Sunday 16 December 2012

CS 2060 High Speed Networks question bank download


The Question bank download for CS2060 High Speed Networks are found below. You can view and download it from here.

Rajasthan University Re-evaluation results for B.A and M.A declared


The Rajasthan university has recently declared the re-evaluation results for the Bachelor of Arts(B.a) and Master of Arts(M.A). The students who were all applied can check their results at
http://www.uniraj.ac.in/

The candidates can check their Roll number. Best of Luck.

Goa 12th Supplementary results declared


The Goa Board of Secondary and Higher Secondary Education has announced the supplementary results for the 12th candidates. The Students can check their results at

http://www.gbshse.gov.in/
Thursday 13 December 2012

HSBE results declared for 10th, 12th and 1st and 2nd semester


The Haryana Board of School Education (HSBE) has recently announced the results for 10 and 12th students and also for the 1st and 2nd semester course. The candidates can check their results at
http://hbse.ac.in/

NIOS 10th and 12th supplementary results declared


The National Institute of Opening School  declared the results for 10th and 12 supplementary now. The candidates can view and download their results at
http://nios.ac.in/

Guru Gobind Singh Indraprastha University results for LLB, BALLB, B.tech and M.tech


The Guru Gobind Singh Indraprastha University  declared the results for LLB, BALLB, B.tech and M.tech courses now. The candidates can check their results at
http://ipu.ac.in/
The students can view and also download their results from here. All the best.

Anna Univ Re-opening for 2nd, 4th, 6th and 8th semester


The Anna university  is conducting the examination for the 3rd, 5th, 7th semester students. The Paper evaluation for the examination is also started and it will end at the 2nd week of january 2013. The Re-opening date for the 2nd,4th, 6th and 8th semester will be on january 2, 2013.
Wednesday 12 December 2012

HAL 2012 results declared


The Hindustan Aeronautics Limited conducted the examination for the Engineering graduates on december 20, 2012. Now the results for the examination is published. The candidates can check their results login into their accounts by entering their Registration number and Date of Birth. You can check your results at
http://202.71.144.125/halonlinereg2012/CandLogin.aspx

Maths 3 Re-exam in Anna university


The MA 2211 Transformation and Partial  Differentiation shortly called as Maths 3 examination was held in december 7, 2012  in all over the colleges affilited under Anna University, chennai. Now the rumors has been arising that the examination is again re-scheduled due to the leakage of question paper before the examination.  But those information are not still announced by the anna university still. So the students are waiting for the anna university official announcement. Many of the students says that , its not true, its a rumour. We are also try to know about it. Hope, we will see
Tuesday 11 December 2012

IBPS Current Affairs questions with answer


1. Who is appointed as Chief economic advisor in the finance ministry department of India?

Raghuram Rajan

2. Who replaces Keshub Mahindra as Chairman of Mahindra and Mahindra?
Anand Mahindra

3. Which Indian state will set up Common Bio-Medical Waste Treatment Disposal Facility to manage and handle bio medical waste of government and private hospitals in all of its districts?
Haryana

4. Who will be appointed as chairman of Barclays from 1st November 2012 succeeding Marcus Aguis?
David Walker

5. Name the provision introduced by government through Banking Laws (Amendment) Bill, 2011 to take over unclaimed amount of inoperative fixed deposit accounts of over 10 years ?
Depositor Education and Awareness Fund

6. What is the current rank of Saina Nehwal globally after winning bronze medal at Olympics 2012?
4th rank

7. Name the public sector undertaking oil company which posted a quarterly loss of Rs.22,451 crore for April-June 2012 quarter.
Indian Oil Corporation (IOC)

8. Where was the 15th Confederation of Indian industry insurance summit held?
Mumbai

9. Name the former Maharashtra Health Minister who died recently.
Digvijay Khanvilkar

10. How is Dubbed Gauss known in technology world?
A virus capable of spying on financial transactions, email and social networking
activities

IBPS current affairs questions with answer


The IBPS Examination is going to conducted on december 15, 16, 22, 23, 2012. The examination is going to held on various institution on the four days. The admit card is available for download now at their official site. The Exam pattern consists of Reasoning, Numerical Ability, Computer knowledge and General knowlege. The GK is more important and it mostly depend upon the current incidences only. Here i posted some GK questions with answer. You can view and download it from here
Sunday 9 December 2012

Tamil Nadu Apex co-operative bank answer key download


The Tamil Nadu Apex cooperative bank recruits clerk now. The  last date for the Application submission was november 23,2012. The Hall ticket was sent to the candidates by the post and also available at the official site also. The Examination also held on december 9, 2012. Now the candidates are expecting the answer key. The answer key will be available to download at
http://tncoopsrb.org/
Friday 7 December 2012

EE 2402 Protection and Switch gear engineering question bank download



The Important Questions with answer in Protection and Switch Gear is available to see and to download here.  You can get all of your question bank and previous year question paper from here. You can contact us by commenting below or drop a mail at studentstrainer@gmail.com

Anna Unversity Examination time table


The Anna unviersity time table is available here. The candidates can check and download that from here. All the best for your examination and you can get your previous year question paper and question bank from ur also.

Thursday 6 December 2012

Diplomo results 2012 for september/october


The Diplomo Results for the September and October 2012 results is expected to declare at the 1st week of January 2013. The Results are available at
tndte.com

IT 2202 Principles of Communication question bank download




1. Derive an expression for the Amplitude modulated signal and draw its frequency spectrum

2. Derive an expression for the AM power calculation, current calculation & modulation by a complex information signal

3. Compare FM & AM.

4. Describe the frequency analysis of Angle modulated waves. Explain their Bandwidth requirements

5. Draw FSK Transmitter and explain. Describe its Bandwidth Considerations

6. Define FSK and give the symbols of BFSK and explain the modulation mechanism with relevant waveforms and expressions

7. Explain the QPSK system with appropriate expressions and diagrams

8. Compare the various types of digital modulation techniques

9. Explain the modulation and demodulation process of PCM in detail Discuss on companding

10.With a block diagram, explain the adaptive Delta Modulation technique

11. Describe the operation of DPCM system with neat block diagram

12.Determine 12-bit linear code, 8-bit compressed code, the decoded 12- bit code, the c quantization error and compression error for a resolution of 0.01 voltage for analog sample voltages of a) 0.083V b) -0.398Vc) +9.234V d) -20.124 V

13. Explain TDMA system with its frame structure, features, efficiency

14.Explain CDMA System with its features. Explain the various problems available in CDMA system. Compare TDMA & FDMA

15. Give a detail account of the different types of multiple access techniques

16.Explain the principle and operation of direct sequence spread spectrum system in detail with an appropriate example

17. Explain the principles and operation of LEO, MEO and GEO satellites

18.Describe in detail the operations of various types of optical detectors

19.Enumerate the elements of an optical fiber transmission link

20.Draw the neat diagram of satellite system link model. Explain its each part in detail

CS 2253 Visual Programming question bank download


Unit I
Windows Programming

1. What is Windows Programming?
Windows Programming uses GUI concept. It is an event-driven Programming. An
Application Window will respond to the events by generating a message by the Operating
System. It uses graphics for organizing user workspace. Programs that run within
Windows also use GUI. eg : Word, Excel. These application programs use some built-in
functions present in API.
2. List the main header files in Windows Programming?
WINDOWS.H
WINDEF.H
WINNT.H
WINBASE.H
WINUSER.H
WINGDI.H
3. What is Hungarian Notation?
The naming convention for windows programming is called as Hungarian Notation. In
this notation the variable names are preceded with key letters. The key letters describe the
type of data the variable represents.
Eg.
h handle
sz character string terminated by zero
4. What are the steps required to create a window?
The steps required to create a window are,
a. Registering Window Class
b. Create a Window
c. Message Loop
d. Window Procedure
5. How to register a window class?
Before creating an application window the window class must be registered. Windows
class is registered by calling register class. The function requires a single parameter,
which is a pointer to structure of, type WNDCLASS.
6. What is a window class?
A window is always created using a window class. The window class identifies the
window procedure that processes messages to the window. The window class defines the
window procedure and some other characterizing of window that created based on the
class.
7. How to create a window?
Create window(): This command allows to specify more detailed information about the
window.
Syntax:
Create window(“szWin Name,”Title”,WS_OVERLAPPEDWINDOW);
8. Define message loop?
When a windows program begins execution, a window create a “message queue” for the
program; this message queue stores message to all the windows a program; this message
queue stores messages to all the windows a program might create. A window application
includes is short check of code called the message loop to the appropriate window
procedure. A simple message to enters of one function call to each of three function,
GetMessage, TrabslateMessage and DispatchMessage
9. What is the use of GetMessage?
The GetMessage function retrieves a message from the queue and copies it to a structure
to Type MSQ.
10. What is the use of TranslateMessage?
A message Loop include TranslateMessage., if the message loop receive character input
from the keyboard, the system generates virtual key messages CW_KEYDOWN and
WM_KEYUP each the user process a key.
11. What is the use of Dispatch Message?
The Dispatch Message function sends a message to the window procedure associated
with the window handle specified in the MSG structure.
12. What are the actions of windows procedure?
The windows procedure is the function named Wndproc. The window procedure
determines what the window displays in its client area the windows responds to user
input.
13. What is WM_PAINT message?
The message informs when a part or all of the windows client area is “invalid” and must
be “updated” which means that it must be redrawn or “painted”.
14. How does WM_PAINT message is processed?
WM_PAINT processing almost always begin with a call to Begin Paint.
hdcBeginPaint(hwnd,&Ps);
and ends with a call to EndPaint
EndPaint(hwnd,&Ps);
BeginPaint erases the backround
EndPaint releases the device context handle.
15. What is WM_DESTROY message?
WM_DESTROY message indicates that a window is in the process of destroying a
window based on a command from the user. The message is a result of the user clicking
on the close button or selecting close from the program’s System message.
16. How the program is terminated?
When the postQuit message function is invoked it inserts a WM_QUIT message in the
Program’s message queue. GetMessage returns aero for WM_QUIT message. This
causes WinMain to drop put of the Message Loop. The program then returns
msgWParam, The program terminated.
17. What is GDI?
The Graphics Device Interface (GDI) provides functions and related structures that an
application can use to generate graphical output for displays, printers and other devices.
18. What is a keyboard accelerator? What are the messages generated?
A keystroke or combination of keystrokes that sends a command message to the specified
application window is called a keyboard accelerator.
The messages generated are,
i) WM_KEYUP
ii) WM_KEYDOWN
iii) WM_COMMAND
iv) WM_SYSCOMMAND
v) WM_SYSKEYDOWN
vi) WM_SYSKEYUP
19. What are the types of messages generated by a mouse?
Two types of messages generated by a mouse.
i) Client area mouse message
ii) Non- client area mouse message
20. What is a menu? What are its types?
A menu is a GUI, which contains a list of menu items. The types of menu are,
1. System Menus
2. Popup Menu
3. Dropdown Menu
21. What are the functions of message box function?
Message Box function is used to deliver text output to user. The function creates a
window, but it is a special purpose window of limited flexibility. The message box
window has a title bar with a close button an optional icon, one or more lines of text.
22. What are the fields in MSG structure?
HWND:- The handle to the window which the message is directed to
MWSSAGE:- The message identifier. This is a number that identified the message.
WPARAM:- A 32-bit message parameter the meaning and value of which depend on
the particular message.
LPARAM:- Another 32-bit message parameter dependent on the message.
TIME:- The time the message was place in message queue.
PT:- The mouse coordinates at the time the message was placed.
23. What are queued and non queued messages?
The queued messaged are those that are placed in a programs message queue by
windows. The non queued messages are posted to a message queue. The non queued
messages are the result of windows directly to the window procedure.
24. Write short notes on status bar?
The status bar window neither accepts user input nor generates command messages. Its
job is simply to display text in panes under program control the status bar supports two
types of panes.
-Text panes-message line panes
-Status indicator panes
25. Give some messages used in windows?
WM_CREATE : This message is sent when a window is being created.
WM_LBUTTONDOWN : This message is sent when the user press the left.
WM_CHAR : This message is sent when the user types a character.
WM_CLOSE : This message is sent when the user closes a window.
WM_COMMAND : This message is sent to appropriate window in response to user
menu choices, dialog button clicks and so on.
UNIT II
1. Define Appwizard
Appwizard is a code generator used to create a working skeleton for the windows with
features source code and features specified through dialog boxes.
2. What are the types of mapping modes?
Ø MM_HIMETRIC
Ø MM_ANISOTROPIC
Ø MM_ISOTROPIC
3. What is the use of SetMapMode command?
It is used to return the previous mapping mode and sets the mapping mode specified in
the parameter.
Syntax:
Virtual int setMapMode(int nMapMode)
4. List the types of video cards used to display the colors
Ø 256 color video card(8 bit)
Ø 16 bit color video card
Ø 24 bit color video card
5. What is resole font?
The system font is the font that windows uses by default for text string like strings in title
bars, menus and dialog boxes. The system font is a razor font which means that the
characters are defined as block of pixels. The size of the character in the system font is
based on the size of title video display.
6. What is the use of get system metrics function?
The function retrieves information about the size of various graphical item in windows
such as icon, occurs, title bars and scroll bars. This function is an important function for
achieving device independent graphical outline in the program. This needs a single
argument called an index. This function returns an integer usually the size of the item
specified in the argument.
7. Explain the display context classes CClientDC and CWindowDC?
Window’s client area excludes the border, the caption bar, and the menu bar. If we
construct an object of class CclientDc, the point(0,0) is at the upper-left corner of the
client area. If we construct an object of class CWindowDC the point(0,0) is the upper-left
corner of the nonclient area.
8. What is the state of the device context?
The current state of the device context includes the following:
Attached GDI drawing objects such as pens, brushes, and fonts.
The mapping mode that determines the scale of items when they are drawn.
Various details such as text alignment parameters and polygon filling mode.
9. What are GDI objects?
A window GDI object type is represented by an MFC library class. CGdiObject is the
abstract base for the GDI object classes. A c++ object of a class derived from
CGdiObject represents a windows GDI object.
10. Mention some of the GDI derived classes?
v CBitmap
v CBrush
v CFont
v CPalette
v CPen
v CRgn
11. Difference between modal and modeless dialogs?
The VDialog base class supports both modal and modeless dialog. With a modal dialog,
such as file dialog, the user cannot work elsewhere in the same application until the
dialog is closed.
With the modeless dialog, the user can work in another window in the application while
the dialog remains on the screen. Eg : Find and replace dialog.
12. What is system modaldialog?
The 16-bit versions of windows support a special kind of modal dialog called a system
modal dialog, which prevents the user from switching to another application. Win32 also
supports system modal dialogs but with weird result: the user can switch to another
application, but the dialog remains as the top window.
13. List some of the COMDLG32 classes?
ü CColorDialog
ü CFileDialog
ü CFindReplaceDialog
ü CPageSetupDialog
ü CFontDialog
ü CPirntDialog
14. What are dialog controls?
A dialog contains a number of elements called controls.
Dialog controls include:
Edit controls, Buttons. List boxes, Combo boxes, Static text, Tree views,progress
indicators, Sliders.
15. Mention some of the windowa common control?
The progress indicator control.
The track bar control.
The spin button control.
The list control.
The tree control.
UNIT III
1. What is keyboard accelerator?
The keyboard accelerator resource consists of a table of key combinations with associated
command ids a keyboard accelerator entry does not have to be associated with a menu
item.
2. What are the two text editing tools?
Windows itself supplies two text editing tools edit control and windows rich edit
common control both can be used as controls within dialogs. But both can also be made
to look like view windows. The MFC library supports this versatility with the
CEDITVIEW and CRICHEDIT VIEW CLASSES.
THE CEDITVIEW CLASS:- This class is based on the windows edit control so it
inherits all the edit limitations.
THE CRICHEDITVIEW CLASS:- This class is based on the rich edit control so it
supports mixed formats and large quantities of text.
3. What are the steps to be followed to build floating popup menus
i) Use the menu editor to insert a new, empty menu in your project’s resource
file.
ii) Type some characters in the left top-level item, and then add your menu item
in the resulting pop-up menu.
iii) Use class wizard to add a WM_CONTEXTMENU message handler in your
view class that receives mouse-click messages.
4. What are the characteristic of SDI frame window?
SDI (single document interface) frame window has the following characteristic.
· Window Size
· Window Position
· Window status
· Windows Status
· Toolbar and status bar enablement and position.
5. What are the functions that treat registry data as either CString objects or unsigned
integers?
Ø Get profile Int
Ø Write Profile Int
Ø Get Profile String
Ø Write Profile String
6. What are the two CFramewnd member functions?
The MFC library provides two CFrameWnd member functions, save bar state and load
bar state, her saving and loading control bar status to and from the registry the functions
process the size and position of the status bar and docked toolbars. They don’t process the
position of floating toolbars.
7. What is serialization?
The objects can be saved on disk when a program outs and then can be restored when the
program is restarted this process of saving and restarting objects is called serialization.
8. How to make a class sterilization?
A serialization class must be derived directly or indirectly from C Object. In addition, the
class declaration must contain the Declare-serial macro call, and the class implementation
file must contain the implement-serial macro call.
9. Explain splitter window?
A splitter window appears as a special type of frame window that holds several views in
panes the application can split the window on creation, on the user can spilt the window
by choosing a menu command or by dragging a splitter box on the window’s scroll bar.
After the window has been split the user can mouse the splitters to adjust the relative
sizes of the panes it can be used in both SDI and MDI applications.
10. What is dynamic and splitter window?
Dynamic splitter window :- It allows the user to split the windows at any time by
choosing a menu item or debugging a splitter box located on the scroll bar panes in it
generally use the same view class.
Static splitter window :- The panes of a static splitter window are defined when the
window is first created and they cannot be changed. The user can move the bars but
cannot unsplit on resplit the window.
11. What are the resources of splitting the window?
When appwizard generates an application with a splitter frame, it includes a split option
in the project’s view menu. The ID-window-split command Id is mapped in the C view
class within the MFC library.
12. How a COM client calls an out-of-process?
COM links the EXE components in different process there its remoting arch, which
usually involves remote procedure call(RPCS). In an RPC the client makes a call to a
special DLL called a proxy the proxy sends a stream of data to a stub which is inside a
DLL in the components process when the client calla a component fn….., the proxy allies
the stud by sending a message to the component program, which is processed by a fit den
window.
13. Define DLL
A DLL is basically a file on disk usually with a DLL extension consisting of global data
complied functions and resources that becomes part of the process. It is compiled to load
at a preferred base address. DLLS are runtime modular and used to write modular
software.
14. Define COM (component object model)
COM is a protocol that connects one software module with another and then drops out of
the picture. After the Connection is made the two modules can communication through a
mechanism called an interface com is an industry standard s/w architecture supported by
Microsoft and many other companies.
15. What are dynamic link libraries?
Windows allows dynamic linking, which means that specially constructed libraries can be
loaded and linked at runtime. The MFC developers succeeded in combining all the
application framework classes into a few ready-built DLLs. This means that you can
statically or dynamically link the application framework classes into your application. In
addition, you can create your own extension DLLs that built on the MFC DLLs.
16. Explain the document-view architecture?
The MFC library contains applications and frame classes plus two other classes that
represent the “document” and “view”. This document-view architecture is the core of the
application framework and is loosely based on the Model/view? Controller classes.
Document-view architecture separates data from the user’s view of the data.
17. What is a view?
From a user’s stand point, a view is an ordinary window that the user can size, move, and
close in the same way as any other Windows-based application window. From the
programmer’s perspective, a view is a c++ object of a class derived from the MFC
library.
18. Difference between single and multi document interface.
Single document interface : An SDI application has, from the user’s point of view, only
one window. If the application depends on disk-file “document”, only one document can
be loaded at a time. The original windows notepad is an example of SDI application.
Multi document interface : An MDI application has multiple child windows, each of
which corresponds to an individual document. Microsoft word is a good example of MDI
application.
19. What are the disadvantage of using DLL?
Ø The programmer must have access to the source code and must be using
the same programming language with same compiler setup.
Ø Memory and disk space will be wasted if several programs which use the
same library of code are running simultaneously.
20. What is Load Library() function?
Load Library () call is used to map the DLL module into the memory of your process.
The function takes a single parameter, the name of the module to load.
HMODULE hMyDll;
hMyDll=load Library (“my Lib”);
if (hMyDll=null) // could not load DLL
21. What is GetProcAddress () function?
The address for the individual functions before using them once the DLL has been loaded
properly. This is done by calling ::GetProcAddress() with the handle returned by
LoadLibrary() and the name of the function. If the function is found this will return a
generic pointer to a function. If the function is not found, GetProcAddress() returns
NULL.
22. What are the characteristics of SDI frame window supported by CPersistent frame
class?
§ Window size
§ Window position
§ Maximized status
§ Minimizes status
§ Toolbar and status bar enablement and position.
Unit IV
1. What are the features supported by COM?
COM provides a unified expandable object oriented communications protocol for
windows
i) A standard language-independent way for a win32 client EXE to load
and call a win32 DLL.
ii) A general-purpose way for one EXE to control another EXE on the
same computer.
A replacement for the VBX control called an active x control.
2. What is the use of IUnknown interface?
I Unknown is a special interface to obtain the interface pointer decaled by com.
3. What is class factory?
A class object is sometimes called as a class factory because it often implements a special
com interface named I class Factory.
4. What is the use of CLSIDFromProgID?
Com supports other types of registration database entry that manufactures a humanreadable
program ID into the corresponding Class ID. The com function USI form
program ID reads the database and perform the manipulation.
5. What do the INTERFACE-PART maces do?
The INTERFACE-PART maces generate the nested classes, adding x to the first
parameters form the class name and adding m-x to form the embedded object name.
6. What is the purpose of the DECLARE-INTERFACE-MAP macro?
`The DECLARE-INTERFACE-MAP macro generalizes the declarations for a table
that holds the IDs of the class’s entire interface.
7. List out the four states that an embedded object can assume?
The four states are given below
1) Passive
2) Loaded
3) Running
4) Active
8. What are the special features of container?
v If handle multiple documents
v Maintains a tempuras storage
v Allows embedded objects to be copied and cut to the clipboard and partied
v Allows an embedded object to be deleted
9. How a COM client calls out-of process components?
In case of an out- of process components COM uses its remoting architecture which
usually involves RPCS (remote procedure calls) in an RPC the client makes calls to a
special dll called a proxy sends a stream of data to a stub which is inside a dll in the
components process when the client calls a components fn the proxy alerts the stub the
mechanism of converting parametts to hard from data streams is called marshaling.
10. Define Object Model.
The Component Object Model specifies architecture, a binary standard and a supporting
infrastructure for building, using and evolving component-based applications. It extends
the benefits of object oriented programming such as encapsulation, polymorphism
software reuse to dynamic computing.
11. What is DCOM?
DCOM stands for Distributed Component Object Model is the distributed extension of
COM. It specifies the additional infrastructure that is required to further extend the
benefits to networked environments.
12. What are main features of COM?
The features of COM include the separation of interfaces and implementations, support
for objects with multiple interfaces, language neutrality, runtime binary software reuse,
location transparency, architecture for extensibility, support for indirection approach to
versioning and different styles of sever lifetime management.
13. Write short notes on Versioning.
COM’s approach to versioning is based on the following three requirements:-
i) Any interface must be unmutable.
ii) A new implementation of same CLSID must support existing
interfaces.
iii) Any client must start interacting with a serve by querying an interface
with an ID.
14. Define OLE.
OLE stands for Object linking and Embedding. OLE is at the core of window
applications. It is also a very complex technology that could be difficult to master without
the help of MFC.
15. What are the applications of OLE?
1) Compound documents.
2) OLE controls.
3) OLE automation.
4) OLE drag and drop.
5) Specialized-MAPI.
16. What is marshaling?
In a remote procedure call the client makes calls to proxy. The proxy sends a stream to a
stub. When the client calls the component function the proxy alerts the stub by sending
the message to the component program. The mechanism of converting parameters to and
from data stream is called Marshaling.
UNIT V
Advanced Concepts
1. What are the advantages of using a real DBMS?
1) Use of standard file formats
2) Indexed file access
3) Data integrity safeguards
4) Multi-user access control
2. Expand the following; Blob, SDK, API, ODBC, DAO?
Blob – binary large object
SDK – software development kit
API – application programming interface
ODBC – open database connectivity
DAO – data access object
3. What is process and thread?
A process is a running program that owns its own memory, file handles and other
system resources the separate execution paths that an individual process can
contain are called as threads.
4. What are the two kinds of thread?
Windows offers two kinds of threads namely
i) Works threads
ii) User interface thread
5. Define ODBC?
The Microsoft open database connectivity(ODBC) standard defines the rules of
SQL grammar and also the c-language programming interface to any SQL
database any DBMS that has an ODBC driver can be occurred by a single
compiled c or c++ program odbc thus separate the user interface from the actual
database management process.
6. What are the methods of Binary Interface method?
The first three methods are:-
i) Query Interface() for navigating between interfaces of the same object instance.
ii) AddRef() for incrementing reference counts.
iii) Release() for decrementing reference counts.
7. Write short notes on Threading Model.
If an application allows multiple clients to concurrently invoke methods of the
same COM object, some synchronization mechanisms needs to be provided to
protect the data. A partment is logical grouping of object that share the same
concurrency constraints, every COM process can have at most one multithread
apartment but it can contain multiple Single Thread Apartments(STAs).
8. What is MTS?
MTS stands for Microsoft Transaction Server provides another style of server
programming. MTS provides server objects must be implemented in the form of
DLLs that are to be hosted by MTS surrogate processes. MTS provides context
objects for these server objects so that they can participate in transaction.
9. What is RFX and where is it used?
RFX is the acronym for Record Field Exchange. The MFC framework can move
data back and forth between the database and the member variables of your
CRecordSet by using record field exchange which works very much like the
Dialog Data Exchange mechanism used by the dialogs and controls.
10. What is the use of CRecordSet :: dynamic?
This type uses a dynamic cursor which allows scrolling in both directions. This
type of record set allow only forward scrolling will not reflect any changes made
to the database.
11. What are the steps to create sample database?
The steps are:-
i) Start MS Access
ii) Create a new table
iii) Populate the table
12. Write the general syntax to create a table. Give one example.
Syntax:-
CREATETABLE: table-name({column name data type},……….)
Example:-
CREATE TABLE Employee
{
EmpID INTEGER,
EmpName VARCHAR(50)
Salary NUMERIC(6,2)
Exp NUMERIC(5)
}
13. How to use Single Row Functions?
For functions such as CRecordSet:: GetField Value () which work on a single
row then you set the current row within row set. This is done with the set row
SetCursorPosition () member in CRecordSet.
14. What are Data transfer and its two structures?
Transferring data between application are accomplished through the one data
object interface which provides a mechanism for transferring data and also for
notifications of change in the data.
The two structures are:-
i) FORMATETC
ii) STGMEDIUM
15. List the MFCWinIent classes
i) CInternetSession
ii) CHttpConnectin
iii) CFtpConnection
iv) CGopherConnection
v) CInternetFile
vi) ChttpFile
vii) CFtpFileFind
viii) CGopherFileFind
ix) CinternetException
16. List the advantages of WinInet over Winsock
1. Caching
2. Security
3. Web proxy access
4. Buffered I/O
5. Easy API
6. User Friendly
17. Define ISAPI Server Extensions.
An ISAPI Server Extension is program that runs in response to a GET or POST
request from a client program. The Browser can pass parameters to the
programs, which are often values that the browser user types into edit, controls,
selects from list boxes and so forth. It typically sends back HTML code based on
those parameter values.
18. List MFC ISAPI Server Extension classes
i) CHttpServer
ii) CHttpServerContext
iii) CHtmlStream
19. Define WINSOCK.
Winsock is the lowest level Windows API for TCP/IP programming. Part of the
code is located in wsock32.dll and part is inside the Windows kernel.
20. List the components of OLEDB Architecture.
1. Enumerators
2. Data source objects
3. Commands
4. Row sets
5. Errors
6. Transaction objects.
16 marks
Unit I
1. Write a VC++ program to create a window. Explain all the functions and message loop.
2. Explain in detail about the architectural overview of windows programming?
3. Explain GDI function and GDI primitives.
4. Explain the two methods used for getting Device Context Handle?
Ans:-
Method 1
By processing WM_PAINT message
Two function used: Beginpaint()
Endpaint()
Method2
By calling the function
GETDC()
ReleaseDC()
5. Explain child window controls?
Unit II
1. Explain various visual C++ components?
2. I) Explain in detail bitmaps loading into your application.
II) Write a VC++ program to display the sum of two numbers using
modal and modeless dialogs.
3. I) Write a VC++ program to draw a rectangle & ellipse.
ii) Explain mapping models?
4. Explain MFC library in detail.
5. Explain windows common controls?
Unit III
1. What is DLL? Create a DLL to add & multiply two numbers and how it can be used in
application?
2. What is a keyboard accelerator? Explain how to implement the accelerator in a Toolbar?
Explain with example?
3. Write a VC++ program to display keyboard pressed?
4. I) Write a VC++program to display mouse coordinates?
ii) Explain splitter window & multiple views?
5. Explain document view architecture?
Unit IV
1. What is an Active X control? How to build an application that uses a calendar control in a
dialog?
2. Explain in detail container-component interaction?
3. Explain OLE drag & drop?
4. Create an Active X control at runtime? (Or) Write a VC++ program to create a Dynamic
Active x control?
5. Explain COM?
Unit V
1. What is a DBMS? What is an SQL? Explain MFC ODBC classes? Explain filter & short
strings?
2. I) Explain with example the Winsock class?
ii) Explain Threading?
3. Explain data access through ODBC with example?
Answer
i) Database creation
ii) Open VC++
iii) Connect database with VC++ through ODBC.
4. Write a VC++ program for chat application.
5. Write a VC++ program for playing an
i) Audio file
ii) Video file
Wednesday 5 December 2012

EC2203 Digital Electronics question bank download


Unit – I Boolean algebra and Logic Gates
Part A
1. Find the hexadecimal equivalent of the decimal number 256
2. Find the octal equivalent of the decimal number 64
3. What is meant by weighted and non-weighted coding?
4. Convert A3BH and 2F3H into binary and octal respectively
5. Find the decimal equivalent of (123)9
6. Find the octal equivalent of the hexadecimal number AB.CD
7. Encode the ten decimal digits in the 2 out of 5 code
8. Show that the Excess – 3 code is self –complementing
9. Find the hexadecimal equivalent of the octal number 153.4
10. Find the decimal equivalent of (346)7
11. A hexadecimal counter capable of counting up to at least (10,000)10 is to be constructed.
What is the minimum number of hexadecimal digits that the counter must have?
12. Convert the decimal number 214 to hexadecimal
13. Convert 231.3 4 to base 7
14. Give an example of a switching function that contains only cyclic prime implicant
15. Give an example of a switching function that for which the MSP from is not unique.
16. Express x+yz as the sum of minterms
17. What is prime implicant?
18. Find the value of X = A B C (A+D) if A=0; B=1; C=1 and D=1
19. What are ‘minterms’ and ‘maxterms’?
20. State and prove Demorgan’s theorem
21. Find the complement of x+yz
22. Define the following : minterm and term
23. State and prove Consensus theorem
24. What theorem is used when two terms in adjacent squares of K map are combined?
25. How will you use a 4 input NAND gate as a 2 input NAND gate?
26. How will you use a 4 input NOR gate as a 2 input NOR gate?
27. Show that the NAND connection is not associative
28. What happens when all the gates is a two level AND-OR gate network are replaced by
NOR gates?
29. What is meant by multilevel gates networks?
30. Show that the NAND gate is a universal building block
31. Show that a positive logic NAND gate is the same as a negative logic NOT gate
32. Distinguish between positive logic and negative logic
33. Implement AND gate and OR gate using NAND gate
34. What is the exact number of bytes in a system that contains (a) 32K byte, (b) 64M bytes,
and (c) 6.4G byte?
35. List the truth table of the function:
F = x y + x y’ + y ’z
Part B
1. (a) Explain how you will construct an (n+1) bit Gray code from an n bit
Gray code
(b) Show that the Excess – 3 code is self -complementing
2. (a) Prove that (x1+x2).(x1’. x3’+x3) (x2’ + x1.x3) =x1’x2
(b) Simplify using K-map to obtain a minimum POS expression:
(A’ + B’+C+D) (A+B’+C+D) (A+B+C+D’) (A+B+C’+D’) (A’+B+C’+D’)
(A+B+C’+D)
3. Reduce the following equation using Quine McClucky method of
minimization F (A,B,C,D) = _m(0,1,3,4,5,7,10,13,14,15)
4. (a) State and Prove idempotent laws of Boolean algebra.
(b) using a K-Map ,Find the MSP from of F= _(0,4,8,12,3,7,11,15) +_d(5)
5 (a) With the help of a suitable example ,explain the meaning of an redundant prime i
implicant
(b) Using a K-Map, Find the MSP form of F= _ (0-3, 12-15) + _d (7, 11)
6 (a) Simplify the following using the Quine – McClusky minimization technique
D = f(a,b,c,d) = _ (0,1,2,3,6,7,8,9,14,15).Does Quine –McClusky take care of don’t
care conditions? In the above problem, will you consider any don’t care conditions?
Justify your answer
(b) List also the prime implicants and essential prime implicants for the above case
7 (a) Determine the MSP and MPS focus of F= _ (0, 2, 6, 8, 10, 12, 14, 15)
(b) State and Prove Demorgan’s theorem
8 Determine the MSP form of the Switching function
F = _ ( 0,1,4,5,6,11,14,15,16,17,20- 22,30,32,33,36,37,48,49,52,53,56,63)
9. (a) Determine the MSP form of the Switching function
F( a,b,c,d) =_(0,2,4,6,8) + _d(10,11,12,13,14,15)
(b) Find the Minterm expansion of f(a,b,c,d) = a’(b’+d) + acd’
10 Simplify the following Boolean function by using the Tabulation Method
F= _ (0, 1, 2, 8, 10, 11, 14, 15)
11 State and Prove the postulates of Boolean algebra
12 (a) Find a Min SOP and Min POS for f = b’c’d + bcd + acd’ + a’b’c + a’bc’d
13 Find an expression for the following function usingQuine McCluscky method
F= _ (0, 2, 3,5,7,9,11,13,14,16,18,24,26,28,30)
14 State and Prove the theorems of Boolean algebra with illustration
15 Find the MSP representation for
F(A,B,C,D,E) = _m(1,4,6,10,20,22,24,26) + _d (0,11,16,27) using K-Map method
Draw the circuit of the minimal expression using only NAND gates
16 (a) Show that if all the gates in a two – level AND-OR gate networks are replaced by
NAND gates the output function does not change
(b) Why does a good logic designer minimize the use of NOT gates?
17 Simplify the Boolean function F(A,B,C,D) = _ m (1,3,7,11,15) + _d (0,2,5) .if don’t
care conditions are not taken care, What is the simplified Boolean function .What are
your comments on it? Implement both circuits
18 (a) Show that if all the gate in a two – level OR-AND gate network are replaced by NOR
gate, the output function does not change.
(b) Implement Y = (A+C) (A+D’) ( A+B+C’) using NOR gates only
19 (a) F3 = f(a,b,c,d) = _ (2,4,5,6)
F2 = f(a,b,c,d) = _ (2,3,,6,7)
F1 = f(a,b,c,d) = _ (2,5,6,7) .Implement the above Boolean functions
(i) When each is treated separately and
(ii)When sharing common term
(b) Convert a NOR with an equivalent AND gate
20 Implement the Switching function whose octal designation is 274 using NAND gates only
21 Implement the Switching function whose octal designation is 274 using NOR gates only
22 (a) Show that the NAND operation is not distributive over the AND operation
(b) Find a network of AND and OR gate to realize f(a,b,c,d) = _ m (1,5,6,10,13,14)
23 What is the advantages of using tabulation method? Determine the prime implicants of the
following function using tabulation method
F( W,X,Y,Z) = _(1,4,6,7,8,9,10,11,15)
23 (a) Explain about common postulates used to formulates various algebraic structures
(b) Given the following Boolean function F= A”C + A’B + AB’C + BC
Express it in sum of minterms & Find the minimal SOP expression
Unit – II Combinational Logic
Part A
1. How will you build a full adder using 2 half adders and an OR gate?
2. Implement the switching function Y= BC’ + A’B + D
3. Draw 4 bit binary parallel adder
4. Write down the truth table of a full adder
5. Write down the truth table of a full sub tractor
6. Write down the truth table of a half sub tractor
7. Find the syntax errors in the following declarations (note that names for primitive gates
are optional):
module Exmp1-3(A, B, C, D, F)
inputs A,B,C,
and g1(A,B,D);
not (D,B,A);
OR (F,B,C);
endmodule ;
8. Draw the logic diagram of the digital circuit specified by
module circt (A,B,C,D,F);
input A,B,C,D;
output F;
wire w,x,y,z,a,d;
and (x,B,C,d);
and y,a,C);
and (w,z,B);
or (z,y,A);
or (F,x,w);
not (a,A);
not (d,D);
endmodule
9. Define Combinational circuits
10. Define Half and Full adder
11. Give the four elementary operations for addition and subtraction
12. Design the combinational circuit with 3 inputs and 1 output. The output is 1 when the
binary value of the inputs is less than 3.The output is 0 otherwise
13. Define HDL
14. What do you mean by carry propagation delay?
15. What is code converter?
16. Give short notes on Logic simulation and Logic synthesis
17. What do you mean by functional and timing simulation?
18. What do you mean by test bench?
19. Give short notes on simulation versus synthesis
20. Define half sub tractor and full sub tractor
Part B
1 Design a 4 bit magnitude comparator to compare two 4 bit number
2 Construct a combinational circuit to convert given binary coded decimal number into an
Excess 3 code for example when the input to the gate is 0110 then the circuit should
generate output as 1001
3 Design a combinational logic circuit whose outputs are F1 = a’bc + ab’c and
F2 = a’ + b’c + bc’
4 (a) Draw the logic diagram of a *-bit 7483 adder
(b) Using a single 7483, Draw the logic diagram of a 4 bit adder/sub tractor
5 (a) Draw a diode ROM, which translates from BCD 8421 to Excess 3 code
(b) Distinguish between Boolean addition and Binary addition
6 Realize a BCD to Excess 3 code conversion circuit starting from its truth table
7 (a) Design a full sub tractor
(b) How to it differ from a full sub tractor
8 Design a combinational circuit which accepts 3 bit binary number and converts its
equivalent excess 3 codes
9 Derive the simplest possible expression for driving segment “a” through ‘g’ in an 8421
BCD to seven segment decoder for decimal digits 0 through 9 .Output should be
active high (Decimal 6 should be displayed as 6 and decimal 9 as 9)
10 Write the HDL description of the circuit specified by the following Boolean function
(i) Y= (A+B+C) (A’+B’+C’)
(ii) F= (AB’ + A’B) (CD’+C’D)
(iii) Z = ABC + AB’ + A(D+B)
(iv) T= [(A+B} {B’+C’+D’)]
11 Design 16 bit adder using 4 7483 ICs
Unit – III Design with MSI Devices
Part A
1. What is a decoder and obtain the relation between the number of inputs ‘n’ and outputs
‘m’ of a decoder?
2. Distinguish between a decoder and a demultiplexer
3. Using a single IC 7485 ; draw the logic diagram of a 4 bit comparator
4. what is decoder
5. What do you mean by encoder?
6. Write the short notes on priority encoder
7. What is multiplexer? Draw the logic diagram of8 to 1 line multiplexer
8. What do you mean by comparator?
9. Write the HDL description of the circuit specified by the following Boolean function
X=AB+ACD+BC’
10. How does ROM retain information?
11. Distinguish between PAL and PLA
12. Give the classification of memory
13. What is refreshing? How it is done?
14. What is Hamming code?
15. Write a short notes on memory decoding
16. List the basic types of programmable logic devices
17. What is PAL? How it differ from PROM and PLA?
18. Write a short notes on – PROM,EPROM,EEPROM
19. How many parity bits are required to form Hamming code if massage bits are 6?
20. How to find the location of parity bits in the Hamming code?
21. Generate the even parity Hamming codes for the following binary data
1101, 1001
22. A seven bit Hamming code is received as 11111101. What is the correct code?
23. Compare static RAMs and dynamic RAMs
24. Define Priority encoder
25. Define PLDs
Part B
1. Implement the switching function F= _(0,1,3,4,7) using a 4 input MUX and explain
2. Explain how will build a 64 input MUX using nine 8 input MUXs
3. State the advantages of complex MSI devices over SSI gates
4. Implement the switching function F(A,B,C) = _ ( ,2,4,5) using the DEMUX 74156
5. Implement the switching function F= _(0,1,3,4,12,14,15) using an 8 input MUX
6. Explain how will build a 16 input MUX using only 4 input MUXs
7. Explain the operation of 4 to 10 line decoder with necessary logic diagram
8. Draw a neat sketch showing implementation of Z1 = ab’d’e + a’b’c’e’ + bc + de ,
Z2 = a’c’e, Z3 = bc +de+c’d’e’+bd and Z4 = a’c’e +ce using a 5*8*4 PLA
9. Implement the switching functions:
Z1 = ab’d’e + a’b’c’e’ + bc + de ,
Z2 = a’c’e,
Z3 = bc +de+c’d’e’+bd and
Z4 = a’c’e +ce Using a 5*8*4 PLA
10 Design a switching circuit that converts a 4 bit binary code into a 4 bit Gray code using
ROM array
11.Design a combinational circuit using a ROM ,that accepts a 3- bit number and
generates an output binary number equal to the square of the given input number
Unit – IV Synchronous Sequential Logic
Part A
1. Derive the characteristic equation of a D flip flop
2. Distinguish between combinational and sequential logic circuits
3. What are the various types of triggering of flip-flops?
4. Derive the characteristic equation of a T flip flop
5. Derive the characteristic equation of a SR flip flop
6. What is race round condition? How it is avoided?
7. List the functions of asynchronous inputs
8. Define Master slave flip flop
9. Draw the state diagram of ‘T’ FF, ‘D’ FF
10. Define Counter
11. What is the primary disadvantage of an asynchronous counter?
12. How synchronous counters differ from asynchronous counters?
13. Write a short note on counter applications
14. Compare Moore and Mealy models
15. When is a counter said to suffer from lock out?
16. What is the minimum number of flip flops needed to build a counter of modulus z 8?
17. State the relative merits of series and parallel counters
18. What are Mealy and Moore machines?
19. When is a counter said to suffer from lockout?
20. What is the difference between a Mealy machine and a Moore Machines?
21. Distinguish between synchronous and asynchronous sequential logic circuits
22. Derive the characteristic equation of a JK flip flop
23. How will you convert a JK flip flop into a D flip flop
24. What is mean by the term ‘edge triggered’?
25. What are the principle differences between synchronous and asynchronous networks
26. What is lockout? How it is avoided?
27. What is the pulse mode operation of asynchronous sequential logic circuits not very
popular?
28. What are the advantages of shift registers?
29. What are the applications of a shift register?
30. How many flip –flops are needed to build an 8 bit shift register?
31. A shift register comprises of JK flip-flops. How will you complement of the counters of the
register
32. List the basic types of shift registers in terms of data movement.
33. Write a short notes on PRBS generator
34. Give the HDL dataflow description for T flip - flop
35. Give the HDL dataflow description for JK flip – flop
Part B
1 Draw the state diagram and characteristics equation of T FF, D FF and JK FF
2 (a) What is race around condition? How is it avoided?
(b) Draw the schematic diagram of Master slave JK FF and input and output
waveforms.Discuss how it prevents race around condition
3 Explain the operation of JK and clocked JK flip-flops with suitable diagrams
4 Draw the state diagram of a JK flip- flop and D flip – flop
5 Design and explain the working of a synchronous mod – 3 counter
6 Design and explain the working of a synchronous mod – 7 counter
7 Design a synchronous counter with states 0,1, 2,3,0,1 …………. Using JK FF
8 Using SR flip flops, design a parallel counter which counts in the sequence
000,111,101,110,001,010,000 ………….
9 Using JK flip flops, design a parallel counter which counts in the sequence
000,111,101,110,001,010,000 ………….
10 (a) Discuss a decade counter and its working principle
(b) Draw as asynchronous 4 bit up-down counter and explain its working
11 (a) How is the design of combinational and sequential logic circuits possible with PLA?
(b) Mention the two models in a sequential circuit and distinguish between them
12 Design a modulo 5 synchronous counter using JK FF and implement it. Construct its
timing diagram
12 A sequential machine has one input line where 0’s and 1’s are being incident. The
machine has to produce a output of 1 only when exactly two 0’s are followed by a ‘1’
or exactly two 1’s are followed by a ‘0’.Using any state assignment and JK
flipflop,synthesize the machine
13 Using D flip –flop ,design a synchronous counter which counts in the sequence
000, 001, 010, 011, 100, 1001,110,111,000
15 Using JK flip-flops, design a synchronous sequential circuit having one and one
output. the output of the circuit is a 1 whenever three consecutive 1’s are
observed. Otherwise the output is zero
14 Design a binary counter using T flip – flops to count in the following sequences:
(i) 000,001,010,011,100,101,110,111,000
(ii) 000,100,111,010,011,000
15 (a) Design a synchronous binary counter using T flip – flops
(b) Derive the state table of a serial binary adder
17. Design a 3 bit binary Up-Down counter
18. (i) Summarize the design procedure for synchronous sequential circuit
(ii) Reduce the following state diagram
Unit – V Asynchronous Sequential Logic
Part A
1. Distinguish between fundamental mode and pulse mode operation of asynchronous
sequential circuits
2. What is meant by Race?
3. What is meant by critical race?
4. What is meant by race condition in digital circuit?
5. Define the critical rate and non critical rate
6. What are races and cycles?
7. What is the significance of state assignment?
8. What are the steps for the analysis of asynchronous sequential circuit?
9. What are the steps for the design of asynchronous sequential circuit?
10. Write short notes on (a) Shared row state assignment
(b) One hot state assignment
11. What are Hazards?
12. What is a static 1 hazard?
13. What is a static 0 hazard?
14. What is dynamic hazard?
15. Define static 1 hazard, static 0 hazards, and dynamic hazard?
16. Describe how to detect and eliminate hazards from an asynchronous network?
17. What is static hazard?
18. List the types of hazards?
19. How to eliminate the hazard?
20. Draw the wave forms showing static 1 hazard?
Part B
1. What is the objective of state assignment in asynchronous circuit? Give hazard – free
realization for the following Boolean function f(A,B,C,D) = _M(0,2,6,7,8,10,12)
2. Summarize the design procedure for asynchronous sequential circuit
a. Discuss on Hazards and races
b. What do you know on hardware descriptive languages?
3. Design an asynchronous sequential circuit with 2 inputs X and Y and with one output Z
Wherever Y is 1, input X is transferred to Z .When Y is 0; the output does not change for
any change in X.Use SR latch for implementation of the circuit
4. Develop the state diagram and primitive flow table for a logic system that has 2 inputs,x
and y and an output z.And reduce primitive flow table. The behavior of the circuit is stated
as follows. Initially x=y=0. Whenever x=1 and y = 0 then z=1, whenever x = 0 and y = 1
then z = 0.When x=y=0 or x=y=1 no change in z ot remains in the previous state. The
logic system has edge triggered inputs with out having a clock .the logic system changes
state on the rising edges of the 2 inputs. Static input values are not to have any effect in
changing the Z output
5. Design an asynchronous sequential circuit with two inputs X and Y and with one output Z.
Whenever Y is 1, input X is transferred to Z.When Y is 0,the output does not change for
any change in X.
6. Obtain the primitive flow table for an asynchronous circuit that has two inputs x,y and one
output Z. An output z =1 is to occur only during the input state xy = 01 and then if the only if
the input state xy =01 is preceded by the input sequence.
7. A pulse mode asynchronous machine has two inputs. It produces an output whenever two
consecutive pulses occur on one input line only .The output remains at ‘1’ until a pulse has
occurred on the other input line. Draw the state table for the machine.
8.
(a) How will you minimize the number of rows in the primitive state table of an incompletely
specified sequential machine
(b) State the restrictions on the pulse width in a pulse mode asynchronous sequential
machine
9. Construct the state diagram and primitive flow table for an asynchronous network that has
two inputs and one output. The input sequence X1X2 = 00,01,11 causes the output to
become 1.The next input change then causes the output to return to 0.No other inputs will
produce a 1 output

CS 2253 Computer Organization and Architecture previous year question paper download


Anna University
B.E./B.Tech. DEGREE EXAMINATION, APRIL/MAY 2011
Fourth Semester
Computer Science and Engineering
CS 2253 — COMPUTER ORGANIZATION AND ARCHITECTURE
(Common to Information Technology)
(Regulation 2008)
Time : Three hours Maximum : 100 marks
Answer ALL questions
PART A — (10 × 2 = 20 marks)

1. What is an opcode? How many bits are needed to specify 32 distinct
operations?
2. Write the logic equations of a binary half adder.
3. Write the difference between Horizontal and Vertical Microinstructions.
4. In what ways the width and height of the control memory can be reduced?
5. 5 = A A A + ← 3
A B × ← 4
What hazard does the above two instructions create when executed
concurrently?
6. What are the disadvantages of increasing the number of stages in pipelined
processing?
7. What is the use of EEPROM?
8. State the hardware needed to implement the LRU in replacement algorithm.
9. What is distributed arbitration?
10. How interrupt requests from multiple devices can be handled?


PART B — (5 × 16 = 80 marks)
11. (a) With examples explain the Data transfer, Logic and Program Control
Instructions? (16)
Or
(b) Explain the Working of a Carry-Look Ahead adder. (16)
12. (a) (i) Describe the control unit organization with a separate Encoder and
Decoder functions in a hardwired control. (8)
(ii) Generate the logic circuit for the following functions and explain. (8)
..... .BR T .ADD T T Z 4 6 1 in
+ + + =
END ... ).BRN N . T .N (T .BR T .ADD T 4 5 5 7
+ + + + = .
Or
(b) Write a brief note on nano programming. (16)
13. (a) What are the hazards of conditional branches in pipelines? how it can be
resolved? (16)
Or
(b) Explain the super scalar operations with a neat diagram. (16)
14. (a) What is a mapping function? What are the ways the cache can be
mapped? (16)
Or
(b) Explain the organization and accessing of data on a Disk. (16)
15. (a) (i) How data transfers can be controlled using handshaking technique?
(8)
(ii) Explain the protocols of USB. (8)
Or
(b) How the parallel port output interface circuit works? (16)
Tuesday 4 December 2012

Dena bank clerk final results declared


The Dena bank interview was held in the month of june 2012. Now the final results had beed declared now.  The Results are fully based on their written examination and interview only.  The candidates can check their results at
http://denabank.com/index.jsp

Important question with answers in digital communication engineering


UNIT 1: PULSE MODULATION

1. Define Nyquist rate.

Let the signal be bandlimited to „W‟ Hz. Then Nyquist rate is given as,Nyquist rate = 2W samples/sec Aliasing will not take place if sampling rate is greater than Nyquist rate.

2. What is meant by aliasing effect?

Aliasing effect takes place when sampling frequency is less than Nyquist rate. Under such condition, the spectrum of the sampled signal overlaps with itself .Hence higher frequencies take the form of lower frequencies. This interference of the frequency components is called as aliasing effect.

3. Define PWM.

PWM is basically pulse width modulation. Width of the pulse changes according to amplitude of the modulating signal. It also referred as pulse duration modulation or PDM.

4. State Sampling theorem.

A bandlimited signal of finite energy, which has no frequency components higher than W Hz, may be completely recovered from the knowledge of its samples taken at the rate of 2W samples per second.

5. Mention the merits of DPCM.

1. Bandwidth requirement of DPCM is less compared to PCM.

2. Quantization error is reduced because of prediction filter

3. Numbers of bits used to represent one sample value are also reduced compared to PCM.

6. What is the main difference in DPCM and DM?

DM encodes the input sample by one bit. It sends the information about + δ or -δ, ie step rise or fall. DPCM can have more than one bit of encoding the sample. It sends the information about difference between actual sample value and the predicted sample value.

7. How the message can be recovered from PAM?

The message can be recovered from PAM by passing the PAM signal through reconstruction filter integrates amplitude of PAM pulses. Amplitude reconstruction signal is done to remove amplitude discontinuities due to pulses.

8. Write an expression for bandwidth of binary PCM with N messages each with a maximum frequency of fm Hz.

If „v‟ number of bits are used to code each input sample, then bandwidth of PCM is given as, BT ≥ N.v.fm

Here v. fm is the bandwidth required by one message.

9. How is PDM wave converted into PPM message?

The PDM is signal is clock signal to monostable multivibrator. The multivibraor triggers on falling edge. Hence a PPM pulse of fixed width is produced after falling edge of PDM pulse. PDM represents the input signal amplitude in the form of width of the pulse. A PPM pulse is produced after the width of PDM pulse. In other words, the position of the PPM pulse depends upon input signal amplitude.

10. Mention the use of adaptive quantizer in adaptive digital waveform coding schemes.

Adaptive quantizer changes its step size according variance of the input signal.Hence quantization error is significantly reduced due to the adaptive quantization. ADPCM uses adaptive quantization. The bit rate of such schemes is reduced due to adaptive quantization.

11. What do u understand from adaptive coding?

In adaptive coding, the quantization step size and prediction filter coefficients are changed as per properties of input signal. This reduces the quantization error and number of bits to represent the sample value. Adaptive coding is used for speech coding at low bits rates.

12. What is meant by quantization?

While converting the signal value from analog to digital, quantization is performed. The analog value is assigned to nearest digital value. This is called quantization. The quantized value is then converted into equivalent binary value. The quantization levels are fixed depending upon the number of bits. Quantization is performed in every Analog to Digital Conversion.

13. The signal to quantization noise ratio in a PCM system depends on what criteria?

The signal to quantisation noise ratio in PCM is given as, (S/N)db ≤(4.8+6v)dB Here v is the number of bits used to represent samples in PCM. Hence signal to quantization noise ratio in PCM depends upon the number of bits or quantization levels.

14. What is meant by adaptive delta modulation?

In adaptive delta modulation, the step size is adjusted as per the slope of the input signal. Step size is made high if slope of the input signal is high. This avoids slope overload distortion.

15. What is the advantage of delta modulation over pulse modulation schemes?

Delta modulation encodes one bit per samples. Hence signalling rate is reduced in DM.

16. What should be the minimum bandwidth required to transmit a PCM channel?

The minimum transmission bandwidth in PCM is given as, BT = vW Here v is the number of bits used to represent one pulse. W is the maximum signal frequency.

17. What is the advantage of delta modulation over PCM?
Delta modulation uses one bit to encode on sample. Hence bit rate of delta

modulation is low compared to PCM.

18. What are the two limitations of delta modulation?

1. Slope of overload distortion.

2. Granular noise.

19. How does Granular noise occurs?

It occurs due to large step size and very small amplitude variation in the input signal.

20. What are the advantages of the Delta modulation?

1. Delta modulation transmits only one bit for one sample. Thus the signalling rate and transmission channel bandwidth is quite small for delta modulation.

2. The transmitter and receiver implementation is very much simple for delta modulation. There is no analog to digital converter involved in delta modulation.

UNIT II: BASEBAND PULSE TRANSMISSION

1. What is intersymbol interference in baseband binary PAM systems?

In baseband binary PAM, symbols are transmitted one after another. These symbols are separated by sufficient time durations. The transmitter, channel and receiver acts as a filter to this baseband data. Because of the filtering characteristics, transmitted PAM pulses are spread in time.

2. What is correlative coding?

Correlative level coding is used to transmit a baseband signal with the signalling rate of 2Bo over the channel of bandwidth Bo. This is made physically possible by allowing ISI in the transmitted in controlled manner. This ISI is known to receiver. The correlative coding is implemented by duobinary signalling and modified duobinary signalling.

3. Define Duobinary baseband PAM system.

Duobinary encoding reduces the maximum frequency of the baseband signal. The word „duo‟ means to double the transmission capacity of the binary system. Let the PAM signal ak represents kth bit. Then the encoder the new waveform as Ck =ak + ak-1 Thus two successive bits are added to get encoded value of the kth bit. Hence Ck becomes a correlated signal even though ak is not correlated. This introduces intersymbol interference in the controlled manner to reduce the bandwidth.

4. What are eye pattern?

Eye pattern is used to study the effect of ISI in baseband transmission.

1.) Width of eye opening defines the interval over which the received wave can be sampled without error from ISI.

2.) The sensitivity of the system to timing error is determined by the rate of closure of the eye as the sampling time is varied.

3.) Height of the eye opening at sampling time is called margin over noise.

5. How is eye pattern obtained on the CRO?

Eye pattern can be obtained on CRO by applying the signal to one of the input channels and given an external trigger of 1/Tb Hz. This makes one sweep of beam equal to Tb seconds.

6. Why do you need adaptive equalization in a switched telephone network.

In switched telephone network the distortion depends upon

1) Transmission characteristics of individual links.

2) Number of links in connection.

Hence fixed pair of transmit and receive filters will not serve the equalization problem. The transmission characteristics keep on changing. Therefore adaptive equalization is used.

7.What are the necessity of adaptive equalization?

Ans. Most of the channels are made up of individual links in switched telephone network,the distortion induced depends upon

1) transmission characteristics of individual links

2) number of links in connection

8. Define the principle of adaptive equalization?

Ans. The filters adapt themselves to the dispersive effects of the channel that is the cofficients of the filters are changed contineously according to the received data. The filter cofficients are changed in such a way that the distortion in the data is reduced

9. Define duobinary encoding?

Ans. Duobinary encoding reduces the maximum frequency of the base band signal the “word duo” means to the double transmission capacity of the binary system

10. Write a note on correlative level coding?

Correlative level coding allows the signal scaling rate of 2Bo in the channel of bandwidth Bo this is made physically possible by allowing ISI in the transmitted signal in controlled manner this ISI IS KNOWN TO THE RECEIVER

11. Define the term ISI?

Ans. The presence of outputs due to other bits interference with the output of required bit . this effect is called inter symbol interference (ISI)

12. Write the performance of data transmission system using eye pattern technique?

Ans. The width of the eye opening defines the interval over which the received wave can can be sampled without error from inter symbol interference . The sensitivity of the system to timing error is determined by the rate of closure of the eye as the sampling time is varied

13. What is the necessity of equalization?

Ans. When the signal is passed through the channel distortion is introduced in terms of 1) amplitude 2) delay this distortion creates problem of ISI. The detection of the signal also become difficult this distraction can be compensated with the help of equalizer.

14. What is raised cosine spectrum?

In the raised cosine spectrum, the frequency response P(f) decreases towards zero gradually That is there is no abrupt transition).

15. What is nyquist Bandwidth?
The B0 is called nyquist bandwidth. The nyquist bandwidth is the minimum transmission bandwidth for zero ISI.

UNIT III: PASSBAND DELTA TRANSMISSION

1. Mention the need of optimum transmitting and receiving filter in baseband data transmission.

When binary data is transmitted over the baseband channel, noise interfaces with it. Because of this noise interference, errors are introduced in signal detection. Optimum filter performs two functions while receiving the noisy signal:

1) Optimum filter integrates the signal during the bit interval and checks the output at the time instant where signal to noise ratio is maximum

2) Transfer function of the optimum filter is selected so as to maximise signal to noise ratio.

3) Optimum filter minimizes the probability of error.

2. Define ASK.

In ASK, carrier is switched on when binary 1 is to be transmitted and it is switched off when binary D is to be transmitted ASK is also called on-off keying.

3. What is meant by DPSK?

In DPSK, the input sequence is modified. Let input sequence be d(t) and output sequence be b(t). Sequence b(t) changes level at the beginning of each interval in which d(t)=1 and it does not changes level when d(t)=0. When b(t) changes level, phase of the carrier is changed. And as stated above, b(t) changes t=its level only when d(t) =1. This means phase of the carrier is changed only if d(t)=1. Hence the technique is called Differential PSK.

4. Explain coherent detection?

In coherent detection, the local carrier generated at the receiver is phase locked with the carrier at the transmitter. The detection is done by correlating received noisy signal and locally generated carrier. The coherent detection is a synchronous detection.

5. What is the difference between PSK and FSK?

In PSK, phase of the carrier is switched according to input bit sequence. In FSK frequency of the carrier is switched according to input bit sequence. FSK needs double of the bandwidth of PSK.

6. What is meant by coherent ASK?

In coherent ASK, correlation receiver is used to detect the signal. Locally  generated carrier is correlated with incoming ASK signal. The locally generated carrier is in exact phase with the transmitted carrier. Coherent ASK is also called as synchronous ASK.

7. What is the major advantage of coherent PSK over coherent ASK?

ASK is on-off signalling, where as the modulated carrier is continuously transmitted in PSK. Hence peak power requirement is more ASK, whereas it is reduced in case of PSK.

8. Explain the model of bandpass digital data transmission system?

The bandpass digital data transmission system consists of source, encoder and modulator in the transmitter. Similarly receiver, decoder and destination form the transmitter.

9. What is baseband signal receiver?

A baseband signal receiver increases the signal to noise ratio at the instant of sampling. This reduces the probability of error. The baseband signal receiver is also called optimum receiver.

10. What is matched filter?

The matched filter is a baseband signal receiver, which works in presence of white Gaussian noise. The impulse response of the matched response of the matched filter is matched to the shape pf the input signal.

11. What is the value of maximum signal to noise ratio of the matched filter? When it becomes maximum?

Maximum signal to noise ratio is the ratio of energy to psd of white noise. i.e., ρmax = E/ (N0/2) This maximum value occurs at the end of bit duration i.e. Tb.

12. What is correlator ?

Correlator is the coherent receiver. It correlates the received noisy signal f(t) with the locally generated replica of the unknown signal x(t). It‟s output is denoted as r(t).

13. On what factor, the error probability of matched filter depends.

Error probability is given as Pe = 1/2erfc√E/No

This equation shows that error probability depends only on energy but not on shape of the signal.

14. Bring out the difference between coherent & non coherent binary modulation scheme.

a. Coherent detection:

In this method the local carrier generated at the receiver is phase locked with the carrier at the transmitter. Hence it is called synchronous detection

b. Non coherent detection:

In this method, the receiver carrier need not be phase locked with transmitter carrier. Hence it is called envelope detection.

15. Write the expression for bit error rate for coherent binary FSK.

Bit error rate for coherent binary FSK is given as, Pe = 1/2erfc√0.6E/No

16. Highlight the major difference between a QPSK & MSK signal.

MSK signal have continuous phase in all the cases, where as QPSK has phase shift of π/2 or π.

17. What is the error probability of MSK & DPSK?

Error probability of MSK: Pe = 1/2erfc√E/No

Error probability of DPSK: Pe = 1/2e-Eb/No

18. In minimum shift keying what is the relation between the signal

frequencies & bit rate. Let the bit rate be fb and the frequency of carrier be f0. The higher and lower MSK signal frequencies are given as,

fH = f0 + fb/4

fL = f0 – fb/4

19. List the advantages of Passband transmission.

a. Long distance.

b. Analog channels can be used for transmission.

c. Multiplexing techniques can be used for bandwidth conservation.

d. Transmission can be done by using wireless channel also.

20. List the requirements of Passband transmission.

a. Maximum data transmission rate.

b. Minimum probability of symbol error.

c. Minimum transmitted power.

UNIT IV: ERROR CONTROL CODING

1.What is hamming distance?

The hamming distance between two code vectors is equal to the number of elements in which they differ. For example, let the two code words be, X = (101) and Y= (110) These two code words differ in second and third bits. Therefore the hamming distance between X and Y is two.

2. Define code efficiency.

The code efficiency is the ratio of message bits in a block to the transmitted bits for that block by the encoder i.e., Code efficiency= (k/n) k=message bits n=transmitted bits.

3. What is meant by systematic and non-systematic codes?

In a Systematic block code, message bits appear first and then check bits. In the non-systematic code, message and check bits cannot be identified in the code vector.

4. What is meant by linear code?

A code is linear if modulo-2 sum of any two code vectors produces another code vector. This means any code vector can be expressed as linear combination of other code vectors.

5. What are the error detection and correction capabilities of hamming codes?

The minimum distance (dmin) of hamming codes is „3‟. Hence it can be used to detect double errors or correct single errors. Hamming codes are basically linear block codes with dmin =3.

6. What is meant by cyclic codes?

Cyclic codes are the subclasses of linear block codes. They have the property that a cyclic shift of one codeword produces another code word.
7. How syndrome is calculated in Hamming codes and cyclic codes?

In hamming codes the syndrome is calculated as, S=YHT Here Y is the received and HT is the transpose of parity check matrix.

8. What is BCH code?

BCH codes are most extensive and powerful error correcting cyclic codes. The decoding of BCH codes is comparatively simpler. For any positive integer „m‟ and „t‟ (where t<2 m-1 )there exists a BCH code with following parameters: Block length: n= 2m-1 Number of parity check bits : n-k<=mt Minimum distance: dmin>=2t+1

9. What is RS code?

These are non binary BCH codes. The encoder for RS code operates on multiple bits simultaneously. The (n, k) RS code takes the groups of m- bit symbols of incoming binary data stream. It takes such „k‟ number of symbols in one block. Then the encoder acts (n – k) redundant symbols to form the code word of „n‟ symbols

RS code has: Block Length : n=2 m-1 symbols Message size: K symbols Parity check size: n-k= 2t symbols Minimum distance: dmin=2t+a symbols

10. What is difference between block codes and convolutional codes?

Block codes takes‟k‟ number of bits simultaneously form „n‟-bit code vector. This code vector is also called block. Convolutional code takes one message bits at a time and generates two or more encoded bits. Thus convolutional codes generate a string of encoded bits for input message string.

11. Define constraint length in convolutional code?

Constraint length is the number of shift over which the single message bit can influence the encoder output. It is expressed in terms of message bits.

12. Define free distance and coding gain.

Free distance is the minimum distance between code vectors. It is also equal to minimum weight of the code vectors. Coding gain is used as a basis of comparison for different coding methods. To achieve the same bit error rate the coding gain is defined as,

A= (Eb/No) encoded

(Eb/No) coded For convolutional coding, the coding gain is given as,

A = rdf /2 Here „r‟ is the code rate And „df is the free distance.

13. What is convolution code?

Fixed number of input bits is stored in the shift register & they are combined with the help of mod 2 adders. This operation is equivalent to binary convolution coding.

14. What is meant by syndrome of linear block code?

The non zero output of the produce YHT is called syndrome & it is used to detect errors in y. Syndrome is denoted by S & given as, S=YHT

15. What are the advantages of convolutional codes?

Advantages:

1. The decoding delay is small in convolutional codes since they operate o smaller blocks of data.

2. The storage hardware required by convolutional decoder is less since the block sizes are smaller.

Disadvantages:

1. Convolutional codes are difficult to analyze since their analysis is complex.

2. Convolutional codes are not developed much as compared to block codes.

16. Define sates of encoder?

The constraint length of the given convolutional encoder is K=2. Its rate is ½ means for single message bit input, two bits x1 and x2 are encoded at the output. „S1‟ represents the input message bit and S2 stores the previous message bit. Since only one previous message bit is stored, this encoder can have states depending upon this stored message bit. Let‟s represent, S2 = 0 state „a‟ and S2 = 1 state „b‟

17. Compare between code tree and trellis diagram?

Code tree Trellis diagram

1Code tree indicates flow of the coded signal along the nodes of the tree.Trellis diagram indicates transitions from current to next states.

2.Code tree is lengthy way of representing coding process. Code trellis diagram is shorter or compact way of representing coding process.

18. Write the futures of BCH Codes?

BCH codes are most extensive and powerful error correcting cyclic codes. The decoding of BCH codes is comparatively simpler. The decoding schemes of BCH codes can be implemented on digital computer. Because of software implementation of decoding schemes they are quite flexible compared to hardware implementation of other schemes.

19. What is Golay codes?

Golay code is the (23,12) cyclic code whose generating polynomial is,

G(p) = p11+p9+p7+p6+p5+p+1

This code has minimum distance of dmin = 7. This code can correct upto 3 errors. But Golay code cannot be generalized to other combinations of n and k.

20. Define constraint length in convolutional codes?

Constraint length is the number of shifts over which the single message bit can influence the encoder output. This expressed in terms of message bits.

UNIT – 5: SPREAD SPECTRUM MODULATION

1. Define spread spectrum communication

Ans: in spread spectrum communication the transmitted data sequence occupies much more band width than the minimum required bandwidth. Special code is used to aspread the bandwidth of the message signal. This special code is known only to authorized receiver. Hence the transmitted signal is received only by authorized receiver. Unwanted receivers cannot receive the signal. Thus spread spectrum communication provides secure transmission of data.

2. What is pseudo noise sequence ?

Ans. Pseudo noise sequence is a noise like high frequency signal. The sequence is not completely random, but it is generated by well defined logic. Hence it is called „pseudo‟ noise sequence. Pseudo noise sequences are used in spread spectrum communication for spreading message signals.

3. What is direct sequence spread spectrum modulation

Ans. In direct sequence spread spectrum modulation, the pseudo-noise sequence is directly modulated with data sequence. Thus pseudo-noise sequence acts as high frequency carrier and data sequence acts as low frequency modulating signal. The pseudo-noise sequence and data sequence are applied to a product modulator. The output of product modulator can be used directly or it can further generate BPSK signal for long distance communication.

4. What is frequency hap spread spectrum modulation?

Ans. In frequency hop spread spectrum, the data is transmitted in different frequency slots. These frequency slots are selected with the help of pseudo-noise sequence. Selection of frequency slots is called frequency hopping. The bandwidth of frequency hop spread spectrum is very much large compared to direct sequences spread spectrum. Frequency hop spread spectrum is of two types: I) slow frequency hopping and ii) fast frequency hopping.

5. What is processing gain?

Ans: processing gain is given as,

Bandwidth of spreaded signal

Processing gain (PG) = Bandwidth of unspreaded signal

For DS-SS, processing gain is given as Tb PG = Tb Here Tb is bit period of data sequence and Tc is bit period of PN sequence.

And for FH-SS, processing gain is given as, PG = 2t Here ‘t’ is the number of bits in PN

6. What is jamming margin ?

Ans. Jamming margin is the ratio of average power of interference (J) to average

power of data signal (Ps) i.e., J

Jamming margin = —–Ps

It is also given mathematically as, J Eb

— PG db ——–

Ps No dB

7. State four applications of spread spectrum.

Ans.

I) Spread spectrum has the ability to resist the effect of intentional jamming

ii) Spread spectrum is used in mobile communications. This is because the spread

spectrum signal has the ability to resist the effects of multipath fading.

iii) Spread spectrum communication are used in distance measurement.

iv) Spread spectrum communications are secure. This secrecy capability of spread spectrum is used in military as well as in many commercial applications.

8. When is the PN sequence called as maximal length sequence?

Ans. When the PN sequence has the length of 2m – 1, it is called maximal length sequence.

9. What is meant by processing gain of DS spread spectrum system?

Ans. The processing gain of DS-SS is given as the ratio of bit period to chip

period. Tb

P.G. = —- Tc

10. What is the period of the maximal length sequence generated using 3

bit shift register.

Ans. Here m=3, The period is given as,

N = 2n- 1 = 2(3)– 1 = 7 bits.

11. What are the application of spread spectrum modulation.

Ans. Application

(i) Multipath access capability.

(ii) Multipath protection in mobile communication

(iii) Low probability intercept.

(iv) Interference rejection.

(v) To provide antijam capability.

(vi) Distance measurements.

(vii) Selective calling.

12. Define frequency hopping.

Ans. Definition : The frequency of the carrier is changed (hopped) according

to bits of PN sequence.

Types: I) Slow frequency hopping

II) Fast frequency hopping

13. What are the Advantages of DS-SS system.

Ans.

1. This system has best noise and antijam performance.

2. Unrecognized receivers find it most difficult to detect direct sequence

signals.

3. It has best discrimination against multipath signals.

14.What are the Disadvantages of DS-SS system.

Ans.

1. It required wideband channel with small phase distortion.

2. It has long acquisition time.

3. The pseudo –noise generator should generate sequence at high rates.

4. This system is distance relative.

15. What are the Advantages of FH-SS System

Ans.

1. These systems bandwidth (spreads) are very large.

2. They can be programmed to avoid some portions of the spectrum.

3. They have relatively short acquisition time.

4. The distance effect is less.

16. What are the Disadvantages of FH-SS System

Ans.

1. Those systems need complex frequency synthesizers.

2. They are not useful for range and range-rate measurement.

3. They need error correction.

17. Define synchronization in Spread Spectrum Systems

Spread spectrum systems are essentially synchronous. The pseudo noise sequences generated at the receiver and the transmitted must be same and locked t each other so that the transmitted signal can be extracted. The synchronization of the spread spectrum systems can be considered in two parts : Acquisition and tracking.

18. Comparison between DS-SS and FH-SS
Parameter Direct sequence spread spectrum

Frequency hop spread spectrum

1 Definition PN sequence of large bandwidth is mulitplied with narrow band data signal . Data bits are transmitted in different frequency slots which are changed by PN sequence.

2 Effect of distance

This system is distance relative Effect of distance is less in this system

3 Acquisition time Acquisition time is long Acquisition time is short.

19. What are the Application of Direct Sequence Spread Spectrum Signals

Anti jamming with the help of direct sequence spread spectrum signals. Low delectability signal transmission or low probability intercept. Code division multiple access with direct sequence SS ( SSMA)

CS2204 Analog and Digital Communication question paper download


B.E/B.Tech. DEGREE EXAMINATION, APRIL/MAY 2010
Third Semester
Computer Science and Engineering
CS2204 - ANALOG AND DIGITAL COMMUNICATION
(Regulation 2008)
Time: Three hours Maximum: 100 Marks
Answer ALL Questions
PART A- (10 x 2 = 20 Marks)

1. In a Amplitude modulation system, the carrier frequency is Fc= 100KHz. The maximum frequency of the signal is 5 KHz. Determine the lower and upper side bonds and the bond width of AM signal.
2. The maximum frequency deviation in an FM is 10 KHz and signal frequency is 10 KHz. Find out the bandwidth using Carson's rule and the modulation index.
3. Draw the ASK and FSK signals for the binary signal s(t)= 1011001.
4. What are the advantages of QPSK?
5. Define Nyquist sampling theorem.
6. For the signal m(t)= 3 cos 500^t + 4 sin 1000^t, Determine the Nyquist sampling rate.
7. What is meant by ASCII code?
8. Which error detection technique is simple and which one is more reliable?
9. What are the applications of spread spectrum modulation?
10. Design processing gain in spread spectrum modulation.
PART B- (5 x 16 = 80 Marks)

11. (a) (i) Distinguish between FM and PM by giving its mathematical analysis. (8 Marks)
(ii) Derive the relationship between the voltage amplitudes of the side band frequencies and the carrier and draw the frequency spectrum. (8 Marks)
(Or)
(b) (i) Discuss about the sets of side bands produced when a carrier is frequency modulated by a single frequency sinusoid. (8 Marks)
(ii) In an AM modulator, 500 KHz carrier of amplitude 20 V is modulated by 10 KHz modulating signal which causes a change in the output wave of +_ 7.5 V. Determine:
(1) Upper and lower side band frequencies
(2) Modulation Index
(3) Peak amplitude of upper and lower side frequency
(4) Maximum and minimum amplitudes of envelope. (8 Marks)

12. (a) What is known as Binary phase shift keying? Discuss in detail the BPSK transmitter and Receiver and also obtain the minimum double sided Nyquist bandwidth. (16 Marks)
(Or)
(b) (i) Illustrate the concept of 8 QAM transmitter with the truth table. (8 Marks)
(ii) What is the need for carrier Recovery? Explain the Costas loop method of carrier recovery. (8 Marks)

13. (a) (i) What is called companding? Briefly discuss the Analog companding. (8 Marks)
(ii) Discuss about the causes of ISI. (8 Marks)
(Or)
(b) (i) Explain in detail the Delta modulation transmitter and Receiver. (10 Marks)
(ii) Discuss the draw backs of delta modulation and explain the significance of adaptive delta modulator. (6 Marks)

14. (a) (i) Describe the most common error detection techniques. (12 Marks)
(ii) Discuss the function of a data modem. (4 Marks)
(Or)
(b) (i) Explain in detail the characteristics of IEEE 488 Bus. (10 Marks)
(ii) Briefly explain the three methods of error connection. (6 Marks)

15. (a) (i) What is a Pseudo noise sequence? What are the properties of Pseudo noise sequence? (8 Marks)
(ii) Describe the application of CDMA in wireless communication system. (8 Marks)
(Or)
(b) (i) With a block diagram explain, DS spread spectrum with coherent binary PSK. (10 Marks)
(ii) Explain the near- far problem in spread spectrum modulation? (6 Marks)
Monday 3 December 2012

Tamil Nadu state Apex co-operative bank hall ticket download


The Tamil Nadu state Apex co-operative bank examination is going to held on december 9, 2012. The candidates who were are all applied before november 23, 2012 can download their hall ticket  at
TNSC bank hall ticket download

EC 2201 Electrical Engineering question bank download


UNIT - I
PART - A

  1. Define electric motor.
  2. Define electric generator.
  3. Define excitation.
  4. What are the methods of excitation?
  5. What do you mean by self excited machine?
  6. What do you mean by separately excited machine?
  7. State the function of commutator.
  8. What do you mean by commutation?
  9. What is the purpose of brushes?
  10. By which material yoke can be manufactured?
  11. Why the brushes are made upon carbon?
  12. What are the types of self excited generator?
  13. Define shunt generator.
  14. Define series generator.
  15. Define compound generator.
  16. Draw the open circuit characteristics of dc separately excited generator.
  17. What do you mean by magnetization curve?
  18. Draw the load characteristics of separately excited dc generator.
  19. Draw the characteristics for DC shunt generator.
  20. Draw the characteristics of DC series generator.
  21. Draw the characteristics of DC compound generator.
  22. What is the principle of operation of dc generator?
  23. Write down faradey's law of electromagnetic induction.
  24. What is the principle of operation of DC motor?
  25. State lenz's law.
  26. How Lenz's law is helpful for the operation of DC motor?
  27. Write the significance of back e.m.f.
  28. Define back e.m.f.
  29. Write the e.m.f. equation of DC generator.
  30. Write down the voltage equation of DC motor.
  31. Write the torque equation of DC motor.
  32. Draw the characteristics of DC shunt motor.
  33. Draw the characteristics of DC series motor.
  34. Draw the characteristics of DC compound motor.
  35. Differentiate differentially compound and cumulatively compound motor.
  36. What are the applications of DC shunt motor?
  37. What are the applications of DC series motor?
  38. What are the applications of DC compound motor?
  39. Why shunt motor is called as constant speed machine?
  40. Why starter is needed in DC motor?
  41. What is the advantage of 4 point starter over 3 point starter?
  42. State the function of no volt coil.
  43. State the function of over load release.
  44. What is the advantage of conducting Swin-burne's test?
  45. Draw the diagram of ward-leanord system of speed control.
  46. By which method, we can control the speed of the motor below the base speed?
  47. By which method, the speed control of the DC motor be above the base speed?
  48. What are the various methods of speed control of DC motor?
  49. Differentiate armature voltage control method and field flux control method.
  50. What do you mean by brake test?
PART - B
  1. Explain in detail the constructional details of DC machine.
  2. Derive the e.m.f. equation (8)
  3. Draw and explain the characteristics of DC generator.
  4. Derive the torque equation /
  5. Write down the significance of back e.m.f.
  6. Write down the principle of operation of DC motor.
  7. Draw and explain the characteristics of DC motor.
  8. Draw and explain 3 point starter.
  9. What is the draw back in 3 point starter and how it is overcome in 4 point starter?
  10. Explains the procedure of swin burne's test.
  11. Draw and explain the speed control methods of DC shunt motor.
  12. Explain in detail about the ward-leonard system of speed control of DC motor.


UNIT - II
PART - A

  1. State the principle of operation of transformer.
  2. What are the types of transformer according to its construction?
  3. Differentiate core type transformer and shell type transformer.
  4. Write down the e.m.f equation of transformer.
  5. Write down the transformation ratio.
  6. Define magneting current component.
  7. Define working current component.
  8. Draw the vector diagram of transformer an no load.
  9. How the resistance of the secondary be referred in the primary?
  10. Draw the approximate equivalent circuit of the transformer.
  11. Draw the vector diagram for the transformer under resistive load.
  12. Draw the vector diagram for the transformer under inductive load.
  13. Draw the vector diagram of the transformer under comparative load.
  14. When the transformer is said to be ideal?
  15. Define voltage regulation of transformer.
  16. Define voltage regulation up.
  17. Define voltage regulation down.
  18. By conducting no load test, which losses can be found out?
  19. Which losses can be found out by conducting short circuit test?
  20. What are the tests to be conducted on the transformer?
PART - B
  1. Derive the e.m.f. equation of transformer.
  2. Explain in detail about the transformer on no load.
  3. Draw and explain ideal transformer. Draw its vector diagram.
  4. Obtain the equivalent circuit of the transformer by conducting suitable tests.
  5. Draw and explain in detail about the transformer an load.
  6. Derive the regulation formula for the transformer.
  7. Explain in detail about the testing procedures for the transformer.



UNIT - III
PART - A

  1. Write the working principle of induction motor.
  2. How RMF is produced with the help of 3 phase supply?
  3. Define slip.
  4. Write the working principle of 3f induction motor.
  5. Why 3f induction motor is called as rotating transformer?
  6. Can the rotor speed of induction motor be synchronous speed?
  7. What are the types of induction motor?
  8. Write down the torque equation of 3f induction motor.
  9. Draw the slip-torque characteristics.
  10. Draw the speed-torque characteristics.
  11. State the relation between P2, Pc and Pm.
  12. Draw the Power flow diagram of 3 phase induction motor.
  13. Draw the equivalent circuit of 3 f induction motor.
  14. Why starter is necessary in AC induction motor?
  15. What are the types of starters available to start 3 f induction motor?
  16. Why single phase induction motor is not self starting?
  17. How single phase induction motor is made to start?
  18. How the rotor is classified in 3f induction motor?
  19. How Rmf is produced in the stator of the induction motor
  20. What is Rmf?
PART - B
1. Explain the constructional details of 3 f induction motor.
2. How Rmf is produced with the help of 3 f AC supply?
3. Explain in detail the principle of operations of 3 phase induction motor.
4. Explain the procedure to obtain the equivalent circuit of 3 phase induction motor.
5. Derive the torque equation of 3 phase induction motor.
6. Draw and explain the characteristics of 3 phase induction motor.
7. Explain in detail about (i) Star-delta starter (ii) Auto transformer starter (iii) DOL starter.
8. Write short notes on single phase transformer.
9. Why single phase induction motor is not self starting? Explain the methods available to start the motor.
10. Write short notes on speed control of 3 f induction motor.


UNIT IV
PART - A

  1. What are the types of synchronous machines?
  2. What is the basic principle of operation 3f alternator?
  3. Why stationary armature is there in 3f alternator?
  4. Write down the e.m.f. equation of alternator.
  5. What are the types of 3 f alternator?
  6. Define voltage regulation of alternator?
  7. What are the methods to find out voltage regulation?
  8. Why synchronous impedance methods is called as pessimistic method?
  9. What are the methods to find out voltage regulation
  10. Why synchronous impedance method is called as pessimistic method?
  11. Define synchronous impedance.
  12. Why ampere-turns method is called as optimistic method?
  13. Draw the phasor diagram for voltage regulation in synchronous impedance method.
  14. How emf is induced in brushless alternator?
  15. What is the function of rotating diode assembly in brush can alternator?
  16. What do you mean by brushless excitation?
  17. How reluctance motor is running?
  18. What is the operating principle of hysteresis motor?
  19. What are the types of stepper motor?
  20. How do you find step angle in stepper motor?
  21. Give the application of stepper motor.
PART - B
  1. Derive the emf equation of alternator.
  2. Write down the procedure of finding voltage regulation of alternator using synchronous impedance method.
  3. Write down the procedure for finding voltage regulation using ampere-turns method.
  4. Explain in detail the construction of synchronous machine.
  5. Write short notes on (i) Brushless alternator (ii) Reluctance motor (iii) Hysteresis motor (iv) Stepper motor.
UNIT - V
PART - A

  1. What are the various sources of electric power generating system?
  2. What is the purpose of step up transformer in electrical power system?
  3. What do you mean by carona loss?
  4. What is meant by Ferranti effect?
  5. What are the advantages of AC transmission?
  6. What are the advantages of DC transmission?
  7. What are the types of distribution system?
  8. What is EHUAC?
  9. Define EHUDC.
  10. What is the purpose of circuit breakers.
  11. Define insulators.
  12. Why the transmission is done through under ground cable?
  13. What are the advantages of under ground cables?
  14. What are the types of under ground cables?
  15. What are types of insulators?
  16. What is pin insulator? Where it is used?
  17. What is stay insulator? Where it is used?
  18. What are the purposes of insulator?
  19. Define service mains.
  20. Define grid.
  21. Differentiate feeders and distributors.
PART - B
  1. Explain in detail, the single line diagram of electrical power system.
  2. Explain in detail the various types of transmission and distribution systems.
  3. Distinguish EHUAC and EHUDC systems.
  4. Explain in detail the substation lay out.
  5. Write short notes as (i) Insulators (ii) cables