RGPV – B.Tech CSE 5th Semester – All Question Papers PDF Download

RGPV – B.Tech CSE 5th Semester – All Question Papers PDF Download – 501 – Theory of computation, 502 – Database Management System, 503 – Pattern Recognition, 503 – Data Analytics, 503 – Cyber Security, 504 – Internet and Web Technology.

Theory of computationImportant Topics
Note: The topics repeated/asked over multiple years are bold marked.
Nov-2022Regular expression for DFA -|- DFA for detecting 1001 sequence -|- NFA with language over alphabet
-|- Convert NFA to DFA -|- Regular grammar -|- Context free grammar
-|- Non-deterministic pushdown automata -|- Turing machine -|- Corresponding CFG for NPDA
-|- Deterministic PDA -|- NPDA that simulates with grammar -|- Context free language
-|- Recursive language
May-2023Convert moore machine to mealy -|- DFAs -|- Regular expression -|- Arden’s theorem and pumping lemma -|- Ambiguity -|- CFG -|- Context free grammar -|- DPDA and NPDA
-|- Recursively enumerable language and decidability -|- Push down automata -|- Halting problem
-|- Turing machine -|- Chomsky normal form -|- 2 way DFA
Nov-2023DFA to accept string of 0s and 1s -|- Context free grammar -|- Regular expression from finite automata
-|- Ambiguous grammar -|- Equivalent FA for regular expression -|- CFG grammar
-|- Construct PDA accepting the language -|- Construct PDA -|- Context free grammar in 4 tuple
-|- Recursive and recursively enumerable language -|- Halting problem of TM is undecidable meaning
-|- Post correspondence problem -|- Halting problem -|- Closure property of regular grammar
-|- Turing machine

Subject CodeYearMonthSubject
501NOV2019CS-501-THEORY-OF-COMPUTATION-NOV-2019
501JUN2020CS-501-THEORY-OF-COMPUTATION-JUN-2020
501DEC2020CS-501-THEORY-OF-COMPUTATION-DEC-2020
501NOV2022CS-501-THEORY-OF-COMPUTATION-NOV-2022
501MAY2023CS-501-THEORY-OF-COMPUTATION-MAY-2023
501NOV2023CS-501-THEORY-OF-COMPUTATION-NOV-2023
Database Management SystemImportant Topics
Note: The topics repeated/asked over multiple years are bold marked.
Nov-2022Advantage to design and use a DBMS -|- Major steps in query optimization
-|- various exception handling mechanisms in database platforms -|- Functional dependencies
-|- Oracle application express -|- Specialization and generalization -|- Temporal and multimedia databases -|- Triggers -|- Plus many query writing questions based on data provided
May-2023DDL and DML -|- The buffer manager -|- The data model -|- Structure of a DBMS
-|- Impact of OS upgradation on DBMS -|- ER diagram to relational tables -|- Draw a ER diagram
-|- Anomaly that may arise during insert, delete and updating a record
-|- Major steps in query optimization -|- Sigma cascade operation -|- Functional dependencies
-|- Concept of recoverability in DBMS -|- Concurrent schedule and equivalent serial schedule
-|- Two-phase locking protocol -|- Oracle exception handling mechanism -|- Functions of DBA
-|- SQL aggregate functions -|- Distributed databases
-|- Plus many query writing questions based on data provided
Subject CodeYearMonthSubject
502NOV2019CS-502-DATABASE-MANAGEMENT-SYSTEM-NOV-2019
502JUN2020CS-502-DATABASE-MANAGEMENT-SYSTEMS-JUN-2020
502DEC2020CS-502-DATABASE-MANAGEMENT-SYSTEMS-DEC-2020
502NOV2022CS-502-DATA-MANAGEMENT-SYSTEMS-NOV-2022
502NOV2023CS-502-DATABASE-MANAGEMENT-SYSTEMS-NOV-2023
Pattern RecognitionImportant Topics
Note: The topics repeated/asked over multiple years are bold marked.
Jun-2020Law of total probability -|- K-nearest neighbour method – KNN estimation and KNN rule
-|- Fuzzy decision making -|- Different components of learning system -|- Pattern classification
-|- Major paradigms of machine learning -|- Unsupervised learning algorithm -|- Classification and clustering -|- Dice probability question -|- Maximum likelihood estimation
-|- Principal component analysis for dimension reduction -|- Hierarchical clustering
-|- Gaussian mixture model -|- Performance of a classifier -|- Perzen window -|- Density estimation
-|- Learning -|- Adaptation -|- Cluster validation
Dec-2020Pattern recognition -|- Learning and adaptation -|- Gaussian mixture model
-|- Evaluate performance of a classifier -|- Discriminant function -|- Fuzzy classes
-|- Fuzzy classification process -|- Supervised and unsupervised learning -|- Dice probability question
-|- Normal distribution -|- Hidden markov model (HMM) -|- Mean and covariance -|- Dimension reduction
-|- k-nearest neighbour estimation -|- Parzen window, density estimation -|- Clustering
-|- Chi-square test -|- Forward algorithm -|- Backward algorithm -|- Maximum likelihood estimation
Nov-2023Design principles of pattern recognition system -|- Supervised and unsupervised learning -|- Random forest -|- Clustering -|- Metric spaces -|- K-nearest neighbour method – KNN estimation and KNN rule
-|- Normalization -|- Cluster validation -|- Clustering techniques
-|- Different paradigms of pattern recognition -|- Various types of feature extraction
-|- Branch and bound algorithm -|- Forward selection algorithm -|- Neuro-fuzzy and it’s techniques
-|- Rules of histogram -|- Data sets for pattern -|- Training set -|- Classifier and variants -|- FCM
Subject CodeYearMonthSubject
503JUN2020CS-503-B-PATTERN-RECOGNITION-JUN-2020
503DEC2020CS-503-B-PATTERN-RECOGNITION-DEC-2020
503NOV2023CS-503-B-PATTERN-RECOGNITION-NOV-2023
Data AnalyticsImportant Topics
Note: The topics repeated/asked over multiple years are bold marked.
Jun-2020Big data and it’s characteristics -|- Apache Pig and Map reduce -|- Replication and scaling features of MongoDB -|- Goals of HDFS -|- Term frequency and inverse document frequency -|- 5P’s of Big data
-|- H Base and it’s storing mechanism -|- Concept of metastore in Hive -|- Data extraction for data storage
-|- Map Reduce programming model -|- Hadoop architecture and it’s components -|- Zoo Keeper and it’s benefits -|- Hive QL DDL command with syntax -|- Installing and running Hive -|- Pig latin
-|- Information management -|- Sharding process -|- SPARK -|- 4 V’s of Big Data
Dec-2020Big Data and it’s benefits -|- CRUD operations in Mongo DB -|- Inter and trans fire wall analytics
-|- Data storage in Hadoop Distributed File System (HDFS) -|- 4 V’s of Big Data
-|- Architecture and features of Hive -|- Justify: SPARK is faster than map reduce -|- Apache Pig and it’s need
-|- Big data analytics in weather forecasting -|- Create collection in MongoDB -|- Pig Latin
-|- Explain working of Hive -|- Indexing in Mongo DB -|- Aggregation in Mongo DB
-|- Capacity scheduler in Map Reduce -|- 5P’s of Big Data -|- Metastore in Hive -|- Regression ANOVA
-|- Term frequency
Nov-2023Predictive analytics -|- Inter- and trans-firewall -|- Information management -|- Crowd sourcing analytics
-|- Social media analytics -|- Various stages of big data analytics life cycle -|- Map reduce
-|- Hadoop – core components, role in big data analysis -|- Structure of HDFS
-|- Hadoop for processing big data -|- Distributed and parallel computing challenges -|- Hadoop ecosystem
-|- Big data processing technologies -|- Pig data flow -|- Architecture of APACHE HIVE
Subject CodeYearMonthSubject
503JUN2020CS-503-A-DATA-ANALYTICS-JUN-2020
503DEC2020CS-503-A-DATA-ANALYTICS-DEC-2020
503NOV2023CS-503-A-DATA-ANALYTICS-NOV-2023
Cyber SecurityImportant Topics
Note: The topics repeated/asked over multiple years are bold marked.
Dec-2020Cyber crime -|- Cyber crime classification -|- Types of phishing techniques -|- Intellectual property issues
-|- Attack on wireless network perform -|- Logic bomb -|- Worms -|- Spyware -|- IT ACT 2000
-|- Cyber terrorism -|- Life-cycle phases of virus -|- Role of digital signature in digital evidence
-|- Trojan horses -|- Salami attack -|- Security policies and their review process -|- Information security
-|- DOS and DDOS attack -|- E-mail spoofing -|- Software piracy -|- Trapdoors -|- Key loggers -|- Spamming
Nov-2022Viruses vs Worms -|- Password-based authentication system -|- Spoofing and session hijacking
-|- Issues and challenges of cybercrime -|- Power and characteristics of cyber terrorism
-|- Digital signatures and certificates in formation of SSL/TLS based sessions -|- Phishing and pharming assaults -|- Strategies to tackle cyber crime and trends -|- Electronic signature certificate
-|- Document object model (DOM) in web security -|- Cross-window attack
-|- Role of cookies in enhancing threats -|- IT ACT 2000 -|- Buffer overflow attack
-|- Importance of TLS handshaking
Nov-2023Various modes of committing cyber crime -|- Internet time theft in cybercrime -|- Salami attack
-|- Different layers of cyber security -|- Common cyber attacks to damage network
-|- Session hijacking and spoofing -|- How to prevent session hijacking attacks
-|- Different activities under the jurisdiction of cybercrime laws -|- Monetary penalties under IT ACT 2000
-|- Evidences required for proving the electronic agreements
-|- Various techniques for proofing evidence of digital record
-|- Role of proxy servers and anonymizers in phishing -|- Trojan horses vs backdoors
Subject CodeYearMonthSubject
503NOV2019CS-503-C-CYBER-SECURITY-NOV-2019
503JUN2020CS-503-C-CYBER-SECURITY-JUN-2020
503DEC2020CS-503-C-CYBER-SECURITY-DEC-2020
503NOV2022CS-503-C-CYBER-SECURITY-NOV-2022
503NOV2023CS-503-C-CYBER-SECURITY-NOV-2023
Internet and Web TechnologyImportant Topics
Note: The topics repeated/asked over multiple years are bold marked.
Dec-2020XML and it’s attributed -|- Testing and maintenance of website -|- Javascript to display current date and time -|- Design homepage -|- Embedded style sheet -|- Document object of java script
-|- CSS and it’s advantages -|- Uploading of web page using web page editors
-|- Various types of lists that can be created in HTML
-|- HTML document to collect hammer and phone numbers -|- Data binding in DHTML
-|- Web page and it’s types -|- DTD -|- Radio buttons and check boxes object in Java script -|- Web server
-|- Call padding -|- Cell spacing -|- HTML form -|- Inheritance
Nov-2022Web browser and protocols -|- Concept of web designing -|- Bandwidth -|- Cache and it’s types
-|- HTML tags: Anchor, Image, Table tags -|- Concept of frames -|- Different list tag elements in HTML
-|- Java script – functions, form validation -|- XHTML elements and attributes
-|- Javascript program to convert height from cm to inches -|- Cookies and sessions in PHP
-|- Difference between GET and POST methods -|- Control structures in PHP
-|- MYSQL database connectivity program using PHP -|- PHPmyadmin -|- Database bugs
-|- List the databases tables in PHP -|- Browser architecture -|- Features of CSS3 -|- Form processing
Nov-2023Various types of web design issues -|- Steps in planning and publishing a website
-|- Impact of Web 2.0 in web development -|- HTML vs XHTML
-|- Properties and methods of objects in JavaScript -|- DOM API
-|- How CSS improves web page and website design layout -|- DTD vs XML schema -|- XSL transformation -|- Form handling with GET and POST methods in PHP -|- Sessions vs cookies in PHP
-|- PHP code for querying a database -|- Shopping cart application using PHP and MySQL
-|- PHPmyadmin -|- Database bugs -|- Client-side scripting -|- Server-side scripting
-|- Features of HTML5 -|- HTTP protocol
Subject CodeYearMonthSubject
504NOV2019CS-504-A-INTERNET-AND-WEB-TECHNOLOGY-NOV-2019
504JUN2020CS-504-A-INTERNET-AND-WEB-TECHNOLOGY-JUN-2020
504DEC2020CS-504-A-INTERNET-AND-WEB-TECHNOLOGY-DEC-2020
504NOV2022CS-504-A-INTERNET-AND-WEB-TECHNOLOGY-NOV-2022
504NOV2023CS-504-A-INTERNET-AND-WEB-TECHNOLOGY-NOV-2023

Leave a Comment