CLICK HERE FOR VARIOUS NEW JOBS 
CLICK HERE FOR VARIOUS EDUCATIONAL NEWS 
CLICK HERE FOR NEW SCHOLARSHIPS 
CLICK HERE FOR ADMISSION NOTICES 
Click And Follow On Google+ To Get Updates
Please Wait 10 Seconds... OR You CanSkip

ADMISSION NOTICES
Scholarships

Scholarship-300x291

BUDGET 2014-15
budget_2014-2015
New Date Sheets
VU SOLVED ASSIGNMENTS
Recent Posts

Posts Tagged ‘SPRING 2007’

VU CS610- Computer Network FinalTerm solved unsolved past papers SPRING 2007

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers SPRING 2007

 

 

 

 

 

 

 

CS610-COMPUTER NETWORKS
FINAL SPRING 2007

 

(1):Given the IP address 18.250.31.14 and subnet mask 255.240.0.0, what is the subnet address?

 

•     18.9.0.14

•     18.240.0.0

•     18.31.0.14

•     18.0.0.14

Answer the following questions:

a.  Why would an internet need an Autonomous System? [3]

b.  What is the difference between an interior gateway protocol and an exterior gateway
protocol? Name an example of each [4]

c.    What is the difference between unicast routing and multicast routing? [3]

 

Answer the following questions:

i.    What is meant by Virtual Private Networks and how guarantee absolute privacy

of packets in it? [3]

ii.  What information are obtained from network sniffer and in which mode Network
sniffer operates? [3]

 

iii. How does a bridge know on which segment a destination computer is attached?[2]

 

 

iv. What is the difference between private network and public network? [2]

 

Suppose an ISP has class B address i.e. 130.8.0.0/16. If the ISP has three customers with only six computers each then determine the following parameters:

a.  Network prefixes assigned to three customers?[3]

b.  Address Mask for each Network prefix?[3]

c.  Lowest Host Address and Highest Host Address of one customer?[4]

In IP datagram header format, what is the value of the data field given H.LEN value of 12 and TOTAL LENGTH value of 40,000?

 

 

 

 

 

 

•     39,952

•     10,048

•     40,012

•     39,988

 

Which of the following is an exterior routing protocol?

 

•   RIP and OSPF

•   BGP

•   OSPF

•   RIP

 

 

 

Given are the five networks connected to each other via routers.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Networks1 is connected to Network 2 through R1-2, Network 2 is connected to the

Network3 through R2-3 and so on.  W represents the weights between network nodes. Host A belongs to Network 1 whereas Host B belongs to Network 5

 

The MTU size of each network is as follows

 

Network        MTU size

No.

1                256 bits

2                 16 bits

3                 32 bits

 

 

 

 

 

 

4                 16 bits

5                  8 bits

Host A sends a datagram of size 256 bits to Host B.

a.  Find out which path will the datagram be adopting in reaching to the destination B
by Distance Vector Routing algorithm. [4]

b.  Which of the routers in the path needs to fragment the datagram? [4]

c.   The original datagram is finally split into how many datagrams to reach at the
destination? [4]

An ARP reply is ——- to —-

 

•   Unicast: one host

•   Unicast: all hosts

•   Multicast: one host

•   Broadcast: all hosts

 

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers SPRING 2007

VU CS403- DATABASE MANAGEMENT SYSTEMS (Session – 5 ) FINALTERM solved unsolved past papers SPRING 2007

VU CS403- DATABASE MANAGEMENT SYSTEMS (Session – 5 ) FINALTERM Solved Unsolved Past Papers SPRING 2007

FINALTERM  EXAMINATION

SPRING 2007

CS403 – DATABASE MANAGEMENT SYSTEMS (Session – 5 )

 

Marks: 100

Time: 150min

 

StudentID/LoginID:

______________________________

Student Name:

______________________________

Center Name/Code:

______________________________

Exam Date:

Tuesday, July 10, 2007

 

Please read the following instructions carefully before attempting any of the questions:1.  Attempt all questions. Marks are written adjacent to each question.

2.  Do not ask any question about the contents of this examination from any one.

a.   If you think that there is something wrong with any of the questions, attempt it

     to the best of your understanding.

b.   If you believe that some essential piece of information is missing, make an

     appropriate assumption and use it to solve the problem.

c.   Write all steps, missing steps may lead to deduction of marks.

 3.   Exam is Closed Book. No handouts or extra material is allowed in exam hall other than rough sheet which will be provided by the examiner.

      4.   Use of cell phone during the examination is strictly prohibited,

otherwise strict disciplinary action will be taken as per university rules

 

 

 

For Teacher’s use only

Question

1

2

3

4

5

6

7

8

9

10

Total

Marks

Question

11

12

13

Marks

 

 

Question No: 1    ( Marks: 15 )
Write SQL queries for the following relations 

CUSTOMER (custId, name, address, city, province, postalCode, phone)

ORDER (orderNo, custId, invNo, datePlaced, datePromised, terms, status)

ORDER_LINE (orderLineNo, orderNo, pCode, qty)

INVOICE (invNo, custId, orderNo, date, status)

INVOICE_LINE (invLineNo, invNo, pCode, qtyShip)

PRODUCT (pCode, pName, pDescription)

 

a)      Delete a customer’s record whose name is zafar and city is Karachi.

b)     List all the product names in descending order whose quantity shipped is less than 5000.

c)      List all the invoice numbers whose product code is 12.

d)     List all the order numbers whose quantity is more than 2500.

e)      Create a view containing the following attributes from the CUSTOMER and ORDER relations.

 

CUSTOMER (custId, name, address)

ORDER (orderNo, datePlaced, status)  

 

 

 

Question No: 2    ( Marks: 6 )
Differentiate between the followings.                

Horizontal and Vertical partitioning.

 

 

 

Question No: 3    ( Marks: 25 )
Differentiate between the followings? 

a)      Differentiate committed and rollback transaction

b)     What are the major differences in clustered and non clustered indexes?

c)      What is the difference between detection and prevention schemas of dead lock prevention?

d)     What is the difference b/w Equi-join and Natural join?

 

 

 

Question No: 4    ( Marks: 20 )
Normalize the given data table up to 3NF. 

(Student#  ,   Advisor ,    Adv-Room  ,    Class1  ,   Class2   ,   Class3)

 

 

 

Question No: 5    ( Marks: 18 )
a)    What is transaction? Differentiate between pre-emptive and non pre-emptive transactions.

b)   Why we need sub query? Explain in detail.

 

 

 

Question No: 6    ( Marks: 2 )     –  Please choose one
Select the activity that is most clearly part of the Database Administrator’s responsibility.

►  Performance tuning 
►  Data modification 
►  Data deletion 
►  Data entry 

 

 

Question No: 7    ( Marks: 2 )     –  Please choose one
Which normalisation transformation corresponds to “Eliminating partial key dependencies”?

►  unnormalised to 1NF 
►  1NF to 2NF 
►  2NF to 3NF 
►  3NF to BCNF 

 

 

Question No: 8    ( Marks: 2 )     –  Please choose one
Locking was introduced into databases so that

►  Keys can be provided to maintain security 
►  All simultaneous transactions are prevented 
►  Passwords can be provided to maintain security 
►  Consistency can be enforced 

 

 

Question No: 9    ( Marks: 2 )     –  Please choose one
A back-up and recovery regime should protect an organisation against:

►  incorrect data 
►  corrupt media 
►  insecure data 
►  data validation 

 

 

Question No: 10    ( Marks: 2 )     –  Please choose one
SQL has ———– types of commands

► 
► 
► 
► 

 

 

Question No: 11    ( Marks: 2 )     –  Please choose one
Transactions are often referred to in terms of ACID. Which one of the following is not part of the term ACID?

►  Atomic 
►  Isolation 
►  Durable 
►  Complete 

 

 

Question No: 12    ( Marks: 2 )     –  Please choose one
In ——- type of partitioning table is split on the basis of rows

►  Horizontal 
►  Vertical 
►  Parallel 
►  None of the given 

 

 

Question No: 13    ( Marks: 2 )     –  Please choose one
Which of the following is a good example of what is meant by?“Serialisability”

►  All disk access happens one after another 
►  The result of the transactions is the same as if the transactions wentone after another

 

►  The situation where the Lost Update problem exists 
►  All transactions happen one after another 

 

 

 

 

VU CS403- DATABASE MANAGEMENT SYSTEMS (Session – 5 ) FINALTERM Solved Unsolved Past Papers SPRING 2007

VU CS401- Computer Architecture and Assembly Language Programming FinalTerm solved unsolved past papers SPRING 2007

VU CS401- Computer Architecture And Assembly Language Programming FinalTerm Solved Unsolved Past Papers SPRING 2007

 

 

 

FINALTERM EXAMINATION

SPRING 2007

Marks: 65

CS401 – COMPUTER ARCHITECTURE AND

Time: 150min

ASSEMBLY LANGUAGE PROGRAMMING (Session – 5

)

StudentID/LoginID:

______________________________

Student Name:

______________________________

Center Name/Code:

______________________________

Exam Date:

Wednesday, July 18, 2007

 

 

Please read the following instructions carefully before attempting any of the questions:

 

1. Paper contains 15 questions in all, 10 MCQs and 5 subjective, attempt all questions. Marks are written adjacent to each question.

 

2. Do not ask any question about the contents of this paper from any one.

 

a. If you think that there is something wrong with any of the questions, attempt it

 

to the best of your understanding.

 

b. If you believe that some essential piece of information is missing, make an

 

appropriate assumption and use it to solve the problem.

 

c. Write all steps/instruction for a program, missing steps/instructions may lead to deduction of marks.

 

3. Exam is Closed Book. No handouts or reference material is allowed in exam hall other than rough sheet which will be provided by the examiner.

 

  1. 4.      All the coding language should be based on NASM assembler.

 

  1. 5.      No assembly software is allowed in the exam center.

 

6. Use of cell phone during the examination is strictly prohibited, otherwise strict disciplinary action will be taken as per university rules.

 

www.vusr.net                         LMS.VUSR.NET

 

For Teacher’s use only

 

Question

1

2

3

4

5

6

7

8

9

10

Total

Marks

Question

11

12

13

14

15

Marks

Question

Marks

Question No: 1 ( Marks: 1 )

- Please choose one

 

Sun SPARC Processor has a fixed ______________ instruction size.

 

?  16bit

?  32bit

?  64bit

?  20bit

 

Question No: 2 ( Marks: 1 )

-

Please choose one
When the subprogram finishes, the retrieves the return address from the
stack and transfers control to that location.
?  RET instruction
?  CALL instruction
?  POP instruction
?  Jump instruction
Question No: 3 ( Marks: 1 )

-

Please choose one

 

A 32 bit address register can access upto __________ of memory.

 

?  1 GB

?  6 GB

?  4 GB

?  2 GB

 

Question No: 4  ( Marks: 1 )   – Please choose one

 

 

 

 

The value of a segment register when the processor is running under protected mode is called

 

___________________________

?  segment descriptor

?  segment selector

?  global descriptor table

?  protected register

 

Question No: 5  ( Marks: 1 )   – Please choose one

 

FS and GS are two ___________________ in protected mode.

 

?  segment registers

?  segment selectors

?  stack pointers

?  register pointers

 

Question No: 6  ( Marks: 1 )   – Please choose one

 

IRQ 0 interrupt have _______________ priority

 

?  low

?  medium

?  highest

?  lowest

 

Question No: 7  ( Marks: 1 )   – Please choose one

 

IDT stands for ______________________.

 

?  interrupt descriptor table

?  individual descriptor table

?  inline data table

?  interrupt descriptor table

 

 

 

 

Question No: 8  ( Marks: 1 )   – Please choose one

 

Every bit of line status in serial port conveys _____________ information.

 

?  different

?  same

?  partial

?  full

 

Question No: 9  ( Marks: 1 )   – Please choose one

 

There are total _______________ bytes in a standard floppy disk.

 

?  1444k

?  1440k

?  1280k

?  2480k

 

Question No: 10  ( Marks: 1 )   – Please choose one

 

An 8×16 font is stored in _________________ bytes.

 

8

 

16

 

4

 

20

 

Question No: 11  ( Marks: 10 )

 

Give answers to these questions. .

[ 3+4+3]

  1. Differentiate hardware and software interrupts?

 

  1. Give an example of the priority mechanism in the programmable interrupt controller?

 

  1. Why memory must be freed using explicit calls to DOS before executing a program?

 

 

Question No: 12  ( Marks: 15 )

 

 

 

 

Part a)

 

Calculate the physical memory address generated by the following segment offset pairs. [2 x 2.5]

 

  1. 1DDDh:0436h

 

  1. 1234h:7920h

 

Part b)

 

Fill out the corresponding values in HEX in the register table after the execution of each instruction. Every instruction is dependent on the previous instruction and carry flag is reset in the start. [2 x 5]

 

 

Instructions

 

mov al,0x005D

 

Shr al,0x0003

 

Mov al,0x003C

 

Sar al,0x0006

 

mov ax,0x12D4

 

Carry Flag

 

Al

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Question No: 13  ( Marks: 10 )

 

Which BIOS interrupt provides serial port services and list down names of 9 pins of DB-9

 

connector.

[10]

Question No: 14

( Marks: 10 )

 

Write a program to print your full name followed by your student ID using bios services. [10]

 

Question No: 15  ( Marks: 10 )

 

Describe the following descriptors. Give its type and the value of all their fields: dd 01234567h, 789ABCDEh

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VUSR

 

VU CS401- Computer Architecture And Assembly Language Programming FinalTerm Solved Unsolved Past Papers SPRING 2007

ALL NEW RESULTS
Educational News

Updated Educational News

Categories
POSTS BY DATE
December 2016
M T W T F S S
« Sep    
 1234
567891011
12131415161718
19202122232425
262728293031