STUDENT HANDBOOK - MLRIT
-
Upload
khangminh22 -
Category
Documents
-
view
1 -
download
0
Transcript of STUDENT HANDBOOK - MLRIT
III-B.TechSTUDENT HANDBOOK
A.Y.2017-18/I SEM
Department of CSE
MARRI LAXMAN REDDY INSTITUTIONS
MLR Institute of TechnologyDundigal (V), Quthbullapur (M), R.R Dist,
Hyderabad – 500043, A.Pwww.mlrinstitutions.ac.in
VISION STATEMENT
VISION STATEMENT OF MLRIT
To create and nurture competent Engineers and managers who would be enterprise leaders in all parts of the world with aims of reaching the skies and touching the stars and yet feet firmly planted on the ground – good human beings steeped in ethical and moral values.
MISSION STATEMENT
MISSION STATEMENT OF MLRIT
MLR Institute of Technology is committed to providing a positive, professional and conducive learning environment where all students are inspired to achieve their potential and strive for excellence in a global society as dignified professionals with the cooperation of all stakeholders.
GOALSOF MLRIT
GOALS OF MLRIT
Goals of Engineering education at undergraduate / graduate level:
Equip students with industry – accepted career and life skills
To create a knowledge warehouse for students
To disseminate information on skills and competencies that are in use and in demand by the industry
To create learning environment where the campus culture acts as a catalyst to student fraternity to understand their core competencies, enhance their competencies and improve their career prospects.
To provide base for lifelong learning and professional development in support of evolving career objectives, which include being informed, effective, and responsible participants within the engineering profession and in society.
To prepare students for graduate study in Engineering and Technology.
To prepare graduates to engineering practice by learining from professional engineering assignments.
Our Pioneers…
MARRI LAXMAN REDDY – CHAIRMANSri Marri Laxman Reddy, the founder Chairman of MLR Institutions has been in the field of education for the last 22 years with the aim of spreading quality education among children at the school & college levels. MLR Institute of Technology is the culmination of his dreams. He is also founder chairman of Marri Laxman Reddy Institute of Technology & Management, MLR Institute of Pharmacy, St. Martin’s Engineering College and St. Martins Schools at Balanagar, Chintal and Malkajgiri. He is a veteran athlete of international repute.
MARRI RAJASEKHAR REDDY – SECRETARYSri Marri Rajashekar Reddy, the Secretary of MLR Institutions has the distinction of establishing the Institute of Aeronautical Engineering, MLR Institute of Technology, MLR Institute of Pharmacy, Vardhaman Engineering College, Vidyanjali Grammar School at L.B.Nagar and Institute of Aircraft Maintenance Engineering, approved by DGCA. He is also Treasurer of Indo-US Collaboration for Engineering Education of A.P. Chapter.Mr. M. Rajasekhar Reddy, a person with remarkable abilities and great acumen and a dynamic leader. He is known to be the dynamic mentor of
MLR Institute of Technology who is always on the sprit to take the institute to newer levels in every aspect of an \"Ideal Institution\" and strives hard to make every dream a reality.He likes his father Mr. M. Laxman Reddy, who has a credit of establishing Institute of Aeronautical Engineering adding a new flavor to St. Martins group of Institutions and Vidyanjali Grammar School. His ability to turn adversities into opportunities is unquestionable. The Secretary has a vision of establishing MLR Institute of Technology as a brand. He strives hard to initiate various industry oriented programs for the benefit of the students and he envisions his students to be present at the top most position in the industry
Dr. P. BHASKARA REDDY – DIRECTOR Dr. P. Bhaskara Reddy, B.E.(ECE), M.Tech., Ph.D., F.I.S.E.E., MCSI, MISTE, MIETE,MEMCE. the Director of MLR Institute of Technology, is a young and dynamic Professor of ECE, has 26 years of Industry,Teaching, Research and Administrative experience in Reputed Engineering Colleges.In 24 years of experience served various positions from Asst.Professor to Principal. Research & Guidance: Published 1 Book (International Edition) "Information Technology in Technical Education - Economic Development by "LAMBERT Academic Publishing" Publishied 9 Laboratry Manuals, 84 Research papers at National and International Level on Education, Electronics Communication, I.T, Computer Networks, E-Commerce etc. Guided 5 Reserach Scholars for their Doctorates, about 50 M.Tech., M.C.A and B.Tech projects. Symposiums Conducted: 11 National Level Technical Symposiums on various topics in Electronics & Communications, Computers etc.Awards Received: 1) Bharath Jyothi Award in 2003 from IIFS, New Delhi, 2) Rastraprathiba Award in 2004 from ICSEP, New Delhi, 3) Knowledge Award from Alumni of SVHCE for the year 2001.
TABLE OF CONTENTS
S.No. Content Page No.
1
1. General Information About the college 1.0.Beautiful campus 1.1.Autonomous status 1.2.Performance 1.3.Faculty 1.4.Infrastructure 1.5.Laboratories 1.6.CAT Centre 1.7.English Language Laboratory
2
1.8.R&D Cell 1.9.Library 1.10.National Programme on Technology Enhanced Learning (NPTEL) 1.11.Co-Curricular Activities 1.12.Professional bodies 1.13.Extra curricular activities
3 1.14.In House projects 1.15.MOUs
4 1.16.Student achievements 1.17.Alumni Outreach
5 1.18.Contact information
2. Placement and Higher Studies2.1.Industry Grade skills required for Employment2.2.Important criteria for employment 2.3.Higher Studies2.4.Various Scholarships available in India
6
2.5.Various International Scholarships available in India
7 3. Student Career Oriented Professional Certification Courses3.1 Help Desk4. Performance Monitoring and Guidance4.1. Student Feedback4.2.Class Teacher4.3.Class Representatives and their roles4.4. Performance Counseling8
4.5. Remedial Classes / Tutorial / Revisions4.6. Backlog Management4.7. Correspondence with Parents
5. Rules & Regulations for students5.1. Administrative 5.2. Academic5.3. Dress Code5.4. Discipline & Punctuality
5.5. Lab Classes5.6. Fee5.7. Transport5.8. Library Rules5.9. General
9
5.10. Ragging
10
6. Academic Regulations 2013 for B.Tech. Regular6.1. Award of B.Tech. Degree6.2. 6.3. Credits6.4. Distribution and Weightage of marks
6.5. Attendance Requirements11
6.6. Minimum Academic Requirements
12 7. Course Calendar for the Year 1-2
8. B.Tech. III Year Course Structure (R13) 3
13
9. PRINCIPLES OF PROGRAMMING LANGUAGES - A105649.0 COURSE DESCRIPTION 9.1. COURSE OVERVIEW9.2. PREREQUISITE(S):9.3. CMARKS DISTRIBUTION9.4. EVALUATION SCHEME COURSE OBJECTIVES9.5. COURSE OUTCOMES 9.6 HOW PROGRAM OUTCOMES ARE ASSESSED:9.7. SYLLABUS:9.8 COURSE PLAN:9.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES: 9.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF
PROGRAM OUTCOMES:9.11 OBJECTIVE QUESTIONS:9.12 TUTORIAL QUESTION BANK 9. 13 ASSIGNMENT QUESTIONS:
4-35
14
10. LINUX PROGRAMMING - A1052010.0 COURSE DESCRIPTION 10.1. COURSE OVERVIEW10.2. PREREQUISITE(S):10.3. MARKS DISTRIBUTION10.4. EVALUATION SCHEME COURSE OBJECTIVES10.5. COURSE OUTCOMES 10.6 HOW PROGRAM OUTCOMES ARE ASSESSED:10.7. SYLLABUS:10.8 COURSE PLAN:10.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES: 10.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES:10.11 OBJECTIVE QUESTIONS:10.12 TUTORIAL QUESTION BANK 10. 13 ASSIGNMENT QUESTIONS:
36-71
15 11. WEB TECHNOLOGIES - A1052111.0 COURSE DESCRIPTION 11.1. COURSE OVERVIEW11.2. PREREQUISITE(S):11.3. MARKS DISTRIBUTION11.4. EVALUATION SCHEME COURSE OBJECTIVES11.5. COURSE OUTCOMES 11.6 HOW PROGRAM OUTCOMES ARE ASSESSED:11.7. SYLLABUS:11.8 COURSE PLAN:11.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES: 11.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES:11.11 OBJECTIVE QUESTIONS:11.12 TUTORIAL QUESTION BANK 11. 13 ASSIGNMENT QUESTIONS:
72-102
16 12. COMPILER DESIGN - A1052212.0 COURSE DESCRIPTION 12.1. COURSE OVERVIEW12.2. PREREQUISITE(S):12.3. MARKS DISTRIBUTION12.4. EVALUATION SCHEME COURSE OBJECTIVES12.5. COURSE OUTCOMES 12.6 HOW PROGRAM OUTCOMES ARE ASSESSED:12.7. SYLLABUS:12.8 COURSE PLAN:12.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES: 12.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES:12.11 OBJECTIVE QUESTIONS:12.12 TUTORIAL QUESTION BANK 12. 13 ASSIGNMENT QUESTIONS:
103-146
17 13. E-COMMERCE - A1120613.0 COURSE DESCRIPTION 13.1. COURSE OVERVIEW13.2. PREREQUISITE(S):13.3. MARKS DISTRIBUTION13.4. EVALUATION SCHEME COURSE OBJECTIVES13.5. COURSE OUTCOMES 13.6 HOW PROGRAM OUTCOMES ARE ASSESSED:13.7. SYLLABUS:13.8 COURSE PLAN:13.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES: 13.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES:13.11 OBJECTIVE QUESTIONS:13.12 TUTORIAL QUESTION BANK 13. 13 ASSIGNMENT QUESTIONS:
147-179
18 14. COMPUTER NETWORKS - A1051914.0 COURSE DESCRIPTION 14.1. COURSE OVERVIEW14.2. PREREQUISITE(S):14.3. MARKS DISTRIBUTION14.4. EVALUATION SCHEME COURSE OBJECTIVES14.5. COURSE OUTCOMES 14.6 HOW PROGRAM OUTCOMES ARE ASSESSED:14.7. SYLLABUS:14.8 COURSE PLAN:14.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES: 14.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES:14.11 OBJECTIVE QUESTIONS:14.12 TUTORIAL QUESTION BANK 14. 13 ASSIGNMENT QUESTIONS:
180-208
15. LINUX PROGRAMMING LAB – A1052715.1.Syllabus
19
15.2.Lab Schedule209-210
16. WEB TECHNOLOGIES LAB - A1052616.1.Syllabus
20
16.2.Lab Schedule211-213
MLR Institute of TechnologyDundigal, Quthbullapur Mandal, R.R. Dist.- 500 043.
Ph: 08418 – 204066, 204088, 9866755166
1.GENERAL INFORMATION
ABOUT THE COLLEGE
1.0 BEAUTIFUL CAMPUS:Set in Sylvan surroundings away from the hustle & bustle of city life yet only 4 km away from Mahindra Satyam Technology Park on Balanagar – Narsapur state highway, the Institute is extremely conducive to academic, co-curricular and extra-curricular activities. It has large and well ventilated buildings with modern equipment in place and “State of the art”, sports facilities.
HIGHLIGHTS:
1.1 AUTONOMOUS STATUSMLR Institute of Technology is now an Autonomous Institution!!Under the UGC Autonomous College Scheme for a period of Six Years
1.2 PERFORMANCEThe college has been AA rated under colleges in AP by Careers360 magazine. Also, the college has been ranked at 126 by the week magazine in the Best colleges Survey-2013.
1.3 FACULTY: The College is proud to have the best faculty, a blend of experienced and academics with eminent academicians team IIT’s, NIT’s and other reputed organizations teaching at the Institute that makes MLRIT as one of the best Institute pursue B.Tech, M.Tech,MCA and MBA as one of the under JNTU Hyderabad. The faculty is constantly encouraged to upgrade their qualifications and a number of them have enrolled for Ph.D. Most of the faculty members have been empowered with High Impact teaching under Wipro Mission 10X program.
1.4 INFRASTRUCTURES: Spacious campus and natural surroundings with plenty of greenery College Transport facilities from twin cities for students and staff from all corners of the
city Air Conditioned auditorium for organizing events, workshops and seminars Good Canteen facility HDFC Bank ATM in the campus Fully equipped Laboratories with the state-of-art equipments
1.5 LABORATORIES: The Institute has State of the art laboratories with 1000 plus Branded Systems equipped with latest hardware and software with online testing facility catering to the needs of CSE, IT. The Institute also has well equipped Electronic Labs, Aeronautical Engineering Labs and Workshops for ECE and Aeronautical Engineering Students. The college has recently established Microsoft, IBM for CSE/IT cadence lab for VLSI design and CATIA Aeronautical Design Lab.
1.6 CAT Centre: The Institute is an Authorized IIM Cat Centre, which will conduct tests all through the year as per the IIM schedule.
1.7 ENGLISH LANGUAGE LABORATORY: The Institute has established Ultramodern Computerized English language Laboratory with 60 plus Computer Systems loaded with latest Software to enhance the Softskills of Students to make the Students Industry ready.The Library also have the previous University Exam Question papers and previous project reports from all the departments. The library contains recorded lectures of all IIT professors from NPTEL.
1.8 R&D Cell: The Institute has an R&D Cell under the Chairmanship of ?. The R&D cell undertakes externally funded R&D projects from agencies like AICTE, DST, UGC and other similar state, private and society / trust bodies. It also undertakes research publications and interactions of faculty members with outside world.
1.9 LIBRARY: The Institute Library has over 29000 books and 244 National and International journals and 15 Magazines that are required to all branches of Engineering. The Institute has the unique distinction of becoming Member of DELNET, Infotrac engineering online journals that connects more than 700 libraries in Asia Pacific Region. The Library has 35 Computers with 10 MB PS, Internet Facility that makes our knowledge Savvy Students to be technically competent on par with Industry professionals. NPTEL Videos and e-books, MIT courses also available.
1.10 National Programme on Technology Enhanced Learning (NPTEL)The main objective of NPTEL program is to enhance the quality of engineering education in the country by developing curriculum based video and web courses. This is being carried out by seven IITs and IISc Bangalore as a collaborative project. In the first phase of the project, supplementary content for 129 web courses in engineering / science and humanities have been developed. Each course contains materials that can be covered in depth in 60 or more lecture hours. In addition, 110 courses have been developed in video format, with each course comprising of approximately 60 or more one-hour lectures. In the next phase other premier institutions are also likely to participate in content creation.
1.11 Co-Curricular Activities: The Institution organizes Local Industrial Visits to Organizations like DOORDARSHAN, BSNL, and to Student Conferences like HYSEA,Student Conference at INFOSYS, Gachibowli Campus, and Government Sponsored Summits like INDO SOFT IT Summit at Hitex City Convention Centre to Interface with the Industry for Career Planning and to make them Industry Ready. The Institute focuses on Techno Management Events like Technonium and Zavtra to enhance the Technical Skills and Soft Skills to make them Employable.
1.12 Professional Bodies: MLR Institute of Technology has the unique distinction of becoming Institutional Member in Professional bodies such as Confederation of Indian Industry (CII), Aeronautical Society of India (AeSI), Computer Society of India (CSI), Institute of Electronics and Telecommunication Engineering (IETE), Indian Society of Technical Education (ISTE), ELIAP and Hyderabad Management Association.(HMA)
1.13 Extra-Curricular Activities: MLRIT has State of the art facilities like Olympic Style Basketball Court, Volleyball Court,
Gymnasium, Indoor Stadium, Cricket Stadium with Lush Green Outfields and 400 meter excellent track for Athletic meet. MLR Institute of Technology has been regularly conducting JNTU Zonal Games and Annual Open Invitational Volleyball, Football, Cricket Tournaments.
The Institute also organizes various Cultural Events like Traditional Day for freshers, “ZAVTRA” A National Level Technical Fest, TRISHNA - The Annual Day Celebrations, ECSTASY – A Cultural Nite by Vishal & Shekhar, Indian Idol Sri Ram, Farewell Party for final year students, Alumni Meet for Ex. Students and Graduation Day for graduated students every year to imbibe a spirit of Oneness.
NSS Activities:A Sense of social responsibility is inculcated in Young Minds by organizing Plantation Programmes, Health Awareness Camps, Blood Donation Camps, Flood Relief Camps, Distribution of Books to School Children under Digital Literacy Programme of Microsoft by MLRIT NSS Volunteers.
1.14 In House Projects:The students are taking part in International Project competitions hosted by major MNCs, like IBM, Microsoft and Infosys. The Great Mind Challenge hosted by IBM, Microsoft Imagine Cup and project work as part of foundation programme conducted under the aegis of Infosys are some of the important projects presently being undertaken by the students of MLRIT. Further, the students are encouraged to do In House Projects under the supervision of expect faculty members.In addition,students are encouraged to give innovative ideas and do projects under the aegis of Microsoft academic innovative alliance.
1.15 MOUs: BOEING Tech Mahindra Infotech Enterprises Ltd. IBM Oracle Sun Microsystems Infosys CA Labs Tata Advanced Systems Microsoft Globarena Wipro IUCEE
For giving special training programmes to engineering students and Faculty members of the institute
1.16 Student Achievements: Our College students got 2nd Place out of 2100 colleges in E-Plus Challenge 14 conducted
by The Hindu in Hyderabad in March 2014. MLR Institute of Technology students have been securing JNTUH ranks regularly right
from 1st batch itself, reflecting the core competencies of the faculty and dedicated efforts of the students.
Mr Venkata Rama Varma student of 3rd year Aero has participated and stood 3rd in National Aero-Modeling competition conducted by Boeing held during Techfest 2014 at IIT Madras.
Mr. Venkata Rama Varma student of 3rd year Aero has participated and stood 3rd in Avion-E and Hower Mania held during Techfest 2013 at NIT Warangal.
Mr Venkata Rama Varma and NAM Sai Teja students of 3rd year Aero have been selected for Boeing National Aeromodeling Competition which will be held at IIT Delhi next Month.
Mr. Venkata Rama Varma student of 3rd year Aero has participated and stood 1st in Aero-Modeling Competition held during Techfest 2013 at Christ University
Mr Venkata Rama Varma student of 3rd year Aero has participated and stood 3rd in Blitz Krieg Design Challenge held during Techfest 2013 at IIT BOMBAY.
Mr.Varma and team III-Aeronautical students got 2nd Prize in ICRAMAV-2013 organized by JNTUH for their MAV (Micro Aerial Vehicle).
Mr.Eshwer Reddy student of 4th year Aero has participated and stood 2nd Prize in Working Models competition organized by Rotary Club.
Three of 2nd Aero students got Rs. 5000/- cash prize in Design Competition organized Engineers CAD Centre Hyderabad
1.17 Alumni Outreach The Institute has Alumni Association under the name and Style of MLR Alumni Association
and conducted the First Alumni Meet on 14th Feb 2009 with the first batch 0f 2008 passed out MBA students attending the meet.
The Association has honoured the 2009 batch B.Tech, MCA along with MBA students by conducting the Second Alumni Meet at hotel Blue Fox on 13th March 2010 where more than 200 students participated in the Meet.
The Association conducted 3rd Alumni meet for 2010 batch B.Tech, MCA & MBA students on 16th April 2011 at our college Auditorium.
The Association conducted 4th Alumni meet for 2011 batch B.Tech, MCA & MBA students on 14th July 2012 at our college Auditorium.
The Association conducted 5th Alumni meet for 2012 batch B.Tech & MBA students on 11th May 2013 at our college Auditorium.
The Association conducted 6th Alumni meet for 2013 batch B.Tech, M.Tech & MBA students on 14th Feb 2015 at our college Auditorium.
1.18 Contact InformationPrincipal - Dr. P. Bhaskara Reddy - 9866678599
Dean (CS) - Prof. K. L. Chugh - 9866666601
Department Head CSE - Dr.N.Chandra Sekhar Reddy - 9618880606
Department Head IT - Dr.KVSN Rama Rao - 9848292046
Department Head ECE - Mr. S.V.S Prasad - 9440840483
Department Head AERO - Dr.M.Satyanarayana Gupta - 9848339384
Department Head MECH - Dr.S.Madhu - 9160404635
Department Head MBA - Mrs. Suneetha - 9160404639
Department Head H&S - Dr. V. Radhika Devi - 9848472797
Sr.Administrative Officer - Mr.Prabhakar Reddy - 9866675818
2. PLACEMENT & HIGHER STUDIES
MLR Institute of Technology has a unique distinction of placing their First Batch of B.Tech Students in their prefinal year of Study and MBA Students in Multi National Companies. The Institute has so far interacted with more than 69 Companies and 233 Selections from B.Tech/MCA and MBA Programmes have taken Place.
In this direction Apart from the Placements the Institute has arranged Summer Internship Programmes with Companies like Computer Amociates, Mind Tree M/s Infotech Enterprises Ltd, Mahindra Finance, Max New York Life Insurance, Nokia Ltd , Mahindra Finance, Bajaj Capital Ltd, Reliance Money and Tata AIG for Engineering and MBA Students to develop Mentor Relationships and to get to know about the Work Culture and gain Competencies to make them Industry Ready during their Study period.
The Institute has arranged Campus Recruitment drives Infosy, Mind Tree Ltd, Oracle, ADP, Mahindra Satyam, Infotech Enterprises Ltd, Keane India Ltd (NTT), IBM Technologies Pvt Ltd, Tata Advanced Systems, IBM, Syntel Inc, Tech-Synergy Pvt Ltd, Adithya Software Solutions, HDFC Bank Ltd, Medha Servo drives. NR Radio & Switches Pvt.Ltd. OsiTechnologies Ltd, Genpact, Reliance Money, Nagarjuna Caments Ltd & Oasis Software Informatics, Shoppers Shop, Trident Micro Systems India, SnapDeal.com, India Mart Ltd, Power Tech, Suchir India, Quartz Infra and Engineering Pvt Ltd, Gobrah Technologies Pvt Ltd, Elbit Diagnostics, Eprism Solutions, Geo Meme Strategic Consulting, India Info Line, Water Shed project of Govt of AP, Ocean Ship Maritime etc.
The CSE students visited Infosys Infosys for the SPARK Programme which is an orientation programme on Information Technology Space.
2.1 Industry Grade Skills required for EmploymentBehavioral and Communication Skills are recognized as important elements in professional development of an Engineer including English for specific purposes. Employers give considerable value to these diverse set of skills at the time of interviews.
In addition to course curriculum, every student will gain the following skills during the study period: Analytical and Problem solving skills Subject – specific knowledge Research and improved decision making abilities Oral communication skills Managerial skills Understanding of other cultures Confidence and competence to work in International environment
As students are the future leaders, the Responsibility, Accountability and exhibiting the leadership skills should start from the first year of engineering. Every student is advised to read / practice from the following books; Verbal and Nonverbal by RS Agarwal Baron GRE Wren and Martin English Grammer Book
2.2 Important criteria of EmploymentIn addition to the industry grade skills required for employment, the most important criteria for employment is that the student should get a minimum of 60% in academics with no backlogs to make them eligible for campus recruitments. In the recent past, many companies stipulated a cut
of 68% for attending the interview / writing the test. Every student should Endeavour to achieve a minimum of 68% with no backlogs to make them suitable for picking up by good companies.
Job Portals:1. www.freshersworld.com2. www.monster.com3. www.naukri.com
2.3 Higher StudiesM.TechThe Graduate Aptitude Test in Engineering (GATE) is an all-India examination administered and conducted in eight zones across the country by the GATE Committee comprising faculty from Indian Institute of Science, Bangalore and seven Indian Institutes of Technology on behalf of the National Coordinating Board - GATE, Department of Education, Ministry of Human Resources Development (MHRD), and Government of India.
Objective To identify meritorious and motivated candidates for admission to Post Graduate Programmes in
Engineering, Technology, Architecture and Pharmacy at the National level. To serve as benchmark for normalization of the Undergraduate Engineering Education in the country.
This provides an opportunity for advanced engineering education in India. An M.E or M.Tech degree is a desirable qualification for our young engineers seeking a rewarding professional career. Engineering students, while in the final year of their degree course, spend considerable time in seeking an opening for studies in foreign universities.The students are advised to pursue M.Tech in IIT’s/NIT’s/University Colleges.
MBAEarning a Master’s of Business Administration (MBA) degree can provide you with management skills and business expertise that open new career opportunities to you. An MBA program will also launch you into the much higher pay range that upper level managers and executives enjoy. Furthermore, in the high-level positions, an MBA degree will allow you to hold and your work will often be more interesting and rewarding.The students are advised to pursue M.BA in IIM’s/XLRI/Reputed Business Schools.
Higher Studies AbroadTOEFL is mandatory for seeking admission in any academic course at any level- undergraduate, graduate or post graduate, in USA and Canada. Similarly UK Universities ask for IELTS for seeking admission to graduate and past graduate courses.
GRE The Graduate Record Examination (GRE) is administered by the Educational Testing Services (ETS) for admission into all graduate academic programs (except management) in universities across USA and Canada and some selected universities across the world including India. The exam is a Computer Adaptive Test and is administered at any of the Sylvan testing centers in the country after prior registration.
The GMAT is a Computer Adaptive Test administered online by Educational Testing Services (ETS) through Sylvan testing centers located in all the major cities in India. Those who wish to enroll for courses in Business Management in American universities have to take the GMAT test and submit their scores to the department.
2.4 Various Scholarships Available In IndiaBharat Petroleum Scholarship For Higher Studies | Balarama Digest Scholarship | Central Institute of Indian Languages | Fair & Lovely Foundation - Project Saraswati Scholarships | Government Of India Office of the Director General of Civil Aviation Scholarship | Homi Bhabha Centre For Science Education Tata Institute of Fundamental Research Research Scholarships | HSBC Scholarships | Indian Council Of Agricultural Research Award Of National Talent Scholarship In Agriculture | Indian Institute Of Geomagnetism Research Scholars | Invention Awards For School Children | Indian Oil Corporation Ltd (IOCL) - Scholarships | Jawaharlal Nehru Memorial Fund Jawaharlal Nehru Scholarships For Doctoral Studies | Junior Research Scholarships For Cancer Biology Tata Memorial Centre & Tata Memorial Hospital | Jaigopal Garodia Vivekananda Trust Scholarships | Lalit Kala Akademi - Scholarship | Mahindra All India Talent Scholarships For Diploma courses In Polytechnics | National Brain Research Centre Scholarships | NTPC Scholarships | National Institute Of Science Communication And Information Resources(NISCAIR) | National Board For Higher Mathematics(NBHM) | National Thermal Power Corporation Ltd.Scholarships | National Olympiad Programme | National Level Science Talent Search Examination - 2005 | Narotam Sekhsaria Scholarship Programme | National Brain Research Centre Scholarships, Post Doctoral Fellowships | National Aptitude Test | NIIT National IT Aptitude Test | Oil And Natural Gas Corporation Ltd (ONGC) Scholarships To SC/ST Students | Office Of The Director General of Civil Aviation Scholarships Stipend to the SC/ST Candidates | Rashtriya Sanskrit Sansthan - Scholarships | Scholarships To Young Artistes | Saf-Madanjeet Singh Scholarship | Sports Authority Of India - Sports Scholarships | SAF-Madanjeet Singh Scholarship | Spic Macay Scholarships | The Childrens Foundation - Scholarships | The L&T Build-India Scholarship | The Hindu-Hitachi Scholarships | The Paul Foundation Scholarships | Technology Information Forecsting and Assessment Council(TIFAC) Women Scientist Scholarship Scheme | The Young Talent IT Scholarship The Dr.GB Scholarships Foundation |
2.5 Various International Scholarships Available In IndiaA * STAR India Youth Scholarship | A.M.M. Arunachalam-Lakshmi Achi Scholarship For Overseas Study | British Chevening Scholarships | Bharat Petroleum - Scholarships for Higher Studies | Cambridge Nehru Scholarships | Commonwealth Scholarship and Fellowship | Czech Government Scholarship | Chevening Technology Enterprise Scholarship Programme | Chinese Government Scholarship | Greek Government Scholarships | Israel Government Scholarship | Iranian Government Scholarship | Offer of Italian Government Scholarship | Japanese Government Scholarships | K.C.Mahindra Scholarships For Post-Graduate Studies Abroad | Lady Meherbai D.Tata Scholarships | Mexican Government Scholarship | Norwegian Government Scholarships | National Overseas Scholarships/Passage Grant for ST Candidates | Portuguese Government Scholarships | Sophia Merit Scholarships Inc | Slovak Government Scholarship | SIA Youth Scholarships | The Rhodes Scholarships India | The Ramakrishna Mission Institute Of Culture Award of Debesh-Kamal Scholarships For Studies Abroad | The Inlaks Foundation - Scholarships |
Website for Higher Studies:1. www.higherstudyabroad.org2. www.highereducationinindia.com
3. STUDENT CAREER ORIENTED PROFESSIONAL CERTIFICATION COURSES
As per the career plan for students of MLR Institute of Technology with a view to bridge the gap between Industry and Academia, it has been planned to equip every student with at least three International / National certification by the time he / she completes the course of study. The details of the certification courses are given below:
Branch Year Name of the Certification Course
2nd Year Certificate Information Technology
3rd Year IBM Certified DB2 Database Associate, Infosys Campus Connect
4th Year IBM Certified Rational Application Developer
Computer Science and Engineering / IT / MCA
4th Year SUN Certified Java Programmer
2nd Year Institute of Electronics and Telecommunication Engineering
3rd Year Motorola @ CAMPUSElectronics and
Communication Engineering
4th Year IBM Certified DB2 Database Associate
2nd Year Certificate in AutoCAD
3rd Year Certificate in HighPerMeshAeronautical Engineering
4th Year Certificate in CATIA
2nd Year Certificate in AutoCAD
3rd Year Certificate in HighPerMeshMechanical Engineering
4th Year Certificate in CATIA
3.1 Help DeskThe college has set up a Help Desk for Career Guidance and overseas education. The aim of the
Help Desk is to provide a flatform for the students to choose the Right Destination. The students can reach the Help Desk in person or through mail at email id [email protected]
4. PERFORMANCE MONITORING AND GUIDANCE
4.1 Student FeedbackIn case the students find it difficult to cope up / understand a particular subject, they areadvised to discuss it with
a. The Concerned Teacherb. The Class Teacherc. The Department Headd. The Principal
Students can use the suggestion boxes for communicating feedback. Students should mention their names so that they can be informed of the progress / more details / clarifications can be obtained.
4.2 Class TeacherEvery class is assigned a Class Teacher (a faculty member). Students can directly discuss their college related or personal problems related to studies with them. The Class Teachers are accessible to the students and they can talk to the Class Teacher or whenever they are free from class / lab work. Class Teacher will meet with the class representative on daily basis to discuss their day-to-day difficulties if any.
4.3 Class Representatives and their rolesTwo students from each class are selected as the Class Representatives from the department basing on their academic performance and discipline. Department Head makes the selections.
Responsibilities of the Class Representatives: Collection of MIS format from Class Teacher daily. Communicating the departmental / college directives & information to the
students. Collecting the feedback of difficulties faced by the students and communicating
Suggestions for improvements. Coordinating academic events and co-curricular activities. Encourage students to interact for better studies, sharing books and notes. Compilation and submission of MIS form to class teacher at the end of the period.
4.4 Performance CounselingMentors will evaluate the student individually for the following:
a. Less marks in internal examsb. Continuous absence (3 days) and shortage of attendancec. Not understanding the subjectd. Students from Telugu mediume. Assistance for back log subjects etc.f. Communication with parentsg. Provide help to back log students
4.5 Remedial Classes / Tutorial / RevisionsRemedial Classes are conducted for students who are weak and who do not perform well in their internal examinations / class tests or for the students who want extra help. Slots in the time table
have been reserved for Tutorial where in the students are helped to solve the question in the class itself.
4.6 Backlog ManagementThe Mentors maintain a complete record of Examination results of each student and they counsel and guide them in preparing for backlogs. Students are provided with material and important questions are discussed.
4.7 Correspondence with parentsParents will be informed about the performance of their ward from time to time in the semester. However, parents are requested to be in touch with the Student mentor / Department Head on a regular basis. Further, parents are sent sms on daily bases if their wards do not attend the college.
5. RULES AND REGULATIONS FOR STUDENTS
5.1 Administrative:1. Students, admitted into this College, are deemed to have agreed to the rules and
regulations of the college, as laid down by the College Authorities from time to time, and the rules lay down in this leaflet, issued at the time of admission.
2. Students should inform any changes in the addresses/Phone No. of their parents / guardians to the college office.
3. The college shall communicate to the parents \ guardians of the students from time to time regarding the regularity and performance in the examinations of their wards. The case of serious indiscipline on the part of the students (s) may also be communicated to parent (s) \ guardian (s).
5.2. Academic:1. Students should attend the classes in - time. Late- comers shall not be permitted to enter
the class room and they are likely to loose the attendance.2. Students are expected to be regular to the classes. The students Shall not absent
themselves for classes without prior approval. Prior permission shall be taken from concerned counselor and submitted to the Head of the Department.
3. In case of ill-health, the student should submit the medical certificate along with prescription, etc., from a registered medical doctor. The student should get the medical certificate within two days from the date of reporting to the college after iII health and also produce a letter from Father/ Mother regarding ill-health. Permission on medical grounds shall not be granted for one or two days.
4. The students should come to the laboratories with the prescribed uniform.5. If a student disturbs the class or makes mischief, he / she will be marked absent and
may be expelled from the class.6. Students shall spend their leisure time in the library/computer center.7. Students are expected to put up the minimum aggregate percentage of attendance
(75%) as laid down by the JNT University. Students, falling short of 75% of attendance shall not be promoted to the next Semester \ Class.
8. Parents \ guardians of the students can contact the college authorities either in person or by post regarding discipline, regularity in attending classes, performance in the examinations, etc., of their wards.
5.3 Dress Code:1. Students are expected to attend the college properly dressed. They should wear the
prescribed uniform while attending laboratory classes.2. Students are expected to carry the identity cards, issued by the college, in the campus.
They are required to show the identity cards at the library, computer center, office, etc. Students without Identity Cards are not allowed in to the laboratory classes.
5.4 Discipline & Punctuality:1. No student shall enter or leave the class room without the permission of the teacher.2. Calling students out of their class rooms while the lecture is in progress is prohibited.3. Students are required to help in keeping the rooms, buildings, and premises clean and tidy.
Writing or sticking up of posters and notices on the walls is strictly prohibited.4. Smoking, Consumption of alcohol, intoxicating drinks or drugs is strictly prohibited in and
around the college premises. Those indulging in such activities will be put severely or expelled.
5. Students are expected to behave well with the staff, other students and the general public. Any misbehavior, coming to the notice of the college authorities, will be severely dealt with.
6. The conduct of the students should be exemplary not only within the premises of the college but also outside. This will help in maintaining the image and status of the college.
7. Students are required to observe silence at all times in the college campus. They shall not talk in loud tone or call each other by shouting.
8. Students are prohibited from loitering in the verandahs / campus during class hours, and sitting on the steps, stair-cases or parapet walls.
9. Students are not permitted to resort to strikes and demonstrations within the campus.Participation in such activity entails their dismissal from the college. Any problem they face may be represented to the Counselor / Head of the Department / Principal.
10. Students are prohibited carrying Cell Phones and organizing any meeting or entertainment in the college campus without the permission of the college authorities.
11. The entry of outsiders without permission is prohibited. Any student found responsible for bringing outsiders into the campus for settling personal disputes with other students, shall be expelled from the college.
12. The college is entitled to take any disciplinary action, which is deemed necessary in the case of any indiscipline on the part of the students. The same will be reflected on the Conduct Certificate issued at the time of leaving the college.
13. No Student Unions, except Professional Associations, are permitted in the college.14. If the students cause any damage to the college property knowingly or unknowingly
individually or in a group they have to pay 5 times to cost of property damaged them. All the students are collectively responsible for the proper maintenance college property i.e. building, furniture, lab equipment, garden, playgrounds, etc., recovery, calculated on semester to semester basis, will be collected along with examination fee for the semester.
15. Students should keep their vehicles only at the parking place allotted for the purpose. Vehicle riding in the campus is strictly prohibited.
16. Sitting on the parapet wall and Riding beyond the parking limits, the fine will be imposed to Rs.100.00
17. Breakage or loss of equipment /property as decided by the appropriate authority18. The Principal/Director may, on the recommendation of the Head of the Department, or
otherwise, inflict the following punishments in the interests of the student discipline and the Institution: fined, curtailment attendance, denial of promotion to next semester, suspension, expulsion or such other action as deemed necessary for the maintenance of discipline in the campus.
5.5. Lab Classes:All students must attend lab classes without fail. Those absent shall follow this procedure laid down in the prescribed format explaining valid reasons and obtain permission to attend the future classes.
5.6 Fee:1. All students admitted into this college, will be required to pay the prescribed tuition fee and
other specified fees. Failure of the same will result in the cancellation of admission. No portion of fees will be refunded under any circumstances. If any student wishes to change the college or discontinue the course at any point for any reason, he \ she shall not be permitted to do so unless he \ she pays balance amount of four years fees which he \ she would have to pay, if he \she continued till the completion of the course. His \ Her original certificates including I.e., etc., will be issued only after all the dues as stated above, are cleared by the students. All senior students must pay the college fee every year on or before the 15th of July irrespective of the reopening of the college. If they fail the fine will be imposed as per norms of the management.
2. Miscellaneous fee paid for expenditure related to training programs i.e., technical or soft skills
11
etc., is not refundable.3. Other than the above, if any fees are levied by the University the student has to be pay the
same.
5.7. Transport:All students who are availing the college bus facility must carry the bus-pass and must produce when demanded, failing which they will not allowed to travel in the bus. All students must travel in the allotted bus and routes. They should not change but occupy only their allotted seats throughout. Unauthorized students caught in the bus for not having the bus pass, should pay even if they traveled for one day also. First and second year are not allowed to bring two-wheelers.
5.8. Library Rules1. Library Books will be issued for 15 days time and renewal depends upon the demand of the
book.2. Silence should be strictly maintained in the library.3. Students are responsible for the library borrower card issued to them. Loss of the library card
should be reported in writing to the circulation section immediately. Duplicate library borrower card will be issued on payment of Rs.150/- after a week time from the date of application for duplicate cards.
4. The Library borrower card is not transferable.5. Library books must be returned on or before the due date. Any student failed to do so,
1st week –Rs.1/-per day/per book, 2nd week – Rs.2/-per day/per book and 3rd week –Rs.3/-per day/per book penalty will be imposed From 4th week-Rs.5/-per day/per book penalty will be imposed.
6. Students shall not make any sort of conversation in any part of the library, causing inconvenience to others.
7. Students shall not bring their belongings inside the library and should keep them outside the library.
8. Students leaving from the library should be checked at the exit.9. Tearing of pages/stealing of books will invite suspension from using of the library facilities and
further disciplinary action will be taken against such students, as per college norms.10. The borrower shall replace the New book within 7 days, otherwise, he/she has to pay 3
times of the book cost, along with fine. In case of lose of book.
5.9. General:1. All the students admitted in this college have to give an undertaking to abide by the rules
and regulations of this college in prescribed format given by the college.2. All the students should attend the college after vacations (Dasara / Sankranthi / Christmas /
Semester term / summer) on the re-opening day without fail. 3. Students must deposit all the relevant original certificates and documents at the time of
the admission Office and they will not be returned until completion of the course.4. Admission of any student can be cancelled by the Management at any point during the course
for reasons which are not in consonance with the rules and regulations and which are detrin the reputation of the college.
5. All the Students are here by informed that college authorities will not take any responsibility for loss or theft of your valuable items and money kept in your bags or some where else. Hence I request all the students are not to keep your valuables in class room or anywhere without your presence.
6. Fee For Issue Of Duplicatesa) Duplicate Hall ticket Rs. 100.00
b) Duplicate Identity Card Rs. 100.00c) Duplicate College Bus Pass Rs. 50.00d) Duplicate Study Certificate for same purpose Rs. 50.00e) Xerox copies of OD’s Rs. 50.00
All Breakage etc., penalties will be displayed on the Notice Board, and must be paid by the student and no student will be allowed to write examination or internal test or laboratory test, if penalties are not paid by the due date specified in the notice or circular.
5.10. RaggingRagging in any form inside or outside the college campus is banned/Prohibited vide Ragging Act 26 of AP. legislative Assembly 1997. Those who indulge in this uncivilized activity are liable for severe disciplinary actions besides being liable for prosecution.
SALIENT FEATURES
Ragging means doing an act which causes or is likely to cause insult 'or annoyance or fear or apprehension or threat or intimidation or outrage of modesty or injury to a student.
S. No. Nature of Ragging Punishment
1 Teasing, Embarrassing and Humiliating Imprisonment Upto 6 Month or Fine Upto Rs 1000/- or Both.
2 Assaulting or using criminal Force or criminal intimidation
Imprisonment Upto 1 Year or Fine Upto Rs 2000/- or Both.
3 Wrongfully restraining or Confining or causing hurt
Imprisonment Upto 2 Years or Fine Upto Rs 5000/- or Both.
4 Causing grievous hurt kidnapping Or raping or committing unnatural offence
Imprisonment Upto 5 Years or Fine Upto Rs 10000/- or Both
5 Causing death or abating Suicide Imprisonment Upto 10 Years or fine Upto Rs. 50000/- or Both
Note:1. A student convicted of any of the above offences, will be, dismissed from the college2. A student imprisoned for more than six months for any of the above offences 'will not be
admitted in any other College.3. A student against whom there is prima facie evidence of ragging in any form will be
suspended from the college immediately.
Prohibition of Ragging1. Ragging is prohibited as per act 26 of AP. Legislative assembly, 1997.2. Ragging entails heavy fines and/or imprisonment.3. Ragging invokes suspension and dismissal from the college.
4. Outsiders are prohibited from entering the college premises without permission.
5. All students must carry their identity cards and show them when Demanded.6. The principal and staff will visit and inspect the rooms at any time.7. Suspended students are debarred from entering the campus except when required to attend
enquiry and to submit an explanation .
6. ACADEMIC REGULATIONS R13 FOR B.TECH. (REGULAR)Applicable for the students of B.Tech. (Regular) from the Academic year 2013-14 and onwards
6.1. Award of B.Tech. DegreeA Student will be declared eligible for the award of the B.Tech. Degree if he fulfills the following academic regulations:
i) Pursued a course of study for not less than four academic years and not more than eight academic years.
ii) Register for 224 credits and secure 216 credits.6.2. Students, who fail to fulfill all the academic requirements for the award of the degree within
eight academic years from the year of their admission, shall forfeit their seat in B.Tech Course.
6.3. Credits
I Year Semester
Periods / Week Credits Periods /
Week Credits
03+1/03 06 04 04Theory
02 04 --- ---
Practical 03 04 03 02
Drawing 02T/03D 06 0306
0204
Mini Project --- ---- --- 02
Comprehensive Viva Voce --- -- --- 02
Seminar --- --- 6 02
Project --- --- 15 10
6.4. Distribution and Weight age of Marksi. The performance of a student in each semester / I year shall be evaluated subject –
wise with a maximum of 100 marks for theory and 75 marks for practical subject. In addition, Industry oriented mini-project, seminar and project work shall be evaluated for 50,50 and 200 marks respectively.
ii. For theory subjects the distribution shall be 25 marks for Internal Evaluation and 75 marks for the End-Examination.
iii. For theory subjects, during the semester there shall be 2 midterm examinations. Each mid term examination consists of objective paper for 10 marks and subjective paper for 15 marks with a duration of 1 hour 50 minutes (20 minutes for objective and 90 minutes for subjective paper).
iv. For practical subjects there shall be a continuous evaluation during the semester for 25 sessional marks and 50 end examination marks. Out of the 25 marks for internal, day-to-day work in the laboratory shall be evaluated for 15 marks and internal examination for practical shall be evaluated for 10 marks conducted by the concerned laboratory teacher. The end examination shall be conducted with external examiner and laboratory teacher. The external examiner shall be appointed from the cluster of colleges as decided by the University examination branch.
v. For the subject having design and / or drawing, (such as Engineering Graphics, Engineering Drawing, Machine Drawing) and estimation, the distribution shall be 25 marks for internal evaluation (15 marks for day-to-day work and 10 marks for internal tests) and 75 marks for end examination. There shall be two internal tests in a Semester and the better of the two shall be considered for the award of marks for internal tests. However in the I year class, there shall be three tests and the average of best two will be taken into consideration.
vi. There shall be an industry-oriented mini-project, in collaboration with an industry of their specialization, to be taken up during the vacation after III year II semester examination. However, the mini project and its report shall be evaluated with the project shall be submitted in report form and should be presented before the committee, which shall be evaluated for 50 marks. The committee consists of an external examiner, head of the department, the supervisor of mini project and a senior faculty member of the department. There shall be no internal marks for industry oriented mini project.
vii. There shall be a seminar presentation in IV year II semester. For the seminar, the student shall collect the information on a specialized topic and prepare a technical report, showing his understanding over the topic, and submit to the department, which shall be evaluated by the Departmental committee consisting of Head of the department, seminar supervisor and a senior faculty member. The seminar report shall be evaluated for 50 marks. There shall be no external examination for seminar.
viii. There shall be a comprehensive Viva-Voce in IV year II semester. The Comprehensive Viva-Voce will be conducted by a Committee consisting of (i) Head of the Department (ii) two Senior Faculty members of the Department. The comprehensive Viva-Voce is aimed to assess the students’ understanding in various subjects he/she studied during the B.Tech course of study. The comprehensive Viva-Voce is evaluated for 100 marks by the Committee. There are no internal marks for the comprehensive viva-voce.
ix. Out of a total of 200 marks for the project work, 50 marks shall be for Internal Evaluation and 150 marks for the End Semester Examination. The End semester Examination (viva-voce) shall be conducted by the same committee appointed for industry oriented mini project. In addition the project supervisor shall also be included in the committee. The topics for industry oriented mini project, seminar and project work shall be conducted at the end of the IV year. The Internal Evaluation shall be on the basis of two seminars given by each student on the topic of his project.
x. Laboratory marks and the sessional marks awarded by the college are not final. They are subject to scrutiny and scaling by the University wherever necessary. In such cases, the sessional and laboratory marks awarded by the College will be referred to a Committee. The Committee will arrive at a scaling factor and the marks will be scaled as per the scaling factor. The recommendations of the Committee are final and binding. The laboratory records and internal test papers shall be preserved in the respective institutions as per the University norms and shall be produced to the Committees of the University as and when the same is asked for.
6.5. Attendance Requirements:i. A student shall be eligible to appear for University examinations if he acquires a minimum
of 75% of attendance in aggregate of all the subjects.ii. Shortage of Attendance below 65% in aggregate shall in NO case be condoned.iii. Condonation of shortage of attendance in aggregate up to 10% (65% and above and below
75%) in each semester or I year may be granted by the College Academic Committee.iv. A student will not be promoted to the next semester unless he satisfies the attendance
requirement of the present semester / I year, as applicable. They may seek re-admission for that semester / I year when offered next.
v. Students whose shortage of attendance is not condoned in any semester / I year are not eligible to take their end examination of that class and their registration shall stand cancelled.
vi. A stipulated fee shall be payable towards condonation of shortage of attendance.
6.6. Minimum Academic Requirements:The following academic requirements have to be satisfied in addition to the attendance requirements mentioned in item no.6i. A student shall be deemed to have satisfied the minimum academic requirements and
earned the credits allotted to each theory or practical design or drawing subject or project if he secures not less than 35% of marks in the end examination and a minimum of 40% of marks in the sum total of the internal evaluation and end examination taken together.
ii. A student shall be promoted from II to III year only if he fulfills the academic requirement of 37 credits from one regular and one supplementary examinations of I year, and one regular examination of II year I semester irrespective of whether the candidate takes the examination or not.
iii. A student shall be promoted from third year to fourth year only if he fulfills the academic requirements of total 62 credits from the following examinations, whether the candidate takes the examinations or not.a) Two regular and two supplementary examinations of I year.b) Two regular and one supplementary examinations of I semester.c) One regular and one supplementary examinations of II year II semester.d) One regular examination of III year I Semester.
iv. A student shall register and put up minimum attendance in all 200 credits and earn the 200 credits. Marks obtained in all 200 credits shall be considered for the calculation of percentage of marks.
v. Students who fail to earn 200 credits as indicated in the course structure within eight academic years from the year of their admission shall forfeit their seat in B.Tech course and their admission shall stand cancelled.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 3
8. III YEAR CSE COURSE STRUCTURE
CODE SUBJECT L T/P/D C
A50564 PRINCIPLES OF PROGRAMMING LANGUAGES 4 - 4
A10520 LINUX PROGRAMMING 4 - 4
A10521 WEB TECHNOLOGIES 4 - 4
A10522 COMPILER DESIGN 4 - 4
A11206 E-COMMERCE 4 - 4
A10519 COMPUTER NETWORKS 4 - 4
A10527S LINUX PROGRAMMING LAB - 3 2
A10526 WEB TECHNOLOGIES LAB - 3 2
Total 24 6 28
Note: All End Examinations (Theory and Practical) are of three hours duration. T – Tutorial L-Theory P- Practical C – Credits
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 4
9. PRINCIPLES OF PROGRAMMING LANGUAGES (A10564)
9.0 COURSE DESCRIPTION
Course Title PRINCIPLES OF PROGRAMMING LANGUAGES
Course Code A10564
Regulation MLR-15Lectures Tutorials Practical’s Credits
Course Structure3 1 - 3
Course Coordinator Mr.E.Amarnath Reddy Asst.Professor CSETeam of Instructors Mrs. Rajani , Asst. Professor
9.1 COURSE OVERVIEW: This course is designed about principles, concepts, and ideas that underling
programming languages. The course covers many aspects of using, understanding, and reasoning about programming languages (e.g., syntax, scoping, induction, data types, and typing). We will build up a set of mathematical tools for careful discourse. A significant part is devoted to abstraction, that is, how languages help programming in the large (e.g., sub typing polymorphism, parametric polymorphism, modules, and objects).
9.2 PREREQUISITES:
Level Credits Periods/Weeks PrerequisitesUG 3 5 Basic programming concepts, Object Oriented Programming concepts.
9.3. A) MARKS DISTRIBUTION:
Session Marks University EndExam Marks Total Marks
Mid Semester TestThere shall be two midterm examinations.Each midterm examination consists of subjective type and objective type tests.The subjective test is for 10 marks of 60 minutes duration.Subjective test of shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.AssignmentFive marks are earmarked for assignments.There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.
75 100
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 5
9.3 B) Expected Learning Outcomes and Methods for Assessing
S. No Expected Learning Outcomes Assessment method (s)
a Demonstrating the use of scripting languages. Assignment and exercises
b Analyzing the skills and using the features of programming languages. Case studies
c Differentiating between logic programming and functional programming languages. Assignments and test
d Finding various data types of different programming languages. Assignments
9.4 EVALUATION SCHEME:
S. No Component Duration Marks1 I Mid Examination 90minutes 202 I Assignment 53 II Mid Examination 90minutes 204 II Assignment 55 External Examination 3 hours 75
COURSE OBJECTIVES: The course objective is to:
I. To familiarize various programming methodologies II. To explain merits and demerits of various programming patterns
III. To teach new programming practices IV. To familiarize various debugging techniques.
9.5 COURSE OUTCOMES:After completing this course students will be able to:
BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: Apply, developBL 4: Analyze BL 5: Evaluate
Course Outcomes Blooms Level
a. Analyze fundamental concepts of most programming languages & the tradeoffs Programming Languages between language design and implementation.
BL 1
b. Compare programming languages assess programming languages critically and scientifically. BL 2
c. Use formal description for a programming language and the essence of program execution by evaluators: interpreter, compiler. BL 3
d. Apply different programming paradigms: analyze the principles of imperative, object-oriented, functional and logic programming. BL 4
e. Design a new programming language in principle BL 5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 6
9.6 HOW PROGRAM OUTCOMES ARE ASSESSED:
Program Outcomes Level Proficiencyassessed by
A An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems. S Assignment,
Exercises
B An ability to design and conduct engineering experiments, as well as to analyze and interpret data S Exercises
C An ability to design and construct a hardware and software system component, or process to meet desired needs, within realistic constraints. S Exercises
D Graduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. S Exercises
EAn ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipment’s necessary to analyze computer engineering Problems
H Exercises
F An understanding of professional, social and ethical responsibility N .......
GAn ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirement
N .......
H The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context S Seminars,
Discussions
IGraduate will develop confidence for self-education and acquire new knowledge in the computing discipline and ability and practice for Multi-disciplinary tasks as a member within the teams
H Exercises
J To communicate effectively S Seminars, PaperPresentation
K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. H Exercises,
Discussions
L Graduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc. S Exams, Discussions
M An ability to setup an enterprise. N .......
NThe use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.
S Exercises
N = None S = Supportive H = Highly Related
9.7 SYLLABUS:
UNIT -IPreliminary Concepts: concepts of programming languages, Programming domains, Language Evaluation Criteria, influences on Language design, Language categories, Programming Paradigms – Imperative, Object Oriented, functional Programming , Logic Programming. Programming Language Implementation – Compilation and Virtual Machines, programming environments.
UNIT II Syntax and Semantics: general Problem of describing Syntax and Semantics, formal methods of describing syntax - BNF, EBNF for common programming languages features,
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 7
parse trees, ambiguous grammars, attribute grammars, denotation semantics and axiomatic semantics for common programming language features.
UNIT IIIData types: Introduction, primitive, character, user defined, array, associative, record, union, pointer and reference types, design and implementation uses related to these types. Names, Variable, concept of binding, type checking, strong typing, type compatibility, named constants, variable initialization.
UNIT IV Expressions and Statements: Arithmetic relational and Boolean expressions, Short circuit evaluation mixed mode assignment, Assignment Statements, Control Structures – Statement Level, Compound Statements, Selection, Iteration, Unconditional Statements, guarded commands.
UNIT-V Subprograms and Blocks: Fundamentals of sub-programs, Scope and lifetime of variable, static and dynamic scope, Design issues of subprograms and operations, local referencing environments, parameter passing methods, overloaded sub-programs, generic sub-programs, parameters that are sub-program names, design issues for functions user defined overloaded operators, co routines.
TEXT BOOKS 1.Concepts of Programming Languages Robert .W. Sebesta 6/e, PearsonEducation.2.Programming Languages –Louden, Second Edition, Thomson..
REFERENCES 1. Programming languages –Ghezzi, 3/e, John Wiley.2. Programming Languages Design and Implementation – Pratt and Zelkowitz, Fourth
Edition PHI/Pearson Education.3. Programming languages –Watt, Wiley Dreamtech.4. LISP Patric Henry Winston and Paul Horn Pearson Education.5. Programming in PROLOG Clocksin, Springer.
9.8 COURSE PLAN:The course plan is meant as a guideline. There may probably be changes
Lecture No.
Course Learning Outcomes
Blooms Levels Topics to be covered Reference
1 T1 pg:1.2
2
Reviews the concepts of
Remembering / Knowledge
Reasons for studying, concepts of programming languages. http://nptel.ac.in/courses/106102067/1Progamming domains. T1 pg:1.5
3-5 T1 pg:1.7-1.19
6
To Devalop the Programming
languages
Applying / Application
Language Evaluation Criteria, influences on Language design.http://nptel.ac.in/courses/106102067/1Language categories. T1 pg:1.22
7-8List out various programming
paradigms.
Remembering / Knowledge
Programming Paradigms – Imperative ,Object Oriented, functional Programming , Logic Programming.http://nptel.ac.in/courses/106102067/1
T1 pg:1.25
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 8
9-10Recall the design
issues of implementation.
Remembering / Knowledge
Programming Language Implementation – Compilation and Virtual Machines,
T1 pg:2.2-2.22
11-12 Programming environments T1 pg:1.32
13-15
General Problem of describing Syntax and Semantics,1)http://nptel.ac.in/courses/106102067/22)http://nptel.ac.in/courses/106102067/53)http://nptel.ac.in/courses/106102067/6
T1 pg:3.3
16-18
Formal methods of describing syntax -BNF, EBNF for common programming languages features.http://nptel.ac.in/courses/106102067/38
T1 pg:3.5
19
Recall various programming environments.
Remembering / Knowledge
parse trees, ambiguous grammars.http://nptel.ac.in/courses/106102067/4
T1 pg:3.6-3.7
20 Attribute grammars.http://nptel.ac.in/courses/106102067/3 T1 pg:3.20
21-24
Elaborates the features of attribute
grammars.
Understanding / Comprehension denotational semantics and axiomatic semantics
for common programming language features. T1 pg:3.27
25-26 Introduction, primitive, character.http://nptel.ac.in/courses/106102067/12 T1 pg:6.4
27-29 User defined, array.http://nptel.ac.in/courses/106102067/12 T1 pg:6.13
30-32 Associative, record, union.http://nptel.ac.in/courses/106102067/12
33-35
Introduction, primitive, character.http://nptel.ac.in/courses/106102067/12pointer and reference types, design and implementation uses related to these types.http://nptel.ac.in/courses/106102067/1 T1 pg:6.452
T1 pg:6.41
36 T1 pg:5.2-5.8
37-40
List out various data types
Understanding / Comprehension
Names, Variable, concept of binding, type checking, strong typing, type compatibility, named constants, variable initialization.http://nptel.ac.in/courses/106102067/10http://nptel.ac.in/courses/106102067/21
T1 pg:6.58
41 Arithmetic relational and Boolean expressions.http://nptel.ac.in/courses/106102067/9
T1 pg:7.3-7.17
42-44Short circuit evaluation mixed mode assignment, Assignment Statements.http://nptel.ac.in/courses/106102067/9
T1 pg:7.19
45Control Structures – Statement Level, Compound Statements.http://nptel.ac.in/courses/106102067/23
T1 pg:8.2
46 Selection, Iteration.http://nptel.ac.in/courses/106102067/23 T1 pg:8.4
47-50
Use expressions and statements in
a program.
Analyzing / Analysis
Unconditional Statements, guarded commands.http://nptel.ac.in/courses/106102067/13 T1 pg:8.32
51Fundamentals of sub-programs, Scope and lifetime of variable.http://nptel.ac.in/courses/106102067/19
T1 pg:9.2
52Static and dynamic scope, Design issues of subprograms and operations.http://nptel.ac.in/courses/106102067/37
T1 pg:9.13
53
Tabulate different
parameter passing
techniques.
Analyzing / Analysis
local referencing environments T1pg:9.14
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 9
54-56 Parameter passing methodshttp://nptel.ac.in/courses/106102067/39 T1 pg:9.16
57 T1pg: 9.39-9.41
58-59 T1pg: 9.37
60
Differentiate sub-program and co-
routines.
Analyzing / Analysis Differentiate sub-program and co-routines.
T1pg: 9.50
SESSION PLANNER
Unit Class TopicText/
Reference book
Session Objectives Dateplanned
DateConducte
d1. By the end of the session student will identify concepts of PPLL1 Preliminary Concepts:
Introduction T1 2.. By the end of the session student will understand concepts of PPL1. By the end of the session student will identify concepts of for studying PPLL2 Reasons for studying
PPL T2 2.. By the end of the session student will understand concepts of for studying PPL1. By the end of the session student will identify concepts of Programming domains
L3
Concepts of programming languages, Programming domains
T1 2.. By the end of the session student will understand concepts of Programming domains1. By the end of the session student will identify concepts of Language Evaluation CriteriaL4,
L5Language Evaluation Criteria T1 2.. By the end of the session
student will understand concepts of Language Evaluation Criteria1. By the end of the session student will identify concepts of Influences on Language designL6 Influences on
Language design T1 2.. By the end of the session student will understand concepts of Influences on Language design1. By the end of the session student will identify concepts of Language categories
I
L7
Language categories &Programming Paradigms –imperative, object oriented
T1 2.. By the end of the session student will understand concepts of Language categories
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 10
1. By the end of the session student will identify concepts of functional Programming , Logic Programming
L8functional Programming , Logic Programming
T1 2. By the end of the session student will understand concepts of functional Programming , Logic Programming1. By the end of the session student will identify concepts of Syntax and SemanticsL9,
L10
Programming Language Implementation – Compilation and Virtual Machines, programming environments
T1 2.. By the end of the session student will understand concepts of Syntax and Semantics
CLASS TEST UNIT -11. By the end of the session student will identify concepts of Syntax and Semantics
L11
Syntax and Semantics: Introduction ,general Problem of describing Syntax and Semantics
T2 2.. By the end of the session student will understand concepts of Syntax and Semantics1. By the end of the session student will identify concepts of Formal methods of describing syntaxL12
L13
Formal methods of describing syntax – BNF and context free grammar, Fundamentals, list, derivations
T1 2.. By the end of the session student will understand concepts of Formal methods of describing syntax1. By the end of the session student will identify concepts of Parse trees , Ambiguous grammars, Operator precedence, Associativity of operator, Unambiguous grammarL14,
L15
Parse trees , Ambiguous grammars, Operator precedence, Associativity of operator, Unambiguous grammar
T1 2.. By the end of the session student will understand concepts of Parse trees , Ambiguous grammars, Operator precedence, Associatively of operator, Unambiguous grammar1. By the end of the session student will identify concepts of EBNFL16 EBNF T1 2.. By the end of the session student will understand concepts of EBNF1. By the end of the session student will identify concepts of Attribute grammars
L17 Attribute grammars T1 2.. By the end of the session student will understand concepts of Attribute grammars
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 11
1. By the end of the session student will identify concepts of Semantics, Operational semanticsL18 Semantics,
Operational semantics T1 2.. By the end of the session student will understand concepts of Semantics, Operational semantics1. By the end of the session student will identify concepts of Axiomatic semantics ,Denotational semantics
L19Axiomatic semantics ,Denotational semantics
T1 2.. By the end of the session student will understand concepts of Axiomatic semantics ,Denotation semantics1. By the end of the session student will identify concepts of operational and denotation semanticsL20
Differences between operational and denotation semantics
T1 2.. By the end of the session student will understand concepts of operational and denotation semantics1. By the end of the session student will identify concepts of Data types: Introduction, primitive, character, user definedL21
Data types: Introduction, primitive, character, user defined
T1 2.. By the end of the session student will understand concepts of Data types: Introduction, primitive, character, user defined1. By the end of the session student will identify concepts of ArrayL22,
L23 Array T1 2.. By the end of the session student will understand concepts of Array1. By the end of the session student will identify concepts of Associative, Record, UnionL24,L
25Associative, Record, Union T1 2.. By the end of the session
student will understand concepts of Associative, Record, Union1. By the end of the session student will identify concepts of PointerL26 Pointer and reference
types T1 2.. By the end of the session student will understand concepts of Pointer
II
L27Names, Variables, Concept of binding, Type checking
T1
1. By the end of the session student will identify concepts of Names, Variables, Concept of binding, Type
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 12
checking2.. By the end of the session student will understand concepts of Names, Variables, Concept of binding, Type checking1. By the end of the session student will identify concepts of Strong typing, Type compatibility, Named constants, Variable initializationL28
Strong typing, Type compatibility, Named constants, Variable initialization
T2 2.. By the end of the session student will understand concepts of Strong typing, Type compatibility, Named constants, Variable initialization
CLASS TEST UNIT 31. By the end of the session student will identify concepts of Expressions and StatementsL29
Expressions and Statements: Arithmetic relational and Boolean expressions
T1 2.. By the end of the session student will understand concepts of Expressions and Statements1. By the end of the session student will identify concepts of Short circuit evaluation
L30Short circuit evaluation , mixed mode assignment
T1 2.. By the end of the session student will understand concepts of Short circuit evaluation1. By the end of the session student will identify concepts of Assignment Statements, Control Structures Statement Level, Compound statements
L31
Assignment Statements, Control Structures Statement Level, Compound statements
T1 2.. By the end of the session student will understand concepts of Assignment Statements, Control Structures Statement Level, Compound statements1. By the end of the session student will identify concepts of Selection, Iteration
L32 Selection, Iteration T1 2.. By the end of the session student will understand concepts of Selection, Iteration1. By the end of the session student will identify concepts of Unconditional Statements
L33 Unconditional Statements T1 2.. By the end of the session
student will understand concepts of Unconditional Statements
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 13
1. By the end of the session student will identify concepts of guarded commands-selection, iteration
L34 guarded commands-selection, iteration T1 2.. By the end of the session
student will understand concepts of guarded commands-selection, iteration
CLASS TEST UNIT-21. By the end of the session student will identify concepts of Subprograms and Blocks: Fundamentals of sub-programsL35
Subprograms and Blocks: Fundamentals of sub-programs
T2 2.. By the end of the session student will understand concepts of Subprograms and Blocks: Fundamentals of sub-programs1. By the end of the session student will identify concepts of Scope and lifetime of variable, static scope
L36 Scope and lifetime of variable, static scope T1 2.. By the end of the session
student will understand concepts of Scope and lifetime of variable, static scope1. By the end of the session student will identify concepts of dynamic scopeL37 dynamic scope T1 2.. By the end of the session student will understand concepts of dynamic scope1. By the end of the session student will identify concepts of subprograms and operationsL38
Design issues of subprograms and operations
T1 2.. By the end of the session student will understand concepts of subprograms and operations1. By the end of the session student will identify concepts of Local referencing environmentsL39 Local referencing
environments, T1 2.. By the end of the session student will understand concepts of Local referencing environments1. By the end of the session student will identify concepts of parameter passing methods
III
L40L41
parameter passing methods T1 2.. By the end of the session
student will understand concepts of parameter passing methods
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 14
1. By the end of the session student will identify concepts of overloaded sub-programs ,generic sub-progsL42
overloaded sub-programs ,generic sub-progs
T1 2.. By the end of the session student will understand concepts of overloaded sub-programs ,generic sub-progs1. By the end of the session student will identify concepts of parameters that are sub-program names, design issues for functionsL43
parameters that are sub-program names, design issues for functions
T1 2.. By the end of the session student will understand concepts of parameters that are sub-program names, design issues for functions1. By the end of the session student will identify concepts of user defined overloaded operators, co routines
L44user defined overloaded operators, co routines
T1 2.. By the end of the session student will understand concepts of user defined overloaded operators, co routines
CLASS TEST FOR UNIT-31. By the end of the session student will identify concepts of ADTL45
Abstract Data types: Abstractions and encapsulation
T1 2.. By the end of the session student will understand concepts of ADT1. By the end of the session student will identify concepts of data abstraction, design issuesL46
introductions to data abstraction, design issues
T1 2.. By the end of the session student will understand concepts of data abstraction, design issues1. By the end of the session student will identify concepts of different languages
L47 language examples T1 2.. By the end of the session student will understand concepts of different languages1. By the end of the session student will identify concepts of ADTL48 C++ parameterized
ADT T1 2.. By the end of the session student will understand concepts of ADT1. By the end of the session student will identify concepts of OOPS
IV
L49object oriented programming in small talk ,C++,
T1
2.. By the end of the session
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 15
student will understand concepts of OOPS1. By the end of the session student will identify concepts of Java, C#, Ada 95ConcurrencyL50
,L51
Java, C#, Ada 95Concurrency: Subprogram level concurrency
T2 2.. By the end of the session student will understand concepts of Java, C#, Ada 95Concurrency1. By the end of the session student will identify concepts of ConcurrencyL52
Concurrency: Subprogram level concurrency
T1 2.. By the end of the session student will understand concepts of Concurrency1. By the end of the session student will identify concepts of semaphores, monitors, massage passingL53 semaphores, monitors,
massage passing T1 2.. By the end of the session student will understand concepts of semaphores, monitors, massage passing1. By the end of the session student will identify concepts of Java threads, C# threads
L54 Java threads, C# threads T1 2.. By the end of the session
student will understand concepts of Java threads, C# threads
CLASS TEST UNIT-41. By the end of the session student will identify concepts of EHL55
Exception handling : Exceptions, exception Propagation Exception handler in Ada
T1 2.. By the end of the session student will understand concepts of EH1. By the end of the session student will identify concepts of C++ and JavaL56 C++ and Java T1 2.. By the end of the session student will understand concepts of C++ and Java1. By the end of the session student will identify concepts of LPLL57
Logic Programming Language : Introduction and overview of logic programming
T1 2.. By the end of the session student will understand concepts of LPL1. By the end of the session student will identify concepts of prologL58 basic elements of
prolog, T2 2.. By the end of the session student will understand concepts of prolog
L59 application of logic programming
T1 1. By the end of the session student will identify concepts of LP
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 16
2.. By the end of the session student will understand concepts of LP1. By the end of the session student will identify concepts of FPLL60
Functional Programming Languages: Introduction, fundamentals of FPL
T1R5 2.. By the end of the session
student will understand concepts of FPL1. By the end of the session student will identify concepts of LISP, MLL61 LISP, ML T1
R5 2.. By the end of the session student will understand concepts of LISP, ML1. By the end of the session student will identify concepts of HASKELLL62
HASKELL, Scoping rule in common LISP,ML AND HASKELL,
T1R5 2.. By the end of the session
student will understand concepts of HASKELL1. By the end of the session student will identify concepts of Applications of FPL
L63
Applications of FPL, Comparison of FPL and imperative languages
R5 2.. By the end of the session student will understand concepts of Applications of FPL1. By the end of the session student will identify concepts of Scripting language
L64Scripting language: introduction, Key concepts
R5 2.. By the end of the session student will understand concepts of Scripting language1. By the end of the session student will identify concepts of PYTHON
V
L65 Case study: PYTHON R5 2.. By the end of the session student will understand PYTHON
9.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Course OutcomesCourse Objectives a b c d e
fI H H H H HII H S S SIII H H SIV S S
S=Supportive H=Highly Related KS
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 17
9.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Program OutcomesCourse Outcomes A B C D E F G H I J K L M N
a. S S H S Sb. H S H S Hc. S S S S H S Sd. Se. S S S S H S S
S=Supportive H=Highly Related
9.11 OBJECTIVE BITS
UNIT-11. Which of the following language is widely used for Scientific Applications?
[March 2000] A. ALGOL60 B. COBOL C. LISPD. FORTRAN Answer : C
2. Which of the following languages support Independent Compilation? [ ] [March 2005]A. ADAB. FORTRAN90 C. FORTRAN II to FORTRAN77 D. C++ Answer: C
3. According to Von Neumann architecture, the central feature of imperative Languages is [March2009]A. registers B. variables C. identifiers D. keywordsAnswer: C
4. ________ is the first functional programming language [ ] [March 2011]A. AdaB. LISPC. prolog D. noneAnswer : B
5. The following is the widely used programming language developed for Artificial Intelligence [ ] [March 2007] A. LISP B. FORTRAN C. COBOLD. ALGOL 60Answer : A
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 18
6. What is the post condition for x = 2 * y + 3 { x> 25 } [ ] [March 2005]A. y>11 B. x > 25 C. y > 14 D. y > 13Answer: B
7. Which of the following is a device that can be used to generate the sentences of a ______language? [ ] [March 2013]A. Language generator B. Language recognizersC. Program generator D. Sentence generatorAnswer A
8. When a grammar rule has its LHS also appearing at the beginning of its RHS called [ ] [March 2011]A. Right recursive B. Left recursive C. Recursion D. A&BAnswer B
9. Which attributes are used to pass semantic information up a parse tree [ ] [March 2005] A. Synthesized attributesB. Inherited attributes C. Hirarchial attributes D. None Answer A
10. Which parser trace and build the parse tree in preorder [ ][March 2000]A. Bottom up B. Top downC. Only up D. Up and downAnswer B
11. ________ refers to a collection of tools used in the development of software programs [ ][March 2009]A. Programming EnvironmentB. Programming C. Aliasing D. Environment Answer B
12. An ____ is a logical statement that is assumed to be true[ ] [March 2011]A. Axiom B. Socket C. Stack D. StaticAnswer A
13. The Logical expressions are called [ ] [March 2013]A. Assertions B. Semantics C. Strings
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 19
D. SymbolsAnswer A
14. The abstractions in a BNF description or grammar are often called __________ [ ] [March2014]A. Rules B. Conditions C. Non terminals D. TerminalsAnswer C
15. A Sentence generation is called a ___________ [ ] [March 2006]A. StatementB. Token C. Derivation D. BNFAnswer C
16. The __________ of a language is category of its lexemes [ ] [March 2009]A. StringB. Statements C. TokenD. None of the aboveAnswer C
17. Which of the following is a natural notation for describing syntax [ ] [March 2011]A. Regular grammar B. Automata C. Context-free grammarD. Backus-Naur Form Answer D
18 Which of the following gather the characters of the source program into lexical units [ ] [March 2009]A. Lexical AnalyzerB. Syntax Analyzer C. Parse Tree D. Code Generator Answer A
19. Languages designed on Von Neumann architecture are called as [ ] [March 2005]A. Imperative Languages B. OOPL C. Explicit Languages D. Prolog Language Answer A
20. List of commands put in a file is known as [ ] [March 2000]A. Tag B. Language C. Script D. ProgramAnswer C
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 20
UNIT II1. In c and C++ the asterisk (*) denotes the operation. [ ] [March 2005]
A. dereferencing B. negationC. referencing D. addressAnswer A
2. The ------- of a variable is the time between creation and termination [ ] [March 2009]A. Context B. Scope C. RangeD. Life timeAnswer D
3. The associatively of postfix + + operator in C + + is [ ] [March 2011]A. Right B. depends on expressionC. any order D. LeftAnswer A
4. The following Type compatibility is described in Semantics [ ] [March 2013] A. structuredB. static C. denotionalD. dynamicAnswer B
5. The following type is one in which the variables have arrange of values that consists of memory addresses and a special value nil [ ] [March 2011] A. EnumeratedB. Pointer C. Derived D. Linked ListAnswer B
8. The following language has pointer concept [ ] [March 2009]A. Java B. C++C. DHTML D. HTMLAnswer B
9. The first high level programming to include pointer variables was [ ] [March 2005]A. FortranB. PL/1 C. ALGOL 60 D. ADAAnswer B
10. _____data type specifically available in a language for business applications [March 2000]A. IntB. Double C. Decimal
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 21
D. FloatAnswer C
11. The following type stores values as sequences of characters [ ] [March 2009]A. BooleanB. Float C. IntD. StringAnswer D
12. __________is the first functional programming language [ ] [March 2011]A. ADAB. LISP C. PROLOG D. NoneAnswer B
13. A _________is a type whose variables are allowed to store different type values in same memory [ ] [March 2009]A. RecordB. Union C. Associative array D. ArrayAnswer B
14. Dynamic type checking allowed in [ ] [March 2010]A. C B. PHP C. JAVA SCRIPT D. B&CAnswer D
15. Variables that are dynamically allocated from the heap is called [ ] [March 2013] A. Static VariablesB. Dynamic variables C. Heap dynamic variables D. A&BAnswer C
16. The following language does not use the equals sign for assignment operator [ ] [March2012]A. ALGOL 6 0 B. C C. BAS CD. C++Answer A
17. In FORTRAN 90, Loop parameters are evaluated [ ] [March 2011]A. Thrice B. Only once C. Twice D. Every timeAnswer B
18. Logical expressions are called [ ] [March 2009]A. Axioms B. Conditions C. Assertions
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 22
D. SubjectsAnswer C
19. The equality operator in Fortran95 is _______________. [ ] [March 2005]A. EQ B. EQUALC. == D. NoneAnswer A
20 __________ is bound to value only once [ ] [March 2000]A. Static variable B. Dynamic variable C. Named constantD. Both (a) & (b)Answer C
UNIT III1. The first actual parameteris bound to the first formal parameter and so forth,
such parameters are called POSITIONAL PARAMETERS.[March 2000]2. An OVERLOADED SUBPROGRAM is one that has the same name as another
subprogram in the same referencing environment. [March 2005] 3. A GENERIC sub program is one whose computation can be done on data of different
types in different calls. [March 2009] 4. The three semantic models are IN MODE, OUT MODE, INOUT MODE. 5. C uses PASS-BY-VALUE and pass-by-reference semantics is achieved by using
POINTERS as parameters. [March 2011] 6. An OVERLOADED SUBPROGRAM is a subprogram that has the same name as
another subprogram in the same referencing environment. [March 2009] 7. The invocation of a co routine is called a RESUME. [March 2010] 8. Only one processor but all of the executing programs in such a system appear to run
concurrently, while sharing the process this is called as QUASI-CONCURRENCY. [March 2011]
9. A POLYMORPHIC subprogram takes parameters of different types on different activations. [March 2005]
10. Overloaded subprograms provide a particular kind of polymorphism called AD HOC POLYMORPHISM. [March 2000]
11. Block concept was introduced by [ ] [March 2009] A. Fortran B. ALGOL60C. PL/ID. ADAAnswer B
12. Multiple selector statement in C is [ ] [March 2013]A. Case B. Switch C. Go ToD. ContinueAnswer C
13. Parameters in subprogram header are called [ ] [March 2012]A. Formal Parameters B. Actual Parameters
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 23
C. Local VariablesD. Global Variables Answer A
14. Loop.. end loop is used in [ ] [March 2010]A. FORTRAN B. PASCAL C. ADAD. CAnswer C
15. In FORTRAN , global variables are [ ] [March 2009]A. COMMON B. GLOBAL C. STATIC D. REGISERSAnswer A
16. In Ada, call-by-value parameter passing mechanism can be identified using [ ] [March 2013]A. Out B. In out C. In D. None of the aboveAnswer C
17. In C, arrays are passed as parameters using [ ] [March 2012]A. Call-by-value B. Call-by-referenceC. Call-by-nameD. Call-by-resultAnswer B
18. Elseif is used in [ ] [March 2011]A. ALGOL60 B. FORTRAN C. PL/ID. ADAAnswer D
19. In FORTRAN 77, the default parameter passing mechanism is [ ] [March 2009]A. Call-by-value B. Call-by-referenceC. Call-by-nameD. Call-by-resultAnswer B
20. Down to is used in the for loop of the following language [ ] [March 2000]A. FORTRAN B. PASCAL C. AdaD. C++Answer B
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 24
UNIT-IV1. An ABSTRACTION is a view or representation of an entity that includes only the
most significant attributes. [March 2000] 2. The concept of PROCESS ABSTRACTION is the oldest in programming language
design. [March 2005] 3. An instance of an abstract data type is called an OBJECT. [March 2009] 4. The concept of data abstraction had its origins in SIMULA 67. [March 2005] 5. The encapsulating constructs in ADA are called PACKAGES. [March 2011] 6. Package that provides interface of the encapsulation is called SPECIFICATION
PACKAGE. [March 2012] 7. Package which provides implementation of entities in specification package are called
BODY PACKAGE. [March 2013] 8. Data defined in C++ class are called DATA MEMBERS and the functions defined in a
class are called MEMBER FUNCTIONS. [March 2011] 9. Heap-Dynamic class objects are created with the NEW operator and destroyed with the
DELETE operator. [March 2005] 10. Object oriented programming has its roots in SIMULA 67. [March 2000] 11. The special processing that may be required when an exception is detected is called
EXCEPTION HANDLING. [March 2009] 12. In some situations it is necessary to complete some computations regardless of how
subprogram execution terminates such a computation is called FINALIZATION. [March 2013]
13. The java system includes two predefined exception classes that are subclasses of Throwable, ERROR and EXCEPTION. [March 2009]
14. Programming that uses a form of symbolic logic as a programming language is called LOGIC PROGRAMMING. [March 2011]
15. The form of implementation of prolog is sometimes called as EDINBURGH SYNTAX. [March 2012]
16. The first implementation of Edinburg syntax is done on DEC system10. [March 2014] 17. All the statements in prolog are constructed from TERM. [March 2011] 18. In rule statement the left part representing then statement is called CONSEQUENT
where as if part at the right side is called the ANTECEDENT. [March 2009] 19. PROPOSITIONS are the logical statements that may evaluate either true or false.
[March 2005] 20. Queries in prolog are called GOALS, when a goal is a composite proposition its facts
are called SUBGOALS. [March 2000]
UNIT-V1. In FPL a mathematical function is a plot between members of two sets called
DOMAIN SET and RANGE SET. [March 2000] 2. A method called as the Lambda notation is used for defining NAMELESS functions. 3. (car L)= (car(car L)). [March 2005]4. Original LISP contains two types of data ATOMS and LISTS. [March 2009] 5. ML has EXCEPTION HANDLING and a MODULE facility for implementing
abstract data types. [March 2011] 6. ML is a STRONGLY typed language. [March 2010] 7. Haskell uses NON STRICT semantics. [March 2011] 8. ML uses STRICT SEMANTICS. [March 2009] 9. HASKELL is designed by THOMPSON 1999. [March 2005]10. In LISP ,function calls are specified using [ ] [March 2000]
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 25
A. Postfix B. Cambridge PolishC. Infix D. Reverse PolishAnswer B
11. In the original LISP the number of data types available was [ ] [March 2011]A. 1B. 2 C. 3D. 4Answer B
12. CAR in LISP returns the following element of a list [ ] [March 2010]A. First B. LastC. Tail D. SecondAnswer A
13. Following is the keyword used to defina a function in LISP [March 2012]A. FUNB. DEFINEC. CARD. LISTAnswer B
14. Function declaration in ML can be done using the keyword [ ] [March 2013]A. FUNCTION B. PROCEDURE C. DEFINED. FUNAnswer D
15. The method of defining infinite lists in Haskell is [ ] [March 2014]A. Linked ListB. Lambda Expression C. List Comprehension D. Not PossibleAnswer C
16. For logic programming, following symbolic logic is used [ ] [March 2011]A. IntegrationB. Relational Algebra C. Relational CalculusAnswer C
17. A function is [ ] [March 2011]A. Parameter B. Function Symbol C. Compound Term D. NoneAnswer B
18. “implies” logical connections is represented using [ ] [March 2009] A. CB. „E C. E‟
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 26
D. ø Answer B
19. CDR in LISP returns the following element of a list [ ] [March 2005] A. Last and first elements B. Last but one element C. remainder of a given list after CAR is removed D. Entire list except the last elementAnswer C
20. Which of the following are scripting languages [ ] [March 2000]A. HTML B. C C. ADA D. COBOLAnswer A
9.12 TUTORIAL QUESTIONSPART-A (SHORT ANSWER QUESTIONS)
S. No QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT –I1. Define Programming Language. Knowledge a2. Difference between sentence and sentential form. Analysis b3. Define Syntax and Semantics. Knowledge a4. Differentiate between Syntax and Semantics. Analysis b5. Write BNF notation for i) For loop ii) if-else condition Synthesis c6. Give grammars for simple assignment statements. Comprehension c7. Give an un ambiguous grammar for if-then-else. Comprehension c8. Define Parse trees. Knowledge a9. Define Denotational semantics. Knowledge a10. Define Operational semantics. Knowledge a11. Define Axiomatic semantics. Knowledge a12. Differentiate compiler and interpreter. Analysis b13. Describe language recognizers. Knowledge a14. Describe generators. Knowledge a15. Distinguish simplicity and orthogonally Comprehension c
UNIT –II1. Distinguish static and dynamic scoping. Comprehension c2. Define associative arrays. Knowledge a3. Define guarded commands? Knowledge a4. Distinguish named type and structure type compatibility. Comprehension c5. List the merits of sub range types. Knowledge a6. Differentiate union and enumeration. Analysis b7. Define data type. Knowledge a8. List the merits of type checking. Knowledge a9. Define user defined data type. Knowledge a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 27
10. Define widening and narrowing conversions? Knowledge aUNIT –III
1. Define scope and lifetime of a variable. Knowledge a2. Differentiate shallow and deep binding. Analysis b3. Define subprogram. Knowledge a4. Define procedures. Knowledge a5. Define local referencing environment. Knowledge a6. Differentiate static and dynamic binding. Analysis b
UNIT –IV1 Define an exception. Knowledge a2 Define a thread. Knowledge a3 Define concurrency. Knowledge a4 Define binary semaphore. Knowledge a5 Define monitors. Knowledge a6 Define mutual exclusion. Knowledge a7 Define deadlock. Knowledge a8 Define an abstract data type. Knowledge a9 Define logic programming language. Knowledge a
10 Define data abstraction. Knowledge aUNIT –V
1 Give the meaning of lazy evaluation mean. Comprehension c2 Define procedural abstraction. Knowledge a3 List few characteristics of Python language. Knowledge a4 Define functional language. Knowledge a5 Define imperative language. Knowledge a6 Give the meaning of scripting language. Comprehension c7 List few examples of scripting languages. Knowledge a8 List keywords of Python language. Knowledge a9 List data types of Python language. Knowledge a
10 Define the term separate compilation in Python. Knowledge a
PART – B LONG ANSWER QUESTIONS
S.No Question Blooms
Taxonomy LevelCourse
OutcomeUNIT –I
1. Discuss language evaluation criteria and the characteristics that affect them. Comprehension c
2. List the potential benefits of studying programming language concept. Knowledge a
3. Explain syntax of a “for” statement in PASCAL using BNF notation and syntax graphs.
Comprehension, Synthesis, Evaluation
b/c/d
4. Explain syntax of declaration statement in PASCAL using BNF notation and syntax graphs.
Comprehension, Synthesis, Evaluation
b/c/d
5.
Compute the weakest precondition for each of the following simple assignment statements and post conditions.a=2*(b-1)-1{a>0}b=(c+10)/3 {b>6}
Application e
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 28
a=a+2*b-1 {a>1}X=2*y+x-1 {x>11}
6. Write BNF notation for following:a)For loop b)If-else condition c)Structure definition
Application, Synthesis d/e
7
Define left most derivation. Prove that the following grammar is ambiguous.<program>->begin<stmt_list>end<stmt_list>-><stmt>|<stmt>;<stmt_list><stmt>-><var>=<expression><var>-> A|B|C<expression>-><var>+<var>|<var>-<var>|<var>
Knowledge a
8
State the given grammar is ambiguous.<assign> -><id>=<expr><id>->A|B|C<expr>-><expr>+<expr>|<expr>*<expr>|(<expr>)|<id>
Knowledge a
9 List the three general methods of implementing a programming language. Knowledge a
10 Explain different aspects of the costs of a programming language.Comprehension,
Synthesis, Evaluation
b/c/d
UNIT –II1. Define heterogeneous array. Discuss the design issues of arrays. Knowledge a
2. Explain in detail the design issues of arithmetic expressions.Comprehension,
Synthesis, Evaluation
b/c/d
3. Discuss structural and name equivalence for types. Give an example of a language used for each approach. Comprehension c
4. Define a variable and what the attributes of a variable are. Elaborate on address of a variable. Knowledge a
5. Write a note on Boolean and relational expressions. Application, Synthesis d/e
6. Explain the different types of relational operators used in C, Ada and Fortran 95.
Comprehension, Synthesis, Evaluation
b/c/d
7 What are the advantages and disadvantages of mixed mode arithmetic expressions? 6
8Define array and record. Classify arrays based on storage allocation. What are the advantages and disadvantages of allocation memory during compilation time and run time.
Knowledge a
9 Define static, fixed stack dynamic, stack dynamic, fixed heap dynamic and dynamic arrays. What are the advantages of each? Knowledge a
10 List the design issues of pointers. Explain. Knowledge aUNIT –III
1.Define subprograms. What are the advantages of subprograms? Explain different methods of parameter passing mechanisms to subprograms.
Knowledge a
2. Explain the design issues of subprograms.Comprehension,
Synthesis, Evaluation
b/c/d
3 Discuss about procedures and functions in subprograms. Comprehension c
4 Define shallow and deep binding for referencing environment of subprograms that have been passed as parameters. Knowledge a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 29
5 Discuss with suitable examples static and dynamic scope. Knowledge a6 Discuss generic subprograms in C++. Comprehension c
7 Explain about Co routines.Comprehension,
Synthesis, Evaluation
b/c/d
8. Discuss generic subprograms in java. Comprehension c9. Discuss the importance of Co routines of Lua language. Comprehension c10. Discuss the importance of generic subprograms. Comprehension c
UNIT –IV
1. Describe how exception is handled in ADA with an example.Knowledge,
Comprehension, Evaluation
c
2. Describe briefly about Semaphores.Knowledge,
Comprehension, Evaluation
c
3. Describe briefly about Monitors.Knowledge,
Comprehension, Evaluation
d
4. Discuss Object Oriented Programming in SMALLTALK. Comprehension c
5. Write about goal statements and simple arithmetic in PROLOG. Application, Synthesis d/e
6. Define binary semaphore. What is counting semaphore? What are the primary problems with using semaphores to provide synchronization? Knowledge a
7
Explain the following terms:• process synchronization• race condition• binary semaphores• MIMD
Comprehension, Synthesis, Evaluation
b/c/d
8 Explain different types of propositions present in logic programming.Comprehension,
Synthesis, Evaluation
d
9 Describe the cooperation synchronization and competition synchronization in message passing.
Knowledge, Comprehension,
Evaluationd
10 Discuss how dining philosopher’s problem and producer consumer problem are solved using concurrency in Ada. Comprehension c
UNIT – V
1 Write about control constraints in Python. Application, Synthesis d/e
2 Write about data abstraction in Python. Application, Synthesis d/e
3 Write about data types and structures of LISP and LISP interpreter. Application, Synthesis d/e
4 List the ways in which ML is significantly different from scheme. Knowledge a
5 Describe the scoping rule in common LISP, ML and HASKELL.Knowledge,
Comprehension, Evaluation
c
6 Explain the characteristics of scripting languages.Comprehension,
Synthesis, Evaluation
c
7 Discuss in detail about the python primitive types. Comprehension c
8 Explain about LISP functional programming language.Comprehension,
Synthesis, Evaluation
b
9 Discuss and trace the Python code to find the factorial of a number. Comprehension c
10 Discuss and trace the Python code to print the Fibonacci series between the given ranges of numbers. Comprehension c
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 30
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S.No Questions
Blooms Taxonomy
Level
Course Outcome
UNIT –I
1Give some reasons why computer scientist and professional software developers should study general concepts of language design and evaluation.
Comprehension c
2 Write reasons for the statement: “Exception handling is very important, but often neglected by programming languages”.
Application,Synthesis d/e
3
Write reasons for the statement: “A programming language can be compiled or interpreted”. Give relative advantages and disadvantages of compilation and interpretation. Give examples of compiled and interpreted languages.
Application,Synthesis d/e
UNIT – II
1 List what advantages does java’s break statement have over C’s and C++’s break statement. Knowledge A
2 State whether static binding is more reliable or dynamic binding. Explain why. Knowledge A
UNIT –III
1. Compare the parameter passing mechanisms of ALGOL and ADA. Analysis ,Evaluation c/d
2. State the importance of Local Referencing Environments with suitable examples. Knowledge A
3. Discuss about different parameter passing methods of Ada language. Comprehension C
UNIT –IV
1.Discuss the reasons for using exception handlers in a programming language. What if there exist programming languages with no exception handlers.
Comprehension C
2. Give the sample code to factorial of a number in PROLOG language. Comprehension C
3. Sketch the importance of logic programming languages over functional programming languages. Understand A
UNIT –V
1. Write features of Haskell that makes very different from schema. Application,Synthesis d/e
2. List the ways in which ML is significantly different from scheme. Knowledge A
3. Prove the advantages of Python scripting language over other scripting Languages Understand A
4. Give example of Python code to find the roots of quadratic equation Comprehension C
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 31
9.13 ASSIGNMENT QUESTIONSPART – A (SHORT ANSWER QUESTIONS)
S.No Questions
BloomsTaxonomy
Level
CourseOutcome
UNIT –I1 Define Programming Language. Knowledge A
2 Difference between sentence and sentential form. Analysis B3 Define Syntax and Semantics. Knowledge A4 Differentiate between Syntax and Semantics. Analysis A5 Write BNF notation for i) Forloop ii) if-else condition Synthesis B6 Give grammars for simple assignment statements. Comprehension C7 Give an un ambiguous grammar for if-then-else. Comprehension C8 Define Parse trees. Knowledge A9 Define Denotational semantics. Knowledge A
10 Define Operational semantics. Knowledge A11 Define Axiomatic semantics. Knowledge A12 Differentiate compiler and interpreter. Analysis B13 Describe language recognizers. Knowledge A14 Describe generators. Knowledge A
15 Distinguish simplicity and orthogonality Comprehension CUNIT –II
1 Distinguish static and dynamic scoping. Comprehension C2 Define associative arrays. Knowledge A3 Define guarded commands? Knowledge A4 Distinguish named type and structure type compatibility. Comprehension C5 List the merits of sub range types. Knowledge A6 Differentiate union and enumeration. Analysis B7 Define data type. Knowledge a8 List the merits of type checking. Knowledge a9 Define user defined data type. Knowledge a
10 Define widening and narrowing conversions? Knowledge aUNIT –III
1 Define scope and lifetime of available Knowledge a2 Differentiate shallow and deep binding. Analysis b3 Define subprogram. Knowledge a4 Define procedures. Knowledge a5 Define local referencing environment. Knowledge a6 Differentiate static and dynamic binding. Analysis b
UNIT –IV1 Define an exception. Knowledge a2 Define a thread. Knowledge a3 Define concurrency. Knowledge a4 Define binary semaphore. Knowledge a5 Define monitors. Knowledge a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 32
6 Define mutual exclusion. Knowledge a7 Define deadlock. Knowledge a8 Define an abstract data type. Knowledge a9 Define logic programming language. Knowledge a
10 Define data abstraction. Knowledge aUNIT –V
1 Give the meaning of lazy evaluation mean. Comprehension c2 Define procedural abstraction. Knowledge a3 List few characteristics of Python language. Knowledge a4 Define functional language. Knowledge a5 Define imperative language. Knowledge a6 Give the meaning of scripting language. Comprehension c7 List few examples of scripting languages. Knowledge a8 List keywords of Python language. Knowledge c9 List data types of Python language. Knowledge c
10 Define the term separate compilation in Python. Knowledge c
PART – B (LONG ANSWER QUESTIONS)
S. No QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT –I1 Discusslanguageevaluationcriteriaandthecharacteristicsthataffect them. Comprehension c2 List the potential benefits of studying programming language concept. Knowledge a
3 Explain syntax of a “for” statement in PASCAL using BNF notation and syntax graphs.
Comprehension, Synthesis, Evaluation
b/c/d
4 Explain syntax of declaration statement in PASCAL using BNF notation and syntax graphs.
Comprehension, Synthesis, Evaluation
b/c/d
5
Compute the weakest pre condition for each of the following simple assignment statements and post conditions.a=2*(b-1)-1{a>0} b=(c+10)/3{b>6}a=a+2*b-1 {a>1} X=2*y+x-1{x>11}
Application e
6 Write BNF notation for following: a) For loop b)If-else condition c) Structure definition
Application,
Synthesise/b
7
Define left most derivation. Prove that the following grammar is ambiguous.<program>->begin<stmt_list>end<stmt_list>-><stmt>
|<stmt>;<stmt_list><stmt>-><var>=<expression><var>->A|B|C<expression>-><var>+<var>
|<var>-<var>|<var>
Knowledge a
8 State the given grammar is ambiguous.<assign>-><id>=<expr> Knowledge a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 33
<id>->A|B|C<expr>-><expr>+<expr>
|<expr>*<expr>|(<expr>)|<id>
9 List the three general methods of implementing a programming language. Knowledge a
10 Explain different aspects of the costs of a programming language.Comprehension, Synthesis, Evaluation
b/c/d
UNIT –II1 Define heterogeneous array. Discuss the design issues of arrays. Knowledge a
2 Explain in detail the design issues of arithmetic expressions.Comprehension, Synthesis, Evaluation
b/c/d
3 Discuss structural and name equivalence for types. Give an example of a language used for each approach. Comprehension c
4 Define a variable and what the attributes of a variable. Elaborate on address of a variable. Knowledge a
5 Write a note on Boolean and relational expressions.Applicatio
n, Synthesis
e/b
6 Explain the different types of relational operators used in C, Ada and Fortran 95.
Comprehension, Synthesis, Evaluation
b/c/d
7 What are the advantages and disadvantages of mixed mode arithmetic expressions? Knowledge a
8Define array and record. Classify arrays based on storage allocation. What are the advantages and disadvantages of allocation memory during compilation time and runtime?
Knowledge a
9 Define static, fixed stack dynamic, stack dynamic, fixed heap dynamic and dynamic arrays. What are the advantages of each. Knowledge a
10 List the design issues of pointers. Explain. Knowledge aUNIT –III
1 Define sub programs. What are the advantages of sub programs? Explain different methods of parameter passing mechanisms to sub programs. Knowledge a
2 Explain the design issues of subprograms.Comprehension, Synthesis, Evaluation
b/c/d
3 Discuss about procedures and functions in sub programs. Comprehension c
4 Define shallow and deep binding for referencing environment of subprograms that have been passed as parameters. Knowledge a
5 Discuss with suitable examples static and dynamic scope. Knowledge a6 Discuss generic subprograms in C++. Comprehension c
7 Explain about Co routines.Comprehension, Synthesis, Evaluation
b
8 Discuss generic subprograms in java. Comprehension c9 Discuss the importance of Co routines of a language. Comprehension c10 Discuss the importance of generic sub programs. Comprehension c
UNIT –IV
1 Describe how exception is handled in ADA with an example.Knowledge,
Comprehension, Evaluation
c
2 Describe briefly about Semaphores. Knowledge, Comprehensio c
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 34
n, Evaluation
3 Describe briefly about Monitors.Knowledge,
Comprehension, Evaluation
c
4 Discuss Object Oriented Programming in SMALL TALK. Comprehension c
5 Write about goal statements and simple arithmetic in PROLOG.Applicatio
n, Synthesis
e/b
6 Define binary semaphore. What is counting semaphore? What are the primary problems with using semaphores to provide synchronization? Knowledge a
7
Explain the following terms:• Process synchronization• race condition• binary semaphores• MIMD
Comprehension, Synthesis, Evaluation
d
8 Explain different types of propositions presenting logic programming.Comprehension, Synthesis, Evaluation
d
9 Describe the cooperation synchronization and competition synchronization in message passing.
Knowledge, Comprehension, Evaluation
c
10 Discuss how dining philosopher’s problem and producer consumer problem are solved using concurrency in Ada. Comprehension c
UNIT –V
1 Write about control constraints in Python. Application, Synthesis d/e
2 Write about data abstraction in Python. Application, Synthesis d
3 Write about data types and structures of LISP and LISP interpreter. Application, Synthesis d
4 List the ways in which ML is significantly different from scheme. Knowledge a
5 Describe the scoping rule in common LISP, ML and HASKELL.Knowledge,
Comprehension,Evaluation d
6 Explain the characteristics of scripting languages.Comprehension, Synthesis, Evaluation d
7 Discuss in detail about the python primitive types. Comprehension d
8 Explain about LISP functional programming language.Comprehension, Synthesis, Evaluation c
9 Discuss and trace the Python code to find the factorial of a number. Comprehension b
10 Discuss and trace the Python code to print the Fibonacci series between the given ranges of numbers. Comprehension b
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S.No Question
Blooms Taxonomy
Level
Course Outcome
UNIT –I
1Give some reasons why computer scientist and professional software developers should study general concepts of language design and evaluation.
Comprehension d
2 Write reasons for the statement: “Exception handling Is very important, but often neglected by programming languages”.
Application,Synthesis c
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 35
3
Write reasons for the statement: “A programming language can be compiled or interpreted”. Give relative advantages and disadvantages of compilation and interpretation. Give examples of compiled and interpreted languages.
Application,Synthesis c
UNIT –II
1 List what advantages does java’s break statement have over C’s andC++’s break statement. Knowledge b
2 State whether static binding is more reliable or dynamic binding. Explain why. Knowledge b
UNIT –III
1 Compare the parameter passing mechanisms of ALGOL and ADA. Analysis , Evaluation c
2 State the importance of Local Referencing Environments with suitable examples. Knowledge b
3 Discuss about different parameter passing methods of Ada language. Comprehension cUNIT –IV
1Discuss the reasons for using exception handlers in a programming language. What if there exist programming languages with no exception handlers.
Comprehension b
2 Give the sample code to factorial of a number in PROLOG language. Comprehension c
3 Sketch the importance of logic programming languages over functional programming languages. Understand d
UNIT –V
1 Write features of Haskell that makes very different from schema. Application, Synthesis b
2 List the ways in which ML is significantly different from scheme. Knowledge c
3 Prove the advantages of Python scripting language over other scripting languages Understand d
4 Give example of Python code to find the roots of quadratic equation Comprehension c
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 36
10. LINUX PROGRAMMING (A10520)
10.0 COURSE DESCRIPTION
Course Title LINUX PROGRAMMINGCourse Code A10520Regulations MLR-15
Lectures Tutorials Practical’s CreditsCourse Structure
4 - - 4Course Coordinator T Chandra Shakar Reddy Assoc Professor CSE
Team of Instructors Mr Dayakar Reddy Assoc. Professor/Mrs Prameela Asst.Professor/Mr.Amarendar Reddy Assoc. Professor CSE
10.1 COURSE OVERVIEW:
This course explains the fundamental ideas behind the open source operating system approach to programming. Knowledge of Linux helps to understand OS level programming. Like the successful computer languages that came before, Linux is the blend of the best elements of its rich heritage combined with the innovative concepts required by its unique environment. This course involves kernel concepts, basics commands, shell scripting, file processing ,Socket programming ,multithreading, Processes, Inter process communication. This course is presented to students by power point projections, course handouts, lecture notes, course handouts, assignments, objective and subjective tests
10.2 PREREQUISITES:
Level Credits Periods/Weeks PrerequisitesUG 3 5 UNIX, AND NETWORK PROGRAMMING
10.3. MARKS DISTRIBUTION:
Session Marks University EndExam Marks Total Marks
Mid Semester TestThere shall be two midterm examinations.Each midterm examination consists of subjective type and objective type tests.The subjective test is for 10 marks of 60 minutes duration.Subjective test of shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.AssignmentFive marks are earmarked for assignments.There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.
75 100
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 37
10.4 EVALUATION SCHEME:
S. No Component Duration Marks1 I Mid Examination 90minutes 202 I Assignment 53 II Mid Examination 90minutes 204 II Assignment 55 External Examination 3 hours 75
COURSE OBJECTIVES:
I. To teach principles of operating system including File handling utilities, Security by file permissions, Process utilities, Disk utilities, Networking Commands, Basic Linux commands, Scripts and filters.
II. To familiarize fundamentals of the Bourne again shell (bash), shell programming, pipes, input and output redirection Control structures, arithmetic in shell interrupt processing, functions, debugging shell scripts.
III. To impart fundamentals of file concepts kernel support for file, File structure related system calls (file API‘s).
IV. To facilitate students in understanding Inter process communication. V. To facilitate students in understanding semaphore and shared memory.
VI. To facilitate students in understanding multithreading and process.
10.5 COURSE OUTCOMES:Upon successful completion of the course, the student should be familiar with and be able to:
a. Ability to use various Linux commands that are used to manipulate system operations at admin level and a prerequisite to pursue job as a Network administrator.
b. Ability to write Shell Programming using UNIX commands. c. Ability to design and write application to manipulate internal kernel level Linux File
System. d. Ability to develop IPC-API‘s that can be used to control various processes for
synchronization. e. Ability to develop Network Programming that allows applications to make efficient
use of resources available on different machines in a network.
10.6 HOW PROGRAM OUTCOMES AREASSESSED:
Program Outcomes Level Proficiency assessed by Blooms Level
A
An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.(Fundamental engineering analysis skills).
HSolving Gate and Text book Problems
Apply
BAn ability to design and conduct engineering experiments, as well as to analyze and interpret data. (information retrieval skills).
SSolving Gate and Text book Problems
Apply
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 38
CAn ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. (Creative skills).
H Assignment andGate questions
Apply andAnalyze
DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. (team work)
S Mini and Micro Projects Apply
E
An ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.(Engg. Problem solving Skills)
SMicro Project Models/ Gate questions
Apply
F An understanding of professional, social and ethical responsibility N ------- --------
G
An ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements. (Engg. Application Skills)
SMicro Projects models / Gate questions
Analyze and Justify
HThe broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.
H Assignment andGate questions Analyze
I
Graduate will develop confidence for self education and acquire new knowledge in the computing discipline and ability and practice for Multidisciplinary tasks as a member within the teams
S Class Test & Seminars Analyze
J To communicate effectively S Seminars Understand & Analyze
K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. S
Class Tests & Group Activity inclass room
Apply
LGraduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc.(Continuing Education )
H GATE Apply
M
The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.
SText Book Problems as part of Assignment
Apply
N An ability to setup an enterprise.(Employment Skills) S Placement Design and Develop
10.7 SYLLABUS
UNIT - I INTRODUCTION TO LINUX AND LINUX UTILITIES: A brief history of LINUX, architecture of LINUX, features of LINUX, introduction to vi editor. Linux commands- PATH, man, echo, printf, script, passwd, uname, who, date, stty, pwd, cd, mkdir, rmdir, ls, cp, mv, rm, cat, more, wc, lp, od, tar, gzip, file handling utilities, security by file permissions, process utilities, disk utilities, networking commands, unlink, du, df, mount, umount, find, unmask, ulimit, ps, w, finger, arp, ftp, telnet, rlogin.Text processing utilities and backup utilities , detailed commands to be covered are tail, head , sort, nl, uniq, grep, egrep, fgrep, cut, paste, join, tee, pg, comm, cmp, diff, tr, awk, cpio
UNIT - II Introduction to Shells: Linux Session, Standard Streams, Redirection, Pipes, Tee Command, Command Execution, Command-Line Editing, Quotes, Command Substitution, Job Control,
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 39
Aliases, Variables, Predefined Variables, Options, Shell/Environment Customization. Filters: Filters and Pipes, Concatenating files, Display Beginning and End of files, Cut and Paste, Sorting, Translating Characters, Files with Duplicate Lines, Count Characters, Words or Lines, Comparing Files.
UNIT - III Grep: Operation, grep Family, Searching for File Content.Sed :Scripts, Operation, Addresses, commands, Applications, grep and sed.FILE STRUCTURE: Introduction to UNIX file system, inode (Index Node), file descriptors, system calls and device drivers, File Management :File Structures, System Calls for File Management – create, open, close, read, write, lseek, link, symlink, unlink, stat, fstat, lstat, chmod, chown, Directory API – opendir, readdir, closedir, mkdir, rmdir, umask.
UNIT - IV PROCESS AND SIGNALS: Process, process identifiers, process structure: process table, viewing processes, system processes, process scheduling, starting new processes: waiting for a process, zombie processes, fork, vfork, exit, wait, waitpid, exec, signals functions, unreliable signals, interrupted system calls, kill, raise, alarm, pause, abort, system, sleep functions, signal sets. Filelocking: creating lock files, locking regions, use of read and write with locking, competing locks, other lock commands, deadlocks.
UNIT - V INTER PROCESS COMMUNICATION: Pipe, process pipes, the pipe call, parent and child processes, and named pipes: fifos, semaphores: semget, semop, semctl, message queues: msgget, msgsnd, msgrcv, msgctl, shared memory: shmget, shmat, shmdt, shmctl, ipc status commands. INTRODUCTION TO SOCKETS: Socket, socket connections - socket attributes, socket addresses, socket, connect, bind, listen, accept, socket communications.
TEXT BOOKS: 1. W. Richard. Stevens (2005), Advanced Programming in the UNIX Environment, 1st
edition, Pearson Education, New Delhi, India. 2. UNIX and shell Programming Behrouz A. Forouzan, Richard F. Gilberg. Thomson.
REFERENCES: 1. Linux System Programming, Robert Love, O’Reilly, SPD. 2. Advanced Programming in the UNIX environment, 2nd Edition, W.R. Stevens,
Pearson Education. 3. UNIX Network Programming, W.R. Stevens, PHI. 4. UNIX for Programmers and Users, 3rd Edition, Graham Glass, King Ables, Pearson
Education.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 40
10.8 COURSE PLAN:The course plan is meant as a guideline. There may probably be changes
S.No
Course LearningOutcomes
LectureNo.
BloomsLevel Topics to be covered Reference
1 Classify history of Linux and Its features 1-2 Apply
[Level 3]
A brief history of Linux, architecture of Linux, features of Linux http://nptel.ac.in/courses/117106113/1
T2: Ch 1.1, 2.1-2.2
R7 Ch1.1,1.2
2Examine system level scripts to create and manage simple file processing operations.
3-4 Evaluate[Level 5]
Linux utilities-File handling utilities, Security by file permissions http://nptel.ac.in/courses/117106113/1 http://nptel.ac.in/courses/117106113/2
T2: Ch4.7-4.8,5.3-5.4
R7 Ch 3 &4
3 Evaluate manipulating of information. 5-6 Understand
[Level 2]
Process utilities, disk utilities, Networking commands, Filters http://nptel.ac.in/courses/117106113/2 http://nptel.ac.in/courses/117106113/3 http://nptel.ac.in/courses/117106113/4
T2:Ch3.10,15.6,17.5-17.6
R7 Ch6
4 Determine restoring and retrieving text. 7-8 Evaluate
[Level 5]
Text processing utilities, Backup Utilitieshttp://nptel.ac.in/courses/117106113/4
T2: Ch12.3-12.9,15.9-
15.10R7 Ch3,10
5 Apply two data buffers: the active pattern space. 9-10 Apply
[Level 3]
sed– scripts, operation, addresses, commands, applications http://nptel.ac.in/courses/117106113/4
T2:Ch 13.4
R7 Ch11
6Distinguish pattern scanning and processing in problem solving.
11-12 Understand[Level 2]
awk– execution, fields and records, scripts, operation, patterns, actions, Functions, using system commands in a wk. http://nptel.ac.in/courses/117106113/7 http://nptel.ac.in/courses/117106113/4
T2: Ch18.1-18.12
R7 Ch12
7 Classify basic shell scripting. 13-14 Create[Level 6]
Working with the Bourne again shell(bash): introduction, shell responsibilities, pipes and input Redirection, output redirection
T2: Ch8.5
R7 Ch5.3,5.4,5.5
8 Understand shell script execution. 15 Apply
Level 3 Documents, running a shell script T2:Ch14.14
9 Classify the use of special characters. 16 Understand
[Level 2]
The shell as a programming language,shell meta characters, filename substitution
T2:Ch8.9
10Apply forwarding the command output into another context
17-18 Understand[Level 2]
Shell command substitution, shell commands, environment, quoting, test
command, control structures
T2:Ch 8.4,8.10
R7 Ch5.8,5.9
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 41
11 Convert solutions to complex tasks. 19-20 Understand
[Level 2]
Arithmetic in shell, shell script examples, interrupt processing, functions, debugging shell scripts.
T2:14.5-14.17
12 Demonstrate the use of the formatting specifies of I/O. 21 Apply
[Level 3]
Files: File Concept, files system structure, Inodes, file attributes, file types, library functions http://nptel.ac.in/courses/117106113/4
R4:4.1-4.14
13Create standard stream and buffer based input and output system calls.
22-23 CreateLevel 6
The standard I/O (fopen, fclose, fflush, fseek, fgetc, getc, getchar, fputc, putc, putchar, fgets, getsetc.)
R4:5.1-5.9
14 Determine layout of what's being printed. 24 Evaluate
[Level 5]
Formatted I/O, stream errors, kernel support for fileshttp://nptel.ac.in/courses/117106113/4
R4:5.10-5.11
15 Explain modification and editing. 25-26 Understand
[Level 2]
File descriptors ,low level file access open, create, read, write, close, lseek, stat family,umask,dup,dup2http://nptel.ac.in/courses/117106113/4
R4:3.1-3.12,4.2
16 Demonstrate security concepts in files. 27-28 Explain
[Level 2] fcntl, file and record locking R4:3.13
17 Create scanning and linking methods. 29-30 Create
[Level 6]
File and directory management- Directory file APIs, symbolic links and hard links. http://nptel.ac.in/courses/117106113/7
R4:4.20-4.22,4.15-4.17
18 Evaluate internal procedures and states of IPC 31-32 Evaluate
[Level 5]
Process kernel support for process, Process attributes, process hierarchy, states, process composition, process creation and termination http://nptel.ac.in/courses/117106113/3 http://nptel.ac.in/courses/117106113/4
R4:8.1-8.9
19 Classify daemons and varieties of processes 33-34 Apply
[Level 3]
Zombie process, orphan process.http://nptel.ac.in/courses/117106113/3
R4:8.6
20Estimate processes to respond to asynchronous events. 35
Understand[Level 2]
Signals – Introduction to signals, Signal generation and handling, Kernel support for signals, Signal function. http://nptel.ac.in/courses/117106113/3
R4:10.1-10.3
21 Assess and to handle exceptional situations. 36-37 Evaluate
[Level 5]
Unreliable signals, reliable signals, kill, raise, alarm, Pause, abort, and sleep functions.http://nptel.ac.in/courses/117106113/3
R4:10.4-10.19
22 Distinguish inter related process communication 38-39 Apply
[Level 3]
Inter process Communication: Introduction to IPC, IPC between processes on a single computer system, IPC between processes
R4:14.1-14.4
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 42
on different systems, pipes.
23 Understand named pipes. 40 Understand[Level 2] FIFOs and examples. R4:14.5
24Create types of restricting and accessing different resources.
41 Create[Level 6]
Introduction to three types of IPC (Linux)-message queues, semaphores and shared memory.
R4:14.6
25Apply dividing up work among to balance work over multiple processes.
42-43 ApplyLevel 3
Message Queues- Kernel support for messages, Linux APIs for messages, Client/server example.
R4:14.7
26Distinguish user variables and semaphore operations, provided at the kernel level.
44 Understand[Level 2]
Semaphores- Kernel support for semaphores R4:14.8
27Understand security hurdles using programming interface of Linux
45-46 Understand[Level 2]
File locking with semaphores. Linux APIs for semaphores R4:14.8
28Distinguish common memory portion which other processes
47 Understand[Level 2]
Shared Memory- Kernel support for Shared memory R4:14.9
29 Apply common memory sharing interfacing example. 48-49 Apply
[Level 3]Linux APIs for shared memory, semaphore and shared memory R4:14.9
30 Create parallelism in Linux based system calls. 50-51 Create
Level 6
Multithreaded Programming–Differences between threads and processes, thread structure and uses, threads and light weight Processes.
T1:13.1-13.2
31 Asesss concurrency in Linux APIs. 52 Evaluate
[Level 5]POSIX Thread APIs, Creating Threads Thread attributes T1:13.4
32Compute multiple processes to a common resource in Linux based parallel
53-54 Understand[Level 2]
Thread synchronization with semaphores T1:13.5
33Demonstate multiple threads access the same resource for read and write.
55-57 Explain[Level 2]
Thread synchronization with mutexes, Example programs T1:13.5
34 Apply end to end network communication 58 Apply
[Level 3]
Sockets: introduction to socketshttp://nptel.ac.in/courses/117106113/6
R2:15.1
35 Understand tcp based system calls 59-60 Understand
[Level 2]
Socket system calls for connection Oriented protocol
http://nptel.ac.in/courses/117106113/6
R2:15.5
36 Examine udp protocol system calls 61-62 Evaluate
[Level 5]
Connectionless protocolhttp://nptel.ac.in/courses/117106113/6
R2:15.5
37
Apply connection oriented, connectionless communications in two and three
63-64 Apply[Level 3]
Example-client/server programshttp://nptel.ac.in/courses/117106113/6
R2:15.5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 43
SESSION PLANNER
S. No Unit No Class Topic Session Objectives Text/Ref
BookDate
PlannedDate
Conducted
1. L1 Introduction to Linux operating system
1.Understands the architecture of linux operating system
T1
2. L2File handling utilities, Security by file permissions
1.Understands the basic file permissions 2.Understands the file handling utilities
T1
3. L3 Process utilities ,Disk utilities
1.Understand the basic process utilities 2.Understand the basic disk utilities
T3
4. L4 Networking commands
Understand the basic networking commands
T3
5. L5 Filters Understand the basic filters T2
6. L6Text processing utilities, Backup utilities
1.Understand the basic processing utilities 2.Understand the basic backup utilities
T1
7. L7 Sed: scripts ,operation, addresses
1.Understand how to use operation 2.Understand how to use addresses
T2
8. L8 Sed: commands, applications
1.Understand how to construct commands in sed
T1
9. L9
Awk: execution, fields, records, scripts, operation, pattern, Actions, functions, using commands in awk
1.Understand how to relate fields & records 2.Understand how to construct commands in awk
T1
10. L10
Working with the Bourne again shell(bash): Introduction
Understand how to work with bash shell
T3
11. L11 Shell responsibilitiesUnderstand the Shell responsibilities
T3
12. L12
Pipes, input and output redirections , Here document, running a shell script,
1.Design of pipes and Redirection 2.Understand how to run a shell script
T3
13.
I
L13
The shell as a programming language, shell meta characters, file name
Identify Data structure in shell meta characters
T3
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 44
substitutions Shell variables
14. L14
Command substitution, shell commands, the environment, quoting, test commands
1.Identify shell command 2.Identify test command
T3
15. L15 Control structures, arithmetic in shell
1.Understand how to use control structures 2.Understand how to use arithmetic in shell
T3
16. L16
Interrupt processing, functions, debugging shell scripts, shell script examples
1.Understand how to use functions 2.Understand how to write shell scripts
T3
18. L17Files: file concepts, file system structures, in odes
1.Understand basic file concepts 2.Understand basic file structure
T1,T3
19. L18 File metadata, file types
1.Understand about file metadata 2.Understand different file types
T1,T3
20. L19kernel support for file system, file descriptors,
Understand how kernel suppoprts file system 2.Understand how to use file descriptors
T1,T3
21. L20
System calls for file I/O operations (File APIs)- -open, creat, read, write, close
Understand how to execute I/O operations
T1,T3
22. L21lseek,dup2, file status information-stat family
Understand about file status information
T1,T3
23.
II
L22 file and record locking- fcntl function
Understand how to use locking on files and records
T1
24. L23
file permissions-chmod, fchmod,file ownership-chown. lchown, fchown
1.Understand how to use change file permissions of files 2.Understand how to change ownership of files
T1,T3
25. L24links-soft links and hard links-symlink, link, unlink
Understand how to use links to link files
T1,T3
26. L25
Directories- Creating, removing and changing, Directories-mkdir, rmdir, chdir,
1.Understand how to cretae directories 2.Understand how to change directories
T1
27.
II
L26 obtaining current working directory-
1.Understand how to check current T1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 45
getcwd working directory
28. L27 Directory contents, Scanning Directories-
1.Understand how to check contents in a directory
T1
29. L28opendir, readdir, closedir, rewinddir functions
1.Understand how to perform operations on directory 2.Understand the functions of directory
T1
30. L29
Process : process concept, Layout of C program image in main memory
1.Understand the basic concept of process 2.Understand the layout of C program
T1
31. L30
Process environment- environment list, environment variables, getenv, setenv
1.Understand how to get environment variables 2.Understand how to set environment variables
T3
32. L31 Kernel support for process
Understand how kernel support process
T3
33. L32
Process identification, process control- process creation, replacing a process image, waiting for a process, process termination
1.Understand how to identify, create a process 2.Understand how to replace process image and how to terminate the process
T3
34. L33 zombie process, orphan process
1.Understand zombie process 2.Understand orphan process
T3
35. L34
system cal interface for process management- fork, vfork, exit, wait, waitpid, exec family
Understand system cal interface for process management
T3
36. L35
process groups, session and controlling terminal, differences between threads and processes.
1.Understand how to process session and terminal 2.Differentiate between threads and processes
T1
37. L36
Signals: Introduction to signals, signal generation and handling
1.Understand basic of signals 2.Understand signal generation and handling
T1
38.
III
L37
kernel support for signals, signal function, unreliable signals, reliable signals, kill, raise,
1.Understand how kernel will support signals 2.How kernel support reliable
T1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 46
alarm, pause, abort, sleep functions
signals, unreliable signals
40. L38
Inter process communication: introduction to IPC, , IPC between processes on a single computer system
1.Understand how to interact with system by using IPC.2.Understand basic concept of IPC
T3,T1
41. L39IPC between processes on different systems
Understand how to interact with different systems by using IPC
T3,T1
42. L40
pipes-creation, IPC between related processes using unnamed pipes
1. Understand how to create pipes. 2.Relate processes using unnamed pipes
T3,T3
43. L41
FIFOs-creation, IPC between unrelated processing using FIFOs( named pipes)
1. Understand how to create FIFO. 2.Relate processes using FIFO(named pipes)
T3,T1
44. L42
Differences between unnamed and named pipes, popen and pclose library functions.
1.Differentiate between unnamed and named pipes 2.Understand library functions
T3
45. L43
Message queues: kernel support for message queues , Unix system V APIs for messages,
1. Understand how kernel will support message queues. 2.Differentiate between unix systems and APIs
T3
46. L44 client/server examples
1.Construct programs for client 2.Construct programs for server
T3
47. L45Semaphores –kernel support for a semaphores
Understand how kernel will support semaphores
T3
48. L46 Unix system V APIs for semaphores
Differentiate between unix systems and APIs for semaphores
T3
49.
IV
L47 File locking with semaphores
Understand how file locking concept is used for semaphores
T3
50. L48Shared memory-kernel support for a Shared memory
Understand how kernel will support shared memory
T3
51.
V
L49 Unix system V APIs for Shared memory
Differentiate between unix systems and APIs for shared memory
T2
53. L50Semaphore and shared memory with examples
1.Understand how to write programs for semaphore
T2
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 47
2.Understand how to write programs for shared memory
54. L51 Sockets: introduction to Berkeley sockets
Understand basics about sockets T3
55. L52 IPC over a network, Client-Server model
1.Understand IPC 2.Understand client server model
T3
56. L53
Socket address structures (Unix domain and Internet domain)
1.Understand the address structure of sockets 2.Differences between unix domain and internet domain
T3
57. L54
socket system calls for connection oriented protocols and connectionless protocol
1.Understand differences between connection oriented protocols and connectionless protocol
T3
58. L55
Example-client/server programs-Single server-client connection
1.Understand how to write client/server programs 2.Understand how to connect single server-client
T3 & w1
59. L56
Example-client/server programs-Single server-client connection
1.Understand how to write client/server programs 2.Understand how to connect single server-client
T3
60. L57 Multiple simultaneous clients
Understand Multiple simultaneous clients
T3
61. L58 Multiple simultaneous clients
Understand Multiple simultaneous clients
T3 & w1
62. L59 Socket options-set socket
Understand socket options and set options
T3
63. L60 fctl system calls Understand fctl system calls T3
64. L61 Comparison of IPC mechanisms.
Understand comparison of IPC mechanisms
T3
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 48
10.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Course OutcomesOutcomes
Course Objectives a b c d e
I S SII H H S SIII S S H HIV S S S SV H S H HVI H H S S
S = Supportive H = Highly Related
10.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF ROGRAM OUTCOMES:
ProgramCourseOutcomes A B C D E F G H I J K L M N
a S H H S S S S Sb S H S H H H H Hc H H H H H S Sd S H S S H S H S
e S S S H H
S= Supportive H= Highly relative
10.11 OBJECTIVEQUESTIONS
UNIT-I1. Who developed UNIX?
A. Ken ThompsonB. Dennis Ritchie,C. Douglas MacllroyD. Ken Thompson, Dennis Ritchie,
2. What is ‘ps’ command for?A. prints the statusB. prints the process statusC. prints the execution statusD. None
3. Which command is used to terminate the process?A. WaitB. SleepC. KillD. None
4. Which comma and is use for the copy in unix?A. copyB. cpC. cpy
5. Which symbol will be used with grep command to match the pattern pat at the beginning of a line?
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 49
A. ^patB. $patC. pat$D. pat^
6. Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?A. chmodu+xemp[l-3]B. chmod 777 emp*C. chmodu+r ??? empD. chmod 222 emp?
7. Which of the following keys is used to replace a single character with new text?A. SB. sC. rD. C
8. Using the grep command, how can you display or print the entire file contents?$ grep '.*' file
9. What is the difference between a local variable and environment variable in Linux? A local variable is the one in which the scope of the variable is only in the shell in which it is defined. An environment variable has scope in all the shells invoked by the shell in which it is defined.
10. What does the 'execute' permission in a directory stand for? Without the execute permission on a directory, the user will not be able to traverse or in other words, do a "cd" to the directory.
11. How to find the total number of arguments in a shell script in Linux?12. x and y are two variables containing numbers? How to add these 2 numbers?
$ expr $x + $y13. How to add a header record to a file in Linux?
$ sed -i '1i HEADER' file14. How to find the list of files modified in the last 30 mins in Linux?
$ find . -mmin -3015. How to find the list of files modified in the last 20 days?
$ find . -mtime -2016. How to print the contents of a file line by line in Linux?
$ while read line do>echo $line> done < file
17. How to find the files modified exactly before 30minutes?$ find . -mmin 3018. A string contains a absolute path of a file. How to extract the filename alone from the
absolute path in Linux?$ x="/home/guru/temp/f1.txt"$ echo $x | sed 's^.*/^^'
UNIT-II1. How to find the total number of a lines in a file in Linux?
$ wc -l file | awk '{print $1}'2. How to print the first line or the header record in a file?
$ head -1 file3. How to replace all occurrences of "Unix" to "Linux" in a file?
$ sed 's/Unix/Linux/g' file
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 50
4. How to make the above changes permanent in the file?$ sed -i 's/Unix/Linux/g' file
5. How to replace only the first occurrence of "Unix" to "Linux" in a string in Linux?$ sed 's/Unix/Linux/' file
6. How to replace only the second occurrence of "Unix" to "Linux" in a string in Linux?$ sed 's/Unix/Linux/2' file
7. How to add leading zeros to every line in a file in Linux?$ sed 's/^/0000/' file
8. How to add trailing zeros to every line in a file in Linux?$ sed 's/$/00/' file
9. How to get yesterday's date in Linux?$ date -d "1 day ago"
10. After logging in to your account in Linux, you did "cd log". There was no "log" directory under the current directory, still the "cd" command traversed to a log directory under a different location? How it happened?It is because the CDPATH variable is set.
11. How to zero pad a number in Linux? Say, to zero pad a number to 4 places:$ x=20$ printf "%04d\n" $x
12. How to find all the .c and .h files in Linux?$ find . -name "*.[ch]"
13. How to find the list of all the .c files and display only the file name, instead of the default find output which includes the relative path?$ find . -name *.c | sed 's^.*/^^'
14. How to copy a file with the same time stamp as the source file in Linux?$ cp --preserve=timestamp file1 file2 15.what is the file server in Linux server?Answer - File server is used for file sharing. It enables the processes required fro sharing.......
16. What is NFS? What is its purpose?Answer - NFS is Network File system. It is a file system used for sharing of files over a network.....
17. How do you find out what’s your shell? - echo $SHELL 18.What’s the command to find out today’s date? - date
19. What’s the command to find out users on the system? - who20. How do you find out the current directory you’re in? - pwd21. How do you remove a file? - rm
UNIT-III1. What are various IDs associated with a process?
A. getpid() -process idB. getppid() -parent process id C. getuid() -user id D. geteuid() - effective user id
2. Explain fork() system call. The `fork()' used to create a new process from an existing process.
3. Predict the output of the following program code main(){fork();printf("Hello World!");} Answer:HelloWorld!Hello World!
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 51
4. Predict the output of the following program code main(){fork(); fork(); fork(); printf("Hello World!");}Answer:"Hello World" will be printed 8 times.5. List the system calls used for process management:1)fork() 2)exec() 3)wait() 4)exit()
5)getpid() 6)getppid() 7)nice() 8)brk()6. How can you get/set an environment variable from a program? Getting the value of an
environment variable is done by using `getenv()'. Setting the value of an environment variable is done by using `putenv()'.
7. How can a parent and child process communicate? A parent and child can communicate through any of the normal inter-process communication schemes (pipes, sockets, message queues, shared memory.
8. What is a zombie? When a program forks and the child finishes before the parent, the kernel still keeps some of its information about the child in case the parent might need
9. What are the process states in Unix? 1) Running 2) Waiting 3) Stopped 4) Zombie10. What is the use of ‘ps’ command in UNIX system?
Ans:‘ps’ command is used to show status of all processes currently running on the system.
11. How do you terminate a process in UNIX system?Ans:‘kill’ command is use to terminate a process.
12. What should be done by ’who’ command in UNIX system? Ans:‘who’ command reports who is logged in that present time.
13. use of ‘which’ command in UNIX system?Ans:‘which’ command will report the name of the file that is be executed when the command is invoked.
14. What is the use of ‘whereis’ command in UNIX system?Ans:‘whereis’ command reports the filenames of source, binary, and manual page files associated with command.
15. With what can you stop a process? 1. Stop 2.Shutdown 3.Kill 4.Delete16. The following socket provides two way, sequenced, reliable and unduplicated flow
of data with no record boundaries..A. Sequential packet socket B. Datagram socket C. Stream socket D. Raw socket
17. Identify the point(s) that is not true w.r.t. signalsA. Signals are software generated interrupts that are sent to a process when an event
happensB. Signal delivery is analogous to hardware interrupts in that a signal can be blocked
from being delivered in the future.C. Most signals are synchronous by nature.D. Most signal cause termination of the receiving process if no action is taken by the
process in response to the signal.18. With what command you can see your user name? Who am i19. How can you display a list of all files, including the hidden files? ls -a20. With what command you can see what folder you are in? pw
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 52
UNIT-IV1. Following unix system call is used to open a message queue to access it. [ a]
A. msgget() B. msgsnd() C. msgrcv() D. msgctl()
2. Message queues are created in [b ] OCT-2013A. user spaceB. kernel space C. both D. none
3. Advantage of FIFO over pipe is [b ]A. Related processes can communicateB. Unrelated processes can communicateC. a&b D. None
4. The IPC methods supported by UNIX system are [d ]A. messages B. shared memory C. semaphores D. All
5. Like messages, semaphores are stored in a1Kernel address space and are persistent, despite their creator process’s termination.
6. The function prototype of the shmdt is Intshmdt(void *addr).7. To implement as message queue using semaphores and shared memory, the shared
memory provides a Kernel memory region to store any messages sent to the queue.8. IPC is a mechanism whereby two or more processes communicate with each other to
perform tasks. OCT-20139. Which is the fastest form of IPC [a]
A. Shared memory B. Semaphore C. FIFO & Pipe D. Message queue
10. The maximum number of semaphore allowed per set is defined by [c]A. SEMMNI B. SEMMNS C. SEMMSL D. SEMOPM
11. A process should have this permission for semaphores too increase or decrease their values [a]A. Write B. Read C. a or b D. Both a and b
12. Semaphore synchronizes the execution of multiple processes.13. The 0, 1 value of the semaphore set indicates that the server is waiting for a client to
send message.14. FIFOs are also known as [ a]
A. named Pipes B. unnamed Pipes
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 53
C. unanimous Pipes D. structured Pipes
15. Which of the following is not a System V IPC mechanism? [ d]A. semaphores B. shared memory C. message queues D. fifos
16. The IPC mechanism that is used to provide locking facility is [a ]A. semaphores B. shared memory C. pipes D. fifos
17. Messages are retrieved from a queue by using Megrcv( ) function.18. Fifos are used by shell commands to pass data from one shell pipeline to another,
without creating intermediate temporary files.19. msgsnd() [c ]
A. To access the member of message queue B. To create message queueC. To send message to queue D. To receive message from queue
20. In binary semaphores value of semaphore = 0 [ a]A. resource is locked B. resource is available C. resource is unavailable D. none
UNIT-V1. Function creates a semaphore whose name is given [ a] by the name argument.
A. sem_open() B. sem_create() C. sem_init() D. All of the above
2. Which of the following option described about thread data structure is/are false? [d ]A. A set of registers B. A run-time stackC. A signal mask D. None
3. Shared memory allows multiple processes to map a portion of their virtual addresses to a common memory region. OCT-2013
4. Which function is called to create a child process [ c]A. Pipe() B. create()C. fork() D. mknode
5. The return value of segment function on success [ c]A. 0 B. -1 C. positive integer D. negative integer
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 54
6. Pipes and, FIFOs provide unidirectional flow of data.7. PIPE_BUF constant specifies the buffer size of the kernel’s pipe.8. Msgctl function is used to control the operations on message queue9. The system call that is used to alter the permissions and other characteristics of a
shared memory segment. [ c]A. shmget( ) B. shmat( ) C. shmctl( ) D. shmdt( )
10. Mutual Exclusion is done by using [a ]A. semop( ) B. shmop( ) C. msgop( ) D. semctl( )
11. Messages Queues are a linked list of messages stored within the kernel and identified by a Queue ID.
12. The API that is used to create a shared memory is Shmget( ).13. In shmctl() the cmd IPC_STAT specifies [ c]
A. to remove shared memory area B. to get the shared memory structure shmid_dsC. to get the status of shared memory from shmid_ds D. both b & c
14. The function used to detach the shared segment from the user process is shmdt().15. Pies are created at Kernel space.16. System call to create named pipe mknodpipename p17. Process is program under execution18. The most efficient thread synchronization object is [ c]
A. Semaphores B. shared memory C. mutex locks D. exclusive locks
19. How many times can a mutex lock be initialized in a process? [ b] (a) 2 (b)1 (c) 4 (d) 3 Which of the following sock.h header does belong to sock class [ a]A. #ifndef SOCK_H B. #include<time.h>C. define PSOCK_H D. #include<conio.h>
20. Which of the thread manipulation comes under POSIX.1c thread API? [ c]A. pthread_create, pthread_destroy B. pthread_wait, pthread_joinC. pthread_create, pthread_kill D. pthread_resume, pthread_exit
21. Bound threads are used primarily if they need _ [ d]A. To be scheduled by the kernel for real time processingB. To have their own alternate signal stacksC. To have their own alarms and timers D. All of the above
22. A Process is a program under execution. OCT-201223. Threads do not have their own address spaces but share with their parent Processes.24. The most efficient thread synchronization object is Mutex locks
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 55
25. The thread is created by function in posix. [c ]A. thr_create B. thr_get C. pthread_create D. pthread_get
26. The threads are scheduled by the kernel for real-time processing and have their own alternative signal stacks. [a ]A. bound B. unbound C. light-weight D. heavy-weight
27. A Thread is a piece of program code executed in a serial fashion.28. Multi threaded programming improves process throughout and responsiveness to users.
Nov- 2012-IT29. The thread is terminated by Pthread_exit( ) function in posix.30. Each thread has a unique [ d]
A. Thread ID B. set of registers C. stack pointer D. all
31. pthread_exit() used to [ a]A. Explicitly exit a thread B. Closes all the threads C. both a & b D. none
32. Command used to create a thread is [a ]A. pthread_create() B. start_routine() C. both a & b D. none
33. The name to a socket is assigned by Bind system call.34 The IPV4 socket structure is also known as Internet socket address structure.35 The API that is used to specify the number of pending client messages that can be
queued for a server socket. [ d]A. socket( ) B. bind( ) C. accept( ) D. listen( )
36. Sockets exhibits a behaviour with the read and write functions that differ from normal file I/O. [ c] Nov-2012-ITA. datagram B. raw sockets C. stream D. sequenced packets
37. The function that assigns a local protocol address to a socket is [b ]A. accept( ) B. bind( ) C. connect( ) D. listen( )
38. The Sockets provides protocol-independent network interface services to support IPC
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 56
over a LAN.39. The Stream sockets establish a virtual circuit for communication, where the messages
are sent in a sequenced, reliable and two-way connection-based byte stream.40. TELNET used TCP protocol for data connection41. Transport layer of OSI model lies between Network and Data Link layer.42. MAC addresses are also known as Ethernet hardware adress43. What is the size of an IP address? [a ] a)128 bits b) 64 bits c)1024 d)8 bits44. A network router joins two together? [d ]
A. Switch B. hub C. computers D. networks
45. What is the full form of URL? [b ]
10.12 TUTORIAL QUESTIONS BANKPART-A (SHORT ANSWER QUESTIONS)
S. No. QuestionsBloom’s
Taxonomy Level
Course Outcome
UNIT-I1. Explain importance of pyramid architecture in Linux? Knowledge 12. Explain kernel and its importance in security concepts of Linux? Understand 23. Explain different types of shells in Unix/Linux? Knowledge 24. Differentiate BASH and CSH? Knowledge 15. Explain vi editor and some editing commands in Linux? Knowledge 26. Explain listing of files in Linux? Knowledge 17. Explain links and its uses in Linux? Knowledge 28. Illustrate moving of files in Linux environment with examples? Understand 29. Illustrate ‘rlogin’ command with example? Understand 110. Illustrate ‘telnet’ command with example? Understand 111. Explain ftp and its importance in Unix? Knowledge 212. Explain importance of arp in Linux Understand 113. Differentiate tar and cpio commands? Understand 114. Illustrate creating a new directory in Linux with example? Knowledge 215. Explain deleting of directory and its contents with examples? Understand 116. Differentiate copying and moving files in Linux environment? Understand 117. Explain about ‘comm’ command? Knowledge 218. Explain about ‘grep’ command? Understand 119. Explain about ‘awk’ command? Understand 120. Explain about ‘tee’ command? Knowledge 221. Differentiate between a processes and program? Understand 122. Illustrate about job control commands with examples? Understand 123. Explainabout background job and foreground job in Linux? Knowledge 224. Explain about ‘ps’ command Understand 125. Explain about ‘telnet’ command Understand 126. Explain about ‘ulimit’ command ulimit. Knowledge 2
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 57
27. Illustrate ‘pg’ command with example? Understand 128. Illustrate ‘more’ command with example? Understand 129. Illustrate and permissions in Linux environment? Knowledge 430. Explain the security and compare with windows and dos operating systems? Understand 5
31. Explain how Unix operating system provides more security than any other operating system. Knowledge 5
32. Explain command substitutions with examples? Knowledge 333. Explain add, delete, view, actions in Linux env? Knowledge 334. Explain how debugging can be done in a shell script. Knowledge 435. Explain printing login information. Knowledge 436. Differentiate between different types of shells available in UNIX. Knowledge 4
37.Demonstrate shell program for the following scenario where printing current time in upper right corner of the screen, while user can do normal job at prompt.
Understand 4
38. Explain the significance of single quote and double quote. Understand 5
39. What does the shell do with the meta characters if it finds in the command line? Knowledge 4
40. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 4
41. Distinguish between user Defined variables and environment variables with example? Understand 5
42. Describe about I/O Redirection operations in Linux? Knowledge 5
43. Describe any four built in variables in Shell and Demonstrate their usage by example? Knowledge 3
44. Explain by script to display GOOD MRNG, GOOD AFTERNOON, GOOD NIGHT based on system time whenever user logs on. Knowledge 4
45. Write about here documents? Understand 5
46. Write a shell script that determines the period for which a specified user is working on the system? Knowledge 5
47. Explain how the shell treat a command line passed to it. Knowledge 348. Write a shell script to find and delete all file with the word “Unix". Knowledge 449. Briefly Describe various shell and environment various. Understand 5
50. Write a shell script to count the specified number of lines in a text file without using wc command Understand 5
51. What does the shell do with the meta characters if it finds in the command line? Knowledge 5
52. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 3UNIT – II
1. Differentiate between advisory locking and mandatory locking. Understand 62. Explain about symlink ( ) function with example? Knowledge 73. Explain about link ( ) function with example? Knowledge 74. Explain about unlink ( ) function with example? Knowledge 65. Explain about symlink ( ) function with example? Understand 66. Define a system call? Understand 77. Differentiate systemcall with library function?. Knowledge 78. Explain about dot and dot dot directories in the file system? Understand 69. Define symbolic link? Knowledge 610. Define hard link? Understand 611. Differentiate symbolic link instead of a hard link. Understand 712. Define fcntl ( ) function with example? Understand 5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 58
13. Define read () function with example? Knowledge 514. Define write () function with example? Knowledge 615. Define stat () function with example? Knowledge 416. Define create () function with example? Understand 717. Define getc ( ) with example? Knowledge 718. Define fgetc ( ) with example? Knowledge 619. Define fprint ( ) with example? Understand 620. Define fscanf ( ).with example? Understand 621. Differentiate getc ( ) and fgetc ( ) with example? Understand 622. Differentiate) stat ( ) and fsat ( ) with example? Understand 623. Differentiate printf ( ) Vs fprint () with example? Understand 624. Differentiate scanf ( ) Vs fscanf (with example? Understand 625. Differentiate getc ( ) and fgetc ( ) with example? Understand 6
UNIT –III1. Describe process creation? Understand 82. Describe process termination?3. Differentiate process creation and termination? Understand 84. Describe signal function? Understand 85. Describe reliable signals. Understand 96. Define orphan process? Understand 87. Describe orphan process with example?8. Illustrate SIGKILL with an example? Knowledge 99. Illustrate SIGINT with an example? Understand 810. Differentiate SIGKILL and SIGINT? Understand 711. Illustrate fork () with example? Knowledge 812. Illustrate fork () with example? Knowledge 713. Differentiate fork ( ) with vfork ( )? Understand 814. Describe exec () with example? Understand 915. Illustrate exit ( ) function? Understand 916. Describe all flavours of excec () function? Knowledge 817. Define zombie processes with example?. Understand 818. Illustrate redirection of standard output to file abc.txt Understand 919. Explain about signal () function? Understand 820. Define wait () with example? Understand 821. Define waitpid () with example? Understand 922. Differentiate between wait ( ) and waitpid ( ). Understand 923. Differentiate reliable and unreliable signals with suitable example? Knowledge 824. Explain the mechanism for handling a signal with example? Understand 8
UNIT –IV1. Describe message queue with syntax and example? Knowledge 112. Describe FIFO concept with example??3. Describe simulate sleep and wakeup technology in Linuxipc Understand 104. Illustrate making fifo from command prompt? Understand 115. Describe mkfifo ( ) system call by example? Understand 106. Describe Pipes opening concept with example? Understand 11
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 59
7. Describe pipes? Explain their limitations. Understand 10
8. Explain how pipes are created and used in IPC with examples? Explain name space and importance in Linux? Understand 11
9. Describe msgsnd ( ) with example? Understand 1010. Describe msgrcv ( ), msgctl () with example? Understand 1111. Illustrate about IPC_CREAT? Understand 1012. Illustrate about IPC_EXEC? Knowledge 1113. Explain about msgtyp with example? Knowledge 814. Describe IPC _PRIVATE with example? Understand 815. Describe pipe () system call? Understand 1016. Differentiate between kill() and rise()? Knowledge `1217. Differentiate low level piping and formatted piping? Knowledge 1118. Differentiate between named pipes and unnamed pipes? Understand 1019. Explain about fork () system call? Understand 920. Describe O-NDELAY flag with example? Knowledge 1121. Explain message-queue communication by example? Knowledge 1022. Explain priority queue with example? Understand 12
UNIT-V1. Explain about shared-memory segment. Knowledge 122. Explain about shared-memory segment with example? Knowledge 113. Illustrate about V IPC semaphore mechanism with example? Evaluate 124. Explain about achieving IPC using shared memory? Understand 125. Explain about achieving IPC using semaphores? Understand 116. Explain about synchronization? How synchronization is v Knowledge 117. Explain the structure of a thread. Discuss its uses. Knowledge 11
8. Explain the kernel data structure for shared memory with a neat diagram. Explain the APIs associated for creating and destroying a shared memory Understand 11
9. Differentiate between thread and light weight process. Understand 10
10. Explain how semaphores are used to control thread operations on shared memory Understand 11
11. Explain about all functions realated to semaphores. Understand 10
12. Explain with a program how to copy file data from server to client using shared memory Understand 12
13. Explain with a program how to copy file data from server to client using semaphores. Understand 10
14. Explain about shmget() function? Understand 1215. Differentiate semaphore with shared memory IPC Mechanisms. Knowledge 10
16. Illustrate to transfer data between two unrelated processes using shared memory. Understand 12
17. Explain about shmcntl () function? Understand 1018. Demonstrate client and server programming using TCP protocol? Understand 919. Differentiate stream sockets and raw sockets? Understand 920. Demonstrate client and server programming using UDP protocol? Understand 921. Explain about socket( ) function in Linux? Understand 922. Explain about listen( ) function in Linux? Knowledge 923. Explain about accept( ) function in Linux? Understand 924. Explain about bind( ) function in Linux? Understand 1025. Explain about read() function in Linux? Understand 12
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 60
26. Explain about write() function in Linux? Knowledge 1027. Explain about ‘TCP NODELAY’ syntax? Understand 1028. Differentiate IP V4 AND IPV6? Understand 1029. Explain bzero () function? Understand 930. Explain about byte ordering in Linux? Understand 1031. Explain about how TCP connections are established and terminated. Understand 1232. Demonstrate echo server and echo client using 3333 port in tcp style? Knowledge 10
33. Explain how small and big packets handled in transferring client server environment? Understand 10
34. Explain tcp socket connection establishment with a neat diagram? Understand 935. Explain udp connection establishment with a neat diagram? Understand 1036. Demonstrate client and server programming using TCP protocol? Understand 1237. Differentiate client server models in tcp and udp? Knowledge 938. Explain sendTo () with example? Understand 1039. Explain recvFrom () with example? Understand 9
PART – B LONG ANSWER QUESTIONS
S. No. QuestionsBloom’s
Taxonomy Level
Course Outcome
UNIT – I
1 Explain pyramid architecture and kernel in Linux with neat diagrams? Knowledge 1
2 Explain different types of shells in Unix/Linux? Differentiate BASH and CSH? Knowledge 2
3 Explain vi editor and some editing commands in Linux? Explain listing of files in Linux? Understand 2
4 Explain links, file moving and its uses in Linux? Explain cp command with examples? Knowledge 1
5 Differentiate ssh and telnet and login procedure? Understand 1
6 Illustrate ‘rlogin’ ‘telnet’ command with example? Knowledge 2
7 Explain arp command and its options with example? Understand 2
8 Explain ftp and its importance in Unix? Differentiate tar and cpio, tar commands? Understand 1
9 Illustrate creating a new directory in Linux os with example and list out the available files? Understand 2
10 Explain deleting of directory and its contents with examples? Differentiate copying and moving files in Linux environment? Knowledge 1
11 Explain about ‘comm’command? Explain about ‘grep’ command? Explain about ‘tee’and more commands? Understand 2
12 Explain about ‘awk andsed command? Understand 1
13 Differentiate between a process, and program? Illustrate about job control commands with examples? Evaluate 2
14 Explain about background job and foreground jobs in Linux? Explain about ‘ps’ comm. and ‘telnet’ command Understand 2
15 Explain about ‘ulimit’and, mount commads? Illustrate‘pg’ and more command with example?
Understand Level 2
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 61
16 Explain Moving processes to the background and foreground with an example? Understand 3
17 Explain the significance of single quote and double quote. Understand 4
18 Explain about meta characters in the command line? Demonstrate by writing a shell script to find the factorial of a number. Knowledge 5
19 Distinguish between between user Defined variables and environment variables with example? Knowledge 4
20 Describe about I/O Redirection operations, built in variables in Shell. Knowledge 5
21 Explain by writing a script using system time, toshow GOOD Morning, GOOD AFTERNOON, GOODNIGHT. Knowledge 4
22 Demonstrate by writing script that determines the period for which a specified user is working on the system? Knowledge 5
23 Explain how the shell treat a command line passed to it. Knowledge 5
24 Explain by writing shell script that receives any number of file names as arguments checks if every argument supplied is a file or a directory? Knowledge 5
25 Explain by writing an awk script to find the number of characters, words and lines in a file. Understand 5
26 Explain by writing shell script to find and delete all file with the word “Unix". Understand 4
27 Explain by writing shell script to count the specified number of lines in a text file without using wc command? Knowledge 4
28 Demonstrate by writing a shell script to find the factorial of a number. Knowledge 5
29 Explain by writing shell script that receives any number of file names as arguments checks if every argument supplied is a file or a directory? Knowledge 4
UNIT – II
1 Explain fprint (), fscanf () with examples? Understand 7
2 Differentiate between advisory locking and mandatory locking. Understand 6
3 Explain about symlink ( ) function with example? Explain about link ( ) function with example? Knowledge 7
4 Explain about unlink ( ) functions with example? Explain about symlink ( ) functions with example? Understand 7
5 Define a system call? Differentiate systemcall with library function? Understand 6
6 Explain about dot and dot dot directories in the file system? Knowledge 7
7 Define symbolic link? Hard link with examples? Knowledge 6
8 Differentiate symbolic link instead of a hard link. Knowledge 6
9 Define fcntl ( ), read (), write () writen () function with examples? Knowledge 6
10 Describe the characteristics of Unix File System. Knowledge 7
11 Describe about Low Level File I/O System Calls. Understand 7
12 Describe usage of dup(), dup2() system calls with example? Understand 6
13 Define stat () and create () function with examples? Knowledge 7
14 Describe open ( ) function in Linux with examples? Knowledge 6
15 Explain getc ( ) and fgetc ( ) with examples? Knowledge 7
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 62
16 Explain fprint () and fscanf ( ).with example? Knowledge 6
17 Differentiate getc ( ) and fgetc ( ) with example? Knowledge 7
18 Differentiate stat ( ) and fstat ( ) with example? Understand 6
UNIT – III
1 Describe Process Creation Process Termination with example? Understand 8
2 Describe Signal function and Reliable signals with example? Knowledge 9
3 Define orphan process and zombie process with example? Knowledge 9
4 Describe SIGKILL and SIGINT with examples? Understand 8
5 Illustrate fork (), vfork () with example s? Knowledge 8
6 Differentiate fork ( ) with vfork ( )? Understand 9
7 Describe all versions of exec () with examples? Understand 8
8 Describe all flavours of excec () function? Knowledge 9
9 Illustrate zombie processes with example? Understand 8
10 Illustrate redirection of standard output to file abc.txt Understand 9
11 Explain about signal () function? Understand 8
12 Define wait () and waitpid () with examples? Knowledge 9
13 Differentiate between wait ( ) and waitpid ( ). Knowledge 9
14 Differentiate reliable and unreliable signals with examples. Knowledge 9
15 Explain the mechanism for handling a signal with example? Understand 8
UNIT – IV
1 Describe message queue with syntax and example? Understand 11
2 Describe FIFO concept with example? Explain name space and importance in Linux? Knowledge 10
3 Describe sleep and wakeup technology in Linux PC. Illustrate making fifo from command prompt? Understand 11
4 Describe mkfifo ( ), pipe opening concept by example? Understand 10
5 Illustrate pipes? Explain their limitations. Explain how pipes are created and used in IPC with an examples Understand 11
6 Describe msgsnd ( ), msgrcv ( ) with example? Knowledge 10
7 Illustrate about IPC_CREAT with example? Understand 10
8 Illustrate about IPC_EXEC? Explain about msgtyp with example? Knowledge 11
9 Describe IPC _PRIVATE, pipe () system call with example? Understand 11
10 Differentiate between kill (), raise () with example? Understand 11
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 63
11 Explain about fork () and O-NDELAY flag with example? Understand 10
12 Explain message-queue communication by example? Explain priority queue with example? Understand 10
13 Explain the advantages of fifos over pipes. Understand 11
14 Explain two way communication using FIFOs? Understand 10
UNIT– V
1 Explain about shared-memory segment with example? Knowledge 12
2 Illustrate about V IPC semaphore mechanism with example. Understand 11
3 Explain about achieving IPC using shared memory? Knowledge 11
4 Explain about achieving IPC using semaphores? Knowledge 12
5 Explain about synchronization and How synchronization is achieved with Semaphores? Knowledge 11
6 Explain the structure of a thread and kernel data structure for shared memory with a neat diagram? Understand 12
7 Explain the system functions associated for creating and destroying a shared memory? Understand 11
8 Differentiate between thread and light weight process with system calls? Understand 11
9 Explain how semaphores are used to control thread operations on shared memory Knowledge 11
10 Explain about all functions related to semaphores? Knowledge 12
11 Explain with a program how to copy file data from server to client using shared memory. Knowledge 11
12 Explain with a program how to copy file data from server to client using semaphores. Understand 12
13 Differentiate semaphore with shared memory IPC Mechanisms. Understand 12
14 Illustrate text transfer between two unrelated processes using shared memory. Knowledge 11
15 Illustrate about thread synchronization with mutex locks with examples? Knowledge 10
16 Differentiate between multithreaded programming and single threaded programming. Understand 10
17 Illustrate pthread create ( ) function with examples? Understand 12
18 Explain pthread kill ( ) function with example? Knowledge 12
19 Explain about various POSIX APIs for mutual exclusion and locks with example Understand 10
20 Illustrate about POSIX APIs of semaphores? Understand 10
21 Explain thread synchronization with semaphores with example? Understand 11
22 Explain about Thread structure with examples? Knowledge 10
23 Explain about Semaphores with examples? Knowledge 12
24 Explain about Mutexes in Threads. With examples? Knowledge 10
25 Illustrate multithreaded programming? Understand 12
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 64
26 Explain about the APIs used to Demonstrate the attributes for a thread Understand 11
27 Illustrate about the mutex lock to prevent deadlock condition. Knowledge 12
28 Differentiate single threaded and multithreaded programming? Understand 10
29 Illustrate with a neat diagram about threads, and light weight processes? Understand 10
30 Explain about separate kernel stack and light weight processes? Understand 11
31 Describe disadvantage of single threaded programming? Describe advantages of multithreaded programming. Knowledge 10
32 Explain about Linux API’s for shared memory with neat diagram? Knowledge 12
33 Illustrate posix thread APIs for basic Process and Threads with examples? Knowledge 9
34 Explain about how semaphores values can be incremented or decremented with examples? Understand 10
35 Demonstrate client and server programming using TCP protocol with neat diagram? Knowledge 12
36 Differentiate stream sockets and raw sockets and related system calls? Understand 10
37 Demonstrate client and server programming using UDP protocol with neat diagram? Explain about socket ( ) , listen( ), accept( )system calls in Linux? Understand 9
38 Explain about bind (), read (), write () functions in Linux? Knowledge 10
39 Explain about send To () and recv From () functions in Linux? Knowledge 12
40 Explain about TCP NODELAY syntax with a small program? Knowledge 12
41 Explain all byte ordering and manipulation functions with examples? Knowledge 12
42 Explain about how TCP connections are established and terminated. Understand 10
43 Demonstrate echo server and echo client using 6666 port in tcp style? Understand 10
44 Explain how small and big packets handled in transferring client server environment? Understand 11
45 Explain tcp socket connection establishment with a neat diagram? Knowledge 10
46 Explain udp data transfer with a neat diagram? Knowledge 12
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S. No. Questions Bloom’s Taxonomy Level
Course Outcome
UNIT –I
1 Differentiate windows and Linux operating system and analyse important system calls? Understand 1
2 Differentiate DOS and Linux operating system? Knowledge 23 Illustrate security concepts in both Linux and windows operating systems? Understand 2
4
Illustrate script called ‘sayHi’, put this script into your startup file called .bash profile, the script should run as soon as you logon to system, and it print any one of the following message in info box using dialog utility, if installed in your system, If dialog utility is not installed then use echo statement to print message: -Good Morning, Good Afternoon, Good Evening, according to system time.
Knowledge 3
5 Illustrate by writing script that will print, Message “Hello World, in Bold Knowledge 4
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 65
and Blink effect, and in different colors like red, brown etc using echo command.
6Illustrate by writing script to implement background process that will continually print current time in upper right corner of the screen , while user can do his/her normal job at $ prompt.
Understand 5
7
Illustrate by writing script using for loop to print the following patterns on screen patterns on screen12 23 3 3
3 4 4 44 5 5 5 5 5
Knowledge 5
8
Illustrate by writing script using for loop to print the following patterns on screen.** ** * ** * * ** * * * *
Understand 4
UNIT – II
1 Differentiate and analyse non-blocking IO operations in both windows and Linux operating systems? Knowledge 6
2 Differentiate and analyse blocking IO operations in both windows and Linux operating systems? Understand 7
3Illustrate to redirect the standard input (stdin) and the standard output (stdout) of a process, so that scanf () reads from the pipe and printf () writes into the pipe?
Knowledge 7
UNIT – III1 Illustrate by writing c program to handle a user Defined signal by example? Knowledge 8
2 Illustrate by writing c program where process forks to a child, then waits for someone to terminate? Understand 9
3 Illustrate by writing c program where process forks to a child, and create a child process by using forks and suddenly terminates itself. Knowledge 9
UNIT – IV
1 Describe and analyse kernel flow involved in the creation of a message queue and the sending and receiving of messages? Knowledge 10
2 Illustrate by writing a c program using msglock structure? Knowledge 11UNIT – V
1 Illustrate ipc facility to show system limits? Knowledge 122 Illustrate to displays last operation time in each ipc facility. Knowledge 113 Demonstrate race conditions with shared memory? Knowledge 114 Illustrate by writing a c program to implement tcp chat client server? Understand 95 Illustrate by writing a c program to implement udp chat client server? Understand 9
10.13 ASSIGNMENT QUESTIONSPART – A (SHORT ANSWER QUESTIONS)
S. No. QuestionsBloom’s
Taxonomy Level
Course Outcome
UNIT – I1 Illustrate ‘telnet’ command with example? Understand 12 Explain ftp and its importance in Unix? Knowledge 23 Explain importance of arp in Linux Understand 14 Differentiate tar and cpio commands? Understand 1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 66
5 Illustrate creating a new directory in Linux with example? Knowledge 26 Explain deleting of directory and its contents with examples? Understand 17 Differentiate copying and moving files in Linux environment? Understand 18 Explain about ‘comm’command? Knowledge 29 Explain about ‘grep’command? Understand 110 Explain about ‘awk’ command? Understand 111 Explain about ‘tee’ command? Knowledge 212 Differentiate between a processes and program? Understand 113 Illustrate about job control commands with examples? Understand 114 Explain about background job and foreground job in Linux? Knowledge 215 Explain about ‘ps’ command Understand 116 Explain about ‘telnet’ command Understand 117 Explain about ‘ulimit’ command ulimit. Knowledge 218 Illustrate ‘pg’ command with example? Understand 119 Illustrate ‘more’ command with example? Understand 120 Illustrate and permissions in Linux environment? Knowledge 4
21 Explain the security and compare with windows and dos operating systems? Understand 5
22 Explain how Unix operating system provides more security than any other operating system. Knowledge 5
23 Explain command substitutions with examples? Knowledge 324 Explain add, delete, view, actions in Linuxenv? Knowledge 325 Explain how debugging can be done in a shell script. Knowledge 426 Explain printing login information. Knowledge 427 Differentiate between different types of shells available in UNIX. Knowledge 4
UNIT – II1. Differentiate between advisory locking and mandatory locking. Understand 62. Explain about symlink ( ) function with example? Knowledge 73. Explain about link ( ) function with example? Knowledge 74. Explain about unlink ( ) function with example? Knowledge 65. Explain about symlink ( ) function with example? Understand 66. Define a system call? Understand 77. Differentiate systemcall with library function?. Knowledge 78. Explain about dot and dot dot directories in the file system? Understand 69. Define symbolic link? Knowledge 610. Define hard link? Understand 611. Differentiate symbolic link instead of a hard link. Understand 712. Define fcntl ( ) function with example? Understand 513. Define read () function with example? Knowledge 514. Define write () function with example? Knowledge 615. Define stat () function with example? Knowledge 416. Define create () function with example? Understand 717. Define getc ( ) with example? Knowledge 718. Define fgetc ( ) with example? Knowledge 619. Define fprint ( ) with example? Understand 620. Define fscanf ( ).with example? Understand 6
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 67
21. Differentiate getc ( ) and fgetc ( ) with example? Understand 622. Differentiate) stat ( ) and fsat ( ) with example? Understand 623. Differentiate printf ( ) Vs fprint () with example? Understand 624. Differentiate scanf ( ) Vs fscanf (with example? Understand 625. Differentiate getc ( ) and fgetc ( ) with example? Understand 6
UNIT –III1. Describe process creation? Understand 82. Describe process termination?3. Differentiate process creation and termination? Understand 84. Describe signal function? Understand 85. Describe reliable signals. Understand 96. Define orphan process? Understand 87. Describe orphan process with example?8. Illustrate SIGKILL with an example? Knowledge 99. Illustrate SIGINT with an example? Understand 810. Differentiate SIGKILL and SIGINT? Understand 711. Illustrate fork () with example? Knowledge 812. Illustrate fork () with example? Knowledge 713. Differentiate fork ( ) with vfork ( )? Understand 814. Describe exec () with example? Understand 915. Illustrate exit ( ) function? Understand 916. Describe all flavours of excec () function? Knowledge 817. Define zombie processes with example?. Understand 818. Illustrate redirection of standard output to file abc.txt Understand 919. Explain about signal () function? Understand 820. Define wait () with example? Understand 821. Define waitpid () with example? Understand 922. Differentiate between wait ( ) and waitpid ( ). Understand 923. Differentiate reliable and unreliable signals with suitable example? Knowledge 824. Explain the mechanism for handling a signal with example? Understand 8
UNIT –IV1. Describe message queue with syntax and example? Knowledge 112. Describe FIFO concept with example??3. Describe simulate sleep and wakeup technology in Linuxipc Understand 104. Illustrate making fifo from command prompt? Understand 115. Describe mkfifo ( ) system call by example? Understand 106. Describe Pipes opening concept with example? Understand 117. Describe pipes? Explain their limitations. Understand 10
8. Explain how pipes are created and used in IPC with examples? Explain name space and importance in Linux? Understand 11
9. Describe msgsnd ( ) with example? Understand 1010. Describe msgrcv ( ), msgctl () with example? Understand 11
UNIT-V1. Explain about shared-memory segment. Knowledge 122. Explain about shared-memory segment with example? Knowledge 113. Illustrate about V IPC semaphore mechanism with example? Evaluate 12
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 68
4. Explain about achieving IPC using shared memory? Understand 125. Explain about achieving IPC using semaphores? Understand 11
6. Explain about synchronization? How synchronization is achieved with semaphores? Knowledge 11
7. Explain the structure of a thread. Discuss its uses. Knowledge 11
8. Explain the kernel data structure for shared memory with a neat diagram. Explain the APIs associated for creating and destroying a shared memory Understand 11
9. Differentiate between thread and light weight process. Understand 10
10. Explain how semaphores are used to control thread operations on shared memory Understand 11
11. Explain about all functions related to semaphores. Understand 10
12. Explain with a program how to copy file data from server to client using shared memory. Understand 12
13. Explain with a program how to copy file data from server to client using semaphores. Understand 10
14. Explain about shmget() function? Understand 1215. Differentiate semaphore with shared memory IPC Mechanisms. Knowledge 10
16. Illustrate to transfer data between two unrelated processes using shared memory. Understand 12
17. Explain about shmcntl () function? Understand 1018. Demonstrate client and server programming using TCP protocol? Understand 919. Differentiate stream sockets and raw sockets? Understand 920. Demonstrate client and server programming using UDP protocol? Understand 921. Explain about socket( ) function in Linux? Understand 922. Explain about listen( ) function in Linux? Knowledge 923. Explain about accept( ) function in Linux? Understand 9
PART – B (LONG ANSWER QUESTIONS)
S. No. QuestionBlooms
Taxonomy Level
Course Outcome
UNIT-1
1 Explain features of UNIX/LINUX understand 1
2 Explain the architecture of UNIX like systems understand 13 Explain the differences between a line editor and a stream editor. understand 1
4 Explain the network related commands. (telnet, rlogin, ftp, arp) understand 1
5 Develop an AWK program to summarize from the list of all processes, a count of processes run by every user (including root). Create 2
6 Explain how Unix operating system provides more security than any other operating system. understand 2
7 Develop a shell script that allows a user to view, add, delete or modify a setting in a configuration file. Create 3
8 Describe how debugging can be done in a shell script. understand 2
9 Analyze the significance of single quote and double quote. Analyze 3
10 Differentiate between shell variables and environment variables and user defined variables. Analyze 4
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 69
UNIT-II
1Differentiate between the following terms:(a) getc( ) Vsfgetc() (b) stat( ) Vsfsat()(c) printf( ) Vsfprint() (d) scanf( ) Vsfscanf().
Analyze 3
2 Illustrate fcntl( ) with a program. How are status flags that are associated with fcntl()? Apply 3
3 Discuss clearly the Low Level File I/O System Calls. understand 3
4 List and explain about the various types of files in Unix. How a file can be described in Unix environment? Knowledge 4
5 Construct and explain a function that sets one or more of the file status flags for adescriptor. Create 3
UNIT-III
1 Illustrate SIGKILL and SIGINT with an example program. Apply 3
2 Mention the commands for getting different IDs of calling process. Analyze 4
3 Define a Zombie Process? What is its significance? Describe with an example. Knowledge 4
4 Write a program to illustrate orphan process. Create 5
5 Identify the signals that are not ignored or blocked? Explain the reason behind it with an example. Knowledge 4
UNIT-IV
1 Illustrate mkfifo( ) system call with an example Apply 4
2 Define are pipes? Explain their limitations. Explain how pipes are created and used in IPC with an examples Knowledge 5
3 Compare the IPC functionality provided by pipes and message queues. What are the advantages and drawbacks of each? Explain briefly Analyze 4
4 Measure the effect of O-NDELAY flag on pipes and fifos. Evaluate 5
5 Elaborately discuss various forms of IPC supported by Unix. understand 4
UNIT-V
1 Show how shared memory model is implemented to achieve IPC? Explain briefly. Apply 5
2 Explain the kernel data structure for shared memory with a neat diagram. Also explain the APIs associated for creating and destroying a shared memory understand 4
3 Explain similarities and dissimilarities between the semaphore and shared memory IPC Mechanisms. understand 3
4 Explain how to control a shared-memory segment. understand 1
5 Illustrate p thread create( ) and p thread kill( ) function prototypes with an example. Apply 3
6 Explain a stream socket with a illustrative example for client/server program. Understand 1
7 Explain a datagram socket with a illustrative example for client/server program. Understand 3
8 Explain the sequence of steps to process various socket functions using TCP protocol with example Understand 4
9 Explain briey about the following socket APIs with clear syntax:(i) socket( ) (ii) bind( ) (iii) listen( ) (iv) accept( ) (v)connect() Understand 5
10 Decide how TCP NODELAY option is used while sending small packets? Evaluate 5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 70
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S. No. Question
BloomsTaxonomy
Level
Course Outcome
UNIT –I
1 Differentiate windows and Linux operating system and analyse Morning, Good Afternoon, and Good evening, according to system time. Understand 1
2Illustrate by writing script that will print, Message “Hello World, in Bold and Blink effect, and in different colours like red, brown etc using echo command.
Knowledge 4
3Illustrate by writing script to implement background process that will continually print current time in upper right corner of the screen , while user can do his/her normal job at $ prompt.
Understand 5
4
Illustrate by writing script using for loop to print the following patterns on screen12 23 3 34 4 4 45 5 5 5 5
Knowledge 5
5
Illustrate by writing script using for loop to print the following patterns on screen.** ** * ** * * ** * * * *
Understand 4
UNIT – II
1 Differentiate and analyse non-blocking IO operations in both windows and Linux operating systems? Knowledge 6
2 Differentiate and analyse blocking IO operations in both windows and Linux operating systems? Understand 7
3Illustrate to redirect the standard input (stdin) and the standard output (stdout) of a process, so that scanf () reads from the pipe and printf () writes into the pipe?
Knowledge 7
UNIT – III
1 Illustrate by writing c program to handle a user Defined signal by example? Knowledge 8
2 Illustrate by writing c program where process forks to a child, then waits for someone to terminate? Understand 9
3 Illustrate by writing c program where process forks to a child, and create a child process by using forks and suddenly terminates itself. Knowledge 9
UNIT – IV
1 Describe and analyse kernel flow involved in the creation of a message queue and the sending and receiving of messages? Knowledge 10
2 Illustrate by writing a c program using msglock structure? Knowledge 11
UNIT – V
1 Illustrate ipc facility to show system limits? Knowledge 12
2 Illustrate to displays last operation time in each ipc facility. Knowledge 11
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 71
3 Demonstrate race conditions with shared memory? Knowledge 11
4 Illustrate by writing a c program to implement tcp chat client server? Understand 9
5 Illustrate by writing a c program to implement udp chat client server? Understand 9
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 72
11. WEB TECHNOLOGIES (A10521)
11.0 COURSE DESCRIPTION FORM
Course Title WEB TECHNOLOGIES
Course Code A10521
Regulation MLR-15
Lectures Tutorials Practical’s CreditsCourse Structure
3 1 - 3
Course Coordinator Dr Kavati Ilaiah Professor CSE
Team of Instructors Mr. K Archana Assoc. Professor/ Dr. Kiran Kumar Professor / Mrs. N Sirisha Asst. Professor CSE
11.1 COURSE OVERVIEW: The World Wide Web continues to provide a foundation for the development of a broad range of increasingly influential and strategic technologies, supporting a large variety of applications and services, both in the private and public sectors. There is a growing need for management and decision makers to gain a clearer understanding of the application development process, from planning through to deployment and maintenance.
11.2 PREREQUISITE(S):
Level Credits Periods / Week PrerequisitesUG 3 5 Java , PHP, Scripting languages
11.3 COURSE ASSESSMENT METHODS
Session Marks University EndExam Marks Total Marks
There shall be two midterm examinations. Each midterm examination consists of essay paper, objective paper and assignment.The essay paper is for 10 marks of 60 minutes duration and shall contain 4questions. The student has to answer 2 questions, each carrying 5 marks.The objective paper is for 10 marks of 20 minutes duration. It consists of 10multiple choice and 10 fill-in-the blank questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.Five marks are earmarked for assignments. There shall be two assignments in every theory course. Assignments are usually issued at the time of commencement of the semester. These are of problem solving in nature with critical thinking.Marks shall be awarded considering the average of two midterm tests in each course.
75 100
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 73
11.4 a) EVALUATION SCHEME:
S. No Component Duration Marks1 I Mid Examination 80 minutes 202 I Assignment 53 II Mid Examination 80 minutes 204 II Assignment 55 External Examination 3 hours 75
b) COURSE OBJECTIVES:
I. To teach students the basics of server side scripting using PHP II. To explain web application development procedures
III. To impart servlet technology for writing business logic IV. To facilitate students to connect to databases using JDBC V. To familiarize various concepts of application development using JSP
11.5. COURSE OUTCOMES:Upon completion of this course, students will be able to:
a. Create web pages using PHP b. Identify the difference between the HTML PHP and XML documents. c. Identify the engineering structural design of XML and parse tree d. Analyze the difference between and PHP and XML. e. Understand the concept of JAVA SCRIPTS. f. Identify the difference between the JSP and Servlet. g. Design web application using MVC architecture h. Understand the JSP and Servlet concepts. i. Apply JDBC and ODBC technologies to create database connectivity
11.6 HOW PROGRAM OUTCOMES ARE ASSESSED:Upon completion of this course, students will be able to:
Course Outcomes Blooms Level
a) Create web pages using PHP BL 1 & 2
b) Identify the difference between the HTML PHP and XML documents. BL 1, 2
c) Identify the engineering structural design of XML and parse tree. BL 1, 2, 3, 4& 6
d) Analyze the difference between and PHP and XML. BL 1, 2, 3, 4,5 & 6
e) Understand the concept of JAVA SCRIPTS. BL 1,2,3 & 6
f) Identify the difference between the JSP and Servlet BL 1, 2, 3, 4& 6
g) Design web application using MVC architecture BL 1, 2, 3, 4,5 & 6
h) Understand the JSP and Servlet concepts. BL 1, 2, 3, 4,5 & 6
i) Apply JDBC and ODBC technologies to create database connectivity BL 1,2,3 & 6
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 74
BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate BL 6: Create
11.7 HOW PROGRAM OUTCOMES ARE ASSESSED:
Program Outcomes Level Proficiency assessed by Blooms Level
A
An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.(Fundamental engineering analysis skills).
HSolving Gate and Text book Problems
Apply
BAn ability to design and conduct engineering experiments, as well as to analyze and interpret data. (information retrieval skills).
SSolving Gate and Text book Problems
Apply
CAn ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. (Creative skills).
H Assignment andGate questions
Apply andAnalyze
DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. (team work)
S Mini and Micro Projects Apply
E
An ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.(Engg. Problem solving Skills)
SMicro Project Models/ Gate questions
Apply
F An understanding of professional, social and ethical responsibility N ------- --------
G
An ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements. (Engg. Application Skills)
SMicro Projects models / Gate questions
Analyze and Justify
HThe broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.
H Assignment andGate questions Analyze
I
Graduate will develop confidence for self education and acquire new knowledge in the computing discipline and ability and practice for Multidisciplinary tasks as a member within the teams
S Class Test & Seminars Analyze
J To communicate effectively S Seminars Understand & Analyze
K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. S
Class Tests & Group Activity inclass room
Apply
LGraduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc.(Continuing Education )
H GATE Apply
M
The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.
SText Book Problems as part of Assignment
Apply
N An ability to setup an enterprise.(Employment Skills) S Placement Design and Develop
N= None S= Supportive H = Highly Related
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 75
11.7. SYLLABUS
UNIT – I Introduction to PHP: Declaring variables, data types, arrays, strings, operations, expressions, control structures, functions, Reading data from web form controls like Text Boxes, radio buttons, lists etc., Handling File Uploads, Connecting to database (My SQL as reference), executing simple queries, handling results, Handling sessions and cookies. File Handling in PHP: File operations like opening, closing, reading, writing, appending, deleting etc. on text and binary files, listing directories.
UNIT – II Client side Scripting: Introduction to JavaScript: JavaScript language – declaring variables, scope of variables functions, event handlers (on click, on submit etc.), Document Object Model, Form validations. Simple AJAX applications.
UNIT – III XML: Introduction to XML, Defining XML tags, their attributes and values, Document type definition, XML Schemas, Document Object model, XHTML Parsing XML Data - DOM and SAX parsers in java
UNIT – IV Introduction to Servlets: Common Gateway Interface (CGI), Lifecycle of a Servlets, deploying a Servlets, The Servlets API, Reading Servlets parameters, Reading initialization parameters, Handling Http Request & Responses, Using Cookies and sessions, connecting to a database using JDBC.
UNIT – V Introduction to JSP: The Anatomy of a JSP Page, JSP Processing, Declarations, Directives,Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using Cookies and session tracking, connecting to database in JSP.
TEXT BOOKS: 1. Web Technologies, Uttam K Roy, Oxford University Press 2. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill
REFERENCE BOOKS: 1. Web Programming, building internet applications, Chris Bates 2nd edition, Wiley
Dremtech 2. Java Server Pages – Hans Bergsten, SPD O‘Reilly 3. Java Script, D.Flanagan, O‘Reilly, SPD. 4. Beginning Web Programming-Jon Duckett WROX. 5. Programming world wide web, R.W. Sebesta. Fourth Edition, Pearson. 6. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 76
11.8 COURSE PLAN:At the end of the course, the students are able to achieve the following course learning outcomes
Lecture No.
Course Learning Outcomes Blooms Levels Topics to be covered Reference
L1Introduction PHPhttp://www.w3schools.com/php/php_intro.asp
T2, CH1
L2
List various data types in PHP Remembering
Declaring Variables, data types, arrayshttp://www.w3schools.com/php/php_variables.asphttp://www.w3schools.com/php/php_datatypes.asphttp://www.w3schools.com/php/php_arrays.asp
T2, CH1
L3
strings, operatorshttp://www.w3schools.com/php/php_string.asphttp://www.w3schools.com/php/php_operators.asp
T2, CH2
L4Expressions, control structureshttp://www.w3schools.com/php/php_if_else.asp
T2, CH2
L5
Understands the usage of functions, control structures
Understand
Functionshttp://www.w3schools.com/php/php_functions.asp
T2,CH4
L6 Understands how to read data from web form Understand
reading data from web form controls like text boxes, radio buttons, lists etchttp://www.w3schools.com/php/php_forms.asphttp://www.w3schools.com/php/php_form_required.asp
T2, CH5
L7 Handling file uploadshttp://www.w3schools.com/php/php_file.asp T2,CH10
L8connecting to database( MYSQL reference),www.w3schools.com/php/php_mysql_connect.asp T2,CH10
L9
Explains the establishment of connection to MYSQL
Understanding
executing simple querieshttp://www.w3schools.com/php/php_mysql_create.asp T2,CH10
L10handling resultshttp://www.w3schools.com/php/php_mysql_update.asp
T2,CH10
L11
Analyze sessions and cookies Handling sessions and cookies.
http://www.w3schools.com/php/php_cookies.asp
T2,CH10
L12
Analysis
File Handling in PHPhttp://www.w3schools.com/php/php_file.asp T2,CH9
L13
File operations opening, closing, readinghttp://www.w3schools.com/php/php_file_open.asphttp://www.w3schools.com/php/php_file.asp
T2,CH9
L14writing, appendinghttp://www.w3schools.com/php/php_file_create.asp T2,CH9
L15
Describe various file handling operations in PHP Understand
deleting etc. on text and binary fileshttp://www.w3schools.com/php/php_file_upl T2,CH9
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 77
oad.asp
L16listing directorieshttp://www.w3schools.com/php/php_includes.asp
T2,CH9
L17 Introduction to XML T3,CH5L18 defining XML tags T3,CH5L19 defining XML tags T3,CH5L20
List out various HTML tags Remembering
their attributes and values T3,CH5L21 Document type definition T3,CH5L22 XML schemas T3,CH5L23 document object model T3,CH5L24
Illustrate document object model and XML schemas
Understanding
document object model T3,CH5L25 XHTML T3,CH5L26 Parsing XML Data: DOM parser in java T3,CH5L27
Compare the two parsers SAX and DOM Analysis
Parsing XML Data: SAX parser in java T3,CH5L28 Introduction to Servlets T3,CH7L29
Describe servlets UnderstandCommon Gateway Interface(CGI) T3,CH7
L30 lifecycle of a Servlets T3,CH7L31 lifecycle of a Servlets T3,CH7L32
Illustrate the deployment of servlets
Understanding
deploying Servlets T3,CH7L33 the servlet API T3,CH7L34 reading servlet parameters T3,CH7L35
Demonstrate reading and initializing parameters Understanding
reading initialization parameters T3,CH7L36 handling http requests and responses T3,CH7L37 handling http requests and responses T3,CH7L38
Implement hhtp requests and responses using cookies and sessions
Creatingusing cookies and sessions T3,CH7
L39 connection to a database using JDBC T3,CH7L40
Illustrate the connection toJDBC
Understandingconnection to a database using JDBC T3,CH7
L41 Introduction to JSP T3,CH8L42 the autonomy of a JSP page T3,CH8L43
Describe autonomy of JSP pages Understand
JSP processing T3,CH8L44 Declarations T3,CH8L45 Directives T3,CH8L46 expressions, code snippets T3,CH8L47
List out directives, expressions, code snippets, implicit objects
Knowledge
implicit objects T3,CH8L48 using beans in JSP pages T3,CH8
L49 using cookies and session for session tracking T3,CH8
L50
Implement JSP pages Creatingusing cookies and session for session tracking T3,CH8
L51 connecting to a database in JSP. T3,CH8
L52Illustrate the connection to database in JSP
Understandingconnecting to a database in JSP. T3,CH8
L53 Client side scripting T3CH3L54 Introduction to java script T3,CH3L55
Describe client side scripting Understand
java script language T3,CH3L56 Describe variables,
scope, functions Understand declaring variables T3,CH3
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 78
L57 scope of variables T3,CH3L58 Functions T3,CH3L59 event handlers(on click and on submit etc.) T3,CH3L60
Create event handlers in web page Creating
event handlers(on click and on submit etc.) T3,CH3L61 document object model T3,CH3L62
Illustrate form validation Understandingform validation T3,CH3
L63 simple AJAX application T2,CH12L64
Create simple AJAX apllication
Creating simple AJAX application T2,CH12
SESSION PLANNER
Unit No.
S.No. Topic
Lecture Number as per
the period
Date Planned Remarks
1 Introduction PHP L1
2 Declaring Variables, data types, arrays L2
3 strings, operators L3
4 Expressions, control structures L4
5 Functions L5
6 reading data from web form controls like text boxes, radio buttons, lists etc L6
7 Handling file uploads L7
8 connecting to database( MYSQL reference), L8
9 executing simple queries L9
10 handling results L10
11 Handling sessions and cookies. L11
12 File Handling in PHP L12
13 File operations opening, closing, reading L13
14 writing, appending L14
15 deleting etc. on text and binary files L15
UNITI
16 listing directories L16
17 Introduction to XML L17
18 defining XML tags L18
19 defining XML tags L19
20 their attributes and values L20
21 Document type definition L21
22 XML schemas L22
23 document object model L23
UNITII
24 document object model L24
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 79
25 XHTML L25
26 Parsing XML Data: DOM parser in java L26
27 Parsing XML Data: SAX parser in java L27
28 Introduction to Servlets L28
29 Common Gateway Interface(CGI) L29
30 lifecycle of a Servlets L30
31 lifecycle of a Servlets L31
32 deploying Servlets L32
33 the servlet API L33
34 reading servlet parameters L34
35 reading initialization parameters L35
36 handling http requests and responses L36
37 handling http requests and responses L37
38 using cookies and sessions L38
39 connection to a database using JDBC L39
UNITIII
40 connection to a database using JDBC L40
41 Introduction to JSP L41
42 the autonomy of a JSP page L42
43 JSP processing L43
44 Declarations L44
45 Directives L45
46 expressions, code snippets L46
47 implicit objects L47
48 using beans in JSP pages L48
49 using cookies and session for session tracking L49
50 using cookies and session for session tracking L50
51 connecting to a database in JSP. L51
UNITIV
52 connecting to a database in JSP. L52
53 Client side scripting L53
54 Introduction to java script L54
55 java script language L55
56 declaring variables L56
57 scope of variables L57
58 Functions L58
59 event handlers(on click and on submit etc.) L59
UNITV
60 event handlers(on click and on submit etc.) L60
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 80
61 document object model L61
62 form validation L62
63 simple AJAX application L63
64 simple AJAX application L64
11.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Course OutcomesCourse Educational Objectives
a b c d e f g h iI H H H H H S H
II H S H SIII H H H S
IV H H H H H H
V S H S H S H
VI H H H
S= Supportive H = Highly Related
11.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Program OutcomesCourse Educational Outcomes
A B C D E F G H I J k L M N
a H H H H H
b S H H S H S
c H S H S
d H S H S S
e H S H S H
f H S S S Hg H S H S S
h S H S H
i S S S HS= Supportive H = Highly Related
11.11 OBJECTIVE QUESTIONS:
UNIT-I1. What does PHP stand for?
i) Personal Home Page ii) Hypertext Preprocessoriii) Pretext Hypertext Processor iv) Preprocessor Home PageA. Both i) and iii) B. Both ii) and iv) C. Only ii) D. Both i) and ii)Answer: D
2. A PHP script should start with ___ and end with ___:
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 81
A. <php>B. < ? php ?>C. <? ?>D. <?php ?>Answer: C or D
1. Which of the following php statement/statements will store 111 in variable num?i) int $num = 111; ii) int mum = 111; iii) $num = 111; iv) 111 = $num;A. Both i) and ii) B. All of the mentioned. C. Only iii) D. Only i)Answer: C
2. What will be the output of the following php code?<? php$num=1;$num1=2;print$num."+".$num1;?>A. 3 B. 1+2 C. 1.+.2 D. ErrorAnswer: B
5. What will be the output of the following PHP code?<?php$color="maroon";$var=$color[2];echo"$var";?>a)ab)Errorc)$vard) rAnswer: D
6. What will be the output of the following code?<?phpfunction track(){static $count=0;$count++;echo$count;}track();track();track();?>A. 123 B. 111 C. 000 D. 011Answer: A
7. What is the value of $a and $b after the function call?<?phpfunctiondoSomething(&$arg){
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 82
$return=$arg;$arg+=1;return$return;}$a=3;$b=doSomething($a);?>A. a is 3 and b is 4 B. a is 4 and b is 3 C. Both are 3. D. Both are 4.Answer: B
8. Which one of the following functions can be used to compress a string?A. zip compress() B. zip() C. compress() D. gzcompress()Answer: D
9. Which one of the following PHP function is used to determine a file’s last access time?A. fileltime() B. filectime() C. fileatime() D. filetime()Answer: C
10. Which directive determines whether PHP scripts on the server can accept file uploads?A. file_uploadsB. file_uploadC. file_inputD. file_intakeAnswer: A
11. If you want to temporarily store uploaded files in the /tmp/phpuploads/ directory, which one of the following statement will you use?A. upload_tmp_dir “/tmp/phpuploads/ directory”B. upload_dir “/tmp/phpuploads/ directory”C. upload_temp_dir “/tmp/phpuploads/ directory”D. Dupload_temp_director “/tmp/phpuploads/ directory”Answer: A
12. Which one of the following databases has PHP supported almost since the beginning?A. Oracle Database B. SQL C. SQL+ D. MySQLAnswer: D
13. Which one of the following statements can be used to select the databaseA. $mysqli=select_db(‘databasename’); B. mysqli=select_db(‘databasename’);C. mysqli->select_db(‘databasename’);
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 83
D. $mysqli->select_db(‘databasename’);Answer: D
14. Which one of the following methods can be used diagnose and displayinformation about a MySQL connection error?A. connect_errno() B. connect_error()C. mysqli_connect_errno() D. mysqli_connect_error()Answer: C
14. Which one of the following is the very first task executed by a session enabled page?A. Delete the previous session B. Start a new sessionC. Check whether a valid session exists D. Handle the sessionAnswer: C
15. Which one of the following function is used to start a session?A. start_session() B. session_start() C. session_begin() D. begin_session()Answer: B
16. The session_start() function must appear..A. after the html tag B. after the body tag C. before the body tag D. before the html tagAnswer: D
17. Which one of the following function is capable of reading a file into a string variable?A. file_contents() B. file_get_contents() C. file_content() D. file_get_content()Answer: B
18. Which one of the following methods is responsible for sending the query to the database?A. query() B. send_query() C. sendquery() D. query_send()Answer: A
19. Which one of the following method is used to retrieve the number of rows affected by an INSERT, UPDATE, or DELETE query?A. num_rows() B. affected_rows() C. changed_rows() D. new_rows()Answer: B
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 84
20. Which of the following methods is used to execute the statement after the parameters have been bound?A. bind_param() B. bind_result() C. bound_param() D. bound_result() Answer: A
UNIT-II1. What does XML stand for?
A. eXtra Modern LinkB. eXtensible Markup LanguageC. Example Markup LanguageD. X-Markup Language Answer: B
2. What is the correct syntax of the declaration which defines the XML version?A. <xml version="A.0" />B. <?xml version="A.0"?>C. <?xml version="A.0" />D. None of the above Answer: B
3. Which statement is true?A. All the statements are trueB. All XML elements must have a closing tag C. All XML elements must be lower case D. All XML documents must have a DTD Answer: B
4. Is it easier to process XML than HTML?A. Yes B. No C. SomtimesD. Cant say Answer: A
5. Which of the following programs support XML or XML applications?A. Internet Explorer 5.5B. Netscape D.7 C. RealPlayer. D. both A and B Answer: D
6. Kind of Parsers are A. Ans: C well-formed B. well-documented C. non-validating and validatingD. none of the above Answer: C
7. Well formed XML document means A. it contains a root element B. it contain an element C. it contains one or more elements
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 85
D. must contain one or more elements and root element must contain all other elements
Answer: D8. Comment in XML document is given by
A. <?-- -->B. <!-- --!>C. <!-- -->D. </-- -- >Answer: C
9. When processing an output XML, "new line" symbolsA. Are copied into output "as is", i.e. "CR+LF" for Windows, CR for Macintosh, LF
for Unix. B. are converted to single LF symbolC. are converted to single CR symbolD. are discarded Answer: D
10. Which of the following strings are correct XML names?A. _myElementB. my Element C. #myElementD. None of the aboveAnswer: D
11. Valid XML document means (most appropriate)A. the document has root elementB. the document contains atleast one or more root elementC. the XML document has DTD associated with it & it complies with that DTDD. Each element must nest inside any enclosing element propertyAnswer: C
12. XML uses the features ofA. HTMLB. XHTMLC. VMLD. SGMLAnswer: D
13. there is a way of describing XML data, how?A. XML uses a DTD to describe the dataB. XML uses XSL to describe dataC. XML uses a description node to describe dataD. Both A and CAnswer: D
13. Which of the following XML documents are well-formed?A. <firstElement>some text goes here <secondElement>another text goes
here</secondElement></firstElement>
B. <firstElement>some text goes here</firstElement><secondElement> another text goes here</secondElement>
C. <firstElement>some text goes here<secondElement> another text goes here</firstElement></secondElement>
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 86
D. </firstElement>some text goes here</secondElement>another text goes here<firstElement>
Answer: A14. Which of the following XML fragments are well-formed?
A. <myElementmyAttribute="someValue"/>B. <myElementmyAttribute=someValue/>C. <myElementmyAttribute=’someValue’>D. <myElementmyAttribute="someValue’/>Answer: A
15. How can we make attributes have multiple values:A. <myElementmyAttribute="value1 value2"/>B. <myElementmyAttribute="value1" myAttribute="value2"/>C. <myElementmyAttribute="value1, value2"/>D. attributes cannot have multiple valuesAnswer: D
16. Which of the following XML fragments are well-formed?A. <myElementmyAttribute="value1 <= value2"/>B. <myElementmyAttribute="value1 & value2"/>C. <myElementmyAttribute="value1 > value2"/>D. None of the aboveAnswer: C
17. The use of a DTD in XML development is:A. required when validating XML documentsB. no longer necessary after the XML editor has been customizedC. used to direct conversion using an XSLT processorD. a good guide to populating a templates to be filled in when generating an XML
document automaticallyAnswer: A
18. Parameter entities can appear inA. xml fileB. dtd fileC. xsl fileD. Both 1 and 2Answer: B
19. Attribute standalone="no" should be included in XML declaration if a documentA. is linked to an external XSL stylesheetB. has external general referencesC. has processing instructionsD. has an external DTDAnswer: B
UNIT-III1. The method getWriter returns an object of type PrintWriter. This class has println
methods to generate output. Which of these classes define the getWriter method? Select the one correct answer. A. HttpServletRequestB. HttpServletResponseC. ServletConfigD. ServletContext
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 87
Answer: B2. Name the method defined in the HttpServletResponse class that may be used to set
the content type. Select the one correct answer. A. setTypeB. setContentC. setContentTypeD. setResponseContentTypeAnswer: B
3. Which of the following statement is correct? Select the one correct answer. A. The response from the dedicated server to a HEAD request consists of status line,
content type and the document. B. The response from the server to a GET request does not contain a document. C. The setStatus method defined in the HttpServletRequest class takes an int as an
argument and sets the status of Http response D. The HttpServletResponse defines constants like SC_NOT_FOUND that may be
used as a parameter to setStatus method. Answer: D.
4. The send Error method defined in the HttpServlet class is equivalent to invoking the set Status method with the following parameter. Select the one correct answer.A. SC_MOVED_TEMPORARILY B. SC_NOT_FOUND C. SC_INTERNAL_SERVER_ERROR D. ESC_BAD_REQUEST Answer: C.
5. The send Redirect method defined in the HttpServlet class is equivalent to invoking the set Status method with the following parameter and a Location header in the URL. Select the one correct answer. A. SC_MOVED_TEMPORARILY B. SC_NOT_FOUND C. SC_INTERNAL_SERVER_ERROR D. ESC_BAD_REQUEST Answer: B
6. Which of the following statements are correct about the status of the Http response. Select the one correct answer. A. A status of 200 to 299 signifies that the request was successful. B. A status of 300 to 399 are informational messages. C. A status of 400 to 499 indicates an error in the server. D. A status of 500 to 599 indicates an error in the client. Answer: A.
7. To send binary output in a response, the following method of HttpServletResponse may be used to get the appropriate Writer/Stream object. Select the one correct answer. A. getStreamB. getOutputStreamC. getBinaryStreamD. getWriterAnswer: B.
8. To send text output in a response, the following method of HttpServletResponse may be used to get the appropriate Writer/Stream object. Select the one correct answer.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 88
A. getStreamB. getOutputStreamC. getBinaryStreamD. getWriterAnswer: D
9. Is the following statement true or false. URL rewriting may be used when a browser is disabled. In URL encoding the session id is included as part of the URL. Answer: true.
10. Name the class that includes the get Session method that is used to get the Http Session object. A. HttpServletRequestB. HttpServletResponseC. SessionContextD. SessionConfigAnswer: A
11. Which of the following are correct statements? Select the two correct answers. A. The getRequestDispatcher method of ServletContext class takes the full path of
the servlet, whereas the getRequestDispatcher method of HttpServletRequest class takes the path of the servlet relative to the ServletContext.
B. They include method defined in the RequestDispatcher class can be used to access one servlet from another. But it can be invoked only if no output has been sent to the server.
C. The getRequestDispatcher(String URL) is defined in both ServletContext and HttpServletRequest method
D. The getNamedDispatcher(String) defined in HttpServletRequest class takes the name of the servlet and returns an object of RequestDispatcher class.
Answer: A, C. 12. A user types the URL http://www.javaprepare.com/scwd/index.html . Which
HTTP request gets generated? Select the one correct answer. A. GET method B. POST method C. HEAD method D. PUT method Answer: A.
13. Which HTTP method gets invoked when a user clicks on a link? Select the one correct answer. A. GET method B. POST method C. HEAD method D. PUT method Answer: A.
13. When using HTML forms which of the following is true for POST method? Select the one correct answer. A. POST allows users to bookmark URLs with parameters. B. The POST method should not be used when large amount of data needs to be
transferred. C. POST allows secure data transmission over the http method. D. POST method sends data in the body of the request. Answer: D.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 89
14. Which of the following is not a valid HTTP/1.1 method? Select the one correct answer. A. CONNECT method B. COMPARE method C. OPTIONS method D. TRACE method Answer: B.
15. Name the http method used to send resources to the server. Select the one correct answer. A. FTP methoddB. PUT method C. WRITE method D. COPY method Answer: B.
16. Name the http method that sends the same response as the request. Select the one correct answer. A. DEBUG method B. TRACE method C. OPTIONS method D. HEAD method Answer: B.
17. Which three digit error codes represent an error in request from client? Select the one correct answer. A. Codes starting from 200 B. Codes starting from 300 C. Codes starting from 400 D. Codes starting from 500 Answer: C.
18. Name the location of compiled class files within a war file? Select the one correct answer. A. /META-INF/classes B. /classes C. /WEB-INF/classes D. /root/classes Answer: C.
19. To send binary output in a response, the following method of HttpServletResponse may be used to get the appropriate Writer/Stream object. Select the one correct answer. A. getStreamB. getOutputStreamC. getBinaryStreamD. getWriterAnswer: B.
UNIT-IV1. When a JSP page is compiled, what is it turned into?
A. Applet B. Servlet C. Application D. Mailet
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 90
Answer: B2. Which of the following is not a standard method called as part of the JSP life
cycle?A. jspInit() B. jspService() C. jspService() D. jspDestroy() Answer: A
3. If you want to override a JSP file's initialization method, within what type of tags must you declare the method?A. <@ @>B. <%@ %>C. <% %>D. <%! %>Answer: B
4. What is the default location for applications served by tomcat? A. /conf B. /webappsC. /bin D. /include Answer: B
5. _ _ _ _ _ _ _ _ _ keep the information on the server and pass only an identifier between a browsers and servers.A. URL Rewriting B. Session tracking C. Session ID D. Session Control Answer: B
6. The doGet() method in the example extracts values of the parameter’s type and number by using __________ A. request.getParameter() B. request.setParameter() C. responce.getParameter() D. responce.getAttribute() Answer: A
7. A JSP is transformed into a(n): A. Java applet B. Java servlet C. Either 1 or 2 above D. Neither 1 nor 2 above Answer: B
8. What programming language(s) or scripting language(s) does Java Server Pages (JSP) support?A. VBScript only B. Jscript only C. Java only D. All of the above are supported Answer: C
9. How many copies of a JSP page can be in memory at a time?[ a]. A. One
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 91
B. Two C. Three D. Unlimited Answer: A
10. How does Tomcat execute a JSP? A. As CGI ScriptB. As an Independent process C. By one of Tomcat Thread D. None of the above is correctAnswer: C
11. A bean with a property color is loaded using the following statement <jsp:usebean id="fruit" class="Fruit"/> What happens when the following statement is executed. Select the one correct answer. <jsp:setProperty name="fruit" property="*"/>A. This is incorrect syntax of <jsp:setProperty/> and will generate a compilation
error. Either value or param must be defined. B. All the properties of the fruit bean are initialized to a value of null. C. All the properties of the fruit bean are assigned the values of input parameters of
the JSP page that have the same name. D. All the properties of the fruit bean are initialized to a value of *. Answer: C
12. Is the following statement true or false. If the isThreadSafe attribute of the page directive is false, then the generated servlet implements the SingleThreadModel interface. Answer: true. (The page directive is defined as <%@page isThreadSafe="false"%> )
13. Which of the following represents a correct syntax for usebean? Select the two correct answers. A. <jsp:usebean id="fruit scope ="page"/>B. <jsp:usebean id="fruit type ="String"/>C. <jsp:usebean id="fruit type ="String" beanName="Fruit"/>D. <jsp:usebean id="fruit class="Fruit" beanName="Fruit"/>Answer: B,C.
14. Name the default value of the scope atribute of <jsp:usebean>. A. page B. application C. session D. request Answer: A
15. Which of the following statements are true for <jsp:usebean>. Select the two correct answers. A. The id attribute must be defined for <jsp:usebean>. B. The scope attribute must be defined for <jsp:usebean>. C. The class attribute must be defined for <jsp:usebean>. D. The <jsp:usebean> must include either type or class attribute or both. Answer: A,D.
16. Which of these are legal attributes of page directive. Select the two correct answers. A. include B. scope C. errorPage
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 92
D. session Answer: C,D.
17. Which of the following represents the XML equivalent of this statement <%@ include file="a.jsp"%> . Select the one correct statementA. <jsp:include file="a.jsp"/>B. <jsp:include page="a.jsp"/>C. <jsp:directive.include file="a.jsp"/>D. There is no XML equivalent of include directive. Answer: C
18. Assume that you need to write a JSP page that adds numbers from one to ten, and then print the output. <% int sum = 0; for(j = 0; j < 10; j++) { %> // XXX --- Add j to sum <% } %> // YYY --- Display ths sum Which statement when placed at the location XXX can be used to compute the sum. Select the one correct statement A. <% sum = sum + j %>B. <% sum = sum + j; %>C. <%= sum = sum + j %>D. <%= sum = sum + j; %>Answer: B
19. Now consider the same JSP example as last question. What must be added at the location YYY to print the sum of ten numbers. Select the one correct statement A. <% sum %>B. <% sum; %>C. <%= sum %>D. <%= sum; %>Answer: C
20. JSP pages have access to implicit objects that are exposed automatically. One such object that is available is request. The request object is an instance of which class? A. HttpRequestB. ServletRequestC. Request D. HttpServletRequestAnswer: D
UNIT-V1. Why so JavaScript and Java have similar name?
A. JavaScript is a stripped-down version of Java B. JavaScript's syntax is loosely based on Java's C. They both originated on the island of Java D. None of the aboveAnswer: B
2. When a user views a page containing a JavaScript program, which machine actually executes the script?A. The User's machine running a Web browser B. The Web server C. A central machine deep within Netscape's corporate offices D. None of the above Answer: A
3. ______ JavaScript is also called client-side JavaScript. A. Microsoft B. Navigator
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 93
C. LiveWireD. Native Answer: B
4. __________ JavaScript is also called server-side JavaScript. A. Microsoft B. Navigator C. LiveWireD. Native Answer: C
5. What are variables used for in JavaScript Programs? A. Storing numbers, dates, or other values B. Varying randomly C. Causing high-school algebra flashbacks D. None of the above Answer: A
6. _____ JavaScript statements embedded in an HTML page can respond to user events such as mouse-clicks, form input, and page navigation. A. Client-side B. Server-side C. Local D. Native Answer: A
7. What should appear at the very end of your JavaScript? The <script LANGUAGE="JavaScript">tag A. The </script>B. The <script>C. The END statement D. None of the above Answer: A
8. Which of the following can't be done with client-side JavaScript? A. Validating a form B. Sending a form's contents by email C. Storing the form's contents to a database file on the serverD. None of the above Answer: C
9. Which of the following are capabilities of functions in JavaScript? A. Return a value B. Accept parameters and Return a value C. Accept parameters D. None of the above Answer: C
10. Which of the following is not a valid JavaScript variable name? A. 2names B. _first_and_last_namesC. FirstAndLastD. None of the above Answer: A
11. ______ tag is an extension to HTML that can enclose any number of JavaScript statements. A. <SCRIPT>
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 94
B. <BODY>C. <HEAD>D. <TITLE>Answer: A
12. How does JavaScript store dates in a date object?A. The number of milliseconds since January 1st, 1970B. The number of days since January 1st, 1900C. The number of seconds since Netscape's public stock offering. D. None of the above Answer: A
13. Which of the following attribute can hold the JavaScript version? A. LANGUAGE B. SCRIPT C. VERSION D. None of the above Answer: A
14. What is the correct JavaScript syntax to write "Hello World"? A. System.out.println("Hello World") B. println ("Hello World") C. document.write("Hello World") D. response.write("Hello World") Answer: C
15. Which of the following way can be used to indicate the LANGUAGE attribute? A. <LANGUAGE="JavaScriptVersion">B. <SCRIPT LANGUAGE="JavaScriptVersion">C. <SCRIPT LANGUAGE="JavaScriptVersion"> JavaScript
statements…</SCRIPT>D. <SCRIPT LANGUAGE="JavaScriptVersion"!> JavaScript
statements…</SCRIPT>Answer: C
16. Inside which HTML element do we put the JavaScript?A. <js>B. <scripting>C. <script>D. <javascript>Answer: C
17. What is the correct syntax for referring to an external script called " abc.js"?A. <script href=" abc.js">B. <script name=" abc.js">C. <script src=" abc.js">D. None of the above Answer: C
18. Which types of image maps can be used with JavaScript?A. Server-side image maps B. Client-side image mapsC. Server-side image maps and Client-side image mapsD. None of the aboveAnswer: B
19. Which of the following navigator object properties is the same in both Netscape and IE?
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 95
A. navigator.appCodeNameB. navigator.appNameC. navigator.appVersionD. None of the above Answer: A
20. Which is the correct way to write a JavaScript array? A. var txt = new Array(1:"tim",2:"kim",3:"jim") B. var txt = new Array:1=("tim")2=("kim")3=("jim") C. var txt = new Array("tim","kim","jim")D. var txt = new Array="tim","kim","jim" Answer: C
11.12 TUTORIAL QUESTION BANK (5/UNIT)PART A (SHORT ANSWER QUESTIONS)
Sl. No. QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT-I1 What is PHP? Knowledge a2 What is Data Type? Knowledge a3 Explain different types of operators? Analysis a4 Explain String Functions? comprehension b5 What is a Function? comprehension a6 Define Multi-dimensional Array? Knowledge a7 Explain Scope, Local, Global, Static? Knowledge a
8
What is the output of the following:<?php$actor[0]=”laxmi”;Echo “\$actor[0]”;?>
Analysis a
9 Discuss associative arrays with example. Analysis a
10
What is the output of following:<?php$x=10;function f(){echo GLOBALS[‘$x’];}f();echo $x;>?
Knowledge b
UNIT-II1 Define an xml scheme show how an XML Scheme can be created Remember a
2 How do you define the elements of an XML document in an XML Schema? Remember a
3 Explain is XML? What are the advantages of xml? understanding a
4 Explain are the different revolution in which XML is playing a major role? Understanding b
5 Explain and show how XML is useful in defining data for web applications. Understanding a
6 Explain the various terms related to Document Type Definition. Understanding a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 96
7 Design an XML schema for hospital information management. Include every feature available with schema. Creating a
8 Explain how styling XML with cascading style sheets is done for the library information domain. Understanding a
9 Discuss the important features of XML which make it more suitable than HTML for creating web related services Creating a
10 What is DOM and SAX? Remembering bUNIT-III
1 List out various phases of Servlet life cycle? Remember a
2 Write a Servlet program to illustrate parameter reading and parameter initializing. ? Remember a
3 When init() method of servlet gets called? Remember a4 When service() method of servlet gets called? Remember b5 When doGet() method of servlet to be called? Remember a6 What are Servlets? Remember a7 What are the major tasks of servlets? Remember a8 For what purpose doGet() method of a servlet is used? Remember a9 How to read form data in servlet? Remember a10 How to read name of all parameters in servlet? Remember b
UNIT-IV1 What is JSP? Remember a2 What are advantages of using JSP? Remember a3 What are the advantages of JSP over Active Server Pages (ASP)? Remember a4 What are the advantages of JSP over Pure Servlets? Remember b5 What are the advantages of JSP over JavaScript? Remember a6 Explain lifecycle of a JSP. Remember a7 What are JSP declarations? Remember a8 What is a sciptlet in JSP and what is its syntax? Remember a9 What are JSP expressions? Remember a10 What are JSP comments? Remember b
UNIT-V1 What is JavaScript? Remember a2 Name some of the JavaScript features. Remember a3 What are the advantages of using JavaScript? Remember a4 What are disadvantages of using JavaScript? Remember b5 Is JavaScript a case-sensitive language? Remember a6 How can you create an Object in JavaScript? Remember a7 How can you read properties of an Object in JavaScript? Remember a8 How can you create an Array in JavaScript? Remember a9 How to read elements of an array in JavaScript? Remember a10 What is arguments object in JavaScript? Remember b
PART B (LONG ANSWER QUESTIONS)
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 97
Sl. No. QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT-I
1 What is string Interpolation? Explain briefly about PHP’s Internal Data Types. Remembering b
2 Explain the conversion between different data types in PHP with an Example program. Understanding e
3 How text manipulation is done in PHP. Write a program to compare two strings and print respectively. Remembering b
4 Write a program in PHP to create a registration page using FORMS. Remembering a5 Write a program in PHP for passing arguments using Functions. Remembering b6 Write a PHP program to print addition of two matrices. Remembering e7 Write a PHP program to count number of words in the given string. Remembering b
8 Write a PHP program to check whether given number is Armstrong or not. Remembering e
9 Write a PHP program to create user validation Form. Remembering b10 Explain about foreach loop. Remembering A
UNIT-II
1 Explain and show how XML is useful in defining data for web applications. understanding b
2 Explain the various terms related to Document TypeDefinition. understanding e
3 Design an XML schema for hospital information management. Include every feature available with schema. Creating b
4 Explain how styling XML with cascading style sheets is done for the library information domain. Creating a
5 Discuss the important features of XML which make it moreSuitable than HTML for creating web related services. Creating b
6 Define an xml scheme show how an XML Scheme can be created Remember e
7 Write a JavaScript program to validate XML documentagainst a schema? Remember b
8 When an element is called simple? How does it differ from acomplex element? Remember e
9 How do you define the elements of an XML document in anXML Schema? Remember b
10 How do you set default and fixed values for simple Elements? Remember aUNIT-III
1 Write a Servlet that generates HTML page and explain theprocess of generation of HTML page Remember b
2 List and explain the classes and interfaces of javax. Servlet .httppackage. Remember e
3 Develop a Servlet that handles HTTP get Request Applying b4 Describe about session tracking with relevant code snippet. understanding a5 Servlet offer several advantages over CGI". Justify evaluating b6 Write about Security Issues in Servlet Remember e
7 Write about Servlet? Explain lifecycle of a Servlet. Illustratewith an example program. Remember b
8 Write a Servlet program to illustrate parameter reading andparameter initializing. Remember e
9 Explain Cookies session tracking with relevant code snippet. understanding b10 List the methods defined in HttpServletRequest. Remember a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 98
UNIT-IV1 Write about the JSP processing. Remember b
2 Explain the mechanism to include resources dynamically and to forward request to other JSPs? understanding e
3 Explain about JSP Elements? understanding b4 List the different Action Tags used in JSP with their functionality Remember a5 Explain the types of Scripting tags and Directive tags in JSP. understanding b6 Write a Short note on JSP Implicit Objects. Remember e
7 Explain different JSP Directive Elements? Explain each oneof them in detail? understanding b
8 Explain JSP application design with suitable example? understanding e9 Write a JSP with a Bean in the session scope. Remember b
10 Describe the MVC architecture and write a JSP programwhich prints the current date? understanding a
UNIT-V
1Write a JavaScript that displays the as per the following: Understand(calculates the squares and cubes of the numbers from 0 to 210)
Remember b
2
Write a JavaScript to analyze a subject code for subject in a semester. The subject code may be visualized like 12 CS 43engineering discipline as Computer Science and Engineeringand „4‟ gives the semester details as 4 them, and „3‟ gives thesubject in formatin.
Remember E
4 Show how JavaScript can handle the events? “JavaScript is event driven”. What is meant by an event? comprehension A
5 Define an Object. Explain the various objects that are used in the JavaScript comprehension B
6 Write a java script which accepts text in lower case and displays text in uppercase.
Remember E
7 Write a java script to validate a form consisting of user name. Also navigate to another web pages after navigation Remember B
8 Write a java script that read four integers and display the largest and displays the largest and smallest integers from the given integers. Remember E
9 Write a java Script program to determine whether a given number is an Armstrong number or not Remember B
10Write a JavaScript that reads list of ten numbers and displays the count of negative numbers, the count of positive numbers and the count of zeros from the list.
Remember A
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S. No QuestionBlooms
Taxonomy Level
Course Outcome
UNIT –I
1 Write a php program that replaces some characters with some other characters in a string. Comprehension 4
2 Write a php program uses a constant inside a function, even if it is defined outside the function.
Application,Synthesis 4
3 Write a php program that uses array operators. Application,Synthesis
4
UNIT –II
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 99
1 Try an XML program to print the food menu. Application 5
2 Implement xml in doing CD catalog. Application 5
UNIT –III
1 Write a servlet program to print hello world. Analysis , valuation
8
2 Write a sample program which will pass two values to HelloForm program using GET method.
Application 8
3 Write a servlet program using getHeaderNames() method of HttpServletRequest to read the HTTP header information.
Application 8
UNIT –IV
1 Write login HTML page, we will put it in the welcome files list in the web.xml so that when we launch the application it will open the login page. If the login will be successful, the user will be presented with new JSP page with login successful message
Application 10
2 Write a jsp program to print the current date. Application 10
3 Use setIntHeader() method to set Refresh header to simulate a digital clock.
Understand 10
UNIT –V
1 Write a javascript program to print fibnocci series. Application, Synthesis
12
2 Write a JavaScript form validation program with example. Application 12
3 Write a JavaScript palindrome program with example. Application 12
11. 13 ASSIGNMENT QUESTIONS:PART A (SHORT ANSWER QUESTIONS)
Sl. No. QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT-I1. What is PHP? Remember G2. What is the use of "echo" in php? Remember I3. What's the difference between include and require? Remember I
4. require_once(), require(), include().What is difference between them? Remember A
5. Differences between GET and POST methods? Remember G6. How to declare an array in php? Remember G7. What is the use of 'print' in php? Remember I8. What is use of in_array() function in php ? Remember A9. What is use of count() function in php ? Remember G10. What is sql injection ? Remember I
UNIT-II1. What is XML? Remember I2. What is the difference between XML and HTML? Remember I3. What is a well-formed XML document? Remember I4. What is a valid XML document? Remember I5. What is a Processing Instruction in XML? Remember I6. How does the XML structure is defined? Analyze D
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 100
7. What is DTD? Remember G8. What is a Complex Element? Remember A9. What is a Simple Element? Remember G
10. What are namespaces? Why are they important? Remember AUNIT-III
1. What are the advantages of servlets over CGI? Remember I2. How to redirect a request from a servlet to another servlet? Remember I3. How sendRedirect method works? Remember A4. What are servlets filters? Remember G5. For what purpose destroy() method of a filter is used? Remember G6. How to create a cookie using servlet? Remember I7. How to read a cookie using servlet? Remember A8. How to delete a cookie using servlet? Remember G9. How to create a session in servlet? Remember I10. How to update an attribute in session in servlet? Remember A
UNIT-IV1. What is a page directive? Remember I2. What is a buffer attribute? Remember I3. What is contentType attribute? Remember I4. What is session attribute? Remember D5. What is a taglib directive? Remember D6. What is a include directive? Remember A7. What is <jsp:setProperty> action? Remember G8. What is <jsp:getProperty> action? Remember A9. What are JSP implicit objects? Remember G10. What is a response object? Remember A
UNIT-V1. Which built-in method sorts the elements of an array? Remember I
2. Which built-in method returns the calling string value converted to lower case? Remember I
3. How typeof operator works? Remember I4. What typeof returns for a null value? Remember I5. How to read a Cookie using JavaScript? Remember I6. How to delete a Cookie using JavaScript? Remember I7. How to handle exceptions in JavaScript? Remember G
8. Which built-in method reverses the order of the elements of an array? Remember I
9. Which built-in method combines the text of two strings and returns a new string? Remember I
10. What is the purpose of 'this' operator in JavaScript? Remember I
PART B (LONG ANSWER QUESTIONS)
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 101
Sl. No. QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT-I
1. How to set a page as a home page in a php based site? How to find the length of a string? Remember G
2. What is mean by an associative array? Write a program to print the name and the age of a person’s using associative arrays. Remember G
3. Extend the importance of "method" attribute in a html form? Explain it with the help of an example. Understanding I
4. What is the importance of "action" attribute in a html form? Remember A5. How to create an array of a group of items inside an HTML form? Remember A
UNIT-II
1. How XSL-FO Works (or) How would you produce PDF output using XSL’s? Remember G
2. Explain XSLT? Understanding E3. What is a CDATA section in XML? Remember A4. What is XML parser? Remember A5. What are the interfaces of SAX? Remember A
UNIT-III1. What are common tasks performed by Servlet Container? Remember D2. What is Servlet Config object? What is Servlet Context object? Remember A3. What is difference between Servlet Config and Servlet Context? Remember D
4. What is Request Dispatcher? What is difference between Print Writer and Servlet Output Stream? Remember A
5. What is Single Thread Model interface? Remember DUNIT-IV
1. Explain JSP directives. Understand A2. Show attributes of page directives. Apply A3. What are standard actions in JSP? Understand G4. Explain the jsp:set Property action. Understand I5. Explain client and server side validation. Understand D
UNIT-V
1. What is called Variable typing in Javascript? How can you convert the string of any base to integer in Java Script? Remember E
2. What is an undefined value in JavaScript? What are all the types of Pop up boxes available in JavaScript? Remember I
3. What is the difference between an alert box and aconfirmation box?What are escape characters? Remember D
4. Explain what is pop() method in Java Script? Mention what is the disadvantage of using inner HTML in JavaScript? Understanding A
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 102
Sl. No. QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT-I
1. How to set a page as a home page in a php based site? How to find the length of a string? Remember G
2. What is mean by an associative array? Write a program to print the name and the age of a person’s using associative arrays. Remember G
3. Extend the importance of "method" attribute in a html form? Explain it with the help of an example. Understanding I
4. What is the importance of "action" attribute in a html form? Remember A5. How to create an array of a group of items inside an HTML form? Remember A
UNIT-II1. Explain XSLT? Understanding E2. What is a CDATA section in XML? Remember A3. What is XML parser? Remember A4. What are the interfaces of SAX? Remember A
UNIT-III5. What is a web application and what is it’s directory structure? Remember A1. What are common tasks performed by Servlet Container? Remember D2. What is Servlet Config object? What is Servlet Context object? Remember A3. What is difference between Servlet Config and Servlet Context? Remember D
4. What is Request Dispatcher? What is difference between Print Writer and Servlet Output Stream? Remember A
5. What is Single Thread Model interface? Remember DUNIT-IV
1. Explain JSP directives. Understand A2. Show attributes of page directives. Apply A3. What are standard actions in JSP? Understand G4. Explain the jsp:set Property action. Understand I5 Explain client and server side validation. Understand D
UNIT-V
1. What is an undefined value in Java Script? What are all the types of Pop up boxes available in JavaScript? Remember I
2. What is the difference between an alert box and a confirmation box?What are escape characters? Remember D
3. Explain what is pop() method in Java Script? Mention what is the disadvantage of using inner HTML in JavaScript? Understanding A
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 103
12. COMPILER DESIGN (A10522)
12.1 COURSEDESCRIPTION FORM:
Course Title COMPILER DESIGNCourse Code A10522Regulation MLR-15
Lectures Tutorials Practical’s CreditsCourse Structure
3 1 - 3Course Coordinator Mrs. Tulasi Chitra , Assoc. Professor CSE
Team of Instructors Mrs. K. Archana , Assoc. Professor/ Mrs.Anjusha Assoc. Professor,/Mr. Y. Madhan Reddy Asst.Professor CSE
12.1 COURSE OVERVIEW:This course deals with the basic techniques of Compiler Construction and tools that can
used to perform syntax-directed translation of a high-level programming language into an executable code. This will provide deeper insights into the more advanced semantics aspects of programming languages, code generation, machine independent optimizations, dynamic memory allocation, types and their inferences, object orientation. The course is presented to the students by using power point projections, lecture notes, subjective and objective tests, assignments, and laboratory.
12.2 PREREQUISITE(S):
Level Credits Periods / Week PrerequisitesUG 3 5 C Programming and Formal Languages Automata Theory
12.3. MARKS DISTRIBUTION:
Session Marks University EndExam Marks Total Marks
There shall be 2 midterm examinations. Each midterm Examination Consists of subjective type and Objective type tests.The subjective test is for 10 marks, with duration of 1 hour. Subjective test of each semester shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for10 marks with duration of 20 minutes. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first four units of syllabus and second midterm examination shall be conducted for the Remaining portion.Five marks are marked for assignments. There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course
75 100
12.4 EVALUATION SCHEME:
S. No Component Duration Marks
1 I Mid Examination 80minutes 20
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 104
2 I Assignment 5
3 II Mid Examination 80minutes 20
4 II Assignment 5
5 External Examination 3 hours 75
COURSE OBJECTIVES:I. To teach concepts of language translation and phases of compiler design
II. To describe the common forms of parsers III. To inculcate knowledge of parser by parsing LL parser and LR parser IV. To demonstrate intermediate code using technique of syntax directed translation V. To Illustrate the various optimization techniques for designing various
optimizing compilers
12.5 COURSE OUTCOMES:
Course Outcomes Blooms Level
a. Use compiler construction tools and describes the Functionality of each stage of compilation process BL 1 & 2
b. Construct Grammars for Natural Languages and find the Syntactical Errors/Semantic errors during the compilations using parsing techniques
BL 6
c. Analyze different representations of intermediate code. BL 2 & 3
d. Construct new compiler for new languages. BL 6
e. Participate in GATE BL 2 & 3
BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate BL 6: Create
12.6 HOW COURSE OUTCOMES ARE ASSESSED:
Program Outcomes Level Proficiencyassessed by
AAn ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.
S Exercises
B An ability to design and conduct engineering experiments, as well as to analyze and interpret data.
C An ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. H Exercises
DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams.
EAn ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipment’s necessary to analyze computer Problems.
H Assignments
F An understanding of professional, social and ethical responsibility N -----
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 105
GAn ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements.
S Exercises
H The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context. H Discussion
IGraduate will develop confidence for self-education and acquire new knowledge in the computing discipline and ability and practice for Multi-disciplinary tasks as a member within the teams
H ExampleAssignments
J To communicate effectively N -----
K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice N -----
L Graduates are able to participate and succeed in competitive examination like GRE,GATE, TOEFL, GMAT etc. H Exams
Discussion
M
The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.
NThe basic knowledge of electronics, electrical components, computer architecture and applications of microcomputer systems, communications needed in data transport.
N= None S= Supportive H = Highly Related
12.7 SYLLABUS:
UNIT – IINTRODUCTION TO COMPILERS: Definition of compiler, interpreter and its differences, the phases of a compiler, role of lexical analyzer, regular expressions, finite automata, from regular expressions to finite automata, pass and phases of translation, bootstrapping, LEX-lexical analyzer generator.PARSING: Parsing, role of parser, context free grammar, derivations, parse trees, ambiguity, elimination of left recursion, left factoring, eliminating ambiguity from dangling-else grammar, classes of parsing, top down parsing - backtracking, recursive descent parsing, predictive parsers, LL(1) grammars.
UNIT – IIBOTTOM UP PARSING: Definition of bottom up parsing, handles, handle pruning, stack implementation of shift-reduce parsing, conflicts during shift-reduce parsing, LR grammars, LR parsers-simple LR, canonical LR(CLR) and Look Ahead LR (LALR) parsers, error recovery in parsing, parsing ambiguous grammars, YACC-automatic parser generator.
UNIT - IIISYNTAX DIRECTED TRANSLATION: Syntax directed definition, construction of syntax trees, S- attributed and L-attributed definitions, translation schemes, emitting a translation.INTERMEDIATE CODE GENERATION: intermediate forms of source programs– abstract syntax tree, polish notation and three address code, types of three address statements and its implementation, syntax directed translation into three-address code, translation of simple statements, Boolean expressions and flow-of-control statements.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 106
UNIT - IVTYPE CHECKING: Definition of type checking, type expressions, type systems, static and dynamic checking of types, specification of a simple type checker, equivalence of type expressions, type conversions, overloading of functions and operators.RUN TIME ENVIRONMENTS: Source language issues, Storage organization, storage-allocation Strategies, access to non-local names, parameter passing, symbol tables and language facilities for dynamic storage allocation.
UNIT - VCODE OPTIMIZATION: Organization of code optimizer, basic blocks and flow graphs, optimization of basic blocks, the principal sources of optimization, the directed acyclic graph (DAG) representation of basic block, global data flow analysis.CODE GENERATION: Machine dependent code generation, object code forms, the target machine, a simple code generator, register allocation and assignment, peephole optimization.
TEXT BOOKS:1. Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman (2007), Compilers
Principles,Techniques and Tools, 2nd edition, Pearson Education, New Delhi, India.
REFERENCE BOOKS:1. Alfred V. Aho, Jeffrey D. Ullman (2001), Principles of compiler design, Indian
student edition, Pearson Education, New Delhi, India.2. Kenneth C. Louden (1997), Compiler Construction– Principles and Practice, 1st
edition, PWS Publishing3. K. L. P Mishra, N. Chandrashekaran (2003), Theory of computer science- Automata
Languages and computation, 2nd edition, Prentice Hall of India, New Delhi, India.4. Andrew W. Appel (2004), Modern Compiler Implementation C, Cambridge
University Press, UK.
12.8 COURSE PLAN:At the end of the course, students are able to achieve the following learning outcomes.
LectureNo. Course Learning Outcomes Blooms Levels Topics to be covered Reference
L1 Understand the basic compilers Understanding Comprehension
Overview of Compilation Introduction to compilation process. http://nptel.ac.in/courses/106108052/2#
T1:1.1-1.4,T2:1.2
L2 Understand the basic compilers Understanding Comprehension
Interpretationhttp://nptel.ac.in/courses/106108052/2#http://nptel.ac.in/courses/106108113/
T1:1.1-1.4,T2:1.2
L3 Understand the difference between Pass and Phases
Understanding Comprehension
Pass and Phases of translationhttp://nptel.ac.in/courses/106108052/1
T1:1.1-1.4,T2:1.2
L4 Understand the Phases of Compilation
Understanding Comprehension
Phases of Compilation• Lexical Analysis Phase• Syntax Analysis Phase• Semantic Analysis Phase• Intermediate Analysis Phase• Code optimization Analysis Phase• Code generation Analysis Phase
T1:1.4-1.8
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 107
http://nptel.ac.in/courses/106108052/2#
L5 Understand the Phases of Compilation
Understanding Comprehension
Phases of Compilation• Lexical Analysis Phase• Syntax Analysis Phase• Semantic Analysis Phase• Intermediate Analysis Phase• Code optimization Analysis Phase• Code generation Analysis Phasehttp://nptel.ac.in/courses/106108052/2#
T1:1.4-1.8
L6 Construct Lexical Analysis Applying Application
Lexical Analysis:• Lexemes• Tokens
http://nptel.ac.in/courses/106104123/2
T1:35-3.7
L7Relate common programming languages are converting into regular grammar and expression.
Remembering Knowledge
Regular Grammar and regular expression for common programming language features
T1:3.3,T2:2.3
L8Relate common programming languages are converting into regular grammar and expression.
Remembering Knowledge
Regular Grammar and regular expression for common programming language features
T1:3.3,T2:2.3
L9Construct a new compiler which is more complicated convert into simpler.
Applying Application
Bootstrappinghttp://nptel.ac.in/courses/117108048/41
T1:3.3,T2:2.3
L10Generate a LEX program withSpecifications with the help of commands
Applying Application
Data structures in compilation -LEXlexical analyzer generatorhttp://nptel.ac.in/courses/106108052/2#
T1:4.1
L11
Identify the grammar w.r.t language L={N, P, T, S} the construct Left most and Right Most derivations.
Applying Application
Top down Parsing: Context free Grammars http://nptel.ac.in/courses/106106049/#
T1:4.1
L14 For Construction of Predictive parser require steps
Applying Application
Pre-processing steps required forpredictive parsing:• Remove Back Tracking• Remove left recursion• Remove left Factoring• Remove ambiguityConstruction of Predictive Parsing structure.
T1:4.1, T2:3.1
L15 For Construction of Predictive parser require steps
Applying Application
Pre-processing steps required for predictive parsing:• Remove Back Tracking• Remove left recursion• Remove left Factoring• Remove ambiguityConstruction of Predictive Parsing structure.
T1:4.1, T2:3.1
L16 Construction of Predictive Parsing Table
Applying Application
Predictive parsing LL (1)• Construct FIRST() Function• Construct Follow () Function
Construction of Predictive Parsing Table
T1:4.4
L17 Construction of Predictive Parsing Table
Applying Application
Predictive parsing LL (1)• Construct FIRST() Function• Construct Follow () Function
Construction of Predictive Parsing Table
T1:4.4
L18 Construction of Predictive Applying Predictive parsing LL (1) T1:4.5,4.6,
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 108
Parsing Table Application • Construct FIRST() Function• Construct Follow () Function
Construction of Predictive Parsing Table
L19
Construction of Recursive descent parsing- Construct Each and Every Non- Terminal as a production or Method.
Applying Application Recursive descent parsing T1:4.5,4.6,
L20
Construction of Recursive descent parsing-Construct Each and Every Non-Terminal as aproduction or Method
Applying Application Recursive descent parsing T1:4.5,4.6,
L21Understand the Basic Concept of Bottom up Parsing and it’s Types.
Understanding Comprehension
Bottom up parsing : Shift Reduceparsing T1:4.5,4.6,
L22 Construct Shift Reduce parsing table
Applying Application
Shift Reduce parsing• Construct Shift Action• Construct Reducing Action• Understand the Accept Action
T1: 4.7
L23 Construct LR parsing table Applying Application
LR parsing• Construct Canonical set of Items• Construct FIRST() Function• Construct Follow () Function• Construction of LR Parsing Table
T1: 4.7
L24 Construct LR parsing table Applying Application
LR parsing• Construct Canonical set of Items• Construct FIRST() Function• Construct Follow () FunctionConstruction of LR Parsing Table
T1: 4.7
L25 Construct LR parsing table Applying / Application
LR parsing• Construct Canonical set of Items• Construct FIRST() Function• Construct Follow () FunctionConstruction of LR Parsing Table
T1:4.8
L26 Construct LALR parsing table Applying Application
LALR parsing• Construct Canonical set of Items of
SLR and CLR• Merge SLR and CLR Canonical set
of Items.• Construct FIRST() Function• Construct Follow () Function
Construction of LALR Parsing Table
T1:4.8
L27 Construct LALR parsing table Applying Application
LALR parsing• Construct Canonical set of Items of
SLR and CLR• Merge SLR and CLR Canonical set
of Items.• Construct FIRST() Function• Construct Follow () Function• Construction of LALR Parsing
Table
T1:4.5,4.6,
L28 Construct LALR parsing table Applying Application
LALR parsing• Construct Canonical set of Items of
SLR and CLR• Merge SLR and CLR Canonical set
of Items.
T1: 4.7
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 109
• Construct FIRST() Function• Construct Follow () FunctionConstruction of LALR Parsing Table
L29 Identify the Errors in LR parsing by using methods.
Applying Application
Error recovery in parsingConstruct Canonical set of Itemshttp://nptel.ac.in/courses/106108113/11
T1:4.9
L30 Identify the ambiguous grammar LR parsing by using methods.
Applying Application
Handling ambiguous grammarConstruct Canonical set of Itemshttp://nptel.ac.in/courses/106106049/
T1:4.9
L31Implement LALR parser generator and Identify the Syntactical Error Messages
Applying Application
YACC – Automatic parser generator• Specification Rules• Commandshttp://nptel.ac.in/courses/106108052/2#
T1:4.9
L32
Understand Intermediate forms of sourcePrograms and construct the object code forms
Understanding Comprehension
Semantic analysis: Intermediate forms of source Programs.• Abstract syntax tree• polish notation• three address codeshttp://nptel.ac.in/courses/106108113/
T1:5.1
L33Understand Intermediate forms of source Programs and construct the object code forms
Understanding Comprehension
Intermediate forms of source Programs.• Abstract syntax tree• polish notation• three address codeshttp://nptel.ac.in/courses/106108052/2#
T1:5.2
L34 Understand Types of the Attributed grammars
Understanding Comprehension
Attributed grammars• Synthesized Attributed grammars• Inherited Attributed grammarshttp://nptel.ac.in/courses/106108052/2#
T1: 5.3
L35Understand translation schemes and convertinto Intermediate forms
Understanding Comprehension
Syntax directed translation• Mkptr (op,operand1,operand2)
method• Mkleaf (operand1,id) Method• Mknum (operand1,num) methodhttp://nptel.ac.in/courses/106108052/2#
T1: 5.4
L36 Apply programming language Code into Intermediate forms
Applying Application
Conversion of popular Programminglanguages language Code Constructs into Intermediate formshttp://nptel.ac.in/courses/106108052/2#
T1: 5.4
L37 Apply programming language Code into Intermediate forms
Applying Application
Conversion of popular Programminglanguages language Code Constructs into Intermediate formshttp://nptel.ac.in/courses/106108052/2#
T1:8.1-8.6
L38 Understand Type checker Understanding Comprehension
Type checker.• Implicit method• Explicit method
T1:8.1-8.6
L39 Understand the symbol table format
Understanding Comprehension
Symbol Tables: Symbol table format• Entries in the symbol table• Link with symbol and Hash Table
Types of name length• Variable name length• Fixed name Length
T1:6.1-6.2
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 110
http://nptel.ac.in/courses/106108052/1
L40 To Identify and Analyze the block structures languages
Applying Application
Organization for block structuresLanguages T1:6.1-6.2
L41 Identify scope information Applying Application
Hashing, tree structures representation of scope information.http://nptel.ac.in/courses/106108052/2#
T1: 6.3-6.6
L42To Differentiate Block structures and non block of various programming languages
Applying Application
Block structures and non-block structure storage allocationhttp://nptel.ac.in/courses/106108052/2#
T1: 6.3-6.6
L43 To Compare different storage allocation
Applying Application
Static, Runtime stack and heap storage allocationhttp://nptel.ac.in/courses/106108052/2#
T1:7.6
L44 To Compare different storage allocation
Applying Application
Storage allocation for arrays strings and records.http://nptel.ac.in/courses/106108052/2#
T1:7.6
L45 Understand Various optimization techniques
Code optimization: Consideration forOptimization
• Algorithm• Programming language• Address allocation Types of
Optimization• Machine dependent optimization• Machine Independent optimization
T1:7.7
L46 Understand Various optimization techniques
Understanding Comprehension
Scope of OptimizationLocal OptimizationLoop Optimizationhttp://nptel.ac.in/courses/106108052/6
T1:7.8-7.9
L47 Understand Various optimization techniques
Understanding / Comprehension
local optimizationCommon sub expression eliminationCopy propagationDead code eliminationReduction in strengthhttp://nptel.ac.in/courses/106108052/6
T1:10.2-10.3
L48 Understand Various optimization techniques
Understanding / Comprehension
local optimizationCommon sub expression eliminationCopy propagationDead code eliminationReduction in strengthhttp://nptel.ac.in/courses/106108052/6
T1:10.4
L49 Understand Various optimization techniques
Understanding Comprehension
loop optimizationLoop Invariant methodLoop Motion/MovementConstant PropagationLoop FusionLoop UnrollingRedundant common subexpression elimination
http://nptel.ac.in/courses/106108052/6
T1:10.5
L50 Understand Various optimization techniques
Understanding Comprehension
loop optimizationLoop Invariant methodLoop Motion/MovementConstant PropagationLoop FusionLoop UnrollingRedundant common sub expression
T1:10.6
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 111
eliminationhttp://nptel.ac.in/courses/106108052/6
L51 Understand DAG representation for basic blocks and flow graph.
Understanding Comprehension
DAG representation.Identify the rulesApply the conceptConstruct DAGhttp://nptel.ac.in/courses/106108052/8
T2:9.1
L52 Understand DAG representation for basic blocks and flow graph.
Understanding Comprehension
DAG representation. Identify the rules of DAG Apply the concept Construct DAGhttp://nptel.ac.in/courses/106108052/8
T1:10.7-10.8
L53 Construct the three address code for Flow Graph
Applying Application
Data flow analysis: Flow graphConstruct the three codeConstruct basic blockshttp://nptel.ac.in/courses/106108052/2#
T1:10.9
L54 Construct the three address code Data flow equation.
Applying Application
Data flow equation.Construct exit and entry levelsConstruct Table based on levels with available equations.http://nptel.ac.in/courses/106108052/2#
T1:10.9
L55 Understand the global optimization
Understanding Comprehension
global optimizationStructural level equationNumbered level equationhttp://nptel.ac.in/courses/106108052/1
T1:10.10
L56Understand the global optimization of redundant sub expression elimination
Understanding Comprehension
redundant sub expression eliminationhttp://nptel.ac.in/courses/106108052/17
T1:10.11
L57 Understand Induction variable elements
Understanding Comprehension
Induction variable elementsIdentify the dependent variable of available expressionIdentify the which is linked with dependent variable.http://nptel.ac.in/courses/106108052/24
T1:10.12
L58 Understand Live variable analysis
Understanding Comprehension
Live variable analysisIdentify the which the live variableBased on basic block and given expression.http://nptel.ac.in/courses/106108052/24
T1:10.12
L59 Understand Live variable analysis
Understanding Comprehension
Live variable analysisIdentify the which is the live variableBased on basic block and given expression.http://nptel.ac.in/courses/106108052/2
T1:10.13
L60 Understand Copy propagation of local Optimization
Understanding Comprehension
Copy propagationIdentify the which is the copy statement in three address codeBased on basic block and given expression.http://nptel.ac.in/courses/106108052/24
T1:10.14
L61 Understand various Object code forms
Understanding Comprehension
Object code generation: Object codeformsAbsolute codeReloadable codeAssembler code
T1:10.15
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 112
L62 Understand various code optimization Techniques
Understanding Comprehension
Machine dependent code optimizationGraph ColoringRegister allocationGlobal optimizationhttp://nptel.ac.in/courses/106108113/http://nptel.ac.in/courses/106108052/3
T1:10.16
L63Understand various Register allocation and Assignment techniques
Understanding Comprehension
Register allocation and AssignmentMost frequent used variablesLocal /global Register allocation and Assignmenthttp://nptel.ac.in/courses/106108052/13
T1:10.17
L64 Understand Generic code generation Algorithms
Understanding Comprehension
Generic code generation algorithmsConstruct three address codeConstruct Assembly codeAssign the register
T1:10.18
L65 Understand various applications DAG
Understanding Comprehension
DAG for register allocation.Labeling AlgorithmHeuristic Algorithmhttp://nptel.ac.in/courses/106108052/38
T1:10.19-23
SESSION PLANNER
S. No
Unit &
Chap No.
Lec. No Topic Session Objectives Date
plannedDate
Conducted
L1 Overview of Compilation
1. By the end of the session students will able to understand the process of compilation by using on various tools
L2 Compiler, Interpreterand its differences
1. By the end of the session students will able to identify the process of compilation, interpretation and its differences by using on various tools.
L3 Phases of Compilation
1. By the end of the session students will list out phases of compilation during the process of compilation.
L4 Phases of Compilation
2. And also able to understand various phases and they will identify the output of each phase.
L5 Lexical Analysis
1. By the end of the session students will able to know about generation of tokens by lexical phase.
<------------UN
IT-I--------------
<------------UN
IT-II--------------
L6Regular Grammar and regular expression to finite automata
1. By the end of the session students will able to understand the difference between the regular grammar and regular
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 113
expressions.
L7
Regular Grammar and regular expression to finite automata
2. And students are able to apply on various languages
L8 Pass and Phases of translation
1. By the end of the session student will identify the difference between Pass and Phases.
L9 Bootstrapping
1. By the end of the session students will able to design new compiler with the concept of bootstrapping
L10Data structures in compilation -LEX lexical analyzer generator
1. By the end of the session students will able to know what are the necessary steps required for LEX program generation and execution of the program.
L11
Parsing: Parsing, role of parsing, Context free grammars, derivation, parse trees, ambiguity
1. By the end of the session students will able to understand the context free grammar rules and structure.
L12Elimination of left recursion, left factoring
1. By the end of the session students will able to know about top-down parsing techniques and limitations.
L13
Eliminating ambiguity from dangling- else grammar, classes of parsing
1. By the end of the session students will identify the top-down parsing problems, and they will try to remove the problems.
L14Pre-processing steps required for predictive parsing:top down parsing
By the end of the session students will able to understand the difference between the regular grammar and regular expressions.
L15Pre-processing steps required for predictive parsing
1. By the end of the session students will able to know how to construct predictive parsing required steps.
L16 Predictive parsing LL (1)
2. By the end of the session students will able to remove the problems of top-down parsing techniques.
L17 Predictive parsing LL (1)
3 By the end of the session students will able to construct the FIRST & FOLLOW sets
L18 Predictive parsing 4. By the end of the session
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 114
LL (1) students will able to construct table with the help of FIRST & FOLLOW sets
L19 Recursive descent parsing
1. By the end of the session students will able to remove the problems of top-down parsing techniques.
L20 Recursive descent parsing
2. By the end of the session students will able to write the procedures for each and every non-terminals then construct the Recursive descent parsing.
L21Bottom up parsing : Shift Reduce parsing
By the end of the session students will able to know the difference between top-down and bottom-up parsing techniques.
L22 Shift Reduce parsing
By the end of the session students will able to construct the shift reducing parsing.
L23 LR parsing
By the end of the session students will able to know about the requirements of LR parsers.
L24 LR parsing
By the end of the session students will able to construct the FOLLOW function.
L25 LR parsing
By the end of the session students will able to construct the LR parsing table
L26 LALR parsingBy the end of the session students will able to construct canonical set items
L27 LALR parsingBy the end of the session students will able to construct SLR Parsing Table
L28 LALR parsing
By the end of the session students will able to construct LALR parsing table
L29 Error recovery in parsing
By the end of the session students will able to understand how to decode the error mesaages.
L30 Handling ambiguous grammar
By the end of the session students will able to remove the ambiguity.
<------------UN
IT- II------
L31 YACC – Automatic parser generator
By the end of the session students will able to generate automatic parser generator by using YACC.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 115
L32
Syntax directed translation: Intermediate forms of source Programs -Abstract syntax tree, polish notation and three address codes
By the end of the session students will able to build symbol table, data type identifier, type checking, and scope of the identifier.
L33
Intermediate forms of source Programs -Abstract syntax tree, polish notation and three address codes
By the end of the session students will able to create Abstract syntax tree, polish notation and three address codes.
L34 Attributed grammars
By the end of the session students will able to know about the types of attribute grammars.
L35 Syntax directed translation
By the end of the session students will able to translation schemes.
L36
Conversion of popular Programming languages language Code Constructs into Intermediate forms
By the end of the session students will able to Programming languages language Code Constructs into Intermediate forms.
L37
Conversion of popular Programming languages language Code Constructs into Intermediate forms
By the end of the session students will able to Programming languages language Code Constructs into Intermediate forms.
L38 Type checker.
By the end of the session students will able to convert from one type to another type.
L39Symbol Tables: Symbol table format
By the end of the session students will able to understand structure symbol table and it’s types.
L40Organization for block structures languages
By the end of the session students will able to understand Scope of the langauges while accessing storage allocation.
L41Hashing, tree structures representation of scope information.
By the end of the session students will able to understand different between the representation of hash and tree structure.
L42Block structures and non block structure storage allocation
By the end of the session students will able to know dynamic and static storage allocations.
<------------UN
IT-III-------
L43Static, Runtime stack and heap storage allocation
By the end of the session students will able to difference between the various storage allocation
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 116
strategies.
L44Storage allocation for arrays strings and records.
By the end of the session students will able to understand the difference between the arrays and records for storage allocations.
L45Code optimization: Consideration for Optimization
By the end of the session students will able to know about what are the considerations for code optimizations.
L46 Scope of Optimization
By the end of the session students will able to understand optimization techniques and andit’s types.
L47 local optimization
By the end of the session students will able to understand the types of local optimization methods
L48 local optimization
By the end of the session students will able to understand the types of local optimization methods
L49 loop optimization
By the end of the session students will able to understand the types of loop optimization methods
L50 loop optimization
By the end of the session students will able to understand the types of loop optimization methods.
L51 DAG representation.By the end of the session students will able to apply the transformation methods and construct the DAG.
L52 DAG representation.By the end of the session students will able to apply the transformation methods and construct the DAG.
L53 Data flow analysis: Flow graph
By the end of the session students will able to analysis properties then construct the flow graph.
L54 Data flow equation.
By the end of the session students will able to compute data flow equations by using forward and backward substitutions.
L55 global optimization
By the end of the session students will able to know how to perform the global optimizations using transformations.
<--------UN
IT-IV
-------------
L56redundant sub expression elimination
By the end of the session students will able to how to remove the common sub expression elimination by
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 117
using global optimizations.
L57 Induction variable elements
By the end of the session students will able to identify which are the induction variables.
L58 Live variable analysis
By the end of the session students will able to identify which are the live variables while evaluating the expressions.
L59 Live variable analysis
By the end of the session students will able to identify which are the live variables while evaluating the expressions.
L60 Copy propagation
By the end of the session students will able to identify what is the copy propagation, while evaluating the expressions.
L61Object code generation: Object code forms
By the end of the session students will able to know the output of code generation is an object code or machine code.
L62 Machine dependent code optimization
By the end of the session students will able to know which code is the machine dependent code and how to optimize it.
L63 Register allocation and Assignment
By the end of the session students will able to know various strategies of register allocations and how to assign it.
L64Generic code generation algorithms
By the end of the session students will able to apply the translation schemes and templates .
<---UN
IT-V
----
L65DAG for register allocation.
By the end of the session students will able to apply the register allocation methods for DAG.
12.9 MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
S= Supportive H = Highly Related
Course OutcomesCourse Objective
a b c d eI S S H H SII H SIII H S S HIV S SV H S H
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 118
12.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAMOUTCOMES:
Program OutcomesCourse Outcomes A B C D E F G H I J K L M N
a S H H H H Hb S S S S H Sc S H S Hd S He S H
S =Supportive H = Highly Related
12.11 OBJECTIVE QUESTIONS:
UNIT-I1. Match the followings: [Gate-1990]
Group I Group IIA. Lexical Analysis p. DAG’sB. Code optimization q. Syntax treeC. Code generation r. Pushdown AutomatonD. Abelian Group’s s. Finite AutomatonAnswer: a-q, b-p, c-r, d-s
2. Which of the following strings can definitely be said to be token without looking at the next input character while compiling a pascql program? [Gate-1995]I. Begin II. Program III.<>A. IB. IIC. IIID. AllAnswer: CExplanation: <> symbol is said to be token without looking at the next input character while
compiling a Pascal program.3. Type checking is normally done during [Gate-1998]
A. Lexical AnalysisB. Syntax AnalysisC. Syntax Directed TranslationD. Code OptimizationAnswer: Syntax AnalysisExplanation: Type checking is normally done durig syntax analysis. In practice, there are a number of tasks that might be conducted during syntax analysis phase such as performing type checking and other kinds of semantic analysis like generating intermediate code.
4. The number of tokens in the FORTRAN statement DO 10 I= 1.25 is [Gate-1999]A. 3B. 4C. 5D. 6
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 119
Answer: CExplanation:DO10I Number of tokens=5=1.25
5. The ‘C’ language is [NET-DEC-2012]A. Context free languageB. Context sensitive languageC. Regular languageD. None of the aboveAnswer: BExp: Because a context free language is powerful to describe the concept of programming language and also describe the syntax of programming languages.
6. In analyzing the compilation of PL/I program, the term “lexical analysis” is associated with [APSET-2013]A. recognition of basic syntactic constructs through reductionsB. recognition of basic elements and creation of uniform symbolsC. creation of more optional matrixD. use of macro processor to produce more optimal assembly codeAnswer: B
7. In a compiler the module that checks every character of the source text is called [APSET-2012]A. the code generatorB. the code optimizerC. the lexical analyzerD. the syntax analyzer.Answer: C
8. In machine language the operand can be [NET-DEC-2013]A. an addressable registerB. the location of an instruction in memoryC. literal numbers to be used by the programD. any of the above.Answer: any of the above.
9. Which data structure in a compiler is used for managing information about variables and their attributes? [Gate-2010]A. Abstract Syntax treeB. Symbol TableC. Semantic stackD. Parse TableAnswer: symbol tableExplanation: Symbol Table is the data structure used for during the complete information about the source code
10. In Compiler, keywords of a language are recognized during [Gate-2011]A. Parsing of the program B. The code generation C. The lexical analysis of the programD. Dataflow AnalysisAnswer: The lexical analysis of the program
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 120
Explanation: During lexical analysis the compiler scans the source code, divide into words and generate the tokens.
11. Consider the grammar defined by the following production rules, with two operators * and + S →T * PT→ U | T * UP →Q+ P | QQ → IdU → IdWhich one of the following is TRUE? [Gate-2014]A. + is left associative, while * is right associative B. + is right associative, while * is left associative C. Both + and * are right associative D. Both + and * are left associative Answer: BExp: S →T * PT→ U | T * UP →Q+ P | QQ → IdU → IdAs the production rule T T * U is defined as left recursive rule, so * is left associative operator.As the production rule P Q+ P is defined as left recursive rule, so + is a right associative operator.
12. Which one of the following is a top-down parser? [Gate-2007]A. Recursive descent parserB. An LR (k) parserC. Operator precedence parserD. An LALR(k) ParserAnswer: Recursive descent parserExp: Predictive and Recursive Descent Parser are the top-down parser
13. Consider the following two statements: [Gate-2007]P: Every regular grammar is LL (1)Q: Every Regular set has LR (1) GrammarWhich of the following TRUE?A. Both P and Q are trueB. P is true and Q is falseC. P is false and Q is trueD. Both P and Q are falseAnswer: Both P and Q are trueExp: Regular grammar is well recognized by LL (1) parser and LR (1) parser is stronger and more powerful than LL(1) so regular is also accepted by LR(1) parser. Every regular set has LR (1) grammar. So both statements are correct.
14. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar? [Gate-2003]A. Removing left recursion B. Factoring the grammar aloneC. Removing left recursion and factoring the grammar D. None of the above
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 121
Answer: Removing left recursion and factoring the grammarExplanation:To convert an arbitrary CFG to an LL (1) grammar we must remove left recursion and left factoring. If we can’t remove these then the parser may go to infinite loop and requires lot of back tracking.
15. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar? [Gate-2003]A. Removing left recursion aloneB. Factoring the grammar aloneC. Removing left recursion and factoring the grammarD. None of the aboveAnswer: Removing left recursion and factoring the grammarExplanation: To convert an arbitrary CFG to an LL (1) grammar we must remove left recursion and left factoring. If we can’t remove these then the parser may go to infinite loop and require lot of back tracking
16. Consider the grammar shown below [Gate-2003]SiEtSSꞌ | aSꞌeS | εE bIn the predictive parser table. M of this grammar, the entries M[S, $] respectively areA. { SꞌeS} and { Sꞌε}B. {SeS} and { }C. { Sꞌε} and { Sꞌε}D. { SꞌeS, Sꞌε } and { Sꞌε}Answer: { SꞌeS, Sꞌε } and { Sꞌε}
17. Which of the following strings is generated by the grammar? [Gate-2007]SaB/bAB b/bS/aBBAa/aS/bAAA. aaaabbB. aabbbbC. aabbabD. abbbbaAnswer: aabbab
18. Consider the grammar [Gate-2013]SABSc | AbcBA ABAbabBbABAaaaWhich of the following sentences can be derived by this grammar?A. abcB. aabC. abccD. abbcAnswer: abc
19. The language generated by the above grammar is the set of all strings, made up of a, b, c such that [Gate-2013]A. The number of a’s, b’s and c’s will be equal
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 122
B. a’s always precedes b’s C. b’s always precedes c’sD. The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s which
precedes the c’s.Answer: The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s which precedes the c’s.Explanation: Generate some of the strings that can be derived from start state and verify that they fall into the category covered by The number of a’s, b’s , and c’s are the same and the a’s precedes the b’s which precedes the c’s.
20. Consider the following grammar [Gate-2006]S FR R*S | εFidIn the predictive parser table. M of this grammar, the entries M [S,id] and M[R, $] respectively are A. { SFR} and { Rε}B. {SFR} and {R*S }C. { SFR} and { }D. { Fid } and { Rε}Answer: { SFR} and { Rε}
UNIT-II1. Which of the following are Error Recovery Techniques [GATE-2010]
A. Global-Correction IIIB. Phrase-Level Error Recovery C. Error-Production D. All Answer: D
2. The minimum value of k in LR (k) is [GATE2009]A. 1 B. 0 C. 2 D. 3 Answer: B
3. ----------- are the constructed data types. [GATE-2005]A. Arrays B. Structures C. Pointer D. All Answer: D
4. 4. There are ------ representations used for these address code. [GATE-2011]A. 1 B. 2C. 3 D. 4 Answer: C
5. While performing type checking --- special basic types are needed. [APSET-2010]A. 1 B. 2 C. 3
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 123
D. 4Answer: C
6. Indirect triples are used to implement [NET-2008]A. Infix notation B. Postfix notation C. Three address code D. Prefix notation Answer: C
7. A Sound Type system eliminates--, when the target program runs.[NET-2006]A. Type ErrorB. Runtime ErrorC. Compiler Type ErrorsD. DoneAnswer: A
8. Implicit Type Conversion is called -------------- [GATE-2009]A. CoercionB. CorrectionC. C-TypeD. NoneAnswer: A
9. ---determines the type of a language construct from the way it is used. [GATE-2006]A. Type SynthesisB. Type Reference C. Type InferenceD. AllAnswer: B
10. ----------- are the constructed data types. [GATE-2005]A. Arrays B. Structures C. Pointer D. All Answer: D
11. 4. There are ------ representations used for these address code. [GATE-2004]A. 1 B. 2 C. 3 D. 4 Answer: C
12. While performing type checking ------ special basic types are needed.[GATE-2001]A. 1 B. 2 C. 3D. 4Answer: C
13. Indirect triples are used to implement [GATE-2002]A. Infix notation B. Postfix notation C. Three address code D. Prefix notation
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 124
Answer: C14. A collection of syntactic rule is called a [GATE-2001]
A. Grammar B. NFA C. Sentence D. Language Answer: A
15. In operator precedence parsing precedence relations are defined [GATE-2005]A. For all pair of non-terminalsB. Set strings of symbols over givenC. Set of all alphabetsD. Only for a certain pair of terminalsAnswer: D
16. Which Type is the context free Grammar [GATE-2005]A. Type 3B. Type 2C. Type 1D. Type 0Answer: B
17. A Sound Type system eliminates---, when the target program runs.[GATE-2006]A. Type ErrorB. Runtime ErrorC. Compiler Type ErrorsD. DoneAnswer: A
18. 9. Implicit Type Conversion is called -------------- [GATE-2007]A. CoercionB. CorrectionC. C-TypeD. NoneAnswer: A
19. 10. ------determines the type of a language construct from the way it is used.[GATE-2005]
A. Type SynthesisB. Type Reference C. Type InferenceD. AllAnswer: B
20. Which of the following are Error Recovery Techniques [GATE-2003]A. Global-Correction IIIB. Phrase-Level Error Recovery C. Error-Production D. All Answer: D
UNIT-III1. The storage strategy in which activation record is maintained even after the
execution of a procedure is completed is [GATE-2004]A. Stack allocation B. Heap allocation
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 125
C. Static allocation D. Dynamic allocationAnswer: C
2. The following symbol table implementation has the minimum access time.[GATE-2002]A. hash table B. search tree C. linear list D. self-organizing list Answer: B
3. Uniform symbol table [GATE-2005]A. Contains all constants in the program B. Is a permanent table of decision rules in the form of patterns for matching with the
uniform symbol table to discover syntactic structureC. Consists of full or partial list of tokens as they appear in program created by
lexical analysis and used for syntax analysis and interpretation D. A permanent table which lists all keywords and special symbols of language in
symbolic form Answer: C
4. The storage strategy in which activation record is maintained even after the execution of a procedure is completed. [GATE-2006]A. Stack allocationB. Heap allocation C. Static allocation D. Dynamic allocation Answer: B
5. Which of the following parameter passing mechanism has the feature, that operations on the formal parameters do not affect values in the activation record of the caller? [GATE-2000]A. call-by-value B. call-by reference C. call-by-name D. call-by-procedureAnswer: A
6. ----- data structure gives intermediate performance to implement symbol tables. [GATE-2003]
A. hash tables B. trees C. both D. linear listAnswer: B
7. ------ analyzer phase refers symbol table for type conflict issue. [GATE02003]A. semanticB. syntactic C. lexical D. noneAnswer: A
8. -------- is are used as the key to accessing the scope information from symbol table. [GATE2006]A. procedure name
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 126
B. nesting depth C. both D. noneAnswer: C
9. A hash function is defined as F(key) = key mod 7 with linear probing is used to insert the keys 37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then in which location the key 11 is stored. [GATE-2007]A. 6 B. 5 C. 1 D. 4Answer: D
10. A compiler uses a data structure called _________________ to keep track of scope and binding information about names. [GATE-2013]A. Symbol TableB. Hash tableC. BothD. NoneAnswer: A
11. Uniform symbol table [GATE-2012]A. Contains all constants in programB. Is a permanent table of decision rules in the form of patterns for matching with the
uniform symbol table to discover syntactic structureC. Consists of full or partial list of tokens as they appear in program created by
lexical analysis and used for syntax analysis and interpretationD. A permanent table which lists all key words and special symbols of language in
symbolic formAnswer: C
12. When inserted the characters of the string: KRPCSNYTJM into hash table of size 10 by using hash function H (X) = (ORD (X)-ORD ('A') + 1) mod 10 and linear probing to resolve collisions. Insertions that cause collisions are [GATE2004]A. C, SB. Y, MC. J, MD. S, TAnswer: C
13. A hash function is defined as F(key) = key mod 7 with linear probing is used to insert the keys37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then in which location the key 11 is stored.[GATE-2005]A. 6B. 5C. 1D. 4Answer: B
14. A hash function is defined as F (key) = key mod 7 with linear probing is used to insert the keys37,38,72,48,98,11,56 into a hash table indexed from 0 to 6 .Then following key is stored as the last element[GATE-2004]A. 98B. 56
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 127
C. 11D. 48Answer: D
15. The storage strategy in which activation record is maintained even after the execution of a procedure is completed is [GATE-2006]A. Stack allocationB. Heap allocationC. Static allocationD. Dynamic allocationAnswer: B
16. The following symbol table implementation has the minimum access time.[GATE-2008]A. hash tableB. search treeC. linear listD. self-organizing listAnswer: A
17. In the search trees implementation the expected time required to enter 'n' names and make 'm' enquiries is proportional to [GATE-2007]A. (n +m) log nB. (m +n) log mC. m n log nD. m n log mAnswer: A
18. Time is independent of number of entries in a symbol table among [GATE2008]A. Linear listB. Search treeC. Hash tableD. Self-organizing listsAnswer: C
19. Based on the property of locality of reference the symbol table is implemented in [GATE2009]A. Linear listB. search treeC. hash tableD. self-organizing listAnswer: C
20. Access time of symbol table will be logarithmic if it is implemented by[GATE-2011]A. linear listB. search treeC. hash tableD. self-organizing listAnswer:
UNIT-IV1. A region of validity every name possesses in the source program is[Gate-1990]
A. ScopeB. Life timeC. Binding
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 128
D. DomainAnswer: B
2. An optimized compiler [Gate-1991]A. Is optimized to occupy less spaceB. Is optimized to take less time for executionC. Optimized the codeD. Optimized to small typing fontAnswer: C
3. Object language program than the most obvious for a given source program is [Gate-2001]
A. Code generationB. Code optimizationC. Code executionD. Code debuggingAnswer: C
4. The "90-10" rule states that [APSET-2006]A. 90 % of code is executed in 10 % of timeB. 90 % of time is spent in 10 % of codeC. 90 % of time is spent in correcting 10 % of errorsD. 10 % of time is spent in correcting 90 % of errorsAnswer: B
5. The most heavily travelled parts of programs are [NET-2007]A. Inner loopsB. ConstantsC. Static variablesD. Global variablesAnswer: D
6. Machine independent code optimization can be applied to [NET-2003] A. Source codeB. Intermediate representationC. Object codeD. Run-time outputAnswer: A
7. At a point in a program if the value of variable can be used subsequently, then that variable is [NET-2005]A. DeadB. DuplicateC. AliasingD. LiveAnswer: D
8. The region of validity every name possesses in the source program is [GATE-1998]A. ScopeB. Life timeC. BindingD. DomainAnswer: A
9. Which of the following is not a peephole optimization? [GATE 2011]A. Removal of unreachable codeB. Elimination of multiple groupsC. Elimination of loop invariant compilation
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 129
D. Loop unrollingAnswer: C
10. At point p if no matter what path is taken from p, the expression e will be evaluated before any of its operands are defined, then expression e is said to be [GATE-2008]A. LazyB. LateC. BusyD. DummyAnswer: B
11. The evaluation which avoids the action at all which is clearly advantageous [GATE-2001]A. LateB. LazyC. CriticalD. SmartAnswer: C
12. Which of the following comments about peep hole optimization are false. [GATE-1997]A. It is applied to small part of the codeB. It can be used to optimize intermediate codeC. To get the best out of this, it has to be applied repeatedlyD. It can be applied to the code that is contiguousAnswer: C
13. Shorter equivalent sequence. [GATE-2005]A. Peep hole optimizerB. AssemblerC. LinkerD. LoaderAnswer: A
14. The evaluation ordering in which we know beforehand that will have to perform the action anyway, but we find it advantageous to perform it as late as possible [GATE-2007]A. LateB. LazyC. CriticalD. SmartAnswer: A
15. The evaluation ordering in which, code for node is issued as soon as the code for all of its Operands has been issued [GATE-2009]A. EarlyB. LateC. LazyD. CriticalAnswer: C
16. Peep-hole optimization is form of [GATE-2011]A. Local optimizationB. Constant foldingC. Copy propagationD. Data flow analysis
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 130
Answer: A17. If the transformation of a program can be performed by looking only at
statements in basic block then it is said to be [GATE-2010]A. LocalB. GlobalC. AlgebraicD. MatrixAnswer: C
18. If E was previously computed and the values of variable in E have not changed since previous computation, then an occurrence of an expression E is[ GATE-2008]A. Copy propagationB. Dead codeC. Common sub expressionsD. Constant foldingAnswer: C
19. In block B if s occurs in B and there is no subsequent assignment to y within B, then the copy statement s:x :=y is [GATE-2006]A. Generated B. KilledC. BlockedD. DeadAnswer: A
20. In block B if x or y is assigned there and s is not in B then s: x :=y is[GATE-2005]A. GeneratedB. KilledC. BlockedD. DeadAnswer: B
UNIT-V1. The following cannot be used to identify loops [NET-2008]
A. Depth first orderingB. Reducible graphsC. DominatorsD. Flow chartAnswer: D
2. Replacement of a string concatenation operator "||" by an addition is example for [GATE-2009]A. Strength reductionB. Operator overridingC. Operator over loadingD. Operator eliminationAnswer: A
3. The replacement of an expensive operation by a cheaper one [GATE-2001]A. Operator overridingB. Operator overloadingC. Reduction in strengthD. Operator eliminationAnswer: C
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 131
4. The loop which does not contain any other loops are [GATE-2000]A. Natural loopB. Inner loopC. Main loopD. Nested loopAnswer: B
5. Identify the basic blocks in the following code 10 goto 20 20 goto 10 [GATE-2006]A. Go to 20B. Go to 10C. Two independent basic blocksD. Both statements in one blockAnswer: C
6. Loop is collection of nodes that [NET-2008]A. Is loosely connectedB. Is strongly connected with several entriesC. Is having several entriesD. Is strongly connected with unique entryAnswer: D
7. n loop optimization technique a loop whose body is rarely executed is [GATE-2008]A. Dead codeB. Blank codeC. Redundant codeD. Blank stripperAnswer: D
8. If the following optimization is attempted, count of number of jumps to each label can be found from symbol table of that label [GATE-2007]A. Back trackingB. Peephole optimizationC. Dynamic programmingD. Global optimizationAnswer: B
9. The use of the following greatly improves the code when pushing or popping a stack, as in parameter passing [GATE-2000]A. Flow of controlB. Auto increment addressing modesC. Auto decrement addressing modesD. Both auto increment and auto decrement addressing modesAnswer: D
10. The following can be done through peephole optimization [GATE-2007]A. Dynamic programmingB. Greedy methodC. Unreachable code eliminationD. Code generationAnswer: C
11. The following algebraic identities can be eliminated through peephole optimization [GATE-2009]A. x:=x+0B. x:=x*1C. x:=x+0 and x:=x*1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 132
D. Jumps over jumpsAnswer: C
12. Replacing the exponent operator by the shift of multiplication is [GATE-2000]A. Constant foldingB. Reduction in strengthC. Copy propagationD. Elimination of dead variablesAnswer: B
13. Method to improve the target program by examining a short sequence of target instructions [GATE-2011]A. Back trackingB. Peephole optimizationC. Dynamic programmingD. Global optimizationAnswer: B
14. Program transformation that is not characteristic of peephole optimization [GATE-2002]A. Redundant instruction eliminationB. Flow of control optimizationC. Back patchingD. Use of machine idiomsAnswer: C
15. The following is the small moving window in target program [GATE-2000]A. Screen saverB. GraphicsC. PeepholeD. Greedy windowAnswer: C
16. Use of machine idioms is one of the characteristic of [GATE-2012]A. Back trackingB. Peephole optimizationC. Dynamic programmingD. Global optimizationAnswer: B
17. Peephole optimization is to eliminate [GATE-2011]A. Constant foldingB. Jumps over jumpsC. Copy propagationD. Elimination of dead variablesAnswer: B
18. Machine independent optimization is [GATE-2014]A. Register allocationB. Frequency reductionC. Data intermixed with instructionsD. Machine features instructionsAnswer: C
19. Computing two or more identical computations to a place in the program where the computation can be done once and the result to used in the entire original places is [GATE-2015]A. Replacing
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 133
B. ProfilingC. HoistingD. RearrangingAnswer: B
20. Deducing at compile time that the value of an expression is a constant and using that constant instead is [GATE-2013]A. Constant foldingB. Constant deductionC. Macro substitutionD. Copy propagationAnswer: A
12.12 TUTORIALS QUESTION BANKPART - A (SHORT ANSWER QUESTIONS)
S. No QuestionBlooms
Taxonomy Level
Course Outcome
UNIT – I1 Define Complier briefly? Understand a2 Explain the cousins of compiler? Understand b3 Define the two main parts of compilation? What they perform? Understand c4 How many phases does analysis consists? Understand e5 Define and explain the Loader? Remember d6 Explain about preprocessor? Remember a7 State the general phases of a compiler? Understand b8 State the rules, and define regular expression? Remember c9 Explain a lexeme and Define regular sets? Remember e10 Explain the issues of lexical analyzer? Understand d11 State some compiler construction tools? Understand c12 Define the term Symbol table? Understand e13 Define the term Interpreter? Remember d14 Define the term Tokens in lexical analysis phase? Understand a15 Explain about error Handler? Understand e16 Define a translator and types of translator? Understand d17 Explain about parser and its types? Understand c18 Construct NFA for (a/b)* and convert into DFA? Remember e19 Define bootstrap and cross compiler? Understand d20 Define pass and phase? Understand a
21 Analyze the output of syntax analysis phase? What are the three general types of parsers for grammars? Remember e
22 List the different strategies that a parser can employ to recover from a syntactic error? Understand d
23 Explain the goals of error handler in a parser? Understand c24 How will you define a context free grammar? Remember e25 Define context free language. When will you say that two CFGs are equal? Remember d26 Give the definition for leftmost and canonical derivations? Understand c27 Define a parse tree? Understand a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 134
28 Explain an ambiguous grammar with an example? Apply e29 When will you call a grammar as the left recursive one? Apply d30 List different types of compiler? Remember c
UNIT - II1 Define the term handle used in operator precedence? Understand e2 Define LR (0) items in bottom up parsing? Remember d3 State the disadvantages of operator precedence parsing? Remember c4 LR (k) parsing stands for what? Understand e5 Why LR parsing is attractive one and explain? Understand d6 Define go to function in LR parser with an example? Understand c7 Why SLR and LALR are more economical to construct Cananonical LR? Understand a8 Explain about handle pruning? Understand e9 Explain types of LR parsers? Understand d10 List down the conflicts during shift-reduce parsing. Remember e
UNIT – III1 State the benefits of using machine-independent intermediate form? Remember e2 List the three kinds of intermediate representation? Understand d3 How can you generate three-address code? Understand c
4 Define syntax tree? Draw the syntax tree for the assignment statement. a :=b * -c + b * -c. Apply c
5 Explain postfix notation? Remember a6 Explain the usage of syntax directed definition? Apply e7 Define abstract or syntax tree? Understand d8 Show the DAG for a: =b *-c + b * -c? Apply c9 Translate a or b and not c into three address code? Apply c10 Define basic blocks? Understand a11 Discuss back-end and front-end? Understand e12 Define the primary structure preserving transformations on basic blocks? Understand c13 List common methods for associating actual and formal parameters? Understand a14 List various forms of target programs? Remember e15 Define back patching? Understand d16 List different data structures used for symbol table? Remember c17 Explain the steps to search an entry in the hash table? Understand c18 List the different types of type checking? Explain? Understand e19 Explain general activation record? Understand d20 State the difference between heap storage and hash table? Understand d
UNIT – IV1 Explain the principle sources of optimization? Understand d2 Explain the patterns used for code optimization? Understand c3 Define the 3 areas of code optimization? Understand c4 Define local optimization? Understand a5 Define constant folding? Understand e6 List the advantages of the organization of code optimizer? Understand d7 Define Common Sub expressions? Understand c8 Explain Dead Code? Understand c9 Explain the techniques used for loop optimization and Reduction in strength? Understand a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 135
10 Mention the issues to be considered while applying the techniques for code Optimization? Understand e
11 List the different data flow properties? Understand a12 Explain inner loops? Understand e13 Define flow graph? Understand d14 Define a DAG? Mention its Apply? Understand c15 Define peephole optimization? Understand c16 Explain machine instruction for operations and copy statement? Understand a17 Analyze global data flow? Understand d18 Explain about live variable analysis? Understand c19 Define the term copy propagation? Understand c20 Explain data flow equation? Understand c
UNIT – V1 Explain about machine dependent and machine independent optimization? Remember e2 Explain the role of code generator in a compiler? Understand a3 Write in detail the issues in the design of code generator. Apply e
4
Show the code sequence generated by the simple code generationAlgorithmu := a – cv := t + ud := v + u//d live at the end
Apply d
5 Explain the instructions and address modes of the target machine? Understand c
6Identify the register descriptor target code for the source languageStatement“(a-b) + (a-c) + (a-c);”The 3AC for this can be written ast := a – b
Understand c
7 Mention the properties that a code generator should possess. Apply a8 How do you calculate the cost of an instruction? Understand d9 How will you map names to values? Understand c10 Generate the code for x: =x+1 for target machine? Understand e
PART - B (LONG ANSWER QUESTIONS
S. No Question Blooms Taxonomy Level
Course Outcome
UNIT - I
1 Define compiler? State various phases of a compiler and explain them in detail. Understand 1
2 Explain the various phases of a compiler in detail. Also Write down the output for the following expression after each phase a: =b*c-d. Apply 1
3 Explain the cousins of a Compiler? Explain them in detail. Understand 1
4 Describe how various phases could be combined as a pass in a compiler? Also briefly explain Compiler construction tools. Remember 3
5For the following expressionPosition:=initial+ rate*60Write down the output after each phase
Apply 1
6 Explain the role Lexical Analyzer and issues of Lexical Analyzer. Remember 17 Differentiate the pass and phase in compiler construction? Remember 18 Explain single pass and multi pass compiler? With example? Understand 19 Define bootstrapping concept in brief? Understand 110 Explain the general format of a LEX program with example? Understand 3
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 136
11
Construct the predictive parser the following grammar:S->(L)|aL->L,S|S.Construct the behavior of the parser on the sentence (a, a) using thegrammar specified above
Apply 4
12
Explain the algorithm for finding the FIRST and FOLLOW positions for a given non-terminal.ii) Consider the grammar,E ->TE‟E->+TE‟|@T ->FT‟T->*FT‟|@
F->(E)|id.Construct a predictive parsing table for the grammar given above. Verify whether the input string id + id * id is accepted by the grammar or not.
Understand 4
13
Prepare the predictive parser for the following grammar:S->a|b|(T)
T ->T, S|SWrite down the necessary algorithms and define FIRST andFOLLOW. Show the behavior of the parser in the sentences,
i. (a,(a,a))ii. (((a,a),a,(a),a)
Apply 4
14
Explain operator grammar? Draw the precedence function graph for the following table.
A ( ) , $> > >
( < < = <) > > >, < < > >$ < <
Understand 4
UNIT – II
1
Consider the grammar EE + E|E *E|(E)| idShow the sequence of moves made by the shift-reduce parser on the
input id1+id2*id3 and determine whether the given string is acceptedby the parser or not.
Apply 5
2
i) State shift-reduce parsing? Explain in detail the conflicts that may occur during shift-reduce parsing.ii)For the grammar given below, calculate the operator precedence relation and the precedence functionsEE + E|E- E|E * E|E / E|E E|(E)|-E|id
Understand 5
3Prepare a canonical parsing table for the grammar given below
SCCCcC|d
Analysis 5
4
Analyze whether the following grammar is SLR(1) or not. Explainyour answer with reasons.
SLR SRL* RRLL id
Apply 5
5
Consider the grammar given below.EE + TETTTT * FTFF(E)FidPrepare LR parsing table for the above grammar .Give the moves of
Apply 5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 137
LR parser on id * id + idii) Briefly explain error recovery in LR parsing.
UNIT – III
1 Explain with an example to generate the intermediate code for the flow of control statements? Apply 8
2 List the various ways of calling the procedures? Explain in detail? Analysis 6
3 Explain 3addresscodes and mention its types. How would you implement the three address statements? Explain with suitable examples? Apply 8
4 Explain how declaration is done in a procedure using syntax directed translation? Apply 7
5a) Write a note on the specification of a simple type checker.b) Define a type expression? Explain the equivalence of type
expressions with an appropriate example.Analysis 7
6
Generate the three-address code for the following C programfragmentwhile(a > b){if (c < d)x = y + z;elsex = y - z;
}
Understand 8
7
Generate the code for the following C statements using its equivalent three address code.a = b + 1x = y+3y = a/ba = b+c
Understand 8
8 Describe the method of generating syntax directed definition for control Statements? Understand 7
9 Explain procedure calls with suitable example? Understand 7
10 Explain Intermediate code generation for Basic block, Control Flow and Boolean Expressions? Apply 8
11 Write about Quadruple and Triple with its structure? Apply 812 Explain different schemes of storing name attribute in symbol table. Understand 9
13 Write the advantages and disadvantages of heap storage allocation strategies? Apply 9
14 Distinguish between static and dynamic storage allocation? Understand 915 Differentiate between stack and heap storage? Understand 9
UNIT – IV1 Explain the principle sources of code optimization in detail? Understand 102 Explain peephole optimization? Understand 10
3
Discuss about the followingCopy propagationDead code eliminationCode motion
Understand 10
4 Explain in the DAG representation of the basic block with example. Understand 115 Explain Local optimization and loop optimization in detail Understand 116 Write about Data Flow Analysis of structural programs? Understand 127 Explain various Global optimization techniques in detail? Understand 12
8
Generate target code for the given program segments:main(){inti=4,j;j = i + 5;
Apply 11
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 138
}
9 Discuss algebraic simplification and reduction in strength? Understand 1110 Explain the various source language issues? Understand 1011 Explain in detail the issues in design of a code generator? Understand 1312 Demonstrate the simple code generator with a suitable example? Apply 1313 List the different storage allocation strategies? Explain. Understand 1214 (a) Write the procedure to detect induction variable with example? Understand 11
(b) With example explain dead code elimination?
15
(a) Explain how loop invariant computation can be eliminated?(b) Explain how “Redundant sub-expression eliminates” can bedonein a given program?
Understand 11
UNIT – V
1
a) Explain the concept of object code forms?b) Generate optimal machine code for the following C program.main(){inti, a[10];while (i<=10)a[i] =0}
Apply 13
2 Explain Machine dependent code optimization in detail with an example? Understand 14
3 (a) Discuss various object code forms?(b) Write a short note on code generating algorithms? Understand 13
4 Write about target code forms and explain how the instruction forms effect the computation time? Understand 14
5
Consider the following basic block of 3-address instructions:a := b + cx := a + bb := a – dc := b + cd := a – dy := a – dWrite the next-use information for each line of the basic block?
Apply 13
PART- C ANALYTICAL AND CRITICAL THINKING
S. No. QuestionBlooms
TaxonomyLevel
CourseOutcome
UNIT – I
1
Consider the following fragment of C code:float i, j;i = i*70+j+2;Write the output at all phases of the compiler for above „C‟ code.
Apply 1
2 Construct an NFA for regular expression R= (aa | b) * ab convert it into an equivalent DFA. Remember 2
3Describe the languages denoted by the following regular expressions.(0+1)*0(0+1)(0+1)0*10*10*10*
Remember 2
4Explain with one example how LEX program perform lexicalanalysis for the following PASCAL patterns Identifiers, Comments,Numerical constants, Keywords, Arithmetic operators?
Apply 3
5 Check whether the following grammar is a LL(1)grammarSiEtS|iEtSeS|a Apply 4
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 139
EbAlso define the FIRST and Followers.
6Consider the grammar belowE->E+E|E-E|E*E|E/E|a|b
Obtain left most and right most derivation for the string a+b*a+b.Apply 4
7Define ambiguous grammar? Test whether the following grammar is ambiguous or not.E->E+E|E-E|E*E|E/E|E↑|(E)|-E|id
Apply 4
8 State the limitations of recursive descent parser? Remember 4
9 Convert the following grammar into LL(1)grammar,S->ABC A->aA|C B->b C->c. Apply 4
10
Write a recursive descent parser for the grammar.bexpr->bexpr or bterm|btermbterm->bterm and bfactor|bfactorbfactor->notebfactor|(bexpr)|true|false.Where or, and, not,(,),true, false are terminals of the grammar.
Apply 4
UNIT – II
1 Explain the common conflicts that can be encountered in a shift-reduce parser? Apply 5
2 Explain LALR parsing, justify how it is efficient over SLR parsing. Remember 53 Discuss error recovery in LL and LR parsing. Remember 5
UNIT – III
1
Suppose that the type of each identifier is a sub range of integers, for expressions with operators +, -, *, div and mod, as in Pascal. Write type-checking rules that assign to each sub expression the sub range its value must lie in.
Understand 7
2Define type expression? Write type expression for the following types. i. Functions whose domains are functions from integers to pointers to integers and whose ranges are records consisting of an integer and a character.
Understand 7
12.13 ASSIGNMENTS QUESTION BANKPART A (SHORT ANSWER QUESTIONS)
S. No. QuestionBlooms
TaxonomyLevel
CourseOutcome
UNIT – I
1.Explain about the different phases of a compiler, showing the output of each phase, using the example of the following statement: position : = initial + rate * 60http://nptel.ac.in/courses/106108113/module1/Lecture1.pdf
CreateAnalyzing 2
2. Explain compiler and interpreter with suitable diagramhttp://textofvideo.nptel.iitm.ac.in/106105084/lec28.pdf Analyzing 3
3. Differentiate between pass and Phasehttp://www.nptel.ac.in/courses/112108150/pdf/Lecture_Notes/MLN_07.pdf Analyzing 3
4. Create the different sections of LEX program with Examplehttp://textofvideo.nptel.iitm.ac.in/106108052/lec1.pdf. Create 2
5.
Determine the input buffer scheme for scanning the source program. How the use of sentinels can improve its performance? Describe in detailhttp://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/download/ska-sl1.pdf
Evaluate 1
UNIT- II
1.Specify what are the issues of Top-Down Parsing techniqueshttp://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm
Creating 4
2. Explain back tracking with example Apply 5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 140
http://nptel.ac.in/courses/106105078/pdf/Lesson%2009.pdf
3.
Create recursive descent parser for the following grammar.
http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm
Creating 3
4.
Create SLR parsing table for the following grammar.S AS|bA SA|a
http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm
Creating 5
5.
Create predictive parse table for the following grammar.E E + T| TT T F| FF F * |a |b
http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-9.htm
Creating 6
UNIT-III
1.
Create SLR parsing table for the following grammar.S AS|bA SA|a
http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm
Creating 5
2.
Create LALR parsing table for the following grammarS Aa | bAc | Bc | bBaA dB d
http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-9.htm
Creating 5
3.
Discover What are the common conflicts that can be encountered in shift – reduce parser.http://textofvideo.nptel.iitm.ac.in/106108113/lec9.pdfhttp://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-9.htm
Apply 6
4.
Create SLR parsing table for the following grammar.R R ′|′ R | RR | R*| (R) | a | b
http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/compilers/ui/Course_home-4-11.htm
Creating 5
5. Prepare What is an operator grammar? Give an example.www.nptel.ac.in/syllabus/106104072/ Apply 6
UNIT-IV
1.
Create the DAG for the following basic blockD := B_CE :=A+BB := B+CA := E-D
www.nptel.ac.in/courses/.../instr-sched-3.pdf
Create 3
2.
Determine What are the legal evaluation orders and names for the values at the nodes for the DAG of problem (a).
i. Assuming A, B and C are alive at the end of the basic block?ii. Assuming only A is live at the end?
www.nptel.ac.in/courses/.../instr-sched-3.pdf
Evaluate 10
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 141
3.
Explain different principal sources of optimization technique with suitable exampleswww.nptel.ac.in/courses/111105039www.nptel.ac.in/courses/106108056/www.nptel.ac.in/.../OPTIMIZATION%20METH.
Apply 11
4.
Explain in detail the Optimization technique “strength reduction”.www.nptel.ac.in/courses/111105039www.nptel.ac.in/courses/106108056/www.nptel.ac.in/.../OPTIMIZATION%20METH.
Apply 12
5.
Summarize What is a DAG. Explain its applicationswww.nptel.ac.in/courses/.../local-opt-part-2.pdfwww.nptel.ac.in/courses/106108052/7www.nptel.ac.in/courses/115102023/www.textofvideo.nptel.iitm.ac.in/.../lec8.pdf
Create 8
UNIT-V
1.Explain different machine dependent code optimization techniqueswww.nptel.ac.in/courses/.../intro-to-optim-2.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec2.pdf
Creating 10
2.
Explain the different issues in the design of a code generator.www.nptel.ac.in/courses/.../code-gen-part-1.pdfwww.nptel.ac.in/courses/.../code-gen-part-3.pdfwww.nptel.ac.in/courses/106108052/9
Creating 15
3.
Explain the concept of object code forms.www.nptel.ac.in/courses/106108052/1www.textofvideo.nptel.iitm.ac.in/.../lec25.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec26.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec38.pdf
Creating 12
4.
Compute various Register allocation optimization techniques with an examplewww.textofvideo.nptel.iitm.ac.in/.../lec11.pdfwww.nptel.ac.in/courses/106108052/12www.nptel.ac.in/courses/106108113/11
Apply 11
5.
Create an algorithm for processing Macro Definitionwww.nptel.ac.in/courses/.../lecture2.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec7.pdfwww.textofvideo.nptel.iitm.ac.in/.../lec1.pdf
Creating 14
PART – B (LONGANSWER QUESTIONS)
S. No QuestionBlooms
Taxonomy Level
Course Outcome
UNIT – I
1 Define compiler? State various phases of a compiler and explain them in detail. Understand 1
2 Explain the various phases of a compiler in detail. Also Write down the output for the following expression after each phase a: =b*c-d. Apply 1
3 Explain the cousins of a Compiler? Explain them in detail. Understand 1
4 Describe how various phases could be combined as a pass in a compiler? Also briefly explain Compiler construction tools. Remember 3
5For the following expressionPosition:=initial+ rate*60Write down the output after each phase
Apply 1
6 Explain the role Lexical Analyzer and issues of Lexical Analyzer. Remember 17 Differentiate the pass and phase in compiler construction? Remember 18 Explain single pass and multi pass compiler? With example? Understand 19 Define bootstrapping concept in brief? Understand 1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 142
10 Explain the general format of a LEX program with example? Understand 3
11
Construct the predictive parser the following grammar:S->(L)|aL->L,S|S.Construct the behavior of the parser on the sentence (a, a) using thegrammar specified above
Apply 4
12
Explain the algorithm for finding the FIRST and FOLLOW positions for a given non-terminal.ii) Consider the grammar,E ->TE‟E->+TE‟|@T ->FT‟T->*FT‟|@
F->(E)|id.Construct a predictive parsing table for the grammar given above. Verify whether the input string id + id * id is accepted by the grammar or not.
Understand 4
13
Prepare the predictive parser for the following grammar:S->a|b|(T)
T ->T, S|SWrite down the necessary algorithms and define FIRST andFOLLOW. Show the behavior of the parser in the sentences,
i. (a,(a,a))ii. (((a,a),a,(a),a)
Apply 4
14
Explain operator grammar? Draw the precedence function graph for the following table.
A ( ) , $> > >
( < < = <) > > >, < < > >$ < <
Understand 4
UNIT – II
1
Consider the grammar EE + E|E *E|(E)| idShow the sequence of moves made by the shift-reduce parser on the
input id1+id2*id3 and determine whether the given string is acceptedby the parser or not.
Apply 5
2
i) State shift-reduce parsing? Explain in detail the conflicts that may occur during shift-reduce parsing.ii)For the grammar given below, calculate the operator precedence relation and the precedence functionsEE + E|E- E|E * E|E / E|E E|(E)|-E|id
Understand 5
3Prepare a canonical parsing table for the grammar given below
SCCCcC|d
Analysis 5
4
Analyze whether the following grammar is SLR (1) or not. Explain your answer with reasons.
SLRSRL* RRLL id
Apply 5
5
Consider the grammar given below.EE + TETTTT * FTFF(E)
Apply 5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 143
FidPrepare LR parsing table for the above grammar .Give the moves ofLR parser on id * id + idii) Briefly explain error recovery in LR parsing.
UNIT – III
1 Explain with an example to generate the intermediate code for the flow of control statements? Apply 8
2 List the various ways of calling the procedures? Explain in detail? Analysis 6
3 Explain 3addresscodes and mention its types. How would you implement the three address statements? Explain with suitable examples? Apply 8
4 Explain how declaration is done in a procedure using syntax directed translation? Apply 7
5a) Write a note on the specification of a simple type checker.b) Define a type expression? Explain the equivalence of type
expressions with an appropriate example.Analysis 7
6
Generate the three-address code for the following C programfragmentwhile(a > b){if (c < d)x = y + z;elsex = y - z;
}
Understand 8
7
Generate the code for the following C statements using itsequivalentthree address code.a = b + 1x = y+3y = a/ba = b+c
Understand 8
8 Describe the method of generating syntax directed definition for control Statements? Understand 7
9 Explain procedure calls with suitable example? Understand 7
10 Explain Intermediate code generation for Basic block, Control Flow and Boolean Expressions? Apply 8
11 Write about Quadruple and Triple with its structure? Apply 812 Explain different schemes of storing name attribute in symbol table. Understand 9
13 Write the advantages and disadvantages of heap storage allocation strategies? Apply 9
14 Distinguish between static and dynamic storage allocation? Understand 915 Differentiate between stack and heap storage? Understand 9
UNIT – IV1 Explain the principle sources of code optimization in detail? Understand 102 Explain peephole optimization? Understand 10
3
Discuss about the followingCopy propagationDead code eliminationCode motion
Understand 10
4 Explain in the DAG representation of the basic block with example. Understand 115 Explain Local optimization and loop optimization in detail Understand 116 Write about Data Flow Analysis of structural programs? Understand 127 Explain various Global optimization techniques in detail? Understand 12
8 Generate target code for the given program segments:main() Apply 11
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 144
{inti=4,j;j = i + 5;}
9 Discuss algebraic simplification and reduction in strength? Understand 1110 Explain the various source language issues? Understand 1011 Explain in detail the issues in design of a code generator? Understand 1312 Demonstrate the simple code generator with a suitable example? Apply 1313 List the different storage allocation strategies? Explain. Understand 1214 (a) Write the procedure to detect induction variable with example? Understand 11
(b) With example explain dead code elimination?
15(a) Explain how loop invariant computation can be eliminated?(b) Explain how “Redundant sub-expression eliminates” can be Done in a given program?
Understand 11
UNIT – V
1
a) Explain the concept of object code forms?b) Generate optimal machine code for the following C program.main(){inti, a[10];while (i<=10)a[i] =0}
Apply 13
2 Explain Machine dependent code optimization in detail with an example? Understand 14
3 (a) Discuss various object code forms?(b) Write a short note on code generating algorithms? Understand 13
4 Write about target code forms and explain how the instruction forms effect the computation time? Understand 14
5
Consider the following basic block of 3-address instructions:a := b + cx := a + bb := a – dc := b + cd := a – dy := a – dWrite the next-use information for each line of the basic block?
Apply 13
PART C (CRITICAL ANSWER QUESTIONS)
S. No Question Blooms Taxonomy Level
Course Outcome
UNIT – I1. Define the term Interpreter? Remember 12. Define the term Tokens in lexical analysis phase? Understand 13. Explain about error Handler? Understand 14. Define a translator and types of translator? Understand 15. Explain about parser and its types? Understand 16. Construct NFA for (a/b)* and convert into DFA? Remember 27. Define bootstrap and cross compiler? Understand 18. Define pass and phase? Understand 3
9. Analyze the output of syntax analysis phase? What are the three general types of parsers for grammars? Remember 1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 145
10. List the different strategies that a parser can employ to recover from a syntactic error? Understand 1
11. Explain the goals of error handler in a parser? Understand 312. How will you define a context free grammar? Remember 313. Define context free language. When will you say that two CFGs are equal? Remember 214. Give the definition for leftmost and canonical derivations? Understand 415. Define a parse tree? Understand 116. Explain an ambiguous grammar with an example? Apply 117. When will you call a grammar as the left recursive one? Apply 418. List different types of compiler? Remember 1
UNIT – II1. Define go to function in LR parser with an example? Understand 52. Why SLR and LALR are more economical to construct Canonical LR? Understand 53. Explain about handle pruning? Understand 54. Explain types of LR parsers? Understand 55. List down the conflicts during shift-reduce parsing. Remember 5
UNIT – III7 Define abstract or syntax tree? Understand 78 Show the DAG for a: =b *-c + b * -c? Apply 79 Translate a or b and not c into three address code? Apply 810 Define basic blocks? Understand 911 Discuss back-end and front-end? Understand 812 Define the primary structure preserving transformations on basic blocks? Understand 813 List common methods for associating actual and formal parameters? Understand 814 List various forms of target programs? Remember 815 Define back patching? Understand 816 List different data structures used for symbol table? Remember 917 Explain the steps to search an entry in the hash table? Understand 918 List the different types of type checking? Explain? Understand 719 Explain general activation record? Understand 920 State the difference between heap storage and hash table? Understand 9
UNIT – IV1. List the different data flow properties? Understand 112. Explain inner loops? Understand 113. Define flow graph? Understand 114. Define a DAG? Mention its Apply? Understand 125. Define peephole optimization? Understand 126. Explain machine instruction for operations and copy statement? Understand 127. Analyze global data flow? Understand 118. Explain about live variable analysis? Understand 109. Define the term copy propagation? Understand 1110. Explain data flow equation? Understand 11
UNIT – V
1.
Identify the register descriptor target code for the source languagestatement“(a-b) + (a-c) + (a-c);”The 3AC for this can be written as
Understand 13
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 146
t := a – b
2. Mention the properties that a code generator should possess. Apply 133. How do you calculate the cost of an instruction? Understand 144. How will you map names to values? Understand 145. Generate the code for x: =x+1 for target machine? Understand 14
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 147
13. E-COMMERCE (A11206)
13.0 COURSE DESCRIPTION
Course Title E-COMMERCECourse Code A11206Regulation MLR-15
Lectures Tutorials Practical’s
CreditsCourse Structure
3 1 - 3Course Coordinator Mrs.Divya Asst.Professor CSE
Team of Instructors Mrs Navya Asst.Professor/ Mr. N Subba Reddy Asst.professor /Mrs. Durga Devi Asst.Professor CSEMrs. Anitha
13.1 COURSE OVERVIEW:This course is designed to understand issues that companies need to address when moving from being offline to online and learn how companies can craft business models where IT is embedded as an integral part of products, processes and customer interactions. Student would get to appreciate how IT is changing the way companies create value through networks and coopetition.13.2 PREREQUISITES:
Level Credits Periods/Weeks PrerequisitesUG 3 3 Communication/Marketing approaches
13.3. MARKS DISTRIBUTION:
Session Marks University EndExam Marks Total Marks
Mid Semester TestThere shall be two midterm examinations.Each midterm examination consists of subjective type and objective type tests.The subjective test is for 10 marks of 60 minutes duration.Subjective test of shall contain 4 questions; the student has to answer2 questions, each carrying 5 marks.The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.AssignmentFive marks are earmarked for assignments.There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.
75 100
13.4 EVALUATION SCHEME:
S. No Component Duration Marks1 I Mid Examination 80 minutes 202 I Assignment --- 5
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 148
3 II Mid Examination 80 minutes 204 II Assignment ---- 55 External Examination 3 hours 75
COURSE OBJECTIVES:The objectives of the course are to introduce the concept of electronic commerce, and to understand how electronic commerce is affecting business enterprises, governments, consumers and people in general. In addition, we will study the development of websites using relevant software tools.
I. Describe the fundamentals of the environment and strategies in the New Economy.II. Demonstrate the fundamental of the different types and key components on business
models in the New Economy.III. Apply the guiding principles to design the customer web interface.IV. Analyze the traditional and new communication/marketing approaches that create
competitive advantage in the New Economy.V. Compare the hardware, software, servers, and the parts that make up the enabling
railroad for the New EconomyVI. Create insights on how to implement strategy in the New Economy
13.5 COURSE OUTCOMES:After completion of this course, the students would be able to
Course Outcomes Blooms Levela. Defining and analyzing the principles of E-commerce and basics
of World Wide Web. BL 1 & 2
b. Defining and analyzing the concept of electronic data interchange and its legal, social and technical aspects. BL 1, 2, & 3
c. Defining and analyzing the security issues over the web, the available solutions and future aspects of e-commerce security. BL 1, 2, 3 & 4
d. Defining and analyzing the concept of E-banking, electronic payment system BL 1, 2, 3 & 4
BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate BL 6: Create
13.6 HOW PROGRAM OUTCOMES AREASSESSED:
Program Outcomes Level Proficiency assessed by Blooms Level
A
An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems.(Fundamental engineering analysis skills).
HSolving Gate and Text book Problems
Apply
BAn ability to design and conduct engineering experiments, as well as to analyze and interpret data. (information retrieval skills).
SSolving Gate and Text book Problems
Apply
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 149
CAn ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. (Creative skills).
H Assignment andGate questions
Apply andAnalyze
DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams. (team work)
S Mini and Micro Projects Apply
E
An ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.(Engg. Problem solving Skills)
SMicro Project Models/ Gate questions
Apply
F An understanding of professional, social and ethical responsibility N ------- --------
G
An ability to recognize the global issues like green initiatives and alternate energy sources and to take technology to villages and to recognize the rural requirements. (Engg. Application Skills)
SMicro Projects models / Gate questions
Analyze and Justify
HThe broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.
H Assignment andGate questions Analyze
I
Graduate will develop confidence for self education and acquire new knowledge in the computing discipline and ability and practice for Multidisciplinary tasks as a member within the teams
S Class Test & Seminars Analyze
J To communicate effectively S Seminars Understand & Analyze
K An ability to use the techniques, skills and modern engineering tools necessary for Engineering practice. S
Class Tests & Group Activity inclass room
Apply
LGraduates are able to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc.(Continuing Education )
H GATE Apply
M
The use of current application software and the design and use of operating systems and the analysis, design, testing and documentation of computer programs for the use in Computer Science and engineering technologies.
SText Book Problems as part of Assignment
Apply
N An ability to setup an enterprise.(Employment Skills) S Placement Design and Develop
N= None S= Supportive H = Highly Relate
13.7 SYLLABUS:
UNIT-IIntroduction Overview of Electronic Commerce - Definition of Electronic Commerce - E Business - Potential Benefits of E Commerce - The Internet as enablcrs of E Commerce - Impact of E Commerce on Business Models - E Commerce Applications - Market Forces influencing highway - The global information distribution networks - The regulatory environment for E Commerce.
UNIT II Electronic Data Interchange (EDI),Electronic Commerce and the Internet Introduction - traditional EDI systems - Benefits - Data Transfer and Standards - Financial EDI – EDI Systems and the Internet - Legal, Security and Private Concerns - Authentication - Internet Trading Relationships Consumer to Business (B2C) Business to Business (B2C), Consumer to Consumer (C2C) Government to
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 150
Citizen - Features and Benefits - Portal Vs. Website. Impact. - Intra Organizational E Commerce - Supply Chain Management.
UNIT III Cryptography and Authentication Introduction - Messaging Security Issues - Confidentiality - Integrity - Authentication. Encryption Techniques - Integrity Check Values and Digital Signatures - Good Encryption Practices – Key Management - key management tasks - Additional Authentication Methods. Firewalls -Definition - component - Functionality - securing the firewall - factors considered in securing the firewall - Limitations.
UNIT IV Electronic Payment Mechanisms Introduction - The SET protocol - SET vs. SSL - Payment Gateway - Certificate Issuance – Certificate Trust Chain - Cryptography Methods - Dual Signatures - SET Logo - Compliance Testing - Status of Software - Magnetic Strip Cards - Smart Cards - Electronic Cheques - Electronic Cash - Third party Processors and Credit Cards - Risk and electronic payment system - Designing Electronic payment systems.
UNIT V E-Commerce Strategy and Implementation Strategic Planning for E-Commerce, Strategy in Action, Competitive Intelligence on the Internet, Implementation; Plans and Execution, Project and Strategy assessment - Managerial Issues – Global Electronic Commerce - Future of Electronic Commerce.
TEXT BOOKS :1. Electronic Commerce - Security, Risk Management and Control, Greenstein and
Feinman, Irwin Mc.Gra-Hill, 2000.
13.8 COURSEPLAN:The course plan is meant as a guideline. There may probably be changes
Lecture No.
Course Learning Outcomes Blooms Levels Topics to be covered Reference
1 Define electronic commerce
Remembering / Knowledge
Introduction Overview of Electronic Commerce T1
2 Define of electronic commerce -
Remembering / Knowledge Definition of Electronic Commerce -
T1
3
Explain the potential benefits of e commerce - the internet as enablers of e commerce
Understand Potential Benefits of E Commerce -The Internet as enablers of E Commerce T1
4
Explain business impact of e commerce on business models - e commerce applications
Understand E Business - - Impact of E Commerce on Business Models - E Commerce Applications T1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 151
5
Discuss the market forces influencing highway - the global information distribution networks.
Understand Market Forces influencing highway - The global information distribution networks.
T1
6
Demonstrate the regulatory environment for e commerce.
Understand The regulatory environment for E Commerce..
T1
7Define electronic data interchange (EDI)
Knowledge Electronic Data Interchange (EDI)T1
8Define electronic commerce and the internet
Knowledge Electronic Commerce and the Internet Introduction - traditional EDI systems.
T1
9Discuss the benefits of data transfer and standards.
Knowledge Benefits - Data Transfer and Standards - Financial EDI – EDI Systems and the Internet.
T1
T1
10
Apply the concept of legal, security and private concerns to authenticate
Apply Legal, Security and Private Concerns - Authentication
11
Differentiate the relationships between consumer to business (b2c) business to business (b2c)
Analyze Internet Trading Relationships Consumer to Business (B2C) Business to Business (B2C)
T1
12 Discuss the features and benefits. Understanding Consumer to Consumer (C2C) Government to
Citizen - Features and Benefits.T1
13Differentiate between Portal Vs. Website.
AnalyzingPortal Vs. Website. Impact. - Intra Organizational E Commerce - Supply Chain Management
T1
14Apply cryptography to authenticate message security
Applying Cryptography and Authentication Introduction - Messaging Security Issues T1
15
apply encryption techniques to check values and digital signatures
ApplyingConfidentiality - Integrity - Authentication. Encryption Techniques - Integrity Check Values and Digital Signatures
T1
16Demonstrate the good encryption practices
Understanding Good Encryption Practices – Key Management - key management tasks
T1
17
Discuss the additional authentication methods. firewalls
Understanding Additional Authentication Methods. Firewalls T1
18Define component functionality to secure the firewall
Knowledge Definition - component - Functionality - securing the firewall T1
19Discuss the factors considered in securing the
Understanding factors considered in securing the firewall - Limitations T1
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 152
firewall - Limitations
20Discuss about electronic payment mechanisms
Understanding Electronic Payment Mechanisms Introduction T1
21Differentiate between SET vs. SSL
Analyze The SET protocol - SET vs. SSL - Payment Gateway T1
22Apply cryptography methods to check certificates.
Apply Certificate Issuance – Certificate Trust Chain - Cryptography Methods T1
23Apply compliance testing to test dual signatures.
Apply Dual Signatures - SET Logo - Compliance Testing T1
24
Differentiate between magnetic strip cards & smart cards
Analyze Status of Software - Magnetic Strip Cards - Smart Cards T1
25
Differentiate between electronic cheques & electronic cash & credit cards
Analyze Electronic Cheques - Electronic Cash - Third party Processors and Credit Cards T1
26 Design electronic payment systems. Create
Risk and electronic payment system - Designing Electronic payment systems. T1
27
Analyze E-commerce strategy and implementation strategic planning for e-commerce
AnalyzeE-Commerce Strategy and Implementation Strategic Planning for E-Commerce T1
28
Analyze strategy in action, competitive intelligence on the internet
Analyze Strategy in Action, Competitive Intelligence on the Internet T1
29 Implement the plans and execution Understand Implementation; Plans and Execution T1
30 Analyze project strategy Analyze Project and Strategy assessment T1
31
Analyze the managerial issues – global electronic commerce
Analyze Managerial Issues – Global Electronic Commerce T1
32Analyze the future of electronic commerce
Analyze Future of Electronic Commerce T1
SESSION PLANNER
Unit Class Topic
Text/Reference
bookSession Objectives Date
plannedDate
conducted
1. By the end of the session student will define electronic commerce
I
L1Introduction Overview of Electronic Commerce
T12.. By the end of the session student will understand
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 153
concepts of electronic commerce1. By the end of the session student will identify concepts of for studying e-commerce
L2 Definition of Electronic Commerce T1 2.. By the end of the session
student will understand concepts of for studying e-commerce1. By the end of the session student will identify benefits of e-commerceL3
E Business - Potential Benefits of E Commerce
T1 2.. By the end of the session student will understand concepts e-business1. By the end of the session student will identify usage of internetL4,
L5
The Internet as enablers of E Commerce
T1 2.. By the end of the session student will use internet for e-commerce1. By the end of the session student will identify impact of e-commerceL6
Impact of E Commerce on Business Models
T1 2.. By the end of the session student will understand impact of business models1. By the end of the session student will identify applications of e-commerceL7 E-Commerce
Applications T1 2.. By the end of the session student will use in real time applications1. By the end of the session student will identify Market Forces
L8 Market Forces influencing highway T1 2. By the end of the session
student will come to know to how market forces influencing highway1. By the end of the session student will identify global information distribution networksL9,
L10
The global information distribution networks
T12.. By the end of the session student will know to use global information1. By the end of the session student will identify the regulatory environment for e commerceL11
The regulatory environment for E Commerce
T1 2.. By the end of the session student will understand how regulatory environment is useful
II L12L13
Electronic Data Interchange (EDI), T1
1. By the end of the session student will identify concepts of Electronic Data Interchange (EDI),
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 154
2.. By the end of the session student will be to interchande data using Electronic commerce1. By the end of the session student will identify edi systemsL14,
L15
Electronic Commerce and the Internet Introduction - traditional EDI systems
T1 2.. By the end of the session student will be able to use internet for edi1. By the end of the session student will identify benefits of ediL16
Benefits - Data Transfer and Standards - Financial EDI
T1 2.. By the end of the session student will be able to identify standards of edi1. By the end of the session student will identify concepts edi systemsL17
EDI Systems and the Internet - Legal, Security and Private Concerns - Authentication
T1 2.. By the end of the session student will to know security issues1. By the end of the session student will relationship between c2b
L18
Internet Trading Relationships Consumer to Business (B2C) Business to Business (B2C), Consumer to Consumer (C2C)
T1 2.. By the end of the session student will able to differentiate between b2c,c2c
1. By the end of the session student will able to know how government is useful to citizenL19
Government to Citizen - Features and Benefits - Portal Vs. Website
T12.. By the end of the session student will differentiate between portal vs website1. By the end of the session student will identify Intra Organizational E CommerceL20
. Impact. - Intra Organizational E Commerce
T1 2.. By the end of the session student will understand Impact. Of E Commerce1. By the end of the session student will identify Supply Chain Management
L21 Supply Chain Management. T1 2.. By the end of the session
student will understand uses of Supply Chain Management1. By the end of the session student will identify CryptographyL22,
L23
Cryptography and Authentication Introduction
T1 2.. By the end of the session student will understand Authentication1. By the end of the session student will identify Messaging Security Issues
III
L24,L25
Messaging Security Issues - Confidentiality - Integrity -
T1
2.. By the end of the session
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 155
Authentication student will understand Confidentiality - Integrity - Authentication1. By the end of the session student will identify Encryption Techniques
L26
Encryption Techniques - Integrity Check Values and Digital Signatures
T1 2.. By the end of the session student will understand Integrity Check Values and Digital Signatures1. By the end of the session student will identify Good Encryption Practices
L27
Good Encryption Practices – Key Management - key management tasks
T1 2.. By the end of the session student will understand Key Management - key management tasks1. By the end of the session student will identify Additional Authentication MethodsL28
Additional Authentication Methods
T1 2.. By the end of the session student will understand Additional Authentication Methods1. By the end of the session student will identify FirewallsL29
Firewalls -Definition - component - Functionality
T1 2.. By the end of the session student will understand component - Functionality1. By the end of the session student will identify securing the firewallL30 securing the firewall T1 2.. By the end of the session student will understand securing the firewall1. By the end of the session student will identify factors considered in securing the firewallL31
factors considered in securing the firewall - Limitations.
T12.. By the end of the session student will understand Limitations.1. By the end of the session student will identify Electronic Payment MechanismsL32
Electronic Payment Mechanisms Introduction
T1 2.. By the end of the session student will understand Electronic Payment Mechanisms1. By the end of the session student will identify The SET protocolL33 The SET protocol -
SET vs. SSL T1 2.. By the end of the session student will differentiate between SET vs. SSL
IV
L34 Payment Gateway - T1 1. By the end of the session
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 156
student will identify Payment Gateway
Certificate Issuance
2.. By the end of the session student will understand Certificate Issuance1. By the end of the session student will identify Certificate Trust ChainL35 Certificate Trust
Chain T1 2.. By the end of the session student will understand Certificate Trust Chain1. By the end of the session student will identify Cryptography Methods
L36 Cryptography Methods T1 2.. By the end of the session
student will understand concepts of Cryptography Methods1. By the end of the session student will identify Dual SignaturesL37 Dual Signatures - SET
Logo T1 2.. By the end of the session student will understand concepts of SET Logo1. By the end of the session student will identify Compliance TestingL38 Compliance Testing -
Status of Software T1 2.. By the end of the session student will understand concepts Status of Software1. By the end of the session student will identify Magnetic Strip Cards - Smart CardsL39
- Magnetic Strip Cards - Smart Cards - Electronic Cheques - Electronic Cash - Third party Processors and Credit Cards
T1 2.. By the end of the session student will understand Electronic Cheques - Electronic Cash1. By the end of the session student will identify Risk L40
L41- Risk and electronic payment system T1 2.. By the end of the session
student will understand concepts payment system1. By the end of the session student will identify Designing Electronic payment systemsL42 Designing Electronic
payment systems. T1 2.. By the end of the session student will understand concepts of Designing Electronic payment systems1. By the end of the session student will identify concepts of E-Commerce Strategy
L43
E-Commerce Strategy and Implementation Strategic Planning for E-Commerce
T1 2.. By the end of the session student will understand concepts of Implementation Strategic Planning for E-Commerce
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 157
1. By the end of the session student will identify Strategy in Action
L44 Strategy in Action T1 2. By the end of the session student will understand concepts of Strategy in Action1. By the end of the session student will identify Competitive Intelligence on the Internet,L45
Competitive Intelligence on the Internet,
T1 2.. By the end of the session student will understand Competitive Intelligence on the Internet,1. By the end of the session student will identify ImplementationL46 Implementation; Plans
and Execution, T1 2.. By the end of the session student will understand Plans and Execution,1. By the end of the session student will identify Project assessmentL47 Project and Strategy
assessment T1 2.. By the end of the session student will understand Strategy assessment1. By the end of the session student will identify Managerial IssuesL48 Managerial Issues T1 2.. By the end of the session student will understand Managerial Issues1. By the end of the session student will identify Global Electronic Commerce
L49 Global Electronic Commerce T1 2.. By the end of the session
student will understand concepts of Global Electronic Commerce1. By the end of the session student will identify concepts Future of Electronic Commerce.
V
L50,L51
Future of Electronic Commerce. T1 2. By the end of the session
student will be able to use electronic Commerce in future.
13.9 MAPPING COURSE OBJECTIVE LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Course OutcomesCourse Objective
a b c dI. S S
II. H
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 158
III. H S HIV. SV. S S
VI. H
S=Supportive H = Highly Related
13.10 MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Program OutcomesCourse Outcomes
A B C D E F G H I J k L M Na. H S Sb. S H Sc. S Sd. H S S S
13.11 OBJECTIVE BITS:
UNIT-11. Which of the following describes e‐commerce?
A. Doing business electronically B. Doing business C. Sale of goods D. All of the above Answer: A
2. Which of the following is part of the four main types for e‐commerce? A. B2B B. B2C C. C2B D. All of the above Answer: D
3. Which segment do eBay, Amazon.com belong? A. B2Bs B. B2Cs C. C2Bs D. C2Cs Answer: B
4. Which type of e‐commerce focuses on consumers dealing with each other? A. B2B B. B2C C. C2B D. C2C Answer: D
5. Which segment is eBay an example? A. B2B B. C2B C. C2C D. None of the above Answer: D
6. Which type deals with auction? A. B2B
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 159
B. B2C C. C2B D. C2C Answer: D
7. In which website Global Easy Buy is facilitated? A. Ebay.com B. Amazon.com C. Yepme.com D. None of these Answer: A
8. The best products to sell in B2C e‐commerce are: A. Small products B. Digital products C. Specialty products D. Fresh products Answer: B
9. Which products are people most likely to be more uncomfortable buying on the Internet? A. Books B. Furniture C. Movies D. All of the above Answer: B
10. Which products are people most likely to be comfortable buying on the Internet? A. Books B. PCs C. CDs D. All of the above Answer: D
11. Digital products are best suited for B2C e‐commerce because they: A. Are commodity like products B. Can be mass‐customized and personalized C. Can be delivered at the time of purchase D. All of the above Answer: D
12. The solution for all business needs is A. EDI B. ERP C. SCM D. None of the above Answer: B
13. All of the following are techniques B2C e‐commerce companies use to attract customers, except: A. Registering with search engines B. Viral marketing C. Online ads D. Virtual marketing Answer: D
14. Which is a function of E‐commerce A. marketing B. advertising C. warehousing D. all of the above Answer: D
15. Which is not a function of E‐commerce
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 160
A. marketing B. advertising C. warehousing D. none of the above Answer: C
16. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? A. Affiliate programs B. Click‐through C. Spam D. All of the above Answer: B
17. What is the percentage of customers who visit a Web site and actually buy something called? A. Affiliate programs B. Click‐through C. Spam D. Conversion rate Answer: D
18. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: A
19. What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?
A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: B
20. What are ballpoint pens purchased by a clothing company? A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: B
UNIT-21. What is another name for?
A. Direct materials B. Indirect materials C. EDI D. None of the above Answer: B
2. What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? A. B2B marketplace B. Intranet C. Reverse auction D. Internet Answer: C
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 161
3. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? A. Customer relationship management systems cards B. E‐government identity cards C. FEDI cards D. Smart cards Answer: D
4. Most individuals are familiar with which form of e‐commerce? A. B2B B. B2C C. C2B D. C2C Answer: B
5. Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? A. B2B B. B2C C. C2B D. C2C Answer: A
6. Which of the following are advantages normally associated with B2B e‐commerce? A. Shorter cycle times B. Reduction in costs C. Reaches wider audiences D. all of the above Answer: D
7. If the threat of substitute products or services is low it is a(n): A. Disadvantage to the supplier B. Advantage to the buyer C. Advantage to the supplier D. None of the above Answer: C
8. The threat of new entrants is high when it is: A. Hard for customers to enter the market B. Hard for competitors to enter the market C. Easy for competitors to enter the market D. Easy for customers to enter the market Answer: C
9. If it is easy for competitors to enter the market, the threat of new entrants is considered: A. High B. Low C. More D. Less Answer: A
10. An industry is less attractive for suppliers when the rivalry among existing competitors is: A. High B. Low C. More D. Less Answer: A
11. Unique value auction is mainly applies to? A. New products B. Second hand products C. Engineering products D. None of the above
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 162
Answer: B 12. Paisapay is facilitated in
A. eBay.co.in B. amazon.com C. flipkart.com D. none of the above Answer: A
13. Which of the following is a useful security mechanism when considering business strategy and IT? A. encryption B. decryption C. firewall D. all the above Answer: D
14. Which of the following is not related to security mechanism A. encryption B. decryption C. e‐cash D. all the above Answer: C
15. A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? A. Switching costs B. Loyalty programs C. Entry barriers D. Affiliate programs Answer: C
16. Which of the following statements accurately reflect the impact of technology? A. Technology has caused buyer power to increase B. Technology has lessened the entry barriers for many industries C. Technology has increased the threat of substitute products and services D. all of the above Answer: D
17. A business cannot be all things to all people. Instead, a business must: A. Identify target customers B. Identify the value of products/services as perceived by customers C. all of the above D. None of the above Answer: C
18. How the transactions occur in e‐commerce? A. Using e‐medias B. Using computers only C. Using mobile phones only D. None of the above Answer: A
19. Which type of products is lesser purchased using ecommerce? A. automobiles B. books C. softwares D. noneAnswer: A
20. A business competing in a commodity like environment must focus on which of the following? A. Price
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 163
B. Ease / speed of delivery C. Ease of ordering D. all of the above Answer: D
UNIT-31. Which of the following refers to creating products tailored to individual customers?
A. customization B. aggregation C. Direct materials D. Reverse auction Answer: A
2. Materials used in the normal operation of a business but not related to primary business operations are called what? A. Supplies B. Direct materials C. Indirect materials D. Daily stuff Answer: C
3. Amazon.com is well‐known for which e‐commerce marketing technique? A. Banner ads B. Pop‐up ads C. Affiliate programs D. Viral marketing Answer: C
4. What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? A. Direct marketplace B. B2B C. B2C D. Electronic marketplace Answer: D
5. Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials? A. horizontal B. Vertical C. Integrated D. Inclined Answer: A
6. Which form of e‐marketplace brings together buyers and sellers from the same industry? A. horizontal B. Vertical C. Integrated D. Inclined Answer: B
7. Which type of add appears on a web page? A. pop‐under ad B. Pop‐up ad C. Banner ad D. Discount ad Answer: C
8. What type of ad appears on top of a web page? A. pop‐under ad
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 164
B. pop‐up ad C. banner ad D. discount ad Answer: B
9. What type of ad appears under a web page? A. pop‐under ad B. pop‐up ad C. banner ad D. discount ad Answer: A
10. Which, if any, of the following types of ads are people most willing to tolerate? A. pop‐under ad B. pop‐up ad C. banner ad D. none of the above Answer: D
11. Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? A. electronic check B. electronic bill presentment and payment C. conversion rates D. financial cybermediary Answer: D
12. Which of the following is a method of transferring money from one person's account to another? A. electronic check B. credit card C. e‐transfer D. none of the above Answer: A
13. An electronic check is one form of what? A. e‐commerce B. online banking C. e‐cash D. check
14. If you need to transfer money to another person via the internet, which of the following methods could you use? A. financial cybermediary B. electronic check C. electronic bill presentment and payment D. all of the above Answer: D
15. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? A. financial cybermediary B. electronic check C. electronic bill presentment and payment D. all of the above Answer: C
16. A combination of software and information designed to provide security and information for payment is called a what? A. digital wallet B. pop up ad C. shopping cart
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 165
D. encryption Answer: A
17. What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? A. internet commerce B. e‐commerce C. transaction information transfer D. electronic data interchange Answer: D
18. Which of the following is used in B2B to pay for purchases? A. e‐commerce B. financial electronic data interchange C. electronic data exchange D. electronic checks Answer: B
19. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key. A. encryption, decryption B. private, public C. encryption, public D. public, private Answer: D
20. Secure Sockets Layers does which of the following? A. creates a secure, private connection to a web server B. encrypts information C. sends information over the internet D. all of the above Answer: D
UNIT-41. When a transaction is processed online, how can the merchant verify the customer's
identity? A. use secure sockets layers B. use secure electronic transactions C. use electronic data interchange D. use financial electronic data interchange Answer: B
2. The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? A. hacking B. cracking C. dumpster diving D. spoofing Answer: D
3. What is a model of a proposed product, service, or system? A. Prototyping B. Prototype C. Proof‐of‐concept prototype D. Selling prototype Answer: B
4. What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 166
A. Client/server network B. Intranet C. Extranet D. Thin client Answer: B
5. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? A. Client/server network B. Intranet C. Extranet D. Thin client Answer: C
6. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: A
7. What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: C
8. What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: B
9. What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? A. Disaster recovery plan B. Hot site C. Cold site D. Disaster recovery cost curve Answer: D
10. Which factor determines when your IT system will be available for knowledge workers to access? A. Availability B. Accessibility C. Reliability D. None of the above Answer: A
11. Which factor determines who has the right to access different types of IT systems and information? A. Availability B. Accessibility C. Reliability D. Scalability Answer: B
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 167
12. Which factor ensures your IT systems are functioning correctly and providing accurate information? A. Availability B. Accessibility C. Reliability D. Scalability Answer: C
13. Which factor represents how well your system can adapt to increased demands? A. Availability B. Accessibility C. Reliability D. Scalability Answer: D
14. Which factor represents a system's ability to change quickly? A. Flexibility B. Performance C. Capacity planning D. Benchmark Answer: A
15. What is a set of conditions used to measure how well a product or system functions? A. Flexibility B. Performance C. Capacity planning D. Benchmark Answer: D
16. What determines the future IT infrastructure requirements for new equipment and additional network capacity? A. Flexibility B. Performance C. Capacity planning D. Benchmark Answer: C
17. What automates business processes? A. Workflow B. ASP C. Workflow system D. EIP Answer: C
18. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? A. Workflow B. EIP C. Workflow system D. SLA Answer: A
19. What sends work assignments through an e‐mail system? A. Database‐based enterprise information portal B. Messaging‐based enterprise information portal C. Database‐based workflow system D. Messaging‐based workflow system Answer: D
20. Which will not harm computer resources A. firewall B. Virus
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 168
C. Trojan horse D. None of the above Answer: A
UNIT-51. Which is not a function of ERP?
A. Warehousing B. sales C. scheduling D. None of the above Answer: D
2. Which is a function of ERP? A. Warehousing B. sales C. scheduling D. all of the above Answer: D
3. Which of the following is the primary characteristic of an intranet? A. People outside the organization can access it B. People inside the organization can't access it C. People outside the organization can't access it D. None of the above Answer: C
4. Which concept suggests that different applications and computer systems should be able to communicate with one another? A. Integration B. Web services C. Scalability D. Interoperability Answer: D
5. Which service encompasses all technologies used to transmit and process information on an across a network? A. Interoperability B. Scalability C. Benchmarking D. Web services Answer: D
6. Which process can prevent data from lose due to computer problems or human errors? A. backup B. recovery C. benchmarking D. data cleansing Answer: A
7. Which process is used to reinstall data from a copy when the original data has been lost? A. backup B. recovery C. benchmarking D. data cleansing Answer: B
8. What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? A. Performance B. Capacity planning C. Benchmarking D. Data cleansing
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 169
Answer: C 9. Who protects system from external threats?
A. firewall B. EDI C. ERP D. Script kiddies Answer: A
10. Who breaks into other people's computer systems and steals and destroys information? A. Hackers B. softwaresC. Hacktivists D. Script kiddies Answer: a
11. What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about? A. Web log B. Clickstream C. Anonymous Web browsing service D. None of the above Answer: D
12. ERP stands for A. Enterprise resolution planning B. Enterprise reverse planning C. Enterprise resource planning D. None of the above Answer: C
13. Which is not a component of ERP? A. Legacy systems B. Bolt on applications C. Operational database D. Cybersoft Answer: D
14. Which is not a function of ERP? A. Human resource management B. financial C. warehousing D. None of the above Answer: D
15. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic? A. Computer virus B. Worm C. Denial of service attack D. None of the above Answer: B
16. What floods a Web site with so many requests for service that it slows down or crashes? A. Computer virus B. Worm C. Denia-of-service attack D. None of the above Answer: C
17. What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? A. Computer virus
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 170
B. Worm C. Denial‐of‐service attack D. None of the above Answer: D
18. What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? A. Risk management B. Risk assessment C. Security D. None of the above Answer: A
19. What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? A. Risk management B. Risk assessment C. Security D. None of the above Answer: B
20. What is the process of making a copy of the information stored on a computer? A. Backup B. Anti-virus C. Firewall D. Biometrics Answer: A
13.12 TUTORIALS QUESTION BANKPART-A (SHORT ANSWER QUESTIONS)
S. No QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT –I
1. Define E-Commerce? How information processing is categorized in E-Commerce? Knowledge a
2. Explain about e-Commerce – Framework in detail. Understand b3. Illustrate the elements of the e-Commerce – Framework in detail. Understand a4. Describe in detail about the anatomy of e-Commerce.. Understand b5. Explain about the Application services of e-commerce. Understand c6. Explain about Consumer-Oriented Services in detail. Comprehension c7. Illustrate Consumer-Oriented Applications in detail. Understand c8. Explain in detail about intermediate services and advanced services. Understand a9. How home shopping is categorized in e-commerce? Explain. Understand a10. How Prepurchase is determined in e-commerce? Explain. Understand a
UNIT –II1. Illustrate and explain the Risk in Electronic Payment system? Understand c2. What are the factors for Design of Electronic Payment system. Knowledge a3. Explain in detail about Credit Card based Electronic Payment Systems. Understand a4. Explain in detail about Smart card payment Systems Understand c5. What is EFT? Explain how work on EFT can be segmented Understand a6. Expand EDI. Explain in brief. Understand b
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 171
7. Describe the Layered Architecture of EDI Understand a8. To draw neat diagram apply Information flow without EDI. Apply a9. To draw neat diagram apply Information flow with EDI. Apply a
10. What are the various Legal, Security and Privacy issues and limitations of EDI Understand a
UNIT -III1. Explain in detail about Intra-organizational Electronic Commerce. Understand a
2. Explain in detail about Work-flow automation and coordination in detail. Understand b
3. Illustrate various characteristics of the Supply Chain management. Understand a
4. To draw neat diagram apply the concept of Push-based SCM Apply a5. With neat diagram explain about Pull -based SCM Understand a6. Analyze the corporate digital library to draw a neat diagram Analysis b
7. Illustrate the types of digital documents. Explain in detail about Document Imaging. Understand c
8. Illustrate the types of digital documents. Explain about Structured Documents in detail
Understand d
9. Illustrate the types of digital documents. Explain about Hypertext Documents in detail.
Understand a
10. What are the various Document-oriented Processes? Explain Understand dUNIT –IV
1 Explain about Consumer-data interfaces in detail. Understand a
2 What are the Typical features Information filtering processes?Explain.
Understand a
3 Describe in detail about Electronic white pages. Understand a4 Illustrate in detail about Electronic Yellow Pages. Understand a5 Describe in detail about Consumer search Understand a6 Explain the utility of business information. Understand a
7 What is consumer search? Explain the process of consumer search in online marketing.
Understand a
8 Discuss on search and resource discovery paradigms Understand a9 How do you integrate research and consumer buying behavior Understand a
10 What do you mean by electronic white and yellow pages of directory business?
Understand a
UNIT -V1 Analyze the series of stages a multimedia entity must pass through.. Analysis c2 Explain in detail about Multimedia Data Compression Understand a3 Explain in detail how Internet is used for Video conferencing Understand a
4Write short notes ofi. Desktop video hardware for playback and captureii. Factors that have made desktop video conferencing
Understand a
5 Analyze the Desktop Video Application Software analysis a6 What are the recent advancements in multimedia technology? Understand c
7 Explain e-commerce solutions and database solutions that are available in industrial houses for business purposes
Understand a
8 Explain Networks. Discuss in detail the ISDN. Understand a9 Explain various types of Codecs. Understand a
10 What are the benefits associated with desktop video conferencing Understand a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 172
PART – B LONG ANSWER QUESTIONS
S.No Question Blooms
Taxonomy LevelCourse
OutcomeUNIT –I
1. Write short notes on a. Brokerage and data managementb. Interface layer services Comprehension c
2. Write short notes on a. Middleware services andb. Secure Messaging Knowledge a
3. Explain the benefits of e-commerce in detail Comprehension, d4. Explain about the Limitations of e-Commerce in detail. Comprehension, d5. What is Supply Chain Management? Explain in detail. Application e
6. Apply Purchase Consummation to implemented in e-commerce? Explain. Application, d
7 Explain Mercantile Transaction Using Credit Cards in detail. Knowledge a8 Explain in detail Mercantile Models - Merchant’s Perspective. Knowledge a9 Describe the Order Management Cycle in e-commerce? Knowledge a10 Explain Mercantile model from the consumer’s perspective Comprehension b
UNIT -II1. What is Digital token-based electronic payment system? Explain Knowledge a
2.Explain in detail about electronic check system(ECS). Comprehension,
Synthesis, Evaluation
b
3. What is Electronic Cash? Illustrate and explain the Properties of Electronic Cash. Comprehension c
4. Illustrate the procedure for Purchasing e-cash from currency servers. Knowledge a
5. What are the various Legal issues, Business issues and Operational risks in electronic cash
Application, Synthesis d
6. Illustrate various EDI Applications in BusinessComprehension, Synthesis, Evaluation
b
7 Illustrate and explain various EDI standards. Understand c8 Explain in detail about EDI Software Implementation Knowledge a9 Expand VANs and explain in detail. Knowledge a
10 What are the various Advantages & Disadvantages of EDI?Explain. Knowledge a
UNIT –III1. Explain in detail about Integrated marketing and distribution in SCM Knowledge a
2.Explain in detail about Integrated Logistics and distribution in SCM Comprehension,
Synthesis, Evaluation
d
3 Explain in detail about Efficient Customer Response (ECR) in SCM. Comprehension c4 Explain in detail about Agile Manufacturing in SCM Knowledge a5 Write short notes on pull based SCM & push based SCM Knowledge a
6 What are the various functions and characteristics of Data warehouse? Explain. Comprehension c
7 How to build an end-to-end Data Warehouse? Explain. Comprehension, d8. Describe in detail about e-Advertising and Marketing? Comprehension c9. How Advertising is done on the Internet? Explain. Comprehension c10. Explain the process of On-line marketing. Comprehension c
UNIT -IV
1.What are Interactive Product Catalogs? Explain. Knowledge,
Comprehension, Evaluation
c
2. Explain in detail about Wide Area Information Service (WAIS) Engine Knowledge, c
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 173
Comprehension, Evaluation
3.Illustrate the two types of indexing methods. Explain about Indexing package categories.
Knowledge, Comprehension, Evaluation
d
4. What are search engines? Explain about the three major search methods. Comprehension c
5. Discuss on search and resource discovery paradigm? Application, Synthesis d
6. Describe push technology and state its benefits. Knowledge a7 What is the significance of online marketing? State its limitations. Comprehension, b8 What are the initial procedures for creating digital documents Comprehension, d
9Describe push technology and state its benefits. Knowledge,
Comprehension, Evaluation
d
10 What is the significance of online marketing? State its limitations. Comprehension cUNIT – V
1Write short notes ona. Goals of electronic commerceb. Information search challenges
Application, d
2 Explain in detail about Types of desktop video conferencing Application, d
3 Write short notes onDigital video compression / decompression Application, d
4 Explain in detail about Multimedia servers Knowledge a
5 Explain in detail about Digital video compression / decompression technique. Knowledge, c
6 Write a short note on functioning of CD-ROM as a multimedia storage. Comprehension, c
7 List out the applications of digital video in e-commerce? Comprehension c
8 Discuss the characteristics Digital Video? Comprehension b
9 Describe information filtering? Comprehension c
10 Discuss the overview Directory business Comprehension c
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S.No Questions
BloomsTaxonomy
LevelCourse Outcome
UNIT –I
1 Compare and contrast online retailing with traditional retailing. Comprehension c
2 Explain Home Banking and Home Shopping. Application, d
3 Write short notes on micro transactions of information. Application, d
4 What are the challenges for consumer-oriented e-commerce in India. Understand c
5 What is catalog based shopping ? State its advantages. Understand d
UNIT – II
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 174
1 What is smart card? What are their types and uses. Knowledge a
2 Discuss why anyone with a credit card would want to us an electronic payment system. Knowledge a
3 How do you ensure consumer protection in e-payment system. Understand c
4 Explain risks involved in electronic cash handling and cash payment. Understand d
5 Explain detection of double spending in e-cash. Understand b
UNIT -III
1. How do companies eliminate the potential limitations and risks associated with internet based EDI.
Analysis , d
2. Explain MIME based EDI. Explain MIME advantages and disadvantages. Knowledge a
3. Compare EDI and e-mail. Comprehension c
4 Explain different financial EDI standards. Understand a
5 Explain manufacturing/retail procurement using EDI. Understand D
UNIT –IV
1. What are the company’s e-commerce goals? Comprehension C
2. Will the e-commerce leader command a dedicated team? Comprehension C
3. Where will the e-commerce team work—headquarters or dot-com talent centers? Understand A
4 Write a short note on functioning of CD-ROM as a multimedia storage. Understand B
5 List out the applications of digital video in e-commerce? Understand C
UNIT –V
1. What are the most essential skills and competencies to look for in candidates?
Application, D
2. Does the business’ compensation model support or undermine its goals? Knowledge A
3. Should the head of e-commerce report directly to the c-suite? Understand A
4. What are the most common pitfalls when recruiting e-commerce leaders? Comprehension C
Explain e-commerce solutions and database solutions that are available in industrail houses for business purposes Understand A
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 175
13.13 ASSIGNMENT QUESTION BANK PART – A (SHORT ANSWER QUESTIONS)
S.No Questions
BloomsTaxonomy
Level
CourseOutcome
UNIT –I1 Explain about Consumer-Oriented Services in detail. Knowledge A
2 Illustrate Consumer-Oriented Applications in detail. Analysis B3 Explain in detail about intermediate services and advanced services. Knowledge A4 How home shopping is categorized in e-commerce? Explain. Analysis A5 How Prepurchase is determined in e-commerce? Explain. Synthesis B
6 Define E-Commerce? How information processing is categorized in E-Commerce? Comprehension C
7 Explain about e-Commerce – Framework in detail. Comprehension C8 Illustrate the elements of the e-Commerce – Framework in detail. Knowledge A9 Describe in detail about the anatomy of e-Commerce.. Knowledge A
10 Explain about the Application services of e-commerce. Knowledge AUNIT –II
1 Expand EDI. Explain in brief. Comprehension C2 Describe the Layered Architecture of EDI Knowledge A3 With neat diagram explain Information flow without EDI. Knowledge A4 With neat diagram explain Information flow with EDI Comprehension C5 What are the various Legal, Security and Privacy issues and limitations of EDI Knowledge A6 Illustrate and explain the Risk in Electronic Payment system? Analysis B7 What are the factors for Design of Electronic Payment system. Knowledge A8 Explain in detail about Credit Card based Electronic Payment Systems. Knowledge A9 Explain in detail about Smart card payment Systems Knowledge A
10 What is EFT? Explain how work on EFT can be segmented Knowledge AUNIT –III
1 With a neat diagram explain in detail about corporate digital library. Knowledge A
2 Illustrate the types of digital documents. Explain in detail about Document Imaging. Analysis B
3 Illustrate the types of digital documents. Explain about Structured Documents in detail Knowledge A
4 Illustrate the types of digital documents. Explain about Hypertext Documents in detail. Knowledge A
5 What are the various Document-oriented Processes? Explain Knowledge A6 Explain in detail about Intra-organizational Electronic Commerce. Analysis B7 Explain in detail about Work-flow automation and coordination in detail. Understand
8 What are the various characteristics of the Supply Chain management. Understand
9 With neat diagram explain about Push-based SCM Understand
10 With neat diagram explain about Pull -based SCM Understand
UNIT –IV1 Explain the utility of business information . Knowledge A
2 What is consumer search ? Explain the process of consumer search in online marketing. Knowledge A
3 Discuss on search and resource discovery paradigms Knowledge A
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 176
4 How do you integrate research and consumer buying behavior Knowledge A
5 What do you mean by electronic white and yellow pages of directory business. Knowledge A
6 Explain about Consumer-data interfaces in detail. Knowledge A
7 What are the Typical features Information filtering processes?Explain. Knowledge A
8 Describe in detail about Electronic white pages. Knowledge A9 Illustrate in detail about Electronic Yellow Pages. Knowledge A
10 Describe in detail about Consumer search Knowledge AUNIT –V
1 Illustrate the Characteristics of Digital video and explain about Desktop Video Application Software Comprehension C
2 What are the recent advancements in multimedia technology. Knowledge A
3 Explain e-commerce solutions and database solutions that are available in industrail houses for business purposes Knowledge A
4 Explain Networks. Discuss in detail the ISDN. Knowledge A5 Explain various types of Codecs. Knowledge A6 What are the benefits associated with desktop video conferencing Comprehension C
7 Define multimedia? Illustrate and explain the series of stages a multimedia entity must pass through.. Knowledge A
8 Explain in detail about Multimedia Data Compression Knowledge C9 Explain in detail how Internet is used for Video conferencing Knowledge C
10 Write short notes on i. Desktop video hardware for playback and captureii. Factors that have made desktop video conferencing Knowledge C
PART – B (LONG ANSWER QUESTIONS)
S. No QuestionsBlooms
TaxonomyLevel
CourseOutcome
UNIT –I
1 Write short notes on a. Brokerage and data managementb. Interface layer services Comprehension C
2 Write short notes on a. Middleware services andb. Secure Messaging Knowledge A
3 Explain the benefits of e-commerce in detail Comprehension, B
4 Explain about the Limitations of e-Commerce in detail. Comprehension, B
5 What is Supply Chain Management? Explain in detail. Application C
6 How Purchase Consummation is implemented in e-commerce? Explain. Application, B
7 Explain Mercantile Transaction Using Credit Cards in detail. Knowledge A8 Explain in detail Mercantile Models - Merchant’s Perspective. Knowledge A9 Describe the Order Management Cycle in e-commerce? Knowledge A
10 Explain Mercantile model from the consumer’s perspective Comprehension D
UNIT –II1 What is Digital token-based electronic payment system? Explain Knowledge A
2 Explain in detail about electronic check system(ECS). Comprehension, B
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 177
3 What is Electronic Cash? Illustrate and explain the Properties of Electronic Cash. Comprehension C
4 Illustrate the procedure for Purchasing e-cash from currency servers. Knowledge A
5 What are the various Legal issues, Business issues and Operational risks in electronic cash
Application, D
6 Illustrate various EDI Applications in Business Comprehension, B
7 Illustrate and explain various EDI standards. Knowledge A8 Explain in detail about EDI Software Implementation Knowledge A9 Expand VANs and explain in detail. Knowledge A
10 What are the various Advantages & Disadvantages of EDI?Explain. Knowledge A
UNIT –III1 Explain in detail about Integrated marketing and distribution in SCM Knowledge A
2 Explain in detail about Integrated Logistics and distribution in SCM Comprehension, b/c/d
3 Explain in detail about Efficient Customer Response ( ECR ) in SCM. Comprehension C4 Explain in detail about Agile Manufacturing in SCM Knowledge A5 Write short notes on pull based SCM & push based SCM Knowledge A6 What are the various functions and characteristics of Data warehouse? Explain. Comprehension C
7 How to build an end-to-end Data Warehouse? Explain. Comprehension, B
8 Describe in detail about e-Advertising and Marketing? Comprehension C9 How Advertising is done on the Internet? Explain. Comprehension C10 Explain the process of On-line marketing. Comprehension C
UNIT –IV1 What are Interactive Product Catalogs? Explain. Knowledge, C2 Explain in detail about Wide Area Information Service (WAIS) Engine Knowledge, C
3 Illustrate the two types of indexing methods. Explain about Indexing package categories. Knowledge, C
4 What are search engines? Explain about the three major search methods. Comprehension C
5 Discuss on search and resource discovery paradigm? Application, e/b
6 Describe push technology and state its benefits. Knowledge A
7 What is the significance of online marketing? State its limitations. Comprehension, D
8 What are the initial procedures for creating digital documents Comprehension, D
9 Describe push technology and state its benefits. Knowledge, C10 What is the significance of online marketing? State its limitations. Comprehension C
UNIT –V
1Write short notes ona. Goals of electronic commerceb. Information search challenges
Application, d/e
2 Explain in detail about Types of desktop video conferencing Application, D
3 Write short notes onDigital video compression / decompression Application, D
4 Explain in detail about Multimedia servers Knowledge A
5 Explain in detail about Digital video compression / decompression technique.
Knowledge, D
6 Write a short note on functioning of CD-ROM as a multimedia storage. Comprehensio
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 178
n, D
7 List out the applications of digital video in e-commerce? Comprehension D
8 Discuss the characteristics Digital Video? Comprehension, C
9 Describe information filtering? Comprehension B10 Discuss the overview Directory business Comprehension B
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S.No Question
Blooms Taxonomy
Level
Course Outcome
UNIT –I
1 Compare and contrast online retailing with traditional retailing. Comprehension D
2 Explain Home Banking and Home Shopping. Application, C
3 Write short notes on micro transactions of information. Application, C
4What are the challenges for consumer-oriented e-commerce in India. Understand a
5 What is catalog based shopping ? State its advantages. Understand DUNIT –II
1 What is smart card? What are their types and uses. Knowledge B
2 Discuss why anyone with a credit card would want to us an electronic payment system. Knowledge B
3 How do you ensure consumer protection in e-payment system. Understand C4 Explain risks involved in electronic cash handling and cash payment. Understand A5 Explain detection of double spending in e-cash. Understand D
UNIT –III
1 How do companies eliminate the potential limitations and risks associated with internet based EDI. Analysis C
2 Explain MIME based EDI. Explain MIME advantages and disadvantages. Knowledge B
3 compare EDI and e-mail. Comprehension C4 Explain different financial EDI standards. Understand C5 Explain manufacturing/retail procurement using EDI. Understand D
UNIT –IV1 What are the company’s e-commerce goals? Comprehension B2 Will the e-commerce leader command a dedicated team? Comprehension C
3 Where will the e-commerce team work—headquarters or dot-com talent centers? Understand D
4 Write a short note on functioning of CD-ROM as a multimedia storage. Understand A5 List out the applications of digital video in e-commerce? Understand B
UNIT –V
1 What are the most essential skills and competencies to look for in candidates? Application, B
2 Does the business’ compensation model support or undermine its goals? Knowledge C
3 Should the head of e-commerce report directly to the c-suite? Understand D
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 179
4 What are the most common pitfalls when recruiting e-commerce leaders? Comprehension C
5 Explain e-commerce solutions and database solutions that are available in industrail houses for business purposes Understand D
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 180
14. COMPUTER NETWORKS (A10519)
14.0 COURSE DESCRIPTION
Course Title Computer networksCourse Code A10519Regulation MLR-15
Lectures Tutorials Practicals CreditsCourse Structure
3 1 -- 3Course Coordinator Dr. ILAIAH KAVATI Professor CSE
Team of Instructors Dr. Syed Umar Professor/ Mr M Srinivas Rao Assoc.Professor/Mrs.Navya Asst.Professor CSE
14.1 COURSEOVERVIEW:The course introduces main concepts of networking; application areas;
classification; reference models; transmission environment; technologies; routing algorithms; IP, UDP and TCP protocols; reliable data transferring methods; application protocols; network security; management systems; perspectives of communication networks. The course structure consists of lectures in classroom and individual work.
14.2 PREREQUISITES:
Level Credits Periods/Weeks PrerequisitesUG 3 5 Computer Networks, Network security
14.3. MARKS DISTRIBUTION:
Session Marks University EndExam Marks Total Marks
There shall be 2 midterm examinations. Each midterm examination consists of subjective type and objective type tests. The subjective test is for 10 marks, with duration of 1 hour. Subjective test of each semester shall contain 4 questions; the student has to answer 2 questions, each carrying5marks.The objective type test is for 10 marks with duration of 20minutes. It consists of10 multiple choice and 10 objective type questions, the student have to answer all the questions and each carry half mark.First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion.Five marks are earmarked for assignments. There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course.
75 100
14.4 EVALUATION SCHEME:
S. No Component Duration Marks1 I Mid Examination 80 minutes 202 I Assignment - 53 II Mid Examination 80 minutes 20
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 181
4 II Assignment - 55 External Examination 3 hours 75
COURSEOBJECTIVES:I. To introduce the fundamentals of various types of computer networks
II. To demonstrate the TCP/IP and OSI models with merits and demerits III. To explore the various layers of OSI model IV. To introduce UDP and TCP models
14.5 COURSE OUTCOMES:
S NO COURSE OUTCOMES BLOOMS LEVELS
a. Understand and explain computer networks and its components. BL 1 & 2b. Identify the different types of network topologies and protocols. BL 1, 2, & 3
c. Enumerate the layers of the OSI model and TCP/IP. Explain the function(s) of each layer. BL 1, 2, 3 & 4
d. Understand and building the skills of sub netting and routing mechanisms. BL 1, 2, 3 & 4
e.Familiarity with the basic protocols of computer networks with UDP and TCP models, and how they can be used to assist in network design and implementation
BL 4 & 5
BLOOMS LEVEL (BL)BL 1: Remember / knowledge BL2: Understanding BL3: ApplyBL 4: Analyze BL 5: Evaluate
14.6 HOW PROGRAM OUTCOMES AREASSESSED:
Program Outcomes Level Proficiency assessed by
A An ability to apply the knowledge of mathematics, Computing, Science and engineering to solve Computer Science and Engineering problems. H
Assignments, Tutorials,
Exams
B An ability to design and conduct engineering experiments, as well as to analyze and interpret data. S Assignments, tutorials
C An ability to design and construct a hardware and software system, component, or process to meet desired needs, within realistic constraints. H Assignments, Tests
DGraduates will demonstrate an ability to visualize and work on laboratory and Multi-disciplinary tasks individually or as a member within the teams.
N ------
EAn ability to demonstrate skills to use the techniques, modern engineering Tools, Software and equipments necessary to analyze computer engineering Problems.
H Assignments, Tests
F An understanding of professional, social and ethical responsibility S Lectures
G An ability to recognize the global issues like green initiatives and alternate energy recognize the rural requirements. S ----
H The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context. N Lectures
IGraduate will develop confidence for self-education and acquire new knowledge in the computing discipline and ability and practice for Multi-disciplinary tasks as a member within the teams
H Assignments, Tutorials,Exams
J To communicate effectively N ------
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 182
K An ability to use the techniques, skills and modern engineering tools practice necessary for Engineering practice. H Assignment s, Tutorials
L Graduates areable to participate and succeed in competitive examination like GRE, GATE, TOEFL, GMAT etc N Assignments, Tutorials
MThe use of current application software and the design and use operating systems and the analysis, design, testing and documentation of computer programs for the use computer science and engineering technologies .
H Assignments, Tutorials
N An ability to setup an enterprise. S Assignments,
N= None S= Supportive H = Highly Related
14.7 SYLLABUS:
UNIT - I INTRODUCTION: Network applications, network hardware, network software, reference models: OSI, TCP/IP, Internet, Connection oriented network - X.25, frame relay. THE PHYSICAL LAYER: Theoretical basis for communication, guided transmission media, wireless transmission, the public switched telephone networks, mobile telephone system.UNIT - II THE DATA LINK LAYER: Design issues, error detection and correction, elementary data link protocols, sliding window protocols, example data link protocols - HDLC, the data link layer in the internet. THE MEDIUM ACCESS SUBLAYER: Channel allocations problem, multiple access protocols, Ethernet, Data Link Layer switching, Wireless LAN, Broadband Wireless, Bluetooth UNIT – IIITHE NETWORK LAYER: Network layer design issues, routing algorithms, Congestion control algorithms, Internetworking, the network layer in the internet (IPv4 and IPv6), Quality of Service. UNIT – IV THE TRANSPORT LAYER: Transport service, elements of transport protocol, Simple Transport Protocol, Internet transport layer protocols: UDP and TCP. UNIT - V THE APPLICATION LAYER: Domain name system, electronic mail, World Wide Web: architectural overview, dynamic web document and http. APPLICATION LAYER PROTOCOLS: Simple Network Management Protocol, File Transfer Protocol, Simple Mail Transfer Protocol, Telnet.
TEXT BOOKS: 1. A. S. Tanenbaum (2003), Computer Networks, 4th edition, Pearson Education/ PHI,
New Delhi, India. REFERENCE BOOKS: 1. Behrouz A. Forouzan (2006), Data communication and Networking, 4th Edition, Mc
Graw-Hill, India. 2. Kurose, Ross (2010), Computer Networking: A top down approach, Pearson Education,
India.
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 183
4. Introduction to computer networks and cyber security, Chwan-Hwa (John) Wu,j. David Irwin, CRC Press
5. Computer networks, L.L Peterson and B.S Davie, 4th edition,, ELSEVIER6. Computer networking: A top down approach featuring the internet, james F.Kurouse,
K.W ROSS , 3rdedition,pearson education
14.8 COURSE PLAN:The course plan is meant as a guideline. There may probably be changes
Lecture No
Unit No Topic Name Blooms
Level Session Objectives Teaching Methodology
1 Introduction Apply[Level 3]
By the end of the session student will identify the difference between topologies, networks
Chalk & Talk
2 Network applications Evaluate[Level 5]
By the end of the session student will understand different network structures
Chalk & Talk
3 Network hardwareUnderstan
d[Level 2]
By the end of the session student will identify different types hardware required to set up a network
Chalk & Talk
4 Network software Evaluate[Level 5]
By the end of the session student will identify the benefits and features of network software.
Chalk & Talk
5 Reference models: OSI Apply[Level 3]
By the end of the session student will identify the difference between OSI and TCP/IP
Chalk & Talk
6 TCP/IPUnderstan
d[Level
2]
By the end of the session student will distinguish between OSI and TCP/IP
Chalk & Talk
7 Internet Create[Level 6]
By the end of the session student will identify the different internet standards
Chalk & Talk
8 Connection oriented network - X.25Apply
Level 3
By the end of the session student will understand the ISDN connections as physical links
Chalk & Talk
9 frame relayUnderstan
d[Level 2]
By the end of the session student will identify the difference between local area networks (LANs) and between endpoints in wide area networks (WANs)
Chalk & Talk
10
I
THE PHYSICAL LAYER: Theoretical basis for communication
Understand
[Level 2]
By the end of the session student will understand different types of cables and their structures
Chalk & Talk
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 184
11 guided transmission media Understan
d[Level 2]
By the end of the session student will identify the difference between types of transmission media
Chalk & Talk
12 wireless transmission Apply[Level 3]
By the end of the session student will distinguish between guided and unguided transmission media
Chalk & Talk
13 the public switched telephone networks
Create
Level 6
By the end of the session student will understand different modes of transmission
Chalk & Talk
14 Mobile telephone system. Evaluate[Level 5]
By the end of the session student will understand function of mobile telephony system in detail
Chalk & Talk
15 THE DATA LINK LAYER: Design issues
Understand
[Level 2]
By the end of the session student will identify the different functions of DLL
Chalk & Talk
16 error detection and correction Explain[Level 2]
By the end of the session student will be able to evaluate different methods of error correction and detection
Chalk & Talk
17 error correction Evaluate[Level 5]
By the end of the session student will evaluate different methods of error correction
Chalk & Talk
18 elementary data link protocols Create[Level 6]
By the end of the session student will elaborate the difference between elementary protocols
Chalk & Talk
19 elementary data link protocols Apply[Level 3]
By the end of the session student will elaborate different elementary protocols
Chalk & Talk
20 sliding window protocols Evaluate[Level 5]
By the end of the session student will elaborate the difference between basic protocol and sliding window protocol
Chalk & Talk
21 sliding window protocolsUnderstan
d[Level 2]
By the end of the session student will understand different protocols of DLL
Chalk & Talk
22 example data link protocols - HDLC
Apply[Level 3]
By the end of the session student will understand different protocols of DLL
Chalk & Talk
23 The data link layer in the internet Apply[Level 3]
By the end of the session student will identify how to transfer data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Chalk & Talk
24THE MEDIUM ACCESS SUBLAYER: Channel allocations problem
Evaluate[Level 5]
By the end of the sessionstudent will compare thedifference between different MAC
protocols
Chalk & Talk
25
II
multiple access protocolsUnderstan
d[Level 2]
By the end of the sessionstudent will understand different Mac protocols
Chalk & Talk
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 185
26 multiple access protocols Evaluate[Level 5]
By the end of the sessionstudent will compare thedifference between different MAC
protocols
Chalk & Talk
27 Ethernet Evaluate[Level 5]
By the end of the sessionstudent will distinguish different Ethernet physical layers
Chalk & Talk
28 EthernetUnderstan
d[Level 2]
By the end of the sessionstudent will determine different Ethernet physical layers.
Chalk & Talk
29 Data Link Layer switching Apply[Level 3]
By the end of the session student will explain about DLL switching.
Chalk & Talk
30 Wireless LANUnderstan
d[Level
2]
By the end of the session student will identify the uses of lans
Chalk & Talk
31 Broadband Wireless Create[Level 6]
By the end of the session student will summarize different connecting devices with respect to different layers.
Chalk & Talk
32 BluetoothApply
Level 3
By the end of the session student will summarize different WIRELESS connecting devices with respect to different layers.
Chalk & Talk
33THE NETWORK LAYER: Network layer design issues
Understand
[Level 2]
By the end of the session student will LIST the design issues of network layer
Chalk & Talk
34 Routing algorithmsUnderstan
d[Level 2]
By the end of the session student can create sink trees based on Optimality Principle
Chalk & Talk
35 Routing algorithmsApply
[Level 3]
By the end of the session student will decide the Optimality Principle
Chalk & Talk
36 Routing algorithms Createlevel 6
By the end of the session student can create sink trees based on Optimality Principle
Chalk & Talk
37 Congestion control algorithms Understand
[Level 2]
By the end of the session student will construct Congestion ControlAlgorithms
And
Admission
Control
Algorithms
Chalk & Talk
38 Congestion control algorithms Apply[Level 3]
By the end of the session student will Determine Congestion Control, Admission Control
Chalk & Talk
39 Internetworking Apply[Level 3]
By the end of the session student will analyze common method of routing information packets between the networks
Chalk & Talk
40
III
Internetworking Analyze[Level 4]
By the end of the session student will analyze common method of routing information packets between the networks
Chalk & Talk
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 186
41 the network layer in the internet (IPv4 and IPv6)
Create
Level 6
By the end of the session student will differentiate between IPv4 and IPv6
Chalk & Talk
42 IPV4Create
Level6
By the end of the session student will understanding IPv4 and its associated terminologies along with appropriate references and examples
Chalk & Talk
43 IPV6 Chalk & Talk
44 IPV6
Explain[Level 2]
By the end of the session student will understanding IPv4 and its associated terminologies along with appropriate references and examples
Chalk & Talk
45 Quality of Service Evaluate[Level 5]
By the end of the session student will compare set of networking technologies and techniques designed to guarantee predicable levels of network performance.
Chalk & Talk
46THE TRANSPORT LAYER: Transport service
Understand
[Level 2]
By the end of the session student will explain network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI)
Chalk & Talk
47 elements of transport protocol Explain[Level 2]
By the end of the session student will compare different types of protocols.
Chalk & Talk
48 Simple Transport Protocol Create[Level 6]
By the end of the session student will differentiate between RPC and UDP
Chalk & Talk
49 Internet transport layer protocols Evaluate[Level 5]
By the end of the session student will analyze different internet layer protocols
Chalk & Talk
50 UDP and TCP Apply[Level 3]
By the end of the session student will differentiate between UDP and TCP .
Chalk & Talk
51
IV
TCP Apply[Level 3]
By the end of the session student will define how computers send packets of data to each other.
Chalk & Talk
52THE APPLICATION LAYER: Domain name system Evaluate
[Level 5]
By the end of the session student will explain different levels of DNS
Chalk & Talk
53
V
electronic mailUnderstan
d[Level 2]
By the end of the session student will understand exchange digital messages between people using digital devices such as computers.
Chalk & Talk
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 187
54 World Wide Web :architectural overview
Evaluate[Level 5]
By the end of the session student will design and planning of websites that involves technical, aesthetic and functional criteria
Chalk & Talk
55 dynamic web document and http Apply[Level 3]
By the end of the session student will differentiate between static and dynamic web pages
Chalk & Talk
56 APPLICATION LAYER PROTOCOLS: Simple Network
Understand
[Level 2]
By the end of the session student will understand different type of networks.
Chalk & Talk
57 Management Protocol ApplyLevel 3
By the end of the session student will discuss Internet-standard protocol for collecting and organizing information about managed devices on IP networks
Chalk & Talk
58 File Transfer Protocol Create[Level 6]
By the end of the session student will analyze transfer computer files between a client and server on a computer network
Chalk & Talk
59 Simple Mail Transfer ProtocolApply
Level 3
By the end of the session student will identify the communication between mail servers
Chalk & Talk
60 TelnetUnderstan
d[Level 2]
By the end of the session student will explain user command and an underlying TCP/IP protocol for accessing remote computers
Chalk & Talk
14.9. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES:
Course OutcomesCourse Objectives a b C d e
I H H HII H S S SIII H H H H HIV H H S S
S= Supportive H = Highly Related
14.10 MAPPINGCOURSEOUTCOMESLEADINGTOTHEACHIEVEMENTOF PROGRAM OUTCOMES:
Program OutcomesCourse Educational Outcomes A B C D E F G H I J K L M N
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 188
a H H H S H S H
b H S S S H S S H S H
c H H H H H S H H S
d H H S S H S S H S
e H S H H S H H S
S= Supportive H = Highly Related
14.11 OBJECTIVEQUESTIONS
UNIT I1. The computer network is
A. Network computer with cableB. Network computer without cableC. Both of the aboveD. None of the aboveAnswer B
2. FDDI used which type of physical topology?A. Bus B. Ring C. Star D. TreeAnswer: C
3. FTP stands forA. File transfer protocol B. File transmission protocol C. Form transfer protocol D. Form transmission protocol Answer: C
4. Ethernet system uses which of the following technology.A. Bus B. RingC. StarD. Tree Answer: B
5. Which of the following are the network services? A. File service B. Print service C. Database service D. All of the above Answer: D
6. If all devices are connected to a central hub, then topology is calledA. Bus Topology B. Ring Topology C. Star TopologyD. Tree Topology Answer: B
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 189
7. FDDI stands for A. Fiber Distributed Data Interface B. Fiber Data Distributed Interface C. Fiber Dual Distributed Interface D. Fiber Distributed Data Interface Answer: A
8. Which of the following is an application layer service?A. Network virtual terminal B. File transfer, access and managementC. Mail service D. All of the above Answer: D
9. Which is the main function of transport layer? A. Node to node delivery B. End to end delivery C. Synchronization D. Updating and maintaining routing tables Answer: B
10. The ............ layer change bits onto electromagnetic signals.A. Physical B. Transport C. Data Link D. Presentation Answer: B
11. In mesh topology, relationship between one device and another is ..............A. Primary to peer B. Peer to primary C. Primary to secondary D. Peer to Peer Answer: B
12. The performance of data communications network depends on ..............A. Number of users B. The hardware and Software C. The transmission D. All of the above Answer: D
13. Find out the OSI layer, which performs token management. A. Network Layer B. Transport Layer C. Session Layer D. Presentation Layer Answer: C
14. The name of the protocol which provides virtual terminal in TCP/IP model is.A. Telnet B. SMTP C. HTTP D. NoneAnswer: C
15. The layer one of the OSI model isA. Physical layer
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 190
B. Link layer C. Router layerD. Broadcast layer Answer: A
16. What is the name of the network topology in which there are bi-directional links between each possible node? A. Ring B. Star C. Tree D. Mesh Answer: A
17. What is the commonly used unit for measuring the speed of data transmission?A. Bytes per second B. Baud C. Bits per second D. Both B and C Answer: D
18. Which of the communication modes support two way traffic but in only once direction of a time? A. Simplex B. Half-duplex C. Three - quarter's duplex D. Full duplex Answer: A
19. The loss in signal power as light travels down the fiber is called.............A. Attenuation B. Propagation C. Scattering D. InterruptionAnswer: D
20. Which of the following TCP/IP protocols is used for transferring files form one machine to another?A. FTP B. SNMP C. SMTP D. RPCAnswer: A
UNIT II1. A network that needs human beings to manually route signals is called....
A. Fiber Optic NetworkB. Bus NetworkC. T-switched networkD. Ring networkAnswer: B
2. TCP/IP .................layer corresponds to the OSI models to three layers.A. ApplicationB. PresentationC. SessionD. Transport
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 191
Answer: A3. Which of the transport layer protocols is connectionless?
A. UDPB. TCPC. FTPD. NetAnswer: D
4. Which of the following applications allows a user to access and change remote files without actual transfer?A. DNSB. FTPC. NFSD. TelnetAnswer: A
5. The data unit in the TCP/IP layer called a....A. MessageB. SegmentC. DatagramD. FrameAnswer: C
6. DNS can obtain the .................of host if its domain name is known and vice versaA. Station addressB. IP addressC. Port addressD. ChecksuMAnswer: B
7. Which of the following OSI layers correspond to TCP/IP's application layerA. ApplicationB. PresentationC. SessionD. All of the aboveAnswer: D
8. Devices on one network can communicate with devices on another network via a.......A. File ServerB. Utility ServerC. Printer ServerD. GatewayAnswer: A
9. A communication device that combines transmissions from several I/O devices into one line is aA. ConcentratorB. ModifierC. MultiplexerD. Full duplex fileAnswer: C
10. Which layers of the OSI determines the interface often system with the user?A. NetworkB. ApplicationC. Data link
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 192
D. SessionAnswer: B
11. Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another?A. FTPB. SMTPC. SNMPD. RpeAnswer: A
12. In which OSI layers does the FDDI protocol operate?A. PhysicalB. Data linkC. NetworkD. A and BAnswer: D
13. In FDDI, data normally travel on..................A. The primary ringB. The Secondary ringC. Both ringsD. Neither ringAnswer: A
14. The ............layer of OSI model can use the trailer of the frame for error detectionA. PhysicalB. Data linkC. TransportD. PresentationAnswer: B
15. In a ................topology, if there are n devices in a network, each device has n-1 ports for cables.A. MeshB. StarC. BusD. RingAnswer: A
16. Another name for Usenet is A. GopherB. NewsgroupsC. BrowserD. CERNAnswer: A
17. The standard suit of protocols used by the Internet, Intranets, extranets and some other networksA. TCP/IPB. ProtocolC. Open systemD. Internet work processorAnswer: A
18. State whether the following is true or falsei. In bus topology, heavy Network traffic slows down the bus speedii. It is multipoint configuration
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 193
A. True, TrueB. A) True, TrueC. False, TrueD. False, FalseAnswer: A
19. Which of the following is the logical topology?A. BusB. TreeC. StarD. Both A and BAnswer: D
20. Which of the following is/ are the drawbacks of Ring Topology?A. Failure of one computer, can affect the whole network B. Adding or removing the computers disturbs the network activity. C. If the central hub fails, the whole network fails to operate. D. Both of A and B Answer: D
UNIT III1. Which of the following is not the layer of TCP/IP protocol?
A. Application Layer B. Session Layer C. Transport Layer D. Internetwork layer Answer: D
2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.A. Class A B. Class B C. Class CD. Class DAnswer: C
3. . ............. Addresses are reserved for multicasting.A. Class B B. Class C C. Class D D. Class E Answer: A
4. State the following statement is true or false.i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A. True, False B. True, True C. False, True D. False, FalseAnswer: B
5. Which of the following statement is true?i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A. i only
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 194
B. ii only C. Both A and B D. None of the above Answer: B
6. Which is not the Regional Internet Registers (RIR) of the following?A. American Registry for Internet Numbers (ARIN) B. Europeans Registry for Internet Numbers (ERIN) C. Reseaux IP Europeans (RIPE) D. Asia Pacific Network Information Centre (APNIC)Answer: B
7. Match the following IEEE No to their corresponding Name for IEEE 802 standards for LANs. i) 802.3 a) WiFiii) 802.11 b) WiMaiii) 802.15.1 c) Ethernetiv) 802.16 d) BluetoothA. i-b, ii-c, iii-d, iv-aB. i-c, ii-d, iii-a, iv-b C. i-c, ii-a, iii-d, iv-b D. i-b, ii-d, iii-c, iv-aAnswer: A
8. . ........... was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network.A. Star LAN B. Ring LAN C. Mesh LAN D. All of the above Answer: D
9. . ............... Is the predominant form of Fast Ethernet, and runs over two pairs of category 5 or above cable.A. 100 BASE-TB. 100 BASE-TXC. 100 BASE-T4D. 100 BASE-T2Answer: B
10. IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair (UTP) category 5, 5e or 6 cabling known as....................A. 1000 BASE-TB. 1000 BASE-SXC. 1000 BASE-LXD. 1000 BASE-CXAnswer: D
11. Which one of the following is not a function of network layer?A. routingB. inter-networkingC. congestion control D. none of the mentionedAnswer: D
12. The 4 byte IP address consists ofA. network address
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 195
B. host addressC. both (a) and (b) D. none of the mentionedAnswer: D
13. Which one of the following routing algorithm can be used for network layer design?A. shortest path algorithmB. Multi destination routingC. distance vector routing D. all of the mentioned Answer: A
14. A routing A. contains the list of all destinations B. data is not sent by packets C. none of the mentioned D. None Answer: A
15. Which one of the following algorithm is not used for congestion control? A. traffic aware routing B. admission control C. load shedding D. none of the mentionedAnswer: B
16. ICMP is primarily used forA. error and diagnostic functionsB. addressingC. forwardingD. none of the mentionedAnswer: B
17. What is stat frame deli meter (SFD) in ether net frame?A. 10101010B. 10101011C. 00000000D. 11111111Answer: B
18. MAC address is ofA. 24 bitsB. 36 bits C. 42 bits D. 48 bitsAnswer: A
19. What is auto negotiation?A. a procedure by which two connected devices choose common transmission
parameters B. a security algorithm C. a routing algorithm D. none of the mentioned Answer: A
20. Ethernet in metropolitan area network (MAN) can be used asA. puree ther net
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 196
B. ether net over SDH C. ether net over MPLS D. all of the mentionedAnswer: D
UNIT IV1. In asymmetric key cryptography, the private key is kept by
A. sender B. receiverC. all the connected devicesD. NoneAnswer: C
2. Which one of the following algorithm is not used in asymmetric-key cryptography?A. RSA algorithm B. Diffie - hellman algorithm C. electronic code book algorithm D. none of the mentioned Answer: C
3. Which of the following field in IPv4 datagram is not related to fragmentation?A. Flags B. Offset C. TOS D. Identifier Answer: D
4. The TTL field has value 10. How many routers (max) can process this datagram?A. 11 B. 5 C. 10 D. 1 Answer: A
5. If the value in protocol field is 17, the transport layer protocol used is ____.A. TCP B. UDP C. Either of the mentioned D. None of the mentionedAnswer: A
6. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is (in milliseconds)A. 3.2B. 32 C. 19.D. None of the mentionedAnswer: A
7. What should be the flag value to indicate the last fragment?A. 0 B. 1 C. TTl value D. None of the mentionedAnswer: C
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 197
8. Which of these is not applicable for IP protocol?A. is connectionless B. offer reliable serviceC. offer unreliable service D. None of the mentioned Answer: A
9. Fragmentation has following demeritsA. complicates routers B. open to DOS attack C. over lapping of fragments. D. All of the mentioned Answer: D
10. Which field helps to check rearrangement of the fragments?A. offsetB. flagC. TTL D. identifierAnswer: C
11. DHCP is used forA. IPv4B. Ipv6 C. both (a) and (b) D. NoneAnswer: C
12. The DHCP serverA. maintains a database of available IP addresses B. maintains the information about client configuration parameters C. grants a IP address when receives a request from a client D. all of the mentioned Answer: C
13. IP assigned for a client by DHCP server isA. for a limited period B. for unlimited period C. not time dependent D. none of the mentionedAnswer: B
14. DHCP uses UDP port ____ for sending data to the server.A. 66 B. 67 C. 68 D. 69 Answer: A
15. Traffic intensity is given by, where L = number of bits in the packet a = average rate R = transmission rate A. La/R B. LR/a C. R/La D. None of the mentionedAnswer: B
16. DHCP client and servers on the same subnet communicate via
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 198
A. UDP broadcastB. UDP unicast C. TCP broadcast D. TCP unicast Answer: C
17. After obtaining the IP address, to prevent the IP conflict the client may useA. internet relay chat B. broader gateway protocol C. address resolution protocol D. none of the mentioned Answer: B
18. What is DHCP snooping?A. techniques applied to ensure the security of an existing DHCP infrastructure B. encryption of the DHCP server requests C. algorithm for DHCP D. none of the mentionedAnswer: C
19. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.A. MAC address B. IP address C. both (a) and (b) D. none of the mentioned Answer: C
20. Which one of the following is a cryptographic protocol used to secure HTTP connection?A. stream control transmission protocol (SCTP) B. transport layer security (TSL) C. explicit congestion notification (ECN) D. resource reservation protocol Answer: B
UNIT V1. SSH can be used in only
A. unix -like operating systemsB. windowsC. both (a) and (b) D. none of the mentioned Answer: A
2. FTP is built on _____ architecture A. P2P B. Both of the mentioned C. None of the mentioned ViewD. Client-server Answer: A
3. FTP uses _____ parallel TCP connections to transfer a fileA. 1 B. 2C. 3D. 4
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 199
Answer: C4. Identify the incorrect statement
A. FTP stands for File Transfer Protocol B. FTP uses two parallel TCP connections C. FTP sends its control information in-band D. FTP sends exactly one file over the data connectionAnswer: C
5. If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is A. 5B. 6C. 7D. 8Answer: D
6. FTP serverA. Mantains stateB. Is statelessC. Has single TCP connection for a file transfer D. None of the mentioned Answer: C
7. The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format A. 8 B. 7C. 3D. 5Answer: A
8. Find the FTP reply whose message is wrongly matched A. 331 – Username OK, password required B. 425 – Can’t open data connection C. 452 – Error writing file D. 452 – Can’t open data connectionAnswer: A
9. Mode of data transfer in FTP, where all the is left to TCPA. Stream mode B. Block mode C. Compressed mode D. None of the mentionedAnswer: B
10. The password is sent to the server using _____ command A. PASSWD B. PASS C. PASSWORD D. None of the mentionedAnswer: C
11. Which standard TCP port is assigned for contacting SSH servers? A. port 21 B. port 22C. port 23D. port 24
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 200
Answer: D12. Which one of the following authentication method is used by SSH?
A. public-key B. host based C. passwordD. of the mentionedAnswer: C
13. Which of the following is a form of DoSattack?A. Vulnerability attackB. Bandwidth flooding C. Connection floodingD. All of the mentioned Answer: B
14. Packet sniffers involve A. Active receiver B. Passive receiver C. Both of the mentioned D. None of the mentioned Answer: B
15. Electronic mail uses this Application layer protocol A. SMTP B. HTTP C. FTP D. SIPAnswer: C
16. This is a time-sensitive service A. File transfer B. File downloadC. E-mail D. Internet telephony Answer: B
17. The packet of information at the application layer is calledA. Packet B. Message C. Segment D. Frame Answer: B
18. This is one of the architecture paradigmsA. Peer to peer B. Client-server C. HTTP D. Both a and b Answer: C
19. Application layer offers _______ serviceA. End to end B. Process to process C. Both of the mentioned D. None of the mentioned Answer: B
20. Which field helps to check rearrangement of the fragments?
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 201
A. offsetB. flagC. TTL D. IdentifierAnswer: A
14.12 ASSIGNMENT QUESTION BANKPART – A (SHORT ANSWERQUESTIONS)
S. No Question
Blooms Taxonomy
Level
CourseOutcome
UNIT-I1 Define computer networks. Knowledge a2 Difference between point to point and broadcasting transmission Analysis b3 Define multicasting and broadcasting. Knowledge b4 Differentiate guided and unguided transmission media Analysis d
5 Write the three criteria necessary for an effective and efficient network? Synthesis c
6 What is the advantage of distributed processing? Comprehension c7 Give the factors that affect the performance of a network Comprehension b8 Define CRC (Cyclic Redundancy Check) Knowledge b9 Define Hamming distance Knowledge e10 Define PROTOCOL Knowledge e11 Define De facto and De jure standards Knowledge d12 Differentiate DLL and transport layer functions Analysis b13 Describe sliding window protocol. Knowledge a14 Discuss the use of standards? Knowledge a
UNIT II1 Distinguish Internet architecture and OSI architecture Comprehension a2 Define in detail the error detection and error corrections Knowledge e3 Define error control Knowledge e4 Distinguish FDDI and basic token ring Comprehension a5 List the merits of bridges Differentiate Knowledge e6 Define role of VCI Knowledge e7 List the the links operated on the physical media in detail Knowledge e8 Define CSMA Knowledge d9 Define some of the physical properties of Ethernet Knowledge e
UNIT III1 Define Masking Knowledge d2 Define the class field in IP address Knowledge c3 Define different kinds of Multicast Routing Knowledge e4 Distinguish between hostid and netid Comprehension e5 List the merits of sub netting Knowledge c6 Differentiate between physical and logical address Analysis e
UNIT IV1 Define tunneling Knowledge a2 Distinguish between IPV4 and IPV6 Comprehension c3 List the merits of ICMP Knowledge d4 Differentiate between ARP and RARP Analysis b5 List the merits of bridges Knowledge c6 Describe Link state routing algorithm Knowledge d7 Define quality of service Knowledge f8 Define congestion control algorithms Knowledge e
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 202
9 Define UDP Knowledge e10 Define TCP Knowledge d
UNIT – V1 Give the meaning of web browser Comprehension a2 Define three main divisions of the DNS Knowledge c3 List few characteristics of email system Knowledge d4 Define SMTP Knowledge e5 Define role does the DNS resolver play in the DNS system Knowledge a6 Give the meaning of WWW Comprehension f7 List few examples of cryptography methods Knowledge c8 Distinguish between HTTP and FTP Comprehension f9 List four properties of HTTP Knowledge f10 Define mailing list. Knowledge e
PART – B (LONG ANSWERQUESTIONS)
S. No Question Blooms Taxonomy
LevelCourse
OutcomeUNIT-I
1What is a computer network? Discuss various types of networks topologies in computer network. Also discuss various advantages and disadvantages
Comprehension b
2 List the applications of Computer Networks? Knowledge c
3 Explain the following:- a) LAN b) MAN c) WAN d) ARPANETComprehension,
Synthesis,Evaluation
a
4 Explain TCP/IP Model? Explain the functions and protocols and services of each layer? Compare it with OSI Model.
Comprehension,Synthesis,Evaluation
b
5 Explain IP addressing. How it is classified? How is subnet addressing is performed?
Comprehension,Synthesis,Evaluation
c
6 Explain the following: i. TCP ii. UDPComprehension,
Synthesis,Evaluation
f
7 Discuss star topology is commonly preferred? Knowledge c
8 State In what situations contention based MAC protocols are suitable? Knowledge a
9 Explain, Is there any relationship between transmission media and topology?
Comprehension,Synthesis, b
10 Explain vulnerable period. How it affects the performance in MAC protocols?
Comprehension,Synthesis,Evaluation
f
UNIT-II
1 Discuss how throughput is improved in slotted ALOHA over pure ALOHA? Knowledge a
2 Explain how performance is improved in CSMA/CD protocol compared to CSMA protocol?
Comprehension,Synthesis,Evaluation
b
3 Discuss the parameter ‘a’? How does it affect the performance of the CSMA protocol? Comprehension f
4 Define point to point protocol. Explain the frame format of PPP. Knowledge e5 Explain in detail CSMA Protocol in detail. Comprehension, a
6 Explain pure ALOHA and slotted ALOHA? Consider the delay of both at low load. Which one is less? Explain your answer
Comprehension,Synthesis,Evaluation
d
7 Explain in detail CSMA/CD Protocol in detail. How it detects Comprehension, f
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 203
collision. Synthesis,
8 What are bridges? Give the characteristics of them. Compare bridges with routers. Knowledge a
9 Define Spanning tree bridges and Source routing bridges. Knowledge b10 List the the limitations of bridges. Knowledge a
UNIT-III
1 Briefly explain the services provided by physical layer to network layer. Comprehension, a
2 Explain IPv6. Explain its advantages over IPv4. Also explain its frame format.
Comprehension, Synthesis, c
3 Discuss network layer design issues. Comprehension b
4 Compare FDMA, TDMA and CDMA in terms of their ability to handle groups of stations? Knowledge d
5 Discuss with connection oriented and connection-less network routing. Knowledge e
6 Discuss about hierarchichal routing. Comprehension a7 Explain basic IEEE 802.3 Ethernet MAC Data Frame. Comprehension, c
8 Briefly describe the reasons why a single organization may end up with multiple LANs and choose bridges. Comprehension d
9 Discuss the standard Ethernet cabling and cable topologies. Comprehension e10 Describe the addressing mechanism in 802.11( Wi-Fi). Comprehension f
UNIT-IV1 Describe shortest path algorithm with a suitable illustration Knowledge, b2 Describe the distance vector routing algorithm Knowledge, c
3 Describe the frame format, operation and ring maintenance feature of Comprehension, a
4 IEEE 802.5 MAC protocol. Evaluation d5 How a Token Ring LAN does operate? Discuss Knowledge e
6 Given the address 23.56.7.91 and the default class A mask, find the beginning address (network address).
Synthesis, Evaluation a
7 Describe the functions of MAC sub layer. Comprehension, b8 List out the advantages and drawbacks of ring topology. Synthesis, a9 List out the advantages and drawbacks of bus topology. Evaluation c
UNIT-V1 Write about TCP segment Header. Application, a2 Differentiate between ISO-OSI and TCP/IP reference model. Analysis c
3 Write two ways in which computer applications differ from network applications ?
Application, Synthesis c
4 List the features of SSH. Knowledge a5 Describe DNS Knowledge, b6 Explain DHCP Comprehension, c
7 Discuss the following terms with respect to ATM: VPI, UNI, synchronous, AAL, Cell , PVC. Comprehension f
8 Explain TELNET Comprehension, a9 Discuss functions of application layer Comprehension b10 Discuss electronic mail. Comprehension a
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S. No Question Blooms
Taxonomy LevelCourseOutcome
UNIT I
1 Draw a CRC encoder and decoder for CRC code with C (7, 4). Also explain how this CRC design works, with an example Knowledge f
2 If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted
ComprehensionApplication,
b
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 204
code word , received code word and error word as polynomials.
3Compare synchronous time division multiplexing with statistical time division multiplexing. Synthesis c
UNIT-II1 Explain remote bridges with a neat diagram. Comprehension a
2
A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in the units of 40 msec.i. What is the chance of success on the first attempt?ii. What is the probability of exactly k collisions and then a success? iii. What is the expected number of transmission attempts needed??
Knowledge b
UNIT- III1 Compare IPV4 and IPV6. Analysis , b2 State the problems due to congestion.. Knowledge c3 Discuss Link state routing algorithm. Comprehension d
UNIT-IV
1Illustrate simplex, half-duplex and full duplex modes. Explain with relevant examples for each. What mode is used when two people are communicating by a telephone line?
Analysis b
2 Using Differential Manchester encoding scheme, draw the time vs. amplitude graphs for the bit stream 0101101001. Understand a
UNIT-V
1 What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-
Application,Synthesis b
2 What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids. Knowledge a
3
What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.
Understand Comprehension e
4If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word? Write transmitted code word, received code word and error word as polynomials.
Comprehension f
14.13 TUTORIALS QUESTION BANKPART – A (SHORT ANSWERQUESTIONS)
S. No. QuestionBlooms
TaxonomyLevel
CourseOutcome
UNIT-I
1 Define the following standard organizations: ISO, ITU-T, IEEE, ANSI, EIA, TIA, IAB, ETF, and IRTF. Knowledge b
2 Give a technical comparison between OSI & TCP/IP reference model.
Comprehension a
3 Write the classification of Networks according to their size. Application,Synthesis a
5 Write the various design issues related to the layers in ISO-OSI model. Knowledge b
6 Write about TCP/IP Protocol suite Knowledge eUNIT – II
1 List features of pure ALOHA and slotted ALOHA? Comprehension b2 State properties of : a) Ethernet b) Wireless LAN c) Source routing Comprehension, c
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 205
bridge Synthesis,3 Give a short study on fast Ethernet cabling? Comprehension c
4Describe token. Discuss the protocol of token ring LAN in general. Discuss with example how priority is implemented in a token ring LAN?
Comprehension,Synthesis, a
5 Give the function of Connecting LAN’s. Backbone Networks, and Virtual LANs
Comprehension b
6 Give Explain the function and basic operation of the following Frame Relay
Application,Synthesis b
7 Discuss about the Logical Addressing, IPv4 Addresses Comprehension a
8 Explain about the Internet protocol, Internetworking Comprehension,Synthesis, e
9 Explain about the Forwarding and routing, delivery, forwarding, Unit cast Routing protocols, Multi cast routing protocols.
Comprehension d
10 Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6
Application,Synthesis e
11 Describe the QOS in Switched networks dUNIT – III
1 Describe Integrated Services, Differentiated services Comprehension c
2 Explain about the Internet protocol, Internetworking Comprehension,Synthesis, d
3 Explain about the Forwarding and routing, delivery, forwarding, Unicast Routing protocols,
Knowledge,Comprehension e
4 Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6
Comprehension,Synthesis, a
5 Describe the QOS in Switched networks Knowledge,Comprehension d
6 Describe Integrated Services, Differentiated services Knowledge,Comprehension e
UNIT – IV1 Explain Electronic mail, File Transfer Comprehension, d
2 Discuss the purpose of Electronic mail and file Transfer, Remote Logging
Evaluation Synthesis e
3 Write about Distributed of name space DNS in the Internet, Resolution, DNS messages
Application, Synthesis f
4 List function of a Telnet Knowledge Synthesis f
UNIT-V
1 Discuss transport service primitives Comprehension,Evaluation a
2 Describe the concepts of TCP, UDP, SCTP, Congestion control and Quality of service
Comprehension,Evaluation b
3 Compare NSAP & TSAP Analysis, d
4 Explain protocol scenarios for releasing a connection Comprehension, e5 Give functionality that is supported by user agen Comprehension f
PART – B (LONG ANSWERQUESTIONS)
S. No Question
Blooms Taxonomy
Level
CourseOutcome
UNIT-I
1 Define computer networks? Discuss various types of networks topologiesin computer network. Also discuss various advantages and Comprehension a
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 206
disadvantages2 List the applications of Computer Networks? Knowledge a
3 Explain the following:- a) LAN b) MAN c) WAN d) ARPANETComprehension,Synthesis,Evaluation
b
4 Explain TCP/IP Model? Explain the functions and protocols and services of each layer? Compare it with OSI Model.
Comprehension,Synthesis,Evaluation
b
5 Explain IP addressing. How it is classified? How is subnet addressing is performed?
Comprehension,Synthesis,Evaluation
d
6 Explain the following: i. TCP ii. UDPComprehension,Synthesis,Evaluation
f
7 Discuss star topology is commonly preferred? Knowledge a8 State In what situations contention based MAC protocols are suitable? Knowledge b
9 Explain; Is there any relationship between transmission media and topology?
Comprehension,Synthesis, a
10 Explain vulnerable period. How it affects the performance in MAC protocols?
Comprehension,Synthesis,Evaluation
b
UNIT-II
1 Discuss how throughput is improved in slotted ALOHA over pureALOHA? Knowledge c
2 Explain how performance is improved in CSMA/CD protocol compared to CSMA protocol?
Comprehension,Synthesis,Evaluation
c
3 Discuss the parameter ‘a’? How does it affect the performance of theCSMA protocol? Comprehension d
4 Define point to point protocol. Explain the frame format of PPP. Knowledge d5 Explain in detail CSMA Protocol in detail. Comprehension, d
6 Explain pure ALOHA and slotted ALOHA? Consider the delay of both at low load. Which one is less? Explain your answer
Comprehension,Synthesis,Evaluation
f
7 Explain in detail CSMA/CD Protocol in detail. How it detects collision. Comprehension,Synthesis, f
8 What are bridges? Give the characteristics of them. Compare bridges with routers. Knowledge b
9 Define Spanning tree bridges and Source routing bridges. Knowledge c10 List the the limitations of bridges. Knowledge b
UNIT-III
1 Briefly explain the services provided by physical layer to network layer. Comprehension, d
2 Explain IPv6. Explain its advantages over IPv4. Also explain its frame format.
Comprehension, Synthesis, c
3 Discuss network layer design issues. Comprehension e
4 Compare FDMA, TDMA and CDMA in terms of their ability to handle groups of stations? Knowledge b
5 Discuss with connection oriented and connection-less network routing. Knowledge c
6 Discuss about hierarchichal routing. Comprehension c7 Explain basic IEEE 802.3 Ethernet MAC Data Frame. Comprehension, b
8 Briefly describe the reasons why a single organization may end up with multiple LANs and choose bridges Comprehension b
9 Discuss the standard Ethernet cabling and cable topologies. Comprehension b10 Describe the addressing mechanism in 802.11( Wi-Fi). Comprehension c
UNIT-IV1 Describe shortest path algorithm with a suitable illustration Knowledge, d
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 207
2 Describe the distance vector routing algorithm Knowledge, d3 Describe the frame format, operation and ring maintenance feature of Comprehension, b4 IEEE 802.5 MAC protocol. Evaluation c5 How a Token Ring LAN does operate? Discuss Knowledge c
6 Given the address 23.56.7.91 and the default class A mask, find the beginning address (network address).
Synthesis, Evaluation e
7 Describe the functions of MAC sub layer. Comprehension, c8 List out the advantages and drawbacks of ring topology. Synthesis, c9 List out the advantages and drawbacks of bus topology. Evaluation d
UNIT-V1 Write about TCP segment Header. Application, e2 Differentiate between ISO-OSI and TCP/IP reference model. Analysis f
3 Write two ways in which computer applications differ from network applications ? Synthesis b
4 List the features of SSH. Knowledge d5 Describe DNS Knowledge, e6 Explain DHCP Comprehension, f
7 Discuss the following terms with respect to ATM: VPI, UNI, synchronous, AAL, Cell , PVC. Comprehension e
8 Explain TELNET Comprehension, f9 Discuss functions of application layer Comprehension f10 Discuss electronic mail. Comprehension e
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
S. No Question
Blooms Taxonomy
Level
CourseOutcome
UNIT-I
1 Draw a CRC encoder and decoder for CRC code with C (7, 4). Also explain how this CRC design works, with an example. Knowledge b
2If the transmitted code word is 10011000 and the received code word is11001001. What is the error word? Write transmitted code word, received code word and error word as polynomials.
Comprehension c
3 Compare synchronous time division multiplexing with statistical time division multiplexing.
Application,Synthesis d
UNIT-II1 Explain remote bridges with a neat diagram. Comprehension b
2
A large population of ALOHA users manages to generate 50 requests /sec , including both originals and retransmissions. Time is slotted in the units of40 msec.i. What is the chance of success on the first attempt?ii. What is the probability of exactly k collisions and then a success?iii. What is the expected number of transmission attempts needed??
Knowledge c
UNIT-III
1 Compare IPV4 and IPV6. Analysis , Evaluation e
2 State the problems due to congestion.. Knowledge d3 Discuss Link state routing algorithm. Comprehension d
UNIT-IV1 Discuss distance vector algorithm. Comprehension e
2Illustrate simplex, half-duplex and full duplex modes. Explain with relevant examples for each. What mode is used when two people are communicating by a telephone line?
Analysis b
3 Using Differential Manchester encoding scheme, draw the time vs.amplitude graphs for the bit stream 0101101001. Understand c
UNIT-V
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 208
1 What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.
Application,Synthesis f
2 What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids. Knowledge f
3
What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.
Understand c
4If the transmitted code word is 10011000 and the received code word is11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.
Comprehension c
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 209
15. LINUX PROGRAMMING LAB (A10527)
15.1 SYLLABUS
Course Overview: In this course basics of shell programming are dealt. Shell programs to understand the operating environment of Linux are practiced. An exposure to system calls types of process and inter process communication issues are dealt with practical exercises.
Course Objectives: I. To familiarize basic concepts of shell programming
II. To demonstrate use of system calls III. To demonstrate Inter process communication
Course Outcomes: At the end of the course students will be able to: a. Use shell script to create files and handle text documents b. Create child processes, background process and zombies
List of Programs:1. Study and Practice on various commands like man, passwd, tty, script, clear, date, cal, cp,
mv, ln, rm, unlink, mkdir, rmdir, du, df, mount, umount, find, unmask, ulimit, ps, who, w. 2. Study and Practice on various commands like cat, tail, head , sort, nl, uniq, grep,
egrep,fgrep, cut, paste, join, tee, pg, comm, cmp, diff, tr, awk, tar, cpio. 3. a)Write a Shell Program to print all .txt files and .c files.
b)Write a Shell program to move a set of files to a specified directory. c)Write a Shell program to display all the users who are currently logged in after a specified time. d) Write a Shell Program to wish the user based on the login time.
4. a) Simulate cat command. b) Simulate cp command. 5. a) Simulate head command. b) Simulate tail command. 6. a) Simulate mv command. b) Simulate nl command. 7. Write a program to handle the signals like SIGINT, SIGQUIT, SIGFPE. 8. Implement the following IPC forms
a. FIFO b. PIPE
9. Implement message queue form of IPC. 10. Implement shared memory form of IPC. 11. Write a Socket program to print system date and time (Using TCP/IP).
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 210
15.2 LAB SESSION PLANNER
S. NO WEEK NO EXPERIMENT NAME DATE OF PLANNED
DATE OF CONDUCTED
1 WEEK 1
Study and Practice on various commands like man, passwd, tty, script, clear, date, cal, cp, mv, ln, rm, unlink, mkdir, rmdir, du, df, mount, umount, find, unmask, ulimit, ps, who, w.
2 WEEK 2Study and Practice on various commands like cat, tail, head , sort, nl, uniq, grep, egrep,fgrep, cut, paste, join, tee, pg, comm, cmp, diff, tr, awk, tar, cpio.
3 WEEK 3
a. Write a Shell Program to print all .txt files and .c files.
b. Write a Shell program to move a set of files to a specified directory.
c. Write a Shell program to display all the users who are currently logged in after a specified time.
d. Write a Shell Program to wish the user based on the login time.
4 WEEK 4 a) Simulate cat command. b) Simulate cp command
5 WEEK 5 a) Simulate head command. b) Simulate tail command.
6 WEEK 6 a) Simulate mv command. b) Simulate nl command.
7 WEEK 7 Write a program to handle the signals like SIGINT, SIGQUIT, SIGFPE
8 WEEK 8 Implement the following IPC formsa) FIFO b) PIPE
9 WEEK 9 Implement message queue form of IPC.10 WEEK 10 Implement shared memory form of IPC.
11 WEEK 11 Write a Socket program to print system date and time (Using TCP/IP).
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 211
16.0 WEB TECHNOLOGIES LAB (A10526)
16.1 SYLLABUS
Course Overview: This course provides a practical exposure to web application development. As part of this User interface development and validations are carried out using Java Script or PHP. Server side programming is carried out using Servlet and JSP technology. Applications are deployed using apache tomcat web server.
Course Objectives: I. To impart and give hands on exposure to PHP
II. To demonstrate web application development procedures III. To impart Servlet technology for writing business logic IV. To facilitate students to connect to databases using JDBC V. To familiarize various concepts of application development using JSP
Course Outcomes: Upon completion of this course, students will be able to: a. Create web pages using PHP b. Identify the difference between the HTML PHP and XML documents. c. Analyze the difference between and PHP and XML. d. Understand the concept of JAVA SCRIPTS. e. Identify the difference between the JSP and Servlet. f. Design web application using MVC architecture
List of Programs:1. Install the following on the local machine Apache Web Server (if not installed) Tomcat
Application Server locally Install MySQL (if not installed) Install PHP and configure it to work with Apache web server and MySQL (if not already configured)
2. Write a program using PHPa. To find factorial of a given number (read input from form)b. To find Fibonacci seriesc. To find roots of quadratic equations
3. Write an HTML page including any required PHP that takes a number from one text field in the range of 0 to 999 and shows it in range of 0 to 999 and shows it in another text field in words. If the number is out of range, it should show ―out of range‖ and if it is not a number, it should show ―not a number‖ message in the result box.
4. Write an HTML page that has one input, which can take multi-line text and a submit button. Once the user clicks the submit button, it should show the number of characters, words and lines in the text entered using an alert message. Words are separated with while space and lines are separated with new line character.s
5. Write an HTML page using Java Script that contains a selection box with a list of 5 countries. When the user selects a country, its capital should be printed next to the list.
6. A simple calculator web application that takes two numbers and an operator (+, -, /, * and %) from an HTML page and returns the result page with the operation performed on the operands.
7. a. Write a java program to read XML file and store the data in java objectsb. Demonstrate XML validation using DOM and SAX parser8. Write a simple servlet to print welcome message in the browser9. Write a servlet to read form data and display in the browser
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 212
10. Write a servlet to read employee data from form and insert the same into database11. Write a servlet to read employee number from the user and retrieve employee data from
Database 12. Using JSP read data from form and insert into database13. Using JSP retrieve data from database and print in the browser14. Write a Servlet/JSP to demonstrate data read from multiple forms with the help of
session Object
TEXT BOOKS: 1. Web Technologies, Uttam K Roy, Oxford University Press 2. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill
REFERENCE BOOKS: 1. Web Programming, building internet applications, Chris Bates 2nd edition, Wiley
Dremtech 2. Java Server Pages – Hans Bergsten, SPD O‘Reilly 3. Java Script, D. Flanagan, O‘Reilly, SPD. 4. Beginning Web Programming-Jon Duckett WROX. 5. Programming World Wide Web, R.W. Sebesta. Fourth Edition, Pearson. 6. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson.
16.2 LAB EXPERIMENT SCHEDULE
S NO WEEK NO EXPERIMENT NAME DATE OF PLANNED
DATE OF CONDUCTED
1 1
Install the following on the local machine Apache Web Server (if not installed) Tomcat Application Server locally Install MySQL (if not installed) Install PHP and configure it to work with Apache web server and MySQL (if not already configured)
2 2
Write a program using PHPa. To find factorial of a given number
(read input from form)b. To find Fibonacci seriesc. To find roots of quadratic equations
3 3
Write an HTML page including any required PHP that takes a number from one text field in the range of 0 to 999 and shows it in range of 0 to 999 and shows it in another text field in words. If the number is out of range, it should show ―out of range‖ and if it is not a number, it should show ―not a number‖ message in the result box.
4 4
Write an HTML page that has one input, which can take multi-line text and a submit button. Once the user clicks the submit button, it should show the number of characters, words and lines in the text entered using an alert message. Words are separated with while space and lines are separated with new line
Department of CSE
MLR Institute of Technology, Dundigal, Hyd-500043 Page 213
character.
5 5
Write an HTML page using Java Script that contains a selection box with a list of 5 countries. When the user selects a country, its capital should be printed next to the list.
6 6
A simple calculator web application that takes two numbers and an operator (+, -, /, * and %) from an HTML page and returns the result page with the operation performed on the operands.
7 7
a. Write a java program to read XML file and store the data in java objects b. Demonstrate XML validation using DOM and SAX parser
8 8
Write a simple servlet to print welcome message in the browser 9. Write a servlet to read form data and display in the browser 10. Write a servlet to read employee data from form and insert the same into database
9 9Write a servlet to read form data and display in the browser
10 10Write a servlet to read employee data from form and insert the same into database
11 11Write a servlet to read employee number from the user and retrieve employee data from Database
12 12 Using JSP read data from form and insert into database
13 13 Using JSP retrieve data from database and print in the browser
14 14Write a Servlet/JSP to demonstrate data read from multiple forms with the help of session Object