Beruflich Dokumente
Kultur Dokumente
and
Department of Information Technology
GITAM Institute of Technology
GITAM (DEEMED TO BE UNIVERSITY)
(Estd. u/s 3 of the UGC Act, 1956), NAAC Accredited with `A+’ Grade
Gandhinagar Campus, Rushikonda, Visakhapatnam-530 045, A.P., India
Syllabus:
Reference Books:
1. Dipankar Deb, Rajeeb Dey, Valentina E. Balas, Engineering Research
Methodology, A Practical Insight for Researchers, Springer Publications, 2019
2. C. R. Kothari, Research Methodology – Methods and Techniques, New Age
International Publishers, 2004.
3. David V. Thiel, Research Methods for Engineers, Cambridge University Press,
2014.
Syllabus:
COMPUTER ORGANIZATION:
Logic functions, minimization, design and synthesis of combinatorial and sequential circuits.
Machine instructions and addressing modes, ALU and control, memory interface, I/O
interface(cache, main and secondary storage.data path and hardwired), serial communication
interface,cache, main and secondary storage.
SOFTWARE ENGINEERING:
Information gathering, requirement and feasibility analysis, data flow diagrams,
processspecifications, input/output design, process life cycle.
THEORY OF COMPUTATION:
Finite automata, Regular expressions, Context-free grammars
Reference Books:
COMPUTER ORGANIZATION:
1. M. Morris Mono, Computer System Architecture, 3/e, Pearson education, 2008.
OPERATING SYSTEMS:
1. Abraham Silberchatz, Peter B. Galvin, Greg Gagne, Operating System Concepts with
Java, 9/e, John Wiley, 2016.
SOFTWARE ENGINEERING:
1. Roger S. Pressman, Software Engineering: A Practitioner's Approach,7/e, McGraw
Hill, International Edition, 2009.
THEORY OF COMPUTATION:
1. John E. Hopcroft, Rajeev Motwani and Jeffrey D. Ullman, Introduction to Automata
Theory, Languages and Computation, 3/e, Pearson, 2008.
Model question paper
a. Conclusion.
b. Abstract.
c. Introduction.
d. Results.
Section - B
Part – B: Common for Computer Science & Engineering and Information Technology
Max Marks: 70
Section – A
(i) avoid accidental deletion of required data when some data is deleted
(ii) eliminate inconsistencies when a data item is modified in the database
(iii) allows storage of data in a computer’s disk
(iv) used in database management system
(a) i and iii (b) i and ii (c) ii and iii (d) ii and iv
2.Which of the following sorting algorithms can be used to sort a random linked list with
minimum time complexity?
3.A process executes the code. How many child processes are crated?
fork()
fork()
fork()
4.
5.
Section - B
A )LL(1) but not LR(1) b) LR(1)but not LR(1) c) Both LL(1)and LR(1)
d)Neither LL(1)nor LR(1)
2.An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses
available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to
Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which
of the following is a valid allocation of addresses to A and B?
3.Consider the CFG with {S,A,B} as the non-terminal alphabet, {a,b} as the terminal alphabet, S
as the start symbol and the following set of production rules. Which of the following strings is
generated by the grammar?
S -->aB S -->bA
B --> b A --> a
B -->bS A -->aS
B -->aBB A -->bAA
#include <stdio.h>
intmain()
{
intvar; /*Suppose address of var is 2000 */
void *ptr = &var;
*ptr = 5;