Posts

Showing posts from June, 2014

.Net - Important Interview Questions

OOPS Concepts SQL Concepts Web Concepts Windows Concepts Crystal Reports & Sql Reporting Services Why used Crystal reports in applications? Client-Server Concepts Remoting Web Services .Net Framework Application Domain Polymorphism Primary Interop Assemblies (PIA) What are System Exceptions & Application Exceptions? Where and why to use both exceptions?

Distributed Systems

Image
B.TECH. (CSE) (SEM. VII) ODD SEMESTER THEORY  EXAMINATION 2013-2014 DISTRIBUTED SYSTEMS Time: 3 hrs M.M: 100 1. Attempt any four parts of the following :     (5*4=20) How the distributed computing system id better than parallel processing system? Explain. Discuss the impact of the absence of global clock in distributed systems. Define the term transparency. Explain important types of transparencies in distributed system. What id termination detection in distributed system? Explain any algorithm for termination detection. What is Vector Clock? How this maintains causal ordering? Explain. Explain the following Distributed Computing Model : (a) Mini Computer Model (b) Work Station Model (c) Work Station Server Model.

Data Mining And Data Warehousing

Image
B.TECH.  (CSE) (SEM. VII) ODD SEMESTER THEORY  EXAMINATION 2013-2014 DATA MINING AND DATA WAREHOUSING Time: 3 hrs M.M: 100 1. Attempt any four parts of the following :     (5*4=20) What do you mean by Data Mining? Differentiate between Data Mining Technique and Data Mining Strategy. What is Data Warehouse? How does it differ from a database? What do you mean by Granularity? What is Partitioning? Explain Data Warehouse Life Cycle. What is the data architecture of data warehouse operations? Data consolidation is data modeling activity. This statement is true or not? Justify.

Advanced Computer Architecture

Image
M.TECH ( CSE ) Pre-University Test, 2013-2014 Advanced Computer Architecture Time: 3hrs M.M: 100 1. Attempt any two questions.     (10*2=20) Discuss the different level of abstraction to design computer architecture. What do you understand by hierarchical design frame work and how this frame work will help to design computer? What are different parallel techniques to improve the performance of computer system? Discuss the various speedup performances law to measure the performance of computer system.

Page class overview in Asp.net

Image
When an ASP.NET page is requested to a browser, ASP.NET creates an instance of a class that represents your page. That class is composed not only of the code that you wrote for the page, but also code that is generated by ASP.NET.This topic provides an overview of the code that is generated by ASP.NET. Generating and  running the page class code:- ASP.NET page runs as a unit, combining the server-side elements in a page, such as controls, with the event-handling code you have written. If you use a Web site project, you do not have to precompile pages into assemblies. ASP.NET dynamically compiles pages and runs them the first time they are requested by a user. If there are any changes to the page or resources the page depends on, the page is automatically recompiled. Web site projects also support precompilation of a Web project to enhance performance (for the first time a page request is received) and perform error checking as well as to support site deployment. ASP.NET W

Stack and heap in Dot net

Image
When we declare a variable in a .Net application, it allocates some chunk of memory in to the RAM.  This memory has 3 things first the name of the variable, second data type of the variable and finally the value of the variable.  Now simple explanation of what happens in the memory, but depending on what kind of data type your variable is allocated on that type of memory. There are two types of memory allocation stack memory and heap memory.

Boxing and unboxing in .net

Image
When we move a value type to reference type the data is moved from the stack to the heap . When we move reference type to a value type the data is moved from the heap to the stack . This movement of data from the heap to stack and vice-versa creates a performance hit.

Multi Threading in Dot net..

Image
First we understand the differences b/w Multitasking Multiprocessing and Multi-Threading. Multitasking :  An Operating system provides to perform multiple task to user at a time that is called multitasking. For e.g . you sing song on VLC player while working on MS office. These are two types concept in Multitasking 1.    Multi-Processing 2.    Multi-Threading Multiprocessing : Computer system's ability to support more than one process or program at the same time. Multiprocessing operating systems enable several programs to run concurrently. UNIX is one of them. Multiprocessing systems are much more complicated than single-process systems because the operating system must allocate resources to competing processes in a reasonable manner. It refers to the utilization of multiple CPU's in a single computer system. This is also called parallel processing.

What is Page Life Cycle Asp.Net?

Asp.Net provide platform for building Web applications. When a page is requested, it is loaded into the server memory, processed and sent to the browser. Then it is unloaded from the memory. At each of this steps, methods and events are available, which could be overridden according to the need of the application. The phases of page life cycle are: 1.    Page Initialization        a.    Page_PreInit        b.    Page_Init        c.    Page_InitComplete 2.    Page Load (load all control Button,TextBox)       a.    Page_PreLoad       b.    Page_Load       c.    Page_LoadComplete 3.    Page Render        a.    Page_Prerender        b.    Page_PreRenderComplete        c.    Page_SaveStateComplete

Depth-first search Vs. Breadth-first search

Image
Depth-first search Vs. Breadth-first search  DFS  BFS 1. Stack data structure LIFO. 1. Queue data structure FIFO. 2. Does have blind alley. 2. Does not have blind alley. 3. It does not take more space. 3. BFS takes more space. 4. Blind alley exist therefore, It may follow a single unfruitful path for a long time and terminate in a state that have no successor. 4. No Blind alley therefore, It will not get trapped when finding a solution. 5. Neither optimal nor complete. 5. BFS is optimal. 6. It stop after one solution, minimal solution may or may not be found. 6. It may find many solution if exist and also gives a minimal solution / min. no. of step, longer path will never be explore before shorter path

Non Conventional Energy Resource

Image
U ttar P radesh T echnical U niversity B.Tech. (Sem. 8) Season 2013 - 14 Non Conventional Energy Resource Paper Code : EOE081 Time : 3 hrs , MM : 100 Q.1 Attempt any four parts of the following  (5*4=20) Discuss the primary and secondary energy sources. Also describe the future of non-conventional energy sources in India. Explain why direct energy conversion processes are becoming more important as compared to conventional generation. What is demand side management? How it is useful in energy conversion? Describe the difference between the Direct radiation and Diffuse radiation. How can solar energy be converted into electrical energy. Give a diagram showing the element of such a plant.

Artificial Intelligence

Image
Krishna Engineering College (ECS-801) B.Tech.    Computer Science Semester - 8  Pre-Sem Exam May - 2014 ARTIFICIAL INTELLIGENCE Time : 3 hrs MM : 100 Q.1   Attempt any four of the following questions (5 * 4 = 20) Define and describe the difference between knowledge, belief hypothesis and data. Define Artificial Intelligence and write about application areas of Artificial Intelligence . Define Intelligent Agents and explain the various structures of intelligent agents. What is means-ends analysis? Explain it with examples. Explain the various steps of natural language processing. Briefly explain the parse tree & parse the sentence. "John broke the window with a hammer"

Smart Card

Image
Introduction        (5 mark question) A Smart Card , Chip Card, or Integrated Circuit Chip (ICC) is any pocket-sized card with embedded integrated circuits, smart card is a plastic card about the size of a credit card, with an embedded microchip that are loaded with data used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. ' Fig 1 : Smart card chip structure and packaging Smart card can provide identification , authentication , data storage and application processing. Smart cards may provide strong security authentication for single sign-on (SSO) within large organizations. Smart card are suitable for personal identification tasks, the chip is implemented with some cryptographic algorithm.

Biometrics

Image
Introduction   (5 mark question) Biometrics (refers to or metrics) related to human characteristics and traits. Biometrics identification (or Biometrics authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are used surveillance. Biometrics is the science and technology of measuring and analyzing biological data . In Information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprint, eye-retina and irises, voice patterns, facial patterns and hand measurement, for authentication purposes.

Advanced Network Security

ABES Engineering College Ghaziabad (032) Department of Computer Science and Engineering Session 2013-14 M.Tech (CSE) - II Semester Subject code - CS 9262 Sessional Test 1 Time 2hrs                                                                                                                             M.M: 60 Attempt all  Questions 1.  Attempt any FOUR of the following :-       (4*5) = 20       a. Differentiate between Block Cipher and Stream Cipher. What is cryptoanalysis ?       b. Give one line description for the following security services:               - Confidentiality               - Non-repudiation               - Integrity               - Authentication               - Access Control      c. What are the drawbacks of mono-alphabetic substitution cipher? Briefly describe how does a poly-alphabetic substitution cipher improve the strength of encryption?      d. Describe briefly client side e-commerce security threats.      e. Bri

Wireless Sensor Network

Image
Overview - Sensor ? A sensor is a converter that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument . Processing such a signal reveals some properties about objects located and/or event happening in the vicinity of the sensor. A large number of these disposable sensors can be networked in many applications that require unattended operations. Sensor node ? A sensor node, also known as sensor pod or a mote, is a component of a wireless sensor network. Each node in the network is responsible for collecting data about the environment around it and sending that data to processors in the network. A mote is node but a node is not always a mote. Fig 1: The typical architecture of the sensor node. Components - The main components of a sensor node are a micro-controller , transceiver , external memory , power source and one or more sensors .

Definition of Artificial Intelligence

The term Artificial Intelligence ( AI ) was coined by John McCarthy in 1955, defined it as "the science and engineering of making intelligent machines". The various definitions have been proposed since then by scientist and researchers. It is the science and engineering of making intelligent machines, especially intelligent computer programs. It is related to the similar task of using computers to understand human intelligence, but AI does not have to confine itself to methods that are biologically observable. [ John McCarthy ] The goal of work in artificial intelligence is to build machines that perform tasks normally requiring human intelligence. [ Nilsson. Nils J. ]

Neural Network and Learning Machine

Important Questions - [ 5 Marks Questions ] Comparison between Artificial Neural Network and Biological Neural Network. Describe the architecture of Artificial Neural Network and Biological neural network. What is Activation function and what are the different types of Activation function. Explain Supervised and Unsupervised learning in Neural Network. Explain in detail Feed-Forward Neural Network. What is Perceptron, explain Perceptron as Classifier with AND, OR & XOR examples. Explain Perceptron Learning Algorithm and Perceptron Learning Rules. What are the limitations of Perceptron learning.

Computer Networks: Comparison of Ring and Star Topologies

Image
Ring Topology - A ring network is network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet. Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure of cable break might isolate every node attached to the ring. In response, some ring networks add a "counter-rotating ring" (C-Ring) to form a redundant topology: in the event of a break, data are wrapped back onto the complementary ring before reaching the end of the cable, maintaining a path to every node along the resulting C-Ring. Such "dual ring" network include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring. 802.5 network - also known as IBM token ring network - avoid the weakness of a ring t

Artificial Intelligence - An Introduction to Prolog Programming

Image
 Introduction to Prolog Programming The Basics Prolog (Programming in logic) is one of the most widely used programming languages in artificial intelligence research. As opposed to imperative languages such as C or java (the latter of which also happens to be object-oriented) it is a declarative programming language. That means, when implementing the solution to a problem, instead of specifying how to achieve a certain goal in a certain situation, we specify what is situation (rules and facts) and the goals (query) are and let the prolog interpreter derive the solution for us. Prolog is very useful in some problem areas, such as artificial intelligence, natural language processing, database,.... but pretty useless in others, such as graphics or numerical algorithms. Basic Features of Prolog Features of Prolog are:- Facts Terms Queries Logical Variables Shared Variables Data Types in Prolog Rules