Sie sind auf Seite 1von 80

BACHELOR IN COMPUTER APPLTCATIONS Term-End Examination June, 2006 CS-60 : FOUNDATION COURSE [N @ MATHEMATICS COMPUTING IN

Time :3 hours Note : Maximum Marks : 75

Question no. t is compulsory. Attempt any three questionsfrom Q. no. 2 to 5, Cslculators are not qllowed.

1.

(a)

Find the maximumpossible domain of the function f, definedby f(*) : /-^:\/*"-9

(b)

Which of the following statementsare true- ? Give reasonsfor your answer. 10 - 1 (i) The directionratios of * 2 a r e2 , 3 , 7 .

=*#,2=7

(ii)

All the planar sections of a hyperboloid are hyperbolas.

cs-60 o

P.T.O.

(iiil f(x) = cos x + sin x is an odd function' (iv) {1, 0, IGNOU} is a set. M u*3 * bx2 + cx i d = 0, d, b, c, d e Rhas three roots in R. Find the length of the major and minor axes, and the eccentricity of 3x2 - 4Y2= 72.

Find +l

| *2r-*2\ I sin-l1cos5t)dtl. I -5 J dxl

"^L

of Taking four sub-divisions the interval [0, 4], find


4

an approximate value of Trapezoidalrule.

O. [ J o;_+ x ' 1+

using the

Can the following system of equationsbe solved by Cramer's rule ? If yes, apply the rule to solve it' Otherwise apply the Gaussianmethod to solve it 2x-3y+42:5, 7x+4-y-82, x+8y-42+19=0' / r-;-rm

If y:
(*2 -

[.-J.'-n J

that show , th e n
*2) yn : 0'

4lvn*2 + (2n + 1)xgn*r + (n2 -

cs-60 @

2.

(a)

Find all the points of continuity in R of the function f, definedbv -*2 5x-4 f(x) = 4 x 2- 3 x 3x if x<o if 0<x<1 if 1<x<2 if x>2

'

(b)

Evaluate

t J
(c)

1+x*

2 . x- +rr ax

Find the equationof a right-circular cylinder having for its basethe .u*" *2 + y2 + t2 = 9, x - y + z : 3 . Using Rolle'stheorem, show that there is 0 e l- 1, 1[ suchthat sin 20 = - 4g3. Prove that
n12

(d)

3.

(a)

i
r

-uA

I (b)

, cosnx+sinnx

cosnx

7r 4

Find the volume of the solid generated by the revolution of an arc of the cycloid x = a(0 + sin0), y = a(1 - cos0) about the x-axis. 4

cs-60 @

P.T.O.

(c)

Solve the equation *4_ 4*2+8x+35=0,

giverl that one of the roots is 2 + iJ3 ' (d) For which valuesof l, e R does the plane S f I = x + y + z = ) " t o u c h = x 2+ y 2 + 2 2 : 7 ? Also find the points of contact of those planes II that touch S. 4. (a) (b) Find all the 5th roots of 5i 2.

Find all the asymptotesof the curve (*2-7x+6\y=x2+3x-1. Prove that the cone = g ryz * by2 * .r2 * 2fyz + 2gzx + 2hxY possesses three mutually perpendicular tangent planesif and only if bc + ca + ab = f2 + 92 * h2. 4

(c)

(d)

Find the upper and lower product sums of f, defined e by f(x) : l, wiih respect to the partition P : {1, 3, 5, 7} of [1, 71. 3

5.

(a)

If a > b > 0, and n N, show that n-1 a ' - 1 + b a ' - 2 + . . . + b ' ' ' - 1 > n ( a b ;z ' Hence prove that a'n-1 b' > n(ab) 2 (a b).

cs-60 @

Reducethe equation *2-3*y +y2-6x+6y-2=O to canonical form. Hence identify the conic it represents.Also draw a rough sketch of the conic given by the equationabove. Find an approximate value of (O.OS1s/zusing Maclaurin'sseries,upto 3 decimalplaces.

cs-60 @

8,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2OOG CS-62 : 'C' PROGRAMMING @ AND DATA STRUCTURE
Time : 2 hours Nole ; Maximum Marks : 60

Question no. I is compulsory. Answerany three questionsJrom the rest. All algorithms should be written nearer to 'C' language.

l.

(a)

Write a non-recursive function to traverse a tree in postorder. Apply the function on the following tree. 10

cs-62 o

P.T.O.

(b)

How

(c)

is a graph representedby an adjacency matrix ? Write any two drawbacks of such a representation. betweenbinary searchand Give any two differences linear search. Also, write a function to implement the binary searchalgorithm.Show the output of the 10 algorithm using an example. Write five differences between Sequential file organisation and Direct file organisation.

(d)

2.

(a)

(b)

Write an algorithm to evaluate a Postfix expression by using a stack. Illustrate the working of this algorithmwith a suitableexample. Compare the Best and Worst case complexitiesof Merge Sort, Quick Sort and the Bubble Sort algorithms.

3.

(a) (b)

Write a program in C to sort a singlelinked list. Also list convertthe sorted.linked into a circularlinked list. Define the followingterms i (i) (ii) Spanning tree Weakly connectedgraph

7 3

(iii) B-Tree 4. (a) Define a circular queue. Write an algorithm to implementthe insertionand deletionoperationsin a circularqueue. 'Call by value' and Give any two differencesbetween 'Call by reference' methods. Also, give an example for each method.

(b)

cs-62 o

5.

Explain the following, with an example of each . (i) (it (iii) (iv) (v) L value Heap Height-balanced-tree Garbagecollection Row major order

j0

cs-62 o

7,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006 TO CS-ffiO : INTRODUCTION SYSTEM SOFTWARE
Maximum Marks: 60

Time : 2 hours Note:

Question number 7 is compulsory. Answer ony three questtons t'rom the rest' Explain any two approaches of the compiler development. flow Write an algorithm, and draw a corresponding cirart, to find the sum of a 4-digit number, and also to print the number in reverseorder. Explain at least 5 characteristics of a distributed operatingsYstem. Explain the method to change the file permission modes using octal formi in UNIX' wiih th'e help of an example.

l. ,

(a)

(b)

(c)

(d)

cs-63 @

P.T.O.

(e)

Write a shell program which will display a menu as shown below, and perform the desired' function basedon the user'schoice : FUNCTIONS MENU 1 _ PRINT-SORTED-LIST-OF-USERS 2 - COUNT-USERS WHO LOGGED.ON TO THE SYSTEM 3 - COUNT-FILES-IN THE CURRENT DIRECTORY Type your choice from the above. 7

2.

(a)

With the help of a diagram, explain dynamic partition memory management. What are the advantages of dynamic partition over fixed-size partition of memory ? the Mutual Semaphores Solve Exclusion Problem using

(b)

3.

(a)

What are the outputs for the following UNIX commands: (i) (ii) head word list i wc who i wc-/

(iii) wc-cwl myfile (iv) cat < poem > poem.bak (v) kill 905

(vi) cal 06 2OOS calendarfile > (b) Describethe characteristics a file systemin UNIX. of 4

cs-63 @

P.T.O.

4.

(a)

while designingthe GNe 4 criteria to be considered system' debugging user interface{or any interactive which arrive Considerthe following set of processes in readYQueue at the sametime :

(b)

PROCESS P1 P2

CPU time

4
7

P3
P4

3
6

Calculate the average turnaround time and average waiting time for the following scheduling algorithms : SJn FCFS and Round Robin (Quanium = 2) 5. (a) that are Explain any two file protectionmechanisms neededin a multiuserenvironment' What is a loader ? Explainits functions'

5 5

(b)

cs-63 @

6,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006 TO cS-64@ : INTRODUCTION ORGANISATION COMPUTER
Time : 3 hours
Note :

Mqximum Msrks : 75
Answer any

Question number 7 is compulsory. three questions from the rest.

1.

(a)

Using

2!s

complement

notation

perform

the 6

following arithmetic operations using 8 bit registers' Also indicate overflow, if anY :

(i)

27 - (- 100)

(iil 62 + 66 (iii) -28 100

(iv) 15 - (- 16) (v) 35 15

(b)

Draw the logic circuit for one stage of full adder' Implement a full adder using a decoder.

cs-64o

P.T.O.

(c)

Write a program in 8086 assemblylanguage to reverse a string. Assume that the string terminates with a '\0'. Assumethat the string is stored in the memory. What is a Fetch Cycle ? Explain the steps performed during the instruction 'fetch', with the help of micro-operations. A digitalcompuferhas a memory unit of 64 R x 16 and a cache memory of 1 K words. The cache uses direct mapping with a block sizeoI4 words. (il How many bits wilt there be in the tag, index, block and word fields of the addressformat of cache? How many blocks can cache accomrnodate?

(d)

(e)

(ii)

2.

(a) What is a micro-operation ? What are horizontal


vertical microinstructions ? How are micro-operation, microinstruction and microprogram related to each other ? (b) What is a parity bit ? How is it usedin a single-error correction code ? Find the length of a SEC code and a SEC-DED code for a 16-bit word data transfer.
(c)

and

Draw the logic circuit for a register with parallel input-output. Make assumptions,if any.

cs-64@

3.

(a)

Explain the von Neumann architecture, with the help of a suitablediagram. Also give an advantage and a disadvantage this architecture. of

(b)

Write the syntax and functions of the following 8086 assemblylanguageinstructions: (i) CALL

(ii) TEST (iii) xcHG (iv) DAA (c) for Write an instructionsequence evaluating A x B/ C + D * E using 2 and 3 addressinstructions. 4. (a) Write an 8086 assemblyprogram to find the sum and averageof a given finite set of numbersstored in an array in the memory.
(b) Construct an 8 x 1 multiplexer using 4 x 1 5

multiplexers. Make assumptions,if required. (c) What are the advantages and disadvantages of architecture ? Describe this

evaluation-stack

architecture with the help of an example .

cs-640

P.T.O.

5.

Explain three differencesbetween each of the following 15 pairs : (i) (ii) Hardwiredcontrol vs. Wilkes control Direct cache mapping vs. Set associativecache mapping

(iii) Contact and Aerodynamichead mechanisms hard in disks 1 (iv) 2 D chip organisation 22 D chip organisation vs. (v) Unencodedand Highly encodedmicroinstructions

cs-64@

6,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2OOG CS-66O: MULTTMEDTA


Time : 2 hours Note : Maximum Marks : 60

Question number 7 is compulsory. Attempt any three questionsfrom the rest. What is multimedia? Explain three advantages and three disadvantages using multimediaapplications. g of Fxplain the role of multimedia in the area of publication,with a suitableexample. Explain five featuresof MacromediaDirector. Explain the copyright issues in the context of multimediaapplications. Explain five major challengesfor the multimedia developers. Explainthe use of any one componentof multimedia in E-commerce applications.

1,

(a)

(b)

6 s

(c) (d)

(e)

(f)

cs-66@

P.T.O.

2.

(a)

Explain four major components of multimedia' in the Explain two frequently used file extensions case of multimediaaPPlications field of Explain the effeci and changes in the usageof multimedia' with the increasing business What is Quicktime? Also explain its working' Explain the processof planning of any multimedia application,with the help of an example' What is a hypertext? Explainfour main applications of hypertextwith an exampleof each' for Explain the role of a program storyboard templates multimedia projects' List four common in a Program storyboard' lsed transfer' Explain the role of multimediain knowledge with an examPle. is useful Explain, with an example,how multimedia training (CBT)' in creation of computer-based

(b)

3.

(a) (b)

4-

(a)

(b)

5.

(a)

(b)

cs-66@

5,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, ?OOG NETWORKS CS-68@ : COMPUTER
Time : 3 hours Note : Maximum Marks : 75

Question number 7 is compulsory. Answer any three questionsJrom the rest.

l.

(a)

What

are

the

differences

behveen

computer 4 ? List their 3

networks and distributed systems ? (b) What are 'piggybacking' and 'pipelining'

advantages. (c) What are the principles that were applied to arrive at the seven layers in an OSI model ? (d) Differentiate between the following : (i) (ii) (iii) Analog and Digital data Baud rate and Bit rate Bridges and Gateways

5 15

(iv) Upward and Downward multiplexing (v) (e) Token ring and Token bus 3

What is congestion ? How does it occur ?

cs-68 @

P.T.O.

2.

(a)

Differentiate between the following : (i) (ii) TCP and UDP Internetand Inhanet

10

(iii) Hub and Switch (iv) Virtual Circuit serviceand Datagram service (b) Explain the carrier sensing protocol and give its advantages over ALOHA. Which CSMA protocol is widely usedin a LAN environment,and why ? Explain the use of a modem, and the difference betweenthe ASK, FSK and PSK modems. How is connection established and released in a transport layer ? Explain this, using a timing diagram. Differentiate between baseband and broadband communication. Explain each of the words in "lntegrated ServicesDigital Network". Explain the different basictypes of ISDN services. 4. (a) (b) (c) Explain the differences between Packet and Cell switching. What are the three factors that determine whether a communicationsystemis a LAN; MAN or WAN ? Explain the various transmission modes. List the basic network topologies. For each of these topologies, explain what happens if a single cable fault occurs. Explain the limiting factors on the sizeof the bus network topology.

3.

(a) (b)

(c)

(d)

cs-68 @

5.

(a)

Explain the functionsof the followingprotocols : (i) RIP

(ii) osPF
What is DNS, and its purpose ? Give any two domain namesalong with their meanings' How does an ATM network work ? Explain this diagram. using an aPProPriate

cs-68 @

5,000

BACHELOR IN COMPUTER APPLICATIONS


Term-End Examination

June, 2006

CS-69@ : TCP/IP PROGRAMMING


Time : 3 hours Note .' Mqximum Marks : 75

Question no. I is compulsory. Attempt any three questionsfrom the rest. Explain the detailedprocedurefor routing a packet in the TCP/IP network. Also, explain the use of 'routing 'gateway' and table' during the routing of a packet.

l.

(a) '

(b)

Identify the address class of the following IP addresses : (i) 797 .702 . O52.002

( i i ) 2 1 6. 8 . 2 . 2 ( i i i )7 2 . 6 . 2 . 0 (iv) 140 . 156 . 15 . 15 (c) What are the different types of IP address components? Also, explain the different IP address and their formats. classes P.T.O

cs-6e o

(d)

What are the two' reasons for having layered architecturesin the networking models ? How many layers are there in the TCP/IP model ? List any three functionsof-eachlayer of theTCP/lP model. Explainthe IP subnetaddressing, with the help of an example. betweenTCP/IP and OSI Write any two similarities ReferenceModel. Explain the importanceof the followingTCP header 10 fields in network communication: (i) (ii) Sequence number Acknowledgementnumber

(e)

(f)

2.

(a)

(iii) Window (iv) Urgent pointer (v) (b) Option + Padding

How much data can be carried within an IP datagram ? Also explain how IP datagrams are deletedfrom the network. Which transport layer protocol is appropriate for th'e following applications, and why ? (i) (ii) Multicastcommunication File transfer

3.

(a)

(iii) Remotelogin (iv) E-mail (v) Voice packet

cs-6e @

(b)

Explain the retransmission and dispatch of a TCP segment on (i) (ii) time-over,and without any acknowledgement

10

Also draw a diagramfor each case. 4. (a) Designan algorithmeach for a UDP client and for a UDP server,where the client should prompt a user to enter two numbers,and send it to the server.The server should listen to the clients concurrentlyand print the sum of the given number with the client name on the screen. 10 "Clients are often easierto build than a server and usually require no system privileges." Why ? Also explain the different special systeh privileges requiredfor designinga serversoftware. 5. Write any three differences betweeneach of the following pairs : 15 (i) (ii) TCP/IP and OSI model Upward and Downwardmultiplexing

(b)

(iii) Gatewayand Bridges . (iv). Connectionorientedand Connectionless services (v) Flow control at Data link layer and at Transportlayer

cs-6e o

5,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006


TO CS-70@ : INTRODUCTION SOFTWARE E N GIN E E R IN G
T i m e: 3 h o u r s Note : Mqximum Mqrks: 75

Question no. I is compulsory. Answer any three auestiansfrom the rest.

1.

(a)

briefly three ? specification Describe What is baseline types of baselinespecifications. 7 software project

(b)

What

are the three P's of

management ?

Describe three generic team I

organizations.Describe the factors that should be when planninga structureof a team. considered (c) four types of CASE tools. Give three Briefly describe benefitsof using a CASE tool. , (d) Describe briefly any four qualities of any software product.

cs-70 o

P.T.O.

2.

(a) (b)

Explainthe phasesof the softwarelife cycle.Also list 4 modelsof SLC. Define the following : (i) (ii) Technicalplanning Project tracking

7 4

(iii) Deliverytimings (iv) Partial recovery (c) , Describehow a 4GL helps to solve a problem. Also explain two featuresavailable a SGL but not in a in 4GL. Describe the concepts of coupling, cohesion and abstractionin the context of softwaremodules. What is SoftwareQuatityAssurance Describethree ? utilitiesthat are performedbV SQA. Describefour capabilities a debugger. of Write the processof scheduling project. a What is a software crisis? Describesix caseswhich contribute to a software crisis.

3.

(a) (b) (c)

6 s 4

4.

(a) (b)

5.

(a) Describe briefly five tools used for project


management. (b) Consider a "Hostel Management System". The systemshould allot rooms to studentsbasedon their preferences. Prepare an SRS document for this system, and also uncover the deficienciesof this document.Also make a corresponding DFD. 70

cs-70 @

6,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006 ORIENTED CS-71O : COMPUTER TECHNIOUES NUMERICAL
T i m e: 3 h o u r s Note: Maximum Marks : 75

Question number 7 is compulsory. Attempt any three quegtionst'rom Q' 2 to Q. 5' Calculators are not allowed. Unless otherwise stated, should be done upto 3 decimalplaces' calculations

l.

(a)

Show that there existsa root of f(x) = ;3 - 3x + 1 = 0 in the interval(0, 1)' Derive that a suitablefixed point iterationxk*1 = Q(xu).such the method converges.Then, iterate two usingxO=03' - 2, Suggest a way to calculate f(x) = {A + 4 correctly(to avoid loss of significantdigits),if we use four decimal arithmetic to compute f(x) when x is near 0. times

iUl

cs-71 o

P.T.O.

(c)

By inverse Lagrange interpolation, find the value of x' when y =. 2'0 from the table of valuesbelow : x

0
L

2
4.4

v
(d) (e)

7'6

Obtain a bound for the error in linear interpolation. The initial value problem y' = 3ty, y(1) = 2 is given. Find y(1'1), using the classical Runge-Kuttamethod of fourth order.

(0

Write the expressionfor the bound of the error in Simpson'sone-third rule of integration.Hence, find the minimum number of intervals required to 1 f d x evaluate with an accuracyof 1 x 10- 6: J dh 0 Determine 67/3 using two iterations by the NeMon-Raphson method. Take the initial approximationas 2. Using Gauss elimination, check whether the given system of equationsis consistent.If it is, solve it., Otherwise obtain the determinantof the matrix of coefficients. x1+x2+x3+2xn=g 4xr+x2+x3+xn=g 2xr+Sxr+xr+2xn=7 4xr+xr+8xa+x4=2A

2. (a)

(b)

cs-71 o

(c)

in reading, Km/min, of a car moving The speedometer on a straight road is given in the following table' Estimate the distance travelled by the car in 16 rule. minutes,usingthe trapezoidal Time (in min.) Speedometerreading

2
4 6 8 10

0 6 9 14 79 13
1

72
1,4

t6
(d)

Let f be the constant function f(x) = c V x e R' Show that the Simpson'srule gives the exact value

o f I f d x f o r a n y a , b e R ,a < b .
J a

b I

3.

(a)

Construct the divided differences table for the following data :


X

f(x)
I

0 1

2
4 5

33
225 426
(1'5).

Hence, find an approximation to

6 P.T.O.

cs-71 o

(b)

From the following data of values of a function f(x), compute approximations f'(3.0) and f"(3.0) using to Lagrangeinterpolation.
X

3.0

3'2

3'5

f(x) 4. (a)

1.098 1.163 I.252

Find an approximationto y(1.2) for the initiaLvalue problem9' = x2 + y2, y(1) : 2, with h = 0.1, using Taylor seriesmethod of O(h2). Which of the following are true ? Give reasonsfor your answer. (i) (ii) Rounding off 20'39801 to 3 significantdigits gives20'398. Any number has a unique floating point representation.

(b)

(iiil Truncation error is not the same as round-off error. (iv) Every algorithm exhibitsa linear growth of error. 5. (a) Derive the Gauss-Seidel method in matrix form for the solution of the system of equations Ax = b. Hence, derive the matrix formulation of the Gauss-Seidel method for the following system of (no iterationsare.to be performed): equations

-rl t.l l-4 - 4t - 1 1[.r I | | 1 l*zl=


I r
cs-71 @

L-4)L*rl

l-41
t-2 )

(b)

Using four decimalarithmetic,show that ah - c) * ab - ac; wherea = 0'3333 x 101, b: 0'2323 x 101, c = 0'2313 x 101. Obtain the stability interval for the third order polynomialapproximationof cos x.

(c)

cs-71 @

6,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006

CS-72@ : C++ AND OBJECT RTENTED O P R OGR A MMIN G


Time : 2 hours Note : Mqximum Mqrks, 60

Question no. I is compulsory. Attempt ony three questionsfrom the rest.

l.

(a)

Explain the role of inheritance in Object Oriented Programming, with a suitable example.

(b)

Define static binding. Give an example to demonstrate its use. Give .advantages and disadvantages of static binding.

(c)

How is a function overloaded ? Explain this with an example using C++.

(d)

Explain the difficultieS encountered in the usage of multiple inheritance, with an example.

cs-72@

P.T.O.

(e)

Explain the utility of templateswith an exar'rple' the Write a program in C++ to demonstrate concept of a virtual function. Explain the various access specifiers available in C++, and differentiatebetweenthem with the help of an example.

(fl

2.

(a)

(b)

(i)

Give two distinct situations,with justification' in which a constructor would need to be overloaded.

(ii)

Can a destructor be overloaded? Give reasons for vour answer.

3.

Create a classComplex and implernent the following : o . . and destructors define suitableconstrutors overloadthe oPerators+ and write a friend function surn which adds the real and imaginarYParts a comPlex object Explain the 'use case diagram'' When are such diagrams used ? What are the steps involved in drawing such diagrams ? Write a program in C++ to copy a file to another file using streams.

10

4.

(a)

(b)

cs.72o

5.

following features of Object Oriented Programming. Yorir explanation shouldincludeexamples. 1 0 (i) (ii) Data abstraction Code reusability

Explain the

(iii) polymorphism (iv) Exceptionhandlinq

cs-72o

5,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006


CS-73@: THEORYOF COMPUTER S C IE N C E
Time : 3 hours Note: Maximum Marks : 75

Questionnumber 7 is compulsory. Answer ony three questionst'rom the rest. If L, and L, are the two regular languages, their is union L, U L, also regular ? Give reasonsfor your answer. Construct a finite automata correspondingto the regular expression 10 + (0 + 11)0-1 Explain the following notations for growth rate of functions :

l.

(a)

(b)

(c)

(i) c
(ii) f)

(iii) o

cs-73 @

P.T.O.

(d)

(il (iil

What is the Post CorrespondenceProblem ? Does the following PCP instance have a solution? Give reasons.

x 10, 01, 100, 1 y 101, 100, 00, 010 (iii) Given a PCP instance,is it possibleto construct a TM to decide if the instancehas a solution ? Give reasonsfor your answer.
(e)

Let M be a Turing machine and L be the language accepted by M. How will you construct a Turing all machine Ml which enumerates stringsin L ? are both recursively enumerable If L and t is ? languages, L recursive Give reasons. and State the pumping lemma for regularlanguages prove that the language L={aPlpisprime} is not regular.

(fl

2-

(a)

(b)

Designa Turing machinewhich acceptsthe language 1=lwwrlwe(a,b).1

3.

(a)

(i)

What is the Chomsky Normal Form for a context free grammar ? Can every CFG be converted into Chomsky Normal Form ? Give reasonsfor your answer. Convert the following context free grammar to Chomsky Normal Form : S + aSa, S -+ bA, A -+ bA, S -+ b, A -+ b

(ii)

(iii)

cs-73 o

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006

C S- 7 4O

T : IN T R OD U C T IONO INTERNET P R OGR A MMIN G


Maximum Mqrks: 75

Time : 3 hours Note :

Questionnumber 7 is compulsory Attempt any three questionsfrom the rest. What is a class? Differentiatebetween an instance variable and class variables' Give an example in support of your answer. What is an array ? Write a program using an array to createan output as given below : 2 3 5 4 6 7

1.

(a)

(b)

8 9 1 0 1 1

cs-74 o

P.T.O.

(c) (d)

Why are pointers not allowed in Java t *nu, rl.lt,, happen if pointersare allowed? Identify and correct the errors in each of the following statements i (i) if (c < 7h ("C system.out.println is lessthan 7"); (ii) if (c => 7) ("The no. greaterthan 7", C); system.out.println

(e)

Write a program that demonstrateshow various exceptions(e.g. Arithmetic Exception,Array Out of Bound Index)are caughtwith Catch (Exceptionexception);

(f)

of Explain JVM, JIT Compiler and the Robustness Java.

2.

(a) (b) (c)

Explain, with the help of examples,the purpose of Border Layout in Java. Write a program to calculate the areas of a rectangle,squareand circle using an abstractclass. What does extends keyword mean ? Explain this usingan example.

4 I 3

3.

(a) (b)

? What are wrapper classes Give examplesof three wrapper classes along with one method used,for each. Differentiatebetweenthe following : (i) (ii) final and finalize paint ( ) and repaint( )

4 9

(iii) vector and stack

cs-74@

(c)

Give the output of the followingcode : public classiest { public staticvoid main (stringargs [ ]){ bYtex : 3; _ x=(byte) x; system.out.println value of x is : " +x); ("

l l
4. (a) What are modifiers ? List 3 modifiers availablein Java, and explaineach of them through an example. "A superclass object can refer a subclass object." Is the statementcorrect ? Explain this with the help of a small program. (c) Which is the smallest packageavailable Java, and in what does it do ? Give the output of the following program, and an explanationof its functioning: public classtry { publicstaticvoid main (stringargs [ ]){ Stringstrl : " abc',; Stringstr2 - "def "; String str3 : strl . concat (str2); strl . concat (str2); System.out.println (str1); 4 ?

(b)

(d)

cs-74 @

P.T.O.

5.

(a)

Write an applet that should accept a four digit number in a text box and display this number in a reverseorder in another text box at the click of a button. Differentiate between a string class and a string buffer class,using examples.

(c)

Write a program to print if a string is a palindrome, using commandline arguments.

cs-74 @

5,000

(b)

What is Lu ? Is Lu recursivelyenumerable ? Justify your answer. Describethe Halting problem of a Turing Machine. Is this problem decidable Why or why not ? ? A lJamiltonian path between vertices s and t is a path that includesall verticesof the graph, exactly once and starts at s and ends at t. Show that the Hamiltonian path problem is Np_complet e by reducingthe Hamiltoniancycle problem to it. What is the lexical analysisphase of compilation ? How are regular expressions used in this phase ? Give the processinvolved.

(c)

4.

(a)

(b)

5.

(a)

When is a context free grammar ambiguous ? Give an example, with justification, of an ambiguous CFG. Is it possible decidewhethera given to CFG is ambiguous? Give reasonsfor your answer. g What is the Chomsky hierarchy ? Give examples, with justificationof languages which are (i) (ii) Type 0 but not Type 1 Type 1 but not Type 2 7

(b)

(iii) Type 2 but not Type 3

cs-73 o

5,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006 C S- 7 5 O : IN T R A N E T D MIN |S TRAT|ON A


Time : 2 hours Note :
Mqximum Marks : 60

Questionno. I is compulsory. Ansuterany three questionslrom the rest. What are the software and hardware requirements for the installationof an Intranet having 295 client machines(computers) ? s Give any five differences the featuresof IIS and in Samba server. What is the process of configuring a maximum simultaneous requestand listen queuesize ? How is public key infrastructure used to implement securityin an Intranet? Also, explainthe importance of digital certificates. Give any five important featuresof an editor tool. Write the steps required to create roaming user profile. Also, give the stepsfor deletingit.

l.

(a)

(b)

(c)

(d)

s s

(e) (f)

cs-75 o

P.T.O.

2"

(a)

What are the categoriesof Intranet ? Write one feature of each also' Give the messageformat of ARP' Also, explain the purpose of the following fields : (i) HLEN

(b)

(ii) PLEN 3. (a) What is groupware? What are variousnews services with resPectto grouPware? What are two benefitsof usingweb authoringtools ? Explain the usesof web authoringtools'

(b)

4.

(a) 'If a LAN has a subnetmask oI 255'255'0'0, how ? ? a 727.0.0.1 address What is Broadcasting (b) Explain the purpose of the following commandsin an Intranet Anternel. Write their complete syntax also. (i) (ii) STAT in POP RETR msg in POP 5 5

5.

(a)

Write any two disadvantages of CGl-based applications.Also, explain how these disadvantages 5 in are overcome ISAPI. How does the wirelessdatagram protocol differ from the user datagramprotocol ? Explainthe importance of SMS, CSD and USSD in the wirelessdatagram protocol. 5

(b)

cs-75 @
e

5,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006

CS-601 : DIFFERENTIAL AND TNTEGRAL @ CALCULUS WITH APPLICATIONS


Time : 2 hours Nofe ; Maximum Marks: 60

Questionnumber 7 is compulsory. Attempt any tht'ee questionsout of the remaining questions.

l.

(a)

State whether the following functions are true or false. Give reasonsfor your answers. (i) The maximum possible domain of f, defined by

10

= f(*) ,1"'*3, isI - 1,-[. x+r


v
(ii) f(x) = ;a 5*'y2 + Zxy + 3y2 is an even function of both x and y. (iiil A criticalpoint of a function is also its extreme point.

cs-601 o

P.T.O.

(iv) The curve r = 3 cos 30 is symmetricabout the initial line. (v) The curve *3 at (0, 0). *2 + 2xy y2 = O has a cusp

( b ) F i n dL ( P ,f ) i f f ( x )= 3 x is a partitionof [0, 81,

1 a n dP : 1 0 , 2 , 4 , 6 , 8 1

(c) Find*ifv=l d x

d,

f - u ? " i-n ( S c,o,s)t ) d t l s


\ ,3

-I

(o,

[0, 0(x<1 lr r(x, = 1 12, 1<x<3 find


ft ., \ |

(i)

.+ x-+L

lim

f(x)

(i0

x -+3(iii) lim f(x) x-+1lim f(x) x-+0+

lim

f(*)

(iv)

(e) Findf'(x)when f(x)= s.r..h(ln x). (0 Findall the symmetries the curvey = + . of X

3 4

cs-601 @

(d

Match the functionswith their derivatives : f'(x)


(i) sin
_ l

^x

1 +x 2
1

cos

^x

-1

-1 (iii) t. a n - x

(iv) c o t ^ x
f

sec

-'l

^x

(vi) cosec - x
1

2.

(a)

Find the approximatevalue of e0'3, rounded off to two decimalplaces,using Maclaurin's theorem. If f(x) = x [x], find lim
x-+3-

(b)

f(*)

and lim
x+3-

f(x). Is

f(x) continuous at x = 3 ? Give reasons for vour answer.

3.

(a)

Find the equationof the normal to the curve, x = 2 cos t, y = 3 sin t at the point given by
t = TE - .

3 P.T.O.

cs-601 o

(b)

Which of the following are increasing, decreasing or

neither ? Why ? (i) 9=1+cosxonl0,n/2) (ii) y : (x + 1)2 on [0, 1]


1

(c)

Evaluate *'(*t + 1)3dx. J


0 tann x d*, Derive the reduction formula for J (n > 1). Find all the asymptotes the curve of *2y2=91x2+y21.

4.

(a)

(b)

5.

(a)

with respect Differentiate (2x +I\5 (x + 1)a(x + 3)2 to x. Find the volume of the solid of revolution obtained by revolving the triangle with vertices(0, 0), (3, 0) and (0, 4) around the y-axis.
dx rule UseSimpson's to evaluate ---n, J 1+x" 0 h : 1, upto two decimal places.
6

(b)

(c)

Wltn

cs-601 @

1,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006

l C S - 6 1 O @ , F O U N D A T I O N O U R S EN C EN GL IS H OR C OMP U TING F
Time : 2 hours Note : Attempt all the questions. Maximum Marks : 50

1.

Readthe passage that follow : and answerthe questions Revolution, We are still in the middle of the Industrial

'

we had better be, for we have many things to put right in it. But it has made our world richer, smaller,and for the first time ours. And I mean that literally : our world, everybody's world. From its earliest beginnings when it was still dependenton water power, the IndustrialRevolutionwas terribly cruel to those whose lives and livelihood it overtumed. Revolutionsare cruel it is their nature,

cs-610 @

P.T.O.

becauseby definition revolutions move too fast for those whom they strike. Yet it became.in time a social that social equality, the equality revolution and established of rights, above all intellectual equality are some of the values on which we depend. Where would a man like me be, where would you be, if we had been born before 1900 ? We still live in the middle of the Industrial Revolution and find it hard to see its implications, but the future will say of it that in the ascent of man it is a step The Renaissance astride, as powerful as the Renaissance. establishedthe dignity of man, The lndustrial Revolution establishedthe unity of nature. (prom j. Bronowski : The Ascent of Man) (il What has the IndustiralRevolution done to our world ? (ii) What did the Industrial Revolution depend on, initially,for energy? (iiil How has the Industrial Revolution become a social revolution ?
(iv) (v)

Why are all the revolutionscruel ? and the Industrial What have the Renaissance ? Revolution established

cs-61 @ o

2.

(a)

Change the following sentencesinto the passive voice : (i) Sehwag scored a double century against Pakistanin Lahore. The police has capturedthe terrorist. 7 1

(ii) (b)

with the Fill in the blanksin the following sentences given in correct form of the tense of the verbs brackets: (i) (ii) The food kitchen. Usually he _ 6.00 a.m. (burn)when I reachedthe (go) for a walk at (live)in Gurgaonsince 1999.

(iii) I 3. (a) Do as directed: (i) (ii)

The woman with her two children were nearly starving.(Correctthe sentence) We sold all our furnitures. (Correct the sentence)

(iii) The shopkeepers feels acutely discontented when additional taxes are imposed on them. (Correctthe sentence) 1 (iv) Neither of the boys were willing to take the examination.(Correctthe sentence) (u) Tendulkar is great. (Use a suitabletag question) (vi) 15 August 7947 is __________-:_ historical day. (Use a/an) I 1 7

cs-610 @

P.r.o.

(vii) No other metal is as heavy as lead.

(Use comparativedegree)
(vllu He said, "The sun risesin the east."

(Changeinto indirectspeech) (ix) costly;descend. (Giveantonymsof thesewords) 4. Read the passage and summarise in about 150 words. it In spite of all that has been done in recent times to improve the statusof women, the great majority of wives are still financiallydependentupon their husbands.This dependence is in various ways worse than that of a wage-earner upon his employer.An employeecan throw up his job, but for a wife this is difficult; moreover, however hard she has to work in keeping the house she cannot claim rnoneywages.So long as this state of affairs persists, it cannot be said that wives have anything approachingeconomicequalitywith men. Yet it is difficult to see how the matter can be remedied without the establishment of Socialism. It is necessary that the expenseof children should be borne by the State rather than by the husband,and that married women, except during lactation and the latter part of pregnancy,should earn their living by work outside the home. This will require certain architectural reforms, and the establishment nurseryschoolsfor very young children. of For the children,as for mothers,this will be a great boon. since children require conditions of space and light and

1 2
70

cs-6o @ 1

diet which are impossiblein a wage-earner's home but can be provided cheaply in a nurseryschool. A reform of this sort in the position of wives and the rearing of young children may be possible without complete Socialism,and has even been carried out here and there on a small scale and incompletely. Buf it cannot be carried out adequatelyand completely except as part of a general economictransformationof societyr. (264 words) 5. Write a compositionin about 300 words on any one ot the followingtopics : 75 (i) (ii) The Misuseof Computers The Loss of Green Cover

(iii) How the Mobile Telephonehas changedour lives

cs-61 oo

6,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, 2006


C S- 6 1 1 @ : C OMP U T E R U N D A M ENTALS F AND PC SOFTWARE
Time: 2 hours Note : MaximumMarks: 60

Question number 7 is compulsory. Attempt any three auestionsfrom the rest.

1.

(a)

Explain the steps involvedfor each of the following in MS-WORD : (i) (ii) Soft page break Hard page break

(iii) Repaginatio (b) Explain diagrams: (i) (ii) Star Bus the following topologies along with

(iii) Ring (c) Explain any sevenbenefitsof MS-WINDOWS. 7

c s -61 1 @

P.T.O.

(d)

Define Accesstime, Seek time and Latency time of a Winchesterdisk. Write two differences betweenGUI and CUL Write two featuresof each of the following , (i) (ii) PublicSwitchedTelephoneNetworks PublicSwitchedData Networks

6 2 5

(e) 2. (a)

(b) 3. (a)

Explain the RSA approachto encryption. What is parallelprocessing Also, explain the terms ? 'Distributed Architecture'and 'Multi processors'. What are the steps involvedfor creatinga graph in Powerpoint ? Also write the steps {or changingthe graph type. What is RISC ? Write four characteristics RISC. of Explain three featuresof Dot Matrix printing. Also, write two differences betweenDot matrix and Inkjet printing. What are scanners ? Explain Optical Mark Recognition and Optical Bar Code reader techniques. Explain five categories files basedon their type of of information.

(b)

5 5

4.

(a) (b)

5.

(a)

(b)

c s - 6 1o 1

6,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination

June, ?OOG
C S - 6 1 2 @ : P C S OF T WA R E KTLLS S
Time : 2 hours Note : Maximum Marks : 6O

Questionno. I is compulsory. Answerany three questionsfrom the rest. A man who is the owner of a winery, recentlypassed away. In his will be left 21 barrels(sevenof which are filled with wine, seven are half-filledand seven are empty) to his three daughters.However, the wine and barrels must be split so that each daughter has the same number of full barrels, same number of half-filledbarrelsand same number of empty barrels. Note that there are no measuringdeviceshandy. How can the barrels and wine be so divided ?

1.

(a)

(b)

What is u Bro*rn, ? Differentiate between Gopher and World Wide Web browsing mechanisms.

cs-61 @ 2

P.T.O.

(c)

Explain the following functions, giving their syntax and usage : (i) HLOOKUP( )

10

(ii) AND( ) (iiil REPLACE( ) (iv) PROPER( ) (v) CEILING( ) (d) What is a Pivot table ? List the sourcesfrom which a pivot table can be created' Write the steps for creating a Pivot table. Seventeen people correspond by mail with one another, each one with all the rest. In the letters only three different topics are discussed' Each pair of correspondentsdeals with only one of these topics' Prove thal there are at least three people who write to each other about the same toPic. 2. What is Internet ? Briefly explain the working of Intemet' Also explain four methodsof connectingto the Internet' (a) What are charts, and why are they created in Excel ? Explain any six chart components' What are functions ? Explain any four categoriesof functions, giving one example of each category' What is the use of Search Engines on the Internet ? List any six commonly used search engines'

(e)

70

3.

(b)

4.

(a)

cs-612 @

Find the smallestnumber n which has the following properties : (i) (i0 Its decimalrepresentation 4 as the last digit. has It is divisibleby 3 and 8.

(iii) It is a squarenumber. 5. (a) How can we create controls on the worksheet ? Explain any four controls, and how they can be formatted. What is E-Mail ? How is it different from postal mail ? Explain any six componentsof the Message Compositionwihdow.

cs-61o 2

5,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination June, ?OOG


AWARENESS CC-O9O : INTERNET
Time : 2 hours Note: Maximum Marks t 75

any Questionnumber 7 is compulsory' Answer three questionslrom the rest' of List any ten applications lnternet' What is a Browser ? List any two browsers that are availableto browse the Internet' List 6 features of any browser. 10 70

1.

(a) (b)

(c)

Write the step-by-stepprocedure to register and open a new e-mail account' List 5 features of an 70 e-mail software. Explain the usesof the followingInternettools : (i) Telnet I

2.

(a)

(ii) FTP (iii) Usenet (iv) World Wide Web

cc-oe @

P.T.O.

(b)

What is a searchengine? How is it used to find out specificinformation? Write all the stepsinvolved. Write a step-by-stepprocedure to find out an E-greetings website,and send E-greetings a group to of people. 10 Why do we need a securewebsite? Explainthis with the help of an example.

3.

(a)

(b)

4.

With the help of an exampleexplainhow we can perform online shopping to purchasesome books. Write all the stepsinvolvedin the whole process. 15

5 . What is 'Chat' in the contextof the Internet? How can we


chat on the Internet ? List any three free chat providerson the Internet. Also, explain the role of the ,,Messenger" serviceprovidedby many E-mailserviceproviders.

15

cc-os @

1,000

BACHELOR IN COMPUTER APPLICATIONS


Term-End Examination

June, 2006
C C - l 1 @ : V I S U A LB A S I C
Time: 2 hours Note : MaximumMarks:75

Question number 7 is compulsory. Answer any three questionsfrom the rest. Explain the function of a form property window in VB. Indicate at least four elements of it. Also. explainthem. 70

l.

(a)

(b)

Write an event procedure that accepts a string as input and displaysthe reverse of it, as shown in the example below : (For example, if input is : THIS IS VISUAL BASIC EXAM, then output is EXAM BASIC VISUAL IS THIS.) 70

cc-11@

P.T.O.

(c)

Explain each of the following functions with an exampleeach : 10 (i) (ii) Ucase$ Rate

(iii) cDbl (iv) DDB (v) 2. (a) (b) Len

Explain any 5 buttons of a toolbar. Write an event procedure that simulatesa computer keyboard.Designthe samplelayout. Make necessary assumptions.

10

3.

(a)

Write an event procedure for a command button to display integers starting from 1 to x, where x is a positive integer. Design a sample layout for the application,which shouldincludea splashscreen.

(b)

Write the process of creating a form using Data Controls, step-wise.

4.

(a)

What is a Data Manager ? Design a Visual Basic Applicationto automatethe admission processof an educational institution. Give the details of database tables, forms, controls and menu design. Make assumptions, wherevernecessary.

cc-11@

(b)

Define a record. Explainthe processfor performing the following actions : (i) To move betweenrecords

(ii) To add a record (iii) To deletea record (a)

5.

What is a customcontrol ? Explain the two types of controls that VB can use. What is the procedureto load a customcontrol, each time VB is loaded? Write an event procedurefor computingthe area of a triangle. Design a user interface for this application.

(b)

cc-11

1,000

BACHELOR IN COMPUTER APPLICATIONS Term-End Examination


June, 2006 C C - l 6 @ r IN T R OD U C T T ON C++ TO
Time : 2 hours Note : Mqximum Marks : 75

Question number 7 is compulsory. Answerany three questionsfrom the rest. (JseC++ whereuer necessary.

l.

(a)

XYZ is a universitywhich offers admissionto its programmes twice a year, in Januaryand July. After the admissionprocessis completed,they count the number of applications received programme-wise. the applications received for each programme, they count the applications in differentcategories age groups (lessthan or equal of to 25 years,above 25 but less than 45, above 45). Then, they allot studentsof the same age group to a particular set of study centres.In this way, they ensure that students of a programme attached to a study. centre belong to the same age group. Among

cc-16 @

P.T.O.

for Design appropriateclasses the studentallocation system, including constructors, destructors and member functions. Also, write an appropriate main() Iunction. Make assumptions, wherever necessary. (b) Explain the use of "-" with an example. operator in C++ programs'

15

(c)

of Explain the advantages an abstractclass,with the help of an examPle. Explain the conceptof objectorientedprogramming, with the help of an examPle. Write a constructor that initialisestwo matrices in a program in C++ that will add them' Make necessary assumptions. 6

(d)

2.

(a)

(b)

Write a program in C++ that accepts a string as it. input and reverses Define appropriateclasses' 'Macro'' Write an exampleprogram Define the term that usesa Macro. In C++, is it alwayspossibleto instantiatean object of a class? Justify your answer with an example' Define Operator Overloading' Write an example . operators program that overloads Explain the use of 'this' pointer in C++'

3.

(a)

(b)

(c)

5 3

(d)

c c - 1o 6

4.

Explain the term ,Exception Handling,. Write an exampleprogram that incrudes exceptionhandring. (b) Define the terms ,Multiple inheritance, and 'Multilevel inheritance'.Give an example of each. (c) Explain any two modesof opening a file in C++. (a) Write a function template that sorts a set of elements.

(a)

6 4

5.

(b)

Design and implement a class complex, which represents complexnumber. a The classmust have a constructorand a member function _ add, that adds two complex objects. Write a suitable maino function to demonstrate the classabove. 10

cc-16 @

1,000

PREPARATORY PROGRAMME IN COMPUTING (BCA/MCA) Term-End Examination June, ?OOG PREPARATORYPROGRAMME IN COMPUTING
Time : 3 hours Note : l. (a) Attempt any fiue questions.No calculatorsare allowed. : Find the 15m term of the followingsequence 2, 6, 78,54, ... Also find the sum of the first 50 terms of the sequence. of with justification, Give examples, (i) Two irrationalnumberswhose sum is a rationalnumber. Max. Marks: 700

(b)

(ii) Two irrationalnumberswhose product is irrational. (c) (d) (e)


Jolvex-4+VX+D.
a f------7

4 4 4

of between A(a, 2) andB(- 2, b\, if the mid-point AB is C(3, 4). Findthe distance , I f l n 3 - 0 ' 4 7 7 7 w h a t i sl n 9 + t n 2 7 + m l t

2.

(a) Determinethe value of x for which l0

11 t2
3

ol
3 |

= 0'

lo 1 .-21
(b) (c) Find the term involvi.,g y4 in the expansionof (x ' 2y215 checkwhether, I f A = 1 I , 2 , 3 , 4 1 B = { 3 , 6 , 9 } a n dU : { x l x e N a n d l < x < 1 0 } , , (A U Bf, and A' (\ B' are different. Find the derivative,with respect to x, of : (i) f(x) = (x2 f(x) : 3x + 7)2

(d)

(ii)

x2+1 2x-1

YJ
D

PPc @

P.T.O.

(e)

Give an example each of (i) (ii) a 4 x 4 diagonal matrix a2x3matrix

(iii) a2x2unitmatrix (iv) a3x2null 3. (a) (b) matrix 8 and 2x3 + x2 8x 4.

Find the HCF of *3 -

There are 6 computer books and 4 mathematics book on a shelf. In how many ways can you pick 3 computerbooks and 2 mathematics books from them ? Provethat \ + tan2A = seczA, where A is any acuteangle. For A =

4 4

(c) (d)

(r
|^

2')
and B =

(_ 4
I

2.)

_| 12 4)

lr

8)

isnot l, verifythat matrixmurtiprication 4 4

commutative. (e) Find the median of the data below : Class Frequency

60-62 62-64 64-66 66-68 68-70 70-72 72-74


4. (a)

4 6 18 32 25 12 3

Three students B and C are in a swimmingrace. A and B have the same probability A, of winning and each is twice as likelyto win as C. Calculate probabilities A, B, and the of C winning the race. The diameterof a circleis 5 cm. If it is increased 4 cm, find the corresponding by increase in its area. Which of the following pairs of equations are equivalent are inconsistent Find the or ? unique solution if it exists. (i) x+3y7=0,2x+y-4=0 = 0, 6x+ 4y+ 5 = 0 : 0 , x + 4 . 5 y4 =O

(b) (c)

(iil 3x+ 2y-8 (iii) 2x+ 9y-8 (d)

Find the maxitnum possibledomain and range of the function f defined by x- 3. * - 2. f(x)= Also find li2+x ;l!; 2+x

PPc o

(e)

Find the baseanglesof an isosceles triangleif the verticalangle is 80?. Give an example,with justification, the use of similarityin real life, of If cosecA = 2 and cos A is negative,find all the trigonometricratios of angleA. A ladder5 m long, makesan angleof 4|''with the horizontal,and leansagainsta wall. Find the distanceof the foot of the ladderfrom the wall. Draw a suitable diagram. Draw the graph of (x 2) (x + 1) = y.

2 2

(fl
5. (a) (b)

4 4 4

(c) (d)

Draw a histogram for the following data : Class Frequency

20-25 25-30 30-35 35-40 40-45 45-50 50-55 55-50


(e)

3 4 5 11 L2 9 7 4

If two cards are picked from a well-shuffled pack of cards, find (i) (ii) the probabilitythat the first card is a jack or a club. the probability that both cards are heart face cards. ql# ;Tb : 4x3.

6.

(a) (b)

Use the binomial theorem to show that

If the 6th term of an A.P. is 14 and the 14th term is 38, find its first term and common difference.

(c)

Which of the followingare true and which are falseon R ? Give reasons vour answers. 6 for (i) (iil Division is commutative Addition is distributiveover multiplication

(iii) Multiplicationis distributive over subtraction (d) ;i 4 = la,e), B - la, b, c, d, e|, C: diagramsto represent (i) AUD (ii) B-c l a , c , e , g ) and D : {d, e, f, g, h}, draw Venn

PPc @

2,OOO

Das könnte Ihnen auch gefallen