7 Ch5.3,5.4,5.5

8 Understand shell script execution. 15 Apply

Level 3 Documents, running a shell script T2:Ch14.14

9 Classify the use of special characters. 16 Understand

[Level 2]

The shell as a programming language,shell meta characters, filename substitution

T2:Ch8.9

10Apply forwarding the command output into another context

17-18 Understand[Level 2]

Shell command substitution, shell commands, environment, quoting, test

command, control structures

T2:Ch 8.4,8.10

R7 Ch5.8,5.9

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 41

11 Convert solutions to complex tasks. 19-20 Understand

[Level 2]

Arithmetic in shell, shell script examples, interrupt processing, functions, debugging shell scripts.

T2:14.5-14.17

12 Demonstrate the use of the formatting specifies of I/O. 21 Apply

[Level 3]

Files: File Concept, files system structure, Inodes, file attributes, file types, library functions http://nptel.ac.in/courses/117106113/4

R4:4.1-4.14

13Create standard stream and buffer based input and output system calls.

22-23 CreateLevel 6

The standard I/O (fopen, fclose, fflush, fseek, fgetc, getc, getchar, fputc, putc, putchar, fgets, getsetc.)

R4:5.1-5.9

14 Determine layout of what's being printed. 24 Evaluate

[Level 5]

Formatted I/O, stream errors, kernel support for fileshttp://nptel.ac.in/courses/117106113/4

R4:5.10-5.11

15 Explain modification and editing. 25-26 Understand

[Level 2]

File descriptors ,low level file access open, create, read, write, close, lseek, stat family,umask,dup,dup2http://nptel.ac.in/courses/117106113/4

R4:3.1-3.12,4.2

16 Demonstrate security concepts in files. 27-28 Explain

[Level 2] fcntl, file and record locking R4:3.13

17 Create scanning and linking methods. 29-30 Create

[Level 6]

File and directory management- Directory file APIs, symbolic links and hard links. http://nptel.ac.in/courses/117106113/7

R4:4.20-4.22,4.15-4.17

18 Evaluate internal procedures and states of IPC 31-32 Evaluate

[Level 5]

Process kernel support for process, Process attributes, process hierarchy, states, process composition, process creation and termination http://nptel.ac.in/courses/117106113/3 http://nptel.ac.in/courses/117106113/4

R4:8.1-8.9

19 Classify daemons and varieties of processes 33-34 Apply

[Level 3]

Zombie process, orphan process.http://nptel.ac.in/courses/117106113/3

R4:8.6

20Estimate processes to respond to asynchronous events. 35

Understand[Level 2]

Signals – Introduction to signals, Signal generation and handling, Kernel support for signals, Signal function. http://nptel.ac.in/courses/117106113/3

R4:10.1-10.3

21 Assess and to handle exceptional situations. 36-37 Evaluate

[Level 5]

Unreliable signals, reliable signals, kill, raise, alarm, Pause, abort, and sleep functions.http://nptel.ac.in/courses/117106113/3

R4:10.4-10.19

22 Distinguish inter related process communication 38-39 Apply

[Level 3]

Inter process Communication: Introduction to IPC, IPC between processes on a single computer system, IPC between processes

R4:14.1-14.4

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 42

on different systems, pipes.

23 Understand named pipes. 40 Understand[Level 2] FIFOs and examples. R4:14.5

24Create types of restricting and accessing different resources.

41 Create[Level 6]

Introduction to three types of IPC (Linux)-message queues, semaphores and shared memory.

R4:14.6

25Apply dividing up work among to balance work over multiple processes.

42-43 ApplyLevel 3

Message Queues- Kernel support for messages, Linux APIs for messages, Client/server example.

R4:14.7

26Distinguish user variables and semaphore operations, provided at the kernel level.

44 Understand[Level 2]

Semaphores- Kernel support for semaphores R4:14.8

27Understand security hurdles using programming interface of Linux

45-46 Understand[Level 2]

File locking with semaphores. Linux APIs for semaphores R4:14.8

28Distinguish common memory portion which other processes

47 Understand[Level 2]

Shared Memory- Kernel support for Shared memory R4:14.9

29 Apply common memory sharing interfacing example. 48-49 Apply

[Level 3]Linux APIs for shared memory, semaphore and shared memory R4:14.9

30 Create parallelism in Linux based system calls. 50-51 Create

Level 6

Multithreaded Programming–Differences between threads and processes, thread structure and uses, threads and light weight Processes.

T1:13.1-13.2

31 Asesss concurrency in Linux APIs. 52 Evaluate

[Level 5]POSIX Thread APIs, Creating Threads Thread attributes T1:13.4

32Compute multiple processes to a common resource in Linux based parallel

53-54 Understand[Level 2]

Thread synchronization with semaphores T1:13.5

33Demonstate multiple threads access the same resource for read and write.

55-57 Explain[Level 2]

Thread synchronization with mutexes, Example programs T1:13.5

34 Apply end to end network communication 58 Apply

[Level 3]

Sockets: introduction to socketshttp://nptel.ac.in/courses/117106113/6

R2:15.1

35 Understand tcp based system calls 59-60 Understand

[Level 2]

Socket system calls for connection Oriented protocol

http://nptel.ac.in/courses/117106113/6

R2:15.5

36 Examine udp protocol system calls 61-62 Evaluate

[Level 5]

Connectionless protocolhttp://nptel.ac.in/courses/117106113/6

R2:15.5

37

Apply connection oriented, connectionless communications in two and three

63-64 Apply[Level 3]

Example-client/server programshttp://nptel.ac.in/courses/117106113/6

R2:15.5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 43

SESSION PLANNER

S. No Unit No Class Topic Session Objectives Text/Ref

BookDate

PlannedDate

Conducted

1. L1 Introduction to Linux operating system

1.Understands the architecture of linux operating system

T1

2. L2File handling utilities, Security by file permissions

1.Understands the basic file permissions 2.Understands the file handling utilities

T1

3. L3 Process utilities ,Disk utilities

1.Understand the basic process utilities 2.Understand the basic disk utilities

T3

4. L4 Networking commands

Understand the basic networking commands

T3

5. L5 Filters Understand the basic filters T2

6. L6Text processing utilities, Backup utilities

1.Understand the basic processing utilities 2.Understand the basic backup utilities

T1

7. L7 Sed: scripts ,operation, addresses

1.Understand how to use operation 2.Understand how to use addresses

T2

8. L8 Sed: commands, applications

1.Understand how to construct commands in sed

T1

9. L9

Awk: execution, fields, records, scripts, operation, pattern, Actions, functions, using commands in awk

1.Understand how to relate fields & records 2.Understand how to construct commands in awk

T1

10. L10

Working with the Bourne again shell(bash): Introduction

Understand how to work with bash shell

T3

11. L11 Shell responsibilitiesUnderstand the Shell responsibilities

T3

12. L12

Pipes, input and output redirections , Here document, running a shell script,

1.Design of pipes and Redirection 2.Understand how to run a shell script

T3

13.

I

L13

The shell as a programming language, shell meta characters, file name

Identify Data structure in shell meta characters

T3

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 44

substitutions Shell variables

14. L14

Command substitution, shell commands, the environment, quoting, test commands

1.Identify shell command 2.Identify test command

T3

15. L15 Control structures, arithmetic in shell

1.Understand how to use control structures 2.Understand how to use arithmetic in shell

T3

16. L16

Interrupt processing, functions, debugging shell scripts, shell script examples

1.Understand how to use functions 2.Understand how to write shell scripts

T3

18. L17Files: file concepts, file system structures, in odes

1.Understand basic file concepts 2.Understand basic file structure

T1,T3

19. L18 File metadata, file types

1.Understand about file metadata 2.Understand different file types

T1,T3

20. L19kernel support for file system, file descriptors,

Understand how kernel suppoprts file system 2.Understand how to use file descriptors

T1,T3

21. L20

System calls for file I/O operations (File APIs)- -open, creat, read, write, close

Understand how to execute I/O operations

T1,T3

22. L21lseek,dup2, file status information-stat family

Understand about file status information

T1,T3

23.

II

L22 file and record locking- fcntl function

Understand how to use locking on files and records

T1

24. L23

file permissions-chmod, fchmod,file ownership-chown. lchown, fchown

1.Understand how to use change file permissions of files 2.Understand how to change ownership of files

T1,T3

25. L24links-soft links and hard links-symlink, link, unlink

Understand how to use links to link files

T1,T3

26. L25

Directories- Creating, removing and changing, Directories-mkdir, rmdir, chdir,

1.Understand how to cretae directories 2.Understand how to change directories

T1

27.

II

L26 obtaining current working directory-

1.Understand how to check current T1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 45

getcwd working directory

28. L27 Directory contents, Scanning Directories-

1.Understand how to check contents in a directory

T1

29. L28opendir, readdir, closedir, rewinddir functions

1.Understand how to perform operations on directory 2.Understand the functions of directory

T1

30. L29

Process : process concept, Layout of C program image in main memory

1.Understand the basic concept of process 2.Understand the layout of C program

T1

31. L30

Process environment- environment list, environment variables, getenv, setenv

1.Understand how to get environment variables 2.Understand how to set environment variables

T3

32. L31 Kernel support for process

Understand how kernel support process

T3

33. L32

Process identification, process control- process creation, replacing a process image, waiting for a process, process termination

1.Understand how to identify, create a process 2.Understand how to replace process image and how to terminate the process

T3

34. L33 zombie process, orphan process

1.Understand zombie process 2.Understand orphan process

T3

35. L34

system cal interface for process management- fork, vfork, exit, wait, waitpid, exec family

Understand system cal interface for process management

T3

36. L35

process groups, session and controlling terminal, differences between threads and processes.

1.Understand how to process session and terminal 2.Differentiate between threads and processes

T1

37. L36

Signals: Introduction to signals, signal generation and handling

1.Understand basic of signals 2.Understand signal generation and handling

T1

38.

III

L37

kernel support for signals, signal function, unreliable signals, reliable signals, kill, raise,

1.Understand how kernel will support signals 2.How kernel support reliable

T1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 46

alarm, pause, abort, sleep functions

signals, unreliable signals

40. L38

Inter process communication: introduction to IPC, , IPC between processes on a single computer system

1.Understand how to interact with system by using IPC.2.Understand basic concept of IPC

T3,T1

41. L39IPC between processes on different systems

Understand how to interact with different systems by using IPC

T3,T1

42. L40

pipes-creation, IPC between related processes using unnamed pipes

1. Understand how to create pipes. 2.Relate processes using unnamed pipes

T3,T3

43. L41

FIFOs-creation, IPC between unrelated processing using FIFOs( named pipes)

1. Understand how to create FIFO. 2.Relate processes using FIFO(named pipes)

T3,T1

44. L42

Differences between unnamed and named pipes, popen and pclose library functions.

1.Differentiate between unnamed and named pipes 2.Understand library functions

T3

45. L43

Message queues: kernel support for message queues , Unix system V APIs for messages,

1. Understand how kernel will support message queues. 2.Differentiate between unix systems and APIs

T3

46. L44 client/server examples

1.Construct programs for client 2.Construct programs for server

T3

47. L45Semaphores –kernel support for a semaphores

Understand how kernel will support semaphores

T3

48. L46 Unix system V APIs for semaphores

Differentiate between unix systems and APIs for semaphores

T3

49.

IV

L47 File locking with semaphores

Understand how file locking concept is used for semaphores

T3

50. L48Shared memory-kernel support for a Shared memory

Understand how kernel will support shared memory

T3

51.

V

L49 Unix system V APIs for Shared memory

Differentiate between unix systems and APIs for shared memory

T2

53. L50Semaphore and shared memory with examples

1.Understand how to write programs for semaphore

T2

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 47

2.Understand how to write programs for shared memory

54. L51 Sockets: introduction to Berkeley sockets

Understand basics about sockets T3

55. L52 IPC over a network, Client-Server model

1.Understand IPC 2.Understand client server model

T3

56. L53

Socket address structures (Unix domain and Internet domain)

1.Understand the address structure of sockets 2.Differences between unix domain and internet domain

T3

57. L54

socket system calls for connection oriented protocols and connectionless protocol

1.Understand differences between connection oriented protocols and connectionless protocol

T3

58. L55

Example-client/server programs-Single server-client connection

1.Understand how to write client/server programs 2.Understand how to connect single server-client

T3 & w1

59. L56

Example-client/server programs-Single server-client connection

1.Understand how to write client/server programs 2.Understand how to connect single server-client

T3

60. L57 Multiple simultaneous clients

Understand Multiple simultaneous clients

T3

61. L58 Multiple simultaneous clients

Understand Multiple simultaneous clients

T3 & w1

62. L59 Socket options-set socket

Understand socket options and set options

T3

63. L60 fctl system calls Understand fctl system calls T3

64. L61 Comparison of IPC mechanisms.

Understand comparison of IPC mechanisms

T3

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 48

10.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Course OutcomesOutcomes

Course Objectives a b c d e

I S SII H H S SIII S S H HIV S S S SV H S H HVI H H S S

S = Supportive H = Highly Related

10.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF ROGRAM OUTCOMES:

ProgramCourseOutcomes A B C D E F G H I J K L M N

a S H H S S S S Sb S H S H H H H Hc H H H H H S Sd S H S S H S H S

e S S S H H

S= Supportive H= Highly relative

10.11 OBJECTIVEQUESTIONS

UNIT-I1. Who developed UNIX?

A. Ken ThompsonB. Dennis Ritchie,C. Douglas MacllroyD. Ken Thompson, Dennis Ritchie,

2. What is ‘ps’ command for?A. prints the statusB. prints the process statusC. prints the execution statusD. None

3. Which command is used to terminate the process?A. WaitB. SleepC. KillD. None

4. Which comma and is use for the copy in unix?A. copyB. cpC. cpy

5. Which symbol will be used with grep command to match the pattern pat at the beginning of a line?

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 49

A. ^patB. $patC. pat$D. pat^

6. Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?A. chmodu+xemp[l-3]B. chmod 777 emp*C. chmodu+r ??? empD. chmod 222 emp?

7. Which of the following keys is used to replace a single character with new text?A. SB. sC. rD. C

8. Using the grep command, how can you display or print the entire file contents?$ grep '.*' file

9. What is the difference between a local variable and environment variable in Linux? A local variable is the one in which the scope of the variable is only in the shell in which it is defined. An environment variable has scope in all the shells invoked by the shell in which it is defined.

10. What does the 'execute' permission in a directory stand for? Without the execute permission on a directory, the user will not be able to traverse or in other words, do a "cd" to the directory.

11. How to find the total number of arguments in a shell script in Linux?12. x and y are two variables containing numbers? How to add these 2 numbers?

$ expr $x + $y13. How to add a header record to a file in Linux?

$ sed -i '1i HEADER' file14. How to find the list of files modified in the last 30 mins in Linux?

$ find . -mmin -3015. How to find the list of files modified in the last 20 days?

$ find . -mtime -2016. How to print the contents of a file line by line in Linux?

$ while read line do>echo $line> done < file

17. How to find the files modified exactly before 30minutes?$ find . -mmin 3018. A string contains a absolute path of a file. How to extract the filename alone from the

absolute path in Linux?$ x="/home/guru/temp/f1.txt"$ echo $x | sed 's^.*/^^'

UNIT-II1. How to find the total number of a lines in a file in Linux?

$ wc -l file | awk '{print $1}'2. How to print the first line or the header record in a file?

$ head -1 file3. How to replace all occurrences of "Unix" to "Linux" in a file?

$ sed 's/Unix/Linux/g' file

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 50

4. How to make the above changes permanent in the file?$ sed -i 's/Unix/Linux/g' file

5. How to replace only the first occurrence of "Unix" to "Linux" in a string in Linux?$ sed 's/Unix/Linux/' file

6. How to replace only the second occurrence of "Unix" to "Linux" in a string in Linux?$ sed 's/Unix/Linux/2' file

7. How to add leading zeros to every line in a file in Linux?$ sed 's/^/0000/' file

8. How to add trailing zeros to every line in a file in Linux?$ sed 's/$/00/' file

9. How to get yesterday's date in Linux?$ date -d "1 day ago"

10. After logging in to your account in Linux, you did "cd log". There was no "log" directory under the current directory, still the "cd" command traversed to a log directory under a different location? How it happened?It is because the CDPATH variable is set.

11. How to zero pad a number in Linux? Say, to zero pad a number to 4 places:$ x=20$ printf "%04d\n" $x

12. How to find all the .c and .h files in Linux?$ find . -name "*.[ch]"

13. How to find the list of all the .c files and display only the file name, instead of the default find output which includes the relative path?$ find . -name *.c | sed 's^.*/^^'

14. How to copy a file with the same time stamp as the source file in Linux?$ cp --preserve=timestamp file1 file2 15.what is the file server in Linux server?Answer - File server is used for file sharing. It enables the processes required fro sharing.......

16. What is NFS? What is its purpose?Answer - NFS is Network File system. It is a file system used for sharing of files over a network.....

17. How do you find out what’s your shell? - echo $SHELL 18.What’s the command to find out today’s date? - date

19. What’s the command to find out users on the system? - who20. How do you find out the current directory you’re in? - pwd21. How do you remove a file? - rm

UNIT-III1. What are various IDs associated with a process?

A. getpid() -process idB. getppid() -parent process id C. getuid() -user id D. geteuid() - effective user id

2. Explain fork() system call. The `fork()' used to create a new process from an existing process.

3. Predict the output of the following program code main(){fork();printf("Hello World!");} Answer:HelloWorld!Hello World!

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 51

4. Predict the output of the following program code main(){fork(); fork(); fork(); printf("Hello World!");}Answer:"Hello World" will be printed 8 times.5. List the system calls used for process management:1)fork() 2)exec() 3)wait() 4)exit()

5)getpid() 6)getppid() 7)nice() 8)brk()6. How can you get/set an environment variable from a program? Getting the value of an

environment variable is done by using `getenv()'. Setting the value of an environment variable is done by using `putenv()'.

7. How can a parent and child process communicate? A parent and child can communicate through any of the normal inter-process communication schemes (pipes, sockets, message queues, shared memory.

8. What is a zombie? When a program forks and the child finishes before the parent, the kernel still keeps some of its information about the child in case the parent might need

9. What are the process states in Unix? 1) Running 2) Waiting 3) Stopped 4) Zombie10. What is the use of ‘ps’ command in UNIX system?

Ans:‘ps’ command is used to show status of all processes currently running on the system.

11. How do you terminate a process in UNIX system?Ans:‘kill’ command is use to terminate a process.

12. What should be done by ’who’ command in UNIX system? Ans:‘who’ command reports who is logged in that present time.

13. use of ‘which’ command in UNIX system?Ans:‘which’ command will report the name of the file that is be executed when the command is invoked.

14. What is the use of ‘whereis’ command in UNIX system?Ans:‘whereis’ command reports the filenames of source, binary, and manual page files associated with command.

15. With what can you stop a process? 1. Stop 2.Shutdown 3.Kill 4.Delete16. The following socket provides two way, sequenced, reliable and unduplicated flow

of data with no record boundaries..A. Sequential packet socket B. Datagram socket C. Stream socket D. Raw socket

17. Identify the point(s) that is not true w.r.t. signalsA. Signals are software generated interrupts that are sent to a process when an event

happensB. Signal delivery is analogous to hardware interrupts in that a signal can be blocked

from being delivered in the future.C. Most signals are synchronous by nature.D. Most signal cause termination of the receiving process if no action is taken by the

process in response to the signal.18. With what command you can see your user name? Who am i19. How can you display a list of all files, including the hidden files? ls -a20. With what command you can see what folder you are in? pw

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 52

UNIT-IV1. Following unix system call is used to open a message queue to access it. [ a]

A. msgget() B. msgsnd() C. msgrcv() D. msgctl()

2. Message queues are created in [b ] OCT-2013A. user spaceB. kernel space C. both D. none

3. Advantage of FIFO over pipe is [b ]A. Related processes can communicateB. Unrelated processes can communicateC. a&b D. None

4. The IPC methods supported by UNIX system are [d ]A. messages B. shared memory C. semaphores D. All

5. Like messages, semaphores are stored in a1Kernel address space and are persistent, despite their creator process’s termination.

6. The function prototype of the shmdt is Intshmdt(void *addr).7. To implement as message queue using semaphores and shared memory, the shared

memory provides a Kernel memory region to store any messages sent to the queue.8. IPC is a mechanism whereby two or more processes communicate with each other to

perform tasks. OCT-20139. Which is the fastest form of IPC [a]

A. Shared memory B. Semaphore C. FIFO & Pipe D. Message queue

10. The maximum number of semaphore allowed per set is defined by [c]A. SEMMNI B. SEMMNS C. SEMMSL D. SEMOPM

11. A process should have this permission for semaphores too increase or decrease their values [a]A. Write B. Read C. a or b D. Both a and b

12. Semaphore synchronizes the execution of multiple processes.13. The 0, 1 value of the semaphore set indicates that the server is waiting for a client to

send message.14. FIFOs are also known as [ a]

A. named Pipes B. unnamed Pipes

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 53

C. unanimous Pipes D. structured Pipes

15. Which of the following is not a System V IPC mechanism? [ d]A. semaphores B. shared memory C. message queues D. fifos

16. The IPC mechanism that is used to provide locking facility is [a ]A. semaphores B. shared memory C. pipes D. fifos

17. Messages are retrieved from a queue by using Megrcv( ) function.18. Fifos are used by shell commands to pass data from one shell pipeline to another,

without creating intermediate temporary files.19. msgsnd() [c ]

A. To access the member of message queue B. To create message queueC. To send message to queue D. To receive message from queue

20. In binary semaphores value of semaphore = 0 [ a]A. resource is locked B. resource is available C. resource is unavailable D. none

UNIT-V1. Function creates a semaphore whose name is given [ a] by the name argument.

A. sem_open() B. sem_create() C. sem_init() D. All of the above

2. Which of the following option described about thread data structure is/are false? [d ]A. A set of registers B. A run-time stackC. A signal mask D. None

3. Shared memory allows multiple processes to map a portion of their virtual addresses to a common memory region. OCT-2013

4. Which function is called to create a child process [ c]A. Pipe() B. create()C. fork() D. mknode

5. The return value of segment function on success [ c]A. 0 B. -1 C. positive integer D. negative integer

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 54

6. Pipes and, FIFOs provide unidirectional flow of data.7. PIPE_BUF constant specifies the buffer size of the kernel’s pipe.8. Msgctl function is used to control the operations on message queue9. The system call that is used to alter the permissions and other characteristics of a

shared memory segment. [ c]A. shmget( ) B. shmat( ) C. shmctl( ) D. shmdt( )

10. Mutual Exclusion is done by using [a ]A. semop( ) B. shmop( ) C. msgop( ) D. semctl( )

11. Messages Queues are a linked list of messages stored within the kernel and identified by a Queue ID.

12. The API that is used to create a shared memory is Shmget( ).13. In shmctl() the cmd IPC_STAT specifies [ c]

A. to remove shared memory area B. to get the shared memory structure shmid_dsC. to get the status of shared memory from shmid_ds D. both b & c

14. The function used to detach the shared segment from the user process is shmdt().15. Pies are created at Kernel space.16. System call to create named pipe mknodpipename p17. Process is program under execution18. The most efficient thread synchronization object is [ c]

A. Semaphores B. shared memory C. mutex locks D. exclusive locks

19. How many times can a mutex lock be initialized in a process? [ b] (a) 2 (b)1 (c) 4 (d) 3 Which of the following sock.h header does belong to sock class [ a]A. #ifndef SOCK_H B. #include<time.h>C. define PSOCK_H D. #include<conio.h>

20. Which of the thread manipulation comes under POSIX.1c thread API? [ c]A. pthread_create, pthread_destroy B. pthread_wait, pthread_joinC. pthread_create, pthread_kill D. pthread_resume, pthread_exit

21. Bound threads are used primarily if they need _ [ d]A. To be scheduled by the kernel for real time processingB. To have their own alternate signal stacksC. To have their own alarms and timers D. All of the above

22. A Process is a program under execution. OCT-201223. Threads do not have their own address spaces but share with their parent Processes.24. The most efficient thread synchronization object is Mutex locks

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 55

25. The thread is created by function in posix. [c ]A. thr_create B. thr_get C. pthread_create D. pthread_get

26. The threads are scheduled by the kernel for real-time processing and have their own alternative signal stacks. [a ]A. bound B. unbound C. light-weight D. heavy-weight

27. A Thread is a piece of program code executed in a serial fashion.28. Multi threaded programming improves process throughout and responsiveness to users.

Nov- 2012-IT29. The thread is terminated by Pthread_exit( ) function in posix.30. Each thread has a unique [ d]

A. Thread ID B. set of registers C. stack pointer D. all

31. pthread_exit() used to [ a]A. Explicitly exit a thread B. Closes all the threads C. both a & b D. none

32. Command used to create a thread is [a ]A. pthread_create() B. start_routine() C. both a & b D. none

33. The name to a socket is assigned by Bind system call.34 The IPV4 socket structure is also known as Internet socket address structure.35 The API that is used to specify the number of pending client messages that can be

queued for a server socket. [ d]A. socket( ) B. bind( ) C. accept( ) D. listen( )

36. Sockets exhibits a behaviour with the read and write functions that differ from normal file I/O. [ c] Nov-2012-ITA. datagram B. raw sockets C. stream D. sequenced packets

37. The function that assigns a local protocol address to a socket is [b ]A. accept( ) B. bind( ) C. connect( ) D. listen( )

38. The Sockets provides protocol-independent network interface services to support IPC

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 56

over a LAN.39. The Stream sockets establish a virtual circuit for communication, where the messages

are sent in a sequenced, reliable and two-way connection-based byte stream.40. TELNET used TCP protocol for data connection41. Transport layer of OSI model lies between Network and Data Link layer.42. MAC addresses are also known as Ethernet hardware adress43. What is the size of an IP address? [a ] a)128 bits b) 64 bits c)1024 d)8 bits44. A network router joins two together? [d ]

A. Switch B. hub C. computers D. networks

45. What is the full form of URL? [b ]

10.12 TUTORIAL QUESTIONS BANKPART-A (SHORT ANSWER QUESTIONS)

S. No. QuestionsBloom’s

Taxonomy Level

Course Outcome

UNIT-I1. Explain importance of pyramid architecture in Linux? Knowledge 12. Explain kernel and its importance in security concepts of Linux? Understand 23. Explain different types of shells in Unix/Linux? Knowledge 24. Differentiate BASH and CSH? Knowledge 15. Explain vi editor and some editing commands in Linux? Knowledge 26. Explain listing of files in Linux? Knowledge 17. Explain links and its uses in Linux? Knowledge 28. Illustrate moving of files in Linux environment with examples? Understand 29. Illustrate ‘rlogin’ command with example? Understand 110. Illustrate ‘telnet’ command with example? Understand 111. Explain ftp and its importance in Unix? Knowledge 212. Explain importance of arp in Linux Understand 113. Differentiate tar and cpio commands? Understand 114. Illustrate creating a new directory in Linux with example? Knowledge 215. Explain deleting of directory and its contents with examples? Understand 116. Differentiate copying and moving files in Linux environment? Understand 117. Explain about ‘comm’ command? Knowledge 218. Explain about ‘grep’ command? Understand 119. Explain about ‘awk’ command? Understand 120. Explain about ‘tee’ command? Knowledge 221. Differentiate between a processes and program? Understand 122. Illustrate about job control commands with examples? Understand 123. Explainabout background job and foreground job in Linux? Knowledge 224. Explain about ‘ps’ command Understand 125. Explain about ‘telnet’ command Understand 126. Explain about ‘ulimit’ command ulimit. Knowledge 2

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 57

27. Illustrate ‘pg’ command with example? Understand 128. Illustrate ‘more’ command with example? Understand 129. Illustrate and permissions in Linux environment? Knowledge 430. Explain the security and compare with windows and dos operating systems? Understand 5

31. Explain how Unix operating system provides more security than any other operating system. Knowledge 5

32. Explain command substitutions with examples? Knowledge 333. Explain add, delete, view, actions in Linux env? Knowledge 334. Explain how debugging can be done in a shell script. Knowledge 435. Explain printing login information. Knowledge 436. Differentiate between different types of shells available in UNIX. Knowledge 4

37.Demonstrate shell program for the following scenario where printing current time in upper right corner of the screen, while user can do normal job at prompt.

Understand 4

38. Explain the significance of single quote and double quote. Understand 5

39. What does the shell do with the meta characters if it finds in the command line? Knowledge 4

40. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 4

41. Distinguish between user Defined variables and environment variables with example? Understand 5

42. Describe about I/O Redirection operations in Linux? Knowledge 5

43. Describe any four built in variables in Shell and Demonstrate their usage by example? Knowledge 3

44. Explain by script to display GOOD MRNG, GOOD AFTERNOON, GOOD NIGHT based on system time whenever user logs on. Knowledge 4

45. Write about here documents? Understand 5

46. Write a shell script that determines the period for which a specified user is working on the system? Knowledge 5

47. Explain how the shell treat a command line passed to it. Knowledge 348. Write a shell script to find and delete all file with the word “Unix". Knowledge 449. Briefly Describe various shell and environment various. Understand 5

50. Write a shell script to count the specified number of lines in a text file without using wc command Understand 5

51. What does the shell do with the meta characters if it finds in the command line? Knowledge 5

52. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 3UNIT – II

1. Differentiate between advisory locking and mandatory locking. Understand 62. Explain about symlink ( ) function with example? Knowledge 73. Explain about link ( ) function with example? Knowledge 74. Explain about unlink ( ) function with example? Knowledge 65. Explain about symlink ( ) function with example? Understand 66. Define a system call? Understand 77. Differentiate systemcall with library function?. Knowledge 78. Explain about dot and dot dot directories in the file system? Understand 69. Define symbolic link? Knowledge 610. Define hard link? Understand 611. Differentiate symbolic link instead of a hard link. Understand 712. Define fcntl ( ) function with example? Understand 5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 58

13. Define read () function with example? Knowledge 514. Define write () function with example? Knowledge 615. Define stat () function with example? Knowledge 416. Define create () function with example? Understand 717. Define getc ( ) with example? Knowledge 718. Define fgetc ( ) with example? Knowledge 619. Define fprint ( ) with example? Understand 620. Define fscanf ( ).with example? Understand 621. Differentiate getc ( ) and fgetc ( ) with example? Understand 622. Differentiate) stat ( ) and fsat ( ) with example? Understand 623. Differentiate printf ( ) Vs fprint () with example? Understand 624. Differentiate scanf ( ) Vs fscanf (with example? Understand 625. Differentiate getc ( ) and fgetc ( ) with example? Understand 6

UNIT –III1. Describe process creation? Understand 82. Describe process termination?3. Differentiate process creation and termination? Understand 84. Describe signal function? Understand 85. Describe reliable signals. Understand 96. Define orphan process? Understand 87. Describe orphan process with example?8. Illustrate SIGKILL with an example? Knowledge 99. Illustrate SIGINT with an example? Understand 810. Differentiate SIGKILL and SIGINT? Understand 711. Illustrate fork () with example? Knowledge 812. Illustrate fork () with example? Knowledge 713. Differentiate fork ( ) with vfork ( )? Understand 814. Describe exec () with example? Understand 915. Illustrate exit ( ) function? Understand 916. Describe all flavours of excec () function? Knowledge 817. Define zombie processes with example?. Understand 818. Illustrate redirection of standard output to file abc.txt Understand 919. Explain about signal () function? Understand 820. Define wait () with example? Understand 821. Define waitpid () with example? Understand 922. Differentiate between wait ( ) and waitpid ( ). Understand 923. Differentiate reliable and unreliable signals with suitable example? Knowledge 824. Explain the mechanism for handling a signal with example? Understand 8

UNIT –IV1. Describe message queue with syntax and example? Knowledge 112. Describe FIFO concept with example??3. Describe simulate sleep and wakeup technology in Linuxipc Understand 104. Illustrate making fifo from command prompt? Understand 115. Describe mkfifo ( ) system call by example? Understand 106. Describe Pipes opening concept with example? Understand 11

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 59

7. Describe pipes? Explain their limitations. Understand 10

8. Explain how pipes are created and used in IPC with examples? Explain name space and importance in Linux? Understand 11

9. Describe msgsnd ( ) with example? Understand 1010. Describe msgrcv ( ), msgctl () with example? Understand 1111. Illustrate about IPC_CREAT? Understand 1012. Illustrate about IPC_EXEC? Knowledge 1113. Explain about msgtyp with example? Knowledge 814. Describe IPC _PRIVATE with example? Understand 815. Describe pipe () system call? Understand 1016. Differentiate between kill() and rise()? Knowledge `1217. Differentiate low level piping and formatted piping? Knowledge 1118. Differentiate between named pipes and unnamed pipes? Understand 1019. Explain about fork () system call? Understand 920. Describe O-NDELAY flag with example? Knowledge 1121. Explain message-queue communication by example? Knowledge 1022. Explain priority queue with example? Understand 12

UNIT-V1. Explain about shared-memory segment. Knowledge 122. Explain about shared-memory segment with example? Knowledge 113. Illustrate about V IPC semaphore mechanism with example? Evaluate 124. Explain about achieving IPC using shared memory? Understand 125. Explain about achieving IPC using semaphores? Understand 116. Explain about synchronization? How synchronization is v Knowledge 117. Explain the structure of a thread. Discuss its uses. Knowledge 11

8. Explain the kernel data structure for shared memory with a neat diagram. Explain the APIs associated for creating and destroying a shared memory Understand 11

9. Differentiate between thread and light weight process. Understand 10

10. Explain how semaphores are used to control thread operations on shared memory Understand 11

11. Explain about all functions realated to semaphores. Understand 10

12. Explain with a program how to copy file data from server to client using shared memory Understand 12

13. Explain with a program how to copy file data from server to client using semaphores. Understand 10

14. Explain about shmget() function? Understand 1215. Differentiate semaphore with shared memory IPC Mechanisms. Knowledge 10

16. Illustrate to transfer data between two unrelated processes using shared memory. Understand 12

17. Explain about shmcntl () function? Understand 1018. Demonstrate client and server programming using TCP protocol? Understand 919. Differentiate stream sockets and raw sockets? Understand 920. Demonstrate client and server programming using UDP protocol? Understand 921. Explain about socket( ) function in Linux? Understand 922. Explain about listen( ) function in Linux? Knowledge 923. Explain about accept( ) function in Linux? Understand 924. Explain about bind( ) function in Linux? Understand 1025. Explain about read() function in Linux? Understand 12

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 60

26. Explain about write() function in Linux? Knowledge 1027. Explain about ‘TCP NODELAY’ syntax? Understand 1028. Differentiate IP V4 AND IPV6? Understand 1029. Explain bzero () function? Understand 930. Explain about byte ordering in Linux? Understand 1031. Explain about how TCP connections are established and terminated. Understand 1232. Demonstrate echo server and echo client using 3333 port in tcp style? Knowledge 10

33. Explain how small and big packets handled in transferring client server environment? Understand 10

34. Explain tcp socket connection establishment with a neat diagram? Understand 935. Explain udp connection establishment with a neat diagram? Understand 1036. Demonstrate client and server programming using TCP protocol? Understand 1237. Differentiate client server models in tcp and udp? Knowledge 938. Explain sendTo () with example? Understand 1039. Explain recvFrom () with example? Understand 9

PART – B LONG ANSWER QUESTIONS

S. No. QuestionsBloom’s

Taxonomy Level

Course Outcome

UNIT – I

1 Explain pyramid architecture and kernel in Linux with neat diagrams? Knowledge 1

2 Explain different types of shells in Unix/Linux? Differentiate BASH and CSH? Knowledge 2

3 Explain vi editor and some editing commands in Linux? Explain listing of files in Linux? Understand 2

4 Explain links, file moving and its uses in Linux? Explain cp command with examples? Knowledge 1

5 Differentiate ssh and telnet and login procedure? Understand 1

6 Illustrate ‘rlogin’ ‘telnet’ command with example? Knowledge 2

7 Explain arp command and its options with example? Understand 2

8 Explain ftp and its importance in Unix? Differentiate tar and cpio, tar commands? Understand 1

9 Illustrate creating a new directory in Linux os with example and list out the available files? Understand 2

10 Explain deleting of directory and its contents with examples? Differentiate copying and moving files in Linux environment? Knowledge 1

11 Explain about ‘comm’command? Explain about ‘grep’ command? Explain about ‘tee’and more commands? Understand 2

12 Explain about ‘awk andsed command? Understand 1

13 Differentiate between a process, and program? Illustrate about job control commands with examples? Evaluate 2

14 Explain about background job and foreground jobs in Linux? Explain about ‘ps’ comm. and ‘telnet’ command Understand 2

15 Explain about ‘ulimit’and, mount commads? Illustrate‘pg’ and more command with example?

Understand Level 2

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 61

16 Explain Moving processes to the background and foreground with an example? Understand 3

17 Explain the significance of single quote and double quote. Understand 4

18 Explain about meta characters in the command line? Demonstrate by writing a shell script to find the factorial of a number. Knowledge 5

19 Distinguish between between user Defined variables and environment variables with example? Knowledge 4

20 Describe about I/O Redirection operations, built in variables in Shell. Knowledge 5

21 Explain by writing a script using system time, toshow GOOD Morning, GOOD AFTERNOON, GOODNIGHT. Knowledge 4

22 Demonstrate by writing script that determines the period for which a specified user is working on the system? Knowledge 5

23 Explain how the shell treat a command line passed to it. Knowledge 5

24 Explain by writing shell script that receives any number of file names as arguments checks if every argument supplied is a file or a directory? Knowledge 5

25 Explain by writing an awk script to find the number of characters, words and lines in a file. Understand 5

26 Explain by writing shell script to find and delete all file with the word “Unix". Understand 4

27 Explain by writing shell script to count the specified number of lines in a text file without using wc command? Knowledge 4

28 Demonstrate by writing a shell script to find the factorial of a number. Knowledge 5

29 Explain by writing shell script that receives any number of file names as arguments checks if every argument supplied is a file or a directory? Knowledge 4

UNIT – II

1 Explain fprint (), fscanf () with examples? Understand 7

2 Differentiate between advisory locking and mandatory locking. Understand 6

3 Explain about symlink ( ) function with example? Explain about link ( ) function with example? Knowledge 7

4 Explain about unlink ( ) functions with example? Explain about symlink ( ) functions with example? Understand 7

5 Define a system call? Differentiate systemcall with library function? Understand 6

6 Explain about dot and dot dot directories in the file system? Knowledge 7

7 Define symbolic link? Hard link with examples? Knowledge 6

8 Differentiate symbolic link instead of a hard link. Knowledge 6

9 Define fcntl ( ), read (), write () writen () function with examples? Knowledge 6

10 Describe the characteristics of Unix File System. Knowledge 7

11 Describe about Low Level File I/O System Calls. Understand 7

12 Describe usage of dup(), dup2() system calls with example? Understand 6

13 Define stat () and create () function with examples? Knowledge 7

14 Describe open ( ) function in Linux with examples? Knowledge 6

15 Explain getc ( ) and fgetc ( ) with examples? Knowledge 7

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 62

16 Explain fprint () and fscanf ( ).with example? Knowledge 6

17 Differentiate getc ( ) and fgetc ( ) with example? Knowledge 7

18 Differentiate stat ( ) and fstat ( ) with example? Understand 6

UNIT – III

1 Describe Process Creation Process Termination with example? Understand 8

2 Describe Signal function and Reliable signals with example? Knowledge 9

3 Define orphan process and zombie process with example? Knowledge 9

4 Describe SIGKILL and SIGINT with examples? Understand 8

5 Illustrate fork (), vfork () with example s? Knowledge 8

6 Differentiate fork ( ) with vfork ( )? Understand 9

7 Describe all versions of exec () with examples? Understand 8

8 Describe all flavours of excec () function? Knowledge 9

9 Illustrate zombie processes with example? Understand 8

10 Illustrate redirection of standard output to file abc.txt Understand 9

11 Explain about signal () function? Understand 8

12 Define wait () and waitpid () with examples? Knowledge 9

13 Differentiate between wait ( ) and waitpid ( ). Knowledge 9

14 Differentiate reliable and unreliable signals with examples. Knowledge 9

15 Explain the mechanism for handling a signal with example? Understand 8

UNIT – IV

1 Describe message queue with syntax and example? Understand 11

2 Describe FIFO concept with example? Explain name space and importance in Linux? Knowledge 10

3 Describe sleep and wakeup technology in Linux PC. Illustrate making fifo from command prompt? Understand 11

4 Describe mkfifo ( ), pipe opening concept by example? Understand 10

5 Illustrate pipes? Explain their limitations. Explain how pipes are created and used in IPC with an examples Understand 11

6 Describe msgsnd ( ), msgrcv ( ) with example? Knowledge 10

7 Illustrate about IPC_CREAT with example? Understand 10

8 Illustrate about IPC_EXEC? Explain about msgtyp with example? Knowledge 11

9 Describe IPC _PRIVATE, pipe () system call with example? Understand 11

10 Differentiate between kill (), raise () with example? Understand 11

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 63

11 Explain about fork () and O-NDELAY flag with example? Understand 10

12 Explain message-queue communication by example? Explain priority queue with example? Understand 10

13 Explain the advantages of fifos over pipes. Understand 11

14 Explain two way communication using FIFOs? Understand 10

UNIT– V

1 Explain about shared-memory segment with example? Knowledge 12

2 Illustrate about V IPC semaphore mechanism with example. Understand 11

3 Explain about achieving IPC using shared memory? Knowledge 11

4 Explain about achieving IPC using semaphores? Knowledge 12

5 Explain about synchronization and How synchronization is achieved with Semaphores? Knowledge 11

6 Explain the structure of a thread and kernel data structure for shared memory with a neat diagram? Understand 12

7 Explain the system functions associated for creating and destroying a shared memory? Understand 11

8 Differentiate between thread and light weight process with system calls? Understand 11

9 Explain how semaphores are used to control thread operations on shared memory Knowledge 11

10 Explain about all functions related to semaphores? Knowledge 12

11 Explain with a program how to copy file data from server to client using shared memory. Knowledge 11

12 Explain with a program how to copy file data from server to client using semaphores. Understand 12

13 Differentiate semaphore with shared memory IPC Mechanisms. Understand 12

14 Illustrate text transfer between two unrelated processes using shared memory. Knowledge 11

15 Illustrate about thread synchronization with mutex locks with examples? Knowledge 10

16 Differentiate between multithreaded programming and single threaded programming. Understand 10

17 Illustrate pthread create ( ) function with examples? Understand 12

18 Explain pthread kill ( ) function with example? Knowledge 12

19 Explain about various POSIX APIs for mutual exclusion and locks with example Understand 10

20 Illustrate about POSIX APIs of semaphores? Understand 10

21 Explain thread synchronization with semaphores with example? Understand 11

22 Explain about Thread structure with examples? Knowledge 10

23 Explain about Semaphores with examples? Knowledge 12

24 Explain about Mutexes in Threads. With examples? Knowledge 10

25 Illustrate multithreaded programming? Understand 12

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 64

26 Explain about the APIs used to Demonstrate the attributes for a thread Understand 11

27 Illustrate about the mutex lock to prevent deadlock condition. Knowledge 12

28 Differentiate single threaded and multithreaded programming? Understand 10

29 Illustrate with a neat diagram about threads, and light weight processes? Understand 10

30 Explain about separate kernel stack and light weight processes? Understand 11

31 Describe disadvantage of single threaded programming? Describe advantages of multithreaded programming. Knowledge 10

32 Explain about Linux API’s for shared memory with neat diagram? Knowledge 12

33 Illustrate posix thread APIs for basic Process and Threads with examples? Knowledge 9

34 Explain about how semaphores values can be incremented or decremented with examples? Understand 10

35 Demonstrate client and server programming using TCP protocol with neat diagram? Knowledge 12

36 Differentiate stream sockets and raw sockets and related system calls? Understand 10

37 Demonstrate client and server programming using UDP protocol with neat diagram? Explain about socket ( ) , listen( ), accept( )system calls in Linux? Understand 9

38 Explain about bind (), read (), write () functions in Linux? Knowledge 10

39 Explain about send To () and recv From () functions in Linux? Knowledge 12

40 Explain about TCP NODELAY syntax with a small program? Knowledge 12

41 Explain all byte ordering and manipulation functions with examples? Knowledge 12

42 Explain about how TCP connections are established and terminated. Understand 10

43 Demonstrate echo server and echo client using 6666 port in tcp style? Understand 10

44 Explain how small and big packets handled in transferring client server environment? Understand 11

45 Explain tcp socket connection establishment with a neat diagram? Knowledge 10

46 Explain udp data transfer with a neat diagram? Knowledge 12

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S. No. Questions Bloom’s Taxonomy Level

Course Outcome

UNIT –I

1 Differentiate windows and Linux operating system and analyse important system calls? Understand 1

2 Differentiate DOS and Linux operating system? Knowledge 23 Illustrate security concepts in both Linux and windows operating systems? Understand 2

4

Illustrate script called ‘sayHi’, put this script into your startup file called .bash profile, the script should run as soon as you logon to system, and it print any one of the following message in info box using dialog utility, if installed in your system, If dialog utility is not installed then use echo statement to print message: -Good Morning, Good Afternoon, Good Evening, according to system time.

Knowledge 3

5 Illustrate by writing script that will print, Message “Hello World, in Bold Knowledge 4

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 65

and Blink effect, and in different colors like red, brown etc using echo command.

6Illustrate by writing script to implement background process that will continually print current time in upper right corner of the screen , while user can do his/her normal job at $ prompt.

Understand 5

7

Illustrate by writing script using for loop to print the following patterns on screen patterns on screen12 23 3 3

3 4 4 44 5 5 5 5 5

Knowledge 5

8

Illustrate by writing script using for loop to print the following patterns on screen.** ** * ** * * ** * * * *

Understand 4

UNIT – II

1 Differentiate and analyse non-blocking IO operations in both windows and Linux operating systems? Knowledge 6

2 Differentiate and analyse blocking IO operations in both windows and Linux operating systems? Understand 7

3Illustrate to redirect the standard input (stdin) and the standard output (stdout) of a process, so that scanf () reads from the pipe and printf () writes into the pipe?

Knowledge 7

UNIT – III1 Illustrate by writing c program to handle a user Defined signal by example? Knowledge 8

2 Illustrate by writing c program where process forks to a child, then waits for someone to terminate? Understand 9

3 Illustrate by writing c program where process forks to a child, and create a child process by using forks and suddenly terminates itself. Knowledge 9

UNIT – IV

1 Describe and analyse kernel flow involved in the creation of a message queue and the sending and receiving of messages? Knowledge 10

2 Illustrate by writing a c program using msglock structure? Knowledge 11UNIT – V

1 Illustrate ipc facility to show system limits? Knowledge 122 Illustrate to displays last operation time in each ipc facility. Knowledge 113 Demonstrate race conditions with shared memory? Knowledge 114 Illustrate by writing a c program to implement tcp chat client server? Understand 95 Illustrate by writing a c program to implement udp chat client server? Understand 9

10.13 ASSIGNMENT QUESTIONSPART – A (SHORT ANSWER QUESTIONS)

S. No. QuestionsBloom’s

Taxonomy Level

Course Outcome

UNIT – I1 Illustrate ‘telnet’ command with example? Understand 12 Explain ftp and its importance in Unix? Knowledge 23 Explain importance of arp in Linux Understand 14 Differentiate tar and cpio commands? Understand 1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 66

5 Illustrate creating a new directory in Linux with example? Knowledge 26 Explain deleting of directory and its contents with examples? Understand 17 Differentiate copying and moving files in Linux environment? Understand 18 Explain about ‘comm’command? Knowledge 29 Explain about ‘grep’command? Understand 110 Explain about ‘awk’ command? Understand 111 Explain about ‘tee’ command? Knowledge 212 Differentiate between a processes and program? Understand 113 Illustrate about job control commands with examples? Understand 114 Explain about background job and foreground job in Linux? Knowledge 215 Explain about ‘ps’ command Understand 116 Explain about ‘telnet’ command Understand 117 Explain about ‘ulimit’ command ulimit. Knowledge 218 Illustrate ‘pg’ command with example? Understand 119 Illustrate ‘more’ command with example? Understand 120 Illustrate and permissions in Linux environment? Knowledge 4

21 Explain the security and compare with windows and dos operating systems? Understand 5

22 Explain how Unix operating system provides more security than any other operating system. Knowledge 5

23 Explain command substitutions with examples? Knowledge 324 Explain add, delete, view, actions in Linuxenv? Knowledge 325 Explain how debugging can be done in a shell script. Knowledge 426 Explain printing login information. Knowledge 427 Differentiate between different types of shells available in UNIX. Knowledge 4

UNIT – II1. Differentiate between advisory locking and mandatory locking. Understand 62. Explain about symlink ( ) function with example? Knowledge 73. Explain about link ( ) function with example? Knowledge 74. Explain about unlink ( ) function with example? Knowledge 65. Explain about symlink ( ) function with example? Understand 66. Define a system call? Understand 77. Differentiate systemcall with library function?. Knowledge 78. Explain about dot and dot dot directories in the file system? Understand 69. Define symbolic link? Knowledge 610. Define hard link? Understand 611. Differentiate symbolic link instead of a hard link. Understand 712. Define fcntl ( ) function with example? Understand 513. Define read () function with example? Knowledge 514. Define write () function with example? Knowledge 615. Define stat () function with example? Knowledge 416. Define create () function with example? Understand 717. Define getc ( ) with example? Knowledge 718. Define fgetc ( ) with example? Knowledge 619. Define fprint ( ) with example? Understand 620. Define fscanf ( ).with example? Understand 6

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 67

21. Differentiate getc ( ) and fgetc ( ) with example? Understand 622. Differentiate) stat ( ) and fsat ( ) with example? Understand 623. Differentiate printf ( ) Vs fprint () with example? Understand 624. Differentiate scanf ( ) Vs fscanf (with example? Understand 625. Differentiate getc ( ) and fgetc ( ) with example? Understand 6

UNIT –III1. Describe process creation? Understand 82. Describe process termination?3. Differentiate process creation and termination? Understand 84. Describe signal function? Understand 85. Describe reliable signals. Understand 96. Define orphan process? Understand 87. Describe orphan process with example?8. Illustrate SIGKILL with an example? Knowledge 99. Illustrate SIGINT with an example? Understand 810. Differentiate SIGKILL and SIGINT? Understand 711. Illustrate fork () with example? Knowledge 812. Illustrate fork () with example? Knowledge 713. Differentiate fork ( ) with vfork ( )? Understand 814. Describe exec () with example? Understand 915. Illustrate exit ( ) function? Understand 916. Describe all flavours of excec () function? Knowledge 817. Define zombie processes with example?. Understand 818. Illustrate redirection of standard output to file abc.txt Understand 919. Explain about signal () function? Understand 820. Define wait () with example? Understand 821. Define waitpid () with example? Understand 922. Differentiate between wait ( ) and waitpid ( ). Understand 923. Differentiate reliable and unreliable signals with suitable example? Knowledge 824. Explain the mechanism for handling a signal with example? Understand 8

UNIT –IV1. Describe message queue with syntax and example? Knowledge 112. Describe FIFO concept with example??3. Describe simulate sleep and wakeup technology in Linuxipc Understand 104. Illustrate making fifo from command prompt? Understand 115. Describe mkfifo ( ) system call by example? Understand 106. Describe Pipes opening concept with example? Understand 117. Describe pipes? Explain their limitations. Understand 10

8. Explain how pipes are created and used in IPC with examples? Explain name space and importance in Linux? Understand 11

9. Describe msgsnd ( ) with example? Understand 1010. Describe msgrcv ( ), msgctl () with example? Understand 11

UNIT-V1. Explain about shared-memory segment. Knowledge 122. Explain about shared-memory segment with example? Knowledge 113. Illustrate about V IPC semaphore mechanism with example? Evaluate 12

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 68

4. Explain about achieving IPC using shared memory? Understand 125. Explain about achieving IPC using semaphores? Understand 11

6. Explain about synchronization? How synchronization is achieved with semaphores? Knowledge 11

7. Explain the structure of a thread. Discuss its uses. Knowledge 11

8. Explain the kernel data structure for shared memory with a neat diagram. Explain the APIs associated for creating and destroying a shared memory Understand 11

9. Differentiate between thread and light weight process. Understand 10

10. Explain how semaphores are used to control thread operations on shared memory Understand 11

11. Explain about all functions related to semaphores. Understand 10

12. Explain with a program how to copy file data from server to client using shared memory. Understand 12

13. Explain with a program how to copy file data from server to client using semaphores. Understand 10

14. Explain about shmget() function? Understand 1215. Differentiate semaphore with shared memory IPC Mechanisms. Knowledge 10

16. Illustrate to transfer data between two unrelated processes using shared memory. Understand 12

17. Explain about shmcntl () function? Understand 1018. Demonstrate client and server programming using TCP protocol? Understand 919. Differentiate stream sockets and raw sockets? Understand 920. Demonstrate client and server programming using UDP protocol? Understand 921. Explain about socket( ) function in Linux? Understand 922. Explain about listen( ) function in Linux? Knowledge 923. Explain about accept( ) function in Linux? Understand 9

PART – B (LONG ANSWER QUESTIONS)

S. No. QuestionBlooms

Taxonomy Level

Course Outcome

UNIT-1

1 Explain features of UNIX/LINUX understand 1

2 Explain the architecture of UNIX like systems understand 13 Explain the differences between a line editor and a stream editor. understand 1

4 Explain the network related commands. (telnet, rlogin, ftp, arp) understand 1

5 Develop an AWK program to summarize from the list of all processes, a count of processes run by every user (including root). Create 2

6 Explain how Unix operating system provides more security than any other operating system. understand 2

7 Develop a shell script that allows a user to view, add, delete or modify a setting in a configuration file. Create 3

8 Describe how debugging can be done in a shell script. understand 2

9 Analyze the significance of single quote and double quote. Analyze 3

10 Differentiate between shell variables and environment variables and user defined variables. Analyze 4

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 69

UNIT-II

1Differentiate between the following terms:(a) getc( ) Vsfgetc() (b) stat( ) Vsfsat()(c) printf( ) Vsfprint() (d) scanf( ) Vsfscanf().

Analyze 3

2 Illustrate fcntl( ) with a program. How are status flags that are associated with fcntl()? Apply 3

3 Discuss clearly the Low Level File I/O System Calls. understand 3

4 List and explain about the various types of files in Unix. How a file can be described in Unix environment? Knowledge 4

5 Construct and explain a function that sets one or more of the file status flags for adescriptor. Create 3

UNIT-III

1 Illustrate SIGKILL and SIGINT with an example program. Apply 3

2 Mention the commands for getting different IDs of calling process. Analyze 4

3 Define a Zombie Process? What is its significance? Describe with an example. Knowledge 4

4 Write a program to illustrate orphan process. Create 5

5 Identify the signals that are not ignored or blocked? Explain the reason behind it with an example. Knowledge 4

UNIT-IV

1 Illustrate mkfifo( ) system call with an example Apply 4

2 Define are pipes? Explain their limitations. Explain how pipes are created and used in IPC with an examples Knowledge 5

3 Compare the IPC functionality provided by pipes and message queues. What are the advantages and drawbacks of each? Explain briefly Analyze 4

4 Measure the effect of O-NDELAY flag on pipes and fifos. Evaluate 5

5 Elaborately discuss various forms of IPC supported by Unix. understand 4

UNIT-V

1 Show how shared memory model is implemented to achieve IPC? Explain briefly. Apply 5

2 Explain the kernel data structure for shared memory with a neat diagram. Also explain the APIs associated for creating and destroying a shared memory understand 4

3 Explain similarities and dissimilarities between the semaphore and shared memory IPC Mechanisms. understand 3

4 Explain how to control a shared-memory segment. understand 1

5 Illustrate p thread create( ) and p thread kill( ) function prototypes with an example. Apply 3

6 Explain a stream socket with a illustrative example for client/server program. Understand 1

7 Explain a datagram socket with a illustrative example for client/server program. Understand 3

8 Explain the sequence of steps to process various socket functions using TCP protocol with example Understand 4

9 Explain briey about the following socket APIs with clear syntax:(i) socket( ) (ii) bind( ) (iii) listen( ) (iv) accept( ) (v)connect() Understand 5

10 Decide how TCP NODELAY option is used while sending small packets? Evaluate 5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 70

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S. No. Question

BloomsTaxonomy

Level

Course Outcome

UNIT –I

1 Differentiate windows and Linux operating system and analyse Morning, Good Afternoon, and Good evening, according to system time. Understand 1

2Illustrate by writing script that will print, Message “Hello World, in Bold and Blink effect, and in different colours like red, brown etc using echo command.

Knowledge 4

3Illustrate by writing script to implement background process that will continually print current time in upper right corner of the screen , while user can do his/her normal job at $ prompt.

Understand 5

4

Illustrate by writing script using for loop to print the following patterns on screen12 23 3 34 4 4 45 5 5 5 5

Knowledge 5

5

Illustrate by writing script using for loop to print the following patterns on screen.** ** * ** * * ** * * * *

Understand 4

UNIT – II

1 Differentiate and analyse non-blocking IO operations in both windows and Linux operating systems? Knowledge 6

2 Differentiate and analyse blocking IO operations in both windows and Linux operating systems? Understand 7

3Illustrate to redirect the standard input (stdin) and the standard output (stdout) of a process, so that scanf () reads from the pipe and printf () writes into the pipe?

Knowledge 7

UNIT – III

1 Illustrate by writing c program to handle a user Defined signal by example? Knowledge 8

2 Illustrate by writing c program where process forks to a child, then waits for someone to terminate? Understand 9

3 Illustrate by writing c program where process forks to a child, and create a child process by using forks and suddenly terminates itself. Knowledge 9

UNIT – IV

1 Describe and analyse kernel flow involved in the creation of a message queue and the sending and receiving of messages? Knowledge 10

2 Illustrate by writing a c program using msglock structure? Knowledge 11

UNIT – V

1 Illustrate ipc facility to show system limits? Knowledge 12

2 Illustrate to displays last operation time in each ipc facility. Knowledge 11

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 71

3 Demonstrate race conditions with shared memory? Knowledge 11

4 Illustrate by writing a c program to implement tcp chat client server? Understand 9

5 Illustrate by writing a c program to implement udp chat client server? Understand 9

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 72

11. WEB TECHNOLOGIES (A10521)

11.0 COURSE DESCRIPTION FORM

Course Title WEB TECHNOLOGIES

Course Code A10521

Regulation MLR-15

Lectures Tutorials Practical’s CreditsCourse Structure

3 1 - 3

Course Coordinator Dr Kavati Ilaiah Professor CSE

Team of Instructors Mr. K Archana Assoc. Professor/ Dr. Kiran Kumar Professor / Mrs. N Sirisha Asst. Professor CSE

11.1 COURSE OVERVIEW: The World Wide Web continues to provide a foundation for the development of a broad range of increasingly influential and strategic technologies, supporting a large variety of applications and services, both in the private and public sectors. There is a growing need for management and decision makers to gain a clearer understanding of the application development process, from planning through to deployment and maintenance.

11.2 PREREQUISITE(S):

Level Credits Periods / Week PrerequisitesUG 3 5 Java , PHP, Scripting languages

11.3 COURSE ASSESSMENT METHODS

Session Marks University EndExam Marks Total Marks

There shall be two midterm examinations. Each midterm examination consists of essay paper, objective paper and assignment.The essay paper is for 10 marks of 60 minutes duration and shall contain 4questions. The student has to answer 2 questions, each carrying 5 marks.The objective paper is for 10 marks of 20 minutes duration. It consists of 10multiple choice and 10 fill-in-the blank questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.Five marks are earmarked for assignments. There shall be two assignments in every theory course. Assignments are usually issued at the time of commencement of the semester. These are of problem solving in nature with critical thinking.Marks shall be awarded considering the average of two midterm tests in each course.

75 100

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 73

11.4 a) EVALUATION SCHEME:

S. No Component Duration Marks1 I Mid Examination 80 minutes 202 I Assignment 53 II Mid Examination 80 minutes 204 II Assignment 55 External Examination 3 hours 75

b) COURSE OBJECTIVES:

I. To teach students the basics of server side scripting using PHP II. To explain web application development procedures

III. To impart servlet technology for writing business logic IV. To facilitate students to connect to databases using JDBC V. To familiarize various concepts of application development using JSP

11.5. COURSE OUTCOMES:Upon completion of this course, students will be able to:

a. Create web pages using PHP b. Identify the difference between the HTML PHP and XML documents. c. Identify the engineering structural design of XML and parse tree d. Analyze the difference between and PHP and XML. e. Understand the concept of JAVA SCRIPTS. f. Identify the difference between the JSP and Servlet. g. Design web application using MVC architecture h. Understand the JSP and Servlet concepts. i. Apply JDBC and ODBC technologies to create database connectivity

11.6 HOW PROGRAM OUTCOMES ARE ASSESSED:Upon completion of this course, students will be able to:

Course Outcomes Blooms Level

a) Create web pages using PHP BL 1 & 2

b) Identify the difference between the HTML PHP and XML documents. BL 1, 2

c) Identify the engineering structural design of XML and parse tree. BL 1, 2, 3, 4& 6

d) Analyze the difference between and PHP and XML. BL 1, 2, 3, 4,5 & 6

e) Understand the concept of JAVA SCRIPTS. BL 1,2,3 & 6

f) Identify the difference between the JSP and Servlet BL 1, 2, 3, 4& 6

g) Design web application using MVC architecture BL 1, 2, 3, 4,5 & 6

h) Understand the JSP and Servlet concepts. BL 1, 2, 3, 4,5 & 6

i) Apply JDBC and ODBC technologies to create database connectivity BL 1,2,3 & 6

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 74

BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate BL 6: Create

11.7 HOW PROGRAM OUTCOMES ARE ASSESSED:

Program Outcomes Level Proficiency assessed by Blooms Level

A

An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.(Fundamental engineering analysis skills).

HSolving Gate and Text book Problems

Apply

BAn ability to design and conduct engineering experiments, as well as to analyze and interpret data. (information retrieval skills).

SSolving Gate and Text book Problems

Apply

CAn ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. (Creative skills).

H Assignment andGate questions

Apply andAnalyze

DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. (team work)

S Mini and Micro Projects Apply

E

An ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.(Engg. Problem solving Skills)

SMicro Project Models/ Gate questions

Apply

F An understanding of professional, social and ethical responsibility N ------- --------

G

An ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements. (Engg. Application Skills)

SMicro Projects models / Gate questions

Analyze and Justify

HThe broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.

H Assignment andGate questions Analyze

I

Graduate will develop confidence for self education and acquire new knowledge in the computing discipline and ability and practice for Multidisciplinary tasks as a member within the teams

S Class Test & Seminars Analyze

J To communicate effectively S Seminars Understand & Analyze

K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. S

Class Tests & Group Activity inclass room

Apply

LGraduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc.(Continuing Education )

H GATE Apply

M

The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.

SText Book Problems as part of Assignment

Apply

N An ability to setup an enterprise.(Employment Skills) S Placement Design and Develop

N= None S= Supportive H = Highly Related

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 75

11.7. SYLLABUS

UNIT – I Introduction to PHP: Declaring variables, data types, arrays, strings, operations, expressions, control structures, functions, Reading data from web form controls like Text Boxes, radio buttons, lists etc., Handling File Uploads, Connecting to database (My SQL as reference), executing simple queries, handling results, Handling sessions and cookies. File Handling in PHP: File operations like opening, closing, reading, writing, appending, deleting etc. on text and binary files, listing directories.

UNIT – II Client side Scripting: Introduction to JavaScript: JavaScript language – declaring variables, scope of variables functions, event handlers (on click, on submit etc.), Document Object Model, Form validations. Simple AJAX applications.

UNIT – III XML: Introduction to XML, Defining XML tags, their attributes and values, Document type definition, XML Schemas, Document Object model, XHTML Parsing XML Data - DOM and SAX parsers in java

UNIT – IV Introduction to Servlets: Common Gateway Interface (CGI), Lifecycle of a Servlets, deploying a Servlets, The Servlets API, Reading Servlets parameters, Reading initialization parameters, Handling Http Request & Responses, Using Cookies and sessions, connecting to a database using JDBC.

UNIT – V Introduction to JSP: The Anatomy of a JSP Page, JSP Processing, Declarations, Directives,Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using Cookies and session tracking, connecting to database in JSP.

TEXT BOOKS: 1. Web Technologies, Uttam K Roy, Oxford University Press 2. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill

REFERENCE BOOKS: 1. Web Programming, building internet applications, Chris Bates 2nd edition, Wiley

Dremtech 2. Java Server Pages – Hans Bergsten, SPD O‘Reilly 3. Java Script, D.Flanagan, O‘Reilly, SPD. 4. Beginning Web Programming-Jon Duckett WROX. 5. Programming world wide web, R.W. Sebesta. Fourth Edition, Pearson. 6. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 76

11.8 COURSE PLAN:At the end of the course, the students are able to achieve the following course learning outcomes

Lecture No.

Course Learning Outcomes Blooms Levels Topics to be covered Reference

L1Introduction PHPhttp://www.w3schools.com/php/php_intro.asp

T2, CH1

L2

List various data types in PHP Remembering

Declaring Variables, data types, arrayshttp://www.w3schools.com/php/php_variables.asphttp://www.w3schools.com/php/php_datatypes.asphttp://www.w3schools.com/php/php_arrays.asp

T2, CH1

L3

strings, operatorshttp://www.w3schools.com/php/php_string.asphttp://www.w3schools.com/php/php_operators.asp

T2, CH2

L4Expressions, control structureshttp://www.w3schools.com/php/php_if_else.asp

T2, CH2

L5

Understands the usage of functions, control structures

Understand

Functionshttp://www.w3schools.com/php/php_functions.asp

T2,CH4

L6 Understands how to read data from web form Understand

reading data from web form controls like text boxes, radio buttons, lists etchttp://www.w3schools.com/php/php_forms.asphttp://www.w3schools.com/php/php_form_required.asp

T2, CH5

L7 Handling file uploadshttp://www.w3schools.com/php/php_file.asp T2,CH10

L8connecting to database( MYSQL reference),www.w3schools.com/php/php_mysql_connect.asp T2,CH10

L9

Explains the establishment of connection to MYSQL

Understanding

executing simple querieshttp://www.w3schools.com/php/php_mysql_create.asp T2,CH10

L10handling resultshttp://www.w3schools.com/php/php_mysql_update.asp

T2,CH10

L11

Analyze sessions and cookies Handling sessions and cookies.

http://www.w3schools.com/php/php_cookies.asp

T2,CH10

L12

Analysis

File Handling in PHPhttp://www.w3schools.com/php/php_file.asp T2,CH9

L13

File operations opening, closing, readinghttp://www.w3schools.com/php/php_file_open.asphttp://www.w3schools.com/php/php_file.asp

T2,CH9

L14writing, appendinghttp://www.w3schools.com/php/php_file_create.asp T2,CH9

L15

Describe various file handling operations in PHP Understand

deleting etc. on text and binary fileshttp://www.w3schools.com/php/php_file_upl T2,CH9

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 77

oad.asp

L16listing directorieshttp://www.w3schools.com/php/php_includes.asp

T2,CH9

L17 Introduction to XML T3,CH5L18 defining XML tags T3,CH5L19 defining XML tags T3,CH5L20

List out various HTML tags Remembering

their attributes and values T3,CH5L21 Document type definition T3,CH5L22 XML schemas T3,CH5L23 document object model T3,CH5L24

Illustrate document object model and XML schemas

Understanding

document object model T3,CH5L25 XHTML T3,CH5L26 Parsing XML Data: DOM parser in java T3,CH5L27

Compare the two parsers SAX and DOM Analysis

Parsing XML Data: SAX parser in java T3,CH5L28 Introduction to Servlets T3,CH7L29

Describe servlets UnderstandCommon Gateway Interface(CGI) T3,CH7

L30 lifecycle of a Servlets T3,CH7L31 lifecycle of a Servlets T3,CH7L32

Illustrate the deployment of servlets

Understanding

deploying Servlets T3,CH7L33 the servlet API T3,CH7L34 reading servlet parameters T3,CH7L35

Demonstrate reading and initializing parameters Understanding

reading initialization parameters T3,CH7L36 handling http requests and responses T3,CH7L37 handling http requests and responses T3,CH7L38

Implement hhtp requests and responses using cookies and sessions

Creatingusing cookies and sessions T3,CH7

L39 connection to a database using JDBC T3,CH7L40

Illustrate the connection toJDBC

Understandingconnection to a database using JDBC T3,CH7

L41 Introduction to JSP T3,CH8L42 the autonomy of a JSP page T3,CH8L43

Describe autonomy of JSP pages Understand

JSP processing T3,CH8L44 Declarations T3,CH8L45 Directives T3,CH8L46 expressions, code snippets T3,CH8L47

List out directives, expressions, code snippets, implicit objects

Knowledge

implicit objects T3,CH8L48 using beans in JSP pages T3,CH8

L49 using cookies and session for session tracking T3,CH8

L50

Implement JSP pages Creatingusing cookies and session for session tracking T3,CH8

L51 connecting to a database in JSP. T3,CH8

L52Illustrate the connection to database in JSP

Understandingconnecting to a database in JSP. T3,CH8

L53 Client side scripting T3CH3L54 Introduction to java script T3,CH3L55

Describe client side scripting Understand

java script language T3,CH3L56 Describe variables,

scope, functions Understand declaring variables T3,CH3

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 78

L57 scope of variables T3,CH3L58 Functions T3,CH3L59 event handlers(on click and on submit etc.) T3,CH3L60

Create event handlers in web page Creating

event handlers(on click and on submit etc.) T3,CH3L61 document object model T3,CH3L62

Illustrate form validation Understandingform validation T3,CH3

L63 simple AJAX application T2,CH12L64

Create simple AJAX apllication

Creating simple AJAX application T2,CH12

SESSION PLANNER

Unit No.

S.No. Topic

Lecture Number as per

the period

Date Planned Remarks

1 Introduction PHP L1

2 Declaring Variables, data types, arrays L2

3 strings, operators L3

4 Expressions, control structures L4

5 Functions L5

6 reading data from web form controls like text boxes, radio buttons, lists etc L6

7 Handling file uploads L7

8 connecting to database( MYSQL reference), L8

9 executing simple queries L9

10 handling results L10

11 Handling sessions and cookies. L11

12 File Handling in PHP L12

13 File operations opening, closing, reading L13

14 writing, appending L14

15 deleting etc. on text and binary files L15

UNITI

16 listing directories L16

17 Introduction to XML L17

18 defining XML tags L18

19 defining XML tags L19

20 their attributes and values L20

21 Document type definition L21

22 XML schemas L22

23 document object model L23

UNITII

24 document object model L24

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 79

25 XHTML L25

26 Parsing XML Data: DOM parser in java L26

27 Parsing XML Data: SAX parser in java L27

28 Introduction to Servlets L28

29 Common Gateway Interface(CGI) L29

30 lifecycle of a Servlets L30

31 lifecycle of a Servlets L31

32 deploying Servlets L32

33 the servlet API L33

34 reading servlet parameters L34

35 reading initialization parameters L35

36 handling http requests and responses L36

37 handling http requests and responses L37

38 using cookies and sessions L38

39 connection to a database using JDBC L39

UNITIII

40 connection to a database using JDBC L40

41 Introduction to JSP L41

42 the autonomy of a JSP page L42

43 JSP processing L43

44 Declarations L44

45 Directives L45

46 expressions, code snippets L46

47 implicit objects L47

48 using beans in JSP pages L48

49 using cookies and session for session tracking L49

50 using cookies and session for session tracking L50

51 connecting to a database in JSP. L51

UNITIV

52 connecting to a database in JSP. L52

53 Client side scripting L53

54 Introduction to java script L54

55 java script language L55

56 declaring variables L56

57 scope of variables L57

58 Functions L58

59 event handlers(on click and on submit etc.) L59

UNITV

60 event handlers(on click and on submit etc.) L60

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 80

61 document object model L61

62 form validation L62

63 simple AJAX application L63

64 simple AJAX application L64

11.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Course OutcomesCourse Educational Objectives

a b c d e f g h iI H H H H H S H

II H S H SIII H H H S

IV H H H H H H

V S H S H S H

VI H H H

S= Supportive H = Highly Related

11.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Program OutcomesCourse Educational Outcomes

A B C D E F G H I J k L M N

a H H H H H

b S H H S H S

c H S H S

d H S H S S

e H S H S H

f H S S S Hg H S H S S

h S H S H

i S S S HS= Supportive H = Highly Related

11.11 OBJECTIVE QUESTIONS:

UNIT-I1. What does PHP stand for?

i) Personal Home Page ii) Hypertext Preprocessoriii) Pretext Hypertext Processor iv) Preprocessor Home PageA. Both i) and iii) B. Both ii) and iv) C. Only ii) D. Both i) and ii)Answer: D

2. A PHP script should start with ___ and end with ___:

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 81

A. <php>B. < ? php ?>C. <? ?>D. <?php ?>Answer: C or D

1. Which of the following php statement/statements will store 111 in variable num?i) int $num = 111; ii) int mum = 111; iii) $num = 111; iv) 111 = $num;A. Both i) and ii) B. All of the mentioned. C. Only iii) D. Only i)Answer: C

2. What will be the output of the following php code?<? php$num=1;$num1=2;print$num."+".$num1;?>A. 3 B. 1+2 C. 1.+.2 D. ErrorAnswer: B

5. What will be the output of the following PHP code?<?php$color="maroon";$var=$color[2];echo"$var";?>a)ab)Errorc)$vard) rAnswer: D

6. What will be the output of the following code?<?phpfunction track(){static $count=0;$count++;echo$count;}track();track();track();?>A. 123 B. 111 C. 000 D. 011Answer: A

7. What is the value of $a and $b after the function call?<?phpfunctiondoSomething(&$arg){

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 82

$return=$arg;$arg+=1;return$return;}$a=3;$b=doSomething($a);?>A. a is 3 and b is 4 B. a is 4 and b is 3 C. Both are 3. D. Both are 4.Answer: B

8. Which one of the following functions can be used to compress a string?A. zip compress() B. zip() C. compress() D. gzcompress()Answer: D

9. Which one of the following PHP function is used to determine a file’s last access time?A. fileltime() B. filectime() C. fileatime() D. filetime()Answer: C

10. Which directive determines whether PHP scripts on the server can accept file uploads?A. file_uploadsB. file_uploadC. file_inputD. file_intakeAnswer: A

11. If you want to temporarily store uploaded files in the /tmp/phpuploads/ directory, which one of the following statement will you use?A. upload_tmp_dir “/tmp/phpuploads/ directory”B. upload_dir “/tmp/phpuploads/ directory”C. upload_temp_dir “/tmp/phpuploads/ directory”D. Dupload_temp_director “/tmp/phpuploads/ directory”Answer: A

12. Which one of the following databases has PHP supported almost since the beginning?A. Oracle Database B. SQL C. SQL+ D. MySQLAnswer: D

13. Which one of the following statements can be used to select the databaseA. $mysqli=select_db(‘databasename’); B. mysqli=select_db(‘databasename’);C. mysqli->select_db(‘databasename’);

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 83

D. $mysqli->select_db(‘databasename’);Answer: D

14. Which one of the following methods can be used diagnose and displayinformation about a MySQL connection error?A. connect_errno() B. connect_error()C. mysqli_connect_errno() D. mysqli_connect_error()Answer: C

14. Which one of the following is the very first task executed by a session enabled page?A. Delete the previous session B. Start a new sessionC. Check whether a valid session exists D. Handle the sessionAnswer: C

15. Which one of the following function is used to start a session?A. start_session() B. session_start() C. session_begin() D. begin_session()Answer: B

16. The session_start() function must appear..A. after the html tag B. after the body tag C. before the body tag D. before the html tagAnswer: D

17. Which one of the following function is capable of reading a file into a string variable?A. file_contents() B. file_get_contents() C. file_content() D. file_get_content()Answer: B

18. Which one of the following methods is responsible for sending the query to the database?A. query() B. send_query() C. sendquery() D. query_send()Answer: A

19. Which one of the following method is used to retrieve the number of rows affected by an INSERT, UPDATE, or DELETE query?A. num_rows() B. affected_rows() C. changed_rows() D. new_rows()Answer: B

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 84

20. Which of the following methods is used to execute the statement after the parameters have been bound?A. bind_param() B. bind_result() C. bound_param() D. bound_result() Answer: A

UNIT-II1. What does XML stand for?

A. eXtra Modern LinkB. eXtensible Markup LanguageC. Example Markup LanguageD. X-Markup Language Answer: B

2. What is the correct syntax of the declaration which defines the XML version?A. <xml version="A.0" />B. <?xml version="A.0"?>C. <?xml version="A.0" />D. None of the above Answer: B

3. Which statement is true?A. All the statements are trueB. All XML elements must have a closing tag C. All XML elements must be lower case D. All XML documents must have a DTD Answer: B

4. Is it easier to process XML than HTML?A. Yes B. No C. SomtimesD. Cant say Answer: A

5. Which of the following programs support XML or XML applications?A. Internet Explorer 5.5B. Netscape D.7 C. RealPlayer. D. both A and B Answer: D

6. Kind of Parsers are A. Ans: C well-formed B. well-documented C. non-validating and validatingD. none of the above Answer: C

7. Well formed XML document means A. it contains a root element B. it contain an element C. it contains one or more elements

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 85

D. must contain one or more elements and root element must contain all other elements

Answer: D8. Comment in XML document is given by

A. <?-- -->B. <!-- --!>C. <!-- -->D. </-- -- >Answer: C

9. When processing an output XML, "new line" symbolsA. Are copied into output "as is", i.e. "CR+LF" for Windows, CR for Macintosh, LF

for Unix. B. are converted to single LF symbolC. are converted to single CR symbolD. are discarded Answer: D

10. Which of the following strings are correct XML names?A. _myElementB. my Element C. #myElementD. None of the aboveAnswer: D

11. Valid XML document means (most appropriate)A. the document has root elementB. the document contains atleast one or more root elementC. the XML document has DTD associated with it & it complies with that DTDD. Each element must nest inside any enclosing element propertyAnswer: C

12. XML uses the features ofA. HTMLB. XHTMLC. VMLD. SGMLAnswer: D

13. there is a way of describing XML data, how?A. XML uses a DTD to describe the dataB. XML uses XSL to describe dataC. XML uses a description node to describe dataD. Both A and CAnswer: D

13. Which of the following XML documents are well-formed?A. <firstElement>some text goes here <secondElement>another text goes

here</secondElement></firstElement>

B. <firstElement>some text goes here</firstElement><secondElement> another text goes here</secondElement>

C. <firstElement>some text goes here<secondElement> another text goes here</firstElement></secondElement>

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 86

D. </firstElement>some text goes here</secondElement>another text goes here<firstElement>

Answer: A14. Which of the following XML fragments are well-formed?

A. <myElementmyAttribute="someValue"/>B. <myElementmyAttribute=someValue/>C. <myElementmyAttribute=’someValue’>D. <myElementmyAttribute="someValue’/>Answer: A

15. How can we make attributes have multiple values:A. <myElementmyAttribute="value1 value2"/>B. <myElementmyAttribute="value1" myAttribute="value2"/>C. <myElementmyAttribute="value1, value2"/>D. attributes cannot have multiple valuesAnswer: D

16. Which of the following XML fragments are well-formed?A. <myElementmyAttribute="value1 <= value2"/>B. <myElementmyAttribute="value1 & value2"/>C. <myElementmyAttribute="value1 > value2"/>D. None of the aboveAnswer: C

17. The use of a DTD in XML development is:A. required when validating XML documentsB. no longer necessary after the XML editor has been customizedC. used to direct conversion using an XSLT processorD. a good guide to populating a templates to be filled in when generating an XML

document automaticallyAnswer: A

18. Parameter entities can appear inA. xml fileB. dtd fileC. xsl fileD. Both 1 and 2Answer: B

19. Attribute standalone="no" should be included in XML declaration if a documentA. is linked to an external XSL stylesheetB. has external general referencesC. has processing instructionsD. has an external DTDAnswer: B

UNIT-III1. The method getWriter returns an object of type PrintWriter. This class has println

methods to generate output. Which of these classes define the getWriter method? Select the one correct answer. A. HttpServletRequestB. HttpServletResponseC. ServletConfigD. ServletContext

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 87

Answer: B2. Name the method defined in the HttpServletResponse class that may be used to set

the content type. Select the one correct answer. A. setTypeB. setContentC. setContentTypeD. setResponseContentTypeAnswer: B

3. Which of the following statement is correct? Select the one correct answer. A. The response from the dedicated server to a HEAD request consists of status line,

content type and the document. B. The response from the server to a GET request does not contain a document. C. The setStatus method defined in the HttpServletRequest class takes an int as an

argument and sets the status of Http response D. The HttpServletResponse defines constants like SC_NOT_FOUND that may be

used as a parameter to setStatus method. Answer: D.

4. The send Error method defined in the HttpServlet class is equivalent to invoking the set Status method with the following parameter. Select the one correct answer.A. SC_MOVED_TEMPORARILY B. SC_NOT_FOUND C. SC_INTERNAL_SERVER_ERROR D. ESC_BAD_REQUEST Answer: C.

5. The send Redirect method defined in the HttpServlet class is equivalent to invoking the set Status method with the following parameter and a Location header in the URL. Select the one correct answer. A. SC_MOVED_TEMPORARILY B. SC_NOT_FOUND C. SC_INTERNAL_SERVER_ERROR D. ESC_BAD_REQUEST Answer: B

6. Which of the following statements are correct about the status of the Http response. Select the one correct answer. A. A status of 200 to 299 signifies that the request was successful. B. A status of 300 to 399 are informational messages. C. A status of 400 to 499 indicates an error in the server. D. A status of 500 to 599 indicates an error in the client. Answer: A.

7. To send binary output in a response, the following method of HttpServletResponse may be used to get the appropriate Writer/Stream object. Select the one correct answer. A. getStreamB. getOutputStreamC. getBinaryStreamD. getWriterAnswer: B.

8. To send text output in a response, the following method of HttpServletResponse may be used to get the appropriate Writer/Stream object. Select the one correct answer.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 88

A. getStreamB. getOutputStreamC. getBinaryStreamD. getWriterAnswer: D

9. Is the following statement true or false. URL rewriting may be used when a browser is disabled. In URL encoding the session id is included as part of the URL. Answer: true.

10. Name the class that includes the get Session method that is used to get the Http Session object. A. HttpServletRequestB. HttpServletResponseC. SessionContextD. SessionConfigAnswer: A

11. Which of the following are correct statements? Select the two correct answers. A. The getRequestDispatcher method of ServletContext class takes the full path of

the servlet, whereas the getRequestDispatcher method of HttpServletRequest class takes the path of the servlet relative to the ServletContext.

B. They include method defined in the RequestDispatcher class can be used to access one servlet from another. But it can be invoked only if no output has been sent to the server.

C. The getRequestDispatcher(String URL) is defined in both ServletContext and HttpServletRequest method

D. The getNamedDispatcher(String) defined in HttpServletRequest class takes the name of the servlet and returns an object of RequestDispatcher class.

Answer: A, C. 12. A user types the URL http://www.javaprepare.com/scwd/index.html . Which

HTTP request gets generated? Select the one correct answer. A. GET method B. POST method C. HEAD method D. PUT method Answer: A.

13. Which HTTP method gets invoked when a user clicks on a link? Select the one correct answer. A. GET method B. POST method C. HEAD method D. PUT method Answer: A.

13. When using HTML forms which of the following is true for POST method? Select the one correct answer. A. POST allows users to bookmark URLs with parameters. B. The POST method should not be used when large amount of data needs to be

transferred. C. POST allows secure data transmission over the http method. D. POST method sends data in the body of the request. Answer: D.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 89

14. Which of the following is not a valid HTTP/1.1 method? Select the one correct answer. A. CONNECT method B. COMPARE method C. OPTIONS method D. TRACE method Answer: B.

15. Name the http method used to send resources to the server. Select the one correct answer. A. FTP methoddB. PUT method C. WRITE method D. COPY method Answer: B.

16. Name the http method that sends the same response as the request. Select the one correct answer. A. DEBUG method B. TRACE method C. OPTIONS method D. HEAD method Answer: B.

17. Which three digit error codes represent an error in request from client? Select the one correct answer. A. Codes starting from 200 B. Codes starting from 300 C. Codes starting from 400 D. Codes starting from 500 Answer: C.

18. Name the location of compiled class files within a war file? Select the one correct answer. A. /META-INF/classes B. /classes C. /WEB-INF/classes D. /root/classes Answer: C.

19. To send binary output in a response, the following method of HttpServletResponse may be used to get the appropriate Writer/Stream object. Select the one correct answer. A. getStreamB. getOutputStreamC. getBinaryStreamD. getWriterAnswer: B.

UNIT-IV1. When a JSP page is compiled, what is it turned into?

A. Applet B. Servlet C. Application D. Mailet

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 90

Answer: B2. Which of the following is not a standard method called as part of the JSP life

cycle?A. jspInit() B. jspService() C. jspService() D. jspDestroy() Answer: A

3. If you want to override a JSP file's initialization method, within what type of tags must you declare the method?A. <@ @>B. <%@ %>C. <% %>D. <%! %>Answer: B

4. What is the default location for applications served by tomcat? A. /conf B. /webappsC. /bin D. /include Answer: B

5. _ _ _ _ _ _ _ _ _ keep the information on the server and pass only an identifier between a browsers and servers.A. URL Rewriting B. Session tracking C. Session ID D. Session Control Answer: B

6. The doGet() method in the example extracts values of the parameter’s type and number by using __________ A. request.getParameter() B. request.setParameter() C. responce.getParameter() D. responce.getAttribute() Answer: A

7. A JSP is transformed into a(n): A. Java applet B. Java servlet C. Either 1 or 2 above D. Neither 1 nor 2 above Answer: B

8. What programming language(s) or scripting language(s) does Java Server Pages (JSP) support?A. VBScript only B. Jscript only C. Java only D. All of the above are supported Answer: C

9. How many copies of a JSP page can be in memory at a time?[ a]. A. One

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 91

B. Two C. Three D. Unlimited Answer: A

10. How does Tomcat execute a JSP? A. As CGI ScriptB. As an Independent process C. By one of Tomcat Thread D. None of the above is correctAnswer: C

11. A bean with a property color is loaded using the following statement <jsp:usebean id="fruit" class="Fruit"/> What happens when the following statement is executed. Select the one correct answer. <jsp:setProperty name="fruit" property="*"/>A. This is incorrect syntax of <jsp:setProperty/> and will generate a compilation

error. Either value or param must be defined. B. All the properties of the fruit bean are initialized to a value of null. C. All the properties of the fruit bean are assigned the values of input parameters of

the JSP page that have the same name. D. All the properties of the fruit bean are initialized to a value of *. Answer: C

12. Is the following statement true or false. If the isThreadSafe attribute of the page directive is false, then the generated servlet implements the SingleThreadModel interface. Answer: true. (The page directive is defined as <%@page isThreadSafe="false"%> )

13. Which of the following represents a correct syntax for usebean? Select the two correct answers. A. <jsp:usebean id="fruit scope ="page"/>B. <jsp:usebean id="fruit type ="String"/>C. <jsp:usebean id="fruit type ="String" beanName="Fruit"/>D. <jsp:usebean id="fruit class="Fruit" beanName="Fruit"/>Answer: B,C.

14. Name the default value of the scope atribute of <jsp:usebean>. A. page B. application C. session D. request Answer: A

15. Which of the following statements are true for <jsp:usebean>. Select the two correct answers. A. The id attribute must be defined for <jsp:usebean>. B. The scope attribute must be defined for <jsp:usebean>. C. The class attribute must be defined for <jsp:usebean>. D. The <jsp:usebean> must include either type or class attribute or both. Answer: A,D.

16. Which of these are legal attributes of page directive. Select the two correct answers. A. include B. scope C. errorPage

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 92

D. session Answer: C,D.

17. Which of the following represents the XML equivalent of this statement <%@ include file="a.jsp"%> . Select the one correct statementA. <jsp:include file="a.jsp"/>B. <jsp:include page="a.jsp"/>C. <jsp:directive.include file="a.jsp"/>D. There is no XML equivalent of include directive. Answer: C

18. Assume that you need to write a JSP page that adds numbers from one to ten, and then print the output. <% int sum = 0; for(j = 0; j < 10; j++) { %> // XXX --- Add j to sum <% } %> // YYY --- Display ths sum Which statement when placed at the location XXX can be used to compute the sum. Select the one correct statement A. <% sum = sum + j %>B. <% sum = sum + j; %>C. <%= sum = sum + j %>D. <%= sum = sum + j; %>Answer: B

19. Now consider the same JSP example as last question. What must be added at the location YYY to print the sum of ten numbers. Select the one correct statement A. <% sum %>B. <% sum; %>C. <%= sum %>D. <%= sum; %>Answer: C

20. JSP pages have access to implicit objects that are exposed automatically. One such object that is available is request. The request object is an instance of which class? A. HttpRequestB. ServletRequestC. Request D. HttpServletRequestAnswer: D

UNIT-V1. Why so JavaScript and Java have similar name?

A. JavaScript is a stripped-down version of Java B. JavaScript's syntax is loosely based on Java's C. They both originated on the island of Java D. None of the aboveAnswer: B

2. When a user views a page containing a JavaScript program, which machine actually executes the script?A. The User's machine running a Web browser B. The Web server C. A central machine deep within Netscape's corporate offices D. None of the above Answer: A

3. ______ JavaScript is also called client-side JavaScript. A. Microsoft B. Navigator

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 93

C. LiveWireD. Native Answer: B

4. __________ JavaScript is also called server-side JavaScript. A. Microsoft B. Navigator C. LiveWireD. Native Answer: C

5. What are variables used for in JavaScript Programs? A. Storing numbers, dates, or other values B. Varying randomly C. Causing high-school algebra flashbacks D. None of the above Answer: A

6. _____ JavaScript statements embedded in an HTML page can respond to user events such as mouse-clicks, form input, and page navigation. A. Client-side B. Server-side C. Local D. Native Answer: A

7. What should appear at the very end of your JavaScript? The <script LANGUAGE="JavaScript">tag A. The </script>B. The <script>C. The END statement D. None of the above Answer: A

8. Which of the following can't be done with client-side JavaScript? A. Validating a form B. Sending a form's contents by email C. Storing the form's contents to a database file on the serverD. None of the above Answer: C

9. Which of the following are capabilities of functions in JavaScript? A. Return a value B. Accept parameters and Return a value C. Accept parameters D. None of the above Answer: C

10. Which of the following is not a valid JavaScript variable name? A. 2names B. _first_and_last_namesC. FirstAndLastD. None of the above Answer: A

11. ______ tag is an extension to HTML that can enclose any number of JavaScript statements. A. <SCRIPT>

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 94

B. <BODY>C. <HEAD>D. <TITLE>Answer: A

12. How does JavaScript store dates in a date object?A. The number of milliseconds since January 1st, 1970B. The number of days since January 1st, 1900C. The number of seconds since Netscape's public stock offering. D. None of the above Answer: A

13. Which of the following attribute can hold the JavaScript version? A. LANGUAGE B. SCRIPT C. VERSION D. None of the above Answer: A

14. What is the correct JavaScript syntax to write "Hello World"? A. System.out.println("Hello World") B. println ("Hello World") C. document.write("Hello World") D. response.write("Hello World") Answer: C

15. Which of the following way can be used to indicate the LANGUAGE attribute? A. <LANGUAGE="JavaScriptVersion">B. <SCRIPT LANGUAGE="JavaScriptVersion">C. <SCRIPT LANGUAGE="JavaScriptVersion"> JavaScript

statements…</SCRIPT>D. <SCRIPT LANGUAGE="JavaScriptVersion"!> JavaScript

statements…</SCRIPT>Answer: C

16. Inside which HTML element do we put the JavaScript?A. <js>B. <scripting>C. <script>D. <javascript>Answer: C

17. What is the correct syntax for referring to an external script called " abc.js"?A. <script href=" abc.js">B. <script name=" abc.js">C. <script src=" abc.js">D. None of the above Answer: C

18. Which types of image maps can be used with JavaScript?A. Server-side image maps B. Client-side image mapsC. Server-side image maps and Client-side image mapsD. None of the aboveAnswer: B

19. Which of the following navigator object properties is the same in both Netscape and IE?

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 95

A. navigator.appCodeNameB. navigator.appNameC. navigator.appVersionD. None of the above Answer: A

20. Which is the correct way to write a JavaScript array? A. var txt = new Array(1:"tim",2:"kim",3:"jim") B. var txt = new Array:1=("tim")2=("kim")3=("jim") C. var txt = new Array("tim","kim","jim")D. var txt = new Array="tim","kim","jim" Answer: C

11.12 TUTORIAL QUESTION BANK (5/UNIT)PART A (SHORT ANSWER QUESTIONS)

Sl. No. QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT-I1 What is PHP? Knowledge a2 What is Data Type? Knowledge a3 Explain different types of operators? Analysis a4 Explain String Functions? comprehension b5 What is a Function? comprehension a6 Define Multi-dimensional Array? Knowledge a7 Explain Scope, Local, Global, Static? Knowledge a

8

What is the output of the following:<?php$actor[0]=”laxmi”;Echo “\$actor[0]”;?>

Analysis a

9 Discuss associative arrays with example. Analysis a

10

What is the output of following:<?php$x=10;function f(){echo GLOBALS[‘$x’];}f();echo $x;>?

Knowledge b

UNIT-II1 Define an xml scheme show how an XML Scheme can be created Remember a

2 How do you define the elements of an XML document in an XML Schema? Remember a

3 Explain is XML? What are the advantages of xml? understanding a

4 Explain are the different revolution in which XML is playing a major role? Understanding b

5 Explain and show how XML is useful in defining data for web applications. Understanding a

6 Explain the various terms related to Document Type Definition. Understanding a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 96

7 Design an XML schema for hospital information management. Include every feature available with schema. Creating a

8 Explain how styling XML with cascading style sheets is done for the library information domain. Understanding a

9 Discuss the important features of XML which make it more suitable than HTML for creating web related services Creating a

10 What is DOM and SAX? Remembering bUNIT-III

1 List out various phases of Servlet life cycle? Remember a

2 Write a Servlet program to illustrate parameter reading and parameter initializing. ? Remember a

3 When init() method of servlet gets called? Remember a4 When service() method of servlet gets called? Remember b5 When doGet() method of servlet to be called? Remember a6 What are Servlets? Remember a7 What are the major tasks of servlets? Remember a8 For what purpose doGet() method of a servlet is used? Remember a9 How to read form data in servlet? Remember a10 How to read name of all parameters in servlet? Remember b

UNIT-IV1 What is JSP? Remember a2 What are advantages of using JSP? Remember a3 What are the advantages of JSP over Active Server Pages (ASP)? Remember a4 What are the advantages of JSP over Pure Servlets? Remember b5 What are the advantages of JSP over JavaScript? Remember a6 Explain lifecycle of a JSP. Remember a7 What are JSP declarations? Remember a8 What is a sciptlet in JSP and what is its syntax? Remember a9 What are JSP expressions? Remember a10 What are JSP comments? Remember b

UNIT-V1 What is JavaScript? Remember a2 Name some of the JavaScript features. Remember a3 What are the advantages of using JavaScript? Remember a4 What are disadvantages of using JavaScript? Remember b5 Is JavaScript a case-sensitive language? Remember a6 How can you create an Object in JavaScript? Remember a7 How can you read properties of an Object in JavaScript? Remember a8 How can you create an Array in JavaScript? Remember a9 How to read elements of an array in JavaScript? Remember a10 What is arguments object in JavaScript? Remember b

PART B (LONG ANSWER QUESTIONS)

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 97

Sl. No. QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT-I

1 What is string Interpolation? Explain briefly about PHP’s Internal Data Types. Remembering b

2 Explain the conversion between different data types in PHP with an Example program. Understanding e

3 How text manipulation is done in PHP. Write a program to compare two strings and print respectively. Remembering b

4 Write a program in PHP to create a registration page using FORMS. Remembering a5 Write a program in PHP for passing arguments using Functions. Remembering b6 Write a PHP program to print addition of two matrices. Remembering e7 Write a PHP program to count number of words in the given string. Remembering b

8 Write a PHP program to check whether given number is Armstrong or not. Remembering e

9 Write a PHP program to create user validation Form. Remembering b10 Explain about foreach loop. Remembering A

UNIT-II

1 Explain and show how XML is useful in defining data for web applications. understanding b

2 Explain the various terms related to Document TypeDefinition. understanding e

3 Design an XML schema for hospital information management. Include every feature available with schema. Creating b

4 Explain how styling XML with cascading style sheets is done for the library information domain. Creating a

5 Discuss the important features of XML which make it moreSuitable than HTML for creating web related services. Creating b

6 Define an xml scheme show how an XML Scheme can be created Remember e

7 Write a JavaScript program to validate XML documentagainst a schema? Remember b

8 When an element is called simple? How does it differ from acomplex element? Remember e

9 How do you define the elements of an XML document in anXML Schema? Remember b

10 How do you set default and fixed values for simple Elements? Remember aUNIT-III

1 Write a Servlet that generates HTML page and explain theprocess of generation of HTML page Remember b

2 List and explain the classes and interfaces of javax. Servlet .httppackage. Remember e

3 Develop a Servlet that handles HTTP get Request Applying b4 Describe about session tracking with relevant code snippet. understanding a5 Servlet offer several advantages over CGI". Justify evaluating b6 Write about Security Issues in Servlet Remember e

7 Write about Servlet? Explain lifecycle of a Servlet. Illustratewith an example program. Remember b

8 Write a Servlet program to illustrate parameter reading andparameter initializing. Remember e

9 Explain Cookies session tracking with relevant code snippet. understanding b10 List the methods defined in HttpServletRequest. Remember a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 98

UNIT-IV1 Write about the JSP processing. Remember b

2 Explain the mechanism to include resources dynamically and to forward request to other JSPs? understanding e

3 Explain about JSP Elements? understanding b4 List the different Action Tags used in JSP with their functionality Remember a5 Explain the types of Scripting tags and Directive tags in JSP. understanding b6 Write a Short note on JSP Implicit Objects. Remember e

7 Explain different JSP Directive Elements? Explain each oneof them in detail? understanding b

8 Explain JSP application design with suitable example? understanding e9 Write a JSP with a Bean in the session scope. Remember b

10 Describe the MVC architecture and write a JSP programwhich prints the current date? understanding a

UNIT-V

1Write a JavaScript that displays the as per the following: Understand(calculates the squares and cubes of the numbers from 0 to 210)

Remember b

2

Write a JavaScript to analyze a subject code for subject in a semester. The subject code may be visualized like 12 CS 43engineering discipline as Computer Science and Engineeringand „4‟ gives the semester details as 4 them, and „3‟ gives thesubject in formatin.

Remember E

4 Show how JavaScript can handle the events? “JavaScript is event driven”. What is meant by an event? comprehension A

5 Define an Object. Explain the various objects that are used in the JavaScript comprehension B

6 Write a java script which accepts text in lower case and displays text in uppercase.

Remember E

7 Write a java script to validate a form consisting of user name. Also navigate to another web pages after navigation Remember B

8 Write a java script that read four integers and display the largest and displays the largest and smallest integers from the given integers. Remember E

9 Write a java Script program to determine whether a given number is an Armstrong number or not Remember B

10Write a JavaScript that reads list of ten numbers and displays the count of negative numbers, the count of positive numbers and the count of zeros from the list.

Remember A

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S. No QuestionBlooms

Taxonomy Level

Course Outcome

UNIT –I

1 Write a php program that replaces some characters with some other characters in a string. Comprehension 4

2 Write a php program uses a constant inside a function, even if it is defined outside the function.

Application,Synthesis 4

3 Write a php program that uses array operators. Application,Synthesis

4

UNIT –II

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 99

1 Try an XML program to print the food menu. Application 5

2 Implement xml in doing CD catalog. Application 5

UNIT –III

1 Write a servlet program to print hello world. Analysis , valuation

8

2 Write a sample program which will pass two values to HelloForm program using GET method.

Application 8

3 Write a servlet program using getHeaderNames() method of HttpServletRequest to read the HTTP header information.

Application 8

UNIT –IV

1 Write login HTML page, we will put it in the welcome files list in the web.xml so that when we launch the application it will open the login page. If the login will be successful, the user will be presented with new JSP page with login successful message

Application 10

2 Write a jsp program to print the current date. Application 10

3 Use setIntHeader() method to set Refresh header to simulate a digital clock.

Understand 10

UNIT –V

1 Write a javascript program to print fibnocci series. Application, Synthesis

12

2 Write a JavaScript form validation program with example. Application 12

3 Write a JavaScript palindrome program with example. Application 12

11. 13 ASSIGNMENT QUESTIONS:PART A (SHORT ANSWER QUESTIONS)

Sl. No. QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT-I1. What is PHP? Remember G2. What is the use of "echo" in php? Remember I3. What's the difference between include and require? Remember I

4. require_once(), require(), include().What is difference between them? Remember A

5. Differences between GET and POST methods? Remember G6. How to declare an array in php? Remember G7. What is the use of 'print' in php? Remember I8. What is use of in_array() function in php ? Remember A9. What is use of count() function in php ? Remember G10. What is sql injection ? Remember I

UNIT-II1. What is XML? Remember I2. What is the difference between XML and HTML? Remember I3. What is a well-formed XML document? Remember I4. What is a valid XML document? Remember I5. What is a Processing Instruction in XML? Remember I6. How does the XML structure is defined? Analyze D

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 100

7. What is DTD? Remember G8. What is a Complex Element? Remember A9. What is a Simple Element? Remember G

10. What are namespaces? Why are they important? Remember AUNIT-III

1. What are the advantages of servlets over CGI? Remember I2. How to redirect a request from a servlet to another servlet? Remember I3. How sendRedirect method works? Remember A4. What are servlets filters? Remember G5. For what purpose destroy() method of a filter is used? Remember G6. How to create a cookie using servlet? Remember I7. How to read a cookie using servlet? Remember A8. How to delete a cookie using servlet? Remember G9. How to create a session in servlet? Remember I10. How to update an attribute in session in servlet? Remember A

UNIT-IV1. What is a page directive? Remember I2. What is a buffer attribute? Remember I3. What is contentType attribute? Remember I4. What is session attribute? Remember D5. What is a taglib directive? Remember D6. What is a include directive? Remember A7. What is <jsp:setProperty> action? Remember G8. What is <jsp:getProperty> action? Remember A9. What are JSP implicit objects? Remember G10. What is a response object? Remember A

UNIT-V1. Which built-in method sorts the elements of an array? Remember I

2. Which built-in method returns the calling string value converted to lower case? Remember I

3. How typeof operator works? Remember I4. What typeof returns for a null value? Remember I5. How to read a Cookie using JavaScript? Remember I6. How to delete a Cookie using JavaScript? Remember I7. How to handle exceptions in JavaScript? Remember G

8. Which built-in method reverses the order of the elements of an array? Remember I

9. Which built-in method combines the text of two strings and returns a new string? Remember I

10. What is the purpose of 'this' operator in JavaScript? Remember I

PART B (LONG ANSWER QUESTIONS)

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 101

Sl. No. QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT-I

1. How to set a page as a home page in a php based site? How to find the length of a string? Remember G

2. What is mean by an associative array? Write a program to print the name and the age of a person’s using associative arrays. Remember G

3. Extend the importance of "method" attribute in a html form? Explain it with the help of an example. Understanding I

4. What is the importance of "action" attribute in a html form? Remember A5. How to create an array of a group of items inside an HTML form? Remember A

UNIT-II

1. How XSL-FO Works (or) How would you produce PDF output using XSL’s? Remember G

2. Explain XSLT? Understanding E3. What is a CDATA section in XML? Remember A4. What is XML parser? Remember A5. What are the interfaces of SAX? Remember A

UNIT-III1. What are common tasks performed by Servlet Container? Remember D2. What is Servlet Config object? What is Servlet Context object? Remember A3. What is difference between Servlet Config and Servlet Context? Remember D

4. What is Request Dispatcher? What is difference between Print Writer and Servlet Output Stream? Remember A

5. What is Single Thread Model interface? Remember DUNIT-IV

1. Explain JSP directives. Understand A2. Show attributes of page directives. Apply A3. What are standard actions in JSP? Understand G4. Explain the jsp:set Property action. Understand I5. Explain client and server side validation. Understand D

UNIT-V

1. What is called Variable typing in Javascript? How can you convert the string of any base to integer in Java Script? Remember E

2. What is an undefined value in JavaScript? What are all the types of Pop up boxes available in JavaScript? Remember I

3. What is the difference between an alert box and aconfirmation box?What are escape characters? Remember D

4. Explain what is pop() method in Java Script? Mention what is the disadvantage of using inner HTML in JavaScript? Understanding A

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 102

Sl. No. QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT-I

1. How to set a page as a home page in a php based site? How to find the length of a string? Remember G

2. What is mean by an associative array? Write a program to print the name and the age of a person’s using associative arrays. Remember G

3. Extend the importance of "method" attribute in a html form? Explain it with the help of an example. Understanding I

4. What is the importance of "action" attribute in a html form? Remember A5. How to create an array of a group of items inside an HTML form? Remember A

UNIT-II1. Explain XSLT? Understanding E2. What is a CDATA section in XML? Remember A3. What is XML parser? Remember A4. What are the interfaces of SAX? Remember A

UNIT-III5. What is a web application and what is it’s directory structure? Remember A1. What are common tasks performed by Servlet Container? Remember D2. What is Servlet Config object? What is Servlet Context object? Remember A3. What is difference between Servlet Config and Servlet Context? Remember D

4. What is Request Dispatcher? What is difference between Print Writer and Servlet Output Stream? Remember A

5. What is Single Thread Model interface? Remember DUNIT-IV

1. Explain JSP directives. Understand A2. Show attributes of page directives. Apply A3. What are standard actions in JSP? Understand G4. Explain the jsp:set Property action. Understand I5 Explain client and server side validation. Understand D

UNIT-V

1. What is an undefined value in Java Script? What are all the types of Pop up boxes available in JavaScript? Remember I

2. What is the difference between an alert box and a confirmation box?What are escape characters? Remember D

3. Explain what is pop() method in Java Script? Mention what is the disadvantage of using inner HTML in JavaScript? Understanding A

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 103

12. COMPILER DESIGN (A10522)

12.1 COURSEDESCRIPTION FORM:

Course Title COMPILER DESIGNCourse Code A10522Regulation MLR-15

Lectures Tutorials Practical’s CreditsCourse Structure

3 1 - 3Course Coordinator Mrs. Tulasi Chitra , Assoc. Professor CSE

Team of Instructors Mrs. K. Archana , Assoc. Professor/ Mrs.Anjusha Assoc. Professor,/Mr. Y. Madhan Reddy Asst.Professor CSE

12.1 COURSE OVERVIEW:This course deals with the basic techniques of Compiler Construction and tools that can

used to perform syntax-directed translation of a high-level programming language into an executable code. This will provide deeper insights into the more advanced semantics aspects of programming languages, code generation, machine independent optimizations, dynamic memory allocation, types and their inferences, object orientation. The course is presented to the students by using power point projections, lecture notes, subjective and objective tests, assignments, and laboratory.

12.2 PREREQUISITE(S):

Level Credits Periods / Week PrerequisitesUG 3 5 C Programming and Formal Languages Automata Theory

12.3. MARKS DISTRIBUTION:

Session Marks University EndExam Marks Total Marks

There shall be 2 midterm examinations. Each midterm Examination Consists of subjective type and Objective type tests.The subjective test is for 10 marks, with duration of 1 hour. Subjective test of each semester shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for10 marks with duration of 20 minutes. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first four units of syllabus and second midterm examination shall be conducted for the Remaining portion.Five marks are marked for assignments. There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course

75 100

12.4 EVALUATION SCHEME:

S. No Component Duration Marks

1 I Mid Examination 80minutes 20

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 104

2 I Assignment 5

3 II Mid Examination 80minutes 20

4 II Assignment 5

5 External Examination 3 hours 75

COURSE OBJECTIVES:I. To teach concepts of language translation and phases of compiler design

II. To describe the common forms of parsers III. To inculcate knowledge of parser by parsing LL parser and LR parser IV. To demonstrate intermediate code using technique of syntax directed translation V. To Illustrate the various optimization techniques for designing various

optimizing compilers

12.5 COURSE OUTCOMES:

Course Outcomes Blooms Level

a. Use compiler construction tools and describes the Functionality of each stage of compilation process BL 1 & 2

b. Construct Grammars for Natural Languages and find the Syntactical Errors/Semantic errors during the compilations using parsing techniques

BL 6

c. Analyze different representations of intermediate code. BL 2 & 3

d. Construct new compiler for new languages. BL 6

e. Participate in GATE BL 2 & 3

BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate BL 6: Create

12.6 HOW COURSE OUTCOMES ARE ASSESSED:

Program Outcomes Level Proficiencyassessed by

AAn ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.

S Exercises

B An ability to design and conduct engineering experiments, as well as to analyze and interpret data.

C An ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. H Exercises

DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams.

EAn ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipment’s necessary to analyze computer Problems.

H Assignments

F An understanding of professional, social and ethical responsibility N -----

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 105

GAn ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements.

S Exercises

H The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context. H Discussion

IGraduate will develop confidence for self-education and acquire new knowledge in the computing discipline and ability and practice for Multi-disciplinary tasks as a member within the teams

H ExampleAssignments

J To communicate effectively N -----

K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice N -----

L Graduates are able to participate and succeed in competitive examination like GRE,GATE, TOEFL, GMAT etc. H Exams

Discussion

M

The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.

NThe basic knowledge of electronics, electrical components, computer architecture and applications of microcomputer systems, communications needed in data transport.

N= None S= Supportive H = Highly Related

12.7 SYLLABUS:

UNIT – IINTRODUCTION TO COMPILERS: Definition of compiler, interpreter and its differences, the phases of a compiler, role of lexical analyzer, regular expressions, finite automata, from regular expressions to finite automata, pass and phases of translation, bootstrapping, LEX-lexical analyzer generator.PARSING: Parsing, role of parser, context free grammar, derivations, parse trees, ambiguity, elimination of left recursion, left factoring, eliminating ambiguity from dangling-else grammar, classes of parsing, top down parsing - backtracking, recursive descent parsing, predictive parsers, LL(1) grammars.

UNIT – IIBOTTOM UP PARSING: Definition of bottom up parsing, handles, handle pruning, stack implementation of shift-reduce parsing, conflicts during shift-reduce parsing, LR grammars, LR parsers-simple LR, canonical LR(CLR) and Look Ahead LR (LALR) parsers, error recovery in parsing, parsing ambiguous grammars, YACC-automatic parser generator.

UNIT - IIISYNTAX DIRECTED TRANSLATION: Syntax directed definition, construction of syntax trees, S- attributed and L-attributed definitions, translation schemes, emitting a translation.INTERMEDIATE CODE GENERATION: intermediate forms of source programs– abstract syntax tree, polish notation and three address code, types of three address statements and its implementation, syntax directed translation into three-address code, translation of simple statements, Boolean expressions and flow-of-control statements.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 106

UNIT - IVTYPE CHECKING: Definition of type checking, type expressions, type systems, static and dynamic checking of types, specification of a simple type checker, equivalence of type expressions, type conversions, overloading of functions and operators.RUN TIME ENVIRONMENTS: Source language issues, Storage organization, storage-allocation Strategies, access to non-local names, parameter passing, symbol tables and language facilities for dynamic storage allocation.

UNIT - VCODE OPTIMIZATION: Organization of code optimizer, basic blocks and flow graphs, optimization of basic blocks, the principal sources of optimization, the directed acyclic graph (DAG) representation of basic block, global data flow analysis.CODE GENERATION: Machine dependent code generation, object code forms, the target machine, a simple code generator, register allocation and assignment, peephole optimization.

TEXT BOOKS:1. Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman (2007), Compilers

Principles,Techniques and Tools, 2nd edition, Pearson Education, New Delhi, India.

REFERENCE BOOKS:1. Alfred V. Aho, Jeffrey D. Ullman (2001), Principles of compiler design, Indian

student edition, Pearson Education, New Delhi, India.2. Kenneth C. Louden (1997), Compiler Construction– Principles and Practice, 1st

edition, PWS Publishing3. K. L. P Mishra, N. Chandrashekaran (2003), Theory of computer science- Automata

Languages and computation, 2nd edition, Prentice Hall of India, New Delhi, India.4. Andrew W. Appel (2004), Modern Compiler Implementation C, Cambridge

University Press, UK.

12.8 COURSE PLAN:At the end of the course, students are able to achieve the following learning outcomes.

LectureNo. Course Learning Outcomes Blooms Levels Topics to be covered Reference

L1 Understand the basic compilers Understanding Comprehension

Overview of Compilation Introduction to compilation process. http://nptel.ac.in/courses/106108052/2#

T1:1.1-1.4,T2:1.2

L2 Understand the basic compilers Understanding Comprehension

Interpretationhttp://nptel.ac.in/courses/106108052/2#http://nptel.ac.in/courses/106108113/

T1:1.1-1.4,T2:1.2

L3 Understand the difference between Pass and Phases

Understanding Comprehension

Pass and Phases of translationhttp://nptel.ac.in/courses/106108052/1

T1:1.1-1.4,T2:1.2

L4 Understand the Phases of Compilation

Understanding Comprehension

Phases of Compilation• Lexical Analysis Phase• Syntax Analysis Phase• Semantic Analysis Phase• Intermediate Analysis Phase• Code optimization Analysis Phase• Code generation Analysis Phase

T1:1.4-1.8

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 107

http://nptel.ac.in/courses/106108052/2#

L5 Understand the Phases of Compilation

Understanding Comprehension

Phases of Compilation• Lexical Analysis Phase• Syntax Analysis Phase• Semantic Analysis Phase• Intermediate Analysis Phase• Code optimization Analysis Phase• Code generation Analysis Phasehttp://nptel.ac.in/courses/106108052/2#

T1:1.4-1.8

L6 Construct Lexical Analysis Applying Application

Lexical Analysis:• Lexemes• Tokens

http://nptel.ac.in/courses/106104123/2

T1:35-3.7

L7Relate common programming languages are converting into regular grammar and expression.

Remembering Knowledge

Regular Grammar and regular expression for common programming language features

T1:3.3,T2:2.3

L8Relate common programming languages are converting into regular grammar and expression.

Remembering Knowledge

Regular Grammar and regular expression for common programming language features

T1:3.3,T2:2.3

L9Construct a new compiler which is more complicated convert into simpler.

Applying Application

Bootstrappinghttp://nptel.ac.in/courses/117108048/41

T1:3.3,T2:2.3

L10Generate a LEX program withSpecifications with the help of commands

Applying Application

Data structures in compilation -LEXlexical analyzer generatorhttp://nptel.ac.in/courses/106108052/2#

T1:4.1

L11

Identify the grammar w.r.t language L={N, P, T, S} the construct Left most and Right Most derivations.

Applying Application

Top down Parsing: Context free Grammars http://nptel.ac.in/courses/106106049/#

T1:4.1

L14 For Construction of Predictive parser require steps

Applying Application

Pre-processing steps required forpredictive parsing:• Remove Back Tracking• Remove left recursion• Remove left Factoring• Remove ambiguityConstruction of Predictive Parsing structure.

T1:4.1, T2:3.1

L15 For Construction of Predictive parser require steps

Applying Application

Pre-processing steps required for predictive parsing:• Remove Back Tracking• Remove left recursion• Remove left Factoring• Remove ambiguityConstruction of Predictive Parsing structure.

T1:4.1, T2:3.1

L16 Construction of Predictive Parsing Table

Applying Application

Predictive parsing LL (1)• Construct FIRST() Function• Construct Follow () Function

Construction of Predictive Parsing Table

T1:4.4

L17 Construction of Predictive Parsing Table

Applying Application

Predictive parsing LL (1)• Construct FIRST() Function• Construct Follow () Function

Construction of Predictive Parsing Table

T1:4.4

L18 Construction of Predictive Applying Predictive parsing LL (1) T1:4.5,4.6,

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 108

Parsing Table Application • Construct FIRST() Function• Construct Follow () Function

Construction of Predictive Parsing Table

L19

Construction of Recursive descent parsing- Construct Each and Every Non- Terminal as a production or Method.

Applying Application Recursive descent parsing T1:4.5,4.6,

L20

Construction of Recursive descent parsing-Construct Each and Every Non-Terminal as aproduction or Method

Applying Application Recursive descent parsing T1:4.5,4.6,

L21Understand the Basic Concept of Bottom up Parsing and it’s Types.

Understanding Comprehension

Bottom up parsing : Shift Reduceparsing T1:4.5,4.6,

L22 Construct Shift Reduce parsing table

Applying Application

Shift Reduce parsing• Construct Shift Action• Construct Reducing Action• Understand the Accept Action

T1: 4.7

L23 Construct LR parsing table Applying Application

LR parsing• Construct Canonical set of Items• Construct FIRST() Function• Construct Follow () Function• Construction of LR Parsing Table

T1: 4.7

L24 Construct LR parsing table Applying Application

LR parsing• Construct Canonical set of Items• Construct FIRST() Function• Construct Follow () FunctionConstruction of LR Parsing Table

T1: 4.7

L25 Construct LR parsing table Applying / Application

LR parsing• Construct Canonical set of Items• Construct FIRST() Function• Construct Follow () FunctionConstruction of LR Parsing Table

T1:4.8

L26 Construct LALR parsing table Applying Application

LALR parsing• Construct Canonical set of Items of

SLR and CLR• Merge SLR and CLR Canonical set

of Items.• Construct FIRST() Function• Construct Follow () Function

Construction of LALR Parsing Table

T1:4.8

L27 Construct LALR parsing table Applying Application

LALR parsing• Construct Canonical set of Items of

SLR and CLR• Merge SLR and CLR Canonical set

of Items.• Construct FIRST() Function• Construct Follow () Function• Construction of LALR Parsing

Table

T1:4.5,4.6,

L28 Construct LALR parsing table Applying Application

LALR parsing• Construct Canonical set of Items of

SLR and CLR• Merge SLR and CLR Canonical set

of Items.

T1: 4.7

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 109

• Construct FIRST() Function• Construct Follow () FunctionConstruction of LALR Parsing Table

L29 Identify the Errors in LR parsing by using methods.

Applying Application

Error recovery in parsingConstruct Canonical set of Itemshttp://nptel.ac.in/courses/106108113/11

T1:4.9

L30 Identify the ambiguous grammar LR parsing by using methods.

Applying Application

Handling ambiguous grammarConstruct Canonical set of Itemshttp://nptel.ac.in/courses/106106049/

T1:4.9

L31Implement LALR parser generator and Identify the Syntactical Error Messages

Applying Application

YACC – Automatic parser generator• Specification Rules• Commandshttp://nptel.ac.in/courses/106108052/2#

T1:4.9

L32

Understand Intermediate forms of sourcePrograms and construct the object code forms

Understanding Comprehension

Semantic analysis: Intermediate forms of source Programs.• Abstract syntax tree• polish notation• three address codeshttp://nptel.ac.in/courses/106108113/

T1:5.1

L33Understand Intermediate forms of source Programs and construct the object code forms

Understanding Comprehension

Intermediate forms of source Programs.• Abstract syntax tree• polish notation• three address codeshttp://nptel.ac.in/courses/106108052/2#

T1:5.2

L34 Understand Types of the Attributed grammars

Understanding Comprehension

Attributed grammars• Synthesized Attributed grammars• Inherited Attributed grammarshttp://nptel.ac.in/courses/106108052/2#

T1: 5.3

L35Understand translation schemes and convertinto Intermediate forms

Understanding Comprehension

Syntax directed translation• Mkptr (op,operand1,operand2)

method• Mkleaf (operand1,id) Method• Mknum (operand1,num) methodhttp://nptel.ac.in/courses/106108052/2#

T1: 5.4

L36 Apply programming language Code into Intermediate forms

Applying Application

Conversion of popular Programminglanguages language Code Constructs into Intermediate formshttp://nptel.ac.in/courses/106108052/2#

T1: 5.4

L37 Apply programming language Code into Intermediate forms

Applying Application

Conversion of popular Programminglanguages language Code Constructs into Intermediate formshttp://nptel.ac.in/courses/106108052/2#

T1:8.1-8.6

L38 Understand Type checker Understanding Comprehension

Type checker.• Implicit method• Explicit method

T1:8.1-8.6

L39 Understand the symbol table format

Understanding Comprehension

Symbol Tables: Symbol table format• Entries in the symbol table• Link with symbol and Hash Table

Types of name length• Variable name length• Fixed name Length

T1:6.1-6.2

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 110

http://nptel.ac.in/courses/106108052/1

L40 To Identify and Analyze the block structures languages

Applying Application

Organization for block structuresLanguages T1:6.1-6.2

L41 Identify scope information Applying Application

Hashing, tree structures representation of scope information.http://nptel.ac.in/courses/106108052/2#

T1: 6.3-6.6

L42To Differentiate Block structures and non block of various programming languages

Applying Application

Block structures and non-block structure storage allocationhttp://nptel.ac.in/courses/106108052/2#

T1: 6.3-6.6

L43 To Compare different storage allocation

Applying Application

Static, Runtime stack and heap storage allocationhttp://nptel.ac.in/courses/106108052/2#

T1:7.6

L44 To Compare different storage allocation

Applying Application

Storage allocation for arrays strings and records.http://nptel.ac.in/courses/106108052/2#

T1:7.6

L45 Understand Various optimization techniques

Code optimization: Consideration forOptimization

• Algorithm• Programming language• Address allocation Types of

Optimization• Machine dependent optimization• Machine Independent optimization

T1:7.7

L46 Understand Various optimization techniques

Understanding Comprehension

Scope of OptimizationLocal OptimizationLoop Optimizationhttp://nptel.ac.in/courses/106108052/6

T1:7.8-7.9

L47 Understand Various optimization techniques

Understanding / Comprehension

local optimizationCommon sub expression eliminationCopy propagationDead code eliminationReduction in strengthhttp://nptel.ac.in/courses/106108052/6

T1:10.2-10.3

L48 Understand Various optimization techniques

Understanding / Comprehension

local optimizationCommon sub expression eliminationCopy propagationDead code eliminationReduction in strengthhttp://nptel.ac.in/courses/106108052/6

T1:10.4

L49 Understand Various optimization techniques

Understanding Comprehension

loop optimizationLoop Invariant methodLoop Motion/MovementConstant PropagationLoop FusionLoop UnrollingRedundant common subexpression elimination

http://nptel.ac.in/courses/106108052/6

T1:10.5

L50 Understand Various optimization techniques

Understanding Comprehension

loop optimizationLoop Invariant methodLoop Motion/MovementConstant PropagationLoop FusionLoop UnrollingRedundant common sub expression

T1:10.6

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 111

eliminationhttp://nptel.ac.in/courses/106108052/6

L51 Understand DAG representation for basic blocks and flow graph.

Understanding Comprehension

DAG representation.Identify the rulesApply the conceptConstruct DAGhttp://nptel.ac.in/courses/106108052/8

T2:9.1

L52 Understand DAG representation for basic blocks and flow graph.

Understanding Comprehension

DAG representation. Identify the rules of DAG Apply the concept Construct DAGhttp://nptel.ac.in/courses/106108052/8

T1:10.7-10.8

L53 Construct the three address code for Flow Graph

Applying Application

Data flow analysis: Flow graphConstruct the three codeConstruct basic blockshttp://nptel.ac.in/courses/106108052/2#

T1:10.9

L54 Construct the three address code Data flow equation.

Applying Application

Data flow equation.Construct exit and entry levelsConstruct Table based on levels with available equations.http://nptel.ac.in/courses/106108052/2#

T1:10.9

L55 Understand the global optimization

Understanding Comprehension

global optimizationStructural level equationNumbered level equationhttp://nptel.ac.in/courses/106108052/1

T1:10.10

L56Understand the global optimization of redundant sub expression elimination

Understanding Comprehension

redundant sub expression eliminationhttp://nptel.ac.in/courses/106108052/17

T1:10.11

L57 Understand Induction variable elements

Understanding Comprehension

Induction variable elementsIdentify the dependent variable of available expressionIdentify the which is linked with dependent variable.http://nptel.ac.in/courses/106108052/24

T1:10.12

L58 Understand Live variable analysis

Understanding Comprehension

Live variable analysisIdentify the which the live variableBased on basic block and given expression.http://nptel.ac.in/courses/106108052/24

T1:10.12

L59 Understand Live variable analysis

Understanding Comprehension

Live variable analysisIdentify the which is the live variableBased on basic block and given expression.http://nptel.ac.in/courses/106108052/2

T1:10.13

L60 Understand Copy propagation of local Optimization

Understanding Comprehension

Copy propagationIdentify the which is the copy statement in three address codeBased on basic block and given expression.http://nptel.ac.in/courses/106108052/24

T1:10.14

L61 Understand various Object code forms

Understanding Comprehension

Object code generation: Object codeformsAbsolute codeReloadable codeAssembler code

T1:10.15

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 112

L62 Understand various code optimization Techniques

Understanding Comprehension

Machine dependent code optimizationGraph ColoringRegister allocationGlobal optimizationhttp://nptel.ac.in/courses/106108113/http://nptel.ac.in/courses/106108052/3

T1:10.16

L63Understand various Register allocation and Assignment techniques

Understanding Comprehension

Register allocation and AssignmentMost frequent used variablesLocal /global Register allocation and Assignmenthttp://nptel.ac.in/courses/106108052/13

T1:10.17

L64 Understand Generic code generation Algorithms

Understanding Comprehension

Generic code generation algorithmsConstruct three address codeConstruct Assembly codeAssign the register

T1:10.18

L65 Understand various applications DAG

Understanding Comprehension

DAG for register allocation.Labeling AlgorithmHeuristic Algorithmhttp://nptel.ac.in/courses/106108052/38

T1:10.19-23

SESSION PLANNER

S. No

Unit &

Chap No.

Lec. No Topic Session Objectives Date

plannedDate

Conducted

L1 Overview of Compilation

1. By the end of the session students will able to understand the process of compilation by using on various tools

L2 Compiler, Interpreterand its differences

1. By the end of the session students will able to identify the process of compilation, interpretation and its differences by using on various tools.

L3 Phases of Compilation

1. By the end of the session students will list out phases of compilation during the process of compilation.

L4 Phases of Compilation

2. And also able to understand various phases and they will identify the output of each phase.

L5 Lexical Analysis

1. By the end of the session students will able to know about generation of tokens by lexical phase.

<------------UN

IT-I--------------

<------------UN

IT-II--------------

L6Regular Grammar and regular expression to finite automata

1. By the end of the session students will able to understand the difference between the regular grammar and regular

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 113

expressions.

L7

Regular Grammar and regular expression to finite automata

2. And students are able to apply on various languages

L8 Pass and Phases of translation

1. By the end of the session student will identify the difference between Pass and Phases.

L9 Bootstrapping

1. By the end of the session students will able to design new compiler with the concept of bootstrapping

L10Data structures in compilation -LEX lexical analyzer generator

1. By the end of the session students will able to know what are the necessary steps required for LEX program generation and execution of the program.

L11

Parsing: Parsing, role of parsing, Context free grammars, derivation, parse trees, ambiguity

1. By the end of the session students will able to understand the context free grammar rules and structure.

L12Elimination of left recursion, left factoring

1. By the end of the session students will able to know about top-down parsing techniques and limitations.

L13

Eliminating ambiguity from dangling- else grammar, classes of parsing

1. By the end of the session students will identify the top-down parsing problems, and they will try to remove the problems.

L14Pre-processing steps required for predictive parsing:top down parsing

By the end of the session students will able to understand the difference between the regular grammar and regular expressions.

L15Pre-processing steps required for predictive parsing

1. By the end of the session students will able to know how to construct predictive parsing required steps.

L16 Predictive parsing LL (1)

2. By the end of the session students will able to remove the problems of top-down parsing techniques.

L17 Predictive parsing LL (1)

3 By the end of the session students will able to construct the FIRST & FOLLOW sets

L18 Predictive parsing 4. By the end of the session

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 114

LL (1) students will able to construct table with the help of FIRST & FOLLOW sets

L19 Recursive descent parsing

1. By the end of the session students will able to remove the problems of top-down parsing techniques.

L20 Recursive descent parsing

2. By the end of the session students will able to write the procedures for each and every non-terminals then construct the Recursive descent parsing.

L21Bottom up parsing : Shift Reduce parsing

By the end of the session students will able to know the difference between top-down and bottom-up parsing techniques.

L22 Shift Reduce parsing

By the end of the session students will able to construct the shift reducing parsing.

L23 LR parsing

By the end of the session students will able to know about the requirements of LR parsers.

L24 LR parsing

By the end of the session students will able to construct the FOLLOW function.

L25 LR parsing

By the end of the session students will able to construct the LR parsing table

L26 LALR parsingBy the end of the session students will able to construct canonical set items

L27 LALR parsingBy the end of the session students will able to construct SLR Parsing Table

L28 LALR parsing

By the end of the session students will able to construct LALR parsing table

L29 Error recovery in parsing

By the end of the session students will able to understand how to decode the error mesaages.

L30 Handling ambiguous grammar

By the end of the session students will able to remove the ambiguity.

<------------UN

IT- II------

L31 YACC – Automatic parser generator

By the end of the session students will able to generate automatic parser generator by using YACC.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 115

L32

Syntax directed translation: Intermediate forms of source Programs -Abstract syntax tree, polish notation and three address codes

By the end of the session students will able to build symbol table, data type identifier, type checking, and scope of the identifier.

L33

Intermediate forms of source Programs -Abstract syntax tree, polish notation and three address codes

By the end of the session students will able to create Abstract syntax tree, polish notation and three address codes.

L34 Attributed grammars

By the end of the session students will able to know about the types of attribute grammars.

L35 Syntax directed translation

By the end of the session students will able to translation schemes.

L36

Conversion of popular Programming languages language Code Constructs into Intermediate forms

By the end of the session students will able to Programming languages language Code Constructs into Intermediate forms.

L37

Conversion of popular Programming languages language Code Constructs into Intermediate forms

By the end of the session students will able to Programming languages language Code Constructs into Intermediate forms.

L38 Type checker.

By the end of the session students will able to convert from one type to another type.

L39Symbol Tables: Symbol table format

By the end of the session students will able to understand structure symbol table and it’s types.

L40Organization for block structures languages

By the end of the session students will able to understand Scope of the langauges while accessing storage allocation.

L41Hashing, tree structures representation of scope information.

By the end of the session students will able to understand different between the representation of hash and tree structure.

L42Block structures and non block structure storage allocation

By the end of the session students will able to know dynamic and static storage allocations.

<------------UN

IT-III-------

L43Static, Runtime stack and heap storage allocation

By the end of the session students will able to difference between the various storage allocation

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 116

strategies.

L44Storage allocation for arrays strings and records.

By the end of the session students will able to understand the difference between the arrays and records for storage allocations.

L45Code optimization: Consideration for Optimization

By the end of the session students will able to know about what are the considerations for code optimizations.

L46 Scope of Optimization

By the end of the session students will able to understand optimization techniques and andit’s types.

L47 local optimization

By the end of the session students will able to understand the types of local optimization methods

L48 local optimization

By the end of the session students will able to understand the types of local optimization methods

L49 loop optimization

By the end of the session students will able to understand the types of loop optimization methods

L50 loop optimization

By the end of the session students will able to understand the types of loop optimization methods.

L51 DAG representation.By the end of the session students will able to apply the transformation methods and construct the DAG.

L52 DAG representation.By the end of the session students will able to apply the transformation methods and construct the DAG.

L53 Data flow analysis: Flow graph

By the end of the session students will able to analysis properties then construct the flow graph.

L54 Data flow equation.

By the end of the session students will able to compute data flow equations by using forward and backward substitutions.

L55 global optimization

By the end of the session students will able to know how to perform the global optimizations using transformations.

<--------UN

IT-IV

-------------

L56redundant sub expression elimination

By the end of the session students will able to how to remove the common sub expression elimination by

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 117

using global optimizations.

L57 Induction variable elements

By the end of the session students will able to identify which are the induction variables.

L58 Live variable analysis

By the end of the session students will able to identify which are the live variables while evaluating the expressions.

L59 Live variable analysis

By the end of the session students will able to identify which are the live variables while evaluating the expressions.

L60 Copy propagation

By the end of the session students will able to identify what is the copy propagation, while evaluating the expressions.

L61Object code generation: Object code forms

By the end of the session students will able to know the output of code generation is an object code or machine code.

L62 Machine dependent code optimization

By the end of the session students will able to know which code is the machine dependent code and how to optimize it.

L63 Register allocation and Assignment

By the end of the session students will able to know various strategies of register allocations and how to assign it.

L64Generic code generation algorithms

By the end of the session students will able to apply the translation schemes and templates .

<---UN

IT-V

----

L65DAG for register allocation.

By the end of the session students will able to apply the register allocation methods for DAG.

12.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

S= Supportive H = Highly Related

Course OutcomesCourse Objective

a b c d eI S S H H SII H SIII H S S HIV S SV H S H

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 118

12.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAMOUTCOMES:

Program OutcomesCourse Outcomes A B C D E F G H I J K L M N

a S H H H H Hb S S S S H Sc S H S Hd S He S H

S =Supportive H = Highly Related

12.11 OBJECTIVE QUESTIONS:

UNIT-I1. Match the followings: [Gate-1990]

Group I Group IIA. Lexical Analysis p. DAG’sB. Code optimization q. Syntax treeC. Code generation r. Pushdown AutomatonD. Abelian Group’s s. Finite AutomatonAnswer: a-q, b-p, c-r, d-s

2. Which of the following strings can definitely be said to be token without looking at the next input character while compiling a pascql program? [Gate-1995]I. Begin II. Program III.<>A. IB. IIC. IIID. AllAnswer: CExplanation: <> symbol is said to be token without looking at the next input character while

compiling a Pascal program.3. Type checking is normally done during [Gate-1998]

A. Lexical AnalysisB. Syntax AnalysisC. Syntax Directed TranslationD. Code OptimizationAnswer: Syntax AnalysisExplanation: Type checking is normally done durig syntax analysis. In practice, there are a number of tasks that might be conducted during syntax analysis phase such as performing type checking and other kinds of semantic analysis like generating intermediate code.

4. The number of tokens in the FORTRAN statement DO 10 I= 1.25 is [Gate-1999]A. 3B. 4C. 5D. 6

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 119

Answer: CExplanation:DO10I Number of tokens=5=1.25

5. The ‘C’ language is [NET-DEC-2012]A. Context free languageB. Context sensitive languageC. Regular languageD. None of the aboveAnswer: BExp: Because a context free language is powerful to describe the concept of programming language and also describe the syntax of programming languages.

6. In analyzing the compilation of PL/I program, the term “lexical analysis” is associated with [APSET-2013]A. recognition of basic syntactic constructs through reductionsB. recognition of basic elements and creation of uniform symbolsC. creation of more optional matrixD. use of macro processor to produce more optimal assembly codeAnswer: B

7. In a compiler the module that checks every character of the source text is called [APSET-2012]A. the code generatorB. the code optimizerC. the lexical analyzerD. the syntax analyzer.Answer: C

8. In machine language the operand can be [NET-DEC-2013]A. an addressable registerB. the location of an instruction in memoryC. literal numbers to be used by the programD. any of the above.Answer: any of the above.

9. Which data structure in a compiler is used for managing information about variables and their attributes? [Gate-2010]A. Abstract Syntax treeB. Symbol TableC. Semantic stackD. Parse TableAnswer: symbol tableExplanation: Symbol Table is the data structure used for during the complete information about the source code

10. In Compiler, keywords of a language are recognized during [Gate-2011]A. Parsing of the program B. The code generation C. The lexical analysis of the programD. Dataflow AnalysisAnswer: The lexical analysis of the program

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 120

Explanation: During lexical analysis the compiler scans the source code, divide into words and generate the tokens.

11. Consider the grammar defined by the following production rules, with two operators * and + S →T * PT→ U | T * UP →Q+ P | QQ → IdU → IdWhich one of the following is TRUE? [Gate-2014]A. + is left associative, while * is right associative B. + is right associative, while * is left associative C. Both + and * are right associative D. Both + and * are left associative Answer: BExp: S →T * PT→ U | T * UP →Q+ P | QQ → IdU → IdAs the production rule T T * U is defined as left recursive rule, so * is left associative operator.As the production rule P Q+ P is defined as left recursive rule, so + is a right associative operator.

12. Which one of the following is a top-down parser? [Gate-2007]A. Recursive descent parserB. An LR (k) parserC. Operator precedence parserD. An LALR(k) ParserAnswer: Recursive descent parserExp: Predictive and Recursive Descent Parser are the top-down parser

13. Consider the following two statements: [Gate-2007]P: Every regular grammar is LL (1)Q: Every Regular set has LR (1) GrammarWhich of the following TRUE?A. Both P and Q are trueB. P is true and Q is falseC. P is false and Q is trueD. Both P and Q are falseAnswer: Both P and Q are trueExp: Regular grammar is well recognized by LL (1) parser and LR (1) parser is stronger and more powerful than LL(1) so regular is also accepted by LR(1) parser. Every regular set has LR (1) grammar. So both statements are correct.

14. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar? [Gate-2003]A. Removing left recursion B. Factoring the grammar aloneC. Removing left recursion and factoring the grammar D. None of the above

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 121

Answer: Removing left recursion and factoring the grammarExplanation:To convert an arbitrary CFG to an LL (1) grammar we must remove left recursion and left factoring. If we can’t remove these then the parser may go to infinite loop and requires lot of back tracking.

15. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar? [Gate-2003]A. Removing left recursion aloneB. Factoring the grammar aloneC. Removing left recursion and factoring the grammarD. None of the aboveAnswer: Removing left recursion and factoring the grammarExplanation: To convert an arbitrary CFG to an LL (1) grammar we must remove left recursion and left factoring. If we can’t remove these then the parser may go to infinite loop and require lot of back tracking

16. Consider the grammar shown below [Gate-2003]SiEtSSꞌ | aSꞌeS | εE bIn the predictive parser table. M of this grammar, the entries M[S, $] respectively areA. { SꞌeS} and { Sꞌε}B. {SeS} and { }C. { Sꞌε} and { Sꞌε}D. { SꞌeS, Sꞌε } and { Sꞌε}Answer: { SꞌeS, Sꞌε } and { Sꞌε}

17. Which of the following strings is generated by the grammar? [Gate-2007]SaB/bAB b/bS/aBBAa/aS/bAAA. aaaabbB. aabbbbC. aabbabD. abbbbaAnswer: aabbab

18. Consider the grammar [Gate-2013]SABSc | AbcBA ABAbabBbABAaaaWhich of the following sentences can be derived by this grammar?A. abcB. aabC. abccD. abbcAnswer: abc

19. The language generated by the above grammar is the set of all strings, made up of a, b, c such that [Gate-2013]A. The number of a’s, b’s and c’s will be equal

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 122

B. a’s always precedes b’s C. b’s always precedes c’sD. The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s which

precedes the c’s.Answer: The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s which precedes the c’s.Explanation: Generate some of the strings that can be derived from start state and verify that they fall into the category covered by The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s which precedes the c’s.

20. Consider the following grammar [Gate-2006]S FR R*S | εFidIn the predictive parser table. M of this grammar, the entries M [S,id] and M[R, $] respectively are A. { SFR} and { Rε}B. {SFR} and {R*S }C. { SFR} and { }D. { Fid } and { Rε}Answer: { SFR} and { Rε}

UNIT-II1. Which of the following are Error Recovery Techniques [GATE-2010]

A. Global-Correction IIIB. Phrase-Level Error Recovery C. Error-Production D. All Answer: D

2. The minimum value of k in LR (k) is [GATE2009]A. 1 B. 0 C. 2 D. 3 Answer: B

3. ----------- are the constructed data types. [GATE-2005]A. Arrays B. Structures C. Pointer D. All Answer: D

4. 4. There are ------ representations used for these address code. [GATE-2011]A. 1 B. 2C. 3 D. 4 Answer: C

5. While performing type checking --- special basic types are needed. [APSET-2010]A. 1 B. 2 C. 3

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 123

D. 4Answer: C

6. Indirect triples are used to implement [NET-2008]A. Infix notation B. Postfix notation C. Three address code D. Prefix notation Answer: C

7. A Sound Type system eliminates--, when the target program runs.[NET-2006]A. Type ErrorB. Runtime ErrorC. Compiler Type ErrorsD. DoneAnswer: A

8. Implicit Type Conversion is called -------------- [GATE-2009]A. CoercionB. CorrectionC. C-TypeD. NoneAnswer: A

9. ---determines the type of a language construct from the way it is used. [GATE-2006]A. Type SynthesisB. Type Reference C. Type InferenceD. AllAnswer: B

10. ----------- are the constructed data types. [GATE-2005]A. Arrays B. Structures C. Pointer D. All Answer: D

11. 4. There are ------ representations used for these address code. [GATE-2004]A. 1 B. 2 C. 3 D. 4 Answer: C

12. While performing type checking ------ special basic types are needed.[GATE-2001]A. 1 B. 2 C. 3D. 4Answer: C

13. Indirect triples are used to implement [GATE-2002]A. Infix notation B. Postfix notation C. Three address code D. Prefix notation

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 124

Answer: C14. A collection of syntactic rule is called a [GATE-2001]

A. Grammar B. NFA C. Sentence D. Language Answer: A

15. In operator precedence parsing precedence relations are defined [GATE-2005]A. For all pair of non-terminalsB. Set strings of symbols over givenC. Set of all alphabetsD. Only for a certain pair of terminalsAnswer: D

16. Which Type is the context free Grammar [GATE-2005]A. Type 3B. Type 2C. Type 1D. Type 0Answer: B

17. A Sound Type system eliminates---, when the target program runs.[GATE-2006]A. Type ErrorB. Runtime ErrorC. Compiler Type ErrorsD. DoneAnswer: A

18. 9. Implicit Type Conversion is called -------------- [GATE-2007]A. CoercionB. CorrectionC. C-TypeD. NoneAnswer: A

19. 10. ------determines the type of a language construct from the way it is used.[GATE-2005]

A. Type SynthesisB. Type Reference C. Type InferenceD. AllAnswer: B

20. Which of the following are Error Recovery Techniques [GATE-2003]A. Global-Correction IIIB. Phrase-Level Error Recovery C. Error-Production D. All Answer: D

UNIT-III1. The storage strategy in which activation record is maintained even after the

execution of a procedure is completed is [GATE-2004]A. Stack allocation B. Heap allocation

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 125

C. Static allocation D. Dynamic allocationAnswer: C

2. The following symbol table implementation has the minimum access time.[GATE-2002]A. hash table B. search tree C. linear list D. self-organizing list Answer: B

3. Uniform symbol table [GATE-2005]A. Contains all constants in the program B. Is a permanent table of decision rules in the form of patterns for matching with the

uniform symbol table to discover syntactic structureC. Consists of full or partial list of tokens as they appear in program created by

lexical analysis and used for syntax analysis and interpretation D. A permanent table which lists all keywords and special symbols of language in

symbolic form Answer: C

4. The storage strategy in which activation record is maintained even after the execution of a procedure is completed. [GATE-2006]A. Stack allocationB. Heap allocation C. Static allocation D. Dynamic allocation Answer: B

5. Which of the following parameter passing mechanism has the feature, that operations on the formal parameters do not affect values in the activation record of the caller? [GATE-2000]A. call-by-value B. call-by reference C. call-by-name D. call-by-procedureAnswer: A

6. ----- data structure gives intermediate performance to implement symbol tables. [GATE-2003]

A. hash tables B. trees C. both D. linear listAnswer: B

7. ------ analyzer phase refers symbol table for type conflict issue. [GATE02003]A. semanticB. syntactic C. lexical D. noneAnswer: A

8. -------- is are used as the key to accessing the scope information from symbol table. [GATE2006]A. procedure name

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 126

B. nesting depth C. both D. noneAnswer: C

9. A hash function is defined as F(key) = key mod 7 with linear probing is used to insert the keys 37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then in which location the key 11 is stored. [GATE-2007]A. 6 B. 5 C. 1 D. 4Answer: D

10. A compiler uses a data structure called _________________ to keep track of scope and binding information about names. [GATE-2013]A. Symbol TableB. Hash tableC. BothD. NoneAnswer: A

11. Uniform symbol table [GATE-2012]A. Contains all constants in programB. Is a permanent table of decision rules in the form of patterns for matching with the

uniform symbol table to discover syntactic structureC. Consists of full or partial list of tokens as they appear in program created by

lexical analysis and used for syntax analysis and interpretationD. A permanent table which lists all key words and special symbols of language in

symbolic formAnswer: C

12. When inserted the characters of the string: KRPCSNYTJM into hash table of size 10 by using hash function H (X) = (ORD (X)-ORD ('A') + 1) mod 10 and linear probing to resolve collisions. Insertions that cause collisions are [GATE2004]A. C, SB. Y, MC. J, MD. S, TAnswer: C

13. A hash function is defined as F(key) = key mod 7 with linear probing is used to insert the keys37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then in which location the key 11 is stored.[GATE-2005]A. 6B. 5C. 1D. 4Answer: B

14. A hash function is defined as F (key) = key mod 7 with linear probing is used to insert the keys37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then following key is stored as the last element[GATE-2004]A. 98B. 56

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 127

C. 11D. 48Answer: D

15. The storage strategy in which activation record is maintained even after the execution of a procedure is completed is [GATE-2006]A. Stack allocationB. Heap allocationC. Static allocationD. Dynamic allocationAnswer: B

16. The following symbol table implementation has the minimum access time.[GATE-2008]A. hash tableB. search treeC. linear listD. self-organizing listAnswer: A

17. In the search trees implementation the expected time required to enter 'n' names and make 'm' enquiries is proportional to [GATE-2007]A. (n +m) log nB. (m +n) log mC. m n log nD. m n log mAnswer: A

18. Time is independent of number of entries in a symbol table among [GATE2008]A. Linear listB. Search treeC. Hash tableD. Self-organizing listsAnswer: C

19. Based on the property of locality of reference the symbol table is implemented in [GATE2009]A. Linear listB. search treeC. hash tableD. self-organizing listAnswer: C

20. Access time of symbol table will be logarithmic if it is implemented by[GATE-2011]A. linear listB. search treeC. hash tableD. self-organizing listAnswer:

UNIT-IV1. A region of validity every name possesses in the source program is[Gate-1990]

A. ScopeB. Life timeC. Binding

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 128

D. DomainAnswer: B

2. An optimized compiler [Gate-1991]A. Is optimized to occupy less spaceB. Is optimized to take less time for executionC. Optimized the codeD. Optimized to small typing fontAnswer: C

3. Object language program than the most obvious for a given source program is [Gate-2001]

A. Code generationB. Code optimizationC. Code executionD. Code debuggingAnswer: C

4. The "90-10" rule states that [APSET-2006]A. 90 % of code is executed in 10 % of timeB. 90 % of time is spent in 10 % of codeC. 90 % of time is spent in correcting 10 % of errorsD. 10 % of time is spent in correcting 90 % of errorsAnswer: B

5. The most heavily travelled parts of programs are [NET-2007]A. Inner loopsB. ConstantsC. Static variablesD. Global variablesAnswer: D

6. Machine independent code optimization can be applied to [NET-2003] A. Source codeB. Intermediate representationC. Object codeD. Run-time outputAnswer: A

7. At a point in a program if the value of variable can be used subsequently, then that variable is [NET-2005]A. DeadB. DuplicateC. AliasingD. LiveAnswer: D

8. The region of validity every name possesses in the source program is [GATE-1998]A. ScopeB. Life timeC. BindingD. DomainAnswer: A

9. Which of the following is not a peephole optimization? [GATE 2011]A. Removal of unreachable codeB. Elimination of multiple groupsC. Elimination of loop invariant compilation

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 129

D. Loop unrollingAnswer: C

10. At point p if no matter what path is taken from p, the expression e will be evaluated before any of its operands are defined, then expression e is said to be [GATE-2008]A. LazyB. LateC. BusyD. DummyAnswer: B

11. The evaluation which avoids the action at all which is clearly advantageous [GATE-2001]A. LateB. LazyC. CriticalD. SmartAnswer: C

12. Which of the following comments about peep hole optimization are false. [GATE-1997]A. It is applied to small part of the codeB. It can be used to optimize intermediate codeC. To get the best out of this, it has to be applied repeatedlyD. It can be applied to the code that is contiguousAnswer: C

13. Shorter equivalent sequence. [GATE-2005]A. Peep hole optimizerB. AssemblerC. LinkerD. LoaderAnswer: A

14. The evaluation ordering in which we know beforehand that will have to perform the action anyway, but we find it advantageous to perform it as late as possible [GATE-2007]A. LateB. LazyC. CriticalD. SmartAnswer: A

15. The evaluation ordering in which, code for node is issued as soon as the code for all of its Operands has been issued [GATE-2009]A. EarlyB. LateC. LazyD. CriticalAnswer: C

16. Peep-hole optimization is form of [GATE-2011]A. Local optimizationB. Constant foldingC. Copy propagationD. Data flow analysis

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 130

Answer: A17. If the transformation of a program can be performed by looking only at

statements in basic block then it is said to be [GATE-2010]A. LocalB. GlobalC. AlgebraicD. MatrixAnswer: C

18. If E was previously computed and the values of variable in E have not changed since previous computation, then an occurrence of an expression E is[ GATE-2008]A. Copy propagationB. Dead codeC. Common sub expressionsD. Constant foldingAnswer: C

19. In block B if s occurs in B and there is no subsequent assignment to y within B, then the copy statement s:x :=y is [GATE-2006]A. Generated B. KilledC. BlockedD. DeadAnswer: A

20. In block B if x or y is assigned there and s is not in B then s: x :=y is[GATE-2005]A. GeneratedB. KilledC. BlockedD. DeadAnswer: B

UNIT-V1. The following cannot be used to identify loops [NET-2008]

A. Depth first orderingB. Reducible graphsC. DominatorsD. Flow chartAnswer: D

2. Replacement of a string concatenation operator "||" by an addition is example for [GATE-2009]A. Strength reductionB. Operator overridingC. Operator over loadingD. Operator eliminationAnswer: A

3. The replacement of an expensive operation by a cheaper one [GATE-2001]A. Operator overridingB. Operator overloadingC. Reduction in strengthD. Operator eliminationAnswer: C

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 131

4. The loop which does not contain any other loops are [GATE-2000]A. Natural loopB. Inner loopC. Main loopD. Nested loopAnswer: B

5. Identify the basic blocks in the following code 10 goto 20 20 goto 10 [GATE-2006]A. Go to 20B. Go to 10C. Two independent basic blocksD. Both statements in one blockAnswer: C

6. Loop is collection of nodes that [NET-2008]A. Is loosely connectedB. Is strongly connected with several entriesC. Is having several entriesD. Is strongly connected with unique entryAnswer: D

7. n loop optimization technique a loop whose body is rarely executed is [GATE-2008]A. Dead codeB. Blank codeC. Redundant codeD. Blank stripperAnswer: D

8. If the following optimization is attempted, count of number of jumps to each label can be found from symbol table of that label [GATE-2007]A. Back trackingB. Peephole optimizationC. Dynamic programmingD. Global optimizationAnswer: B

9. The use of the following greatly improves the code when pushing or popping a stack, as in parameter passing [GATE-2000]A. Flow of controlB. Auto increment addressing modesC. Auto decrement addressing modesD. Both auto increment and auto decrement addressing modesAnswer: D

10. The following can be done through peephole optimization [GATE-2007]A. Dynamic programmingB. Greedy methodC. Unreachable code eliminationD. Code generationAnswer: C

11. The following algebraic identities can be eliminated through peephole optimization [GATE-2009]A. x:=x+0B. x:=x*1C. x:=x+0 and x:=x*1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 132

D. Jumps over jumpsAnswer: C

12. Replacing the exponent operator by the shift of multiplication is [GATE-2000]A. Constant foldingB. Reduction in strengthC. Copy propagationD. Elimination of dead variablesAnswer: B

13. Method to improve the target program by examining a short sequence of target instructions [GATE-2011]A. Back trackingB. Peephole optimizationC. Dynamic programmingD. Global optimizationAnswer: B

14. Program transformation that is not characteristic of peephole optimization [GATE-2002]A. Redundant instruction eliminationB. Flow of control optimizationC. Back patchingD. Use of machine idiomsAnswer: C

15. The following is the small moving window in target program [GATE-2000]A. Screen saverB. GraphicsC. PeepholeD. Greedy windowAnswer: C

16. Use of machine idioms is one of the characteristic of [GATE-2012]A. Back trackingB. Peephole optimizationC. Dynamic programmingD. Global optimizationAnswer: B

17. Peephole optimization is to eliminate [GATE-2011]A. Constant foldingB. Jumps over jumpsC. Copy propagationD. Elimination of dead variablesAnswer: B

18. Machine independent optimization is [GATE-2014]A. Register allocationB. Frequency reductionC. Data intermixed with instructionsD. Machine features instructionsAnswer: C

19. Computing two or more identical computations to a place in the program where the computation can be done once and the result to used in the entire original places is [GATE-2015]A. Replacing

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 133

B. ProfilingC. HoistingD. RearrangingAnswer: B

20. Deducing at compile time that the value of an expression is a constant and using that constant instead is [GATE-2013]A. Constant foldingB. Constant deductionC. Macro substitutionD. Copy propagationAnswer: A

12.12 TUTORIALS QUESTION BANKPART - A (SHORT ANSWER QUESTIONS)

S. No QuestionBlooms

Taxonomy Level

Course Outcome

UNIT – I1 Define Complier briefly? Understand a2 Explain the cousins of compiler? Understand b3 Define the two main parts of compilation? What they perform? Understand c4 How many phases does analysis consists? Understand e5 Define and explain the Loader? Remember d6 Explain about preprocessor? Remember a7 State the general phases of a compiler? Understand b8 State the rules, and define regular expression? Remember c9 Explain a lexeme and Define regular sets? Remember e10 Explain the issues of lexical analyzer? Understand d11 State some compiler construction tools? Understand c12 Define the term Symbol table? Understand e13 Define the term Interpreter? Remember d14 Define the term Tokens in lexical analysis phase? Understand a15 Explain about error Handler? Understand e16 Define a translator and types of translator? Understand d17 Explain about parser and its types? Understand c18 Construct NFA for (a/b)* and convert into DFA? Remember e19 Define bootstrap and cross compiler? Understand d20 Define pass and phase? Understand a

21 Analyze the output of syntax analysis phase? What are the three general types of parsers for grammars? Remember e

22 List the different strategies that a parser can employ to recover from a syntactic error? Understand d

23 Explain the goals of error handler in a parser? Understand c24 How will you define a context free grammar? Remember e25 Define context free language. When will you say that two CFGs are equal? Remember d26 Give the definition for leftmost and canonical derivations? Understand c27 Define a parse tree? Understand a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 134

28 Explain an ambiguous grammar with an example? Apply e29 When will you call a grammar as the left recursive one? Apply d30 List different types of compiler? Remember c

UNIT - II1 Define the term handle used in operator precedence? Understand e2 Define LR (0) items in bottom up parsing? Remember d3 State the disadvantages of operator precedence parsing? Remember c4 LR (k) parsing stands for what? Understand e5 Why LR parsing is attractive one and explain? Understand d6 Define go to function in LR parser with an example? Understand c7 Why SLR and LALR are more economical to construct Cananonical LR? Understand a8 Explain about handle pruning? Understand e9 Explain types of LR parsers? Understand d10 List down the conflicts during shift-reduce parsing. Remember e

UNIT – III1 State the benefits of using machine-independent intermediate form? Remember e2 List the three kinds of intermediate representation? Understand d3 How can you generate three-address code? Understand c

4 Define syntax tree? Draw the syntax tree for the assignment statement. a :=b * -c + b * -c. Apply c

5 Explain postfix notation? Remember a6 Explain the usage of syntax directed definition? Apply e7 Define abstract or syntax tree? Understand d8 Show the DAG for a: =b *-c + b * -c? Apply c9 Translate a or b and not c into three address code? Apply c10 Define basic blocks? Understand a11 Discuss back-end and front-end? Understand e12 Define the primary structure preserving transformations on basic blocks? Understand c13 List common methods for associating actual and formal parameters? Understand a14 List various forms of target programs? Remember e15 Define back patching? Understand d16 List different data structures used for symbol table? Remember c17 Explain the steps to search an entry in the hash table? Understand c18 List the different types of type checking? Explain? Understand e19 Explain general activation record? Understand d20 State the difference between heap storage and hash table? Understand d

UNIT – IV1 Explain the principle sources of optimization? Understand d2 Explain the patterns used for code optimization? Understand c3 Define the 3 areas of code optimization? Understand c4 Define local optimization? Understand a5 Define constant folding? Understand e6 List the advantages of the organization of code optimizer? Understand d7 Define Common Sub expressions? Understand c8 Explain Dead Code? Understand c9 Explain the techniques used for loop optimization and Reduction in strength? Understand a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 135

10 Mention the issues to be considered while applying the techniques for code Optimization? Understand e

11 List the different data flow properties? Understand a12 Explain inner loops? Understand e13 Define flow graph? Understand d14 Define a DAG? Mention its Apply? Understand c15 Define peephole optimization? Understand c16 Explain machine instruction for operations and copy statement? Understand a17 Analyze global data flow? Understand d18 Explain about live variable analysis? Understand c19 Define the term copy propagation? Understand c20 Explain data flow equation? Understand c

UNIT – V1 Explain about machine dependent and machine independent optimization? Remember e2 Explain the role of code generator in a compiler? Understand a3 Write in detail the issues in the design of code generator. Apply e

4

Show the code sequence generated by the simple code generationAlgorithmu := a – cv := t + ud := v + u//d live at the end

Apply d

5 Explain the instructions and address modes of the target machine? Understand c

6Identify the register descriptor target code for the source languageStatement“(a-b) + (a-c) + (a-c);”The 3AC for this can be written ast := a – b

Understand c

7 Mention the properties that a code generator should possess. Apply a8 How do you calculate the cost of an instruction? Understand d9 How will you map names to values? Understand c10 Generate the code for x: =x+1 for target machine? Understand e

PART - B (LONG ANSWER QUESTIONS

S. No Question Blooms Taxonomy Level

Course Outcome

UNIT - I

1 Define compiler? State various phases of a compiler and explain them in detail. Understand 1

2 Explain the various phases of a compiler in detail. Also Write down the output for the following expression after each phase a: =b*c-d. Apply 1

3 Explain the cousins of a Compiler? Explain them in detail. Understand 1

4 Describe how various phases could be combined as a pass in a compiler? Also briefly explain Compiler construction tools. Remember 3

5For the following expressionPosition:=initial+ rate*60Write down the output after each phase

Apply 1

6 Explain the role Lexical Analyzer and issues of Lexical Analyzer. Remember 17 Differentiate the pass and phase in compiler construction? Remember 18 Explain single pass and multi pass compiler? With example? Understand 19 Define bootstrapping concept in brief? Understand 110 Explain the general format of a LEX program with example? Understand 3

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 136

11

Construct the predictive parser the following grammar:S->(L)|aL->L,S|S.Construct the behavior of the parser on the sentence (a, a) using thegrammar specified above

Apply 4

12

Explain the algorithm for finding the FIRST and FOLLOW positions for a given non-terminal.ii) Consider the grammar,E ->TE‟E->+TE‟|@T ->FT‟T->*FT‟|@

F->(E)|id.Construct a predictive parsing table for the grammar given above. Verify whether the input string id + id * id is accepted by the grammar or not.

Understand 4

13

Prepare the predictive parser for the following grammar:S->a|b|(T)

T ->T, S|SWrite down the necessary algorithms and define FIRST andFOLLOW. Show the behavior of the parser in the sentences,

i. (a,(a,a))ii. (((a,a),a,(a),a)

Apply 4

14

Explain operator grammar? Draw the precedence function graph for the following table.

A ( ) , $> > >

( < < = <) > > >, < < > >$ < <

Understand 4

UNIT – II

1

Consider the grammar EE + E|E *E|(E)| idShow the sequence of moves made by the shift-reduce parser on the

input id1+id2*id3 and determine whether the given string is acceptedby the parser or not.

Apply 5

2

i) State shift-reduce parsing? Explain in detail the conflicts that may occur during shift-reduce parsing.ii)For the grammar given below, calculate the operator precedence relation and the precedence functionsEE + E|E- E|E * E|E / E|E E|(E)|-E|id

Understand 5

3Prepare a canonical parsing table for the grammar given below

SCCCcC|d

Analysis 5

4

Analyze whether the following grammar is SLR(1) or not. Explainyour answer with reasons.

SLR SRL* RRLL id

Apply 5

5

Consider the grammar given below.EE + TETTTT * FTFF(E)FidPrepare LR parsing table for the above grammar .Give the moves of

Apply 5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 137

LR parser on id * id + idii) Briefly explain error recovery in LR parsing.

UNIT – III

1 Explain with an example to generate the intermediate code for the flow of control statements? Apply 8

2 List the various ways of calling the procedures? Explain in detail? Analysis 6

3 Explain 3addresscodes and mention its types. How would you implement the three address statements? Explain with suitable examples? Apply 8

4 Explain how declaration is done in a procedure using syntax directed translation? Apply 7

5a) Write a note on the specification of a simple type checker.b) Define a type expression? Explain the equivalence of type

expressions with an appropriate example.Analysis 7

6

Generate the three-address code for the following C programfragmentwhile(a > b){if (c < d)x = y + z;elsex = y - z;

}

Understand 8

7

Generate the code for the following C statements using its equivalent three address code.a = b + 1x = y+3y = a/ba = b+c

Understand 8

8 Describe the method of generating syntax directed definition for control Statements? Understand 7

9 Explain procedure calls with suitable example? Understand 7

10 Explain Intermediate code generation for Basic block, Control Flow and Boolean Expressions? Apply 8

11 Write about Quadruple and Triple with its structure? Apply 812 Explain different schemes of storing name attribute in symbol table. Understand 9

13 Write the advantages and disadvantages of heap storage allocation strategies? Apply 9

14 Distinguish between static and dynamic storage allocation? Understand 915 Differentiate between stack and heap storage? Understand 9

UNIT – IV1 Explain the principle sources of code optimization in detail? Understand 102 Explain peephole optimization? Understand 10

3

Discuss about the followingCopy propagationDead code eliminationCode motion

Understand 10

4 Explain in the DAG representation of the basic block with example. Understand 115 Explain Local optimization and loop optimization in detail Understand 116 Write about Data Flow Analysis of structural programs? Understand 127 Explain various Global optimization techniques in detail? Understand 12

8

Generate target code for the given program segments:main(){inti=4,j;j = i + 5;

Apply 11

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 138

}

9 Discuss algebraic simplification and reduction in strength? Understand 1110 Explain the various source language issues? Understand 1011 Explain in detail the issues in design of a code generator? Understand 1312 Demonstrate the simple code generator with a suitable example? Apply 1313 List the different storage allocation strategies? Explain. Understand 1214 (a) Write the procedure to detect induction variable with example? Understand 11

(b) With example explain dead code elimination?

15

(a) Explain how loop invariant computation can be eliminated?(b) Explain how “Redundant sub-expression eliminates” can bedonein a given program?

Understand 11

UNIT – V

1

a) Explain the concept of object code forms?b) Generate optimal machine code for the following C program.main(){inti, a[10];while (i<=10)a[i] =0}

Apply 13

2 Explain Machine dependent code optimization in detail with an example? Understand 14

3 (a) Discuss various object code forms?(b) Write a short note on code generating algorithms? Understand 13

4 Write about target code forms and explain how the instruction forms effect the computation time? Understand 14

5

Consider the following basic block of 3-address instructions:a := b + cx := a + bb := a – dc := b + cd := a – dy := a – dWrite the next-use information for each line of the basic block?

Apply 13

PART- C ANALYTICAL AND CRITICAL THINKING

S. No. QuestionBlooms

TaxonomyLevel

CourseOutcome

UNIT – I

1

Consider the following fragment of C code:float i, j;i = i*70+j+2;Write the output at all phases of the compiler for above „C‟ code.

Apply 1

2 Construct an NFA for regular expression R= (aa | b) * ab convert it into an equivalent DFA. Remember 2

3Describe the languages denoted by the following regular expressions.(0+1)*0(0+1)(0+1)0*10*10*10*

Remember 2

4Explain with one example how LEX program perform lexicalanalysis for the following PASCAL patterns Identifiers, Comments,Numerical constants, Keywords, Arithmetic operators?

Apply 3

5 Check whether the following grammar is a LL(1)grammarSiEtS|iEtSeS|a Apply 4

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 139

EbAlso define the FIRST and Followers.

6Consider the grammar belowE->E+E|E-E|E*E|E/E|a|b

Obtain left most and right most derivation for the string a+b*a+b.Apply 4

7Define ambiguous grammar? Test whether the following grammar is ambiguous or not.E->E+E|E-E|E*E|E/E|E↑|(E)|-E|id

Apply 4

8 State the limitations of recursive descent parser? Remember 4

9 Convert the following grammar into LL(1)grammar,S->ABC A->aA|C B->b C->c. Apply 4

10

Write a recursive descent parser for the grammar.bexpr->bexpr or bterm|btermbterm->bterm and bfactor|bfactorbfactor->notebfactor|(bexpr)|true|false.Where or, and, not,(,),true, false are terminals of the grammar.

Apply 4

UNIT – II

1 Explain the common conflicts that can be encountered in a shift-reduce parser? Apply 5

2 Explain LALR parsing, justify how it is efficient over SLR parsing. Remember 53 Discuss error recovery in LL and LR parsing. Remember 5

UNIT – III

1

Suppose that the type of each identifier is a sub range of integers, for expressions with operators +, -, *, div and mod, as in Pascal. Write type-checking rules that assign to each sub expression the sub range its value must lie in.

Understand 7

2Define type expression? Write type expression for the following types. i. Functions whose domains are functions from integers to pointers to integers and whose ranges are records consisting of an integer and a character.

Understand 7

12.13 ASSIGNMENTS QUESTION BANKPART A (SHORT ANSWER QUESTIONS)

S. No. QuestionBlooms

TaxonomyLevel

CourseOutcome

UNIT – I

1.Explain about the different phases of a compiler, showing the output of each phase, using the example of the following statement: position : = initial + rate * 60http://nptel.ac.in/courses/106108113/module1/Lecture1.pdf

CreateAnalyzing 2

2. Explain compiler and interpreter with suitable diagramhttp://textofvideo.nptel.iitm.ac.in/106105084/lec28.pdf Analyzing 3

3. Differentiate between pass and Phasehttp://www.nptel.ac.in/courses/112108150/pdf/Lecture_Notes/MLN_07.pdf Analyzing 3

4. Create the different sections of LEX program with Examplehttp://textofvideo.nptel.iitm.ac.in/106108052/lec1.pdf. Create 2

5.

Determine the input buffer scheme for scanning the source program. How the use of sentinels can improve its performance? Describe in detailhttp://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/download/ska-sl1.pdf

Evaluate 1

UNIT- II

1.Specify what are the issues of Top-Down Parsing techniqueshttp://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm

Creating 4

2. Explain back tracking with example Apply 5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 140

http://nptel.ac.in/courses/106105078/pdf/Lesson%2009.pdf

3.

Create recursive descent parser for the following grammar.

http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm

Creating 3

4.

Create SLR parsing table for the following grammar.S AS|bA SA|a

http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm

Creating 5

5.

Create predictive parse table for the following grammar.E E + T| TT T F| FF F * |a |b

http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-9.htm

Creating 6

UNIT-III

1.

Create SLR parsing table for the following grammar.S AS|bA SA|a

http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm

Creating 5

2.

Create LALR parsing table for the following grammarS Aa | bAc | Bc | bBaA dB d

http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-9.htm

Creating 5

3.

Discover What are the common conflicts that can be encountered in shift – reduce parser.http://textofvideo.nptel.iitm.ac.in/106108113/lec9.pdfhttp://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-9.htm

Apply 6

4.

Create SLR parsing table for the following grammar.R R ′|′ R | RR | R*| (R) | a | b

http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm

Creating 5

5. Prepare What is an operator grammar? Give an example.www.nptel.ac.in/syllabus/106104072/ Apply 6

UNIT-IV

1.

Create the DAG for the following basic blockD := B_CE :=A+BB := B+CA := E-D

www.nptel.ac.in/courses/.../instr-sched-3.pdf

Create 3

2.

Determine What are the legal evaluation orders and names for the values at the nodes for the DAG of problem (a).

i. Assuming A, B and C are alive at the end of the basic block?ii. Assuming only A is live at the end?

www.nptel.ac.in/courses/.../instr-sched-3.pdf

Evaluate 10

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 141

3.

Explain different principal sources of optimization technique with suitable exampleswww.nptel.ac.in/courses/111105039www.nptel.ac.in/courses/106108056/www.nptel.ac.in/.../OPTIMIZATION%20METH.

Apply 11

4.

Explain in detail the Optimization technique “strength reduction”.www.nptel.ac.in/courses/111105039www.nptel.ac.in/courses/106108056/www.nptel.ac.in/.../OPTIMIZATION%20METH.

Apply 12

5.

Summarize What is a DAG. Explain its applicationswww.nptel.ac.in/courses/.../local-opt-part-2.pdfwww.nptel.ac.in/courses/106108052/7www.nptel.ac.in/courses/115102023/www.textofvideo.nptel.iitm.ac.in/.../lec8.pdf

Create 8

UNIT-V

1.Explain different machine dependent code optimization techniqueswww.nptel.ac.in/courses/.../intro-to-optim-2.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec2.pdf

Creating 10

2.

Explain the different issues in the design of a code generator.www.nptel.ac.in/courses/.../code-gen-part-1.pdfwww.nptel.ac.in/courses/.../code-gen-part-3.pdfwww.nptel.ac.in/courses/106108052/9

Creating 15

3.

Explain the concept of object code forms.www.nptel.ac.in/courses/106108052/1www.textofvideo.nptel.iitm.ac.in/.../lec25.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec26.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec38.pdf

Creating 12

4.

Compute various Register allocation optimization techniques with an examplewww.textofvideo.nptel.iitm.ac.in/.../lec11.pdfwww.nptel.ac.in/courses/106108052/12www.nptel.ac.in/courses/106108113/11

Apply 11

5.

Create an algorithm for processing Macro Definitionwww.nptel.ac.in/courses/.../lecture2.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec7.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec1.pdf

Creating 14

PART – B (LONGANSWER QUESTIONS)

S. No QuestionBlooms

Taxonomy Level

Course Outcome

UNIT – I

1 Define compiler? State various phases of a compiler and explain them in detail. Understand 1

2 Explain the various phases of a compiler in detail. Also Write down the output for the following expression after each phase a: =b*c-d. Apply 1

3 Explain the cousins of a Compiler? Explain them in detail. Understand 1

4 Describe how various phases could be combined as a pass in a compiler? Also briefly explain Compiler construction tools. Remember 3

5For the following expressionPosition:=initial+ rate*60Write down the output after each phase

Apply 1

6 Explain the role Lexical Analyzer and issues of Lexical Analyzer. Remember 17 Differentiate the pass and phase in compiler construction? Remember 18 Explain single pass and multi pass compiler? With example? Understand 19 Define bootstrapping concept in brief? Understand 1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 142

10 Explain the general format of a LEX program with example? Understand 3

11

Construct the predictive parser the following grammar:S->(L)|aL->L,S|S.Construct the behavior of the parser on the sentence (a, a) using thegrammar specified above

Apply 4

12

Explain the algorithm for finding the FIRST and FOLLOW positions for a given non-terminal.ii) Consider the grammar,E ->TE‟E->+TE‟|@T ->FT‟T->*FT‟|@

F->(E)|id.Construct a predictive parsing table for the grammar given above. Verify whether the input string id + id * id is accepted by the grammar or not.

Understand 4

13

Prepare the predictive parser for the following grammar:S->a|b|(T)

T ->T, S|SWrite down the necessary algorithms and define FIRST andFOLLOW. Show the behavior of the parser in the sentences,

i. (a,(a,a))ii. (((a,a),a,(a),a)

Apply 4

14

Explain operator grammar? Draw the precedence function graph for the following table.

A ( ) , $> > >

( < < = <) > > >, < < > >$ < <

Understand 4

UNIT – II

1

Consider the grammar EE + E|E *E|(E)| idShow the sequence of moves made by the shift-reduce parser on the

input id1+id2*id3 and determine whether the given string is acceptedby the parser or not.

Apply 5

2

i) State shift-reduce parsing? Explain in detail the conflicts that may occur during shift-reduce parsing.ii)For the grammar given below, calculate the operator precedence relation and the precedence functionsEE + E|E- E|E * E|E / E|E E|(E)|-E|id

Understand 5

3Prepare a canonical parsing table for the grammar given below

SCCCcC|d

Analysis 5

4

Analyze whether the following grammar is SLR (1) or not. Explain your answer with reasons.

SLRSRL* RRLL id

Apply 5

5

Consider the grammar given below.EE + TETTTT * FTFF(E)

Apply 5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 143

FidPrepare LR parsing table for the above grammar .Give the moves ofLR parser on id * id + idii) Briefly explain error recovery in LR parsing.

UNIT – III

1 Explain with an example to generate the intermediate code for the flow of control statements? Apply 8

2 List the various ways of calling the procedures? Explain in detail? Analysis 6

3 Explain 3addresscodes and mention its types. How would you implement the three address statements? Explain with suitable examples? Apply 8

4 Explain how declaration is done in a procedure using syntax directed translation? Apply 7

5a) Write a note on the specification of a simple type checker.b) Define a type expression? Explain the equivalence of type

expressions with an appropriate example.Analysis 7

6

Generate the three-address code for the following C programfragmentwhile(a > b){if (c < d)x = y + z;elsex = y - z;

}

Understand 8

7

Generate the code for the following C statements using itsequivalentthree address code.a = b + 1x = y+3y = a/ba = b+c

Understand 8

8 Describe the method of generating syntax directed definition for control Statements? Understand 7

9 Explain procedure calls with suitable example? Understand 7

10 Explain Intermediate code generation for Basic block, Control Flow and Boolean Expressions? Apply 8

11 Write about Quadruple and Triple with its structure? Apply 812 Explain different schemes of storing name attribute in symbol table. Understand 9

13 Write the advantages and disadvantages of heap storage allocation strategies? Apply 9

14 Distinguish between static and dynamic storage allocation? Understand 915 Differentiate between stack and heap storage? Understand 9

UNIT – IV1 Explain the principle sources of code optimization in detail? Understand 102 Explain peephole optimization? Understand 10

3

Discuss about the followingCopy propagationDead code eliminationCode motion

Understand 10

4 Explain in the DAG representation of the basic block with example. Understand 115 Explain Local optimization and loop optimization in detail Understand 116 Write about Data Flow Analysis of structural programs? Understand 127 Explain various Global optimization techniques in detail? Understand 12

8 Generate target code for the given program segments:main() Apply 11

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 144

{inti=4,j;j = i + 5;}

9 Discuss algebraic simplification and reduction in strength? Understand 1110 Explain the various source language issues? Understand 1011 Explain in detail the issues in design of a code generator? Understand 1312 Demonstrate the simple code generator with a suitable example? Apply 1313 List the different storage allocation strategies? Explain. Understand 1214 (a) Write the procedure to detect induction variable with example? Understand 11

(b) With example explain dead code elimination?

15(a) Explain how loop invariant computation can be eliminated?(b) Explain how “Redundant sub-expression eliminates” can be Done in a given program?

Understand 11

UNIT – V

1

a) Explain the concept of object code forms?b) Generate optimal machine code for the following C program.main(){inti, a[10];while (i<=10)a[i] =0}

Apply 13

2 Explain Machine dependent code optimization in detail with an example? Understand 14

3 (a) Discuss various object code forms?(b) Write a short note on code generating algorithms? Understand 13

4 Write about target code forms and explain how the instruction forms effect the computation time? Understand 14

5

Consider the following basic block of 3-address instructions:a := b + cx := a + bb := a – dc := b + cd := a – dy := a – dWrite the next-use information for each line of the basic block?

Apply 13

PART C (CRITICAL ANSWER QUESTIONS)

S. No Question Blooms Taxonomy Level

Course Outcome

UNIT – I1. Define the term Interpreter? Remember 12. Define the term Tokens in lexical analysis phase? Understand 13. Explain about error Handler? Understand 14. Define a translator and types of translator? Understand 15. Explain about parser and its types? Understand 16. Construct NFA for (a/b)* and convert into DFA? Remember 27. Define bootstrap and cross compiler? Understand 18. Define pass and phase? Understand 3

9. Analyze the output of syntax analysis phase? What are the three general types of parsers for grammars? Remember 1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 145

10. List the different strategies that a parser can employ to recover from a syntactic error? Understand 1

11. Explain the goals of error handler in a parser? Understand 312. How will you define a context free grammar? Remember 313. Define context free language. When will you say that two CFGs are equal? Remember 214. Give the definition for leftmost and canonical derivations? Understand 415. Define a parse tree? Understand 116. Explain an ambiguous grammar with an example? Apply 117. When will you call a grammar as the left recursive one? Apply 418. List different types of compiler? Remember 1

UNIT – II1. Define go to function in LR parser with an example? Understand 52. Why SLR and LALR are more economical to construct Canonical LR? Understand 53. Explain about handle pruning? Understand 54. Explain types of LR parsers? Understand 55. List down the conflicts during shift-reduce parsing. Remember 5

UNIT – III7 Define abstract or syntax tree? Understand 78 Show the DAG for a: =b *-c + b * -c? Apply 79 Translate a or b and not c into three address code? Apply 810 Define basic blocks? Understand 911 Discuss back-end and front-end? Understand 812 Define the primary structure preserving transformations on basic blocks? Understand 813 List common methods for associating actual and formal parameters? Understand 814 List various forms of target programs? Remember 815 Define back patching? Understand 816 List different data structures used for symbol table? Remember 917 Explain the steps to search an entry in the hash table? Understand 918 List the different types of type checking? Explain? Understand 719 Explain general activation record? Understand 920 State the difference between heap storage and hash table? Understand 9

UNIT – IV1. List the different data flow properties? Understand 112. Explain inner loops? Understand 113. Define flow graph? Understand 114. Define a DAG? Mention its Apply? Understand 125. Define peephole optimization? Understand 126. Explain machine instruction for operations and copy statement? Understand 127. Analyze global data flow? Understand 118. Explain about live variable analysis? Understand 109. Define the term copy propagation? Understand 1110. Explain data flow equation? Understand 11

UNIT – V

1.

Identify the register descriptor target code for the source languagestatement“(a-b) + (a-c) + (a-c);”The 3AC for this can be written as

Understand 13

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 146

t := a – b

2. Mention the properties that a code generator should possess. Apply 133. How do you calculate the cost of an instruction? Understand 144. How will you map names to values? Understand 145. Generate the code for x: =x+1 for target machine? Understand 14

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 147

13. E-COMMERCE (A11206)

13.0 COURSE DESCRIPTION

Course Title E-COMMERCECourse Code A11206Regulation MLR-15

Lectures Tutorials Practical’s

CreditsCourse Structure

3 1 - 3Course Coordinator Mrs.Divya Asst.Professor CSE

Team of Instructors Mrs Navya Asst.Professor/ Mr. N Subba Reddy Asst.professor /Mrs. Durga Devi Asst.Professor CSEMrs. Anitha

13.1 COURSE OVERVIEW:This course is designed to understand issues that companies need to address when moving from being offline to online and learn how companies can craft business models where IT is embedded as an integral part of products, processes and customer interactions. Student would get to appreciate how IT is changing the way companies create value through networks and coopetition.13.2 PREREQUISITES:

Level Credits Periods/Weeks PrerequisitesUG 3 3 Communication/Marketing approaches

13.3. MARKS DISTRIBUTION:

Session Marks University EndExam Marks Total Marks

Mid Semester TestThere shall be two midterm examinations.Each midterm examination consists of subjective type and objective type tests.The subjective test is for 10 marks of 60 minutes duration.Subjective test of shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.AssignmentFive marks are earmarked for assignments.There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.

75 100

13.4 EVALUATION SCHEME:

S. No Component Duration Marks1 I Mid Examination 80 minutes 202 I Assignment --- 5

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 148

3 II Mid Examination 80 minutes 204 II Assignment ---- 55 External Examination 3 hours 75

COURSE OBJECTIVES:The objectives of the course are to introduce the concept of electronic commerce, and to understand how electronic commerce is affecting business enterprises, governments, consumers and people in general. In addition, we will study the development of websites using relevant software tools.

I. Describe the fundamentals of the environment and strategies in the New Economy.II. Demonstrate the fundamental of the different types and key components on business

models in the New Economy.III. Apply the guiding principles to design the customer web interface.IV. Analyze the traditional and new communication/marketing approaches that create

competitive advantage in the New Economy.V. Compare the hardware, software, servers, and the parts that make up the enabling

railroad for the New EconomyVI. Create insights on how to implement strategy in the New Economy

13.5 COURSE OUTCOMES:After completion of this course, the students would be able to

Course Outcomes Blooms Levela. Defining and analyzing the principles of E-commerce and basics

of World Wide Web. BL 1 & 2

b. Defining and analyzing the concept of electronic data interchange and its legal, social and technical aspects. BL 1, 2, & 3

c. Defining and analyzing the security issues over the web, the available solutions and future aspects of e-commerce security. BL 1, 2, 3 & 4

d. Defining and analyzing the concept of E-banking, electronic payment system BL 1, 2, 3 & 4

BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate BL 6: Create

13.6 HOW PROGRAM OUTCOMES AREASSESSED:

Program Outcomes Level Proficiency assessed by Blooms Level

A

An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.(Fundamental engineering analysis skills).

HSolving Gate and Text book Problems

Apply

BAn ability to design and conduct engineering experiments, as well as to analyze and interpret data. (information retrieval skills).

SSolving Gate and Text book Problems

Apply

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 149

CAn ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. (Creative skills).

H Assignment andGate questions

Apply andAnalyze

DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. (team work)

S Mini and Micro Projects Apply

E

An ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.(Engg. Problem solving Skills)

SMicro Project Models/ Gate questions

Apply

F An understanding of professional, social and ethical responsibility N ------- --------

G

An ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements. (Engg. Application Skills)

SMicro Projects models / Gate questions

Analyze and Justify

HThe broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.

H Assignment andGate questions Analyze

I

Graduate will develop confidence for self education and acquire new knowledge in the computing discipline and ability and practice for Multidisciplinary tasks as a member within the teams

S Class Test & Seminars Analyze

J To communicate effectively S Seminars Understand & Analyze

K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. S

Class Tests & Group Activity inclass room

Apply

LGraduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc.(Continuing Education )

H GATE Apply

M

The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.

SText Book Problems as part of Assignment

Apply

N An ability to setup an enterprise.(Employment Skills) S Placement Design and Develop

N= None S= Supportive H = Highly Relate

13.7 SYLLABUS:

UNIT-IIntroduction Overview of Electronic Commerce - Definition of Electronic Commerce - E Business - Potential Benefits of E Commerce - The Internet as enablcrs of E Commerce - Impact of E Commerce on Business Models - E Commerce Applications - Market Forces influencing highway - The global information distribution networks - The regulatory environment for E Commerce.

UNIT II Electronic Data Interchange (EDI),Electronic Commerce and the Internet Introduction - traditional EDI systems - Benefits - Data Transfer and Standards - Financial EDI – EDI Systems and the Internet - Legal, Security and Private Concerns - Authentication - Internet Trading Relationships Consumer to Business (B2C) Business to Business (B2C), Consumer to Consumer (C2C) Government to

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 150

Citizen - Features and Benefits - Portal Vs. Website. Impact. - Intra Organizational E Commerce - Supply Chain Management.

UNIT III Cryptography and Authentication Introduction - Messaging Security Issues - Confidentiality - Integrity - Authentication. Encryption Techniques - Integrity Check Values and Digital Signatures - Good Encryption Practices – Key Management - key management tasks - Additional Authentication Methods. Firewalls -Definition - component - Functionality - securing the firewall - factors considered in securing the firewall - Limitations.

UNIT IV Electronic Payment Mechanisms Introduction - The SET protocol - SET vs. SSL - Payment Gateway - Certificate Issuance – Certificate Trust Chain - Cryptography Methods - Dual Signatures - SET Logo - Compliance Testing - Status of Software - Magnetic Strip Cards - Smart Cards - Electronic Cheques - Electronic Cash - Third party Processors and Credit Cards - Risk and electronic payment system - Designing Electronic payment systems.

UNIT V E-Commerce Strategy and Implementation Strategic Planning for E-Commerce, Strategy in Action, Competitive Intelligence on the Internet, Implementation; Plans and Execution, Project and Strategy assessment - Managerial Issues – Global Electronic Commerce - Future of Electronic Commerce.

TEXT BOOKS :1. Electronic Commerce - Security, Risk Management and Control, Greenstein and

Feinman, Irwin Mc.Gra-Hill, 2000.

13.8 COURSEPLAN:The course plan is meant as a guideline. There may probably be changes

Lecture No.

Course Learning Outcomes Blooms Levels Topics to be covered Reference

1 Define electronic commerce

Remembering / Knowledge

Introduction Overview of Electronic Commerce T1

2 Define of electronic commerce -

Remembering / Knowledge Definition of Electronic Commerce -

T1

3

Explain the potential benefits of e commerce - the internet as enablers of e commerce

Understand Potential Benefits of E Commerce -The Internet as enablers of E Commerce T1

4

Explain business impact of e commerce on business models - e commerce applications

Understand E Business - - Impact of E Commerce on Business Models - E Commerce Applications T1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 151

5

Discuss the market forces influencing highway - the global information distribution networks.

Understand Market Forces influencing highway - The global information distribution networks.

T1

6

Demonstrate the regulatory environment for e commerce.

Understand The regulatory environment for E Commerce..

T1

7Define electronic data interchange (EDI)

Knowledge Electronic Data Interchange (EDI)T1

8Define electronic commerce and the internet

Knowledge Electronic Commerce and the Internet Introduction - traditional EDI systems.

T1

9Discuss the benefits of data transfer and standards.

Knowledge Benefits - Data Transfer and Standards - Financial EDI – EDI Systems and the Internet.

T1

T1

10

Apply the concept of legal, security and private concerns to authenticate

Apply Legal, Security and Private Concerns - Authentication

11

Differentiate the relationships between consumer to business (b2c) business to business (b2c)

Analyze Internet Trading Relationships Consumer to Business (B2C) Business to Business (B2C)

T1

12 Discuss the features and benefits. Understanding Consumer to Consumer (C2C) Government to

Citizen - Features and Benefits.T1

13Differentiate between Portal Vs. Website.

AnalyzingPortal Vs. Website. Impact. - Intra Organizational E Commerce - Supply Chain Management

T1

14Apply cryptography to authenticate message security

Applying Cryptography and Authentication Introduction - Messaging Security Issues T1

15

apply encryption techniques to check values and digital signatures

ApplyingConfidentiality - Integrity - Authentication. Encryption Techniques - Integrity Check Values and Digital Signatures

T1

16Demonstrate the good encryption practices

Understanding Good Encryption Practices – Key Management - key management tasks

T1

17

Discuss the additional authentication methods. firewalls

Understanding Additional Authentication Methods. Firewalls T1

18Define component functionality to secure the firewall

Knowledge Definition - component - Functionality - securing the firewall T1

19Discuss the factors considered in securing the

Understanding factors considered in securing the firewall - Limitations T1

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 152

firewall - Limitations

20Discuss about electronic payment mechanisms

Understanding Electronic Payment Mechanisms Introduction T1

21Differentiate between SET vs. SSL

Analyze The SET protocol - SET vs. SSL - Payment Gateway T1

22Apply cryptography methods to check certificates.

Apply Certificate Issuance – Certificate Trust Chain - Cryptography Methods T1

23Apply compliance testing to test dual signatures.

Apply Dual Signatures - SET Logo - Compliance Testing T1

24

Differentiate between magnetic strip cards & smart cards

Analyze Status of Software - Magnetic Strip Cards - Smart Cards T1

25

Differentiate between electronic cheques & electronic cash & credit cards

Analyze Electronic Cheques - Electronic Cash - Third party Processors and Credit Cards T1

26 Design electronic payment systems. Create

Risk and electronic payment system - Designing Electronic payment systems. T1

27

Analyze E-commerce strategy and implementation strategic planning for e-commerce

AnalyzeE-Commerce Strategy and Implementation Strategic Planning for E-Commerce T1

28

Analyze strategy in action, competitive intelligence on the internet

Analyze Strategy in Action, Competitive Intelligence on the Internet T1

29 Implement the plans and execution Understand Implementation; Plans and Execution T1

30 Analyze project strategy Analyze Project and Strategy assessment T1

31

Analyze the managerial issues – global electronic commerce

Analyze Managerial Issues – Global Electronic Commerce T1

32Analyze the future of electronic commerce

Analyze Future of Electronic Commerce T1

SESSION PLANNER

Unit Class Topic

Text/Reference

bookSession Objectives Date

plannedDate

conducted

1. By the end of the session student will define electronic commerce

I

L1Introduction Overview of Electronic Commerce

T12.. By the end of the session student will understand

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 153

concepts of electronic commerce1. By the end of the session student will identify concepts of for studying e-commerce

L2 Definition of Electronic Commerce T1 2.. By the end of the session

student will understand concepts of for studying e-commerce1. By the end of the session student will identify benefits of e-commerceL3

E Business - Potential Benefits of E Commerce

T1 2.. By the end of the session student will understand concepts e-business1. By the end of the session student will identify usage of internetL4,

L5

The Internet as enablers of E Commerce

T1 2.. By the end of the session student will use internet for e-commerce1. By the end of the session student will identify impact of e-commerceL6

Impact of E Commerce on Business Models

T1 2.. By the end of the session student will understand impact of business models1. By the end of the session student will identify applications of e-commerceL7 E-Commerce

Applications T1 2.. By the end of the session student will use in real time applications1. By the end of the session student will identify Market Forces

L8 Market Forces influencing highway T1 2. By the end of the session

student will come to know to how market forces influencing highway1. By the end of the session student will identify global information distribution networksL9,

L10

The global information distribution networks

T12.. By the end of the session student will know to use global information1. By the end of the session student will identify the regulatory environment for e commerceL11

The regulatory environment for E Commerce

T1 2.. By the end of the session student will understand how regulatory environment is useful

II L12L13

Electronic Data Interchange (EDI), T1

1. By the end of the session student will identify concepts of Electronic Data Interchange (EDI),

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 154

2.. By the end of the session student will be to interchande data using Electronic commerce1. By the end of the session student will identify edi systemsL14,

L15

Electronic Commerce and the Internet Introduction - traditional EDI systems

T1 2.. By the end of the session student will be able to use internet for edi1. By the end of the session student will identify benefits of ediL16

Benefits - Data Transfer and Standards - Financial EDI

T1 2.. By the end of the session student will be able to identify standards of edi1. By the end of the session student will identify concepts edi systemsL17

EDI Systems and the Internet - Legal, Security and Private Concerns - Authentication

T1 2.. By the end of the session student will to know security issues1. By the end of the session student will relationship between c2b

L18

Internet Trading Relationships Consumer to Business (B2C) Business to Business (B2C), Consumer to Consumer (C2C)

T1 2.. By the end of the session student will able to differentiate between b2c,c2c

1. By the end of the session student will able to know how government is useful to citizenL19

Government to Citizen - Features and Benefits - Portal Vs. Website

T12.. By the end of the session student will differentiate between portal vs website1. By the end of the session student will identify Intra Organizational E CommerceL20

. Impact. - Intra Organizational E Commerce

T1 2.. By the end of the session student will understand Impact. Of E Commerce1. By the end of the session student will identify Supply Chain Management

L21 Supply Chain Management. T1 2.. By the end of the session

student will understand uses of Supply Chain Management1. By the end of the session student will identify CryptographyL22,

L23

Cryptography and Authentication Introduction

T1 2.. By the end of the session student will understand Authentication1. By the end of the session student will identify Messaging Security Issues

III

L24,L25

Messaging Security Issues - Confidentiality - Integrity -

T1

2.. By the end of the session

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 155

Authentication student will understand Confidentiality - Integrity - Authentication1. By the end of the session student will identify Encryption Techniques

L26

Encryption Techniques - Integrity Check Values and Digital Signatures

T1 2.. By the end of the session student will understand Integrity Check Values and Digital Signatures1. By the end of the session student will identify Good Encryption Practices

L27

Good Encryption Practices – Key Management - key management tasks

T1 2.. By the end of the session student will understand Key Management - key management tasks1. By the end of the session student will identify Additional Authentication MethodsL28

Additional Authentication Methods

T1 2.. By the end of the session student will understand Additional Authentication Methods1. By the end of the session student will identify FirewallsL29

Firewalls -Definition - component - Functionality

T1 2.. By the end of the session student will understand component - Functionality1. By the end of the session student will identify securing the firewallL30 securing the firewall T1 2.. By the end of the session student will understand securing the firewall1. By the end of the session student will identify factors considered in securing the firewallL31

factors considered in securing the firewall - Limitations.

T12.. By the end of the session student will understand Limitations.1. By the end of the session student will identify Electronic Payment MechanismsL32

Electronic Payment Mechanisms Introduction

T1 2.. By the end of the session student will understand Electronic Payment Mechanisms1. By the end of the session student will identify The SET protocolL33 The SET protocol -

SET vs. SSL T1 2.. By the end of the session student will differentiate between SET vs. SSL

IV

L34 Payment Gateway - T1 1. By the end of the session

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 156

student will identify Payment Gateway

Certificate Issuance

2.. By the end of the session student will understand Certificate Issuance1. By the end of the session student will identify Certificate Trust ChainL35 Certificate Trust

Chain T1 2.. By the end of the session student will understand Certificate Trust Chain1. By the end of the session student will identify Cryptography Methods

L36 Cryptography Methods T1 2.. By the end of the session

student will understand concepts of Cryptography Methods1. By the end of the session student will identify Dual SignaturesL37 Dual Signatures - SET

Logo T1 2.. By the end of the session student will understand concepts of SET Logo1. By the end of the session student will identify Compliance TestingL38 Compliance Testing -

Status of Software T1 2.. By the end of the session student will understand concepts Status of Software1. By the end of the session student will identify Magnetic Strip Cards - Smart CardsL39

- Magnetic Strip Cards - Smart Cards - Electronic Cheques - Electronic Cash - Third party Processors and Credit Cards

T1 2.. By the end of the session student will understand Electronic Cheques - Electronic Cash1. By the end of the session student will identify Risk L40

L41- Risk and electronic payment system T1 2.. By the end of the session

student will understand concepts payment system1. By the end of the session student will identify Designing Electronic payment systemsL42 Designing Electronic

payment systems. T1 2.. By the end of the session student will understand concepts of Designing Electronic payment systems1. By the end of the session student will identify concepts of E-Commerce Strategy

L43

E-Commerce Strategy and Implementation Strategic Planning for E-Commerce

T1 2.. By the end of the session student will understand concepts of Implementation Strategic Planning for E-Commerce

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 157

1. By the end of the session student will identify Strategy in Action

L44 Strategy in Action T1 2. By the end of the session student will understand concepts of Strategy in Action1. By the end of the session student will identify Competitive Intelligence on the Internet,L45

Competitive Intelligence on the Internet,

T1 2.. By the end of the session student will understand Competitive Intelligence on the Internet,1. By the end of the session student will identify ImplementationL46 Implementation; Plans

and Execution, T1 2.. By the end of the session student will understand Plans and Execution,1. By the end of the session student will identify Project assessmentL47 Project and Strategy

assessment T1 2.. By the end of the session student will understand Strategy assessment1. By the end of the session student will identify Managerial IssuesL48 Managerial Issues T1 2.. By the end of the session student will understand Managerial Issues1. By the end of the session student will identify Global Electronic Commerce

L49 Global Electronic Commerce T1 2.. By the end of the session

student will understand concepts of Global Electronic Commerce1. By the end of the session student will identify concepts Future of Electronic Commerce.

V

L50,L51

Future of Electronic Commerce. T1 2. By the end of the session

student will be able to use electronic Commerce in future.

13.9 MAPPING COURSE OBJECTIVE LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Course OutcomesCourse Objective

a b c dI. S S

II. H

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 158

III. H S HIV. SV. S S

VI. H

S=Supportive H = Highly Related

13.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Program OutcomesCourse Outcomes

A B C D E F G H I J k L M Na. H S Sb. S H Sc. S Sd. H S S S

13.11 OBJECTIVE BITS:

UNIT-11. Which of the following describes e‐commerce?

A. Doing business electronically B. Doing business C. Sale of goods D. All of the above Answer: A

2. Which of the following is part of the four main types for e‐commerce? A. B2B B. B2C C. C2B D. All of the above Answer: D

3. Which segment do eBay, Amazon.com belong? A. B2Bs B. B2Cs C. C2Bs D. C2Cs Answer: B

4. Which type of e‐commerce focuses on consumers dealing with each other? A. B2B B. B2C C. C2B D. C2C Answer: D

5. Which segment is eBay an example? A. B2B B. C2B C. C2C D. None of the above Answer: D

6. Which type deals with auction? A. B2B

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 159

B. B2C C. C2B D. C2C Answer: D

7. In which website Global Easy Buy is facilitated? A. Ebay.com B. Amazon.com C. Yepme.com D. None of these Answer: A

8. The best products to sell in B2C e‐commerce are: A. Small products B. Digital products C. Specialty products D. Fresh products Answer: B

9. Which products are people most likely to be more uncomfortable buying on the Internet? A. Books B. Furniture C. Movies D. All of the above Answer: B

10. Which products are people most likely to be comfortable buying on the Internet? A. Books B. PCs C. CDs D. All of the above Answer: D

11. Digital products are best suited for B2C e‐commerce because they: A. Are commodity like products B. Can be mass‐customized and personalized C. Can be delivered at the time of purchase D. All of the above Answer: D

12. The solution for all business needs is A. EDI B. ERP C. SCM D. None of the above Answer: B

13. All of the following are techniques B2C e‐commerce companies use to attract customers, except: A. Registering with search engines B. Viral marketing C. Online ads D. Virtual marketing Answer: D

14. Which is a function of E‐commerce A. marketing B. advertising C. warehousing D. all of the above Answer: D

15. Which is not a function of E‐commerce

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 160

A. marketing B. advertising C. warehousing D. none of the above Answer: C

16. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? A. Affiliate programs B. Click‐through C. Spam D. All of the above Answer: B

17. What is the percentage of customers who visit a Web site and actually buy something called? A. Affiliate programs B. Click‐through C. Spam D. Conversion rate Answer: D

18. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: A

19. What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?

A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: B

20. What are ballpoint pens purchased by a clothing company? A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: B

UNIT-21. What is another name for?

A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: B

2. What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? A. B2B marketplace B. Intranet C. Reverse auction D. Internet Answer: C

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 161

3. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? A. Customer relationship management systems cards B. E‐government identity cards C. FEDI cards D. Smart cards Answer: D

4. Most individuals are familiar with which form of e‐commerce? A. B2B B. B2C C. C2B D. C2C Answer: B

5. Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? A. B2B B. B2C C. C2B D. C2C Answer: A

6. Which of the following are advantages normally associated with B2B e‐commerce? A. Shorter cycle times B. Reduction in costs C. Reaches wider audiences D. all of the above Answer: D

7. If the threat of substitute products or services is low it is a(n): A. Disadvantage to the supplier B. Advantage to the buyer C. Advantage to the supplier D. None of the above Answer: C

8. The threat of new entrants is high when it is: A. Hard for customers to enter the market B. Hard for competitors to enter the market C. Easy for competitors to enter the market D. Easy for customers to enter the market Answer: C

9. If it is easy for competitors to enter the market, the threat of new entrants is considered: A. High B. Low C. More D. Less Answer: A

10. An industry is less attractive for suppliers when the rivalry among existing competitors is: A. High B. Low C. More D. Less Answer: A

11. Unique value auction is mainly applies to? A. New products B. Second hand products C. Engineering products D. None of the above

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 162

Answer: B 12. Paisapay is facilitated in

A. eBay.co.in B. amazon.com C. flipkart.com D. none of the above Answer: A

13. Which of the following is a useful security mechanism when considering business strategy and IT? A. encryption B. decryption C. firewall D. all the above Answer: D

14. Which of the following is not related to security mechanism A. encryption B. decryption C. e‐cash D. all the above Answer: C

15. A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? A. Switching costs B. Loyalty programs C. Entry barriers D. Affiliate programs Answer: C

16. Which of the following statements accurately reflect the impact of technology? A. Technology has caused buyer power to increase B. Technology has lessened the entry barriers for many industries C. Technology has increased the threat of substitute products and services D. all of the above Answer: D

17. A business cannot be all things to all people. Instead, a business must: A. Identify target customers B. Identify the value of products/services as perceived by customers C. all of the above D. None of the above Answer: C

18. How the transactions occur in e‐commerce? A. Using e‐medias B. Using computers only C. Using mobile phones only D. None of the above Answer: A

19. Which type of products is lesser purchased using ecommerce? A. automobiles B. books C. softwares D. noneAnswer: A

20. A business competing in a commodity like environment must focus on which of the following? A. Price

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 163

B. Ease / speed of delivery C. Ease of ordering D. all of the above Answer: D

UNIT-31. Which of the following refers to creating products tailored to individual customers?

A. customization B. aggregation C. Direct materials D. Reverse auction Answer: A

2. Materials used in the normal operation of a business but not related to primary business operations are called what? A. Supplies B. Direct materials C. Indirect materials D. Daily stuff Answer: C

3. Amazon.com is well‐known for which e‐commerce marketing technique? A. Banner ads B. Pop‐up ads C. Affiliate programs D. Viral marketing Answer: C

4. What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? A. Direct marketplace B. B2B C. B2C D. Electronic marketplace Answer: D

5. Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials? A. horizontal B. Vertical C. Integrated D. Inclined Answer: A

6. Which form of e‐marketplace brings together buyers and sellers from the same industry? A. horizontal B. Vertical C. Integrated D. Inclined Answer: B

7. Which type of add appears on a web page? A. pop‐under ad B. Pop‐up ad C. Banner ad D. Discount ad Answer: C

8. What type of ad appears on top of a web page? A. pop‐under ad

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 164

B. pop‐up ad C. banner ad D. discount ad Answer: B

9. What type of ad appears under a web page? A. pop‐under ad B. pop‐up ad C. banner ad D. discount ad Answer: A

10. Which, if any, of the following types of ads are people most willing to tolerate? A. pop‐under ad B. pop‐up ad C. banner ad D. none of the above Answer: D

11. Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? A. electronic check B. electronic bill presentment and payment C. conversion rates D. financial cybermediary Answer: D

12. Which of the following is a method of transferring money from one person's account to another? A. electronic check B. credit card C. e‐transfer D. none of the above Answer: A

13. An electronic check is one form of what? A. e‐commerce B. online banking C. e‐cash D. check

14. If you need to transfer money to another person via the internet, which of the following methods could you use? A. financial cybermediary B. electronic check C. electronic bill presentment and payment D. all of the above Answer: D

15. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? A. financial cybermediary B. electronic check C. electronic bill presentment and payment D. all of the above Answer: C

16. A combination of software and information designed to provide security and information for payment is called a what? A. digital wallet B. pop up ad C. shopping cart

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 165

D. encryption Answer: A

17. What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? A. internet commerce B. e‐commerce C. transaction information transfer D. electronic data interchange Answer: D

18. Which of the following is used in B2B to pay for purchases? A. e‐commerce B. financial electronic data interchange C. electronic data exchange D. electronic checks Answer: B

19. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key. A. encryption, decryption B. private, public C. encryption, public D. public, private Answer: D

20. Secure Sockets Layers does which of the following? A. creates a secure, private connection to a web server B. encrypts information C. sends information over the internet D. all of the above Answer: D

UNIT-41. When a transaction is processed online, how can the merchant verify the customer's

identity? A. use secure sockets layers B. use secure electronic transactions C. use electronic data interchange D. use financial electronic data interchange Answer: B

2. The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? A. hacking B. cracking C. dumpster diving D. spoofing Answer: D

3. What is a model of a proposed product, service, or system? A. Prototyping B. Prototype C. Proof‐of‐concept prototype D. Selling prototype Answer: B

4. What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 166

A. Client/server network B. Intranet C. Extranet D. Thin client Answer: B

5. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? A. Client/server network B. Intranet C. Extranet D. Thin client Answer: C

6. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: A

7. What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: C

8. What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: B

9. What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: D

10. Which factor determines when your IT system will be available for knowledge workers to access? A. Availability B. Accessibility C. Reliability D. None of the above Answer: A

11. Which factor determines who has the right to access different types of IT systems and information? A. Availability B. Accessibility C. Reliability D. Scalability Answer: B

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 167

12. Which factor ensures your IT systems are functioning correctly and providing accurate information? A. Availability B. Accessibility C. Reliability D. Scalability Answer: C

13. Which factor represents how well your system can adapt to increased demands? A. Availability B. Accessibility C. Reliability D. Scalability Answer: D

14. Which factor represents a system's ability to change quickly? A. Flexibility B. Performance C. Capacity planning D. Benchmark Answer: A

15. What is a set of conditions used to measure how well a product or system functions? A. Flexibility B. Performance C. Capacity planning D. Benchmark Answer: D

16. What determines the future IT infrastructure requirements for new equipment and additional network capacity? A. Flexibility B. Performance C. Capacity planning D. Benchmark Answer: C

17. What automates business processes? A. Workflow B. ASP C. Workflow system D. EIP Answer: C

18. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? A. Workflow B. EIP C. Workflow system D. SLA Answer: A

19. What sends work assignments through an e‐mail system? A. Database‐based enterprise information portal B. Messaging‐based enterprise information portal C. Database‐based workflow system D. Messaging‐based workflow system Answer: D

20. Which will not harm computer resources A. firewall B. Virus

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 168

C. Trojan horse D. None of the above Answer: A

UNIT-51. Which is not a function of ERP?

A. Warehousing B. sales C. scheduling D. None of the above Answer: D

2. Which is a function of ERP? A. Warehousing B. sales C. scheduling D. all of the above Answer: D

3. Which of the following is the primary characteristic of an intranet? A. People outside the organization can access it B. People inside the organization can't access it C. People outside the organization can't access it D. None of the above Answer: C

4. Which concept suggests that different applications and computer systems should be able to communicate with one another? A. Integration B. Web services C. Scalability D. Interoperability Answer: D

5. Which service encompasses all technologies used to transmit and process information on an across a network? A. Interoperability B. Scalability C. Benchmarking D. Web services Answer: D

6. Which process can prevent data from lose due to computer problems or human errors? A. backup B. recovery C. benchmarking D. data cleansing Answer: A

7. Which process is used to reinstall data from a copy when the original data has been lost? A. backup B. recovery C. benchmarking D. data cleansing Answer: B

8. What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? A. Performance B. Capacity planning C. Benchmarking D. Data cleansing

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 169

Answer: C 9. Who protects system from external threats?

A. firewall B. EDI C. ERP D. Script kiddies Answer: A

10. Who breaks into other people's computer systems and steals and destroys information? A. Hackers B. softwaresC. Hacktivists D. Script kiddies Answer: a

11. What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about? A. Web log B. Clickstream C. Anonymous Web browsing service D. None of the above Answer: D

12. ERP stands for A. Enterprise resolution planning B. Enterprise reverse planning C. Enterprise resource planning D. None of the above Answer: C

13. Which is not a component of ERP? A. Legacy systems B. Bolt on applications C. Operational database D. Cybersoft Answer: D

14. Which is not a function of ERP? A. Human resource management B. financial C. warehousing D. None of the above Answer: D

15. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic? A. Computer virus B. Worm C. Denial of service attack D. None of the above Answer: B

16. What floods a Web site with so many requests for service that it slows down or crashes? A. Computer virus B. Worm C. Denia-of-service attack D. None of the above Answer: C

17. What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? A. Computer virus

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 170

B. Worm C. Denial‐of‐service attack D. None of the above Answer: D

18. What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? A. Risk management B. Risk assessment C. Security D. None of the above Answer: A

19. What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? A. Risk management B. Risk assessment C. Security D. None of the above Answer: B

20. What is the process of making a copy of the information stored on a computer? A. Backup B. Anti-virus C. Firewall D. Biometrics Answer: A

13.12 TUTORIALS QUESTION BANKPART-A (SHORT ANSWER QUESTIONS)

S. No QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT –I

1. Define E-Commerce? How information processing is categorized in E-Commerce? Knowledge a

2. Explain about e-Commerce – Framework in detail. Understand b3. Illustrate the elements of the e-Commerce – Framework in detail. Understand a4. Describe in detail about the anatomy of e-Commerce.. Understand b5. Explain about the Application services of e-commerce. Understand c6. Explain about Consumer-Oriented Services in detail. Comprehension c7. Illustrate Consumer-Oriented Applications in detail. Understand c8. Explain in detail about intermediate services and advanced services. Understand a9. How home shopping is categorized in e-commerce? Explain. Understand a10. How Prepurchase is determined in e-commerce? Explain. Understand a

UNIT –II1. Illustrate and explain the Risk in Electronic Payment system? Understand c2. What are the factors for Design of Electronic Payment system. Knowledge a3. Explain in detail about Credit Card based Electronic Payment Systems. Understand a4. Explain in detail about Smart card payment Systems Understand c5. What is EFT? Explain how work on EFT can be segmented Understand a6. Expand EDI. Explain in brief. Understand b

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 171

7. Describe the Layered Architecture of EDI Understand a8. To draw neat diagram apply Information flow without EDI. Apply a9. To draw neat diagram apply Information flow with EDI. Apply a

10. What are the various Legal, Security and Privacy issues and limitations of EDI Understand a

UNIT -III1. Explain in detail about Intra-organizational Electronic Commerce. Understand a

2. Explain in detail about Work-flow automation and coordination in detail. Understand b

3. Illustrate various characteristics of the Supply Chain management. Understand a

4. To draw neat diagram apply the concept of Push-based SCM Apply a5. With neat diagram explain about Pull -based SCM Understand a6. Analyze the corporate digital library to draw a neat diagram Analysis b

7. Illustrate the types of digital documents. Explain in detail about Document Imaging. Understand c

8. Illustrate the types of digital documents. Explain about Structured Documents in detail

Understand d

9. Illustrate the types of digital documents. Explain about Hypertext Documents in detail.

Understand a

10. What are the various Document-oriented Processes? Explain Understand dUNIT –IV

1 Explain about Consumer-data interfaces in detail. Understand a

2 What are the Typical features Information filtering processes?Explain.

Understand a

3 Describe in detail about Electronic white pages. Understand a4 Illustrate in detail about Electronic Yellow Pages. Understand a5 Describe in detail about Consumer search Understand a6 Explain the utility of business information. Understand a

7 What is consumer search? Explain the process of consumer search in online marketing.

Understand a

8 Discuss on search and resource discovery paradigms Understand a9 How do you integrate research and consumer buying behavior Understand a

10 What do you mean by electronic white and yellow pages of directory business?

Understand a

UNIT -V1 Analyze the series of stages a multimedia entity must pass through.. Analysis c2 Explain in detail about Multimedia Data Compression Understand a3 Explain in detail how Internet is used for Video conferencing Understand a

4Write short notes ofi. Desktop video hardware for playback and captureii. Factors that have made desktop video conferencing

Understand a

5 Analyze the Desktop Video Application Software analysis a6 What are the recent advancements in multimedia technology? Understand c

7 Explain e-commerce solutions and database solutions that are available in industrial houses for business purposes

Understand a

8 Explain Networks. Discuss in detail the ISDN. Understand a9 Explain various types of Codecs. Understand a

10 What are the benefits associated with desktop video conferencing Understand a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 172

PART – B LONG ANSWER QUESTIONS

S.No Question Blooms

Taxonomy LevelCourse

OutcomeUNIT –I

1. Write short notes on a. Brokerage and data managementb. Interface layer services Comprehension c

2. Write short notes on a. Middleware services andb. Secure Messaging Knowledge a

3. Explain the benefits of e-commerce in detail Comprehension, d4. Explain about the Limitations of e-Commerce in detail. Comprehension, d5. What is Supply Chain Management? Explain in detail. Application e

6. Apply Purchase Consummation to implemented in e-commerce? Explain. Application, d

7 Explain Mercantile Transaction Using Credit Cards in detail. Knowledge a8 Explain in detail Mercantile Models - Merchant’s Perspective. Knowledge a9 Describe the Order Management Cycle in e-commerce? Knowledge a10 Explain Mercantile model from the consumer’s perspective Comprehension b

UNIT -II1. What is Digital token-based electronic payment system? Explain Knowledge a

2.Explain in detail about electronic check system(ECS). Comprehension,

Synthesis, Evaluation

b

3. What is Electronic Cash? Illustrate and explain the Properties of Electronic Cash. Comprehension c

4. Illustrate the procedure for Purchasing e-cash from currency servers. Knowledge a

5. What are the various Legal issues, Business issues and Operational risks in electronic cash

Application, Synthesis d

6. Illustrate various EDI Applications in BusinessComprehension, Synthesis, Evaluation

b

7 Illustrate and explain various EDI standards. Understand c8 Explain in detail about EDI Software Implementation Knowledge a9 Expand VANs and explain in detail. Knowledge a

10 What are the various Advantages & Disadvantages of EDI?Explain. Knowledge a

UNIT –III1. Explain in detail about Integrated marketing and distribution in SCM Knowledge a

2.Explain in detail about Integrated Logistics and distribution in SCM Comprehension,

Synthesis, Evaluation

d

3 Explain in detail about Efficient Customer Response (ECR) in SCM. Comprehension c4 Explain in detail about Agile Manufacturing in SCM Knowledge a5 Write short notes on pull based SCM & push based SCM Knowledge a

6 What are the various functions and characteristics of Data warehouse? Explain. Comprehension c

7 How to build an end-to-end Data Warehouse? Explain. Comprehension, d8. Describe in detail about e-Advertising and Marketing? Comprehension c9. How Advertising is done on the Internet? Explain. Comprehension c10. Explain the process of On-line marketing. Comprehension c

UNIT -IV

1.What are Interactive Product Catalogs? Explain. Knowledge,

Comprehension, Evaluation

c

2. Explain in detail about Wide Area Information Service (WAIS) Engine Knowledge, c

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 173

Comprehension, Evaluation

3.Illustrate the two types of indexing methods. Explain about Indexing package categories.

Knowledge, Comprehension, Evaluation

d

4. What are search engines? Explain about the three major search methods. Comprehension c

5. Discuss on search and resource discovery paradigm? Application, Synthesis d

6. Describe push technology and state its benefits. Knowledge a7 What is the significance of online marketing? State its limitations. Comprehension, b8 What are the initial procedures for creating digital documents Comprehension, d

9Describe push technology and state its benefits. Knowledge,

Comprehension, Evaluation

d

10 What is the significance of online marketing? State its limitations. Comprehension cUNIT – V

1Write short notes ona. Goals of electronic commerceb. Information search challenges

Application, d

2 Explain in detail about Types of desktop video conferencing Application, d

3 Write short notes onDigital video compression / decompression Application, d

4 Explain in detail about Multimedia servers Knowledge a

5 Explain in detail about Digital video compression / decompression technique. Knowledge, c

6 Write a short note on functioning of CD-ROM as a multimedia storage. Comprehension, c

7 List out the applications of digital video in e-commerce? Comprehension c

8 Discuss the characteristics Digital Video? Comprehension b

9 Describe information filtering? Comprehension c

10 Discuss the overview Directory business Comprehension c

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S.No Questions

BloomsTaxonomy

LevelCourse Outcome

UNIT –I

1 Compare and contrast online retailing with traditional retailing. Comprehension c

2 Explain Home Banking and Home Shopping. Application, d

3 Write short notes on micro transactions of information. Application, d

4 What are the challenges for consumer-oriented e-commerce in India. Understand c

5 What is catalog based shopping ? State its advantages. Understand d

UNIT – II

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 174

1 What is smart card? What are their types and uses. Knowledge a

2 Discuss why anyone with a credit card would want to us an electronic payment system. Knowledge a

3 How do you ensure consumer protection in e-payment system. Understand c

4 Explain risks involved in electronic cash handling and cash payment. Understand d

5 Explain detection of double spending in e-cash. Understand b

UNIT -III

1. How do companies eliminate the potential limitations and risks associated with internet based EDI.

Analysis , d

2. Explain MIME based EDI. Explain MIME advantages and disadvantages. Knowledge a

3. Compare EDI and e-mail. Comprehension c

4 Explain different financial EDI standards. Understand a

5 Explain manufacturing/retail procurement using EDI. Understand D

UNIT –IV

1. What are the company’s e-commerce goals? Comprehension C

2. Will the e-commerce leader command a dedicated team? Comprehension C

3. Where will the e-commerce team work—headquarters or dot-com talent centers? Understand A

4 Write a short note on functioning of CD-ROM as a multimedia storage. Understand B

5 List out the applications of digital video in e-commerce? Understand C

UNIT –V

1. What are the most essential skills and competencies to look for in candidates?

Application, D

2. Does the business’ compensation model support or undermine its goals? Knowledge A

3. Should the head of e-commerce report directly to the c-suite? Understand A

4. What are the most common pitfalls when recruiting e-commerce leaders? Comprehension C

Explain e-commerce solutions and database solutions that are available in industrail houses for business purposes Understand A

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 175

13.13 ASSIGNMENT QUESTION BANK PART – A (SHORT ANSWER QUESTIONS)

S.No Questions

BloomsTaxonomy

Level

CourseOutcome

UNIT –I1 Explain about Consumer-Oriented Services in detail. Knowledge A

2 Illustrate Consumer-Oriented Applications in detail. Analysis B3 Explain in detail about intermediate services and advanced services. Knowledge A4 How home shopping is categorized in e-commerce? Explain. Analysis A5 How Prepurchase is determined in e-commerce? Explain. Synthesis B

6 Define E-Commerce? How information processing is categorized in E-Commerce? Comprehension C

7 Explain about e-Commerce – Framework in detail. Comprehension C8 Illustrate the elements of the e-Commerce – Framework in detail. Knowledge A9 Describe in detail about the anatomy of e-Commerce.. Knowledge A

10 Explain about the Application services of e-commerce. Knowledge AUNIT –II

1 Expand EDI. Explain in brief. Comprehension C2 Describe the Layered Architecture of EDI Knowledge A3 With neat diagram explain Information flow without EDI. Knowledge A4 With neat diagram explain Information flow with EDI Comprehension C5 What are the various Legal, Security and Privacy issues and limitations of EDI Knowledge A6 Illustrate and explain the Risk in Electronic Payment system? Analysis B7 What are the factors for Design of Electronic Payment system. Knowledge A8 Explain in detail about Credit Card based Electronic Payment Systems. Knowledge A9 Explain in detail about Smart card payment Systems Knowledge A

10 What is EFT? Explain how work on EFT can be segmented Knowledge AUNIT –III

1 With a neat diagram explain in detail about corporate digital library. Knowledge A

2 Illustrate the types of digital documents. Explain in detail about Document Imaging. Analysis B

3 Illustrate the types of digital documents. Explain about Structured Documents in detail Knowledge A

4 Illustrate the types of digital documents. Explain about Hypertext Documents in detail. Knowledge A

5 What are the various Document-oriented Processes? Explain Knowledge A6 Explain in detail about Intra-organizational Electronic Commerce. Analysis B7 Explain in detail about Work-flow automation and coordination in detail. Understand

8 What are the various characteristics of the Supply Chain management. Understand

9 With neat diagram explain about Push-based SCM Understand

10 With neat diagram explain about Pull -based SCM Understand

UNIT –IV1 Explain the utility of business information . Knowledge A

2 What is consumer search ? Explain the process of consumer search in online marketing. Knowledge A

3 Discuss on search and resource discovery paradigms Knowledge A

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 176

4 How do you integrate research and consumer buying behavior Knowledge A

5 What do you mean by electronic white and yellow pages of directory business. Knowledge A

6 Explain about Consumer-data interfaces in detail. Knowledge A

7 What are the Typical features Information filtering processes?Explain. Knowledge A

8 Describe in detail about Electronic white pages. Knowledge A9 Illustrate in detail about Electronic Yellow Pages. Knowledge A

10 Describe in detail about Consumer search Knowledge AUNIT –V

1 Illustrate the Characteristics of Digital video and explain about Desktop Video Application Software Comprehension C

2 What are the recent advancements in multimedia technology. Knowledge A

3 Explain e-commerce solutions and database solutions that are available in industrail houses for business purposes Knowledge A

4 Explain Networks. Discuss in detail the ISDN. Knowledge A5 Explain various types of Codecs. Knowledge A6 What are the benefits associated with desktop video conferencing Comprehension C

7 Define multimedia? Illustrate and explain the series of stages a multimedia entity must pass through.. Knowledge A

8 Explain in detail about Multimedia Data Compression Knowledge C9 Explain in detail how Internet is used for Video conferencing Knowledge C

10 Write short notes on i. Desktop video hardware for playback and captureii. Factors that have made desktop video conferencing Knowledge C

PART – B (LONG ANSWER QUESTIONS)

S. No QuestionsBlooms

TaxonomyLevel

CourseOutcome

UNIT –I

1 Write short notes on a. Brokerage and data managementb. Interface layer services Comprehension C

2 Write short notes on a. Middleware services andb. Secure Messaging Knowledge A

3 Explain the benefits of e-commerce in detail Comprehension, B

4 Explain about the Limitations of e-Commerce in detail. Comprehension, B

5 What is Supply Chain Management? Explain in detail. Application C

6 How Purchase Consummation is implemented in e-commerce? Explain. Application, B

7 Explain Mercantile Transaction Using Credit Cards in detail. Knowledge A8 Explain in detail Mercantile Models - Merchant’s Perspective. Knowledge A9 Describe the Order Management Cycle in e-commerce? Knowledge A

10 Explain Mercantile model from the consumer’s perspective Comprehension D

UNIT –II1 What is Digital token-based electronic payment system? Explain Knowledge A

2 Explain in detail about electronic check system(ECS). Comprehension, B

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 177

3 What is Electronic Cash? Illustrate and explain the Properties of Electronic Cash. Comprehension C

4 Illustrate the procedure for Purchasing e-cash from currency servers. Knowledge A

5 What are the various Legal issues, Business issues and Operational risks in electronic cash

Application, D

6 Illustrate various EDI Applications in Business Comprehension, B

7 Illustrate and explain various EDI standards. Knowledge A8 Explain in detail about EDI Software Implementation Knowledge A9 Expand VANs and explain in detail. Knowledge A

10 What are the various Advantages & Disadvantages of EDI?Explain. Knowledge A

UNIT –III1 Explain in detail about Integrated marketing and distribution in SCM Knowledge A

2 Explain in detail about Integrated Logistics and distribution in SCM Comprehension, b/c/d

3 Explain in detail about Efficient Customer Response ( ECR ) in SCM. Comprehension C4 Explain in detail about Agile Manufacturing in SCM Knowledge A5 Write short notes on pull based SCM & push based SCM Knowledge A6 What are the various functions and characteristics of Data warehouse? Explain. Comprehension C

7 How to build an end-to-end Data Warehouse? Explain. Comprehension, B

8 Describe in detail about e-Advertising and Marketing? Comprehension C9 How Advertising is done on the Internet? Explain. Comprehension C10 Explain the process of On-line marketing. Comprehension C

UNIT –IV1 What are Interactive Product Catalogs? Explain. Knowledge, C2 Explain in detail about Wide Area Information Service (WAIS) Engine Knowledge, C

3 Illustrate the two types of indexing methods. Explain about Indexing package categories. Knowledge, C

4 What are search engines? Explain about the three major search methods. Comprehension C

5 Discuss on search and resource discovery paradigm? Application, e/b

6 Describe push technology and state its benefits. Knowledge A

7 What is the significance of online marketing? State its limitations. Comprehension, D

8 What are the initial procedures for creating digital documents Comprehension, D

9 Describe push technology and state its benefits. Knowledge, C10 What is the significance of online marketing? State its limitations. Comprehension C

UNIT –V

1Write short notes ona. Goals of electronic commerceb. Information search challenges

Application, d/e

2 Explain in detail about Types of desktop video conferencing Application, D

3 Write short notes onDigital video compression / decompression Application, D

4 Explain in detail about Multimedia servers Knowledge A

5 Explain in detail about Digital video compression / decompression technique.

Knowledge, D

6 Write a short note on functioning of CD-ROM as a multimedia storage. Comprehensio

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 178

n, D

7 List out the applications of digital video in e-commerce? Comprehension D

8 Discuss the characteristics Digital Video? Comprehension, C

9 Describe information filtering? Comprehension B10 Discuss the overview Directory business Comprehension B

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S.No Question

Blooms Taxonomy

Level

Course Outcome

UNIT –I

1 Compare and contrast online retailing with traditional retailing. Comprehension D

2 Explain Home Banking and Home Shopping. Application, C

3 Write short notes on micro transactions of information. Application, C

4What are the challenges for consumer-oriented e-commerce in India. Understand a

5 What is catalog based shopping ? State its advantages. Understand DUNIT –II

1 What is smart card? What are their types and uses. Knowledge B

2 Discuss why anyone with a credit card would want to us an electronic payment system. Knowledge B

3 How do you ensure consumer protection in e-payment system. Understand C4 Explain risks involved in electronic cash handling and cash payment. Understand A5 Explain detection of double spending in e-cash. Understand D

UNIT –III

1 How do companies eliminate the potential limitations and risks associated with internet based EDI. Analysis C

2 Explain MIME based EDI. Explain MIME advantages and disadvantages. Knowledge B

3 compare EDI and e-mail. Comprehension C4 Explain different financial EDI standards. Understand C5 Explain manufacturing/retail procurement using EDI. Understand D

UNIT –IV1 What are the company’s e-commerce goals? Comprehension B2 Will the e-commerce leader command a dedicated team? Comprehension C

3 Where will the e-commerce team work—headquarters or dot-com talent centers? Understand D

4 Write a short note on functioning of CD-ROM as a multimedia storage. Understand A5 List out the applications of digital video in e-commerce? Understand B

UNIT –V

1 What are the most essential skills and competencies to look for in candidates? Application, B

2 Does the business’ compensation model support or undermine its goals? Knowledge C

3 Should the head of e-commerce report directly to the c-suite? Understand D

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 179

4 What are the most common pitfalls when recruiting e-commerce leaders? Comprehension C

5 Explain e-commerce solutions and database solutions that are available in industrail houses for business purposes Understand D

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 180

14. COMPUTER NETWORKS (A10519)

14.0 COURSE DESCRIPTION

Course Title Computer networksCourse Code A10519Regulation MLR-15

Lectures Tutorials Practicals CreditsCourse Structure

3 1 -- 3Course Coordinator Dr. ILAIAH KAVATI Professor CSE

Team of Instructors Dr. Syed Umar Professor/ Mr M Srinivas Rao Assoc.Professor/Mrs.Navya Asst.Professor CSE

14.1 COURSEOVERVIEW:The course introduces main concepts of networking; application areas;

classification; reference models; transmission environment; technologies; routing algorithms; IP, UDP and TCP protocols; reliable data transferring methods; application protocols; network security; management systems; perspectives of communication networks. The course structure consists of lectures in classroom and individual work.

14.2 PREREQUISITES:

Level Credits Periods/Weeks PrerequisitesUG 3 5 Computer Networks, Network security

14.3. MARKS DISTRIBUTION:

Session Marks University EndExam Marks Total Marks

There shall be 2 midterm examinations. Each midterm examination consists of subjective type and objective type tests. The subjective test is for 10 marks, with duration of 1 hour. Subjective test of each semester shall contain 4 questions; the student has to answer 2 questions, each carrying5marks.The objective type test is for 10 marks with duration of 20minutes. It consists of10 multiple choice and 10 objective type questions, the student have to answer all the questions and each carry half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.Five marks are earmarked for assignments. There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.

75 100

14.4 EVALUATION SCHEME:

S. No Component Duration Marks1 I Mid Examination 80 minutes 202 I Assignment - 53 II Mid Examination 80 minutes 20

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 181

4 II Assignment - 55 External Examination 3 hours 75

COURSEOBJECTIVES:I. To introduce the fundamentals of various types of computer networks

II. To demonstrate the TCP/IP and OSI models with merits and demerits III. To explore the various layers of OSI model IV. To introduce UDP and TCP models

14.5 COURSE OUTCOMES:

S NO COURSE OUTCOMES BLOOMS LEVELS

a. Understand and explain computer networks and its components. BL 1 & 2b. Identify the different types of network topologies and protocols. BL 1, 2, & 3

c. Enumerate the layers of the OSI model and TCP/IP. Explain the function(s) of each layer. BL 1, 2, 3 & 4

d. Understand and building the skills of sub netting and routing mechanisms. BL 1, 2, 3 & 4

e.Familiarity with the basic protocols of computer networks with UDP and TCP models, and how they can be used to assist in network design and implementation

BL 4 & 5

BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate

14.6 HOW PROGRAM OUTCOMES AREASSESSED:

Program Outcomes Level Proficiency assessed by

A An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems. H

Assignments, Tutorials,

Exams

B An ability to design and conduct engineering experiments, as well as to analyze and interpret data. S Assignments, tutorials

C An ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. H Assignments, Tests

DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams.

N ------

EAn ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.

H Assignments, Tests

F An understanding of professional, social and ethical responsibility S Lectures

G An ability to recognize the global issues like green initiatives and alternate energy recognize the rural requirements. S ----

H The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context. N Lectures

IGraduate will develop confidence for self-education and acquire new knowledge in the computing discipline and ability and practice for Multi-disciplinary tasks as a member within the teams

H Assignments, Tutorials,Exams

J To communicate effectively N ------

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 182

K An ability to use the techniques, skills and modern engineering tools practice necessary for Engineering practice. H Assignment s, Tutorials

L Graduates areable to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc N Assignments, Tutorials

MThe use of current application software and the design and use operating systems and the analysis, design, testing and documentation of computer programs for the use computer science and engineering technologies .

H Assignments, Tutorials

N An ability to setup an enterprise. S Assignments,

N= None S= Supportive H = Highly Related

14.7 SYLLABUS:

UNIT - I INTRODUCTION: Network applications, network hardware, network software, reference models: OSI, TCP/IP, Internet, Connection oriented network - X.25, frame relay. THE PHYSICAL LAYER: Theoretical basis for communication, guided transmission media, wireless transmission, the public switched telephone networks, mobile telephone system.UNIT - II THE DATA LINK LAYER: Design issues, error detection and correction, elementary data link protocols, sliding window protocols, example data link protocols - HDLC, the data link layer in the internet. THE MEDIUM ACCESS SUBLAYER: Channel allocations problem, multiple access protocols, Ethernet, Data Link Layer switching, Wireless LAN, Broadband Wireless, Bluetooth UNIT – IIITHE NETWORK LAYER: Network layer design issues, routing algorithms, Congestion control algorithms, Internetworking, the network layer in the internet (IPv4 and IPv6), Quality of Service. UNIT – IV THE TRANSPORT LAYER: Transport service, elements of transport protocol, Simple Transport Protocol, Internet transport layer protocols: UDP and TCP. UNIT - V THE APPLICATION LAYER: Domain name system, electronic mail, World Wide Web: architectural overview, dynamic web document and http. APPLICATION LAYER PROTOCOLS: Simple Network Management Protocol, File Transfer Protocol, Simple Mail Transfer Protocol, Telnet.

TEXT BOOKS: 1. A. S. Tanenbaum (2003), Computer Networks, 4th edition, Pearson Education/ PHI,

New Delhi, India. REFERENCE BOOKS: 1. Behrouz A. Forouzan (2006), Data communication and Networking, 4th Edition, Mc

Graw-Hill, India. 2. Kurose, Ross (2010), Computer Networking: A top down approach, Pearson Education,

India.

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 183

4. Introduction to computer networks and cyber security, Chwan-Hwa (John) Wu,j. David Irwin, CRC Press

5. Computer networks, L.L Peterson and B.S Davie, 4th edition,, ELSEVIER6. Computer networking: A top down approach featuring the internet, james F.Kurouse,

K.W ROSS , 3rdedition,pearson education

14.8 COURSE PLAN:The course plan is meant as a guideline. There may probably be changes

Lecture No

Unit No Topic Name Blooms

Level Session Objectives Teaching Methodology

1 Introduction Apply[Level 3]

By the end of the session student will identify the difference between topologies, networks

Chalk & Talk

2 Network applications Evaluate[Level 5]

By the end of the session student will understand different network structures

Chalk & Talk

3 Network hardwareUnderstan

d[Level 2]

By the end of the session student will identify different types hardware required to set up a network

Chalk & Talk

4 Network software Evaluate[Level 5]

By the end of the session student will identify the benefits and features of network software.

Chalk & Talk

5 Reference models: OSI Apply[Level 3]

By the end of the session student will identify the difference between OSI and TCP/IP

Chalk & Talk

6 TCP/IPUnderstan

d[Level

2]

By the end of the session student will distinguish between OSI and TCP/IP

Chalk & Talk

7 Internet Create[Level 6]

By the end of the session student will identify the different internet standards

Chalk & Talk

8 Connection oriented network - X.25Apply

Level 3

By the end of the session student will understand the ISDN connections as physical links

Chalk & Talk

9 frame relayUnderstan

d[Level 2]

By the end of the session student will identify the difference between local area networks (LANs) and between endpoints in wide area networks (WANs)

Chalk & Talk

10

I

THE PHYSICAL LAYER: Theoretical basis for communication

Understand

[Level 2]

By the end of the session student will understand different types of cables and their structures

Chalk & Talk

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 184

11 guided transmission media Understan

d[Level 2]

By the end of the session student will identify the difference between types of transmission media

Chalk & Talk

12 wireless transmission Apply[Level 3]

By the end of the session student will distinguish between guided and unguided transmission media

Chalk & Talk

13 the public switched telephone networks

Create

Level 6

By the end of the session student will understand different modes of transmission

Chalk & Talk

14 Mobile telephone system. Evaluate[Level 5]

By the end of the session student will understand function of mobile telephony system in detail

Chalk & Talk

15 THE DATA LINK LAYER: Design issues

Understand

[Level 2]

By the end of the session student will identify the different functions of DLL

Chalk & Talk

16 error detection and correction Explain[Level 2]

By the end of the session student will be able to evaluate different methods of error correction and detection

Chalk & Talk

17 error correction Evaluate[Level 5]

By the end of the session student will evaluate different methods of error correction

Chalk & Talk

18 elementary data link protocols Create[Level 6]

By the end of the session student will elaborate the difference between elementary protocols

Chalk & Talk

19 elementary data link protocols Apply[Level 3]

By the end of the session student will elaborate different elementary protocols

Chalk & Talk

20 sliding window protocols Evaluate[Level 5]

By the end of the session student will elaborate the difference between basic protocol and sliding window protocol

Chalk & Talk

21 sliding window protocolsUnderstan

d[Level 2]

By the end of the session student will understand different protocols of DLL

Chalk & Talk

22 example data link protocols - HDLC

Apply[Level 3]

By the end of the session student will understand different protocols of DLL

Chalk & Talk

23 The data link layer in the internet Apply[Level 3]

By the end of the session student will identify how to transfer data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.

Chalk & Talk

24THE MEDIUM ACCESS SUBLAYER: Channel allocations problem

Evaluate[Level 5]

By the end of the sessionstudent will compare thedifference between different MAC

protocols

Chalk & Talk

25

II

multiple access protocolsUnderstan

d[Level 2]

By the end of the sessionstudent will understand different Mac protocols

Chalk & Talk

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 185

26 multiple access protocols Evaluate[Level 5]

By the end of the sessionstudent will compare thedifference between different MAC

protocols

Chalk & Talk

27 Ethernet Evaluate[Level 5]

By the end of the sessionstudent will distinguish different Ethernet physical layers

Chalk & Talk

28 EthernetUnderstan

d[Level 2]

By the end of the sessionstudent will determine different Ethernet physical layers.

Chalk & Talk

29 Data Link Layer switching Apply[Level 3]

By the end of the session student will explain about DLL switching.

Chalk & Talk

30 Wireless LANUnderstan

d[Level

2]

By the end of the session student will identify the uses of lans

Chalk & Talk

31 Broadband Wireless Create[Level 6]

By the end of the session student will summarize different connecting devices with respect to different layers.

Chalk & Talk

32 BluetoothApply

Level 3

By the end of the session student will summarize different WIRELESS connecting devices with respect to different layers.

Chalk & Talk

33THE NETWORK LAYER: Network layer design issues

Understand

[Level 2]

By the end of the session student will LIST the design issues of network layer

Chalk & Talk

34 Routing algorithmsUnderstan

d[Level 2]

By the end of the session student can create sink trees based on Optimality Principle

Chalk & Talk

35 Routing algorithmsApply

[Level 3]

By the end of the session student will decide the Optimality Principle

Chalk & Talk

36 Routing algorithms Createlevel 6

By the end of the session student can create sink trees based on Optimality Principle

Chalk & Talk

37 Congestion control algorithms Understand

[Level 2]

By the end of the session student will construct Congestion ControlAlgorithms

And

Admission

Control

Algorithms

Chalk & Talk

38 Congestion control algorithms Apply[Level 3]

By the end of the session student will Determine Congestion Control, Admission Control

Chalk & Talk

39 Internetworking Apply[Level 3]

By the end of the session student will analyze common method of routing information packets between the networks

Chalk & Talk

40

III

Internetworking Analyze[Level 4]

By the end of the session student will analyze common method of routing information packets between the networks

Chalk & Talk

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 186

41 the network layer in the internet (IPv4 and IPv6)

Create

Level 6

By the end of the session student will differentiate between IPv4 and IPv6

Chalk & Talk

42 IPV4Create

Level6

By the end of the session student will understanding IPv4 and its associated terminologies along with appropriate references and examples

Chalk & Talk

43 IPV6 Chalk & Talk

44 IPV6

Explain[Level 2]

By the end of the session student will understanding IPv4 and its associated terminologies along with appropriate references and examples

Chalk & Talk

45 Quality of Service Evaluate[Level 5]

By the end of the session student will compare set of networking technologies and techniques designed to guarantee predicable levels of network performance.

Chalk & Talk

46THE TRANSPORT LAYER: Transport service

Understand

[Level 2]

By the end of the session student will explain network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI)

Chalk & Talk

47 elements of transport protocol Explain[Level 2]

By the end of the session student will compare different types of protocols.

Chalk & Talk

48 Simple Transport Protocol Create[Level 6]

By the end of the session student will differentiate between RPC and UDP

Chalk & Talk

49 Internet transport layer protocols Evaluate[Level 5]

By the end of the session student will analyze different internet layer protocols

Chalk & Talk

50 UDP and TCP Apply[Level 3]

By the end of the session student will differentiate between UDP and TCP .

Chalk & Talk

51

IV

TCP Apply[Level 3]

By the end of the session student will define how computers send packets of data to each other.

Chalk & Talk

52THE APPLICATION LAYER: Domain name system Evaluate

[Level 5]

By the end of the session student will explain different levels of DNS

Chalk & Talk

53

V

electronic mailUnderstan

d[Level 2]

By the end of the session student will understand exchange digital messages between people using digital devices such as computers.

Chalk & Talk

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 187

54 World Wide Web :architectural overview

Evaluate[Level 5]

By the end of the session student will design and planning of websites that involves technical, aesthetic and functional criteria

Chalk & Talk

55 dynamic web document and http Apply[Level 3]

By the end of the session student will differentiate between static and dynamic web pages

Chalk & Talk

56 APPLICATION LAYER PROTOCOLS: Simple Network

Understand

[Level 2]

By the end of the session student will understand different type of networks.

Chalk & Talk

57 Management Protocol ApplyLevel 3

By the end of the session student will discuss Internet-standard protocol for collecting and organizing information about managed devices on IP networks

Chalk & Talk

58 File Transfer Protocol Create[Level 6]

By the end of the session student will analyze transfer computer files between a client and server on a computer network

Chalk & Talk

59 Simple Mail Transfer ProtocolApply

Level 3

By the end of the session student will identify the communication between mail servers

Chalk & Talk

60 TelnetUnderstan

d[Level 2]

By the end of the session student will explain user command and an underlying TCP/IP protocol for accessing remote computers

Chalk & Talk

14.9. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:

Course OutcomesCourse Objectives a b C d e

I H H HII H S S SIII H H H H HIV H H S S

S= Supportive H = Highly Related

14.10 MAPPINGCOURSEOUTCOMESLEADINGTOTHEACHIEVEMENTOF PROGRAM OUTCOMES:

Program OutcomesCourse Educational Outcomes A B C D E F G H I J K L M N

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 188

a H H H S H S H

b H S S S H S S H S H

c H H H H H S H H S

d H H S S H S S H S

e H S H H S H H S

S= Supportive H = Highly Related

14.11 OBJECTIVEQUESTIONS

UNIT I1. The computer network is

A. Network computer with cableB. Network computer without cableC. Both of the aboveD. None of the aboveAnswer B

2. FDDI used which type of physical topology?A. Bus B. Ring C. Star D. TreeAnswer: C

3. FTP stands forA. File transfer protocol B. File transmission protocol C. Form transfer protocol D. Form transmission protocol Answer: C

4. Ethernet system uses which of the following technology.A. Bus B. RingC. StarD. Tree Answer: B

5. Which of the following are the network services? A. File service B. Print service C. Database service D. All of the above Answer: D

6. If all devices are connected to a central hub, then topology is calledA. Bus Topology B. Ring Topology C. Star TopologyD. Tree Topology Answer: B

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 189

7. FDDI stands for A. Fiber Distributed Data Interface B. Fiber Data Distributed Interface C. Fiber Dual Distributed Interface D. Fiber Distributed Data Interface Answer: A

8. Which of the following is an application layer service?A. Network virtual terminal B. File transfer, access and managementC. Mail service D. All of the above Answer: D

9. Which is the main function of transport layer? A. Node to node delivery B. End to end delivery C. Synchronization D. Updating and maintaining routing tables Answer: B

10. The ............ layer change bits onto electromagnetic signals.A. Physical B. Transport C. Data Link D. Presentation Answer: B

11. In mesh topology, relationship between one device and another is ..............A. Primary to peer B. Peer to primary C. Primary to secondary D. Peer to Peer Answer: B

12. The performance of data communications network depends on ..............A. Number of users B. The hardware and Software C. The transmission D. All of the above Answer: D

13. Find out the OSI layer, which performs token management. A. Network Layer B. Transport Layer C. Session Layer D. Presentation Layer Answer: C

14. The name of the protocol which provides virtual terminal in TCP/IP model is.A. Telnet B. SMTP C. HTTP D. NoneAnswer: C

15. The layer one of the OSI model isA. Physical layer

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 190

B. Link layer C. Router layerD. Broadcast layer Answer: A

16. What is the name of the network topology in which there are bi-directional links between each possible node? A. Ring B. Star C. Tree D. Mesh Answer: A

17. What is the commonly used unit for measuring the speed of data transmission?A. Bytes per second B. Baud C. Bits per second D. Both B and C Answer: D

18. Which of the communication modes support two way traffic but in only once direction of a time? A. Simplex B. Half-duplex C. Three - quarter's duplex D. Full duplex Answer: A

19. The loss in signal power as light travels down the fiber is called.............A. Attenuation B. Propagation C. Scattering D. InterruptionAnswer: D

20. Which of the following TCP/IP protocols is used for transferring files form one machine to another?A. FTP B. SNMP C. SMTP D. RPCAnswer: A

UNIT II1. A network that needs human beings to manually route signals is called....

A. Fiber Optic NetworkB. Bus NetworkC. T-switched networkD. Ring networkAnswer: B

2. TCP/IP .................layer corresponds to the OSI models to three layers.A. ApplicationB. PresentationC. SessionD. Transport

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 191

Answer: A3. Which of the transport layer protocols is connectionless?

A. UDPB. TCPC. FTPD. NetAnswer: D

4. Which of the following applications allows a user to access and change remote files without actual transfer?A. DNSB. FTPC. NFSD. TelnetAnswer: A

5. The data unit in the TCP/IP layer called a....A. MessageB. SegmentC. DatagramD. FrameAnswer: C

6. DNS can obtain the .................of host if its domain name is known and vice versaA. Station addressB. IP addressC. Port addressD. ChecksuMAnswer: B

7. Which of the following OSI layers correspond to TCP/IP's application layerA. ApplicationB. PresentationC. SessionD. All of the aboveAnswer: D

8. Devices on one network can communicate with devices on another network via a.......A. File ServerB. Utility ServerC. Printer ServerD. GatewayAnswer: A

9. A communication device that combines transmissions from several I/O devices into one line is aA. ConcentratorB. ModifierC. MultiplexerD. Full duplex fileAnswer: C

10. Which layers of the OSI determines the interface often system with the user?A. NetworkB. ApplicationC. Data link

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 192

D. SessionAnswer: B

11. Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another?A. FTPB. SMTPC. SNMPD. RpeAnswer: A

12. In which OSI layers does the FDDI protocol operate?A. PhysicalB. Data linkC. NetworkD. A and BAnswer: D

13. In FDDI, data normally travel on..................A. The primary ringB. The Secondary ringC. Both ringsD. Neither ringAnswer: A

14. The ............layer of OSI model can use the trailer of the frame for error detectionA. PhysicalB. Data linkC. TransportD. PresentationAnswer: B

15. In a ................topology, if there are n devices in a network, each device has n-1 ports for cables.A. MeshB. StarC. BusD. RingAnswer: A

16. Another name for Usenet is A. GopherB. NewsgroupsC. BrowserD. CERNAnswer: A

17. The standard suit of protocols used by the Internet, Intranets, extranets and some other networksA. TCP/IPB. ProtocolC. Open systemD. Internet work processorAnswer: A

18. State whether the following is true or falsei. In bus topology, heavy Network traffic slows down the bus speedii. It is multipoint configuration

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 193

A. True, TrueB. A) True, TrueC. False, TrueD. False, FalseAnswer: A

19. Which of the following is the logical topology?A. BusB. TreeC. StarD. Both A and BAnswer: D

20. Which of the following is/ are the drawbacks of Ring Topology?A. Failure of one computer, can affect the whole network B. Adding or removing the computers disturbs the network activity. C. If the central hub fails, the whole network fails to operate. D. Both of A and B Answer: D

UNIT III1. Which of the following is not the layer of TCP/IP protocol?

A. Application Layer B. Session Layer C. Transport Layer D. Internetwork layer Answer: D

2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.A. Class A B. Class B C. Class CD. Class DAnswer: C

3. . ............. Addresses are reserved for multicasting.A. Class B B. Class C C. Class D D. Class E Answer: A

4. State the following statement is true or false.i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A. True, False B. True, True C. False, True D. False, FalseAnswer: B

5. Which of the following statement is true?i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A. i only

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 194

B. ii only C. Both A and B D. None of the above Answer: B

6. Which is not the Regional Internet Registers (RIR) of the following?A. American Registry for Internet Numbers (ARIN) B. Europeans Registry for Internet Numbers (ERIN) C. Reseaux IP Europeans (RIPE) D. Asia Pacific Network Information Centre (APNIC)Answer: B

7. Match the following IEEE No to their corresponding Name for IEEE 802 standards for LANs. i) 802.3 a) WiFiii) 802.11 b) WiMaiii) 802.15.1 c) Ethernetiv) 802.16 d) BluetoothA. i-b, ii-c, iii-d, iv-aB. i-c, ii-d, iii-a, iv-b C. i-c, ii-a, iii-d, iv-b D. i-b, ii-d, iii-c, iv-aAnswer: A

8. . ........... was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network.A. Star LAN B. Ring LAN C. Mesh LAN D. All of the above Answer: D

9. . ............... Is the predominant form of Fast Ethernet, and runs over two pairs of category 5 or above cable.A. 100 BASE-TB. 100 BASE-TXC. 100 BASE-T4D. 100 BASE-T2Answer: B

10. IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair (UTP) category 5, 5e or 6 cabling known as....................A. 1000 BASE-TB. 1000 BASE-SXC. 1000 BASE-LXD. 1000 BASE-CXAnswer: D

11. Which one of the following is not a function of network layer?A. routingB. inter-networkingC. congestion control D. none of the mentionedAnswer: D

12. The 4 byte IP address consists ofA. network address

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 195

B. host addressC. both (a) and (b) D. none of the mentionedAnswer: D

13. Which one of the following routing algorithm can be used for network layer design?A. shortest path algorithmB. Multi destination routingC. distance vector routing D. all of the mentioned Answer: A

14. A routing A. contains the list of all destinations B. data is not sent by packets C. none of the mentioned D. None Answer: A

15. Which one of the following algorithm is not used for congestion control? A. traffic aware routing B. admission control C. load shedding D. none of the mentionedAnswer: B

16. ICMP is primarily used forA. error and diagnostic functionsB. addressingC. forwardingD. none of the mentionedAnswer: B

17. What is stat frame deli meter (SFD) in ether net frame?A. 10101010B. 10101011C. 00000000D. 11111111Answer: B

18. MAC address is ofA. 24 bitsB. 36 bits C. 42 bits D. 48 bitsAnswer: A

19. What is auto negotiation?A. a procedure by which two connected devices choose common transmission

parameters B. a security algorithm C. a routing algorithm D. none of the mentioned Answer: A

20. Ethernet in metropolitan area network (MAN) can be used asA. puree ther net

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 196

B. ether net over SDH C. ether net over MPLS D. all of the mentionedAnswer: D

UNIT IV1. In asymmetric key cryptography, the private key is kept by

A. sender B. receiverC. all the connected devicesD. NoneAnswer: C

2. Which one of the following algorithm is not used in asymmetric-key cryptography?A. RSA algorithm B. Diffie - hellman algorithm C. electronic code book algorithm D. none of the mentioned Answer: C

3. Which of the following field in IPv4 datagram is not related to fragmentation?A. Flags B. Offset C. TOS D. Identifier Answer: D

4. The TTL field has value 10. How many routers (max) can process this datagram?A. 11 B. 5 C. 10 D. 1 Answer: A

5. If the value in protocol field is 17, the transport layer protocol used is ____.A. TCP B. UDP C. Either of the mentioned D. None of the mentionedAnswer: A

6. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is (in milliseconds)A. 3.2B. 32 C. 19.D. None of the mentionedAnswer: A

7. What should be the flag value to indicate the last fragment?A. 0 B. 1 C. TTl value D. None of the mentionedAnswer: C

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 197

8. Which of these is not applicable for IP protocol?A. is connectionless B. offer reliable serviceC. offer unreliable service D. None of the mentioned Answer: A

9. Fragmentation has following demeritsA. complicates routers B. open to DOS attack C. over lapping of fragments. D. All of the mentioned Answer: D

10. Which field helps to check rearrangement of the fragments?A. offsetB. flagC. TTL D. identifierAnswer: C

11. DHCP is used forA. IPv4B. Ipv6 C. both (a) and (b) D. NoneAnswer: C

12. The DHCP serverA. maintains a database of available IP addresses B. maintains the information about client configuration parameters C. grants a IP address when receives a request from a client D. all of the mentioned Answer: C

13. IP assigned for a client by DHCP server isA. for a limited period B. for unlimited period C. not time dependent D. none of the mentionedAnswer: B

14. DHCP uses UDP port ____ for sending data to the server.A. 66 B. 67 C. 68 D. 69 Answer: A

15. Traffic intensity is given by, where L = number of bits in the packet a = average rate R = transmission rate A. La/R B. LR/a C. R/La D. None of the mentionedAnswer: B

16. DHCP client and servers on the same subnet communicate via

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 198

A. UDP broadcastB. UDP unicast C. TCP broadcast D. TCP unicast Answer: C

17. After obtaining the IP address, to prevent the IP conflict the client may useA. internet relay chat B. broader gateway protocol C. address resolution protocol D. none of the mentioned Answer: B

18. What is DHCP snooping?A. techniques applied to ensure the security of an existing DHCP infrastructure B. encryption of the DHCP server requests C. algorithm for DHCP D. none of the mentionedAnswer: C

19. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.A. MAC address B. IP address C. both (a) and (b) D. none of the mentioned Answer: C

20. Which one of the following is a cryptographic protocol used to secure HTTP connection?A. stream control transmission protocol (SCTP) B. transport layer security (TSL) C. explicit congestion notification (ECN) D. resource reservation protocol Answer: B

UNIT V1. SSH can be used in only

A. unix -like operating systemsB. windowsC. both (a) and (b) D. none of the mentioned Answer: A

2. FTP is built on _____ architecture A. P2P B. Both of the mentioned C. None of the mentioned ViewD. Client-server Answer: A

3. FTP uses _____ parallel TCP connections to transfer a fileA. 1 B. 2C. 3D. 4

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 199

Answer: C4. Identify the incorrect statement

A. FTP stands for File Transfer Protocol B. FTP uses two parallel TCP connections C. FTP sends its control information in-band D. FTP sends exactly one file over the data connectionAnswer: C

5. If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is A. 5B. 6C. 7D. 8Answer: D

6. FTP serverA. Mantains stateB. Is statelessC. Has single TCP connection for a file transfer D. None of the mentioned Answer: C

7. The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format A. 8 B. 7C. 3D. 5Answer: A

8. Find the FTP reply whose message is wrongly matched A. 331 – Username OK, password required B. 425 – Can’t open data connection C. 452 – Error writing file D. 452 – Can’t open data connectionAnswer: A

9. Mode of data transfer in FTP, where all the is left to TCPA. Stream mode B. Block mode C. Compressed mode D. None of the mentionedAnswer: B

10. The password is sent to the server using _____ command A. PASSWD B. PASS C. PASSWORD D. None of the mentionedAnswer: C

11. Which standard TCP port is assigned for contacting SSH servers? A. port 21 B. port 22C. port 23D. port 24

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 200

Answer: D12. Which one of the following authentication method is used by SSH?

A. public-key B. host based C. passwordD. of the mentionedAnswer: C

13. Which of the following is a form of DoSattack?A. Vulnerability attackB. Bandwidth flooding C. Connection floodingD. All of the mentioned Answer: B

14. Packet sniffers involve A. Active receiver B. Passive receiver C. Both of the mentioned D. None of the mentioned Answer: B

15. Electronic mail uses this Application layer protocol A. SMTP B. HTTP C. FTP D. SIPAnswer: C

16. This is a time-sensitive service A. File transfer B. File downloadC. E-mail D. Internet telephony Answer: B

17. The packet of information at the application layer is calledA. Packet B. Message C. Segment D. Frame Answer: B

18. This is one of the architecture paradigmsA. Peer to peer B. Client-server C. HTTP D. Both a and b Answer: C

19. Application layer offers _______ serviceA. End to end B. Process to process C. Both of the mentioned D. None of the mentioned Answer: B

20. Which field helps to check rearrangement of the fragments?

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 201

A. offsetB. flagC. TTL D. IdentifierAnswer: A

14.12 ASSIGNMENT QUESTION BANKPART – A (SHORT ANSWERQUESTIONS)

S. No Question

Blooms Taxonomy

Level

CourseOutcome

UNIT-I1 Define computer networks. Knowledge a2 Difference between point to point and broadcasting transmission Analysis b3 Define multicasting and broadcasting. Knowledge b4 Differentiate guided and unguided transmission media Analysis d

5 Write the three criteria necessary for an effective and efficient network? Synthesis c

6 What is the advantage of distributed processing? Comprehension c7 Give the factors that affect the performance of a network Comprehension b8 Define CRC (Cyclic Redundancy Check) Knowledge b9 Define Hamming distance Knowledge e10 Define PROTOCOL Knowledge e11 Define De facto and De jure standards Knowledge d12 Differentiate DLL and transport layer functions Analysis b13 Describe sliding window protocol. Knowledge a14 Discuss the use of standards? Knowledge a

UNIT II1 Distinguish Internet architecture and OSI architecture Comprehension a2 Define in detail the error detection and error corrections Knowledge e3 Define error control Knowledge e4 Distinguish FDDI and basic token ring Comprehension a5 List the merits of bridges Differentiate Knowledge e6 Define role of VCI Knowledge e7 List the the links operated on the physical media in detail Knowledge e8 Define CSMA Knowledge d9 Define some of the physical properties of Ethernet Knowledge e

UNIT III1 Define Masking Knowledge d2 Define the class field in IP address Knowledge c3 Define different kinds of Multicast Routing Knowledge e4 Distinguish between hostid and netid Comprehension e5 List the merits of sub netting Knowledge c6 Differentiate between physical and logical address Analysis e

UNIT IV1 Define tunneling Knowledge a2 Distinguish between IPV4 and IPV6 Comprehension c3 List the merits of ICMP Knowledge d4 Differentiate between ARP and RARP Analysis b5 List the merits of bridges Knowledge c6 Describe Link state routing algorithm Knowledge d7 Define quality of service Knowledge f8 Define congestion control algorithms Knowledge e

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 202

9 Define UDP Knowledge e10 Define TCP Knowledge d

UNIT – V1 Give the meaning of web browser Comprehension a2 Define three main divisions of the DNS Knowledge c3 List few characteristics of email system Knowledge d4 Define SMTP Knowledge e5 Define role does the DNS resolver play in the DNS system Knowledge a6 Give the meaning of WWW Comprehension f7 List few examples of cryptography methods Knowledge c8 Distinguish between HTTP and FTP Comprehension f9 List four properties of HTTP Knowledge f10 Define mailing list. Knowledge e

PART – B (LONG ANSWERQUESTIONS)

S. No Question Blooms Taxonomy

LevelCourse

OutcomeUNIT-I

1What is a computer network? Discuss various types of networks topologies in computer network. Also discuss various advantages and disadvantages

Comprehension b

2 List the applications of Computer Networks? Knowledge c

3 Explain the following:- a) LAN b) MAN c) WAN d) ARPANETComprehension,

Synthesis,Evaluation

a

4 Explain TCP/IP Model? Explain the functions and protocols and services of each layer? Compare it with OSI Model.

Comprehension,Synthesis,Evaluation

b

5 Explain IP addressing. How it is classified? How is subnet addressing is performed?

Comprehension,Synthesis,Evaluation

c

6 Explain the following: i. TCP ii. UDPComprehension,

Synthesis,Evaluation

f

7 Discuss star topology is commonly preferred? Knowledge c

8 State In what situations contention based MAC protocols are suitable? Knowledge a

9 Explain, Is there any relationship between transmission media and topology?

Comprehension,Synthesis, b

10 Explain vulnerable period. How it affects the performance in MAC protocols?

Comprehension,Synthesis,Evaluation

f

UNIT-II

1 Discuss how throughput is improved in slotted ALOHA over pure ALOHA? Knowledge a

2 Explain how performance is improved in CSMA/CD protocol compared to CSMA protocol?

Comprehension,Synthesis,Evaluation

b

3 Discuss the parameter ‘a’? How does it affect the performance of the CSMA protocol? Comprehension f

4 Define point to point protocol. Explain the frame format of PPP. Knowledge e5 Explain in detail CSMA Protocol in detail. Comprehension, a

6 Explain pure ALOHA and slotted ALOHA? Consider the delay of both at low load. Which one is less? Explain your answer

Comprehension,Synthesis,Evaluation

d

7 Explain in detail CSMA/CD Protocol in detail. How it detects Comprehension, f

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 203

collision. Synthesis,

8 What are bridges? Give the characteristics of them. Compare bridges with routers. Knowledge a

9 Define Spanning tree bridges and Source routing bridges. Knowledge b10 List the the limitations of bridges. Knowledge a

UNIT-III

1 Briefly explain the services provided by physical layer to network layer. Comprehension, a

2 Explain IPv6. Explain its advantages over IPv4. Also explain its frame format.

Comprehension, Synthesis, c

3 Discuss network layer design issues. Comprehension b

4 Compare FDMA, TDMA and CDMA in terms of their ability to handle groups of stations? Knowledge d

5 Discuss with connection oriented and connection-less network routing. Knowledge e

6 Discuss about hierarchichal routing. Comprehension a7 Explain basic IEEE 802.3 Ethernet MAC Data Frame. Comprehension, c

8 Briefly describe the reasons why a single organization may end up with multiple LANs and choose bridges. Comprehension d

9 Discuss the standard Ethernet cabling and cable topologies. Comprehension e10 Describe the addressing mechanism in 802.11( Wi-Fi). Comprehension f

UNIT-IV1 Describe shortest path algorithm with a suitable illustration Knowledge, b2 Describe the distance vector routing algorithm Knowledge, c

3 Describe the frame format, operation and ring maintenance feature of Comprehension, a

4 IEEE 802.5 MAC protocol. Evaluation d5 How a Token Ring LAN does operate? Discuss Knowledge e

6 Given the address 23.56.7.91 and the default class A mask, find the beginning address (network address).

Synthesis, Evaluation a

7 Describe the functions of MAC sub layer. Comprehension, b8 List out the advantages and drawbacks of ring topology. Synthesis, a9 List out the advantages and drawbacks of bus topology. Evaluation c

UNIT-V1 Write about TCP segment Header. Application, a2 Differentiate between ISO-OSI and TCP/IP reference model. Analysis c

3 Write two ways in which computer applications differ from network applications ?

Application, Synthesis c

4 List the features of SSH. Knowledge a5 Describe DNS Knowledge, b6 Explain DHCP Comprehension, c

7 Discuss the following terms with respect to ATM: VPI, UNI, synchronous, AAL, Cell , PVC. Comprehension f

8 Explain TELNET Comprehension, a9 Discuss functions of application layer Comprehension b10 Discuss electronic mail. Comprehension a

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S. No Question Blooms

Taxonomy LevelCourseOutcome

UNIT I

1 Draw a CRC encoder and decoder for CRC code with C (7, 4). Also explain how this CRC design works, with an example Knowledge f

2 If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted

ComprehensionApplication,

b

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 204

code word , received code word and error word as polynomials.

3Compare synchronous time division multiplexing with statistical time division multiplexing. Synthesis c

UNIT-II1 Explain remote bridges with a neat diagram. Comprehension a

2

A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in the units of 40 msec.i. What is the chance of success on the first attempt?ii. What is the probability of exactly k collisions and then a success? iii. What is the expected number of transmission attempts needed??

Knowledge b

UNIT- III1 Compare IPV4 and IPV6. Analysis , b2 State the problems due to congestion.. Knowledge c3 Discuss Link state routing algorithm. Comprehension d

UNIT-IV

1Illustrate simplex, half-duplex and full duplex modes. Explain with relevant examples for each. What mode is used when two people are communicating by a telephone line?

Analysis b

2 Using Differential Manchester encoding scheme, draw the time vs. amplitude graphs for the bit stream 0101101001. Understand a

UNIT-V

1 What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-

Application,Synthesis b

2 What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids. Knowledge a

3

What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.

Understand Comprehension e

4If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word? Write transmitted code word, received code word and error word as polynomials.

Comprehension f

14.13 TUTORIALS QUESTION BANKPART – A (SHORT ANSWERQUESTIONS)

S. No. QuestionBlooms

TaxonomyLevel

CourseOutcome

UNIT-I

1 Define the following standard organizations: ISO, ITU-T, IEEE, ANSI, EIA, TIA, IAB, ETF, and IRTF. Knowledge b

2 Give a technical comparison between OSI & TCP/IP reference model.

Comprehension a

3 Write the classification of Networks according to their size. Application,Synthesis a

5 Write the various design issues related to the layers in ISO-OSI model. Knowledge b

6 Write about TCP/IP Protocol suite Knowledge eUNIT – II

1 List features of pure ALOHA and slotted ALOHA? Comprehension b2 State properties of : a) Ethernet b) Wireless LAN c) Source routing Comprehension, c

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 205

bridge Synthesis,3 Give a short study on fast Ethernet cabling? Comprehension c

4Describe token. Discuss the protocol of token ring LAN in general. Discuss with example how priority is implemented in a token ring LAN?

Comprehension,Synthesis, a

5 Give the function of Connecting LAN’s. Backbone Networks, and Virtual LANs

Comprehension b

6 Give Explain the function and basic operation of the following Frame Relay

Application,Synthesis b

7 Discuss about the Logical Addressing, IPv4 Addresses Comprehension a

8 Explain about the Internet protocol, Internetworking Comprehension,Synthesis, e

9 Explain about the Forwarding and routing, delivery, forwarding, Unit cast Routing protocols, Multi cast routing protocols.

Comprehension d

10 Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6

Application,Synthesis e

11 Describe the QOS in Switched networks dUNIT – III

1 Describe Integrated Services, Differentiated services Comprehension c

2 Explain about the Internet protocol, Internetworking Comprehension,Synthesis, d

3 Explain about the Forwarding and routing, delivery, forwarding, Unicast Routing protocols,

Knowledge,Comprehension e

4 Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6

Comprehension,Synthesis, a

5 Describe the QOS in Switched networks Knowledge,Comprehension d

6 Describe Integrated Services, Differentiated services Knowledge,Comprehension e

UNIT – IV1 Explain Electronic mail, File Transfer Comprehension, d

2 Discuss the purpose of Electronic mail and file Transfer, Remote Logging

Evaluation Synthesis e

3 Write about Distributed of name space DNS in the Internet, Resolution, DNS messages

Application, Synthesis f

4 List function of a Telnet Knowledge Synthesis f

UNIT-V

1 Discuss transport service primitives Comprehension,Evaluation a

2 Describe the concepts of TCP, UDP, SCTP, Congestion control and Quality of service

Comprehension,Evaluation b

3 Compare NSAP & TSAP Analysis, d

4 Explain protocol scenarios for releasing a connection Comprehension, e5 Give functionality that is supported by user agen Comprehension f

PART – B (LONG ANSWERQUESTIONS)

S. No Question

Blooms Taxonomy

Level

CourseOutcome

UNIT-I

1 Define computer networks? Discuss various types of networks topologiesin computer network. Also discuss various advantages and Comprehension a

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 206

disadvantages2 List the applications of Computer Networks? Knowledge a

3 Explain the following:- a) LAN b) MAN c) WAN d) ARPANETComprehension,Synthesis,Evaluation

b

4 Explain TCP/IP Model? Explain the functions and protocols and services of each layer? Compare it with OSI Model.

Comprehension,Synthesis,Evaluation

b

5 Explain IP addressing. How it is classified? How is subnet addressing is performed?

Comprehension,Synthesis,Evaluation

d

6 Explain the following: i. TCP ii. UDPComprehension,Synthesis,Evaluation

f

7 Discuss star topology is commonly preferred? Knowledge a8 State In what situations contention based MAC protocols are suitable? Knowledge b

9 Explain; Is there any relationship between transmission media and topology?

Comprehension,Synthesis, a

10 Explain vulnerable period. How it affects the performance in MAC protocols?

Comprehension,Synthesis,Evaluation

b

UNIT-II

1 Discuss how throughput is improved in slotted ALOHA over pureALOHA? Knowledge c

2 Explain how performance is improved in CSMA/CD protocol compared to CSMA protocol?

Comprehension,Synthesis,Evaluation

c

3 Discuss the parameter ‘a’? How does it affect the performance of theCSMA protocol? Comprehension d

4 Define point to point protocol. Explain the frame format of PPP. Knowledge d5 Explain in detail CSMA Protocol in detail. Comprehension, d

6 Explain pure ALOHA and slotted ALOHA? Consider the delay of both at low load. Which one is less? Explain your answer

Comprehension,Synthesis,Evaluation

f

7 Explain in detail CSMA/CD Protocol in detail. How it detects collision. Comprehension,Synthesis, f

8 What are bridges? Give the characteristics of them. Compare bridges with routers. Knowledge b

9 Define Spanning tree bridges and Source routing bridges. Knowledge c10 List the the limitations of bridges. Knowledge b

UNIT-III

1 Briefly explain the services provided by physical layer to network layer. Comprehension, d

2 Explain IPv6. Explain its advantages over IPv4. Also explain its frame format.

Comprehension, Synthesis, c

3 Discuss network layer design issues. Comprehension e

4 Compare FDMA, TDMA and CDMA in terms of their ability to handle groups of stations? Knowledge b

5 Discuss with connection oriented and connection-less network routing. Knowledge c

6 Discuss about hierarchichal routing. Comprehension c7 Explain basic IEEE 802.3 Ethernet MAC Data Frame. Comprehension, b

8 Briefly describe the reasons why a single organization may end up with multiple LANs and choose bridges Comprehension b

9 Discuss the standard Ethernet cabling and cable topologies. Comprehension b10 Describe the addressing mechanism in 802.11( Wi-Fi). Comprehension c

UNIT-IV1 Describe shortest path algorithm with a suitable illustration Knowledge, d

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 207

2 Describe the distance vector routing algorithm Knowledge, d3 Describe the frame format, operation and ring maintenance feature of Comprehension, b4 IEEE 802.5 MAC protocol. Evaluation c5 How a Token Ring LAN does operate? Discuss Knowledge c

6 Given the address 23.56.7.91 and the default class A mask, find the beginning address (network address).

Synthesis, Evaluation e

7 Describe the functions of MAC sub layer. Comprehension, c8 List out the advantages and drawbacks of ring topology. Synthesis, c9 List out the advantages and drawbacks of bus topology. Evaluation d

UNIT-V1 Write about TCP segment Header. Application, e2 Differentiate between ISO-OSI and TCP/IP reference model. Analysis f

3 Write two ways in which computer applications differ from network applications ? Synthesis b

4 List the features of SSH. Knowledge d5 Describe DNS Knowledge, e6 Explain DHCP Comprehension, f

7 Discuss the following terms with respect to ATM: VPI, UNI, synchronous, AAL, Cell , PVC. Comprehension e

8 Explain TELNET Comprehension, f9 Discuss functions of application layer Comprehension f10 Discuss electronic mail. Comprehension e

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

S. No Question

Blooms Taxonomy

Level

CourseOutcome

UNIT-I

1 Draw a CRC encoder and decoder for CRC code with C (7, 4). Also explain how this CRC design works, with an example. Knowledge b

2If the transmitted code word is 10011000 and the received code word is11001001. What is the error word? Write transmitted code word, received code word and error word as polynomials.

Comprehension c

3 Compare synchronous time division multiplexing with statistical time division multiplexing.

Application,Synthesis d

UNIT-II1 Explain remote bridges with a neat diagram. Comprehension b

2

A large population of ALOHA users manages to generate 50 requests /sec , including both originals and retransmissions. Time is slotted in the units of40 msec.i. What is the chance of success on the first attempt?ii. What is the probability of exactly k collisions and then a success?iii. What is the expected number of transmission attempts needed??

Knowledge c

UNIT-III

1 Compare IPV4 and IPV6. Analysis , Evaluation e

2 State the problems due to congestion.. Knowledge d3 Discuss Link state routing algorithm. Comprehension d

UNIT-IV1 Discuss distance vector algorithm. Comprehension e

2Illustrate simplex, half-duplex and full duplex modes. Explain with relevant examples for each. What mode is used when two people are communicating by a telephone line?

Analysis b

3 Using Differential Manchester encoding scheme, draw the time vs.amplitude graphs for the bit stream 0101101001. Understand c

UNIT-V

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 208

1 What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.

Application,Synthesis f

2 What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids. Knowledge f

3

What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.

Understand c

4If the transmitted code word is 10011000 and the received code word is11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.

Comprehension c

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 209

15. LINUX PROGRAMMING LAB (A10527)

15.1 SYLLABUS

Course Overview: In this course basics of shell programming are dealt. Shell programs to understand the operating environment of Linux are practiced. An exposure to system calls types of process and inter process communication issues are dealt with practical exercises.

Course Objectives: I. To familiarize basic concepts of shell programming

II. To demonstrate use of system calls III. To demonstrate Inter process communication

Course Outcomes: At the end of the course students will be able to: a. Use shell script to create files and handle text documents b. Create child processes, background process and zombies

List of Programs:1. Study and Practice on various commands like man, passwd, tty, script, clear, date, cal, cp,

mv, ln, rm, unlink, mkdir, rmdir, du, df, mount, umount, find, unmask, ulimit, ps, who, w. 2. Study and Practice on various commands like cat, tail, head , sort, nl, uniq, grep,

egrep,fgrep, cut, paste, join, tee, pg, comm, cmp, diff, tr, awk, tar, cpio. 3. a)Write a Shell Program to print all .txt files and .c files.

b)Write a Shell program to move a set of files to a specified directory. c)Write a Shell program to display all the users who are currently logged in after a specified time. d) Write a Shell Program to wish the user based on the login time.

4. a) Simulate cat command. b) Simulate cp command. 5. a) Simulate head command. b) Simulate tail command. 6. a) Simulate mv command. b) Simulate nl command. 7. Write a program to handle the signals like SIGINT, SIGQUIT, SIGFPE. 8. Implement the following IPC forms

a. FIFO b. PIPE

9. Implement message queue form of IPC. 10. Implement shared memory form of IPC. 11. Write a Socket program to print system date and time (Using TCP/IP).

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 210

15.2 LAB SESSION PLANNER

S. NO WEEK NO EXPERIMENT NAME DATE OF PLANNED

DATE OF CONDUCTED

1 WEEK 1

Study and Practice on various commands like man, passwd, tty, script, clear, date, cal, cp, mv, ln, rm, unlink, mkdir, rmdir, du, df, mount, umount, find, unmask, ulimit, ps, who, w.

2 WEEK 2Study and Practice on various commands like cat, tail, head , sort, nl, uniq, grep, egrep,fgrep, cut, paste, join, tee, pg, comm, cmp, diff, tr, awk, tar, cpio.

3 WEEK 3

a. Write a Shell Program to print all .txt files and .c files.

b. Write a Shell program to move a set of files to a specified directory.

c. Write a Shell program to display all the users who are currently logged in after a specified time.

d. Write a Shell Program to wish the user based on the login time.

4 WEEK 4 a) Simulate cat command. b) Simulate cp command

5 WEEK 5 a) Simulate head command. b) Simulate tail command.

6 WEEK 6 a) Simulate mv command. b) Simulate nl command.

7 WEEK 7 Write a program to handle the signals like SIGINT, SIGQUIT, SIGFPE

8 WEEK 8 Implement the following IPC formsa) FIFO b) PIPE

9 WEEK 9 Implement message queue form of IPC.10 WEEK 10 Implement shared memory form of IPC.

11 WEEK 11 Write a Socket program to print system date and time (Using TCP/IP).

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 211

16.0 WEB TECHNOLOGIES LAB (A10526)

16.1 SYLLABUS

Course Overview: This course provides a practical exposure to web application development. As part of this User interface development and validations are carried out using Java Script or PHP. Server side programming is carried out using Servlet and JSP technology. Applications are deployed using apache tomcat web server.

Course Objectives: I. To impart and give hands on exposure to PHP

II. To demonstrate web application development procedures III. To impart Servlet technology for writing business logic IV. To facilitate students to connect to databases using JDBC V. To familiarize various concepts of application development using JSP

Course Outcomes: Upon completion of this course, students will be able to: a. Create web pages using PHP b. Identify the difference between the HTML PHP and XML documents. c. Analyze the difference between and PHP and XML. d. Understand the concept of JAVA SCRIPTS. e. Identify the difference between the JSP and Servlet. f. Design web application using MVC architecture

List of Programs:1. Install the following on the local machine Apache Web Server (if not installed) Tomcat

Application Server locally Install MySQL (if not installed) Install PHP and configure it to work with Apache web server and MySQL (if not already configured)

2. Write a program using PHPa. To find factorial of a given number (read input from form)b. To find Fibonacci seriesc. To find roots of quadratic equations

3. Write an HTML page including any required PHP that takes a number from one text field in the range of 0 to 999 and shows it in range of 0 to 999 and shows it in another text field in words. If the number is out of range, it should show ―out of range‖ and if it is not a number, it should show ―not a number‖ message in the result box.

4. Write an HTML page that has one input, which can take multi-line text and a submit button. Once the user clicks the submit button, it should show the number of characters, words and lines in the text entered using an alert message. Words are separated with while space and lines are separated with new line character.s

5. Write an HTML page using Java Script that contains a selection box with a list of 5 countries. When the user selects a country, its capital should be printed next to the list.

6. A simple calculator web application that takes two numbers and an operator (+, -, /, * and %) from an HTML page and returns the result page with the operation performed on the operands.

7. a. Write a java program to read XML file and store the data in java objectsb. Demonstrate XML validation using DOM and SAX parser8. Write a simple servlet to print welcome message in the browser9. Write a servlet to read form data and display in the browser

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 212

10. Write a servlet to read employee data from form and insert the same into database11. Write a servlet to read employee number from the user and retrieve employee data from

Database 12. Using JSP read data from form and insert into database13. Using JSP retrieve data from database and print in the browser14. Write a Servlet/JSP to demonstrate data read from multiple forms with the help of

session Object

TEXT BOOKS: 1. Web Technologies, Uttam K Roy, Oxford University Press 2. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill

REFERENCE BOOKS: 1. Web Programming, building internet applications, Chris Bates 2nd edition, Wiley

Dremtech 2. Java Server Pages – Hans Bergsten, SPD O‘Reilly 3. Java Script, D. Flanagan, O‘Reilly, SPD. 4. Beginning Web Programming-Jon Duckett WROX. 5. Programming World Wide Web, R.W. Sebesta. Fourth Edition, Pearson. 6. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson.

16.2 LAB EXPERIMENT SCHEDULE

S NO WEEK NO EXPERIMENT NAME DATE OF PLANNED

DATE OF CONDUCTED

1 1

Install the following on the local machine Apache Web Server (if not installed) Tomcat Application Server locally Install MySQL (if not installed) Install PHP and configure it to work with Apache web server and MySQL (if not already configured)

2 2

Write a program using PHPa. To find factorial of a given number

(read input from form)b. To find Fibonacci seriesc. To find roots of quadratic equations

3 3

Write an HTML page including any required PHP that takes a number from one text field in the range of 0 to 999 and shows it in range of 0 to 999 and shows it in another text field in words. If the number is out of range, it should show ―out of range‖ and if it is not a number, it should show ―not a number‖ message in the result box.

4 4

Write an HTML page that has one input, which can take multi-line text and a submit button. Once the user clicks the submit button, it should show the number of characters, words and lines in the text entered using an alert message. Words are separated with while space and lines are separated with new line

Department of CSE

MLR Institute of Technology, Dundigal, Hyd-500043 Page 213

character.

5 5

Write an HTML page using Java Script that contains a selection box with a list of 5 countries. When the user selects a country, its capital should be printed next to the list.

6 6

A simple calculator web application that takes two numbers and an operator (+, -, /, * and %) from an HTML page and returns the result page with the operation performed on the operands.

7 7

a. Write a java program to read XML file and store the data in java objects b. Demonstrate XML validation using DOM and SAX parser

8 8

Write a simple servlet to print welcome message in the browser 9. Write a servlet to read form data and display in the browser 10. Write a servlet to read employee data from form and insert the same into database

9 9Write a servlet to read form data and display in the browser

10 10Write a servlet to read employee data from form and insert the same into database

11 11Write a servlet to read employee number from the user and retrieve employee data from Database

12 12 Using JSP read data from form and insert into database

13 13 Using JSP retrieve data from database and print in the browser

14 14Write a Servlet/JSP to demonstrate data read from multiple forms with the help of session Object