student’s copy€¦ · 7.the most common kind of queries in a data warehouse are (a) inside-out...

34
V/BCA/5E1 (R) Student’s Copy Professional Course Examination, November 2018 ( 5th Semester ) BACHELOR OF COMPUTER APPLICATIONS Course : BCA5E1 ( Introduction to E-Governance ) ( Revised ) Full Marks : 75 Time : 3 hours ( PART : A—OBJECTIVE ) ( Marks : 25 ) The figures in the margin indicate full marks for the questions SECTION—A ( Marks : 15 ) Tick (3) the correct answer in the brackets provided : 1×10=10 1. The first stage of e-governance is (a) on-line presence ( ) (b) computerisation ( ) (c) networking ( ) (d) on-line interactivity ( ) 2. The most basic aspect of e-governance is (a) Government to Citizen (G2C) ( ) (b) Government to Government (G2G) ( ) (c) Government to Business (G2B) ( ) (d) Government to Employee (G2E) ( ) 3. NeGP envisions _____ pillars of e-governance infrastructure. (a) 2 ( ) (b) 3 ( ) (c) 4 ( ) (d) 5 ( ) /377 1 [ Contd.

Upload: others

Post on 19-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

V/BCA/5E1 (R) Student’s Copy

Professional Course Examination, November 2018

( 5th Semester )

BACHELOR OF COMPUTER APPLICATIONS

Course : BCA5E1

( Introduction to E-Governance )

( Revised )

Full Marks : 75

Time : 3 hours

( PART : A—OBJECTIVE )

( Marks : 25 )

The figures in the margin indicate full marks for the questions

SECTION—A

( Marks : 15 )

Tick (3) the correct answer in the brackets provided : 1×10=10

1. The first stage of e-governance is

(a) on-line presence ( )

(b) computerisation ( )

(c) networking ( )

(d) on-line interactivity ( )

2. The most basic aspect of e-governance is

(a) Government to Citizen (G2C) ( )

(b) Government to Government (G2G) ( )

(c) Government to Business (G2B) ( )

(d) Government to Employee (G2E) ( )

3. NeGP envisions _____ pillars of e-governance infrastructure.

(a) 2 ( ) (b) 3 ( )

(c) 4 ( ) (d) 5 ( )

/377 1 [ Contd.

Page 2: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

4. A middleware that is being positioned in all the States/UTs and also at the

national level is

(a) SWAN ( ) (b) CSC ( )

(c) SDC ( ) (d) SSDG ( )

5. E-Government Project Development Cycle comprises the various _____

phases for the successful development of different projects under

e-governance.

(a) 4 ( ) (b) 5 ( )

(c) 6 ( ) (d) 7 ( )

6. Which one is NOT among the advantages of PPP?

(a) High success rate ( )

(b) High productivity ( )

(c) Higher service charge ( )

(d) Better organized ( )

7. The methodology that integrates change and the ability to adapt into the

organization is

(a) change management ( )

(b) leadership ( )

(c) automation ( )

(d) process re-engineering ( )

8. Building human capacities in terms of necessary knowledge and skills is

termed as

(a) awareness program ( )

(b) digital empowerment ( )

(c) capacity building ( )

(d) capacity management ( )

9. The fundamental rethinking and radical redesign of business process is

called

(a) process re-design ( )

(b) process re-engineering ( )

(c) process reformation ( )

(d) process re-structure ( )

/377 2 [ Contd.

Page 3: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

10. A conceptual blueprint that defines the structure and operation of an

organization is

(a) enterprise architecture ( )

(b) organization structure ( )

(c) operaton handout ( )

(d) system architecture ( )

Indicate whether the following statements are True (T) or False (F) by puttinga Tick (3) mark in the brackets provided : 1×5=5

1. E-governance aims to empower people by giving them access to

information. ( T / F )

2. Technology for e-governance should be able to deliver government services

indirectly to the customer. ( T / F )

3. NeGP’s main aim is to improve delivery of government services to citizens

and business. ( T / F )

4. CSCs are the primary physical front end for delivery of government and

private services to citizens. ( T / F )

5. PPP manages the people change in terms of addressing the resistance.

( T / F )

SECTION—B

( Marks : 10 )

Answer the following questions : 2×5=10

1. List out the two roles of leadership in e-governance projects.

2. What are the capacity initiatives under NeGP?

3. What is digital divide?

4. What are the two advantages of e-governance?

5. What is One-Time Password (OTP)?

/377 3 [ Contd.

Page 4: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

( PART : B—DESCRIPTIVE )

( Marks : 50 )

The figures in the margin indicate full marks for the questions

1. (a) What is e-governance? Explain the following scope of components of

e-governance : 2+6=8

(i) Government to Citizen (G2C)

(ii) Government to Government (G2G)

(iii) Government to Business (G2B)

(b) What is E-Governance Project Development Cycle? Explain in brief the

important activities in each phase. 2+6=8

(c) What is NeGP? Mention the three infrastructure pillars of NeGP. 2+6=8

2. (a) Mention the following terms : 3+3=6

(i) Enterprise Architecture for e-Governance

(ii) SMART in Governance

OR

(b) What is change management? Write a short note on ADKAR change

management model. 2+4=6

3. (a) Mention two security drawbacks of an e-governance mechanism.

Mention the six security tools for e-governance projects. 4+6=10

OR

(b) Explain the following : 5+5=10

(i) Business model for e-governance projects

(ii) Public-private partnership for e-governance

4. (a) Define Mission Mode Projects (MMPs). Explain different Mission Mode

Projects of NeGP with example. 4+6=10

OR

(b) Mention in brief the Government Process Re-engineering. Write a short

note on the legal aspect issues for Government Business Process

Re-engineering. 5+5=10H H H

V/BCA/5E1 (R)/377 4 G9—170

Page 5: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

V/BCA/5E2 (R) Student’s Copy

Professional Course Examination, November 2018

( 5th Semester )

BACHELOR OF COMPUTER APPLICATION

Course No. : BCA5E2

( Computer Network Security )

( Revised )

Full Marks : 75

Time : 3 hours

( PART : A—OBJECTIVE )

( Marks : 25 )

The figures in the margin indicate full marks for the questions

SECTION—A

( Marks : 15 )

Tick (3) the correct answer in the brackets provided : 1×10=10

1. A _____ is an extension of an enterprise’s private Intranet across a public

network such as the Internet across a public network such as the Internet,

creating a secure private connection.

(a) VNP ( )

(b) VPN ( )

(c) VSN ( )

(d) VSPN ( )

2. Which of the following is the type of firewall?

(a) Packet Filtering Firewall ( )

(b) Dual Homed Gateway Firewall ( )

(c) Screen Host Firewall ( )

(d) All of the above ( )

/378 1 [ Contd.

Page 6: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

3. _____ is to protect data and passwords.

(a) Encryption ( )

(b) Authentication ( )

(c) Authorization ( )

(d) Non-repudiation ( )

4. Which of the following is not external security threats?

(a) Front-door Threats ( )

(b) Back-door Threats ( )

(c) Underground Threats ( )

(d) Denial of Service (DoS) ( )

5. Phishing is a form of

(a) spamming ( )

(b) identify theft ( )

(c) impersonation ( )

(d) scanning ( )

6. Sniffing is used to perform _____ fingerprinting.

(a) passive stack ( )

(b) active stack ( )

(c) passive banner grabbing ( )

(d) scanned ( )

7. What is the most important activity in computer network system hacking?

(a) Information gathering ( )

(b) Cracking passwords ( )

(c) Escalating privileges ( )

(d) Covering tracks ( )

/378 2 [ Contd.

Page 7: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

8. How is IP address spoofing detected?

(a) Installing and configuring an IDS that can read the IP header ( )

(b) Comparing the TTL values of the actual and spoofed addresses ( )

(c) Implementing a firewall to the network ( )

(d) Identify all TCP sessions that are initiated but does not complete

successfully ( )

9. What is the purpose of a Denial of Service attack?

(a) Exploit a weakness in the TCP/IP stack ( )

(b) To execute a Trojan on a system ( )

(c) To overload a system so it is no longer operational ( )

(d) To shutdown services by turning them off ( )

10. What type of symmetric key algorithm using a streaming cipher to encrypt

information?

(a) DES ( )

(b) Blowfish ( )

(c) SHA ( )

(d) MD5 ( )

Indicate whether the following statements are True (T) or False (F) by puttinga Tick (3) mark in the brackets provided : 1×5=5

1. Traditional cipher is symmetric key cryptography. ( T / F )

2. Active threats involve attempts by an attacker to obtain information

relating to communication. ( T / F )

3. A denial of service attack takes place when the availability to a resource is

intentionally blocked or degraded by an attacker. ( T / F )

4. Software firewall is also sometimes called personal firewall. ( T / F )

5. Message authentication do not ensures that the message has been sent by

a genuine identity. ( T / F )

/378 3 [ Contd.

Page 8: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

SECTION—B

( Marks : 10 )

Answer the following questions : 2×5=10

1. What is DOS attack?

2. What do you man by authentication?

3. Distinguish between SSL and TLS.

4. What is cryptography?

5. List out any two wireless security tools.

( PART : B—DESCRIPTIVE )

( Marks : 50 )

The figures in the margin indicate full marks for the questions

1. (a) What is IDS? Explain two types of IDS with diagram. 2+8=10

OR

(b) What is firewall? What are the factors to be considered while selecting

a right firewall? 2+8=10

2. (a) Define active attack and passive attack. Mention four methods of

attack and their protection on networking. 2+8=10

OR

(b) Describe with suitable example, the four services and mechanism

model for Internetwork Security. 2+8=10

3. (a) What are the two types of cryptographic attack? Mention symmetric

cryptosystem and asymmetric cryptosystem. 2+8=10

OR

(b) (i) Explain symmetric key encryption model with a neat diagram.

(ii) Explain the transpositional chiper with an example. 5+5=10

/378 4 [ Contd.

Page 9: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

4. (a) Explain with diagram packet-filter firewalls and proxy firewalls. 5+5=10

OR

(b) What is IP security? Explain the two modes of IP security. 2+8=10

5. (a) Explain RS algorithm and public key encryption. 5+5=10

OR

(b) Explain the following terms : 5+5=10

(i) Man in the middle attacks

(ii) Certification authority

H H H

/378 5 G9—40

Page 10: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

V/BCA/5E3 (R) Student’s Copy

Professional Course Examination, November 2018

( 5th Semester )

BACHELOR OF COMPUTER APPLICATIONS

Course : BCA 5E3

( Data Mining and Warehousing )

( Revised )

Full Marks : 75

Time : 3 hours

( PART : A—OBJECTIVE )

( Marks : 25 )

The figures in the margin indicate full marks for the questions

SECTION—A

( Marks : 15 )

Tick (3) the correct answer in the brackets provided : 1×10=10

1. The synonym for data mining is

(a) data warehouse ( )

(b) knowledge discovery in database ( )

(c) extract, transform and load (ETL) ( )

(d) business intelligence ( )

2. Which of the following is not a function of data warehouses?

(a) Characterization and discrimination ( )

(b) Classification and regression ( )

(c) Selection and interpretation ( )

(d) Clustering and analysis ( )

/379 1 [ Contd.

Page 11: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

3. An operational system is which of the following?

(a) The business in real time and is based on historical data ( )

(b) The business in real time and is based on current data ( )

(c) Support decision-making and is based on current data ( )

(d) Support decision-making and is based on historical data ( )

4. _____ is a good alternative to the star schema.

(a) Fact constellation ( )

(b) Star schema ( )

(c) Snowflake schema ( )

(d) Star-snowflake schema ( )

5. A data warehouse is which of the following?

(a) It can be updated by end users ( )

(b) It contains numerous naming conventions and formats ( )

(c) It can be organized around important subject areas ( )

(d) It contains only current data ( )

6. Which of the following technologies is not well-suited for data mining?

(a) Expert system technology ( )

(b) Data visualization ( )

(c) Parallel architecture ( )

(d) Technology limited to specific data types such as numeric data

types ( )

7. The most common kind of queries in a data warehouse are

(a) inside-out queries ( )

(b) outside-in queries ( )

(c) browse queries ( )

(d) range queries ( )

V/BCA/5E3 (R)/379 2 [ Contd.

Page 12: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

8. Which of the following features usually applies to data in a data

warehouse?

(a) Data are often deleted ( )

(b) Data are rarely deleted ( )

(c) Most applications consist of transactions ( )

(d) Relatively few records are processed by applications ( )

9. Concept description is the basic form of the

(a) predictive data mining ( )

(b) descriptive data mining ( )

(c) data warehouse ( )

(d) relational database ( )

10. Web mining techniques do not include

(a) cookies ( )

(b) clustering ( )

(c) user identification ( )

(d) Web content personalization ( )

Indicate whether the following statements are True (T) or False (F) by puttinga Tick (3) mark in the brackets provided : 1×5=5

1. Data warehouse architecture is based on RDBMS. ( T / F )

2. The type of relationship in star schema is many to many. ( T / F )

3. A goal of data mining is to explain some observed event or condition.

( T / F )

4. Transaction processing is not a kind of data warehouse application.

( T / F )

5. Stationary database is not a type of data warehouses. ( T / F )

V/BCA/5E3 (R)/379 3 [ Contd.

Page 13: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

SECTION—B

( Marks : 10 )

Answer the following questions : 2×5=10

1. What is knowledge discovery in database?

2. Why is it important for decision support?

3. What are the two major issues in data mining?

4. What are two applications of data mining?

5. Define single-stage data warehousing.

( PART : B—DESCRIPTIVE )

( Marks : 50 )

The figures in the margin indicate full marks for the questions

Answer all questions

1. (a) What is data warehouse? Explain the design and construction of data

warehouse in detail. 2+8=10

OR

(b) What is data mining? Explain the architecture of data mining system

with suitable diagram. 2+8=10

2. (a) Explain the following data mining methodologies with suitable

example : 5+5=10

(i) Decision trees

(ii) Classification rules

OR

(b) Differentiate between the following terms : 5+5=10

(i) Operational system and Information system

(ii) Statistical models and Linear models

V/BCA/5E3 (R)/379 4 [ Contd.

Page 14: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

3. (a) What is dimensional modelling? Explain dimension tables and

aggregate fact tables with suitable demonstration. 2+8=10

OR

(b) What is schema in the context of dimensional modelling? Explain the

concepts of STAR schema with suitable demonstration. 2+8=10

4. (a) Explain Web content mining techniques. 10

OR

(b) Mention the characteristics of Web data. 10

5. Mention the following types of data warehouses : 5+5=10

(a) Host-based data warehouses

(b) LAN-based data warehouses

OR

(c) Virtual data warehouses

(d) Distributed warehouses

H H H

V/BCA/5E3 (R)/379 5 G9—90

Page 15: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

V/BCA/501 (R) Student’s Copy

Professional Course Examination, November 2018

( 5th Semester )

BACHELOR OF COMPUTER APPLICATIONS

Course : BCA–501

( Introduction to Java Programming )

( Revised )

Full Marks : 75

Time : 3 hours

( PART : A—OBJECTIVE )

( Marks : 25 )

The figures in the margin indicate full marks for the questions

SECTION—A

( Marks : 15 )

Tick (3) the correct answer in the brackets provided : 1×10=10

1. Variables declared and used inside methods are called

(a) class variables ( )

(b) local variables ( )

(c) instance variables ( )

(d) global variables ( )

/373 1 [ Contd.

Page 16: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

2. _____ provides all the tools, executables and binaries required to compile,

debug and execute a Java program.

(a) JVM ( )

(b) Applet ( )

(c) JDK ( )

(d) JRE ( )

3. Which one is not included in Java API package?

(a) awt ( )

(b) orl ( )

(c) applet ( )

(d) io ( )

4. The string method "s1.concat(s2)"

(a) concatenates s1 and s2 ( )

(b) copies s1 to s2 ( )

(c) replaces s1 with s2 ( )

(d) moves s1 to s2 ( )

V/BCA/501 (R)/373 2 [ Contd.

Page 17: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

5. Run-time error occurs when

(a) missing semicolon ( )

(b) using undeclared variables ( )

(c) there is bad reference to object ( )

(d) dividing an integer by zero ( )

6. An exception is a condition that is caused by

(a) compile error ( )

(b) run-time error ( )

(c) logical error ( )

(d) OS error ( )

7. Read( )

(a) reads a byte from the output stream ( )

(b) reads a byte from the input stream ( )

(c) reads file data ( )

(d) writes data to output stream ( )

V/BCA/501 (R)/373 3 [ Contd.

Page 18: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

8. All classes and interfaces for Java collection framework are contained in

(a) java.awt ( )

(b) java.io ( )

(c) java.util ( )

(d) java.net ( )

9. A Java program that can be embedded into Web page is

(a) applet ( )

(b) iterator ( )

(c) AWT ( )

(d) thread ( )

10. Button, text field and label are contained in

(a) .GUI component classes ( )

(b) .GUI container classes ( )

(c) .Layout manager ( )

(d) .Custom graphics classes ( )

V/BCA/501 (R)/373 4 [ Contd.

Page 19: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

Indicate whether the following statements are True (T) or False (F) by puttinga Tick (3) mark in the brackets provided : 1×5=5

1. Instance and class variables are declared inside a class.

( T / F )

2. Interfaces are used as superclasses.

( T / F )

3. Most run-time errors occur due to typing mistakes.

( T / F )

4. Java.io provides system input and output through data streams.

( T / F )

5. AWT is not platform dependent.

( T / F )

SECTION—B

( Marks : 10 )

Answer the following questions : 2×5=10

1. What do you mean by tokens?

2. Explain wrapper classes.

3. What is multithreaded programming?

4. Explain output stream.

5. Explain applet tag.

V/BCA/501 (R)/373 5 [ Contd.

Page 20: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

( PART : B—DESCRIPTIVE )

( Marks : 50 )

The figures in the margin indicate full marks for the questions

1. (a) What is JVM? Is it platform independent? Explain. 4

(b) Explain the different OOPS concepts in Java. 6

OR

(c) Explain the different features of Java. 4

(d) What is nesting of methods in Java? Write a Java program to show

nesting of methods. 6

2. (a) Explain the different steps involved in creating arrays. 4

(b) Explain the concept of packages in Java. What are the different Java

API packages? 6

OR

(c) What do you mean by string array? Write a Java statement to create

and use arrays that contain strings. 4

(d) What is the function of interfaces in Java? Explain with a simple

program to show the use of interfaces in Java. 6

3. (a) What do you mean by errors? Explain the different types of errors in

Java. 4

(b) What is exception? Write down the difference between errors and

exceptions. 6

OR

(c) What is thread? Explain the steps involved in extending the thread

class. 4

(d) Briefly discuss the life cycle of a thread. 6

V/BCA/501 (R)/373 6 [ Contd.

Page 21: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

4. (a) Explain the concept of stream in Java. What are the two types of byte

stream classes? 4

(b) Explain file class. Write down the different operations of file class. 6

OR

(c) Write down the main difference between set and list implementation in

Java. 4

(d) Explain in brief the concept of iterator in Java. 6

5. (a) What is applet? Explain the benefits of using applets. 4

(b) Discuss the life cycle of applet. 6

OR

(c) What are the different types of control supported by Java AWT? 4

(d) What is Java AWT? Write down the Java AWT hierarchy. 6

H H H

V/BCA/501 (R)/373 7 G9—210

Page 22: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

V/BCA/501P (R)

Professional Course Examination, November 2018

( 5th Semester )

BACHELOR OF COMPUTER APPLICATIONS

Course : BCA–501P

( Java Programming )

( Practical )

( Revised )

Full Marks : 75

Time : 3 hours

The figures in the margin indicate full marks for the questions

SECTION—A

Answer any two questions

1. Write a program to demonstrate the use of methods of Math class. 15

2. Write a program to demonstrate method overloading. 15

3. Write a program to demonstrate inheritance. 15

/380 1 [ Contd.

Page 23: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

SECTION—B

Answer any one question

4. Write a program to demonstrate dialog boxes. 20

5. Write a program to demonstrate check boxes with proper events. 20

SECTION—C

6. Viva voce 15

7. Practical record book 10

/380 2

Page 24: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

/380 31 [ Contd.

Page 25: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

/380 32 G9—220

Page 26: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

V/BCA/503 (R) Student’s Copy

Professional Course Examination, November 2018

( 5th Semester )

BACHELOR OF COMPUTER APPLICATIONS

Course : BCA–503

( Microprocessors )

( Revised )

Full Marks : 75

Time : 3 hours

( PART : A—OBJECTIVE )

( Marks : 25 )

The figures in the margin indicate full marks for the questions

SECTION—A

( Marks : 15 )

Tick (3) the correct answer in the brackets provided : 1×10=10

1. The first microprocessor developed was

(a) Intel 2002 ( )

(b) Intel 4004 ( )

(c) AVR one ( )

(d) Motorola 6800 ( )

/375 1 [ Contd.

Page 27: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

2. Data bus of 8085 microprocessor is

(a) 4-bit ( ) (b) 8-bit ( )

(c) 16-bit ( ) (d) 32-bit ( )

3. Which pin of microcontroller is used to multiplex address and data lines?

(a) SOD ( ) (b) HLDA ( )

(c) ALE ( ) (d) SID ( )

4. In each instruction cycle, the first operation is always

(a) memory read ( ) (b) memory write ( )

(c) opcode fetch ( ) (d) opcode read ( )

5. Which is the INTA pin of 8085 microprocessor?

(a) 9 ( ) (b) 10 ( )

(c) 11 ( ) (d) 12 ( )

6. What is address of non-maskable interrupt?

(a) 0 H020 ( ) (b) 0024H ( )

(c) 0028H ( ) (d) 002CH ( )

7. Which of the following is software interrupt?

(a) RST 4·5 ( ) (b) RST 5 ( )

(c) RST 7·5 ( ) (d) RST 8 ( )

8. What is the resolution of 8-bit ADC?

(a) 39 mV ( ) (b) 40 mV ( )

(c) 41 mV ( ) (d) 42 mV ( )

9. Which is the fastest ADC?

(a) Flash ADC ( )

(b) Dual slope ADC ( )

(c) SAR ADC ( )

(d) Sigma delta ADC ( )

10. Which of the following is control instruction?

(a) MVI ( ) (b) INX ( )

(c) CMP ( ) (d) ANI ( )

V/BCA/503 (R)/375 2 [ Contd.

Page 28: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

Indicate whether the following statements are True (T) or False (F) by puttinga Tick (3) mark in the brackets provided : 1×5=5

1. TRAP is non-vectored interrupt. ( T / F )

2. RIM stands for Read Interrupt Mask. ( T / F )

3. As the 8085 microprocessor is 8-bit, 16-bit addition is not possible.

( T / F )

4. CNC is a branching instruction. ( T / F )

5. 8085 has 20-bit address lines. ( T / F )

SECTION—B

( Marks : 10 )

Answer the following questions : 2×5=10

1. Write two logical instructions and two control instructions.

2. Name any two internal registers of 8085.

3. Write two features of address bus of 8085.

4. What are the three types of instruction format in 8085?

5. Name the level triggering interrupts in 8085.

V/BCA/503 (R)/375 3 [ Contd.

Page 29: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

( PART : B—DESCRIPTIVE )

( Marks : 50 )

The figures in the margin indicate full marks for the questions

1. (a) Explain the architecture of 8085 programming model. 7

(b) What are the basic units of a microprocessor? 3

OR

(c) Explain the different types of flag registers in 8085. 5

(d) Explain the bus structure of 8085 microprocessor. 5

2. Explain the different types of addressing modes in 8085 and give any two

examples each. 10

OR

(a) Write an ALP to exchange the content of memory location in 1200 H

and 4000 H. 5

(b) Define stack. Explain the operation of stack in detail. 5

3. (a) What is decoder? Explain with a block diagram the working of 3 to

8 lines decoder. 6

(b) Explain the function of latch in 8085 microprocessor. 4

OR

(c) What is time delay? Explain the time delay with one register. 5

(d) Draw and explain the circuit of tristate buffer. 5

4. (a) Write the three features of interrupt RST 4·5. 3

(b) Explain the function of IO/M, READY, HOLD and HLDA in Direct

Memory Access. 7

OR

(c) Explain the maskable and non-maskable interrupt. 5

(d) Explain the vector interrupt in detail. 5

V/BCA/503 (R)/375 4 [ Contd.

Page 30: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

5. (a) Draw and explain the block diagram of successive approximation. 6

(b) Explain the working of analog-to-digital converter with a block

diagram. 4

OR

(c) Explain the working of digital-to-analog converter with a block

diagram. 4

(d) How do you interface analog-to-digital signal? 6

H H H

V/BCA/503 (R)/375 5 G9—210

Page 31: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

V/BCA/503P (R)

Professional Course Examination, November 2018

( 5th Semester )

BACHELOR OF COMPUTER APPLICATIONS

Course : BCA–503P

( Assembly Language Programming )

( Practical )

( Revised )

Full Marks : 75

Time : 3 hours

The figures in the margin indicate full marks for the questions

SECTION—A

Answer any two questions

1. Write an assembly language program to find 1’s complement of a given

number. 15

2. Write an assembly language program to multiply two 8-bit numbers. 15

3. Write an assembly language program to rotate right a value four times. 15

/381 1 [ Contd.

Page 32: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

SECTION—B

Answer any one question

4. Write an assembly language program to add two 16-bit numbers. 20

5. Write an assembly language program to generate Fibonacci number. 20

SECTION—C

6. Viva voce 15

7. Practical record book 10

V/BCA/503P (R)/381 2

Page 33: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

/381 31 [ Contd.

Page 34: Student’s Copy€¦ · 7.The most common kind of queries in a data warehouse are (a) inside-out queries ( ) (b)outside-in queries ( ) (c)browse queries ( ) (d)range queries ( )

/381 32 G9—220