We are Permanently Move to vupk.net Please Join us there.

CS502 GDB Idea Solution Spring July 2012

CS502 GDB Idea Solution Spring July 2012


Dynamic Programming is always preferable over greedy approach ” Support or contradict this statement with solid arguments.
Solution No.1
Dynamic programming is both a mathematical optimization method and a computer programming method. In both contexts it refers to simplifying a complicated problem by breaking it down into simpler sub problems in a recursive manner. [ While some decision problems cannot be taken apart this way, decisions that span several points in time do often break apart recursively; Bellman called this the "Principle of Optimality". Likewise, in computer science, a problem that can be broken down recursively is said to have optimal substructure. If sub problems can be nested recursively inside larger problems, so that dynamic programming methods are applicable, then there is a relation between the value of the larger problem and the values of the sub problems.[5] In the optimization literature this relationship is called the Bellman equation.
Solution No.2
Yes, it is true. Although these both approaches are used to solve problems optimally, but in the same time there are some reasons which make Dynamic programming preferable over greedy approach e.g. dynamic programming solves problems by breaking down in smaller sub problems and also stores results in some form for future reference, which definitely comes always in a solution and also in optimal one. while greedy approach always progress in best possible solution at present without thinking about future hence it can some time mislead us in such that it cannot provide any solution to the problem. For your reference there is also an example given below which will help to understand the greedy approach disadvantage.
So we can conclude that how simple greedy approach mislead us and thus we cannot get our required solution. Now it totally clears that using greedy approach if we start from node 7 at that point the best possible of both is 12 hence it will go towards 12 and then finally towards 6. While if we look other side of tree the best possible we can obtain is 99. So we can conclude that how simple greedy approach mislead us and thus we cannot get our required solution.
Solution No.3
A greedy algorithm is similar to a dynamic programming algorithm, but the difference is that solutions to the subproblems do not have to be known at each stage; instead a “greedy” choice can be made of what looks best for the moment.
Consider this example.
You are standing at a place A. You are to goto B. There are intermediate places C1,C2 …
You want to minimize distance travelled.
Greedy Method of Solving
You don’t want to try all intermediate places. You go to the nearest intermediate place. Why? You feel by going to the nearest intermediate place, you will minimize the distance to B.
Dynamic Programming
You try all the places, but you store the previous result. Eg: To reach C3 in minimum distance, you reached by C1. So you store C1. So if you want to go to C5, by C3, you will go to C1 then C3 and then check if going from C3 to C5 is nearest.
Solution No.4
Dynamic Programming is always preferable over greedy approach because reasons which make Dynamic programming preferable over greedy approach e.g. dynamic programming solves problems by breaking down in smaller sub problems and also stores results in some form for future reference, which definitely comes always in a solution and also in optimal one. while greedy approach always progress in best possible solution at present without thinking about future hence it can some time mislead us in such that it cannot provide any solution to the problem.

CS507 GDB 10th July 2012

Please discuss the gdb here

Suppose that a newly established commercial bank with very less number of customers wants to expand its business all over the Pakistan by improving the quality and integrating new services.

Suggest a modern way for the bank to expand its business and gain more customers even from the remote areas of the country where reachability is a big issue. Justify your answer with suitable reasons.

Note: (Maximum 5-7 lines answer).


Solution:-
For the enhancement customer quality consistently provide innovative products, with outstanding customer service and help their customers achieve operational excellence. An Organization ability to provide outstanding product quality, service support, and their ability to enhance product quality, achieve shorter delivery times, reduce scrap, rework and reduced life cycle costs Electronic commerce has gradually shifted to a modern form in the name of Mobile commerce.

M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices. These devices can be connected to the Internet, making it possible for users to conduct transactions from anywhere. The employees need to collaborate and communicate with office employees and to access corporate data, rapidly and conveniently. Such a capability is provided by m-commerce. Two main characteristics are driving the interest in m-commerce: mobility and reach ability. Mobility implies that the Internet access travels with the customers. M-commerce is  appealing because wireless offers customers information from any location. This enables employees to contact the office from anywhere they happen to be or customer. Reachability means that people can be contacted at any time, which most people see as a convenience of modern life.
These two characteristics – mobility and reachability break the geographical and time barriers. As a result, mobile terminals such as PDA or cell phone with Internet access can be used to obtain real time information and to communicate from anywhere, at any time.
 
Idea Solution 2:

Online Services

  • Because consumers are conducting more and more business online, your bank can gain more customers by making it easy to choose and use your services on the Internet. Invest in a series of banner advertisements to reach out to customers, and place them on websites that are visited by your target audience. Tailor each advertisement to the readership of the site.

Innovation

  • Attract more customers to your bank by creating innovative options. Offer accounts that allow the customers to receive interest in a unique form, such as online gift certificates, music download credits or donations to charities.
    By helping potential customers get past their fears and misconceptions about finance, you can access a new group of people looking for banking services.

MTH401 GDB Idea Solution Spring July 2012

Idea:-
Dear Students you know that in differential equations we determine the functions that satisfy the differential equations. Some times the functions are linearly dependent and some times they are linearly independent. In each of the following questions, please determine whether the given functions are linearly independent or dependent for the given intervals. Justify your answer.

(1) f (x) = Absolute (x) and f (x) = x on ( 0 , 10 )

Interval is (0,10). Note that this is NOT [0,10] i.e. 0 and 10 are itself not included. Anyhow, even if we include 0 and 10 in this part, then our answer will still be the same.

According to absolute value function y=|x| means y =-x when x<0 and y=x when x>=0, since in our case x>0, therefore, we will have y=x. i.e. f(x)= Absolute(x) equals x on interval (0,10). Now, both functions are same, therefore, they are linearly DEPENDENT.

(2) f (x) = Absolute (x) and f (x) = x on ( -10 , 0 )

Here, our interval is from greater than -10 and less than 0.

For negative values of x, absolute(x) becomes –x, which is not same as the second function. We have two different functions y = -x and y=x, One function is CONSTANT multiple of another; therefore, they are linearly DEPENDENT.

CS615 GDB Idea Solution Spring July 2012

As you have learnt about Work Breakdown Structure (WBS) in this course, on the basis of your knowledge, can WBS be considered as a plan/schedule? Justify your answer with solid reasons.

yes, WBS be considered as a plan/schedule?

Reasons:

Using a WBS provides a number of benefits to the management and to the
development teams.

First, it gives the management an idea about the size and complexity of the
project.

Second, it helps in planning, scheduling, and monitoring a project realistically.
This is possible because all the tasks in the project can be preformed measurable
targets for each task.

To aid planning, scheduling, and monitoring a project, you can use tools such as:
– Program Evaluation and Review Techniques (PERT)
– Critical Path Method (CPM)
– Timeline charts
– Gantt charts

The WBS is commonly used at the beginning of a project for defining project
scope, organizing Gantt schedules and estimating costs.

It lives on, throughout the project, in the project schedule and often is the main
path for reporting project costs.

WBS is related to planning and scheduling a project
It is a functional decomposition of the tasks of the project.
Software Project Management (CS615)

It starts with the end objective required and successively subdividing it into
manageable components in terms of size and complexity of:
– Program,
– Project,
– System,
– Subsystem,
– Components,
– tasks, subtasks, and
– work elements

get the idea and post.
don't copy paste , just get the idea and write in your own words.
reference handouts page number 241, 242

CS101-FINALTERM EXAMINATION Paper 2009 - 2

CS101- Introduction to Computing - FINALTERM  EXAMINATION Paper 2009
(Session - 2) - 
Fall 2009

Time: 120 min
Marks = M = 75


CS101- Introduction to Computing - Q.No. 1    ( M - 1 )   
 Most frequently used computers are:
       ► Mainframe Computers
       ► Personal Computers
       ► Supper Computers
       ► Embedded Computers


CS101- Introduction to Computing - Q.No. 2    ( M : 1 )   
 Success of a website is defined by ____________.
       ► User
       ► Designer
       ► Developer
       ► Programmer


CS101- Introduction to Computing - Q.No. 3    ( M - 1 )   
 __________ breaks down the message to be sent over the internet into packets.


       ► FTP
       ► HTTP
       ► TCP
       ► IP


CS101- Introduction to Computing - Q.No. 4    ( M - 1 )   
 JavaScript does not support_______________


       ► User interaction
       ► Graphics
       ► Network operations
       ► Both Graphics and Network operations


CS101- Introduction to Computing - Q.No. 5    ( M - 1 )   
 Detailed plan, specifying the required resources and expected deliverables, is done in ________ phase.


       ► Planning
       ► User Requirements
       ► Design
       ► Developer Specification


CS101- Introduction to Computing - Q.No. 6    ( M - 1 )   
 In a good presentation each slide should contain____________.
       ► Heading
       ► Phrases not sentences
       ► Sentences not phrases
       ► Heading, sentences not phrases


CS101- Introduction to Computing - Q.No. 7    ( M - 1 )   
 Which one of the following is NOT a primary color?
       ► Red
       ► Green
       ► Yellow
       ► Blue


CS101- Introduction to Computing - Q.No. 8    ( M - 1 )   
 Spread sheet is a type of _______________.
       ► Productivity software
       ► Engineering software
       ► Mathematical software
       ► Business software


CS101- Introduction to Computing - Q.No. 9    ( M - 1 )   
 When’+’ operator is used with string operands, it _____________ both strings.
       ► Adds
       ► Subtracts
       ► Concatenates
       ► Compares


CS101- Introduction to Computing - Q.No. 10    ( M - 1 )   
 When web server is busy it gives the following message to the user :
       ► Time out
       ► Waiting
       ► Server busy
       ► None of the given options


CS101- Introduction to Computing - Q.No. 11    ( M - 1 )   
 Which attribute of the IMG tag tells us about the source of the image ____________.
       ► source
       ► path
       ► loc
       ► src


CS101- Introduction to Computing - Q.No. 12    ( M - 1 )   
 The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.
       ► Tree structured organizational model
       ► Network paradigm
       ► Hierarchical structure
       ► None of the given options


CS101- Introduction to Computing - Q.No. 13    ( M - 1 )   
 The Information technology has three components ______________.
       ► Telecom Engineering, Network Engineering, Computer Science
       ► Telecom Engineering, Computer Engineering, Computer Science
       ► Telecom Engineering, Computer Engineering, Database Engineering
       ► Telecom Engineering, Computer Engineering, Hardware Engineering


CS101- Introduction to Computing - Q.No. 14    ( M - 1 )   
 ___________ has great PR skills.
       ► Architect
       ► Team Lead
       ► Project Manager
       ► Chief Executive Officer
  
CS101- Introduction to Computing - Q.No. 15    ( M - 1 )   
 _____________ errors are caused by the code that somehow violates the rule of the language.
       ► Syntax
       ► Semantic
       ► Run time
       ► Load time


CS101- Introduction to Computing - Q.No. 16    ( M - 1 )   
 A large number of networks interconnected physically is called ______
       ► LAN
       ► MAN
       ► Internet
       ► Network collection


CS101- Introduction to Computing - Q.No. 17    ( M - 1 )   
 When the packets reach at destination, __________ reassembles them into original message.
       ► Protocol
       ► TCP
       ► IP
       ► NIC


CS101- Introduction to Computing - Q.No. 18    ( M - 1 )   
 A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
       ► Retrieving
       ► Database
       ► Information
       ► DBMS


CS101- Introduction to Computing - Q.No. 19    ( M - 1 )   
 If an algorithm is syntactically correct, but semantically incorrect then this situation is
       ► Very good situation
       ► Very dangerous situation
       ► Not very bad
       ► Neutral situation


CS101- Introduction to Computing - Q.No. 20    ( M - 1 )   
 In Heuristics “Common Sense Lessons” are drawn from
       ► History
       ► Experience
       ► Biography of Scientists
       ► General knowledge


CS101- Introduction to Computing - Q.No. 21    ( M - 1 )   
 Users look for ________ solution.
       ► Optimal
       ► First good enough
       ► Good
       ► Best


CS101- Introduction to Computing - Q.No. 22    ( M - 1 )   
 The key property of the ‘Array’ object in JavaScript is
       ► Value
       ► Length
       ► Name
       ► All of the given choices


CS101- Introduction to Computing - Q.No. 23    ( M - 1 )   
 In JavaScript, each element of array can store data of type
       ► A Number
       ► An Array
       ► A String variable
       ► All of the given choices


CS101- Introduction to Computing - Q.No. 24    ( M - 1 )   
 Which is NOT true for JavaScript variable name ?
       ► Student
       ► Roll_no_1111
       ► For
       ► _schedule


CS101- Introduction to Computing - Q.No. 25    ( M - 1 )   
 In JavaScript, second element of an array has the index:
       ► 2
       ► 0
       ► 1
       ► 3


CS101- Introduction to Computing - Q.No. 26    ( M - 1 )    
 Which protocol is use to transfer a file over the network ?
       ► UDP
       ► FTP
       ► TCP
       ► OSI


CS101- Introduction to Computing - Q.No. 27    ( M - 1 )   
 Users communicate with the computer using a consistent user interface provided by the OS.
       ► True
       ► False


CS101- Introduction to Computing - Q.No. 28    ( M - 1 )   
 Data was stored and counted mechanically using ----------- decimal storage wheels, --------------------- rotary dial switches.


       ► 300,400


       ► 1300,1400


       ► 30100,14100


       ► 3000 , 1400




CS101- Introduction to Computing - Q.No. 29    ( M - 1 )   
 From which of the following is NOT a technique through which Security can be improved :
       ► Private or virtual-private networks
       ► Firewalls
       ► Metal detectors
       ► Virus detectors


CS101- Introduction to Computing - Q.No. 30    ( M - 1 )   
 Data integrity, in Database management system is necessary because it:


       ► Refers to provide security to the data




       ► Refers to provide security to the data


       ► Refers to maintaining the correctness of data


       ► Refers to maintaining the consistency of the data


CS101- Introduction to Computing - Q.No. 31    ( M - 1 )
 What are the types of computer network according to the distance between nodes ?


CS101- Introduction to Computing - Q.No. 32    ( M - 1 )
 What is an IP address ?


CS101- Introduction to Computing - Q.No. 33    ( M - 2 )
 What is internet?


CS101- Introduction to Computing - Q.No. 34    ( M - 2 )
 Define semantic web with respect to the present web?


CS101- Introduction to Computing - Q.No. 35    ( M - 3 )
 Explain how many ways businesses monitor their employees?


CS101- Introduction to Computing - Q.No. 36    ( M - 3 )
 How can you define a consistent web design? Why is it needed?


CS101- Introduction to Computing - Q.No. 37    ( M - 3 )
 Differentiate between onLoad and onUnload


CS101- Introduction to Computing - Q.No. 38    ( M - 5 )
 What is the role of usability in the design of a website?


CS101- Introduction to Computing - Q.No. 39    ( M - 5 )
 Write a short note on:  
a. Testing
b. Debugging


CS101- Introduction to Computing - Q.No. 40    ( M - 10 )
 Write responsibilities of the followings


1.                                Developer
2.                                Executive Team
3.                                Support Team


CS101- Introduction to Computing - Q.No. 41    ( M - 10 )
 Write down HTML and JavaScript code for the following requirements:
Declare an Array with the identifier SUBJECT having length 5. Assign following values to the array elements:
MIS, Java, Algorithms, Databases, C++
Show all values in reverse order.

CS101 Final Term Past paper 2009 Unsolved - 1

FINALTERM  EXAMINATION
Fall 2009
CS101- Introduction to Computing
Time: 120 min
M a r k s: 75

Question No: 1      ( M a r k s: 1 ) http://vuzs.net


What is NOT a key factor while designing a website?

       ► Usability

       ► User-friendly

       ► Consistency

       ► Complexity



Question No: 2      ( M a r k s: 1 ) http://vuzs.net


To improve the time for scannig a web page, text should be ___________.

       ► Centered

       ► Left Aligned

       ► Right Aligned

       ► Staggered

Question No: 3      ( M a r k s: 1 ) http://vuzs.net


Which of the following number system is used by microprocessor?


       ► Binary

       ► Decimal

       ► Octal

       ► Hexadecimal



Question No: 4      ( M a r k s: 1 ) http://vuzs.net


Which one is NOT a presentation software?

       ► MS Access

       ► CA Harvard Graphics

       ► Corel Presentation

       ► Lotus Freelance



Question No: 5      ( M a r k s: 1 ) http://vuzs.net


A function is also called __________.

       ► Sub-program

       ► Procedure

       ► Sub-routine

       ► All of the given option

Question No: 6      ( M a r k s: 1 ) http://vuzs.net


Which of the following data types are recognized by JavaScript?

       ► Strings

       ► Numbers

       ► Undefined

       ► All of the given options



Question No: 7      ( M a r k s: 1 ) http://vuzs.net


The __________ reserved word allows a determined action to be taken if the first condition is false.

       ► For

       ► While

       ► Else

       ► Switch



Question No: 8      ( M a r k s: 1 ) http://vuzs.net


Security can also be improved through _____________.

       ► Encryption

       ► Typing errors

       ► Transmission errors

       ► Hardware malfunctions



Question No: 9      ( M a r k s: 1 ) http://vuzs.net


The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.

       ► Cooperation

       ► Shared responsibility

       ► Networking

       ► All of the given options

Question No: 10      ( M a r k s: 1 ) http://vuzs.net


After the DoS attack in year 2000, Yahoo servers were recovered in __________.

       ► 1 hour

       ► 2 hours

       ► 3 hours

       ► 4 hours



Question No: 11      ( M a r k s: 1 ) http://vuzs.net


When web server is busy it gives the following message to the user :

       ► Time out

       ► Waiting

       ► Server busy

       ► None of the given options



Question No: 12      ( M a r k s: 1 ) http://vuzs.net


Tribal flood network is a ___________ software.

       ► DoS

       ► Scanning

       ► Utility

       ► None of the given options



Question No: 13      ( M a r k s: 1 ) http://vuzs.net


Spies of one business monitoring the network traffic of their competitors’ ___________.

       ► Industrial Intelligence

       ► Industrial Espionage

       ► Industrial Spying

       ► Industrial Surveillance



Question No: 14      ( M a r k s: 1 ) http://vuzs.net


Planning and tracking of the project is the responsibility of the___________.

       ► Architect

       ► Team Lead

       ► Developer

       ► Chief Executive Officer

Question No: 15      ( M a r k s: 1 ) http://vuzs.net


The effective way not to only write programs but also it works properly and further more to minimize the time and the development cost of the program is called___________________


       ► Programming Mechanism

       ► Programming Methodology

       ► Programming Synchronization

       ► None of the given options



Question No: 16      ( M a r k s: 1 ) http://vuzs.net


Sequence of steps that is taken to solve a problem is called _______.


       ► Algorithm

       ► Operating System

       ► Application software

       ► None of the given options



Question No: 17      ( M a r k s: 1 ) http://vuzs.net


Which one is correct?


       ► 

       ► 

       ► Both and

       ►  

       ► 

       ► Both and

       ► 



Question No: 18      ( M a r k s: 1 ) http://vuzs.net


In which case Cache Memory is used

       ► To increase RAM speed

       ► To overcome BUS speed

       ► To overcome Speed rate between RAM and CPU

       ► To overcome CPU speed


 http://groups.google.com/group/vuZs
Question No: 19      ( M a r k s: 1 ) http://vuzs.net


In Heuristics “Common Sense Lessons” are drawn from

       ► History

       ► Experience

       ► Biography of Scientists

       ► General knowledge



Question No: 20      ( M a r k s: 1 ) http://vuzs.net


In a System having many parts to be designed, one should always do the _____ first

       ► Hard part

       ► Simple part

       ► Development part

       ► Quality part



Question No: 21      ( M a r k s: 1 ) http://vuzs.net


The key property of the ‘Array’ object in JavaScript is

       ► Value

       ► Length

       ► Name

       ► All of the given choices



Question No: 22      ( M a r k s: 1 ) http://vuzs.net


One can send an email message to a remote computer using _______ protocol

       ► HTTP

       ► SMTP

       ► FTP

       ► TELNET



Question No: 23      ( M a r k s: 1 ) http://vuzs.net


______ occurs when a function calls itself.

       ► Recursion

       ► Call by value

       ► Call by reference

       ► Parsing



Question No: 24      ( M a r k s: 1 ) http://vuzs.net


Hardware malfunctions is related to

       ► Data updates

       ► Data integrity

       ► Data security

       ► Data accessibility



Question No: 25      ( M a r k s: 1 ) http://vuzs.net


With the passage of time the field of Computing and Telecommunication is _____________.

       ► Diverging

       ► Converging

       ► Becoming different

       ► Becoming unique

Question No: 26      ( M a r k s: 1 ) http://vuzs.net

______________ software directly interacts with the hardware.

       ► Application software
       ► System software
       ► Dynamic software
       ► Distributed software

Question No: 27      ( M a r k s: 1 ) http://vuzs.net

When the microprocessor desires to look at a piece of data, it checks in the __________ first.
       ► RAM
       ► ROM
       ► hard disk
       ► cache

Question No: 28      ( M a r k s: 1 ) http://vuzs.net
By today's standards, the Mark-I was slow and requiring 3 to 5 seconds for a multiplication operation.

       ► True
       ► False

Question No: 29      ( M a r k s: 1 ) http://vuzs.net

In partitioning of program/module, it should be assured that partitioned chunks should be as _________ as possible.

       ► Dependent
       ► Independent
       ► Complex
       ► All of the above

Question No: 30      ( M a r k s: 1 ) http://vuzs.net
Ada is a programming language specifically designed for

       ► Analytical Engine
       ► Difference Engine
       ► Harvard Mark 1
       ► Mechanical engine



Question No: 31      ( M a r k s: 1 )

What is an Array?

Question No: 32      ( M a r k s: 1 )

What are the other names of function? Any one.

Question No: 33      ( M a r k s: 2 )

What is meant by semantic error ?

Question No: 34      ( M a r k s: 2 )

Which benefits a developer can achieve by following the heuristics for system architecting?

Question No: 35      ( M a r k s: 3 )

How can you define a consistent web design? Why is it needed?

Question No: 36      ( M a r k s: 3 )

Define Primary key and Queries

Question No: 37      ( M a r k s: 3 )

Briefly describe Holographic Storage.

Question No: 38      ( M a r k s: 5 )

Write HTML and JavaScript code that displays a textbox and button on a web page. When user enters text in the text box and click the button it displays that text in the message box.

Question No: 39      ( M a r k s: 5 )

What is Robotics? How Robots making our daily and industrial life easy?

Question No: 40      ( M a r k s: 10 )

Write down the output of the following lines of JavaScript code?

a)

b)

c)
                                                                                          
d)
                                               
e)

Question No: 41      ( M a r k s: 10 )
Write down HTML and JavaScript code for the following requirements:
Declare an Array with the identifier SUBJECT having length 5. Assign following values to the array elements:
MIS, Java, Algorithms, Databases, C++
Show all values in reverse order.