ziddi razan

Upload: ziddirazan

Post on 30-May-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 ziddi razan

    1/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    Questions for Sessional- II (CD)

    1. consider the following code fragment ,Generate the quadruple for it

    switch (a + b)

    {case 1: x = x + 1;

    case 2: y = y + 2;

    case 3: z = z + 3;default: c = c -1;

    }

    Write its three-address statement code and quadruple representation.

    2. Translate the following program segment into three-address segment:

    Switch( a + b ){

    case 2: { x = y; break; }

    case 5: { switch( x )

    {

    case 0:{ a = b + 1; break:}case 1:{a = b + 3; break;}

    default :{a = 2;}

    }break;

    case 9: {x = y 1; break;}

    default: {a = 2;}}

    3. What is a basic-block? How can a sequence of three-address statements be

    transformed into a list of basic blocks. Show it with example.

    4. Explain the following categories of intermediate codes:

    i. Three-address codes

    ii. Quadruples

    iii. Triples

    PTO

  • 8/14/2019 ziddi razan

    2/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    5. Consider the following sequence of three address code:

    (1) PROD =0

    (2) I = 1(3) T = 4*I

    (4) T2 = addr( A )-4

    (5) T3 = T2 [T1](6) T4 = addr( B )-4

    (7) T5 = T4[T1]

    (8) T6 = T3 * T5(9) PROD = PROD + t6

    (10) I = I+1

    (11) If I d) do

    if a = 1 then

    c = c + 1;else

    while( a

  • 8/14/2019 ziddi razan

    3/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    11. What is printed by the program given under :

    a. Callby-nameb. Call-by reference

    c. Call-by-value

    Procedure PROC (X,Y,Z)begin

    Y = Y+1

    Z = Z + Xend PROC

    begin

    A = 2B = 3

    C = 1

    PROC (A,A+C,A+B)

    Print A

    End12. Define attributes of symbol table:

    i) Class and related attributesii) Scope attributes

    13. Give the algorithm for the elimination of local and global common sub-expression. Discuss the algorithm with the help of an example.

    14. Discuss loop optimization technique with suitable examples.

    15. Describe how a for-statement can be systematically turned into a correspondingwhile statement. Does it make sense to use this to generate code?

    16. Discuss the algorithm for the elimination of induction variables with the help of

    example. Also generalize this algorithm to the case where multiplicativeconstants can be negative.

    17. Suppose parameter are passed by value instead by reference. Can two names bealiases of one another? What if copy-restore linkage is used?

    18. What do you mean by code optimization? What are the areas of optimization?

    19.. Construct DAG for the following code sequence:

    A [I] = B

    *P = CD = A [J]

    E = *P

    *P = A [I]Assume that :

    PTO

  • 8/14/2019 ziddi razan

    4/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    a. P can point anywhere

    b. P point to only B or D

    20. i. What is global data flow analysis? What is its use in code optimization?

    Block IN[B] OUT[B]

    B1 01111 11000

    B2 11111 01111

    B3 01111 00110

    B4 00110 00101

    B5 00111 00111

    ii. consider the above given table and flow graph then find ud-chain for following1. J at D2 in B1

    2. I at D3 in B23. J at D4 in B34. I at D2 in B1

    5. J at D5 in B4

    PTO

    D1 I := 2

    D2 J := I+1

    D3 I := 1

    D4 J := J+1

    D5 J := J- 4

    B1

    B2

    B3

    B5

    B4

  • 8/14/2019 ziddi razan

    5/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    Questions for Sessional- II (IS)

    Q1-Write short notes on :

    a) Information controls b) Denial of service c) Computer crime

    d) Hacking e) Privacy of the Internet f) Encryption

    Q2- Is there an ethical crisis in E- business today ? List the various PAPA

    ethical issues related to how information system store and process information.

    Q3- Why are controls needed for information system ? What are the various types of

    Information system controls?

    Q4-Discuss various security and ethical challenges as faced by MIS manager.

    Q5- Identify several ways that business manager and professional help lessen

    the harmful effects and increase the beneficial effects of the use of information

    technology.

    Q6-What has been the impact of e- business technologies on the work relationships,

    activities and resources of managers.

    Q7- List some of the problems faced by the manager of a global organization.

    Q8-Identify various business reasons or business drivers behind global information

    technology application.

    Q9- Identify various cultural and geo economic challenges that confront the

    managers in the management of global e business technologies.

    Q10-List the major types of international business strategies. Do you believe

    that the various firms will tend to strive towards the transnational model

    over time?

    PTO

  • 8/14/2019 ziddi razan

    6/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    Q11- Write short notes on :

    a) Transborder dataflows c)Transnational strategies

    b) Outsourcing information system operations

    Q12- Explain the following:

    a) Strategic management c) Operational management b) Technical management d)Distributed management

    Q13-Which planning technique would you prefer critical success factor ,

    strategic opportunity matrix Explain your reasoning

    Q14 Do you think BPR is prerequisite for implementing ERP in an organization? Ifyes or no give justification o0f your answer.

    Q15-ERP is the backbone of of E- business . ERP is a business operating system , the

    equivalent of the windows operating system for back office operations comment.

    Q16-Prove that SCM is an absolute requirement for the E- business initiatives of

    many companies.

    Q17- List some major application components of CRM. Why are the businesses

    turning to CRM as a major customer centric business strategy?

    Q18- Why should you procure? What do you mean by procurement management?

    Q19- Write a short note on end user computing.

    Q20- Explain the planning process. Discuss the hierarchy of planning.

    PTO

  • 8/14/2019 ziddi razan

    7/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    Important Question For Semister Exam (CD)

    SET-1

    PTO

  • 8/14/2019 ziddi razan

    8/23

  • 8/14/2019 ziddi razan

    9/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    PTO

  • 8/14/2019 ziddi razan

    10/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    PTO

  • 8/14/2019 ziddi razan

    11/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    PTO

  • 8/14/2019 ziddi razan

    12/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    SET-2

    PTO

  • 8/14/2019 ziddi razan

    13/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    PTO

  • 8/14/2019 ziddi razan

    14/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    PTO

  • 8/14/2019 ziddi razan

    15/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    SET-3

    1. What is a cross compiler? How is bootstrapping of a compiler done to a

    second machine.

    2. What is the input buffering? How sentinel symbol is used to reduce thenumber of comparisons in lexical analysis of the statements gives

    algorithms to clarify.

    3. Consider the following statement :

    Firstvalue = nextvalue + rate* 19Compile this statement in all six phases.

    4 Construct the parsing table for the following LL (1) grammar:

    S a A / B

    A b B / a

    B c / b A c

    5. Construct an LALR (1) parsing table for the following grammar:

    DL :T

    L L id /id

    T integer

    6. Construct an SLR parsing table for the following grammar:

    SA)

    SA,P/ ( P,P

    P{num,num}

    7. Eliminate the left recursion from the following grammar:

    S a / / (t)

    T T S / S

    8. Construct the following grammar:

    E TE

    E +E /

    T FT

    T T /

    F PF

    F *F /

    PTO

  • 8/14/2019 ziddi razan

    16/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    P (E)/ a / b/ (b) Compute FIRST and FOLLOW for each nnon-terminal of above

    grammar.

    (c) Show that the grammar is Wheather LL(1) or not.

    9. Construct LR(0) parsing table for the following grammar:

    E E + T /T

    T T*F / F

    F (E) / id

    10 Give the algorithm for computing precedence function .

    11.Translate the following program segment into three-address segment:

    Switch( a + b )

    {

    case 2: { x = y; break; }

    case 5: { switch( x ){

    case 0:{ a = b + 1; break:}

    case 1:{a = b + 3; break;}

    default :{a = 2;}}

    break;case 9: {x = y 1; break;}

    default: {a = 2;}

    }

    12. What is symbol table ? Discuss the various approaches used for

    organization of symbol table.

    13. What are the different data structures for the symbol table

    implementation?

    14 What are the various types of errors that may appear in compilation

    process ? Explain the function of Error handling phase of a compiler.

    15. i Explain global data flow analysis

    PTO

  • 8/14/2019 ziddi razan

    17/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    Block IN[B] OUT[B]

    B1 01111 11000

    B2 11111 01111B3 01111 00110

    B4 00110 00101

    B5 00111 00111

    ii consider the above given table and flow graph then find ud-chain for following2. J at D2 in B1

    3. I at D3 in B2

    4. J at D4 in B35. I at D2 in B1

    6. J at D5 in B4

    PTO

    D1 I := 2

    D2 J := I+1

    D3 I := 1

    D4 J := J+1

    D5 J := J- 4

    B1

    B2

    B3

    B5

    B4

  • 8/14/2019 ziddi razan

    18/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    Important Questions for Semester exams(IS)

    SET-1

    PTO

  • 8/14/2019 ziddi razan

    19/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    PTO

  • 8/14/2019 ziddi razan

    20/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    SET-2

    PTO

  • 8/14/2019 ziddi razan

    21/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    PTO

  • 8/14/2019 ziddi razan

    22/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    SET-3

    1. What is a system? How the feedback and control components can makes a system

    more useful?

    2. How an information system supports a company s business operation, decision

    making by managers and give competitive advantage

    3. What do you think prototyping has become a popular way to develop new

    computer Based information system ?

    4. What do you mean by CASE? What are the different categories of CASE tools?

    5. Explain:

    a)Testing and quality assurance

    b)Control design

    c) preparing system proposal

    d) Feasibility study

    6. Identify several groupware tools for E- communication , conferencing and

    work management and give example of how they can enhance the

    collaboration of teams and workgroups in business enterprise?

    7. Give some business application of the internet. What business value do

    companies derive from their business application on intranet.

    8. What are the benefits and limitation of interactive marketing for business?

    9. List some of the problems faced by the manager of a global organization also

    identify various business reasons or business drivers behind global information

    technology application.

    PTO

  • 8/14/2019 ziddi razan

    23/23

    Dronacharya College Of Engg. Gr. NoidaDepartment of Computer Science & Information Technology

    10. How can a company use change management to minimize the resistance

    and maximize the acceptance of changes in business and technology? Give

    examples.