You are on page 1of 63

GENERAL GUIDELINES

1.
This book is to be brought to the class daily.
2.
Students are not permitted to attend the class without the identity card, once i
ssued.
3.
Students should be well on time right from the first class.
4.
Students should keep the Classrooms, Laboratories and Workshops clean.
5.
Writing on desks and walls is strictly prohibited, failing which the students wi
ll be fined heavily. If the identity of
the individual is not established the entire class / students in the block will
be fined.
6.
Students are advised to show due respect to all faculty regardless of their depa
rtment and maintain affable personality.
7.
Students are to maintain absolute discipline and decorum, so as to promote the f
air name of their college in all its activities.
8.
Students securing less than 85% attendance in any individual subject will not be
allowed to take up the university
exams.
9.
Students are informed to clarify their doubts in the respective subjects with th
e faculty by taking prior appointment.
10.
Students are to inform their parents that they should follow up the progress of
their wards by being in touch with the college
authorities at regular intervals.
11.
Ragging is punishable under Karnataka Education Act and is strictly prohibited.
Any student involved in ragging,
will be severely punished.
12.
Students who secure less than 60% in the University exam and / or who secure les
s than 60% in the internal test are to go
through the Academic Support programme compulsorily. The guidelines will be issu
ed separately by the concerned
department.
13.
The suggestion boxes are maintained at strategic places in the campus. Students
are to avail these facilities.
14.
Students are not supposed to alter the configuration of the system / any softwar
e on the system.
15.
Students are informed to follow the schedule as given in the calendar of events
with respect to seminar work
16.
Students are informed to follow the schedule as given in the calendar of events
with respect to Project work
SEMESTER - VIII - TIME TABLE
Day / Time 8.15 - 9.15 9.15 - 10.15 10.45 11.45 11.45-12.45 1.30-2.30 2.30-3.30 3
.45-4.45 4.45-5.45
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
SCHEME OF STUDY AND EXAMINATIONS
FOR BE DEGREE COURSE IN COMPUTER SCIENCE & ENGINEERING

Sl.
No
Code
No.
Subject No. of Hr. / week Examination
Theory Practical Duration I.A Marks Theory/Pract. Total Marks
1. CIP81 Constitution of India &
Professional Ethics
04 -03
25 100 125
2. CS82 Advanced Computer
Architecture
04 -03
25 100 125
3. Elective IV (Group D) 04 -03
25 100 125
4. Elective V (Group E) 04 -03
25 100 125
5. CS85 Project Work -06
03 100 100 200
6. CS86 Seminar ( Contact Hours ------50 --50
Total 16 06 15 250 500 750
STUDENT SELF APPRAISAL
SUBJECT MARKS ATTENDANCE
TEST 1 TEST 2 TEST 3 REPORT 1 REPORT 2 REPORT 3
Constitution of India &
Professional Ethics
Advanced Computer
Architecture
Elective IV (Group
D)
Elective V (Group
E)
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
1
CIP81: CONSTITUTION OF INDIA AND PROFESSIONAL ETHICS
Faculty: No. of Hours: 52
Class #
Chapter Title /
Reference Literature Topic to be Covered
% of Portion Covered
Reference Chapter Cumulative
01 Preamble & Evolution Of
Constitutional Law
T2 - Chapter-
Preamble to the constitution of India
5% 5%02 Evolution of constitutional Law
03 Scope and Extent of Fundamental
Rights,
Details of Exercise of Rights,
Limitations and Important Cases
T2 Chapter-6
Pages : 522-603
Scope of fundamental rights under part - III
17% 22%
04 Extent of fundamental rights under part - III
05 Details of exercise of rights
06 Details of exercise of rights
07 Limitations and Important cases of rights
08
Relevance Of Directive Principles Of
State Policy Under Part - IV
T1-Chapter-8
Pages: 721-834
T2-Chapter-7
Pages: 604-671
Classification of Directive
17% 39%
09 Scope of Directive
10 Nature o Economic Democracy Envisaged
11 Socialistic pattern of society
12 42nd and 44th Amendments
13 Directives and Fundamental Rights -comparison
14 Directives and Fundamental Rights conflicts
15 Non-Justiciability
16 Utility of Directives
17 Implementation of Directives
18 Directives in other parts of Constitution
19 Significance of Fundamental DutiesT2
Significance of Fundamental Duties under part IVa 5% 44%
20
Union Executive
Union Executive - President, Vice President
7% 51%
21 Council of Ministers
22 Prime Minister
23 Parliament and Supreme Court of India
24
State Executive
State Executive - Governor
7% 58%
25 Council of Ministers
26 Chief Minister
27 Legislature and High Courts
28
Constitutional Provisions For
Special Areas.
Scheduled castes and Tribes
7% 65%29 Women and children
30 Backward classes
31 Emergency Powers, Major
Constitutional Amendments
Emergency Powers
7% 72%32 Emergency Powers
33 Major constitutional Amendments
34
Electoral Process
Elections, Legislatorial powers, Decision of Disputes
5% 77%35 Amendments, Special Jurisdiction
36 Election Commission
37 Scope and Aims of Engineering
Ethics
T3: Chapters 1, 3, 4
Professional Ethics
5% 82%38 Moral Problem Solving
39 Organizing Principles
40 Responsibility of Engineers
Impediments to Resp.
T3: Chapter 5
Concepts of Responsibility
5% 87%41 Reasonable care and Good Works
42 Virtues and Impediments to Responsibility
43
Honesty, Integrity and Reliability
T3 Chapter 6
Ways of misusing the Truth
7% 94%
44 Honesty on Campus
45 Integrity with respect to various aspects
46 Conflicts of interest
47
Risk Safety and Liability in
Engineering
T3 Chapter 7
The codes and Engineering Practice
6% 100%
48 Estimating Risks
49 Acceptable Risks
50 Engineer s Liability for Risks
51 Becoming a responsible engineer regarding Risk
52 Honesty, Integrity and Reliability
Literature:
Book Type Code Title & Author
Publication Info
Edition Publisher Year
Text Books T1 An Introduction to constitution of India (Students Ed), Durga Das
Basu, 19th / 20th PHI 2001
Text Books T2 Constitution of India, V.N.Shukla Latest
Text Books T3 Engineering Ethics by Charles E Harris, Michael S Pritchard and M.
J Robins 2nd Thompson Asia 03-08-05
Reference Books R1 Introduction to constitution of India, M.V. Pylee Vikas 2002
Reference Books R2 Ethics in Engineering by Mike W martin and Roland Schinzinger
Reference Books R3 Introduction to Engineering Ethics by Roland Schinzinger and
Mike W martin 2002
Reference Books R4 Introduction to constitution of India by Brij Kishore Sharma
PHI 2002
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
2
1.
2.
3.
4.
OBJECTIVE OF THE SUBJECT:
According to its constitution, India is a "sovereign, socialist, secular, democr
atic republic." India
has a federal form of government. However, the central government in India has g
reater power
in relation to its states, and its central government is patterned after the Bri
tish parliamentary
system. India's independent judicial system began under the British, and its con
cepts and
procedures resemble those of Anglo-Saxon countries. The first nine chapters of t
he course focus
on the main features of Constitution of India.
The last four chapters focus on the ethical dimensions of engineering practice.
Engineers play a
vital role in protecting and assisting the public and this requires imagination,
persistence and a
string sense of responsibility. Personal ethics is a foundation for professional
ethics. The
importance and the different ways of developing it is given under these sections
.
QUESTION BANK
PREAMBLE OF CONSTITUTION OF INDIA AND EVOLUTION OF
CONSTITUTION LAW
OBJECTIVE: The preamble summarizes the aims and objects of constitution. The pur
poses are

Source from which the Constitution derives its authority


Objects which the Constitution seek to establish and promote
The preamble summarizes
2
A. Aims B. Objects C. Both D. Amendments
The purpose of preamble to our Constitution is 2
A. Source of Constitution s authority B. Stating Objects
C. Both D. Representing Amendments
The importance of preamble is pointed out in several decisions of our 2
A. Parliament B. High Court C. Supreme Court D. All the above
Pandit Nehru s resolution is fully reflected in 2
A. Constitution of India B. Preamble C. Both D. None of the above
FUNDAMENTAL RIGHTS OF INDIAN CITIZENS
OBJECTIVE: The Fundamental Rights embodied in the Indian constitution are guaran
teed to all
Indian citizens. These civil liberties take precedence over any other law of the
land. They
include individual rights common to most liberal democracies, such as equality b
efore the law,
freedom of speech and expression, freedom of association and peaceful assembly,
freedom of
religion, and the right to constitutional remedies for the protection of civil r
ights such as habeas
corpus.
In addition, the Fundamental Rights for Indians are aimed at overturning the ine
quities of past
social practices. They abolish "untouchability"; prohibit discrimination on the
grounds of
religion, race, caste, sex, or place of birth; and forbid traffic in human being
s and forced labor.
They go beyond conventional civil liberties in protecting cultural and education
al rights of
minorities by ensuring that minorities may preserve their distinctive languages
and establish
and administer their own education institutions.
5.
Fundamental rights protects our 2
A. Equality B. Liberty C. Both
D. None
6.
The fundamental rights has been embodied under ------------- of Constitution of
2
India
A. Part I B. Part II C. Part III D. Part IV
7.
Fundamental Rights act as limitation upon 2
A. Powers of Executive B. Powers of Legislature C. Both D.
None
8.
In case of any transgression regarding our Constitution, ------------- is (are)
2
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
3
15.
16.
17.
18.
19.
competent to declare a law unconstitutional.
A. High Court B. Supreme Court C. both D. None
9.
Our Constitution follows 2
A. American model B. English Model C. Mixed D. None
10.
The powers of Judiciary vis-à-vis the Legislature are weaker in 2
A. United States B. British C. India D. All the
above
11.
Which of these is not a fundamental right? 2
A. Right against Exploitation
B. Right of property
C. Right to freedom of religion D. All the above
12.
The Constitution of India originally classified Fundamental Rights under 2
A. 5 groups B. 6 groups C. 7 groups D. 8 groups
13.
Currently the Constitution of India has Fundamental Rights under 2
A. 5 groups B. 6 groups C. 7 groups D. 8 groups
14.
With respect to Constitution of India, the right Equality before Law is available
2
for
A. only Citizens of India B. Only foreigners C. Both D. only
Hindus
RELEVANCE OF DIRECTIVE PRINCIPLES OF STATE POLICY:
OBJECTIVE: An important feature of the constitution is the Directive Principles
of State Policy.
Although the Directive Principles are asserted to be "fundamental in the governa
nce of the
country," they are not legally enforceable. Instead, they are guidelines for cre
ating a social
order characterized by social, economic, and political justice, liberty, equalit
y, and fraternity as
enunciated in the constitution's preamble.

Which part of the Constitution of India contains the Directive Principles of Sta
te Policy? 2
A. part I B. Part II C. Part III D. Part IV
Who is responsible for administration and making of Directive principles of Stat
e Policy? 2
A. The President B. The Central C. The State D. The people
The Directives are not enforceable in court 2
A. True B. False C. Not under emergency D. cannot say
The Directives are implemented by Legislature 2
A. True B. False C. Not under emergency D. cannot say
It shall be the duty of the state to apply these principles in making laws 2
A. True B. False C. Only under emergency D. cannot say
SIGNIFICANCE OF FUNDAMENTAL DUTIES
OBJECTIVE: The Fundamental rights have been provided at the cost of some fundame
ntal
duties. These are considered as the duties that must be and should be performed
by every
citizen of India. These fundamental duties are defined as:
It shall be the duty of every citizens of India:

To abide by the Constitution and respect its ideals and institutions, the Nation
al Flag and
the National Anthem;
To cherish and follow the noble ideals which inspired our national struggle for
freedom;
To uphold and protect the sovereignty, unity and integrity of India;
To defend the country and render national service when called upon to do so;
To promote harmony and the spirit of common brotherhood amongst all the people o
f
India transcending religious, linguistic and regional or sectional diversities;
to renounce
practices derogatory to the dignity of women;
To value and preserve the rich heritage of our composite culture;
To protect and improve the natural environment including forests, lakes, rivers
and wild
life, and to have compassion for living creatures;
To develop the scientific temper, humanism and the spirit of inquiry and reform;

To safeguard public property and to abjure violence;


P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
4
To strive towards excellence in all spheres of individual and collective activit
y so that the
nation constantly rises to higher levels of Endeavour and achievement.
20.
How many are the fundamental duties 2
A. 10 B. 20 C. 35 D. 46
21.
There is no provision in the Constitution of India for direct enforcement of any
Duties 2
A. True B. False C. Not common for all duties D. President can
22.
The fundamental duties include which of the following? 2
A. To abide by the Constitution of India
B. To cherish the noble ideas which inspired the struggle or freedom
C. To defend the country
D. All the above
23.
Which of the following is not a fundamental duty? 2
A. to protect the sovereignty
B. to preserve the rich heritage of our composite culture
C. to protect and improve the natural environments
D. none of the above
24.
To safe guard one s public property is his 2
A. fundamental right B. fundamental duty C. both D. cannot say
25.
Hindu religion developed resilience to accommodate with tolerance the cultural r
ichness 2
and it is called as
A. secularity B. sovereignty C. composite culture D. none of the above
UNION EXECUTIVE
OBJECTIVE: The Union Executive consists of the President, the Vice-President and
Council of
Ministers with the Prime Minister at the head to aid and advise the President.
The government exercises its broad administrative powers in the name of the pres
ident, whose
duties are largely ceremonial. The president and vice president are elected indi
rectly for 5-year
terms by a special electoral college. Their terms are staggered, and the vice pr
esident does not
automatically become president following the death or removal from office of the
president.
Real national executive power is centered in the Council of Ministers (cabinet),
led by the prime
minister. The president appoints the prime minister, who is designated by legisl
ators of the
political party or coalition commanding a parliamentary majority. The president
then appoints
subordinate ministers on the advice of the prime minister.
The legislatures of the states and union territories elect 233 members to the Ra
jya Sabha, and
the president appoints another 12. The elected members of the Rajya Sabha serve
6-year
terms, with one-third up for election every 2 years. The Lok Sabha consists of 5
45 members;
543 are directly elected to 5-year terms. The other two are appointed.
The Supreme Court consists of a chief justice and 25 other justices, all appoint
ed by the
president on the advice of the prime minister.
26.
Electoral college consists of 2
A. Elected members of both houses of Parliament
B. Elected members of legislative assemblies of States
C. Elected members of Legislative assemblies of Union Territories of Delhi and
Pondicherry
D. All the above
27.
Who among the following is disqualified for election as President? 2
A. President of Union B. Governor of any State C. Minister of Union D. None
28.
The President shall hold the position of 2
A. Member of Parliament B. Member of Legislature
C. Any other profitable office D. None
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
5
29. A vacancy on the office of President may be due to 2
A. Expiry of term B. By his resignation
C. Removal by impeachment D. any of the above
30. The vice president s election does not involve 2
A. Lok Sabha B. Rajya Sabha C. State Legislature D. All the above
31. Who is the head of council of ministers? 2
A. President B. Vice- president C. Prime Minister D. Governor
32. The powers vested with the President are 2
A. Administrative powers B. Military powers C. Legislative powers
D. All the above
33. Judicial powers include 2
A. granting of pardons B. granting of reprieves C. Both D. None
34. Who has the power to summon (Like English crown) the parliament? 2
A. President B. Vice-president C. Both D. The People
35. The President has powers to nominate certain members to both the houses. 2
A. True B. False C. Only under emergency D. cannot say
36. The Prime Minister is selected by 2
A. President B. Vice-president C. The ministers D. The People
37. It is possible to appoint a person outside the legislature as minister 2
A. True B. False C. Only under emergency D. cannot say
38. The resignation of Prime Minister 2
A. Merely creates a vacancy B. Dissolves the cabinet
C. Dissolves the Government D. All the above
STATE EXECUTIVE
OBJECTIVE: India has 25 states and 7 union territories. At the state level, some
of the
legislatures are bicameral, patterned after the two houses of the national parli
ament. The
states' chief ministers are responsible to the legislatures in the same way the
prime minister is
responsible to parliament.
Each state also has a presidentially appointed governor who may assume certain b
road powers
when directed by the central government. The central government exerts greater c
ontrol over
the union territories than over the states, although some territories have gaine
d more power to
administer their own affairs. Local governments in India have less autonomy than
their
counterparts in the United States. Some states are trying to revitalize the trad
itional village
councils, or panchayats, which aim to promote popular democratic participation a
t the village
level, where much of the population still lives.
39. The head of executive power of state is 2
A. President B. Vice President C. Governor D. Chief Minister
40. Single person can be appointed as Governor for 2 or more states 2
A. True B. False C. Only under emergency D. cannot say
41. The Governor is 2
A. elected by people B. Selected by cabinet ministers C. Appointed by President
D. Any one of above
42. The governor doesn t have 2
A. Executive powers B. Military powers C. Legislative powers D. All the above
43. The head of state council of ministers is 2
A. President B. Vice President C. Governor D. Chief Minister
44. Governor will be under the control of President 2
A. True B. False C. Only under emergency D. cannot say
45. The governor can dismiss the chief minister at his pleasure 2
A. True B. False C. Only under emergency D. cannot say
46. The post of Advocate-General is corresponding to 2
A. Vice-president B. Attorney General C. Governor D. High court Judge
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
6
47.
5/6 of total number of members of state council shall be directly elected and 1/
6 will be 2
nominate by
A. President B. Prime Minister C. Governor D. Chief Minister
CONSTITUTIONAL PROVISIONS FOR SPECIAL AREAS
OBJECTIVE: Scheduled Castes and Scheduled Tribes are communities that are accord
ed
special status by the Constitution of India. These communities were considered '
outcastes' and
were excluded from the Chaturvarna system that was the social superstructure of
Hindu society
in the Indian subcontinent for thousands of years. These castes and tribes have
traditionally
been relegated to the most menial labor with no possibility of upward mobility,
and are subject
to extensive social disadvantage and discrimination, in comparison to the wider
community.
Under article 51A(e) it is the fundamental duty of every citizen of India to ren
ounce practices
derogatory to the dignity of women.
In addition, the State must make provision for securing just and humane conditio
ns of work
and for maternity relief. Panchayati Raj Institutions are local government bodie
s established
under the Constitution. Under article 243D, one-third of seats reserved for Sche
duled Castes
Tribes, are reserved for women, and one-third (including the number of seats res
erved for
women belonging to the Scheduled Castes and the Scheduled Tribes) of the total n
umber of
seats to be filled by direct election in every Panchayat are reserved for women.

There are proposals to reserve seats for women in the House of the People and in
the
Legislative Assemblies of the States by amending the Constitution.
48. The Scheduled Areas doesn t include
2
A. Assam B. Tripura C. Meghalaya D. All the above
49. The power to declare any area as Scheduled Area in any state is given to
2
A. President B. Prime Minister C. Governor D. Chief Minister of that state
50. The tribal areas include the areas in the state
2
A. Assam B. Tripura C. Meghalaya D. All the above
51.
Who can make regulations to restrict the transfer of land related to members of
2
Scheduled Tribes
A. President B. Prime Minister C. Governor D. Chief Minister of that state
52. Who appoints the commission to report on the welfare of Scheduled areas
2
A. President B. Prime Minister C. Governor D. Chief Minister of that state
EMERGENCY POWERS, MAJOR CONSTITUTIONAL AMENDMENTS
OBJECTIVE: NATIONAL EMERGENCY ART 352 (1) If the President is satisfied that a g
rave
emergency exists whereby the security of India or any part of the territory ther
eof is
threatened, whether by war or external aggression or armed rebellion, he may, by
Proclamation, make a declaration to that effect, in respect of the whole or such
part of the
territory thereof.........,
ART 353 While a Proclamation of emergency is in operation, then not withstanding
anything in
this Constitution, the executive power of the Union shall extend to the giving o
f directions to
any State as to the manner in which the executive power thereof is to be exercis
ed.
STATE:
ART 356 If the President on a receipt of report from the Governor of a state or
is otherwise
satisfied that a situation has arisen in which the government of a state cannot
be carried on in
accordance with the provisions of the Constitution, the President may by Proclam
ation -
a.
assume to himself all or any of the functions of the government of the state or
any body or authority in the state except the powers of the legislature.
b. declare that the powers of the legislature shall be exercisable by the Parlia
ment,
Provided nothing in this Art authorizes the President to assume to himself any o
f the powers
vested in the High Court.
The Proclamation shall be in operation for a period of 6 months.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS 7
53.
Which is not an emergency situation? 2
A. War
B. Failure of constitutional machinery in states
C. Financial emergency D. none of the above
54.
Existence of a condition in which an area is threatened by war or external aggre
ssion or 2
armed rebellion is known as
A. Emergency B. Election C. both D. None of above
55.
Under a proclamation of emergency in case of constitutional machinery, 2
A. State legislature would continue to operate
B. State legislature would be suspended
C. State legislature is not related
D. None of the above
56.
Under a proclamation of emergency 2
A. Centre shall suspend State Government
B. Centre cannot suspend State government
C. Both Central and State Governments are suspended
D. None of the above
57.
The duration for proclamation of emergency shall ordinarily be for 2
A. 15 days B. One month C. 2 Months D. Not defined
58.
The maximum duration of extension of a proclamation is 2
A. One month B. 2 Months C. One year D. Not defined
ELECTORAL PROCESS
OBJECTIVE: The Constitution of India has vested in the Election Commission of In
dia the
superintendence, direction and control of the entire process for conduct of elec
tions to
Parliament and Legislature of every State and to the offices of President and Vi
ce-President of
India.
The Election Commission -Election Commission of India is a permanent Constitutio
nal Body.
The Election Commission was established in accordance with the Constitution on 2
5th January
1950. The Commission celebrated its Golden Jubilee in 2001. Originally the commi
ssion had
only a Chief Election Commissioner. It currently consists of Chief Election Comm
issioner and
two Election Commissioners; it had only the Chief Election Commissioner before 1
989. The
concept of multi-member Commission has been in operation since 1993, with decisi
on making
power by majority vote.
Electoral Laws & System -Elections are conducted according to the constitutional
provisions,
supplemented by laws made by Parliament. The major laws are Representation of th
e People
Act, 1950, which mainly deals with the preparation and revision of electoral rol
ls, the
Representation of the People Act, 1951 which deals, in detail, with all aspects
of conduct of
elections and post election disputes. The Supreme Court of India has held that w
here the
enacted laws are silent or make insufficient provision to deal with a given situ
ation in the
conduct of elections, the Election Commission has the residuary powers under the
Constitution
to act in an appropriate manner.
Appointment & Tenure of Commissioners - The President appoints Chief Election
Commissioner and Election Commissioners. They have tenure of six years, or up to
the age of
65 years, whichever is earlier. They enjoy the same status and receive salary an
d perks as
available to Judges of the Supreme Court of India. The Chief Election Commission
er can be
removed from office only through impeachment by Parliament.
59.
There shall be ---------- number of electoral roll(s) for every territorial cons
tituency for 2
election
A. 2 ( One for Parliament and one for State Legislature
B. only one
C. One for each community
D. One for each party
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
8
60.
For Adult suffrage basis, essential conditions are 2
A. Citizenship B. Above 18 years of age C. no disqualifications by any law
D. All the above
61. Proportional representation has been prescribed for election to office of
2
A. President
B. Vice president
C. Both
D. None
62.
The supervision of entire election process is given to 2
A. Parliament B. respective state legislatures C. Election commission
D. All the above
63.
The provision for removal of ------------- makes Election commission , independe
nt of 2
executive control
A. Control by High Court B. Control by President C. Election commissioner
D. All the above
64.
The regional commissioners are appointed by 2
A. President B. Election Commissioner C. Election commission D. Any of the above
65.
With regards to election disputes, questions can be agitated by 2
A. Rising questions in Houses
B. Filing case in High Court
C. Filing case in Supreme Court
D. Election Petition
SCOPE AND AIMS OF ENGINEERING ETHICS
OBJECTIVE: Professional ethics is the set of standard adopted by professionals i
nsofar as they
see themselves acting as professionals. It is the set of one s own ethical commitm
ents, usually
given in early home or religious training and often modified by later reflection
.
Aims of engineering ethics are as follows:

Stimulating the moral imagination


Recognizing ethical issues
Developing analytical skills
Eliciting a sense of responsibility
Tolerating disagreement and ambiguity
66.
Engineering ethics is a type of 2
A. Personal Ethics B. Professional Ethics C. Both D. Common morality
67.
The set of own ethical commitments, usually given in early home and modified by
later 2
reflection is
A. Personal Ethics B. Professional Ethics C. Engineering ethics
D. Common morality
68.
The set of moral ideas shared by most of a culture or society is termed as 2
A. Personal Ethics B. Professional Ethics C. Engineering ethics D. Common
morality
69.
An engineer refuses to design military hardware as he believes war is immoral. T
his 2
refusal is based on
A. Personal Ethics B. Professional Ethics
C. Both
D. Common morality
70.
A civil engineer refuses to design a project he believes will be contrary to the
principles 2
of sustainable development. This refusal could be based on
A. Personal Ethics B. Professional Ethics C. Common morality D. All the above
71.
An engineer insists on complete honesty in the reporting of technical informatio
n to his 2
client. This insistence could be based on
A. Personal Ethics B. Professional Ethics C. Common morality D. All the above
72.
A professional codes of ethics should be followed by 2
A. MNCs B. Educational Institutes C. Government Offices D. All the above
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
9
73.
An implicit agreement among the professionals and between professionals and publ
ic is 2
called as
A. Code of Ethics B. International Standards C. Common morality D. All the above
74.
Professional ethics provides 2
A. A focus for debate on how professional ethics should be modified
B.
A rationale for professionals to adhere to professional standards under any
pressure
C. A common agreed upon standards for professional conduct
D. All the above
75.
A way to resolve values that comes as close as possible to satisfying all releva
nt 2
obligations is
A. Line Drawing B. Creative middle way C. Both D. None
76.
Cases that are uncontroversially wrong are 2
A. Positive paradigm cases B. Negative paradigm cases C. Middle way D. All the
above
77.
In evaluating moral problem, we can take the stand point of 2
A. An agent actually immersed in the situation
B. An external judge
C. Both
D. Should not image a different stand point
78.
What favors bringing about the greatest total amount of good that we can. 2
A. Code of Ethics B. International Standards C. Common morality D. Utilitarian
thinking
79.
What is the duty corresponding to this I have right not to be cheated 2
A. My duty to see that no body cheats me
B. Others have a duty not to cheat me
C. Both
D. None of the above
80.
With respect to problem of conflicting rights, is it right when a plant manager
attempt to 2
save money b y emitting a pollutant that is highly carcinogenic?
A. Yes
B. No C. May be D. Cant say
RESPONSIBILITY OF ENGINEERS
OBJECTIVE: Responsibility is attributed to persons in both law and morality.
In regard to responsibility for causing harm, we distinguish as

Intentionally caused harm


Negligently caused harm
Recklessly caused harm
Reasonable care:
The idea has moral basis, regardless of how it gets played out in courts of law.
The third concept of responsibility is Good Work
The responsibility can include virtues that go beyond fulfilling basic duties.
Impediments:
Self-Interest
Fear
Self-Deception
Ignorance
Egocentric Tendencies
Microscopic vision
Uncritical Acceptance of Authority
Group Think
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
81.
Responsibility is
A. Fictional B. Instructive C. Both D. cannot say
82.
Intentionally, negligently and recklessly are the classification of 2
A. Causing harm B. Accepting Duties. C. Cheating others D. All the above
83.
The area of Law where there is no attribution of fault or blame, but should have
a legal 2
responsibility to provide compensation is termed as
A. Strict Liability B. Personal Ethics C. Common morality D. All the above
84.
A kind of negativity and exclusivity is given to responsibility by 2
A. Code of Ethics B. International Standards C. Reasonable Care
D. Minimalist view
85.
Stay out of trouble is the concern of 2
A. Code of Ethics B. International Standards C. Reasonable Care
D. Minimalist view
86.
The expression above and beyond the call of duty stands for 2
A. Good works B. International Standards C. Reasonable Care D. Minimalist view
87.
Good works may be discouraged by 2
A. Need to meet tight time schedules B. Limited budgets
C. Press of other matters at hand
D. All above
88.
Virtues normally include 2
A. Attitudes and dispositions B. Conduct C. Moral Character D. All the above
89.
The obstacle for engineering responsibility is 2
A. Self-interest B. Punctuality C. Patriotism D. All the above
90.
A strict adherence to minimalist view may result in
A. Avoidable harms
B. Over emphasis on attributing blame
C. Both
D. None
HONESTY, INTEGRITY AND RELIABILITY
OBJECTIVE: Engineering codes require engineers to be honest and impartial in the
ir
professional judgments. On the way of misusing the truth along with lying and de
liberate
deception, engineers can withhold the truth, fail to adequately promote dissemin
ation of
information, fail to seek out the truth, reveal confidential or proprietary info
rmation and allow
their judgment to be corrupted.
Integrity in expert testimony requires engineers to take cases only when they ha
ve adequate
time for preparation.
A conflict of interest exists for professional when acting in a professional rol
e, they are subject
to influences, loyalties, temptations or other interests that tend to make the p
rofessional s
judgment less likely to benefit the customer or client.
91.
A tendency of individual members toward ---------------- results from a desire n
ot to 2
rock the boat
A. Illusion of morality B. Self-censorship C. Illusion of unanimity D. Mind guar
ding
92.
An inherent morality of the group and thereby discouraging careful examination o
f the 2
moral implications of its activities is termed as
A. Illusion of morality B. Self-censorship C. Illusion of unanimity D. Mind guar
ding
93.
The act of protecting the group from dissenting views by preventing their introd
uction is 2
call
A. Illusion of morality B. Self-censorship C. Illusion of unanimity
D. Mind guarding
94.
What is construing silence of a group member as Consent called? 2
A. Illusion of morality B. Self-censorship C. Illusion of unanimity
D. Mind guarding
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
11
95.
Direct pressure in groupthink means 2
A. Protecting the group from dissenting views
B. Pressure exercised by the group leader on those who show signs of dos-
agreement
C. Construing silence of a group member as Consent
D. An inherent morality of the group
96.
Symptoms of group think includes 2
A. rationalizations B. Mind-guarding C. Direct pressure D. All the above
97.
A honest engineer is one who2
A. avoids dishonesty
B. is committed to find the truth
C. adequately promotes the dissemination of information
D. all the above
98.
one can misuse the truth by 2
A. Lying
B. disclosing truth in appropriate circumstances
C. withholding information
D. all the above
99.
The process of smoothing the irregularities to make the data look extremely accu
rate 2
and precise is called as
A. cooking B. trimming C. forging D. plagiarism
100.
The process of retaining only those results that fit the theory and discarding o
thers is 2
called as
A. cooking B. trimming C. forging D. plagiarism
101.
The process of inventing some or all of the research data that are reported is c
alled as 2
A. cooking B. trimming C. forging D. plagiarism
102.
The sue of intellectual property of others without proper permission or credit i
s called as 2
A. cooking B. trimming C. forging D. plagiarism
103.
The documents issued by the government that allow the owner to exclude others fr
om 2
making use of the particular information for 20 years from the date of filling i
s known as
A. trademarks B. copyrights C. Patents D. all the above
104.
The right to creative products that protect only the expression of idea, but not
the ideas 2
themselves is known as
A. trademarks B. copyrights C. Patents D. all the above
105.
The words, phrase, symbols, sounds or designs associated with goods or services
are 2
known as
A. trademarks B. copyrights C. Patents D. all the above
106.
Engineers shall not attempt to attract an engineer from another employer by false
or 2
misleading pretenses this case come under
A. Code of Ethics B. International Standards C. Common morality
D. Professional Obligations
107.
An engineer can abuse client-professional confidentiality by 2
A. breaking confidentiality when it is not warranted
B. refusing to break confidentiality when higher obligation to public requires i
t
C. both
D. None
RISK SAFETY AND LIABILITY IN ENGINEERING
OBJECTIVE: Although fictional, this is instructive. What engineers do matters a
great deal?
Accidents are costly for us, for the environment and for the organization. Engin
eering codes
require engineers to hold paramount the safety, health and welfare of the public
. They have to
protect the public from unacceptable risks.
Balancing the protection of individuals against the promotion of the public welf
are poses one of
the most difficult problems for those responsible for managing risk.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
12
108. The diagram of possible ways in which a malfunction or accident occurs is c
alled as
A. performance chart B. Risk chart C. Fault tree D. Risk Tree
109. In ----------, we begin with an undesirable event, then moving further to d
etermine 2
what might have led to the event
A. performance chart B. Risk chart C. Fault tree D. Event tree
110. In ----------, we begin with an initial event and reason forward to a state
of the system 2
to which the event can lead
A. performance chart B. Risk chart C. Fault tree D. Event tree
111. Normal accidents include 2
A. tight coupling B. Complex interactions C. Both D. None
112. Processes that are connected in such a way that one is known to affect anot
her within a 2
short time is
A. Tightly coupled processes B. complexly interactive C. Both D. None
113. Parts of the system can interact in unanticipated ways. These processes are
called 2
A. Tightly coupled processes B. complexly interactive C. Both D. None
114. The phenomenon of allowing increasing number of deviations from proper stan
dards of 2
safety is called
A. tight coupling B. Complex interactions C. normalization of deviance
D. All the above
115. When the risk of harm is equaled by the probability of producing benefit, g
iven the 2
options available, the risk is termed as
A. Risk of Benefit B. Acceptable risk C. Favorable risk D. Justifiable risk
Marks No. of Questions
2 115
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
ADVANCED COMPUTER ARCHITECTURE
Faculty: No. of Hours: 52
Class
#
Chapter Title/
Reference Literature
Topics to be covered
% of portions covered
Reference
Chapter
Cumulative
Chapter #1:
Parallel Computer
Models
T1: Page # 1 to 32.
Parallel Computer Models:
11.00% 11.00%
1,2,3 The state of computing
4,5 Multiprocessors and Multicomputers
6 Multivector and SIMD computers
Chapter # 2:
Program and Network
Properties
T2: Page# 51 to 96
Program and Network Properties:
17.00% 28.00%
7,,8 Conditions Of Parallelism
9,10 Program Partitioning and Scheduling
11,12 Program Flow Mechanisms
13,14 System Interconnect Architecture
Chapter # 3:
Processors and
Memory Technologies
T1: Page # 157 to 188,
213 to 224, 239 to 248
Processor and Memory Technologies:
14.00% 42.00%
15,16 Advanced Processor Technology
17,18 Superscalar and vector processor
19 Backplane Bus System
20 Shared Memory Organizations
Chapter # 4:
Pipelining and
Superscalar Techniques
T1: Page # 265 to 308.
Pipelining and Superscalar Techniques
22.00% 64.00%
21,22,
23
Linear Pipeline Processors
24,25,
26
Non-linear Pipeline Processors
27,28 Instruction Pipeline Design
29,30 Arithmetic Pipeline Design
Chapter # 5:
Multiprocessor and
Multi-computers
T1: Page # 331 to 368,
375 to 393.
Multiprocessor and Multi-computers
15.00% 79.00%
31,32,
33
Multiprocessor System Interconnects
34,35,
36
Cache Coherence and Synchronization Mechanisms
37,38 Message Passing Schemes
Chapter # 6:
Parallel Programs
T2: Page # 75 to 121
Parallel Programs
12.00% 91.00%
39,40,
41
Parallel Application Case Studies
42,43 The Parallelization Process
44,45,
46
Parallelization of an Example Program
Chapter # 7:
Scalable
Multiprocessors
T1: Page # 453 to 486
Scalable Multiprocessors
9.00% 100.00%
47,48,
49
Scalability
50,51,
52
Realizing Programming Model
Literature:
Book Type Code Title and Author
Publication Specification
Edition Publication Year
Text Book T1 Advanced Computer Architecture by Kai Hwang Tata McGraw-Hill 2001
Text Book T2
Parallel Computer Architecture by David E. Culler,
Jaswinder Pal Singh, Anoop Gupta
1st Morgan Kaufmann Publishers 1999
Reference
Book R1
Computer Architecture and Organization by John P
Hayes
3rd McGraw-Hill 1998
Reference
Book
R2
Parallel computers-Architecture and Programming
by V Rajaraman, c Siva Ram Murthy
Prentice Hall India 2000
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
14
QUESTION BANK
PARALLEL COMPUTER MODELS
OBJECTIVE: In this chapter, we model physical architectures of parallel computer
s, vector
super computers, multicomputers, and massively parallel processors. Parallel pro
cessing has
emerged as a key enabling technology in modern computers, driven by the ever-inc
reasing
demand for higher performance, lower costs, and sustained productivity in real l
ife applications.
1.
Explain computer development milestones. 10
2.
Explain elements of modern computers. 10
3.
Explain evolution of computer architecture. 10
4.
Write a note on implicit and explicit parallelism. 06
5.
Explain shared memory multiprocessors. 10
6.
Explain UMA & NUMA model. 10
7.
Explain COMA model. 10
8.
Write a note on Distributed-Memory Multicomputers. 08
9.
Explain data parallel processing. 10
10.
Write a note on vector supercomputers. 10
11.
Explain SIMD supercomputers. 10
12.
What are the fundamental design issues? Explain in detail. 14
13.
What is parallel computer? Discuss the need of parallel architecture. 10
14.
Differentiate among the following architectural classifications: 06
a. SISD b. SIMD c. MISD and d. MIMD.
15.
Discuss the evolution of parallel computing from 10
i) Technology point of view and ii) application point of view.
PROGRAM AND NETWORK PROPERTIES
OBJECTIVE: This chapter covers fundamental properties of program behavior and in
troduces
interconnection networks. Interconnection architectures introduced include stati
c and dynamic
networks. Network complexity, communication bandwidth, and data-routing capabili
ties are
discussed.
16.
Explain conditions of parallelism. 10
17.
What is data dependence in programs? 05
18.
What is control dependence? 05
19.
What is resource dependence? 05
20.
Explain hardware and software parallelism. 10
21.
Write a short note on role of compilers. 05
22.
Explain parallelism levels. 10
23.
What is grain size? 05
24.
Write a note on program partitioning. 05
25.
Explain the grain size problem. 08
26.
Explain node duplication. 10
27.
Explain program flow mechanisms. 10
28.
Write a note on control flow versus data flow. 10
29.
Write a note on task initiation diagram. 05
30.
Explain control dependencies. 10
31.
Explain data dependencies. 10
32.
Explain system interconnect architectures. 10
33.
Explain static connection networks. 10
34.
Write a note on network properties and routing. 10
35.
Define the following terms: 06
a) Latency b) latency sequence c) average latency d) forbidden latency.
36.
Explain dynamic connection networks. 10
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
15
PROCESSOR AND MEMORY HIERARCHY
OBJECTIVE: This chapter presents modern processor technology and the supporting
memory
hierarchy. We begin with a study of instruction-set architectures including CISC
and RISC, and
we consider typical superscalar, VLIW, superpipelined, and vector processors. Th
e third section
covers memory hierarchy and capacity planning, and the final section introduces
virtual
memory, address translation mechanisms, and page replacement methods.
37. Write a note on design space of processors. 10
38. Write a note on instruction pipelines. 05
39. Explain the concepts of multiprocessor simulation. 05
40. Explain processors and coprocessors. 05
41. Explain Instruction-set architectures. 05
42. Briefly explain CISC scalar processors. 10
43. Briefly explain RISC scalar processors. 10
44. Explain the basic measures of multiprocessor performance. 10
45. Write a note on superscalar processors. 05
46. Explain VLIW architecture. 12
47. Explain Vector processors. 10
48. Explain Symbolic processors. 10
49. Explain characteristics of symbolic processing. 10
50. Explain hierarchical memory technology. 08
51. Explain backplane bus specification. 10
52. Write a note on addressing and timing protocols. 08
53. Explain arbitration, transaction, and interrupt. 10
54. Write a note on IEEE future bus+ standards. 04
55. Write a note on memory interleaving. 10
56. Write a note on pipelined memory access. 10
57. Explain fault tolerance. 05
58. Explain memory bandwidth. 05
59. Explain memory allocation schemes. 05
60. Write a note on redundancy for fault tolerance. 05
PIPELINING AND SUPERSCALAR TECHNIQUES
OBJECTIVE: This chapter deals with advanced pipelining and superscalar design in
processor
development. We begin with conventional linear pipelines and analyze their perfo
rmance. A
generalized pipeline model is introduced to include nonlinear interstage connect
ions. Collision-
free scheduling techniques are described for performing dynamic functions.
61. Write a note on linear pipeline processor. 10
62. Explain synchronous and asynchronous models. 10
63. Explain clocking and timing control. 10
64. Write a note on speedup factor, efficiency, and throughput. 05
65. Explain nonlinear pipeline processors. 05
66. Explain latency analysis. 10
67. Explain collision-free scheduling. 10
68. Explain pipeline schedule optimization. 10
69. What is greedy cycle? 05
70. Explain instruction pipeline design. 10
71. What are the mechanisms for instruction pipeline? 10
72. Explain hazard avoidance. 10
73. Explain dynamic instruction scheduling. 10
74. Explain branch handling techniques. 10
75. Explain branch prediction. 06
76. Explain arithmetic pipeline design. 10
77. Write a note on computer arithmetic principles. 10
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
16
78. Write a note on static arithmetic pipelines.
10
79. Explain multifunctional arithmetic pipelines.
10
80. What are pipeline design parameters?
10
MULTIPROCESSORS AND MULTICOMPUTERS
OBJECTIVE: In this chapter, we study system architectures of multiprocessors and
multicomputers. Various cache coherence protocols, synchronization methods, cros
sbar
switches, multiport memory, and multistage networks are described for building m
ultiprocessor
systems.
81.
Discuss network characteristics. 05
82.
Explain hierarchical bus systems. 10
83.
Explain crossbar switch and multiport memory. 10
84.
Write a note on crosspoint switch design. 10
85.
What are switches? 10
86.
Explain briefly multistage and combining networks. 05
87.
Explain hot-spot problem. 04
88.
What is cache coherence problem? 10
89.
What are snoopy bus protocols? 10
90.
Explain directory-based protocols. 10
91.
What are hardware synchronization mechanisms? 10
92.
What are message-routing schemes? 10
93.
Write a note on routing. 05
94.
Write a note on routing mechanisms. 10
95.
Explain wormhole routing. 08
96.
Explain deadlocks. 10
97.
Discuss about virtual channels. 10
98.
Write a not on deadlock avoidance. 10
99.
Explain packet collision resolution. 10
100.
Explain adaptive routing. 10
101.
What is dimension-order routing? 05
102.
Explain multicast routing algorithms. 10
103.
Explain network partitioning. 10
PARALLEL PROGRAMS
OBJECTIVE: In this chapter we learn about the various case studies of parallel a
pplication. We
also get to know about the steps involved in the parallelization process like de
composition of
the computation into tasks, assignment of tasks to processes, orchestration of t
he necessary
data access, communication, and synchronization among processes, mapping of proc
esses to
processors.
104.
Explain different parallel application case studies. 14
105.
What are the goals of parallelization process? 10
106.
Explain the terms: 06
a) Task b) Process c) Processor.
107.
Explain the Equation solver Kernel. 10
108.
Explain the different steps involved in creating a parallel program. 10
109.
Considering the problem of simulating the ocean current, 06
Explain how concurrency can be identified in a typical program?
110.
Develop a pseudo code for the parallel equation solver kernel. 10
111.
Explain the orchestration under data parallel model. 10
112.
Explain assignment for the parallel equation solver. 10
113.
Explain the orchestration under the shared address space model. 10
114.
Explain the orchestration under the message passing model taking equation solver
as an 10
example.
115.
A job is given to you and you have been asked to convert a given sequential exec
ution 10
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS 17
of a program into a parallel program. Identify the steps involved in the above p
roblem
and explain each step in detail.
116.
Explain in brief what is meant by orchestration under data parallel model? Devel
op a 10
pseudo code for the above problem and explain how data assignment, decomposition
and parallelism lead to good load balance across processes in such an applicatio
n.
Include adequate comments in your pseudo code.
117.
In a super market, vendors would be interested in extracting the information on
the 10
item-sets, the customers frequently purchase. Using the large database, indicati
ng the
set of items purchased by the customers in each purchase transaction, show how t
he
information of recently purchased item sets could be obtained. Explain the paral
lelism
that exists in the process.
118.
Explain red-black ordering technique of decomposition for equation solver kernel
. 06
SCALABLE MULTIPROCESSOR
OBJECTIVE : In this chapter we learn the hardware organization and architecture
(scalable to
L / VL configurations), how the programming models are realized in terms of netw
ork
transactions, spectrum of important design points organized according to the lev
el of direct
hardware interpretation of the network transaction.
We will also know the basic organizational properties of machines using case stu
dies: Viz. CM5,
Intel paragon, Meiko CS-2, CRAY T3D, and CRAY T3E.
119.
Give the generic diagram for a scalable multiprocessor architecture of a distrib
uted 10
memory type. Describe any one real scalable system, using high integration at th
e chip
level or at the board level.
120.
Explain the machine organization for dedicated message processing with symmetric
10
processor.
121.
What is scalability? Describe the different types of scalability. 10
122.
Give the generic diagram for scalable multiprocessor architecture of a distribut
ed 10
memory type. Describe any one real scalable system, using high integration at th
e chip
level or at the board level.
123.
Explain the machine organization for dedicated message processing with symmetric
10
processor.
124.
Explain scalability. 10
125.
Explain bandwidth scaling. 10
126.
Explain latency scaling. 10
127.
What is cost scaling? 10
128.
Explain physical scaling. 10
129.
Explain scaling in a generic parallel architecture. 10
130.
Write a note on realizing programming models. 10
131.
Explain primitive network transaction. 10
132.
What is meant by shared address space? Explain? 10
133.
Explain message passing. 10
134.
What are active messages? 10
135.
Explain communication architecture design space. 10
136.
Write a note on node network interface. 10
137.
Explain implementation communication abstractions. 10
138.
What is dedicated message processing? 10
139.
Explain shared physical address space. 10
140.
State about clusters and network of workstations. 10
141.
Explain with the help of appropriate diagrams the following message passing prot
ocols 10
identifying clearly the merits & demerits if any in each case.
i) Synchronous message passing protocol.
ii) Asynchronous message passing protocol.

142.
What is scalability? Discuss the different types of scalability. 10
143.
Considering the example of the ocean study problem, show that when the problem i
s 10
scaled up and the processing system is fixed, the compute load per processor inc
reases,
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
18
but the communication load per unit time decreases.
144. Techniques like message passing using physical DMA or dedicated message pro
cessing 10
as done in Intel paragon system are used among others for obtaining highly scala
ble
systems. Explain any one such message passing systems.
145. When systems are scaled up, processor cost and memory cost increase linearl
y with the 10
no. of nodes n, while the switching network cost increases roughly as nlog2 n. A
ssuming
in a 64 processor system, the cost is equally divided between processors, memory
and
interconnection networks, find the ratios of this cost division when the no. of
nodes is
increased to 8192 from 64.
Marks No of Questions
4 02
5 23
6 07
8 05
10 106
14 02
Total 145
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
CS834: NETWORK MANAGEMENT
Faculty: No. of Hours: 52
Class
#
Chapter Title /
Reference Literature
Topics to be Covered
% of Portion Covered
Reference
Chapter
Cumulative
1.
Data
Communications and
Network
Management
Overview
T: Chap. 1
Pages 3-55
Introduction: Data Communications and Network Management
Analogy of Telephone Network Management, Data and
Telecommunication Network.
12.3% 12.3%
2. Distributed Computing Environments, TCP/IP Based network.
3. Communications Protocols and Standards
4. Case Histories of Networking Management.
5. Challenges of Information Technology Managers.
6. Network Management: Goals, Organization and Function.
7. Network and System Management, Future of Network Management
8. Basic Foundations:
standards, models
and language
T: Chap. 3
Pages 101-141
Basic Foundations: Standards, Models. And Organization Model
7.9% 20.2%
9. Information Model, Communication Model
10. Abstract Syntax Notation One:ASN.1
11. Encoding Structure, Macros
12. Function Model
13.
SNMPv1 Network
Management
T: Chap. 4
Pages 141- 203
SNMPv1 Network Management: Case Histories and Examples
15.4% 35.6%
14. The history of SNMP Management
15. Internet Organizations and Standards
16. The SNMP Model
17. The organization model
18. System Overview
19. Information Model
20. Information Model cont.
21. SNMPv1 Network
Management:
Function Model
T: Chap. 5
Pages 203- 229
SNMPv1 Network Management: Communication Model
7.9% 43.5%
22. SNMP Architecture, Administrative model,
23. SNMP protocol specifications
24. Operations and MIB Group
25. Function Model
26.
SNMP
Management: RMON
T: Chap. 8
Pages 322- 345
SNMP Management: Remote Monitoring, RMON SMI and MIB
9.2% 52.7%
27. RMON1
28. RMON2, ATM Remote Monitoring
29. Case study of Internet Traffic using RMON
30.
Broadband Network
Management: ATM
Network
T: Chap. 9
Pages 345- 387
Broadband Networks and Services, ATM Technology
13.9% 66.6%
31. ATM LAN Emulation and Virtual LAN
32. ATM Network Management: Reference Model
33. Integrated Local Management Interface,
34. ATM Management Information base
35. M1 Interface and M2 Interface
36. M3 Interface and M4 Interface,
37. Digital Exchange Interface
38.
Broadband Network
Management
T: Chap. 10
Pages 387- 429
Broadband Network Management: Broadband Access Networks
12.3% 78.9%
39. HFC Technology
40. Data Over Cable Reference Architecture
41. HFC Management
42. DSL Technology,
43. Asymmetric Digital Subscriber Line Technology
44. ADSL management, ADSL Configuration Profiles
45.
Network
Management
Applications
T: Chap. 13
Pages 501- 557
Network Management Applications: Configuration Management
21.0% 100%
46. Fault Management, Performance Management
47. Event Correlation Technique
48. Security Management
49. Accounting Management
50. Report Management, Policy Based Management
51. Service Level Management
52. Question Paper Discussion
Literature:
Book Type Code Title & Author Publication Info
Text Book T
Network Management-
Principles &Practice Mani
Subramanian,
Edition Publisher Year
7th Pearson Education 2005
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
QUESTION BANK

INTRODUCTION
1.
You can discover the hosts in your subnetwork by using the ping command with you
r network IP address 04
and host address of decimal 255. Discover all the hosts in the subnetwork that y
ou are logged on.
2.
Send an e-mail to a remote site with a wrong userid, but correct node address. E
xplain the error 04
messages that you get and the servers that sent them.
3.
You are given a class B IP address of 145.45.x.y for your network node. As a net
work engineer, you are 04
asked to configure your network for 126 subnets (remember that 0 and 1 are reser
ved).
a.
How would you configure your address for subnets and hosts?
b.
What is the maximum number of hosts that each subnet can accommodate?
4.
Explain the terms: Protocol, SAP, Subnet, Internet and PDU. 05
5.
Explain the data and telecommunication networks. 05
6.
Explain client/server network in a distributed computing environment. 06
7.
Explain the Internet and Intranets model in an TCP/IP based networks. 06
8.
Explain Basic Communication Architecture and ISO Communication Architecture? 08
9.
Compare SNA, ISO and Internet Protocol Layer Model. 10
10.
Explain the goals of network management. 08
Basic Foundations: Standards, Models and Language
11.
In brief mention network management standards. 10
12.
Explain the role of organization model, information model and function model in
ISO network 10
management model.
13.
What are the standards used for the various layers in an Ethernet-based network
that is managed by 04
the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an
unshielded
twisted-pair cable.
14.
Write an ASN.1 module that defines DaysOfWeek as an ENUMERATED data type with va
lues from 0 to 6. 08
15.
Write an ASN.1 module that specifies DayOfWeek as a SEQUENCE type with each day
of the week 10
(day1, day2, ) as the type VisibleString. Write the ASN.1 description (a) for the
structure and (b) for
the value.
16.
For your home address which contains Name, Address, City, State and Zip Code: 08
a.The informal record structure.
b.An ASN.1 description of the record structure.
c. The record value for your home address.
17. a.
Describe a list and an ordered list in ASN.1 syntax. 10
b. Identify the differences between them.
c. Using examples differentiate between list construction and repetitive constru
ction.
SNMPv1 Network Management: Organization and Information Models
18.
With an example explain a managed LAN Network. 08
19.
Explain SNMP based ASN.1 data type structures. 08
20.
Write about the evolution of SNMP Documents. 05
21.
With an example explain the Object-Type Macro. 10
22.
Explain the Two-Tier, Three-Tier and Proxy Server Organization Model. 10
23.
Explain SNMP Network Management Architecture. 05
24.
Write about aggregate managed object macro. 10
25.
What is meant by Management Information Base? Explain in brief. 10
26.
Access the Simple Gateway Monitoring Protocol (SGMP) RFC 1028 on the Internet. D
escribe the 05
four message types defined in the document.
27.
Present the OBJECT IDENTIFIER for the object sun. products in two formats, one m
nemonic and 08
the other numeric.
28.
Encode IP Address 10.20.30.40 in TLV format. 06
29.
(refer to RFC 1213 for the following exercise) 08
a. Write the ANS.1 specifications for sysServices.
b. Illustrate the specifications with values for a bridge.
c. Illustrate the specifications with values for a router.
30.
Write the object descriptor and syntax of the following SNMP managed entities: 0
8
a. IP address.
b. A row in the Interfaces table (row specification only)
c. The MAC address of an interface card.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
31.
Explain how you would determine whether a device is acting as a host or as a rou
ter using an 06
SNMP command.
32.
A network manager discovers that a network component is performing poorly and is
sues an order 04
to the technician to replace it. Which MIB group contains this information for t
he technician to
find out the physical location of the component?
33.
How would you use one of the standard MIB objects to determine which of the stat
ions in a LAN 10
is functioning as a bridge to the external network?
34.
TCP is a connection-oriented protocol and UDP is a connectionless protocol. Iden
tify the 06
differences in the two MIBs that exemplify this difference.
35.
FDDI is heavily used as a backbone network in a corporate complex. 10
a. Draw a MIB tree for FDDI MIB. Limit your tree to the top five groups.
b.
Develop a three-column table presenting entity, OID and brief descriptions of th
e groups
and the tables under each group.
36.
What OBJECT TYPE would you use to identify the address of the neighboring gatewa
y from your 04
local gateway?
SNMPv1 Network Management: Communication and Functional Models
37.
Briefly explain the SNMP Communication Model. 08
38.
Describe SNMP Protocol Specifications. 06
39.
In brief explain the SNMP Operations. 08
40.
An SNMP manager sends a request for the values of the sysUpTime in the System gr
oup and 10
ifType in the interfaces group for ifNumber value of 3. Write the PDUs with the
fields filled in for
a. The get-request PDU and
b. The get-response PDU with noSuchName error message for ifType.
SNMP Management: RMON
41.
What is meant by remote monitoring? Explain. 06
42.
Explain RMONI Groups and Functions 05
43.
In brief explain RMONI Common and Ethernet Group. 08
44.
Write about RMON2 Conformance Specifications. 06
45.
Explain RMON Token Ring Extension. 04
46.
In brief explain ATM Remote Monitoring 06
47. a. Describe qualitatively how the utilization ( number of frames offered/num
ber of frames 05
transmitted) depends on frame size.
b.How would you measure the distribution of the frame size on the LAN?
48. a. Describe the two methods of measuring collisions on an Ethernet LAN.
06
b. Compare the two methods in terms of what you can measure.
49.
How would you measure the types and distribution of frames in a token ring LAN?
06
Broadband Network Management: ATM Networks
50.
Explain broadband services networks 05
51.
Explain ATM LAN Emulation. 04
52.
In brief explain ATM Network Management. 10
53.
Write short notes on M1 interface, M2 interface. 10
54.
Explain class I and class II Interface Management Functions of M3. 06
55.
With a neat diagram explain the Dual views of the M4 Interface. 04
56.
Although cell transmission of multimedia services offers numerous benefits, ther
e is an 04
inefficiency penalty. Calculate the maximum efficiency (data bytes/ (data bytes+
overhead bytes)
for ATM transmission.
57.
Calculate the efficiency of transmission to transmit: 06
a. An Ethernet packet of 1500 bytes (including the overhead with 6-bytes address
es).
b. Equivalent data using ATM cells.
58.
Communication between two ATM switches is broken in a private ATM network. You a
re 04
troubleshooting the problem from a network management station. What M interfaces
would you
use? Justify.
59.
Explain how networks can be interconnected. 04
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
Broadband Network Management
60.
Explain the broadband access networks and technologies. 08
61.
Write a short note on HFC technology. 08
62.
Explain the Protocol Layer Architecture in an HFC System. 04
63.
Write a short note on DSL Technology and ADSL Technology. 06
64.
With a neat diagram explain ADSL Architecture. 04
65.
With an ADSL reference model explain ADSL management framework. 06
66.
Write short note on ADSL Configuration Profiles. 04
67.
A half-duplex channel is carrying a 2-Mbps signal. Calculate the baud rate and b
andwidth in Hz 06
for the following modulated signals.
a. ASK(binary) b. PSK(binary) c. QPSK d. 16QAM
68.
The downstream channel bandwidth for cable modem is 6Mhz. Calculate the bit rate
if signal is 08
a. QPSK b. 64 QAM
Network Management Applications
69.
What is meant by Configuration Management? Explain in brief. 08
70.
Explain the different steps involved in Fault Management. 04
71.
Mention and explain different metrics in Performance Management 05
72.
What is meant by Case-Based Reasoning? Explain. 05
73.
Explain the Codebook Correlation Model. 05
74.
Mention in brief the various measures used in security management 10
75.
How does the Client/Server authenticate each other 06
76.
Write explanatory notes on PEM processes. 05
77.
Explain the policy management architecture. 06
78.
List and contrast the tools available to discover network components. 06
79.
You are responsible for designing the auto discovery module of an NMS. Outline t
he procedure and 04
the software tools that you would use.
80.
What MIB object would you monitor for measuring the collision rate on an Etherne
t LAN? 04
Marks No. of Questions
4 18
5 12
6 19
8 16
10 15
Total 80
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
CS843: CRYPTOGRAPHY AND NETWORK SECURITY
Faculty: No. of Hours: 52
Class
#
Chapter Title /
Reference Literature
TOPICS TO BE COVERED
% of portions covered
Reference Cumulative
1. Chapter 1
Overview
Symmetric Ciphers
Page # 19-35
Text Book: T1
Symmetric Ciphers-Overview: Services
35% 35%
2. Mechanisms and Attacks
3. The OSI Security Architecture
4. A model of network security
5. Chapter 2
Classical Encryption
techniques
Page # 41-66
Text Book: T1
Classical Encryption techniques: Symmetric Cipher Model,
6. Substitution Techniques.
7. Transposition Techniques
8. Rotol Mechanisms
9. Steganography
10. Chapter 3
Block Cipher & Data
Encryption Standard
Page # 73-103
Text Book: T1
Block Cipher & Data Encryption Standard: Simplified DES
11. Block Cipher Principles
12. The data encryption standard
13. The Strength of DES
14. Differential and Linear Cryptanalysis
15.
Chapter 6,7
Symmetric Ciphers
Page #191-202
Page #219-244
Text Book: T1
Symmetric Ciphers: Triple DES
16. Blowfish algorithm
17.
Confidentiality using Conventional Encryption: Placement of
Encryption function
18. Traffic confidentiality
19. Key Distribution
20. Random Number Generation
21.
Chapter 8,9,10
Public Key
Encryption, Digital
Signatures
Page #251-260
Page #275-314
Text Book: T1
Number Theory: Prime Numbers, Formats
27% 62%
22. Euler s Theorems
23. Testing for primality
24.
Public key Cryptography & RSA: Principles of Public key
Cryptosystems
25. The RSA Algorithm
26. Key Management
27. Diffie-Hellman Key exchange
28. Chapter 11
Message
Authentication and
Hash Functions
Page #329-345
Text Book: T1
Message Authentication and Hash Functions
29. Authentication Requirements
30. Authentication Functions
31.
Message Authentication Codes
32. Chapter 12,13
Message Digest
Algorithm, Protocol
Page #365-374
Page #397-416
Text Book: T1
MD5 Message Digest Algorithm
33. Digital Signatures and Authentication Protocols
34. Digital Signatures
35. Authentication Protocols
36. Digital Signature Standard
37.
Chapter 14,15,16
Network Security
Page #417-436
Page #453-472
Page #499-518
Text Book: T1
Authentication Applications: Kerberos
31% 93%
38. X.509 Directory Authentication Service
39. Electronic Mail Security
40. Pretty Good Privacy
41. IP security
42. IP security Overview
43. IP Security Architecture
44. Authentication header
45. Encapsulating Security Payload
46.
Chapter 17
Web Security
Page #545-580
Text Book: T1
Web Security
47. Web Security Requirements
48. Secure Sockets Layer Security
49.
Transport Layer Security
Secure Electronic Transaction
50. Chapter 18,19,20
System Security
Page #581-654
Text Book: T1
System Security
7% 100%51. Intruders , Viruses , Worms & Related Threats
52.
Countermeasures, Firewalls , Firewall Design Principles
Trusted Systems
Literature:
Book Type Code Title & Author
Publication Info
Edition Publisher Year
Text Book T1
Cryptography and Network Security by William
Stallings
3rd Pearson Education/PHI 2003
Reference
Book
R1
Network Security Private Communication in a Public
world by Charlie Kaufman, Radia Perlman, Mike
Speciner
2nd PTR Prentice Hall 2002
Reference
Book
R2 Cryptography and Network Security by Atul Kahate Tata McGrawHill 2003
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
QUESTION BANK
CRYPTOGRAPHY
OBJECTIVE: At the end of this section the student will know the basics of
Cryptography. The section deals with chapters on algorithms that are used with
cryptography, public key cryptography, Authentication and Hash functions and the
math that is required for a introductory understanding of Cryptography.
1.
Explain briefly the four types of security attacks that are normally encountered
. Also 10
distinguish between active and passive attacks.
2.
Bring out the differences between 10
Diffusion and Confusion.
Steganography and Cryptography.
Known and Chosen plaintext Cryptanalysis.
3.
Explain a typical key distribution scenario. What are the tradeoffs involved in
14
determining the life of a particular session key?
4.
Explain the differential Cryptanalysis mechanism. 06
5.
What is the need for public key cryptography? Explain its principle and how it c
an be 10
adopted for Encryption and authentication.
6.
Explain the principle of Diffie-Hellman key exchange with a suitable example. 10
7.
Explain how hash functions can be used for message authentication. How are these
10
susceptible to birthday attacks?
8.
Enunciate and explain the digital signature algorithm. 10
9.
What is triple encryption? How many keys are used here? 06
10.
What primitive operations are used in Blowfish? What is the key size for Blowfis
h? 06
11.
List ways in which keys can be distributed to two communicating parties. What is
a 08
key distribution centre? What is the difference between a session key and a mast
er
key?
12.
What is the difference between differential and linear cryptanalysis? 06
NETWORK SECURITY
OBJECTIVE: At the end of this section the student will understand the applicatio
n
of Authentication techniques learnt in the earlier chapter. Applications such as
Kerberos, X.509 Directory, Email Security, SET are studied. IP security, Web
Security, Firewalls and the related threats associated with it are also studied.
13.
What is Kerberos? Discuss the motivation and requirements for Kerberos approach.
10
14.
What are the key features of X..509 Certificate? How are they issued and revoked
10
by the certificate authority?
15.
What is the purpose of the X.509 standard? 05
16.
Why is the segmentation and re-assembly function in PGP needed? How does PGP 05
use the concept of trust?
17.
What is S/MIME? 05
18.
Why does PGP generate a signature before applying compression? 05
19.
What are the five basic services available for the users of Pretty good privacy?
How 20
are they provided?
20.
What the examples of and services provided by IPSec. 06
21.
What is Encapsulating Security Pay load? Why does ESP include a padding field? 0
6
22.
Explain the secure socket layer SSL-V3 architecture, indicating how the session
10
state and connection state are defined.
23.
What is the need for dual signatures in SET? How are they constructed? 10
24.
What are the four basic techniques of choosing passwords? Compare their relative
10
merits.
25.
List and briefly explain 3 classes of intruders and list three benefits of using
06
intrusion detection systems.
26.
In general terms, how does a worm propagate? 06
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
27.
List the 3 goals for a firewall. List four techniques used by firewalls to contr
ol access 06
and enforce security policy.
28.
What is a virus? What are the typical stages it passes through in its lifetime?
10
Suggest suitable virus architecture.
Marks No. of Questions
5 4
6 9
8 1
10 12
14 1
20 1
Total 28
NOTES
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
26
CS845: DATA MINING
Faculty: No of Hours: 52
Class #
CHAPTER TITLE/
Reference literature Topic to be Covered
% of portions covered
Reference
chapter
Cumulative
1
Chapter# 1 Introduction
T1:Page# : 39-98, 109-130
What is Data Warehouse?
18% 18%
2,3 A multidimensional Data Model
4,5 Data Warehouse Architecture
6,7 Data Warehouse Implementation
8 Data cube Technology
9 From Data warehousing to Data Mining
10 Data cleaning
11 Data integration and Transformation
12 Data Reduction
13,14 Chapter# 2 Data Mining
Primitives, languages
and System
Architectures
T1:Page# : 146-170
Data Mining Primitives, Presentation and Visualization
of discovered patterns
15% 33%
15,16,17 A Data Mining Query Language
18,19 Chapter# 3 Mining
Association Rules in
Large Data bases
T1:Page# : 225-269
Association Rule Mining
12% 45%
20,21 Single-Dimensional Boolean Association Rules from
Transactional Databases
22,23,24 Mining Multilevel Association Rules from Transactional
Databases
25
Chapter# 4
Classification and
Prediction
T1:Page# : 279-322
Issues Regarding Classification and Prediction
22% 67%
26,27 Classification by Decision tree induction
28,29 Bayesian Classification
30 Classification by Back propagation
31,32 Classification Based on the concepts from association
rule mining
33,34 Other classification methods
35 Prediction
36
Chapter# 5 Cluster
Analysis
T1:Page# : 335-388
What is Cluster Analysis?
18% 85%
37,38 Types of data in Cluster Analysis: A Categorization of
Major Clustering Methods
39 Partitioning Methods
40 Hierarchical Methods
41,42 Density-Based Methods
43,44 Model-Based Clustering Methods: Statistical Approach
& Neural Network Approach
45 Outliner Analysis
46
Chapter# 6 Applications
and Trends in Data
Mining
T1:Page# : 451-480
Data Mining Applications
15% 100%
47,48 Data Mining System Products and Research Prototypes
49,50,51 Additional Themes on Data Mining, Data Mining and
Intelligent Query Answering
52 Trends in Data Mining
Literature
Book type Code Title and Author
Publication specification
Edition Publication Year
Text Book T1
Data Mining Concepts and Techniques By Jiawei Han and
Micheline Kamber
1st Morgan KaufMann
Publishers
2003
Reference Boo R1
Data Mining A Hands-On Approach for Business Professionals
By Robert Growth 1s Prentice Hall PTR 1998
Reference Bo R2
Data Warehousing Fundamentals A Comprehensive Guide for IT
Professionals By Paulraj Ponniah 1s John Wiley & Sons 2001
Syllabus for Tests
Test 1: Class 1-12
Test 2: Class 13-27
Test 3: Class 28-38

P E S Institute of Technology Education for the Real World Course Information B.


E. 8th Semester CS 27
GUIDELINES FOR PROJECT WORK [CS85]

General:
1. Batch formation :
i) Students can do their project work in batches. However the batch size can var
y from
1[min] to 4[max].
ii) Students are to be regularly in touch with their guide on a weekly basis or
as is needed
by.
iii) Students can form their own batches within the stipulated time otherwise de
partment will
form batches and students have to accept it.
iv) Batch once formed cannot be changed.
v) Each batch will have a designated staff in charge to monitor the work progres
s at every
stage.
vi) All the projects are to be demonstrated with source code for all the evaluat
ions.
vii) Evaluation process will be in 2 stages.
S1.
1. Panel Approval : 20 Marks.
2. Guide Evaluation : 40 Marks.
S2
1. Final Project Presentation: 40 Marks.
S3
Total Evaluation Marks (20+40+40):100Marks.
2. Work Progress & Monitoring Procedure :
Stage 1:
Week No Date
01 Jan 29 Feb 3 Batch Submission in the prescribed format.
02 Feb 5 Feb 10 Final approved batch list along with staff in charge.
Stage 2:
Week No Date
03 Feb 12 Feb 17 Project title finalization, Place and Guide.
04 Feb 19 Feb 24 Literature survey document with detailed synopsis.
05 Feb 26 Mar 03 Software requirement document [SRS] to be
submitted.
Stage 3:
Week No Date
06 Mar 05 Mar 10 Design
07 Mar 12 Mar 17 Design document to be submitted. Viva-voce to be
conducted.
Stage 4:
Week No Date
08 Mar 19 Mar 24 Implementation & coding
09 Mar 26 Mar 31 Implementation, Coding & unit testing.
10 Apr 02 Apr 07 Implementation, Coding & unit testing.
11 Apr 09 Apr 14 Integration & Testing.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
28
Stage 5:
Week No Date
12 Apr 16 Apr 21 Unbounded draft copy of final report in the
prescribed format to be submitted for approval.
13 Apr 23 Apr 28 Evaluation presentation and viva-voce by
departmental council.
Stage 6:
Week No Date
14 Apr 30 May 05 Final bounded report to be submitted to the
department duly signed by the guide
Note:
The details regarding the color of binding, format for the report submission, an
d its contents will be
notified later.
CS85: PROJECT WORK
SCHEDULE
Week
No
COMPONENT
01 Batch Submission in the prescribed format.
02 Final approved batch list along with staff incharge.
03 Project title finalization, Place and Guide.
04 Literature survey document with detailed synopsis.
05 Software requirement document [SRS] to be submitted.
06 Design
07 Design document to be submitted. Viva-voce to be conducted.
08 Implementation & coding
09 Implementation, Coding & unit testing.
10 Implementation, Coding & unit testing.
11 Integration & Testing.
12 Unbounded draft copy of final report in the prescribed format to be submitted
for approval.
13 Evaluation presentation and viva-voce by departmental council.
14 Final bounded report to be submitted to the department duly signed by guide.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
GUIDELINES FOR SEMINAR [CS86]
General:
viii) Student has to individually carry out the seminar work
ix) Students are to be regularly in touch with the guide.
x) The seminar topic has to be a paper selected from leading journals in the are
a of
interest of the individual.
xi) Formal permission has to be taken from the author of the paper.
xii) Every student will have a designated staff in charge to monitor the work pr
ogress
at every stage.
xiii) The seminar is to be presented as per the guidelines to be given later.
xiv) Seminar doesn t have external evaluation.
xv) Evaluation process will be in 2 stages.

Continuous evaluation by guide: 20 Marks.


Final Seminar Presentation (panel Evaluation): 30 Marks.
Total Evaluation Marks (20+30): 50 Marks.
Work Progress, Monitoring Procedure & Seminar Schedule
Week No Date Schedule
01 Jan 29 Feb 3 Title Submission in the prescribed format.
02 Feb 5 Feb 10
Final approved seminar list along with staff
In-charge.
03 Feb 12 Feb 17 Submission of synopsis
04 Feb 19 Feb 24 Literature survey
05 Feb 26 Mar 03 Literature survey document to be submitted
06 Mar 05 Mar 10 Understanding the methodology/approach
07 Mar 12 Mar 17 Understanding the methodology/approach
08 Mar 19 Mar 24 Understanding the methodology/approach
09 Mar 26 Mar 31 Gist of the paper to be submitted
10 Apr 02 Apr 07 Preparation for the seminar in consultation
with the guide
11 Apr 09 Apr 14 Draft copy approval of seminar report
12 Apr 16 Apr 21 Final Seminar Presentation*
*During the FSP the following documents have to be submitted.

Soft bound, grey color seminar report (1 copy).


Two sets of handouts.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
30
PORTIONS FOR TEST

Subject Subject Code Test Portions


Test 1 Class # 1-18
CIP CIP81 Test 2 Class # 19-33
Test 3 Class # 34-52
Test 1 Class #1 Class #20
ACA CS82 Test 2 Class #21 Class #38
Test 3 Class #39 Class #52
Test 1 Class #1 Class #20
CNS 843 Test 2 Class #21 Class #36
Test 3 Class #37 Class #52
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS

You might also like