Thursday, March 28, 2024
01:36 PM (GMT +5)

Go Back   CSS Forums > CSS Past Papers > CSS 2019 Papers

Reply Share Thread: Submit Thread to Facebook Facebook     Submit Thread to Twitter Twitter     Submit Thread to Google+ Google+    
 
LinkBack Thread Tools Search this Thread
  #1  
Old Wednesday, March 13, 2019
Junior Member
 
Join Date: Jan 2019
Location: Layyah
Posts: 15
Thanks: 0
Thanked 2 Times in 2 Posts
AneesTariq is on a distinguished road
Post Computer Science Papers CE 2019

PART-I (MCQS) MAXIMUM MARKS = 20 PART-II MAXIMUM MARKS = 80
NOTE:
(i) Part-II is to be attempted on the separate Answer Book.
(ii) Attempt ONLY FOUR questions from PART-II by selecting TWO questions from EACH SECTION. ALL questions carry EQUAL marks.
(iii) All the parts (if any) of each Question must be attempted at one place instead of at different places.
(iv) Write Q. No. in the Answer Book in accordance with Q. No. in the Q.Paper.
(v) No Page/Space be left blank between the answers. All the blank pages of Answer Book must be crossed.
(vi) Extra attempt of any question or any part of the question will not be considered.

PART—II
SECTION-A
Q. No. 2.

(a) Compare the main features of CISC and RISC architectures. Which type of architecture is suitable for pipelining?
(b) Demonstrate use of superscalar approach to achieve instruction level parallelism using a suitable example.
(c) List all basic functions of buses in the context of computer architecture.
Q. No. 3.
(a) Show field by field comparison for IPv4 and IPv6 packets.
(b)Explain the following routing techniques using suitable examples.
i) Link State Routing (ii) Distance Vector Routing
(c) Show step by step procedure of error detection using cyclic redundancy check method for a 7 bit code block "1001001". Assume appropriate generator polynomial.
Q. No. 4.
(a) Demonstrate step by step procedure for process swapping between main memory and secondary memory.
(b) Show flow chart of a process scheduling mechanism using various queues.
(c) Explain the difference between Sequential Access and Indexed Sequential Access in the context of file access using a suitable example
Q. No. 5.
(a) Demonstrate various types of multiplexing techniques in the context of computer networks using suitable examples.
(b) Show step by step procedure to find MAC address of a node in a network using Address Resolution Protocol.
(c) For transmission of voice signal in real time over the network, select a suitable switching technique. Justify your answer using an example.
SECTION-B
Q. No. 6.

(a) Analyze the following noise models in the context of digital image processing.
(i) Gaussian Noise Model (ii) Uniform Noise Model
(b) Compare RGB and HSI color models in the context of digital image processing.
(c) Describe step by step process of application of compression based technique for image segmentation.
Q. No. 7.
(a) A Medium advertising company is reviewing its IT requirements and is considering using a Cloud solution for web applications as opposed to investing in existing infrastructure. Is this an appropriate strategy? Justify your answer using an example.
(b) Describe briefly the role of validation in requirement engineering process.
(c) Explain the difference between functional and non-functional requirement in the context of web engineering using a suitable example.
Q. No. 8.
(a) Demonstrate the use of ER Model in database designing process using an example.
(b) Describe an appropriate security scheme for a database maintained by a bank. Justify your answer using an example.
(c) Explain the difference between top-down and bottom-up approaches in the context of distributed database design using a suitable example.
************
Reply With Quote
  #2  
Old Wednesday, March 13, 2019
Junior Member
 
Join Date: Jan 2019
Location: Layyah
Posts: 15
Thanks: 0
Thanked 2 Times in 2 Posts
AneesTariq is on a distinguished road
Post Computer Science PAPER-I 2019

PART —II
SECTION —1
Q No.2.

(a) Give a detailed note on a revised BSD 3-clause license. Also name 5 softwares using this license.
(b) How do artificial intelligence may facilitate us in improving cyber security?
(c) What are the main parts and phases of a computer virus program?

Q No.3
(a) See the following C++ program to declare whether an input number is a prime number or not. Identify the logical errors in the given program (if any).
Give your correct statement(s) exactly at the same line number.
1. n, i;
2. bool is Prime = false;
3. cout<< "Enter a positive integer: ";
4. cin>> n;
5. for(i = 1; i<n/ 2; ++1)
6. {
7. if(n /i == 0)
8. { ,
9. is Prime = false;
10. break;
11. }
12. }
13. if (is Prime)
14. cout<< "This is a prime number";
15. else
16. cout<< "This is not a prime number";
(b) What is the difference between call by value and call by reference?
(c) What is the role of preprocessor directives? Give three examples in C++.
Q No.4.
(a) How do the OOP paradigm can be associated with the real-world problems? Explain.
(b) Discuss critical reasons given by the professionals for not supporting the OOP paradigm.
Q No.5.
(a) Discuss the security issues associated with the cloud computing.
(b) What is bit twiddling? Give brief description.
(c) An image is a representation of some information. Discuss how does a computer represents an image internally? Name different algorithms used to extract features
from images.
SECTION-B
Q No.6.

(a) Discuss the limitations of genetic algorithms.
(b) What is AVL tree? Under what condition, a binary tree becomes AVL tree?
(c) Consider the following graph. Find out the sequence of edges added to the minimum spanning tree using Kruskal's algorithm.
Q No.7
(a) Discuss the architecture of aspect-oriented system.
(b) Briefly discuss the motivation for aspect-oriented programming.
(c) What is the significance of quantification and obliviousness?
Q No.8
(a) Write down the major steps involved in code generation.
(b) How would you optimize a loop? Describe the techniques briefly.
(c) Differentiate machine-dependent optimization and machine-independent optimization.
Reply With Quote
  #3  
Old Friday, July 12, 2019
Junior Member
 
Join Date: Jan 2019
Posts: 2
Thanks: 0
Thanked 0 Times in 0 Posts
shoaibkaka is on a distinguished road
Default Need Material of Computer Science for CSS

Sir do you have any material of Computer Science for CSS?
Reply With Quote
  #4  
Old Monday, July 22, 2019
Junior Member
 
Join Date: Jul 2019
Posts: 11
Thanks: 0
Thanked 2 Times in 2 Posts
biyamoon is on a distinguished road
Default lsot

thanks for sharing
Reply With Quote
  #5  
Old Thursday, August 08, 2019
Junior Member
 
Join Date: Jan 2019
Posts: 2
Thanks: 0
Thanked 0 Times in 0 Posts
shoaibkaka is on a distinguished road
Default Need Material of Computer Science for CSS

Quote:
Originally Posted by AneesTariq View Post
PART —II
SECTION —1
Q No.2.

(a) Give a detailed note on a revised BSD 3-clause license. Also name 5 softwares using this license.
(b) How do artificial intelligence may facilitate us in improving cyber security?
(c) What are the main parts and phases of a computer virus program?

Q No.3
(a) See the following C++ program to declare whether an input number is a prime number or not. Identify the logical errors in the given program (if any).
Give your correct statement(s) exactly at the same line number.
1. n, i;
2. bool is Prime = false;
3. cout<< "Enter a positive integer: ";
4. cin>> n;
5. for(i = 1; i<n/ 2; ++1)
6. {
7. if(n /i == 0)
8. { ,
9. is Prime = false;
10. break;
11. }
12. }
13. if (is Prime)
14. cout<< "This is a prime number";
15. else
16. cout<< "This is not a prime number";
(b) What is the difference between call by value and call by reference?
(c) What is the role of preprocessor directives? Give three examples in C++.
Q No.4.
(a) How do the OOP paradigm can be associated with the real-world problems? Explain.
(b) Discuss critical reasons given by the professionals for not supporting the OOP paradigm.
Q No.5.
(a) Discuss the security issues associated with the cloud computing.
(b) What is bit twiddling? Give brief description.
(c) An image is a representation of some information. Discuss how does a computer represents an image internally? Name different algorithms used to extract features
from images.
SECTION-B
Q No.6.

(a) Discuss the limitations of genetic algorithms.
(b) What is AVL tree? Under what condition, a binary tree becomes AVL tree?
(c) Consider the following graph. Find out the sequence of edges added to the minimum spanning tree using Kruskal's algorithm.
Q No.7
(a) Discuss the architecture of aspect-oriented system.
(b) Briefly discuss the motivation for aspect-oriented programming.
(c) What is the significance of quantification and obliviousness?
Q No.8
(a) Write down the major steps involved in code generation.
(b) How would you optimize a loop? Describe the techniques briefly.
(c) Differentiate machine-dependent optimization and machine-independent optimization.
Sir do you have any material of Computer Science for CSS?
Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Cultural exchange scholarships 2013 shahidalileghari Scholarships 1070 Monday, February 05, 2018 12:10 PM
NAB Karachi 2016 Jobs sajjadhussainjarwar National Accountability Bureau (NAB) 72 Sunday, January 01, 2017 11:14 PM
CULTURAL EXCHANGE SCHOLARSHIPS PROGRAMME FOR YEAR 2016 by IPC fahadk Scholarships 358 Friday, December 02, 2016 12:23 AM
KPK PSC Announced a Lot of jobs Qacc KPK PSC Others Examinations 13 Saturday, October 20, 2012 03:06 PM
A list of branches of Science and their studies usman malik 65 General Science Notes 0 Tuesday, July 13, 2010 11:23 AM


CSS Forum on Facebook Follow CSS Forum on Twitter

Disclaimer: All messages made available as part of this discussion group (including any bulletin boards and chat rooms) and any opinions, advice, statements or other information contained in any messages posted or transmitted by any third party are the responsibility of the author of that message and not of CSSForum.com.pk (unless CSSForum.com.pk is specifically identified as the author of the message). The fact that a particular message is posted on or transmitted using this web site does not mean that CSSForum has endorsed that message in any way or verified the accuracy, completeness or usefulness of any message. We encourage visitors to the forum to report any objectionable message in site feedback. This forum is not monitored 24/7.

Sponsors: ArgusVision   vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.