35
C viva questions 1. Who developed C language? 2. How do you make comments in C program? 3. How the name C is derived? 4. What is K & R C? 5. What is preprocessor statement? 6. Differentiate between constant and variable. 7. What is data type? 8. Name the basic data types of C. 9. Differentiate between string constant and character constant. 10. What is the range of integer, char, float for a 16-bit computer? 11. What is a statement? 12. What is a keyword? 13. Differentiate between keywords and identifiers. 14. What is the need for an escape sequences? 15. What is a symbolic constant? 16. How do you classify C operators? 17. What is the use of modulus operator? 18. What is meant by mixed mode operation? 19. What are bitwise operators? 20. What is unary operator? 21. What is binary operator? 22. What is typecasting? 23. What is a conditional / ternary operator? 24. What is need for type conversion? 25. Differentiate between && and &. 26. Differentiate between pre-increment/decrement & post-increment/decrement. 27. Differentiate between Unformatted and formatted i/o statements. 28. How do you classify the control statements? 29. Differentiate between while and do-while loop. 30. Differentiate between break and continue. 31. When do you prefer for loop statement? 32. What is looping? 33. What is an array? 34. Give the classification of arrays?

CSE Course Viva Questions

Embed Size (px)

DESCRIPTION

helpful for preparing viva voce...

Citation preview

Page 1: CSE Course Viva Questions

C viva questions1. Who developed C language?2. How do you make comments in C program?3. How the name C is derived?4. What is K & R C?5. What is preprocessor statement?6. Differentiate between constant and variable.7. What is data type?8. Name the basic data types of C.9. Differentiate between string constant and character constant.10.What is the range of integer, char, float for a 16-bit computer?11.What is a statement?12.What is a keyword?13.Differentiate between keywords and identifiers.14.What is the need for an escape sequences?15.What is a symbolic constant?16.How do you classify C operators?17.What is the use of modulus operator?18.What is meant by mixed mode operation?19.What are bitwise operators?20.What is unary operator?21.What is binary operator?22.What is typecasting?23.What is a conditional / ternary operator?24.What is need for type conversion?25.Differentiate between && and &.26.Differentiate between pre-increment/decrement &

post-increment/decrement.27.Differentiate between Unformatted and formatted i/o statements.28.How do you classify the control statements?29.Differentiate between while and do-while loop.30.Differentiate between break and continue.31.When do you prefer for loop statement?32.What is looping?33.What is an array?34.Give the classification of arrays?35.Differentiate between an array and an ordinary variable.36.Array variable is also called as ______.37.What are character arrays?38.When do you use two-dimensional character array?39.Name the different string handling functions?40.What is meant by modularization?41.Differentiate between standard functions & user-defined functions?42.Differentiate between arguments and parameters.43.Differentiate between local and global variables.44.Name the different methods of parameter passing?

Page 2: CSE Course Viva Questions

45.How does the function definition differ from function declaration?46.What is recursive function?47.What is meant by scope of a variable?48.What is a structure?49.Differentiate between array and structure.50.What are embedded structures?51.How do you access the member of a structure?52.What is union?53.Differentiate between union and structure.54.What is a pointer?55.Differentiate between address operator and dereferencing operator.56.How do you declare a pointer variable

CAO

1. Explain the difference between write through and write back cache2. For a single computer processor computer system, what is the purpose of a processor

cache ?

3. Explain the operation considering a two processor computer system with a cache for

each processor. 4. what's the trade-off of choosing a bigger or smaller cache 5. Explain the concept of locality of reference6. Explain memory interleaving?7. What is bit slice?8. Difference between computer architecture and computer organization?

9. What is the function of Virtual Memory?10. What is the difference between memory mapped i/o and i/o mapped i/o?11. What is a Branch Target buffer?

12. Advantage of using Booth algorithm13. What is bit ORing technique14. What is the use of MFC15. Differentiate between Memory access time and Memory cycle time16. What is the amount of time takes to transfer a word of data to or from the

memory. 17. Which type memory is used in cell phones, hand held computers, digital camera

etc.18. What is the concept behind emulation19. Explain the use of replacement algorithm in cache20. Difference between interrupt and DMA21. Difference between virtual address and physical address22. What is the advantage of using TLB

C++

Page 3: CSE Course Viva Questions

1. What will be the output of the following programvoid main(){float a= 0.7;if (a < 0.7)printf("c");elseprintf("c++");}

2. Can static variables be declared in a header file ?3. Can a variable be both constant and volatile ?4. Can include files be nested?5. What is the output of printf("%d") ?6. Find out the equivalent pointer expression for referring the same element a[i]

[j][k][l] ?7. What is the difference between const char* p and char const* p8. Find the equivalent expression for x%8 without using the modulo operator.9. Determine the output of the following program

main(){if (!(1&&0)){printf("OK I am done.");}else{printf("OK I am gone.");}}

10. Write a C program to print the following series11 21 2 31 2 3 41 2 3 4 5

11. Nesting of loops in C may continue upto how many levels?12. What will be the output of

void main(){int a = (1,2,3);printf("%d",a);}

Justify your answer.13. Write a program to separate digits in a two-digit number entered through

keyboard, using bitwise operators only.

Page 4: CSE Course Viva Questions

14. Write a program to extract a substring from a given string

VIVA QUESTIONS FOR AUTOMATA LANGUAGES AND COMPUTATION

1. Why a finite automaton is called finite?2. What does the symbol ;in the formal definition of finite automata ;denotes?3. The language accepted by a finite automaton is known as a _________ language.4. Differentiate between regular expressions, regular languages and regular grammars?5. Define Kleene closure and positive closure of a set.6. Explain the difference between context sensitive grammars and context free

grammars.7. What is a sentential form?8. When is a contecxt free language called inherently ambigous?9. When do we say that a context free language is in chomsky normal form?10. What are the useless symbols of a grammar?11. Define unit productions12. What are -productions?13. What does the symbol Г denotes in the definition of Pushdown Automata?14. Differentiate between multi-tape Turing Machine and multi-track Turing Machine.15. What is Chomsky Hierarchy?16. Which is the machine that accepts context sensitive languages?17. What are recursively enumerable languages?18. Mention some applications for automata languages and computation.

VIVA ANSWERS FOR AUTOMATA LANGUAGES AND COMPUTATION

1. Since the number of states in an automaton are finite.2. An alphabet called the input alphabet.3. Regular4. Regular Languages – languages that are accepted by finite automata. Regular

expressions – short hand notation for denoting regular languages. Regular grammars are restricted forms of context free grammars (left linear and right linear) which generates the regular languages

5. The application of the Kleene star to a set V is written as V*.a. If V is a set of strings then V* is defined as the smallest superset of V that

contains ε (the empty string) and is closed under the string concatenation operation. This set can also be described as the set of strings that can be made by concatenating zero or more strings from V.

b. If V is a set of symbols or characters then V* is the set of all strings over symbols in V, including the empty string.

If remove {} from V*, the resulting set denoted by V+ is called the positive closure.

6. A context-free grammar is a grammar in which the left-hand side of each production rule consists of only a single nonterminal symbol. This restriction is non-trivial; not all languages can be generated by context-free grammars. Those that can are called

Page 5: CSE Course Viva Questions

context-free languages. A context sensitive grammar has productions of the form →, where both of them are in (VT)*, In this a production will happen only in a particular context.

7. A sentential form is the start symbol S of a grammar or any string in (V union T)* that can be derived from S. Consider the linear grammar ({S, B}, {a, b}, S, {S goes to aS, Sgoes toB, Bgoes tobB, Bgoes toempty string}).A derivation using this grammar might look like this: S directly derives aS directly derives aB directly derives abB directly derives abbB directly derives abb Each of {S, aS, aB, abB, abbB, abb} is a sentential form.

8. If all the grammars generating a Context free language are ambigous then the language is said to be inherently ambigous.

9. If all the productions in that grammar are either in the form A→BC or A→a and there are no other types of production, we can say that the given context free grammar is in Chomsky normal form.

10. A symbol XV is useless if a. there is no derivation from X to any string in the language (non-

terminating) b. there is no derivation from S that reaches a sentential form containing X

(non-reachable)11. Productions of the form A → B. All other productions including A→a are non-unit12. Productions of the form A→13. Stack alphabet14. Multi-tape machine has multiple tapes and separate heads for each tape, multi-track

machine has only a single tape divided in to multiple tracks and a single head to read all the tracks.

Page 6: CSE Course Viva Questions

15.

16. Linear bounded automaton17. A language is recursively enumerable if some Turing machine accepts it.

Computer graphics

1. Define Computer graphics.2. What is meant by scan code?3. What is meant by refreshing of the screen?4. Define Random scan/Raster scan displays?5. What do you mean by emissive and non-emissive displays?6. What is persistence?7. What is resolution?8. What is Aspect ratio?9. What is the difference between impact and non-impact printers?10. Define pixel?11. What is frame buffer?

Page 7: CSE Course Viva Questions

12. What is bitmap and pixmap? 13. What is a Vector display or stroke writing or calligraphic display?

14. What do you mean by scan conversion?15. What is run length encoding?16. What do you mean by ‘jaggies’?17. What is seed fill?18. What is scan line algorithm?19. What is a winding number?20. What is Color Look up table?21. Define bundled attributes?22. What is aliasing?23. What is antialiasing?24. What is pixel phasing?25. Distinguish between window port & view port?26. What is covering (exterior clipping)?27. Distinguish between uniform scaling and differential scaling?28. Distinguish between bitBlt and pixBlt?29. List out the various Text clipping?30. What is a spline?

DBMS

1.What is the difference between DBMS and RDBMS?

2.What is referential integrity and how is it achieved?

3. What is Weak Entity set?

4.What is a view? How it is related to data independence?

5. How does Tuple-oriented relational calculus differ from domain-oriented relational calculus

6. What is normalization?

7. What is Functional Dependency?

8.What is Multivalued dependency?

9. What is Lossless join property?

10.What is Fully Functional dependency?

11.State 1NF,2NF and 3NF?

12.Examine the need for three schema architecture.

Page 8: CSE Course Viva Questions

13.What are data models?

14. What is Data Independence?

15.What are the different types of join ?

16.Define data integrity.Explain various integrity constraints

17.Differentiate between DELETE and TRUNCATE command.

18.What is the basic difference between clustered and non clustered index

19. Differentiate between relation and relationship.

20.Why should relations be normalized?

21.What is the difference between conceptual model and logical model of a database.

22.What are the ideal features of a database system.

23. Differentiate between primary key, candidate key & super key.

24. What is the difference between the strong entity set and weak entity set ?

25. What do you mean by mapping cardinalities ? Explain various type of cardinalities.

26. What is difference between total and partial participation ?

27. Differentiate between Two phase locking and Rigorous two-phase locking.

28. What is Hashing ?

29.What is data dictionary?What are the information stored in the data dictionary?

30.What are Armstrong’s axioms?

31.What are aggregate functions.?

32.Explain the ACID properties of transaction.

33.Define view serializability and conflict serializability.

Page 9: CSE Course Viva Questions

34.Distinguish between shared and exclusive locks.

35.What is role of checkpointing?

OS

1. What are the key object oriented concepts used by Windows NT? 2. What is multi tasking, multi programming, multi threading?3. How are devices represented in UNIX?4. What are the sub-components of I/O manager in Windows NT? 5. What is a binary semaphore? What is its use?6. Define latency, transfer and seek time with respect to disk I/O.7. How are the wait/signal operations for monitor different from

those for semaphores?8. What are the four layers that Windows NT have in order to

achieve independence? 9. What is the kernel?10.What are privileged instructions?

11. What do you mean by system calls?12. What are overlays?13. Define spooling.14. List the difference between monitor and semaphore.15. What is a deadlock?16. List the 4 necessary conditions for deadlock occurrence.17. What is inode?18. Explain the functionality of long term, short term and medium

term scheduler.19. Differentiate between turn around time and waiting time.20. Define thrashing.21. What are buddy systems?22. Differentiate between internal and external fragmentation.

23. Which are the different ways of achieving intercrosses communication?

24. Define race condition.25. What do you mean by Belady's Anomaly. 26. What is an advantage of a large scheduling quantum?

What is a disadvantage?27. What is the difference between a ‘thread’ and a ‘process’28. What is the difference between a process and a program?29. Explain the use of pipes in process communication.30. Explain the use of paging.

Page 10: CSE Course Viva Questions

ADA1. Illustrate backtracking with an example.2. Discuss the various criteria for analyzing an algorithm.3. Discuss the 4 design techniques used in algorithms.4. What are the mathematical notations used in the analysis of algorithms.5. List the properties of Red Black Trees.6. Define amortized time analysis.7. Discuss the features of quick sort.8. What is divide and conquer design technique.9. State Master theorem.10. Define decision tree model.11. Describe the working of quick sort algorithm.12. Explain Depth first traversal in a graph. Which data structure is used in DFS?13. Define i) Articulation point. ii) Bi connected component14. Compare BFS and DFS15. Explain strongly connected components of a graph.16. Explain the physical significance of bi-connected components in a graph.17. Explain the significance of approximation algorithm18. Explain bin packing problem 19. Explain graph coloring problem.20. Explain Depth first traversal in a graph. Which data structure is used in DFS?

Mobile Computing1. Discuss the real life areas in which mobile communications can be applied

(road traffic, emergencies,

2. Give a short review of the evolution of cellular networks. Identify the different systems in each generation.

3. Identify a mobile device that is commonly used in attendance monitoring in corporate offices? Explain its working.

4. Differentiate mobile communication and mobile computing

5. In your view, what are the top 3 strengths and weaknesses of wireless systems? Discuss ways to address the weaknesses?

6. Discuss the key mobile applications that support m-business, m-government, and mobile life? How? (SMS, MMS)

Page 11: CSE Course Viva Questions

7. Suppose you want to watch a movie in TV using VCR. How can this be achieved in a wireless environment? (UWB-media server- media player, High security, high data rate, in sort distances)

8. Suppose you want to organize a conference in a hall where there are no wired systems available. What kind of system will you prefer and why? (WSN/MANET-on spot configuration)

9. Compare 1G and 2G networks (Analog/Digital, Only voice/voice and data…)

10. Suppose that a Web service called “ePurchase” is available in Singapore. A consumer in Detroit wants to invoke this service by submitting a purchase order (PO) by using a cellular phone. Illustrate the steps involved? (Mobile web services-Locate-UDDI, Learn-WSDL, Invoke, Transfer-SOAP, End)

11. Consider the case of accessing e mail using your mobile phone. The rendering of contents will be different from a normal yahoo mail page in PC. How this is done? (WAP)

12. Suppose you want to use a mobile device for internet browsing. What are the limitations that you experience? (memory, power, small display, connection issues)

13. Give 4 examples of mobile operating systems. (Symbian OS, Palm OS, Windows CE, Linux for mobile)

14. While browsing through the personal banking pages of your bank, you can see a lock symbol at the bottom of browser. What does this imply? Explain? (SSL Security)

15. Which are the internet security protocols used in mobile computing? (VPN and IPSec)

MICROPROCESSOR

1. Which type of architecture 8085 has?

2. How many memory locations can be addressed by a microprocessor with 14 address lines?

3. 8085 is how many bit microprocessor?

4. Why is data bus bi-directional?

Page 12: CSE Course Viva Questions

5. What is the function of accumulator?

6. What is flag, bus?

7. What are tri-state devices and why they are essential in a bus oriented system?

8. Why are program counter and stack pointer 16-bit registers?

9. What does it mean by embedded system?

10. What are the different addressing modes in 8085?

11. What is the difference between MOV and MVI?

12. What are the functions of RIM, SIM, IN?

13. What is the immediate addressing mode?

14. What are the different flags in 8085?

15. What happens during DMA transfer?

16. What do you mean by wait state? What is its need?

17. What is PSW?

18. What is ALE? Explain the functions of ALE in 8085.

19. What is a program counter? What is its use?

20. What is an interrupt?

21. Which line will be activated when an output device require attention from CPU?22. Differentiate between a microprocessor and microcontroller.

Object Oriented Programming1. Distinguish between procedure oriented programming and object oriented

programming

2. Give a real world example to illustrate the concept of abstraction and encapsulation

3. Differentiate classes and objects

Page 13: CSE Course Viva Questions

4. Give a mechanism that enhances the reusability of classes in OOP (inheritance)

5. Difference between structure and union

6. Explain the functionality of scope resolution operator

7. Does OOP have any option the initialize the values of the data members of a class? How that option can be explicitly provided? (constructors)

8. Differentiate formal arguments and actual arguments

9. Explain function overloading

10. Usually data members can be accesses by its member functions. But consider a scenario where two classes have to share a single function. What concept on OOP can be applied? Explain. (friend functions)

11. How can a private member can be made inheritable (protected)

12. How exception handling is done in OOP (try, catch, throw)

13. Distinguish error and exception

SOFTWARE ENGINEERING

1 What u mean by CASE?

Ans: CASE( Computer Aided Software Engineering) is a software system which

are intended to provide automated support for software process and activities. CASE

systems are often used for method support.

2 What are the attributes of good software?

Ans: software should deliver the required functionality & performance to the user

and should be maintainable, dependable and usable.

3 Name some key challenges facing in software engineering?

Ans: coping with increasing diversity, demands for reduced delivery times and

developing trustworthy software.

Page 14: CSE Course Viva Questions

4 Which model is used to represent the action of human in software engineering?

Ans: workflow model.

5 Name the principal techniques used for Requirements validation?

Ans: Requirements reviews and prototyping.

6 Name the iterative processes of risk management?

Ans: Risk identification, Risk analysis and classification, Risk Decomposition and

Risk reduction assessment.

7 In systems what is the benefits of using immunity requirements?

Ans: It specifies how a system should, protect itself against viruses, worms and

similar threats

8 Commonly where path testing techniques are used?

Ans: During component testing.

9 What are the main benefits of predicting system reliability from a reliability

growth model?

Ans: Planning of testing and customer negotiations

10 Why data flow model is known as Activity model?

Ans: It represents the activity of the users or modules.

11 What are the benefits of using leveled DFDs?

Ans: It shows the lower process in detail.

12 How data streams are represented in Finite- State mechanisms?

Ans: By using regular expressions.

13 How a domain error can occur?

Page 15: CSE Course Viva Questions

Ans: When a program traverse the wrong path because of an incorrect predicate in

a branching statement.

14 Based on what theory predictive models are formed?

Ans: Statistical theory.

15 Where Acceptance testing is typically performed?

Ans: Performed in quality assurance and or customer organizations.

16 Give disadvantages of bottom up testing.

Ans: The necessity to write and debug test harnesses for the modules and sub

systems into larger and larger units.

17 Name two characteristics of software risks.

Ans: Uncertainty and lose

18 In an area where, requirements are difficult to establish in clear terms and

software system design and development become very costly operations, which

model will use for development engineering?

Ans: Evolutionary (Iterative) model.

19 When the users, customers or stakeholders are not sure about their requirement

then which software process model will use?

Ans: Prototyping model.

20 In system environment where there is a clarity and unanimity on the requirements

and specifications which software process model is efficient?

And: Linear sequential Model.

Page 16: CSE Course Viva Questions

21 Suppose, a user needs a system which is large, complex and full fledged in nature

and having a lot of features and facilities from scratch. Then which software

process model you will prefer?

Ans: Spiral model.

22 Result of a testing methods are as follows, 1) Error in data model. 2) Error in

access to external data source. 3) Missing functions. Which testing will gives

these results?

Ans: Black Box Testing.

23 A test case developed based on pull down menus, data entry and object

operations. For which testing these test cases can use?

Ans: GUI testing.

24 In object oriented analysis, when the user has a number of ideas, alternatives,

solutions and not so sure about confirming one of them, then which technique can

use?

Ans: Brainstorming.

DATA STRUCTURES AND ALGORITHMS

In an AVL tree, at what condition the balancing is to be done?

Answer: If the 'pivotal value' (or the 'Height factor') is greater than 1 or less than -1.

1. What is the bucket size, when the overlapping and collision occur at same time?

Answer: One. If there is only one entry possible in the bucket, when the collision occurs, there is no way to accommodate the colliding value. This results in the overlapping of values.

2. Convert the expression ((A + B) * C - (D - E) ^ (F + G)) to equivalent Prefix and Postfix notations.

Answer: Prefix Notation: ^ - * +ABC - DE + FG

Page 17: CSE Course Viva Questions

Postfix Notation: AB + C * DE - - FG + ^

3. How many null branches are there in a binary tree with 20 nodes?

Answer: 21

4. What are the methods available in storing sequential files?

Answer: The methods available in storing sequential files are:

a. Straight merging, b. Natural merging, c. Polyphase sort, d. Distribution of Initial runs.

5. How many different trees are possible with 10 nodes ? (2n-n)

Answer: 1014

6. List out few of the Application of tree data-structure?

Answer: The list is as follows:

a. The manipulation of Arithmetic expression, b. Symbol Table construction, c. Syntax analysis.

7. List out few of the applications that make use of Multilinked Structures?

Answer: The applications are listed below:

a. Sparse matrix, b. Index generation.

8. In tree construction which is the suitable efficient data structure?

Answer: Linked list is the efficient data structure.

9. List out the areas in which data structures are applied extensively?

Answer: The name of areas are:

a. Compiler Design, b. Operating System, c. Database Management System, d. Statistical analysis package, e. Numerical Analysis, f. Graphics, g. Artificial Intelligence, h. Simulation

10. What are the major data structures used in the following areas : RDBMS, Network data model & Hierarchical data model.

Answer: The major data structures used are as follows:

a. RDBMS - Array (i.e. Array of structures) b. Network data model - Graph c. Hierarchical data model - Trees

11. If you are using C language to implement the heterogeneous linked list, what pointer type will you use?

Page 18: CSE Course Viva Questions

Answer: The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.

12. Minimum number of queues needed to implement the priority queue?

Answer: Two. One queue is used for actual storing of data and another for storing priorities.

13. What is the data structures used to perform recursion?

Answer: Stack. Because of its LIFO (Last In First Out) property it remembers its 'caller' so knows whom to return when the function has to return. Recursion makes use of system stack for storing the return addresses of the function calls.

Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used.

14. What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix forms?

Answer: Polish and Reverse Polish notations.

15. What is the data structures stack used to perform recursion?

Answer: Stack. Because of its LIFO (Last In First Out) property it remembers its 'caller' so knows whom to return when the function has to return. Recursion makes use of system stack for storing the return addresses of the function calls.

Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used.

16. Classify the Hashing Functions based on the various methods by which the key value is found.

Answer: The list of Hashing functions is as follows:

a. Direct method b. Subtraction method c. Modulo-Division method d. Digit-Extraction method e. Mid-Square method f. Folding method g. Pseudo-random method

17. What are the types of Collision Resolution Techniques and the methods used in each of the type?

Answer: The types of Collision Resolution Techniques are:

a. Open addressing (closed hashing)The methods used include:

i. Overflow block b. Closed addressing (open hashing)

The methods used include:i. Linked list ii. Binary tree

18. In RDBMS, what is the efficient data structure used in the internal storage representation?

Page 19: CSE Course Viva Questions

Answer: B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes.

19. What is a spanning Tree?

Answer: A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized.

20. Does the minimum spanning tree of a graph give the shortest distance between any 2 specified nodes?

Answer: No. Minimal spanning tree assures that the total weight of the tree is kept at its minimum. But it doesn't mean that the distance between any two nodes involved in the minimum-spanning tree is minimum.

21. Whether Linked List is linear or Non-linear data structure?

Answer: According to Access strategies Linked list is a linear one.According to Storage Linked List is a Non-linear one.

Viva Questions - Computer Networks

1. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?

2. What is a Management Information Base (MIB)?

3. What is the HELLO protocol used for?

4. What is traffic shaping?

5. What is the range of addresses in the classes of internet addresses?

6. What is the significance of the IP address 255.255.255.255?

7. Differentiate between ARP and RARP.

8. What is Beaconing?

9. Define VOIP communication technology

10.What is Wi-max technology?

11.What is supernetting and subnetting?

12. Which protocol is used by DNS name servers?

13. Differentiate between TFTP and FTP application layer protocols

14. What is NETBIOS and NETBEUI?

15. Compare IPv4 and IPv6 header formats.

16. Define CSMA/CD

Page 20: CSE Course Viva Questions

17 .Distinguish between packet switching and circuit switching

18. Define RTT.

19. Differentiate between bridges switches and routers

20. Distinguish between unicasting and multiplexing

21. Compare TCP and UDP

22 What is IGMP.

23. What is NAT?

24. What is DHCP?

ACN

1. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.

10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.

10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.

2. What is a Management Information Base (MIB)A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP.

3. What is the HELLO protocol used forThe HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.

4. What is traffic shapingOne of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

Page 21: CSE Course Viva Questions

5. What is the range of addresses in the classes of internet addressesClass A 0.0.0.0 - 127.255.255.255Class B 128.0.0.0 - 191.255.255.255Class C 192.0.0.0 - 223.255.255.255Class D 224.0.0.0 - 239.255.255.255Class E 240.0.0.0 - 247.255.255.255

6.What is the significance of the IP address 255.255.255.255?The limited broadcast address is utilized when an IP node must perform a one-to-everyone delivery on the local network but the network ID is unknown.

7.What is difference between ARP and RARP?The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

8.What is Beaconing?The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.

9.Define VOIP Communication Technology

VOIP stands for Voice over IP and this technology is used for transmitted the voice over the IP based long distance network to make phone calls. VOIP phone calls are very cheap and a large number of the corporate offices and home users are using VOIP technology to make long distance phone calls.

10.What is Wi Max Technology?

Wi Max is a wireless broadband technology and it is a advance shape of the Wi Fi (which was a base band technology). Wi Max supports data, video and audio communication at the same time at a very high speed up to 70 Mbps.

11.What is supernetting and subnetting?

When class B addresses are used by class C subnet mask then the result we get is known as subnets. There are many reasons for which we create subnets of an IP network. The basic purpose of subnet is to control traffic over networks.To get the network and node parts of an address, we apply subnet mask to an IP address. 1 represents to network bit and 0 represents to node bit. To get the network address, we apply an operation among the IP address and the subnet mask is known as Bitwise Logical (AND).

Super-netting is also known as Classes Inter-Domain Routing. The way through which multiple internet addresses of a class are combined together is known as Super-netting.

Page 22: CSE Course Viva Questions

Suppose we have two network addresses. One is 192.168.3.0/18 and other is 192.168.4.0/18. By using Super-netting, we can combine these two addresses into a single address as 192.168.3.0/17. Here seventeen (17) is showing that first 17 bits are representing the network part of address (192.168.3.0/17).  There are some protocols which are used Super-netting including BGP and OSPF.

12.What protocol is used by DNS name serversDNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.

13. Differentiate between TFTP and FTP application layer protocolsThe Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.

14. What is NETBIOS and NETBEUI?

NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.

15. What is CSMA/CD?CSMA/CD stands for Carrier Sense Multiple Access with CollisionDetect. Ethernet is a multiple access network (shared link) and the carrier sense meansthat all the nodes can distinguish between an idle and busy link. Collision detect meansthat a node listens as it transmits and can therefore detect when a frame it is transmittinghas interfered with a frame transmitted by another node.

16. Differentiate Bridges, Switches and Routers?Bridges are Link level nodes they forward frame from one link to another toimplement an extended LAN, Switches are network level nodes they forward datagramfrom one network to another to implement a packet switched network and routers are

Page 23: CSE Course Viva Questions

internet level nodes they forward datagram from another to implement an internet.

VIVA QUESTIONS FOR COMPILER

1. What are the different phases of compilation?

2. Differentiate between lexeme, token and pattern.

3. How input buffering is performed in compiler?

4. Why is the input buffer organized into two halves?

5. What is the use of sentinels in input buffering?

6. What is a regular expression? Give examples.

7. Give the structure of a lex program.

8. What is the output of a lex compiler.

9. What are the different error recovery strategies?

10. What is the problem of left recursion and how can it be eliminated?

11. Differentiate between top down and bottom up parsing. Give examples for each.

12. Distinguish between FIRST and FOLLOW.

13. What is the significance of first & follow?

14. What do you mean by handle pruning?

15. Describe the stack implementation of shift reduce parsing.

16. Compare SLR, CLR and LALR parsers.

17. What is the difference between parse tree and syntax tree?

18. Distinguish between S-attributed grammar and L-attributed grammar.

19. Compare synthesized attributes and inherited attributes.

20. Describe how type checking of an expression is specified.

21. What are the different fields in an activation record?

22. What do you mean by dangling reference problem?

23. What are the three representations of three address code statements?

24. What are the different optimization techniques used in compilers?

25. What do you mean by dead code elimination?

Page 24: CSE Course Viva Questions

26. What will be the output file created when yacc translate.y command is executed?

27. Differentiate between a compiler and assembler.

28. What is the significance of a language processor?

29. Differentiate between interpreter & compiler.

VIVA QUESTIONS FOR SECURITY IN COMPUTING

1. If you have to both encrypt and compress data during transmission, which would you do first, and why?

2. Differentiate between symmetric encryption and asymmetric encryption.3. What is DES ?4. Compare DES and RSA5. When a combination of symmetric encryption and an error control code is used

for message authentication, in what order must the two functions be performed ?6. What is a firewall.?7. What are the different types of firewall?8. Differentiate the different types of attacks on data during transmission.9. Differentiate between threat and vulnerability.10. Differentiate between attack, service and mechanism.11. What are the major vulnerabilities that a computer system is subjected to?12. What are the different mechanisms provided to assure security.13. What are the 3 independent dimensions on which all cryptographic systems are

characterized?14. Differentiate the concepts unconditionally secure and computationally secure. 15. What is one time pad technique.16. What are the different transpositions methods for encryption ?17. What are the different techniques for steganography.18. Differentiate between encryption and decryption algorithms.19. Differentiate the concepts confusion and diffusion with respect to data security.20. What do you mean by avalanche effect.21. How can you provide authentication to your messages using public key

cryptography?22. How can you provide both secrecy and authentication to your messages using

public key cryptography?23. What is a public key certificate?24. What is a digital signature?25. What is the difference between direct and arbitrated digital signature.26. What is R64 conversion? How is it useful for an e-mail application.27. What are the two common techniques used to protect a password file?28. What is a honeypot?29. What are the two common techniques used to protect a password file?30. What are the 3 different types of indruders.?31. What are the different types of virus?

Page 25: CSE Course Viva Questions

32. Differentiate between email virus and macrovirus33. What are the two categories of malicious program?34. Diffrentiate between a logic bomb and time bomb.35. What is Trojan horse.

SYSTEM PROGRAMMING

Can forward reference occurs in data items, if so how can we eliminate?

1. Define a macro called SQR which squares a number.

Ans: #define SQR(x) (x * x)

2. What will happen if we drop the base register in the program which contains only one base register?

3. Differentiate Macro & Subroutine.

4. Let the contents of the registers B,PC,X are 006000, 003000,000090 respectively ;the displacement be 0000 0011 0000;the 6 flags as:n=0,i=1,x=0,b=0,p=0,e=0;then what will be it target address?

A) 3600 B) 6390 C) 30

5. Name some application of Load and Go Assemblers.

6. What is it: =X’05’ means?

A) ExpressionB) SymbolC) Literal

7. What is the role of 1)ORGIN2)EQU3)LTORG in an assembly language pgm.

8. Name the register whose no=8.

A) XB) SWC) PC

9. Name the special type of loader which is executing ,when a computer starts or restarted.

Page 26: CSE Course Viva Questions

10. List out the variables used in linking loaders.

A) PROGADDR,CSADDR & CSLTHB) LOCCTRC)SHLADDR & CSLTH

11. Differentiate EXTDEF and EXT REF.

12. How can we include library routine automatically? Also write the syntax.

Ans: LIBRARY MYLIB

13. Name three types of Multiprocessor Operating System.

14. List out the data structures used in macros.

A) ESTABB) OPTAB & SYMTABC) DEFTAB, NAMTAB & ARGTAB

.

Page 27: CSE Course Viva Questions