Top Banner
P E S Institute of Technology Education for the Real World Course Information – B.E. 8 th Semester CS 1 GENERAL GUIDELINES 1. This book is to be brought to the class daily. 2. Students are not permitted to attend the class without the identity card, once issued. 3. Students should be well on time right from the first class. 4. Students should keep the Classrooms, Laboratories and Workshops clean. 5. Writing on desks and walls is strictly prohibited, failing which the students will be fined heavily. If the identity of the individual is not established the entire class / students in the block will be fined. 6. Students are advised to show due respect to all faculty regardless of their department and maintain affable personality. 7. Students are to maintain absolute discipline and decorum, so as to promote the fair name of their college in all its activities. 8. Students securing less than 85% attendance in any individual subject will not be allowed to take up the university exams. 9. Students are informed to clarify their doubts in the respective subjects with the faculty by taking prior appointment. 10. Students are to inform their parents that they should follow up the progress of their wards by being in touch with the college authorities at regular intervals. 11. Ragging is punishable under Karnataka Education Act and is strictly prohibited. Any student involved in ragging, will be severely punished. 12. Students who secure less than 60% in the University exam and / or who secure less than 60% in the internal test are to go through the Academic Support programme compulsorily. The guidelines will be issued separately by the concerned department. 13. The suggestion boxes are maintained at strategic places in the campus. Students are to avail these facilities. 14. Students are not supposed to alter the configuration of the system / any software on the system. 15. Students are informed to follow the schedule as given in the calendar of events with respect to seminar work 16. Students are informed to follow the schedule as given in the calendar of events with respect to Project work SEMESTER - VIII - TIME TABLE Day / Time 8.15 - 9.15 9.15 - 10.15 10.45 –11.45 11.45-12.45 1.30-2.30 2.30-3.30 3.45-4.45 4.45-5.45 Monday Tuesday Wednesday Thursday Friday Saturday SCHEME OF STUDY AND EXAMINATIONS FOR BE DEGREE COURSE IN COMPUTER SCIENCE & ENGINEERING No. of Hr. / week Examination Sl. No Code No. Subject Theory Practical Duration I.A Marks Theory/Pract. Total Marks 1. CIP81 Constitution of India & Professional Ethics 04 -- 03 25 100 125 2. CS82 Advanced Computer Architecture 04 -- 03 25 100 125 3. Elective – IV (Group – D) 04 -- 03 25 100 125 4. Elective – V (Group – E) 04 -- 03 25 100 125 5. CS85 Project Work -- 06 03 100 100 200 6. CS86 Seminar ( Contact Hours -- -- -- 50 -- 50 Total 16 06 15 250 500 750 STUDENT SELF APPRAISAL MARKS ATTENDANCE SUBJECT TEST 1 TEST 2 TEST 3 REPORT 1 REPORT 2 REPORT 3 Constitution of India & Professional Ethics Advanced Computer Architecture Elective – IV (Group – D) Elective – V (Group – E)
31
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 1

GENERAL GUIDELINES

1. This book is to be brought to the class daily. 2. Students are not permitted to attend the class without the identity card, once issued. 3. Students should be well on time right from the first class. 4. Students should keep the Classrooms, Laboratories and Workshops clean. 5. Writing on desks and walls is strictly prohibited, failing which the students will be fined heavily. If the identity of

the individual is not established the entire class / students in the block will be fined. 6. Students are advised to show due respect to all faculty regardless of their department and maintain affable personality. 7. Students are to maintain absolute discipline and decorum, so as to promote the fair name of their college in all its activities. 8. Students securing less than 85% attendance in any individual subject will not be allowed to take up the university

exams. 9. Students are informed to clarify their doubts in the respective subjects with the faculty by taking prior appointment. 10. Students are to inform their parents that they should follow up the progress of their wards by being in touch with the college

authorities at regular intervals. 11. Ragging is punishable under Karnataka Education Act and is strictly prohibited. Any student involved in ragging,

will be severely punished. 12. Students who secure less than 60% in the University exam and / or who secure less than 60% in the internal test are to go

through the Academic Support programme compulsorily. The guidelines will be issued separately by the concerned department.

13. The suggestion boxes are maintained at strategic places in the campus. Students are to avail these facilities. 14. Students are not supposed to alter the configuration of the system / any software on the system. 15. Students are informed to follow the schedule as given in the calendar of events with respect to seminar work 16. Students are informed to follow the schedule as given in the calendar of events with respect to Project work

SEMESTER - VIII - TIME TABLE

Day / Time 8.15 - 9.15 9.15 - 10.15 10.45 –11.45 11.45-12.45 1.30-2.30 2.30-3.30 3.45-4.45 4.45-5.45 Monday Tuesday Wednesday Thursday Friday Saturday

SCHEME OF STUDY AND EXAMINATIONS

FOR BE DEGREE COURSE IN COMPUTER SCIENCE & ENGINEERING No. of Hr. / week Examination Sl.

No Code No.

Subject Theory Practical Duration I.A Marks Theory/Pract. Total Marks

1. CIP81 Constitution of India & Professional Ethics

04 -- 03 25 100 125

2. CS82 Advanced Computer Architecture

04 -- 03 25 100 125

3. Elective – IV (Group – D) 04 -- 03 25 100 125 4. Elective – V (Group – E) 04 -- 03 25 100 125 5. CS85 Project Work -- 06 03 100 100 200 6. CS86 Seminar ( Contact Hours -- -- -- 50 -- 50

Total 16 06 15 250 500 750 STUDENT SELF APPRAISAL

MARKS ATTENDANCE SUBJECT TEST 1 TEST 2 TEST 3 REPORT 1 REPORT 2 REPORT 3

Constitution of India & Professional Ethics

Advanced Computer Architecture

Elective – IV (Group – D)

Elective – V (Group – E)

Page 2: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 2

CIP81: CONSTITUTION OF INDIA AND PROFESSIONAL ETHICS Faculty: No. of Hours: 52

% of Portion Covered Class #

Chapter Title / Reference Literature Topic to be Covered

Reference Chapter Cumulative 01 Preamble to the constitution of India 02

Preamble & Evolution Of Constitutional Law T2 - Chapter- Evolution of constitutional Law

5% 5%

03 Scope of fundamental rights under part - III 04 Extent of fundamental rights under part - III 05 Details of exercise of rights 06 Details of exercise of rights

07

Scope and Extent of Fundamental Rights, Details of Exercise of Rights, Limitations and Important Cases T2 Chapter-6 Pages : 522-603

Limitations and Important cases of rights

17% 22%

08 Classification of Directive 09 Scope of Directive 10 Nature o Economic Democracy Envisaged 11 Socialistic pattern of society 12 42nd and 44th Amendments 13 Directives and Fundamental Rights - comparison 14 Directives and Fundamental Rights – conflicts 15 Non-Justiciability 16 Utility of Directives 17 Implementation of Directives 18

Relevance Of Directive Principles Of State Policy Under Part - IV T1-Chapter-8 Pages: 721-834 T2-Chapter-7 Pages: 604-671

Directives in other parts of Constitution

17% 39%

19 Significance of Fundamental Duties-T2

Significance of Fundamental Duties under part IVa 5% 44%

20 Union Executive - President, Vice President 21 Council of Ministers 22 Prime Minister 23

Union Executive

Parliament and Supreme Court of India

7% 51%

24 State Executive - Governor 25 Council of Ministers 26 Chief Minister 27

State Executive

Legislature and High Courts

7% 58%

28 Scheduled castes and Tribes 29 Women and children 30

Constitutional Provisions For Special Areas.

Backward classes 7% 65%

31 Emergency Powers 32 Emergency Powers 33

Emergency Powers, Major Constitutional Amendments Major constitutional Amendments

7% 72%

34 Elections, Legislatorial powers, Decision of Disputes 35 Amendments, Special Jurisdiction 36

Electoral Process Election Commission

5% 77%

37 Professional Ethics 38 Moral Problem Solving 39

Scope and Aims of Engineering Ethics T3: Chapters – 1, 3, 4 Organizing Principles

5% 82%

40 Concepts of Responsibility 41 Reasonable care and Good Works 42

Responsibility of Engineers – Impediments to Resp. T3: Chapter – 5 Virtues and Impediments to Responsibility

5% 87%

43 Ways of misusing the Truth 44 Honesty on Campus 45 Integrity with respect to various aspects 46

Honesty, Integrity and Reliability T3 Chapter – 6

Conflicts of interest

7% 94%

47 The codes and Engineering Practice 48 Estimating Risks 49 Acceptable Risks 50 Engineer’s Liability for Risks 51 Becoming a responsible engineer regarding Risk 52

Risk Safety and Liability in Engineering T3 Chapter – 7

Honesty, Integrity and Reliability

6% 100%

Literature: Publication Info

Book Type Code Title & Author Edition Publisher Year

Text Books T1 An Introduction to constitution of India (Students Ed), Durga Das Basu, 19th / 20th PHI 2001 Text Books T2 Constitution of India, V.N.Shukla Latest Text Books T3 Engineering Ethics by Charles E Harris, Michael S Pritchard and M. J Robins 2nd Thompson Asia 03-08-05 Reference Books R1 Introduction to constitution of India, M.V. Pylee Vikas 2002 Reference Books R2 Ethics in Engineering by Mike W martin and Roland Schinzinger Reference Books R3 Introduction to Engineering Ethics by Roland Schinzinger and Mike W martin 2002 Reference Books R4 Introduction to constitution of India by Brij Kishore Sharma PHI 2002

Page 3: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 3

OBJECTIVE OF THE SUBJECT: According to its constitution, India is a "sovereign, socialist, secular, democratic republic." India has a federal form of government. However, the central government in India has greater power in relation to its states, and its central government is patterned after the British parliamentary system. India's independent judicial system began under the British, and its concepts and procedures resemble those of Anglo-Saxon countries. The first nine chapters of the course focus on the main features of Constitution of India. The last four chapters focus on the ethical dimensions of engineering practice. Engineers play a vital role in protecting and assisting the public and this requires imagination, persistence and a string sense of responsibility. Personal ethics is a foundation for professional ethics. The importance and the different ways of developing it is given under these sections.

QUESTION BANK PREAMBLE OF CONSTITUTION OF INDIA AND EVOLUTION OF CONSTITUTION LAW OBJECTIVE: The preamble summarizes the aims and objects of constitution. The purposes are

• Source from which the Constitution derives its authority • Objects which the Constitution seek to establish and promote

1. The preamble summarizes

A. Aims B. Objects C. Both D. Amendments 2

2. The purpose of preamble to our Constitution is A. Source of Constitution’s authority B. Stating Objects C. Both D. Representing Amendments

2

3. The importance of preamble is pointed out in several decisions of our A. Parliament B. High Court C. Supreme Court D. All the above

2

4. Pandit Nehru’s resolution is fully reflected in A. Constitution of India B. Preamble C. Both D. None of the above

2

FUNDAMENTAL RIGHTS OF INDIAN CITIZENS OBJECTIVE: The Fundamental Rights embodied in the Indian constitution are guaranteed to all Indian citizens. These civil liberties take precedence over any other law of the land. They include individual rights common to most liberal democracies, such as equality before the law, freedom of speech and expression, freedom of association and peaceful assembly, freedom of religion, and the right to constitutional remedies for the protection of civil rights such as habeas corpus. In addition, the Fundamental Rights for Indians are aimed at overturning the inequities of past social practices. They abolish "untouchability"; prohibit discrimination on the grounds of religion, race, caste, sex, or place of birth; and forbid traffic in human beings and forced labor. They go beyond conventional civil liberties in protecting cultural and educational rights of minorities by ensuring that minorities may preserve their distinctive languages and establish and administer their own education institutions. 5. Fundamental rights protects our

A. Equality B. Liberty C. Both D. None 2

6. The fundamental rights has been embodied under ------------- of Constitution of India A. Part I B. Part II C. Part III D. Part IV

2

7. Fundamental Rights act as limitation upon A. Powers of Executive B. Powers of Legislature C. Both D. None

2

8. In case of any transgression regarding our Constitution, ------------- is (are) 2

Page 4: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 4

competent to declare a law unconstitutional. A. High Court B. Supreme Court C. both D. None

9. Our Constitution follows A. American model B. English Model C. Mixed D. None

2

10. The powers of Judiciary vis-à-vis the Legislature are weaker in A. United States B. British C. India D. All the above

2

11. Which of these is not a fundamental right? A. Right against Exploitation B. Right of property C. Right to freedom of religion D. All the above

2

12. The Constitution of India originally classified Fundamental Rights under A. 5 groups B. 6 groups C. 7 groups D. 8 groups

2

13. Currently the Constitution of India has Fundamental Rights under A. 5 groups B. 6 groups C. 7 groups D. 8 groups

2

14. With respect to Constitution of India, the right “Equality before Law” is available for A. only Citizens of India B. Only foreigners C. Both D. only Hindus

2

RELEVANCE OF DIRECTIVE PRINCIPLES OF STATE POLICY: OBJECTIVE: An important feature of the constitution is the Directive Principles of State Policy. Although the Directive Principles are asserted to be "fundamental in the governance of the country," they are not legally enforceable. Instead, they are guidelines for creating a social order characterized by social, economic, and political justice, liberty, equality, and fraternity as enunciated in the constitution's preamble.

15. Which part of the Constitution of India contains the Directive Principles of State Policy? A. part I B. Part II C. Part III D. Part IV

2

16. Who is responsible for administration and making of Directive principles of State Policy? A. The President B. The Central C. The State D. The people

2

17. The Directives are not enforceable in court A. True B. False C. Not under emergency D. cannot say

2

18. The Directives are implemented by Legislature A. True B. False C. Not under emergency D. cannot say

2

19. It shall be the duty of the state to apply these principles in making laws A. True B. False C. Only under emergency D. cannot say

2

SIGNIFICANCE OF FUNDAMENTAL DUTIES OBJECTIVE: The Fundamental rights have been provided at the cost of some fundamental duties. These are considered as the duties that must be and should be performed by every citizen of India. These fundamental duties are defined as: It shall be the duty of every citizens of India: -

• To abide by the Constitution and respect its ideals and institutions, the National Flag and the National Anthem;

• To cherish and follow the noble ideals which inspired our national struggle for freedom; • To uphold and protect the sovereignty, unity and integrity of India; • To defend the country and render national service when called upon to do so; • To promote harmony and the spirit of common brotherhood amongst all the people of

India transcending religious, linguistic and regional or sectional diversities; to renounce practices derogatory to the dignity of women;

• To value and preserve the rich heritage of our composite culture; • To protect and improve the natural environment including forests, lakes, rivers and wild

life, and to have compassion for living creatures; • To develop the scientific temper, humanism and the spirit of inquiry and reform; • To safeguard public property and to abjure violence;

Page 5: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 5

• To strive towards excellence in all spheres of individual and collective activity so that the nation constantly rises to higher levels of Endeavour and achievement.

20. How many are the fundamental duties

A. 10 B. 20 C. 35 D. 46 2

21. There is no provision in the Constitution of India for direct enforcement of any Duties A. True B. False C. Not common for all duties D. President can

2

22. The fundamental duties include which of the following? A. To abide by the Constitution of India B. To cherish the noble ideas which inspired the struggle or freedom C. To defend the country D. All the above

2

23. Which of the following is not a fundamental duty? A. to protect the sovereignty B. to preserve the rich heritage of our composite culture C. to protect and improve the natural environments D. none of the above

2

24. To safe guard one’s public property is his A. fundamental right B. fundamental duty C. both D. cannot say

2

25. Hindu religion developed resilience to accommodate with tolerance the cultural richness and it is called as A. secularity B. sovereignty C. composite culture D. none of the above

2

UNION EXECUTIVE OBJECTIVE: The Union Executive consists of the President, the Vice-President and Council of Ministers with the Prime Minister at the head to aid and advise the President. The government exercises its broad administrative powers in the name of the president, whose duties are largely ceremonial. The president and vice president are elected indirectly for 5-year terms by a special electoral college. Their terms are staggered, and the vice president does not automatically become president following the death or removal from office of the president. Real national executive power is centered in the Council of Ministers (cabinet), led by the prime minister. The president appoints the prime minister, who is designated by legislators of the political party or coalition commanding a parliamentary majority. The president then appoints subordinate ministers on the advice of the prime minister. The legislatures of the states and union territories elect 233 members to the Rajya Sabha, and the president appoints another 12. The elected members of the Rajya Sabha serve 6-year terms, with one-third up for election every 2 years. The Lok Sabha consists of 545 members; 543 are directly elected to 5-year terms. The other two are appointed. The Supreme Court consists of a chief justice and 25 other justices, all appointed by the president on the advice of the prime minister.

26. Electoral college consists of A. Elected members of both houses of Parliament B. Elected members of legislative assemblies of States C. Elected members of Legislative assemblies of Union Territories of Delhi and Pondicherry D. All the above

2

27. Who among the following is disqualified for election as President? A. President of Union B. Governor of any State C. Minister of Union D. None

2

28. The President shall hold the position of A. Member of Parliament B. Member of Legislature C. Any other profitable office D. None

2

Page 6: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 6

29. A vacancy on the office of President may be due to A. Expiry of term B. By his resignation C. Removal by impeachment D. any of the above

2

30. The vice president’s election does not involve A. Lok Sabha B. Rajya Sabha C. State Legislature D. All the above

2

31. Who is the head of council of ministers? A. President B. Vice- president C. Prime Minister D. Governor

2

32. The powers vested with the President are A. Administrative powers B. Military powers C. Legislative powers D. All the above

2

33. Judicial powers include A. granting of pardons B. granting of reprieves C. Both D. None

2

34. Who has the power to summon (Like English crown) the parliament? A. President B. Vice-president C. Both D. The People

2

35. The President has powers to nominate certain members to both the houses. A. True B. False C. Only under emergency D. cannot say

2

36. The Prime Minister is selected by A. President B. Vice-president C. The ministers D. The People

2

37. It is possible to appoint a person outside the legislature as minister A. True B. False C. Only under emergency D. cannot say

2

38. The resignation of Prime Minister A. Merely creates a vacancy B. Dissolves the cabinet C. Dissolves the Government D. All the above

2

STATE EXECUTIVE OBJECTIVE: India has 25 states and 7 union territories. At the state level, some of the legislatures are bicameral, patterned after the two houses of the national parliament. The states' chief ministers are responsible to the legislatures in the same way the prime minister is responsible to parliament.

Each state also has a presidentially appointed governor who may assume certain broad powers when directed by the central government. The central government exerts greater control over the union territories than over the states, although some territories have gained more power to administer their own affairs. Local governments in India have less autonomy than their counterparts in the United States. Some states are trying to revitalize the traditional village councils, or panchayats, which aim to promote popular democratic participation at the village level, where much of the population still lives.

39. The head of executive power of state is A. President B. Vice President C. Governor D. Chief Minister

2

40. Single person can be appointed as Governor for 2 or more states A. True B. False C. Only under emergency D. cannot say

2

41. The Governor is A. elected by people B. Selected by cabinet ministers C. Appointed by President D. Any one of above

2

42. The governor doesn’t have A. Executive powers B. Military powers C. Legislative powers D. All the above

2

43. The head of state council of ministers is A. President B. Vice President C. Governor D. Chief Minister

2

44. Governor will be under the control of President A. True B. False C. Only under emergency D. cannot say

2

45. The governor can dismiss the chief minister at his pleasure A. True B. False C. Only under emergency D. cannot say

2

46. The post of Advocate-General is corresponding to A. Vice-president B. Attorney – General C. Governor D. High court Judge

2

Page 7: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 7

47. 5/6 of total number of members of state council shall be directly elected and 1/6 will be nominate by A. President B. Prime Minister C. Governor D. Chief Minister

2

CONSTITUTIONAL PROVISIONS FOR SPECIAL AREAS OBJECTIVE: Scheduled Castes and Scheduled Tribes are communities that are accorded special status by the Constitution of India. These communities were considered 'outcastes' and were excluded from the Chaturvarna system that was the social superstructure of Hindu society in the Indian subcontinent for thousands of years. These castes and tribes have traditionally been relegated to the most menial labor with no possibility of upward mobility, and are subject to extensive social disadvantage and discrimination, in comparison to the wider community. Under article 51A(e) it is the fundamental duty of every citizen of India to renounce practices derogatory to the dignity of women. In addition, the State must make provision for securing just and humane conditions of work and for maternity relief. Panchayati Raj Institutions are local government bodies established under the Constitution. Under article 243D, one-third of seats reserved for Scheduled Castes Tribes, are reserved for women, and one-third (including the number of seats reserved for women belonging to the Scheduled Castes and the Scheduled Tribes) of the total number of seats to be filled by direct election in every Panchayat are reserved for women. There are proposals to reserve seats for women in the House of the People and in the Legislative Assemblies of the States by amending the Constitution.

48. The Scheduled Areas doesn’t include A. Assam B. Tripura C. Meghalaya D. All the above

2

49. The power to declare any area as ‘Scheduled Area’ in any state is given to A. President B. Prime Minister C. Governor D. Chief Minister of that state

2

50. The tribal areas include the areas in the state A. Assam B. Tripura C. Meghalaya D. All the above

2

51. Who can make regulations to restrict the transfer of land related to members of Scheduled Tribes A. President B. Prime Minister C. Governor D. Chief Minister of that state

2

52. Who appoints the commission to report on the welfare of Scheduled areas A. President B. Prime Minister C. Governor D. Chief Minister of that state

2

EMERGENCY POWERS, MAJOR CONSTITUTIONAL AMENDMENTS OBJECTIVE: NATIONAL EMERGENCY ART 352 (1) If the President is satisfied that a grave emergency exists whereby the security of India or any part of the territory thereof is threatened, whether by war or external aggression or armed rebellion, he may, by Proclamation, make a declaration to that effect, in respect of the whole or such part of the territory thereof........., ART 353 While a Proclamation of emergency is in operation, then not withstanding anything in this Constitution, the executive power of the Union shall extend to the giving of directions to any State as to the manner in which the executive power thereof is to be exercised. STATE: ART 356 If the President on a receipt of report from the Governor of a state or is otherwise satisfied that a situation has arisen in which the government of a state cannot be carried on in accordance with the provisions of the Constitution, the President may by Proclamation -

a. assume to himself all or any of the functions of the government of the state or any body or authority in the state except the powers of the legislature.

b. declare that the powers of the legislature shall be exercisable by the Parliament, Provided nothing in this Art authorizes the President to assume to himself any of the powers vested in the High Court. The Proclamation shall be in operation for a period of 6 months.

Page 8: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 8

53. Which is not an emergency situation?

A. War B. Failure of constitutional machinery in states C. Financial emergency D. none of the above

2

54. Existence of a condition in which an area is threatened by war or external aggression or armed rebellion is known as A. Emergency B. Election C. both D. None of above

2

55. Under a proclamation of emergency in case of constitutional machinery, A. State legislature would continue to operate B. State legislature would be suspended C. State legislature is not related D. None of the above

2

56. Under a proclamation of emergency A. Centre shall suspend State Government B. Centre cannot suspend State government C. Both Central and State Governments are suspended D. None of the above

2

57. The duration for proclamation of emergency shall ordinarily be for A. 15 days B. One month C. 2 Months D. Not defined

2

58. The maximum duration of extension of a proclamation is A. One month B. 2 Months C. One year D. Not defined

2

ELECTORAL PROCESS OBJECTIVE: The Constitution of India has vested in the Election Commission of India the superintendence, direction and control of the entire process for conduct of elections to Parliament and Legislature of every State and to the offices of President and Vice-President of India. The Election Commission - Election Commission of India is a permanent Constitutional Body. The Election Commission was established in accordance with the Constitution on 25th January 1950. The Commission celebrated its Golden Jubilee in 2001. Originally the commission had only a Chief Election Commissioner. It currently consists of Chief Election Commissioner and two Election Commissioners; it had only the Chief Election Commissioner before 1989. The concept of multi-member Commission has been in operation since 1993, with decision making power by majority vote. Electoral Laws & System - Elections are conducted according to the constitutional provisions, supplemented by laws made by Parliament. The major laws are Representation of the People Act, 1950, which mainly deals with the preparation and revision of electoral rolls, the Representation of the People Act, 1951 which deals, in detail, with all aspects of conduct of elections and post election disputes. The Supreme Court of India has held that where the enacted laws are silent or make insufficient provision to deal with a given situation in the conduct of elections, the Election Commission has the residuary powers under the Constitution to act in an appropriate manner. Appointment & Tenure of Commissioners - The President appoints Chief Election Commissioner and Election Commissioners. They have tenure of six years, or up to the age of 65 years, whichever is earlier. They enjoy the same status and receive salary and perks as available to Judges of the Supreme Court of India. The Chief Election Commissioner can be removed from office only through impeachment by Parliament.

59. There shall be ---------- number of electoral roll(s) for every territorial constituency for election A. 2 ( One for Parliament and one for State Legislature B. only one C. One for each community D. One for each party

2

Page 9: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 9

60. For Adult suffrage basis, essential conditions are A. Citizenship B. Above 18 years of age C. no disqualifications by any law D. All the above

2

61. Proportional representation has been prescribed for election to office of A. President B. Vice president C. Both D. None

2

62. The supervision of entire election process is given to A. Parliament B. respective state legislatures C. Election commission D. All the above

2

63. The provision for removal of ------------- makes Election commission , independent of executive control A. Control by High Court B. Control by President C. Election commissioner D. All the above

2

64. The regional commissioners are appointed by A. President B. Election Commissioner C. Election commission D. Any of the above

2

65. With regards to election disputes, questions can be agitated by A. Rising questions in Houses B. Filing case in High Court C. Filing case in Supreme Court D. Election Petition

2

SCOPE AND AIMS OF ENGINEERING ETHICS OBJECTIVE: Professional ethics is the set of standard adopted by professionals insofar as they see themselves acting as professionals. It is the set of one’s own ethical commitments, usually given in early home or religious training and often modified by later reflection. Aims of engineering ethics are as follows:

• Stimulating the moral imagination • Recognizing ethical issues • Developing analytical skills • Eliciting a sense of responsibility • Tolerating disagreement and ambiguity •

66. Engineering ethics is a type of

A. Personal Ethics B. Professional Ethics C. Both D. Common morality 2

67. The set of own ethical commitments, usually given in early home and modified by later reflection is A. Personal Ethics B. Professional Ethics C. Engineering ethics D. Common morality

2

68. The set of moral ideas shared by most of a culture or society is termed as A. Personal Ethics B. Professional Ethics C. Engineering ethics D. Common morality

2

69. An engineer refuses to design military hardware as he believes war is immoral. This refusal is based on A. Personal Ethics B. Professional Ethics C. Both D. Common morality

2

70. A civil engineer refuses to design a project he believes will be contrary to the principles of sustainable development. This refusal could be based on A. Personal Ethics B. Professional Ethics C. Common morality D. All the above

2

71. An engineer insists on complete honesty in the reporting of technical information to his client. This insistence could be based on A. Personal Ethics B. Professional Ethics C. Common morality D. All the above

2

72. A professional codes of ethics should be followed by A. MNCs B. Educational Institutes C. Government Offices D. All the above

2

Page 10: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 10

73. An implicit agreement among the professionals and between professionals and public is called as A. Code of Ethics B. International Standards C. Common morality D. All the above

2

74. Professional ethics provides A. A focus for debate on how professional ethics should be modified B. A rationale for professionals to adhere to professional standards under any pressure C. A common agreed upon standards for professional conduct D. All the above

2

75. A way to resolve values that comes as close as possible to satisfying all relevant obligations is A. Line Drawing B. Creative middle way C. Both D. None

2

76. Cases that are uncontroversially wrong are A. Positive paradigm cases B. Negative paradigm cases C. Middle way D. All the above

2

77. In evaluating moral problem, we can take the stand point of A. An agent actually immersed in the situation B. An external judge C. Both D. Should not image a different stand point

2

78. What favors bringing about the greatest total amount of good that we can. A. Code of Ethics B. International Standards C. Common morality D. Utilitarian thinking

2

79. What is the duty corresponding to this “ I have right not to be cheated” A. My duty to see that no body cheats me B. Others have a duty not to cheat me C. Both D. None of the above

2

80. With respect to problem of conflicting rights, is it right when a plant manager attempt to save money b y emitting a pollutant that is highly carcinogenic? A. Yes B. No C. May be D. Cant say

2

RESPONSIBILITY OF ENGINEERS OBJECTIVE: Responsibility is attributed to persons in both law and morality. In regard to responsibility for causing harm, we distinguish as

• Intentionally caused harm • Negligently caused harm • Recklessly caused harm

Reasonable care: The idea has moral basis, regardless of how it gets played out in courts of law. The third concept of responsibility is “Good Work” The responsibility can include virtues that go beyond fulfilling basic duties. Impediments:

• Self-Interest • Fear • Self-Deception • Ignorance • Egocentric Tendencies • Microscopic vision • Uncritical Acceptance of Authority • Group Think

Page 11: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 11

81. Responsibility is A. Fictional B. Instructive C. Both D. cannot say

2

82. Intentionally, negligently and recklessly are the classification of A. Causing harm B. Accepting Duties. C. Cheating others D. All the above

2

83. The area of Law where there is no attribution of fault or blame, but should have a legal responsibility to provide compensation is termed as A. Strict Liability B. Personal Ethics C. Common morality D. All the above

2

84. A kind of negativity and exclusivity is given to responsibility by A. Code of Ethics B. International Standards C. Reasonable Care D. Minimalist view

2

85. “Stay out of trouble” is the concern of A. Code of Ethics B. International Standards C. Reasonable Care D. Minimalist view

2

86. The expression “above and beyond the call of duty” stands for A. Good works B. International Standards C. Reasonable Care D. Minimalist view

2

87. Good works may be discouraged by A. Need to meet tight time schedules B. Limited budgets C. Press of other matters at hand D. All above

2

88. Virtues normally include A. Attitudes and dispositions B. Conduct C. Moral Character D. All the above

2

89. The obstacle for engineering responsibility is A. Self-interest B. Punctuality C. Patriotism D. All the above

2

90. A strict adherence to minimalist view may result in A. Avoidable harms B. Over emphasis on attributing blame C. Both D. None

HONESTY, INTEGRITY AND RELIABILITY OBJECTIVE: Engineering codes require engineers to be honest and impartial in their professional judgments. On the way of misusing the truth along with lying and deliberate deception, engineers can withhold the truth, fail to adequately promote dissemination of information, fail to seek out the truth, reveal confidential or proprietary information and allow their judgment to be corrupted. Integrity in expert testimony requires engineers to take cases only when they have adequate time for preparation. A conflict of interest exists for professional when acting in a professional role, they are subject to influences, loyalties, temptations or other interests that tend to make the professional’s judgment less likely to benefit the customer or client.

91. A tendency of individual members toward ---------------- results from a desire not to “rock the boat” A. Illusion of morality B. Self-censorship C. Illusion of unanimity D. Mind guarding

2

92. An inherent morality of the group and thereby discouraging careful examination of the moral implications of its activities is termed as A. Illusion of morality B. Self-censorship C. Illusion of unanimity D. Mind guarding

2

93. The act of protecting the group from dissenting views by preventing their introduction is call A. Illusion of morality B. Self-censorship C. Illusion of unanimity D. Mind guarding

2

94. What is construing silence of a group member as Consent called? A. Illusion of morality B. Self-censorship C. Illusion of unanimity D. Mind guarding

2

Page 12: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 12

95. Direct pressure in groupthink means A. Protecting the group from dissenting views B. Pressure exercised by the group leader on those who show signs of dos- agreement C. Construing silence of a group member as Consent D. An inherent morality of the group

2

96. Symptoms of group think includes A. rationalizations B. Mind-guarding C. Direct pressure D. All the above

2

97. A honest engineer is one who A. avoids dishonesty B. is committed to find the truth C. adequately promotes the dissemination of information D. all the above

2

98. one can misuse the truth by A. Lying B. disclosing truth in appropriate circumstances C. withholding information D. all the above

2

99. The process of smoothing the irregularities to make the data look extremely accurate and precise is called as A. cooking B. trimming C. forging D. plagiarism

2

100. The process of retaining only those results that fit the theory and discarding others is called as A. cooking B. trimming C. forging D. plagiarism

2

101. The process of inventing some or all of the research data that are reported is called as A. cooking B. trimming C. forging D. plagiarism

2

102. The sue of intellectual property of others without proper permission or credit is called as A. cooking B. trimming C. forging D. plagiarism

2

103. The documents issued by the government that allow the owner to exclude others from making use of the particular information for 20 years from the date of filling is known as A. trademarks B. copyrights C. Patents D. all the above

2

104. The right to creative products that protect only the expression of idea, but not the ideas themselves is known as A. trademarks B. copyrights C. Patents D. all the above

2

105. The words, phrase, symbols, sounds or designs associated with goods or services are known as A. trademarks B. copyrights C. Patents D. all the above

2

106. “Engineers shall not attempt to attract an engineer from another employer by false or misleading pretenses” – this case come under A. Code of Ethics B. International Standards C. Common morality D. Professional Obligations

2

107. An engineer can abuse client-professional confidentiality by A. breaking confidentiality when it is not warranted B. refusing to break confidentiality when higher obligation to public requires it C. both D. None

2

RISK SAFETY AND LIABILITY IN ENGINEERING OBJECTIVE: Although fictional, this is instructive. What engineers do matters a great deal? Accidents are costly for us, for the environment and for the organization. Engineering codes require engineers to hold paramount the safety, health and welfare of the public. They have to protect the public from unacceptable risks. Balancing the protection of individuals against the promotion of the public welfare poses one of the most difficult problems for those responsible for managing risk.

Page 13: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 13

108. The diagram of possible ways in which a malfunction or accident occurs is called as A. performance chart B. Risk chart C. Fault tree D. Risk Tree

2

109. In ----------, we begin with an undesirable event, then moving further to determine what might have led to the event A. performance chart B. Risk chart C. Fault tree D. Event tree

2

110. In ----------, we begin with an initial event and reason forward to a state of the system to which the event can lead A. performance chart B. Risk chart C. Fault tree D. Event tree

2

111. Normal accidents include A. tight coupling B. Complex interactions C. Both D. None

2

112. Processes that are connected in such a way that one is known to affect another within a short time is A. Tightly coupled processes B. complexly interactive C. Both D. None

2

113. Parts of the system can interact in unanticipated ways. These processes are called A. Tightly coupled processes B. complexly interactive C. Both D. None

2

114. The phenomenon of allowing increasing number of deviations from proper standards of safety is called A. tight coupling B. Complex interactions C. normalization of deviance D. All the above

2

115. When the risk of harm is equaled by the probability of producing benefit, given the options available, the risk is termed as A. Risk of Benefit B. Acceptable risk C. Favorable risk D. Justifiable risk

2

Marks No. of Questions 2 115

Page 14: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 14

ADVANCED COMPUTER ARCHITECTURE

Faculty: No. of Hours: 52

% of portions covered Class

# Chapter Title/

Reference Literature Topics to be covered Reference

Chapter Cumulative

Parallel Computer Models: 1,2,3 The state of computing 4,5 Multiprocessors and Multicomputers

6

Chapter #1: Parallel Computer Models T1: Page # 1 to 32. Multivector and SIMD computers

11.00% 11.00%

Program and Network Properties: 7,,8 Conditions Of Parallelism 9,10 Program Partitioning and Scheduling

11,12 Program Flow Mechanisms 13,14

Chapter # 2: Program and Network Properties T2: Page# 51 to 96

System Interconnect Architecture

17.00% 28.00%

Processor and Memory Technologies: 15,16 Advanced Processor Technology 17,18 Superscalar and vector processor

19 Backplane Bus System 20

Chapter # 3: Processors and Memory Technologies T1: Page # 157 to 188, 213 to 224, 239 to 248 Shared Memory Organizations

14.00% 42.00%

Pipelining and Superscalar Techniques 21,22,

23 Linear Pipeline Processors

24,25,26

Non-linear Pipeline Processors

27,28 Instruction Pipeline Design 29,30

Chapter # 4: Pipelining and Superscalar Techniques T1: Page # 265 to 308.

Arithmetic Pipeline Design

22.00% 64.00%

Multiprocessor and Multi-computers 31,32,

33 Multiprocessor System Interconnects

34,35,36

Cache Coherence and Synchronization Mechanisms

37,38

Chapter # 5: Multiprocessor and Multi-computers T1: Page # 331 to 368, 375 to 393.

Message Passing Schemes

15.00% 79.00%

Parallel Programs 39,40,

41 Parallel Application Case Studies

42,43 The Parallelization Process 44,45,

46

Chapter # 6: Parallel Programs T2: Page # 75 to 121

Parallelization of an Example Program

12.00% 91.00%

Scalable Multiprocessors 47,48,

49 Scalability

50,51,52

Chapter # 7: Scalable Multiprocessors T1: Page # 453 to 486 Realizing Programming Model

9.00% 100.00%

Literature:

Publication Specification Book Type Code Title and Author

Edition Publication Year Text Book T1 Advanced Computer Architecture by Kai Hwang Tata McGraw-Hill 2001

Text Book T2 Parallel Computer Architecture by David E. Culler, Jaswinder Pal Singh, Anoop Gupta

1st Morgan Kaufmann Publishers 1999

Reference Book

R1 Computer Architecture and Organization by John P Hayes

3rd McGraw-Hill 1998

Reference Book

R2 Parallel computers-Architecture and Programming by V Rajaraman, c Siva Ram Murthy

Prentice Hall India 2000

Page 15: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 15

QUESTION BANK

PARALLEL COMPUTER MODELS OBJECTIVE: In this chapter, we model physical architectures of parallel computers, vector super computers, multicomputers, and massively parallel processors. Parallel processing has emerged as a key enabling technology in modern computers, driven by the ever-increasing demand for higher performance, lower costs, and sustained productivity in real life applications.

1. Explain computer development milestones. 10 2. Explain elements of modern computers. 10 3. Explain evolution of computer architecture. 10 4. Write a note on implicit and explicit parallelism. 06 5. Explain shared memory multiprocessors. 10 6. Explain UMA & NUMA model. 10 7. Explain COMA model. 10 8. Write a note on Distributed-Memory Multicomputers. 08 9. Explain data parallel processing. 10 10. Write a note on vector supercomputers. 10 11. Explain SIMD supercomputers. 10 12. What are the fundamental design issues? Explain in detail. 14 13. What is parallel computer? Discuss the need of parallel architecture. 10 14. Differentiate among the following architectural classifications:

a. SISD b. SIMD c. MISD and d. MIMD. 06

15. Discuss the evolution of parallel computing from i) Technology point of view and ii) application point of view.

10

PROGRAM AND NETWORK PROPERTIES OBJECTIVE: This chapter covers fundamental properties of program behavior and introduces interconnection networks. Interconnection architectures introduced include static and dynamic networks. Network complexity, communication bandwidth, and data-routing capabilities are discussed.

16. Explain conditions of parallelism. 10 17. What is data dependence in programs? 05 18. What is control dependence? 05 19. What is resource dependence? 05 20. Explain hardware and software parallelism. 10 21. Write a short note on role of compilers. 05 22. Explain parallelism levels. 10 23. What is grain size? 05 24. Write a note on program partitioning. 05 25. Explain the grain size problem. 08 26. Explain node duplication. 10 27. Explain program flow mechanisms. 10 28. Write a note on control flow versus data flow. 10 29. Write a note on task initiation diagram. 05 30. Explain control dependencies. 10 31. Explain data dependencies. 10 32. Explain system interconnect architectures. 10 33. Explain static connection networks. 10 34. Write a note on network properties and routing. 10 35. Define the following terms:

a) Latency b) latency sequence c) average latency d) forbidden latency. 06

36. Explain dynamic connection networks. 10

Page 16: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 16

PROCESSOR AND MEMORY HIERARCHY OBJECTIVE: This chapter presents modern processor technology and the supporting memory hierarchy. We begin with a study of instruction-set architectures including CISC and RISC, and we consider typical superscalar, VLIW, superpipelined, and vector processors. The third section covers memory hierarchy and capacity planning, and the final section introduces virtual memory, address translation mechanisms, and page replacement methods.

37. Write a note on design space of processors. 10 38. Write a note on instruction pipelines. 05 39. Explain the concepts of multiprocessor simulation. 05 40. Explain processors and coprocessors. 05 41. Explain Instruction-set architectures. 05 42. Briefly explain CISC scalar processors. 10 43. Briefly explain RISC scalar processors. 10 44. Explain the basic measures of multiprocessor performance. 10 45. Write a note on superscalar processors. 05 46. Explain VLIW architecture. 12 47. Explain Vector processors. 10 48. Explain Symbolic processors. 10 49. Explain characteristics of symbolic processing. 10 50. Explain hierarchical memory technology. 08 51. Explain backplane bus specification. 10 52. Write a note on addressing and timing protocols. 08 53. Explain arbitration, transaction, and interrupt. 10 54. Write a note on IEEE future bus+ standards. 04 55. Write a note on memory interleaving. 10 56. Write a note on pipelined memory access. 10 57. Explain fault tolerance. 05 58. Explain memory bandwidth. 05 59. Explain memory allocation schemes. 05 60. Write a note on redundancy for fault tolerance. 05

PIPELINING AND SUPERSCALAR TECHNIQUES OBJECTIVE: This chapter deals with advanced pipelining and superscalar design in processor development. We begin with conventional linear pipelines and analyze their performance. A generalized pipeline model is introduced to include nonlinear interstage connections. Collision-free scheduling techniques are described for performing dynamic functions.

61. Write a note on linear pipeline processor. 10 62. Explain synchronous and asynchronous models. 10 63. Explain clocking and timing control. 10 64. Write a note on speedup factor, efficiency, and throughput. 05 65. Explain nonlinear pipeline processors. 05 66. Explain latency analysis. 10 67. Explain collision-free scheduling. 10 68. Explain pipeline schedule optimization. 10 69. What is greedy cycle? 05 70. Explain instruction pipeline design. 10 71. What are the mechanisms for instruction pipeline? 10 72. Explain hazard avoidance. 10 73. Explain dynamic instruction scheduling. 10 74. Explain branch handling techniques. 10 75. Explain branch prediction. 06 76. Explain arithmetic pipeline design. 10 77. Write a note on computer arithmetic principles. 10

Page 17: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 17

78. Write a note on static arithmetic pipelines. 10 79. Explain multifunctional arithmetic pipelines. 10 80. What are pipeline design parameters? 10

MULTIPROCESSORS AND MULTICOMPUTERS OBJECTIVE: In this chapter, we study system architectures of multiprocessors and multicomputers. Various cache coherence protocols, synchronization methods, crossbar switches, multiport memory, and multistage networks are described for building multiprocessor systems.

81. Discuss network characteristics. 05 82. Explain hierarchical bus systems. 10 83. Explain crossbar switch and multiport memory. 10 84. Write a note on crosspoint switch design. 10 85. What are switches? 10 86. Explain briefly multistage and combining networks. 05 87. Explain hot-spot problem. 04 88. What is cache coherence problem? 10 89. What are snoopy bus protocols? 10 90. Explain directory-based protocols. 10 91. What are hardware synchronization mechanisms? 10 92. What are message-routing schemes? 10 93. Write a note on routing. 05 94. Write a note on routing mechanisms. 10 95. Explain wormhole routing. 08 96. Explain deadlocks. 10 97. Discuss about virtual channels. 10 98. Write a not on deadlock avoidance. 10 99. Explain packet collision resolution. 10 100. Explain adaptive routing. 10 101. What is dimension-order routing? 05 102. Explain multicast routing algorithms. 10 103. Explain network partitioning. 10

PARALLEL PROGRAMS OBJECTIVE: In this chapter we learn about the various case studies of parallel application. We also get to know about the steps involved in the parallelization process like decomposition of the computation into tasks, assignment of tasks to processes, orchestration of the necessary data access, communication, and synchronization among processes, mapping of processes to processors.

104. Explain different parallel application case studies. 14 105. What are the goals of parallelization process? 10 106. Explain the terms:

a) Task b) Process c) Processor. 06

107. Explain the Equation solver Kernel. 10 108. Explain the different steps involved in creating a parallel program. 10 109. Considering the problem of simulating the ocean current,

Explain how concurrency can be identified in a typical program? 06

110. Develop a pseudo code for the parallel equation solver kernel. 10 111. Explain the orchestration under data parallel model. 10 112. Explain assignment for the parallel equation solver. 10 113. Explain the orchestration under the shared address space model. 10 114. Explain the orchestration under the message passing model taking equation solver as an

example. 10

115. A job is given to you and you have been asked to convert a given sequential execution 10

Page 18: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 18

of a program into a parallel program. Identify the steps involved in the above problem and explain each step in detail.

116. Explain in brief what is meant by orchestration under data parallel model? Develop a pseudo code for the above problem and explain how data assignment, decomposition and parallelism lead to good load balance across processes in such an application. Include adequate comments in your pseudo code.

10

117. In a super market, vendors would be interested in extracting the information on the item-sets, the customers frequently purchase. Using the large database, indicating the set of items purchased by the customers in each purchase transaction, show how the information of recently purchased item sets could be obtained. Explain the parallelism that exists in the process.

10

118. Explain red-black ordering technique of decomposition for equation solver kernel. 06 SCALABLE MULTIPROCESSOR OBJECTIVE : In this chapter we learn the hardware organization and architecture (scalable to L / VL configurations), how the programming models are realized in terms of network transactions, spectrum of important design points organized according to the level of direct hardware interpretation of the network transaction. We will also know the basic organizational properties of machines using case studies: Viz. CM-5, Intel paragon, Meiko CS-2, CRAY T3D, and CRAY T3E.

119. Give the generic diagram for a scalable multiprocessor architecture of a distributed memory type. Describe any one real scalable system, using high integration at the chip level or at the board level.

10

120. Explain the machine organization for dedicated message processing with symmetric processor.

10

121. What is scalability? Describe the different types of scalability. 10 122. Give the generic diagram for scalable multiprocessor architecture of a distributed

memory type. Describe any one real scalable system, using high integration at the chip level or at the board level.

10

123. Explain the machine organization for dedicated message processing with symmetric processor.

10

124. Explain scalability. 10 125. Explain bandwidth scaling. 10 126. Explain latency scaling. 10 127. What is cost scaling? 10 128. Explain physical scaling. 10 129. Explain scaling in a generic parallel architecture. 10 130. Write a note on realizing programming models. 10 131. Explain primitive network transaction. 10 132. What is meant by shared address space? Explain? 10 133. Explain message passing. 10 134. What are active messages? 10 135. Explain communication architecture design space. 10 136. Write a note on node network interface. 10 137. Explain implementation communication abstractions. 10 138. What is dedicated message processing? 10 139. Explain shared physical address space. 10 140. State about clusters and network of workstations. 10 141. Explain with the help of appropriate diagrams the following message passing protocols

identifying clearly the merits & demerits if any in each case. i) Synchronous message passing protocol. ii) Asynchronous message passing protocol.

10

142. What is scalability? Discuss the different types of scalability. 10 143. Considering the example of the ocean study problem, show that when the problem is

scaled up and the processing system is fixed, the compute load per processor increases, 10

Page 19: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 19

but the communication load per unit time decreases. 144. Techniques like message passing using physical DMA or dedicated message processing

as done in Intel paragon system are used among others for obtaining highly scalable systems. Explain any one such message passing systems.

10

145. When systems are scaled up, processor cost and memory cost increase linearly with the no. of nodes n, while the switching network cost increases roughly as nlog2 n. Assuming in a 64 processor system, the cost is equally divided between processors, memory and interconnection networks, find the ratios of this cost division when the no. of nodes is increased to 8192 from 64.

10

Marks No of Questions

4 02 5 23 6 07 8 05 10 106 14 02

Total 145

Page 20: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 20

CS834: NETWORK MANAGEMENT Faculty: No. of Hours: 52

% of Portion Covered

Class #

Chapter Title / Reference Literature

Topics to be Covered Reference Chapter

Cumulative

1. Introduction: Data Communications and Network Management Analogy of Telephone Network Management, Data and Telecommunication Network.

2. Distributed Computing Environments, TCP/IP –Based network. 3. Communications Protocols and Standards 4. Case Histories of Networking Management. 5. Challenges of Information Technology Managers. 6. Network Management: Goals, Organization and Function. 7.

Data Communications and Network Management Overview T: Chap. 1 Pages 3-55

Network and System Management, Future of Network Management

12.3%

12.3%

8. Basic Foundations: Standards, Models. And Organization Model 9. Information Model, Communication Model 10. Abstract Syntax Notation One:ASN.1 11. Encoding Structure, Macros 12.

Basic Foundations: standards, models and language T: Chap. 3 Pages 101-141 Function Model

7.9% 20.2%

13. SNMPv1 Network Management: Case Histories and Examples 14. The history of SNMP Management 15. Internet Organizations and Standards 16. The SNMP Model 17. The organization model 18. System Overview 19. Information Model 20.

SNMPv1 Network Management T: Chap. 4 Pages 141- 203 Information Model cont.

15.4% 35.6%

21. SNMPv1 Network Management: Communication Model 22. SNMP Architecture, Administrative model, 23. SNMP protocol specifications 24. Operations and MIB Group 25.

SNMPv1 Network Management: Function Model T: Chap. 5 Pages 203- 229

Function Model

7.9% 43.5%

26. SNMP Management: Remote Monitoring, RMON SMI and MIB 27. RMON1 28. RMON2, ATM Remote Monitoring 29.

SNMP Management: RMON T: Chap. 8 Pages 322- 345

Case study of Internet Traffic using RMON 9.2% 52.7%

30. Broadband Networks and Services, ATM Technology 31. ATM LAN Emulation and Virtual LAN 32. ATM Network Management: Reference Model 33. Integrated Local Management Interface, 34. ATM Management Information base 35. M1 Interface and M2 Interface 36. M3 Interface and M4 Interface, 37.

Broadband Network Management: ATM Network T: Chap. 9 Pages 345- 387

Digital Exchange Interface

13.9% 66.6%

38. Broadband Network Management: Broadband Access Networks 39. HFC Technology 40. Data Over Cable Reference Architecture 41. HFC Management 42. DSL Technology, 43. Asymmetric Digital Subscriber Line Technology 44.

Broadband Network Management T: Chap. 10 Pages 387- 429

ADSL management, ADSL Configuration Profiles

12.3% 78.9%

45. Network Management Applications: Configuration Management 46. Fault Management, Performance Management 47. Event Correlation Technique 48. Security Management 49. Accounting Management 50. Report Management, Policy Based Management 51. Service Level Management 52.

Network Management Applications T: Chap. 13 Pages 501- 557 Question Paper Discussion

21.0% 100%

Literature:

Book Type Code Title & Author Publication Info Edition Publisher Year

Text Book T Network Management-

Principles &Practice Mani Subramanian,

7th Pearson Education 2005

Page 21: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 21

QUESTION BANK

INTRODUCTION

1. You can discover the hosts in your subnetwork by using the ping command with your network IP address and host address of decimal 255. Discover all the hosts in the subnetwork that you are logged on.

04

2. Send an e-mail to a remote site with a wrong userid, but correct node address. Explain the error messages that you get and the servers that sent them.

04

3. You are given a class B IP address of 145.45.x.y for your network node. As a network engineer, you are asked to configure your network for 126 subnets (remember that 0 and 1 are reserved).

a. How would you configure your address for subnets and hosts? b. What is the maximum number of hosts that each subnet can accommodate?

04

4. Explain the terms: Protocol, SAP, Subnet, Internet and PDU. 05 5. Explain the data and telecommunication networks. 05 6. Explain client/server network in a distributed computing environment. 06 7. Explain the Internet and Intranets model in an TCP/IP based networks. 06 8. Explain Basic Communication Architecture and ISO Communication Architecture? 08 9. Compare SNA, ISO and Internet Protocol Layer Model. 10 10. Explain the goals of network management. 08

Basic Foundations: Standards, Models and Language

11. In brief mention network management standards. 10 12. Explain the role of organization model, information model and function model in ISO network

management model. 10

13. What are the standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable.

04

14. Write an ASN.1 module that defines DaysOfWeek as an ENUMERATED data type with values from 0 to 6. 08 15. Write an ASN.1 module that specifies DayOfWeek as a SEQUENCE type with each day of the week

(day1, day2, …) as the type VisibleString. Write the ASN.1 description (a) for the structure and (b) for the value.

10

16. For your home address which contains Name, Address, City, State and Zip Code: a. The informal record structure. b. An ASN.1 description of the record structure. c. The record value for your home address.

08

17. a. Describe a list and an ordered list in ASN.1 syntax. b. Identify the differences between them. c. Using examples differentiate between list construction and repetitive construction.

10

SNMPv1 Network Management: Organization and Information Models

18. With an example explain a managed LAN Network. 08 19. Explain SNMP based ASN.1 data type structures. 08 20. Write about the evolution of SNMP Documents. 05 21. With an example explain the Object-Type Macro. 10 22. Explain the Two-Tier, Three-Tier and Proxy Server Organization Model. 10 23. Explain SNMP Network Management Architecture. 05 24. Write about aggregate managed object macro. 10 25. What is meant by Management Information Base? Explain in brief. 10 26. Access the Simple Gateway Monitoring Protocol (SGMP) RFC 1028 on the Internet. Describe the

four message types defined in the document. 05

27. Present the OBJECT IDENTIFIER for the object sun. products in two formats, one mnemonic and the other numeric.

08

28. Encode IP Address 10.20.30.40 in TLV format. 06 29. (refer to RFC 1213 for the following exercise)

a. Write the ANS.1 specifications for sysServices. b. Illustrate the specifications with values for a bridge. c. Illustrate the specifications with values for a router.

08

30. Write the object descriptor and syntax of the following SNMP managed entities: a. IP address. b. A row in the Interfaces table (row specification only) c. The MAC address of an interface card.

08

Page 22: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 22

31. Explain how you would determine whether a device is acting as a host or as a router using an SNMP command.

06

32. A network manager discovers that a network component is performing poorly and issues an order to the technician to replace it. Which MIB group contains this information for the technician to find out the physical location of the component?

04

33. How would you use one of the standard MIB objects to determine which of the stations in a LAN is functioning as a bridge to the external network?

10

34. TCP is a connection-oriented protocol and UDP is a connectionless protocol. Identify the differences in the two MIBs that exemplify this difference.

06

35. FDDI is heavily used as a backbone network in a corporate complex. a. Draw a MIB tree for FDDI MIB. Limit your tree to the top five groups. b. Develop a three-column table presenting entity, OID and brief descriptions of the groups

and the tables under each group.

10

36. What OBJECT TYPE would you use to identify the address of the neighboring gateway from your local gateway?

04

SNMPv1 Network Management: Communication and Functional Models 37. Briefly explain the SNMP Communication Model. 08 38. Describe SNMP Protocol Specifications. 06 39. In brief explain the SNMP Operations. 08 40. An SNMP manager sends a request for the values of the sysUpTime in the System group and

ifType in the interfaces group for ifNumber value of 3. Write the PDUs with the fields filled in for a. The get-request PDU and b. The get-response PDU with noSuchName error message for ifType.

10

SNMP Management: RMON 41. What is meant by remote monitoring? Explain. 06 42. Explain RMONI Groups and Functions 05 43. In brief explain RMONI Common and Ethernet Group. 08 44. Write about RMON2 Conformance Specifications. 06 45. Explain RMON Token Ring Extension. 04 46. In brief explain ATM Remote Monitoring 06 47. a. Describe qualitatively how the utilization ( number of frames offered/number of frames

transmitted) depends on frame size. b. How would you measure the distribution of the frame size on the LAN?

05

48. a. Describe the two methods of measuring collisions on an Ethernet LAN. b. Compare the two methods in terms of what you can measure.

06

49. How would you measure the types and distribution of frames in a token ring LAN? 06 Broadband Network Management: ATM Networks 50. Explain broadband services networks 05 51. Explain ATM LAN Emulation. 04 52. In brief explain ATM Network Management. 10 53. Write short notes on M1 interface, M2 interface. 10 54. Explain class I and class II Interface Management Functions of M3. 06 55. With a neat diagram explain the Dual views of the M4 Interface. 04 56. Although cell transmission of multimedia services offers numerous benefits, there is an

inefficiency penalty. Calculate the maximum efficiency (data bytes/ (data bytes+ overhead bytes) for ATM transmission.

04

57. Calculate the efficiency of transmission to transmit: a. An Ethernet packet of 1500 bytes (including the overhead with 6-bytes addresses). b. Equivalent data using ATM cells.

06

58. Communication between two ATM switches is broken in a private ATM network. You are troubleshooting the problem from a network management station. What M interfaces would you use? Justify.

04

59. Explain how networks can be interconnected. 04

Page 23: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 23

Broadband Network Management 60. Explain the broadband access networks and technologies. 08 61. Write a short note on HFC technology. 08 62. Explain the Protocol Layer Architecture in an HFC System. 04 63. Write a short note on DSL Technology and ADSL Technology. 06 64. With a neat diagram explain ADSL Architecture. 04 65. With an ADSL reference model explain ADSL management framework. 06 66. Write short note on ADSL Configuration Profiles. 04 67. A half-duplex channel is carrying a 2-Mbps signal. Calculate the baud rate and bandwidth in Hz

for the following modulated signals. a. ASK(binary) b. PSK(binary) c. QPSK d. 16QAM

06

68. The downstream channel bandwidth for cable modem is 6Mhz. Calculate the bit rate if signal is a. QPSK b. 64 QAM

08

Network Management Applications 69. What is meant by Configuration Management? Explain in brief. 08 70. Explain the different steps involved in Fault Management. 04 71. Mention and explain different metrics in Performance Management 05 72. What is meant by Case-Based Reasoning? Explain. 05 73. Explain the Codebook Correlation Model. 05 74. Mention in brief the various measures used in security management 10 75. How does the Client/Server authenticate each other 06 76. Write explanatory notes on PEM processes. 05 77. Explain the policy management architecture. 06 78. List and contrast the tools available to discover network components. 06 79. You are responsible for designing the auto discovery module of an NMS. Outline the procedure and

the software tools that you would use. 04

80. What MIB object would you monitor for measuring the collision rate on an Ethernet LAN? 04

Marks No. of Questions 4 18 5 12 6 19 8 16 10 15

Total 80

Page 24: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 24

CS843: CRYPTOGRAPHY AND NETWORK SECURITY Faculty: No. of Hours: 52

% of portions covered Class #

Chapter Title / Reference Literature

TOPICS TO BE COVERED Reference Cumulative

1. Symmetric Ciphers-Overview: Services 2. Mechanisms and Attacks 3. The OSI Security Architecture

4.

Chapter 1 Overview Symmetric Ciphers Page # 19-35 Text Book: T1 A model of network security

5. Classical Encryption techniques: Symmetric Cipher Model, 6. Substitution Techniques. 7. Transposition Techniques 8. Rotol Mechanisms 9.

Chapter 2 Classical Encryption techniques Page # 41-66 Text Book: T1 Steganography

10. Block Cipher & Data Encryption Standard: Simplified DES 11. Block Cipher Principles 12. The data encryption standard 13. The Strength of DES 14.

Chapter 3 Block Cipher & Data Encryption Standard Page # 73-103 Text Book: T1 Differential and Linear Cryptanalysis

15. Symmetric Ciphers: Triple DES 16. Blowfish algorithm

17. Confidentiality using Conventional Encryption: Placement of Encryption function

18. Traffic confidentiality 19. Key Distribution 20.

Chapter 6,7 Symmetric Ciphers Page #191-202 Page #219-244 Text Book: T1

Random Number Generation

35% 35%

21. Number Theory: Prime Numbers, Formats 22. Euler’s Theorems 23. Testing for primality

24. Public key Cryptography & RSA: Principles of Public key Cryptosystems

25. The RSA Algorithm 26. Key Management 27.

Chapter 8,9,10 Public Key Encryption, Digital Signatures Page #251-260 Page #275-314 Text Book: T1

Diffie-Hellman Key exchange 28. Message Authentication and Hash Functions 29. Authentication Requirements 30. Authentication Functions

31.

Chapter 11 Message Authentication and Hash Functions Page #329-345 Text Book: T1

Message Authentication Codes

32. MD5 Message Digest Algorithm 33. Digital Signatures and Authentication Protocols 34. Digital Signatures 35. Authentication Protocols

36.

Chapter 12,13 Message Digest Algorithm, Protocol Page #365-374 Page #397-416 Text Book: T1 Digital Signature Standard

27% 62%

37. Authentication Applications: Kerberos 38. X.509 Directory Authentication Service 39. Electronic Mail Security 40. Pretty Good Privacy 41. IP security 42. IP security Overview 43. IP Security Architecture 44. Authentication header 45.

Chapter 14,15,16 Network Security Page #417-436 Page #453-472 Page #499-518 Text Book: T1

Encapsulating Security Payload 46. Web Security 47. Web Security Requirements 48. Secure Sockets Layer Security

49.

Chapter 17 Web Security Page #545-580 Text Book: T1 Transport Layer Security

Secure Electronic Transaction

31% 93%

50. System Security 51. Intruders , Viruses , Worms & Related Threats

52.

Chapter 18,19,20 System Security Page #581-654 Text Book: T1

Countermeasures, Firewalls , Firewall Design Principles Trusted Systems

7% 100%

Literature: Publication Info

Book Type Code Title & Author Edition Publisher Year

Text Book T1 Cryptography and Network Security by William Stallings

3rd Pearson Education/PHI 2003

Reference Book

R1 Network Security Private Communication in a Public world by Charlie Kaufman, Radia Perlman, Mike Speciner

2nd PTR Prentice Hall 2002

Reference Book

R2 Cryptography and Network Security by Atul Kahate Tata McGrawHill 2003

Page 25: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 25

QUESTION BANK

CRYPTOGRAPHY OBJECTIVE: At the end of this section the student will know the basics of Cryptography. The section deals with chapters on algorithms that are used with cryptography, public key cryptography, Authentication and Hash functions and the math that is required for a introductory understanding of Cryptography.

1. Explain briefly the four types of security attacks that are normally encountered. Also distinguish between active and passive attacks.

10

2. Bring out the differences between Diffusion and Confusion. Steganography and Cryptography. Known and Chosen plaintext Cryptanalysis.

10

3. Explain a typical key distribution scenario. What are the tradeoffs involved in determining the life of a particular session key?

14

4. Explain the differential Cryptanalysis mechanism. 06 5. What is the need for public key cryptography? Explain its principle and how it can be

adopted for Encryption and authentication. 10

6. Explain the principle of Diffie-Hellman key exchange with a suitable example. 10 7. Explain how hash functions can be used for message authentication. How are these

susceptible to birthday attacks? 10

8. Enunciate and explain the digital signature algorithm. 10 9. What is triple encryption? How many keys are used here? 06 10. What primitive operations are used in Blowfish? What is the key size for Blowfish? 06 11. List ways in which keys can be distributed to two communicating parties. What is a

key distribution centre? What is the difference between a session key and a master key?

08

12. What is the difference between differential and linear cryptanalysis? 06

NETWORK SECURITY OBJECTIVE: At the end of this section the student will understand the application of Authentication techniques learnt in the earlier chapter. Applications such as Kerberos, X.509 Directory, Email Security, SET are studied. IP security, Web Security, Firewalls and the related threats associated with it are also studied.

13. What is Kerberos? Discuss the motivation and requirements for Kerberos approach. 10 14. What are the key features of X..509 Certificate? How are they issued and revoked

by the certificate authority? 10

15. What is the purpose of the X.509 standard? 05 16. Why is the segmentation and re-assembly function in PGP needed? How does PGP

use the concept of trust? 05

17. What is S/MIME? 05 18. Why does PGP generate a signature before applying compression? 05 19. What are the five basic services available for the users of Pretty good privacy? How

are they provided? 20

20. What the examples of and services provided by IPSec. 06 21. What is Encapsulating Security Pay load? Why does ESP include a padding field? 06 22. Explain the secure socket layer SSL-V3 architecture, indicating how the session

state and connection state are defined. 10

23. What is the need for dual signatures in SET? How are they constructed? 10 24. What are the four basic techniques of choosing passwords? Compare their relative

merits. 10

25. List and briefly explain 3 classes of intruders and list three benefits of using intrusion detection systems.

06

26. In general terms, how does a worm propagate? 06

Page 26: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 26

27. List the 3 goals for a firewall. List four techniques used by firewalls to control access and enforce security policy.

06

28. What is a virus? What are the typical stages it passes through in its lifetime? Suggest suitable virus architecture.

10

Marks No. of Questions 5 4 6 9 8 1 10 12 14 1 20 1

Total 28

NOTES

Page 27: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 27

CS845: DATA MINING Faculty: No of Hours: 52

Literature

Syllabus for Tests Test 1: Class 1-12 Test 2: Class 13-27 Test 3: Class 28-38

% of portions covered Class #

CHAPTER TITLE/ Reference literature Topic to be Covered Reference

chapter Cumulative

1 What is Data Warehouse? 2,3 A multidimensional Data Model 4,5 Data Warehouse Architecture 6,7 Data Warehouse Implementation 8 Data cube Technology 9 From Data warehousing to Data Mining

10 Data cleaning 11 Data integration and Transformation 12

Chapter# 1 Introduction T1:Page# : 39-98, 109-130

Data Reduction

18% 18%

13,14 Data Mining Primitives, Presentation and Visualization of discovered patterns

15,16,17

Chapter# 2 Data Mining Primitives, languages and System Architectures T1:Page# : 146-170

A Data Mining Query Language

15%

33%

18,19 Association Rule Mining 20,21 Single-Dimensional Boolean Association Rules from

Transactional Databases

22,23,24

Chapter# 3 Mining Association Rules in Large Data bases T1:Page# : 225-269

Mining Multilevel Association Rules from Transactional Databases

12%

45%

25 Issues Regarding Classification and Prediction 26,27 Classification by Decision tree induction 28,29 Bayesian Classification

30 Classification by Back propagation 31,32 Classification Based on the concepts from association

rule mining

33,34 Other classification methods 35

Chapter# 4 Classification and Prediction T1:Page# : 279-322

Prediction

22%

67%

36 What is Cluster Analysis? 37,38 Types of data in Cluster Analysis: A Categorization of

Major Clustering Methods

39 Partitioning Methods 40 Hierarchical Methods

41,42 Density-Based Methods 43,44 Model-Based Clustering Methods: Statistical Approach

& Neural Network Approach

45

Chapter# 5 Cluster Analysis T1:Page# : 335-388

Outliner Analysis

18%

85%

46 Data Mining Applications

47,48 Data Mining System Products and Research Prototypes 49,50,51 Additional Themes on Data Mining, Data Mining and

Intelligent Query Answering

52

Chapter# 6 Applications and Trends in Data Mining T1:Page# : 451-480

Trends in Data Mining

15%

100%

Publication specification Book type Code Title and Author

Edition Publication Year

Text Book T1 Data Mining Concepts and Techniques By Jiawei Han and Micheline Kamber

1st Morgan KaufMann Publishers

2003

Reference Boo R1 Data Mining A Hands-On Approach for Business Professionals By Robert Growth 1s Prentice Hall PTR 1998

Reference Bo R2 Data Warehousing Fundamentals A Comprehensive Guide for IT Professionals By Paulraj Ponniah 1s John Wiley & Sons 2001

Page 28: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 28

GUIDELINES FOR PROJECT WORK [CS85]

General: 1. Batch formation :

i) Students can do their project work in batches. However the batch size can vary from 1[min] to 4[max].

ii) Students are to be regularly in touch with their guide on a weekly basis or as is needed by.

iii) Students can form their own batches within the stipulated time otherwise department will form batches and students have to accept it.

iv) Batch once formed cannot be changed. v) Each batch will have a designated staff in charge to monitor the work progress at every

stage. vi) All the projects are to be demonstrated with source code for all the evaluations. vii) Evaluation process will be in 2 stages. S1.

1. Panel Approval : 20 Marks. 2. Guide Evaluation : 40 Marks.

S2 1. Final Project Presentation: 40 Marks.

S3 Total Evaluation Marks (20+40+40):100Marks. 2. Work Progress & Monitoring Procedure :

Stage – 1:

Week No Date

01 Jan 29 – Feb 3 Batch Submission in the prescribed format.

02 Feb 5– Feb 10 Final approved batch list along with staff in charge.

Stage – 2:

Week No Date

03 Feb 12 – Feb 17 Project title finalization, Place and Guide.

04 Feb 19 – Feb 24 Literature survey document with detailed synopsis.

05 Feb 26 – Mar 03 Software requirement document [SRS] to be submitted.

Stage – 3:

Week No Date

06 Mar 05 – Mar 10 Design

07 Mar 12 – Mar 17 Design document to be submitted. Viva-voce to be conducted.

Stage – 4:

Week No Date

08 Mar 19 – Mar 24 Implementation & coding

09 Mar 26 – Mar 31 Implementation, Coding & unit testing.

10 Apr 02 – Apr 07 Implementation, Coding & unit testing.

11 Apr 09 – Apr 14 Integration & Testing.

Page 29: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 29

Stage – 5:

Week No Date

12 Apr 16 – Apr 21 Unbounded draft copy of final report in the prescribed format to be submitted for approval.

13 Apr 23 – Apr 28

Evaluation – presentation and viva-voce by departmental council.

Stage – 6:

Week No Date

14 Apr 30 – May 05 Final bounded report to be submitted to the department duly signed by the guide

Note:

The details regarding the color of binding, format for the report submission, and its contents will be notified later.

CS85: PROJECT WORK

SCHEDULE

Week No

COMPONENT

01 Batch Submission in the prescribed format.

02 Final approved batch list along with staff incharge.

03 Project title finalization, Place and Guide.

04 Literature survey document with detailed synopsis.

05 Software requirement document [SRS] to be submitted.

06 Design

07 Design document to be submitted. Viva-voce to be conducted.

08 Implementation & coding

09 Implementation, Coding & unit testing.

10 Implementation, Coding & unit testing.

11 Integration & Testing.

12 Unbounded draft copy of final report in the prescribed format to be submitted for approval.

13 Evaluation – presentation and viva-voce by departmental council.

14 Final bounded report to be submitted to the department duly signed by guide.

Page 30: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 30

GUIDELINES FOR SEMINAR [CS86]

General:

viii) Student has to individually carry out the seminar work ix) Students are to be regularly in touch with the guide. x) The seminar topic has to be a paper selected from leading journals in the area of

interest of the individual. xi) Formal permission has to be taken from the author of the paper. xii) Every student will have a designated staff in charge to monitor the work progress

at every stage. xiii) The seminar is to be presented as per the guidelines to be given later. xiv) Seminar doesn’t have external evaluation. xv) Evaluation process will be in 2 stages.

Continuous evaluation by guide: 20 Marks. Final Seminar Presentation (panel Evaluation): 30 Marks. Total Evaluation Marks (20+30): 50 Marks.

Work Progress, Monitoring Procedure & Seminar Schedule

Week No Date Schedule

01 Jan 29 – Feb 3 Title Submission in the prescribed format.

02 Feb 5– Feb 10 Final approved seminar list along with staff

In-charge.

03 Feb 12 – Feb 17 Submission of synopsis

04 Feb 19 – Feb 24 Literature survey

05 Feb 26 – Mar 03 Literature survey document to be submitted

06 Mar 05 – Mar 10 Understanding the methodology/approach

07 Mar 12 – Mar 17 Understanding the methodology/approach

08 Mar 19 – Mar 24 Understanding the methodology/approach

09 Mar 26 – Mar 31 Gist of the paper to be submitted

10 Apr 02 – Apr 07 Preparation for the seminar in consultation with the guide

11 Apr 09 – Apr 14 Draft copy approval of seminar report

12 Apr 16 – Apr 21 Final Seminar Presentation*

*During the FSP the following documents have to be submitted.

• Soft bound, grey color seminar report (1 copy). • Two sets of handouts.

Page 31: CS-8th Semcourseinfo

P E S Institute of Technology – Education for the Real World – Course Information – B.E. 8th Semester CS 31

PORTIONS FOR TEST

Subject Subject Code Test Portions

Test 1 Class # 1-18

Test 2 Class # 19-33 CIP CIP81

Test 3 Class # 34-52

Test 1 Class #1 – Class #20

Test 2 Class #21 – Class #38 ACA CS82

Test 3 Class #39 – Class #52

Test 1 Class #1 – Class #20

Test 2 Class #21 – Class #36 CNS 843

Test 3 Class #37 – Class #52