CSS Computer Science 2020

PART - II

SECTION - A

No.2. (a) Explain Moore's law. List high computing requirements in contemporary computing. (7)

(b) List and briefly define two approaches to dealing with multiple interrupts. (6)

(c) What is instruction-level parallelism? What are some typical distinguishing characteristics of RISC organization? (7)

No.3. (a) What is the kernel of an operating system? Explain the difference between a monolithic and microkernel. (7)

(b) What is the difference between simple and virtual memory paging? Also explain the purpose of translation lookaside buffer. (6)

(c) Why do we have deadlock in the multiprocessing environment? Explain different techniques for dealing with deadlocks. (7)

No.4. (a) Compare IPv4 and IPv6 headers. Explain the use of NAT technology to overcome IPv4 scarcity. (8)

(b) Find the maximum number of valid subnets and usable hosts per subnet that you can get from the network 172.23.0.0/23. (6)

(c) List and briefly define any THREE file organization techniques. Also explain basic Linux file system security. (6)

No.5. (a) What is signal encoding? Explain different encoding techniques used in data communication. (8)

(b) Explain the functions and needs of ARP and RARP protocols in computer networks. (5)

(c) Explain multiplexing and demultiplexing at the transport layer. Explain in the context of TCP/IP protocol. (7)

SECTION - B

No.6. (a) What is the purpose of a join in SQL? Explain inner, left, right and full join with the help of examples. (8)

(b) Construct an E-R diagram for a hospital with a set of patients and a set of medical doctors. Associate with each patient a log of the various tests and examinations conducted. (7)

(c) Explain Two-phase locking (2PL) as a concurrency control mechanism in the database systems. (5)

No.7. (a) What is Histogram equalization? Explain the process and discuss its uses. (6)

(b) Explain types of color models. Also discuss the most common hardware oriented color models in detail. (8)

(c) What is translation and scaling? Find the number of bits required to store a 256x256 image with 32 gray levels. (6)

No.8. (a) "Web engineering is more challenging than traditional software engineering". Argue for or against. (7)

(b) Briefly discuss the role of validation and verification in requirement engineering. (6)

(c) Explain functional and non-functional requirements in the context of a web application development. (7)