Search This Blog

Computer Graphics' Question Papers (Only Theory)!!!

1 comments

CG -->>

       
    These are ONLY the THEORY QUESTIONS compiled together from all the previous years' question papers of Computer Graphics. You can find all the numericals that has come in examinations in Prof. Vaidya's notes or MissionMCA's site.







  1. Discuss any two algorithms for hidden surface removal.
  2. Compare and contrast B-spline and Bezier curves, floodfill and boundary fill algorithms, parallel and perspective projection.
  3. Explain various steps required to be performed to design an animation sequence.
  4. What are projections? How are they useful? Explain different types of projections with e.gs.
  5. Deduce the Mid-point Ellipse Algorithm
  6. Explain different methods of character generation.
  7. Explain the cohen-Sutherland algorithm for Line Clipping. Give suitable e.gs.
  8. Explain the construction and working of CRT's and DVST's.
  9. Discuss various Colour models used in graphics system.
  10. Develop a 2D rotation matrix with respect to a arbitrary point.
  11. Short notes:- Frame buffer, Even-odd method, text clipping, viewing pipeline, homogeneous coordinates, Kinematics and Dynamics, morphing, Phong shading, character generation.
  12. Devise generalized Bresenham's line drawing algorithm.
  13. Explain window to view port mapping.
  14. Explain Midpoint Subdivision algorithm. Adv/Disadv. Prove that it works successfully with lines that are partially inside and partially outside the viewing window. 
  15. Derive 2D rotation and scaling transformations matrices with respect to fixed point(Xp, Yp)
  16. How does a raster scan system work? How is it different from Random scan system?
  17. What are display files? explain with e.gs, how are polygons and characters represented in Display file.
  18. Deduce the midpoint circle algorithm.
  19. What are Homogeneous co-ordinates? Explain its significance with e.gs
  20. Explain Polygon and its representation in display file. Also write the algorithm for entering the polygon into display file.
  21. Difference: Vector scan systems and raster-scan systems.
  22. Properties of curve.
  23. What is 2D viewing transformations. Derive the window to viewport transformation equation.
  24. Explain Liang-bersky Line clipping algorithm.
  25. Explain the relevance of normalized device coordinates.
  26. Explain the concept of Display file. How are they useful in storing the image definitions?
  27. Discuss the process of rotating an object about an arbitrary axis.
  28. Discuss any 2 methods for visible surface detection.
  29. Devise a procedure to rotate a rectangle by n degree in clockwise direction and reduce it to 2/3rd of its size by keeping the midpoint fixed.
  30. Short notes on: Ray tracing, Shear transformation, Random scan system, diffuse illumination, HSV colour model.

NOTE: If anyone feels that the notes he/she has is in a very easy language on any topic, you can send it to LastMinuteStudyARN@gmail.com. It will be published on the site with your name. And the solved numerical problems will also be uploaded on the site lately. 

 Thanks!!!

Operation Research's Question Paper (Only theory)!!!

0 comments

OR -->>


       
  These are ONLY the THEORY QUESTIONS compiled together from all the previous years' question papers of Operation Research. You can find all the numericals that has come in examinations in Prof. Vaidya's notes or MissionMCA's site.











  1. Inventory problem
  2. Branch and Bound algorithm & Hungarian method to solve Traveling Salesman problem.
  3. Short Notes with e.g.-  Redundant constraints in LPP, Pure strategy in game theory, Dual of a Primary LPP, Feasible region.
  4. Artificial variables? Explain 2-phase method of solving LPP.
  5. Deterministic inventory problem.
  6. What is "two person zero sum game"? Explain pure and mixed strategies in game theory?
  7. Pay-off matrix with saddle point and without saddle point.

NOTE: If anyone feels that the notes he/she has is in a very easy language on any topic, you can send it to LastMinuteStudyARN@gmail.com. It will be published on the site with your name. And the solved numerical problems will also be uploaded on the site lately. 

 Thanks!!!

Database Management System's Question Papers!!!

0 comments

DBMS -->>

   
    These are the questions compiled together from all the previous years' question papers of Database Management System. So first try to prepare these topics and then go for the whole book. :-)

The compulsory questions are to prepare an ERD on a system given in the q. paper, normalizing the table, write SQL codes according to the given Schema and conditions. 

  1. BCNF? Its difference with 3NF.
  2. Query Optimization and Query Processing.
  3. Hash based indexing? Discuss use of Hash function in identifying a bucket to search.
  4. Locking protocol? 2-phase locking protocol, strict 2-phase locking protocol and rigorous 2-phase locking protocol.
  5. Deadlock? wait-die & wound-wait protocols for deadlock prevention? Compare Deadlock detection & Prevention technique.
  6. Check pointing? 3 steps in crash recovery in Aries.
  7. Lossless join decomposition & Dependency preserving decomposition.
  8. Serializability? 2-schedule conflict equivalent? Conflict serializable schedule.
  9. ACID properties, Triggers, DBA and responsibilities, Dynamic Hashing, Shadow Paging, Strong entity.
  10. Differences: Clustered vs Unclustered index, B tree vs B+ tree, tree-structured indexing and Hash based indexing, Physical vs logical data independence, triggers vs stored procedure, ER model vs Relational model, Dense index and Sparse index, FD vs MVD, Aggregation vs Association.
  11. Bell-LaPadula model.
  12. Normalization? 2 required conditions for Normalization through decomposition of data.
  13. Functional dependency? How is it used to remove the redundancy in database? Explain Closure and minimal set of Functional dependency.
  14. Indexing technique speeds up query processing. Justify? And explain how does multilevel indexing improve the efficiency of searching an index file. Explain.
  15. Various steps of processing a high-level query.
  16. Data model? Network model- its advantages and disadvantages.
  17. Aggregation, 2PL, Views, Weak entity.
  18. Architecture of Database system. How different it is from conventional file system?
  19. What is an index on file of records? Search key for index? Why we need indexes?
  20. Recoverable schedule? Recoverability of schedule desirable?
  21. Relational Data model? Data independence? How DBMS supports it?
  22. why are Locks in DBMS used? write-ahead logging? why used?
  23. Transaction? State diagram, draw and explain.
  24. Candidate key, Closure of set of FD, RAID.
NOTE: If anyone feels that the notes he/she has is in a very easy language on any topic, you can send it to LastMinuteStudyARN@gmail.com. It will be published on the site with your name. 

 Thanks!!!

Network Security's Question Papers!!!

0 comments

NS:-

These are the questions compiled together from all the previous years' question papers of Network Security. So first try to prepare these topics and then go for the whole book. :-)








  1. Network Security? Principles? Different types of attack on it?
  2. How Key Distribution work with multiple KDC domains? How KDC differs from CA?
  3. Digital Signature? Issued how and by whom?
  4. How is asymmetric key algorithm RSA used to get Digital Signature?
  5. Firewall? Different configuration in which Firewall can be set up? Different types of Firewall?
  6. Digital Certificate? In what circumstances could it be revoked?
  7. Explain Process of Revocation of Certificate?
  8. PKIX or PKCS Infrastructure?
  9. Mutual Authentication? Is it required? Why? Pitfalls?
  10. Explain possible attack on Mutual Authentication i.e. Reflection Attack. Methods taken to foil such an attack?
  11. Explain Security Mechanism used in Electronic Transaction?
  12. Kerberos? Difference between K4 and K5?
  13. Authentication? How can it be achieved with help of tokens?
  14. Explain Symmetric Encryption Algorithm- DES. Broad-level steps and DES Round? What are weak and semi-weak keys used in DES?
  15. Security Policy? Explain different Security Policies?
  16. Hash? Discuss SHA1 and compare with MD5, MD4 and SHA.
  17. Steganography
  18.  Biometric Authentication.
  19. Smart cards
  20. Man in the middle attack
  21. Discuss SET process.
  22. Key principles of Security? Difference: Active and Passive attacks.
  23. Different modes of algorithm? Explain.
  24. E-mail Security
  25. IDEA
  26. Vernam Cipher
  27. Certificate Revocation/Broad level difference between CRL, OCSP and SCVP.
  28. SSL
  29. Different methods used for Authentication. Explain 1.
  30. Methods used for encrypting large messages? Explain 1.
  31. How MD2 Checksum is computed? What is maximum and minimum padding required?
  32. Deffie-Hellman Crypto system? Example.
  33. IP Security.
  34. Advantages/Disadvantages of Symmetric & Asymmetric algorithm? Discuss how advantages of both techniques can be combined to ensure secure key exchange?
  35. Discuss security provided at IP layer in TCP/IP protocol suite.
  36. Different types of attacks a communication system is vulnerable to.
  37. Security policy, Virus, Packet Sniffing.
  38. Difference: SSL and SET.
  39. Intrusion
  40. OFM
  41. Difference: renewable and Postdated Tickets
  42. Smart Cards
  43. How tokens can be used to authenticate an entity?
  44. NOTE: Solve all the RSA numericals as that's the only numerical that comes in QP.
Please comment below as to how do you want the Notes to be uploaded on this site. The answers to these questions first or Unit-wise? 

 Thanks!!!

Software Project Management's Question Papers!!!

7 comments

SPM


These are the questions compiled together from all the previous years' question papers of Software Project Management. So first try to prepare these topics and then go for the whole book. :-)






  1. What are different Organizational Structure? Diagram.
  2. Project Implementation and explain its different approaches.
  3. Role of Project Manager in an IT project. What skill sets are required?
  4. Outsourcing? Different reasons for outsourcing?
  5. System's view of project? Explain three sphere models for system's management.
  6. Processes involved in Project Procurement Management? Explain its components.
  7. Different steps in Project Risk Management? Explain.
  8. 5 Practices of exemplary Leadership? Explain Leadership styles and approaches.
  9. Project Communication Plan? What are different things addressed in it?
  10. Implementation of Performance Reporting? Different ways of it?
  11. What are different types of Contracts? Explain.
  12. Project Management Framework? Diagram?
  13. Importance of Ethics in Project?
  14. Administrative Closure?
  15. Stakeholders Management.
  16. Project Life Cycle? Diagram
  17. Change Process
  18. Concept of Make-or-buy decision process using Decision Tree? Advantage and Disadvantage.
  19. Gantt Chart, CPM, PERT, Critical Chain Scheduling. Explain with examples.
  20. 4 Frames of Organization? Importance of Project Communication Management?
  21. "Network Diagram helps in Project Scheduling and Resource Allocation." How?
  22. Project Metric? E.g of any 1 Project Metrics to measure cost and schedule.
  23. "Project can be an Organization Failure even if it is a technical success" Why? What steps can be taken to prevent this?
  24. Different approaches to do Risk Analysis & Assessment? Compare & Contrast!
  25. Steps taken for Project Closure?
  26. Emotional Intelligence.
  27. Polarity Mapping
  28. Cost Mgt, Profits, life-cycle costs, tangible/intangible cost & benefits, Direct & Indirect costs reverses & so on...
  29. Information Distribution.
  30. Risk Management Process? RMMM plan?
  31. How change management affects a system?
  32. Difference between Monitoring and Controlling.
  33. Payback period, Earned value analysis, Project Estimation, Matrix Organization. Explain.
Please comment below as to how do you want the Notes to be uploaded on this site. The answers to these questions first or Unit-wise? 

 Thanks!!!