Data Science and Cyber Security
Data Science and Cyber Security
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Justify A + AB = A using K-map. CO E 1
1
2. Write the complement expression for (AB’+C)D’+E. CO A 1
1
3. CO R 1
State the truth table of 2:4 Decoder.
2
4. Indicate two advantages of Encoder. CO U 1
2
5. Differentiate between Synchronous and Asynchronous counter. CO A 1
3 n
6. Sketch a Moore machine state diagram. CO A 1
3
7. State the acronym of CMOS. CO R 1
4
8. Define Noise Margin. CO R 1
4
9. CO A 1
Differentiate between PAL with PLA
5 n
10 Write the Verilog HDL code for NAND gate. CO C 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 Predict the equivalent simplified Boolean expression for CO A 3
. Y= (A+B) (A’+C) (B’+C’) 1
12 CO A 3
Sketch the Octal to Binary encoder logic circuit diagram.
. 2
13 Design a 2-bit asynchronous counter using JK-FF. CO C 3
. 3
14 Construct the CMOS NOR gate. CO A 3
. 4
15 CO U 3
Describe vertical and horizontal long lines in FPGA.
. 5
16 Write a data flow model description for the given expression using CO C 3
. Verilog HDL.Y = Ā B+ Ā B̄+ A B̄ 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Predict the simplified Boolean expression of the given CO A 8
. . F(w, x, y, z) = Σ(1, 3, 7, 11, 15) + d(0, 2, 5) using Karnaugh map. 1
b Design OR gate using NOR Logic gates. CO C 4
. 1
20 Sketch the TTL NAND gate circuit with Totem pole output and CO A 1
. explain its operation. 4 2
21 Predict the simplified SOP for the following and implement using: CO A 1
. F(A, B, C, D) = ∑ (3, 4, 6, 7, 11, 12, 13, 14, 15) 5 2
a) PROM.
b) PAL.
COURSE OUTCOMES
CO1 Illustrate the basic postulates of Boolean algebra and demonstrate the operation of logic gates.
CO2 Choose an optimal method for simplification of Boolean expressions
CO3 Differentiate various combinational logic circuits.
CO4 Design and compare various types of sequential logic circuits.
CO5 Identify different logic families; classify memory devices, and identify methods for implementing
logic circuits.
CO6 Design simple logic circuits using HDL code.
Assessment Pattern as per Bloom’s Level
CO / BL R U A An E C Total
CO1 - - 16 - 1 4 21
CO2 1 1 9 - - 6 17
CO3 - - 1 1 - 15 17
CO4 2 - 15 - - 4 21
CO5 - 3 28 1 - - 32
CO6 - - 12 - - 4 16
124
END SEMESTER EXAMINATION – NOV / DEC 2024
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the number of cells in an n variable K map. CO U 1
1
2. Define the primary purpose of binary adder. CO R 1
1
3. List the two types of triggering. CO R 1
2
4. Define the purpose of state minimization. CO U 1
2
5. Name any two types of addressing mode. CO R 1
3
6. State the function of an Instruction register. CO R 1
3
7. Name two solutions to handle data hazards. CO R 1
4
8. State the benefits of pipelining. CO R 1
4
9. Define direct memory access (DMA). CO R 1
5
10 Name any one advantage of multiprocessing. CO R 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 Apply Boolean laws and simplify the following expression: CO A 3
. AB+AB’+A’B. 1
12 Compare Synchronous with asynchronous counters. CO U 3
. 2
13 Explain the R-type instruction encoding format with a neat diagram. CO U 3
. 3
14 Illustrate the purpose of pipeline stalling with an example for Data CO A 3
. hazard. 4
15 Describe the function of cache memory. CO U 3
. 5
16 Compare VLIW with superscalar architectures. CO U 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Apply K map technique to minimize the given Boolean expression: CO A 6
. . F(A, B, C, D) = M(6, 7, 8, 9) + d(12, 13, 14, 15). 1
b Construct a circuit to compare two 4-bit binary numbers. CO A 6
. 1
COURSE OUTCOMES
CO1 Describe a variety of combinational circuits, such as binary adders, subtractors, encoders,decoders.
CO2 Illustrate the concepts of sequential logic, including flip-flops, clocked sequential circuits, and state machines.
CO3 Describe the fundamental principles of computer architecture and organization, following the Von Neumann
architecture model.
CO4 Apply critical thinking to assess the impact of different architectural choices on system performance and
functionality.
CO5 Acquire design skills by creating and optimizing digital circuits to meet specified design requirements and
constraints.
CO6 Collaborate in teams to tackle complex design projects and assignments, fostering teamwork and peer learning
Q.
Questions CO BL M
No.
PART – A (10 X 1 = 10 MARKS)
1. List any four data types in C. CO1 R 1
2. Name the input and output functions used in the C programs. CO1 R 1
3. Predict the output of the following code: CO2 U 1
#include <stdio.h>
int main()
{
printf("Size of char: %lu byte\n", sizeof(char));
return 0;
}
4. Identify the value of num[4] in the following line of code: CO2 U 1
int num[ ] = {11, 34, 56, 67, 88, 94, 56};
5. Predict the output of the following code: CO3 U 1
#include <stdio.h>
int main() {
int number = 100;
if (number < 20) {
printf("The number is less than 20.\n");
} else if (number = = 20) {
printf("The number is exactly 20.\n");
} else {
printf("The number is greater than 20.\n");
}
return 0;
}
6. Predict the output of the following code: CO3 U 1
#include <stdio.h>
int main() {
int x = 4;
switch (x) {
case 4:
x += 5;
printf("%d ", x);
case 5:
x += 2;
printf("%d ", x);
break;
default:
printf("Default ");
}
return 0;
}
7. How quicksort is different from selection sort? CO4 U 1
8. List the steps involved in a linear search. CO4 R 1
9. Predict the output of the following code: CO5 U 1
#include <stdio.h>
#include <string.h>
int main() {
char str[ ] = "Hello, World!";
printf("Length of the string is: %lu\n", strlen(str));
return 0;
}
10. Identify the nature of the function call given in the example below. CO6 U 1
10 + sum(9)
10 + ( 9 + sum(8) )
10 + ( 9 + ( 8 + sum(7) ) )
PART – B (6 X 3 = 18 MARKS)
11. List the different format specifiers in C and provide an example for each. CO1 R 3
12. Write a C program to implement the following arithmetic expression: CO2 A 3
x = (a+b)*c.
13. State the use of a switch-case statement with an example. CO3 R 3
14. List any three advantages of using binary search over linear search. CO4 R 3
15. Write a simple program to determine whether a number is odd or even, using a CO5 A 3
function.
16. Differentiate between pointer and regular variable in C. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the functions of primary and secondary storage with an example. CO1 U 6
b. Explain the basic structure of a C program, with an example. CO1 U 6
18. a. Write a C program to find the smallest and largest of three given numbers. CO2 A 6
b. Write a C program to find the sum and average of the elements in an array. CO2 A 6
Read the number of elements and the individual values in the array from the
user.
19. a. Write a C program to calculate the sum of first n odd integers (i.e., CO3 A 6
1+3+5+ …+2 n−1) using looping statement.
b. Write a C program that generates the pattern below. CO3 A 6
*
**
***
****
*****
20. Illustrate a C program that implements the bubble sort algorithm. Analyze CO4 An 12
and demonstrate the steps required to sort the following dataset in ascending
order: 10, 30, 5, 20, 9, 8.
21. a. Illustrate a C program that swaps two variables using both call by value and CO5 An 8
call by reference. Analyze the implications of each approach on the variable
b. Write a C program that uses an inline function to perform the addition of two CO5 A 4
numbers.
22. a. Write a C program to print all numbers divisible by 3 between 1 and N. CO3 A 6
b. Write a C program to find the length of two strings, compare them, and CO5 A 6
concatenate them using string functions.
23. a. Sketch the flowchart steps and write an algorithm to convert a temperature CO1 U 6
from Celsius to Fahrenheit, based on user input, where F = (9/5)*C + 32.
b. Write a C program to demonstrate the use of relational operators to compare CO2 A 6
two numbers and display the results.
COMPULSORY QUESTION
COURSE OUTCOMES
CO1 Demonstrate the components of computers and to prepare algorithms/flowcharts for programs.
CO2 Comprehend the concept of data types, variables, operators and expressions in programming language.
CO3 Illustrate the branching and iterative statement for solving problems.
CO4 Apply programming solutions for searching and sorting problems.
CO5 Demonstrate the concept of functions and its components.
CO6 Apply the concept of recursion and memory allocation.
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Define Morality. CO U 1
1
2. CO
R 1
Identify one organization involved in socially responsible initiatives. 1
3. CO
Distinguish white box testing and black box testing. 2 U 1
4. CO
R 1
Name any two perpetrators of computer crime. 2
5. CO
Identify the problems associated with whistle blowing. 3 U 1
6. State the law that protects information vital to an organization’s CO
R 1
success. 3
7. CO
R 1
List any one impact of information technology on healthcare. 4
8. CO
U 1
Give an example of the digital divide. 4
9. State the significance of the Electronic Product Environmental CO
R 1
Assessment Tool. 5
10 List any four significant benefits of an information security CO
R 1
. management system. 6
PART – B (6 X 3 = 18 MARKS)
11 Illustrate a fishbone diagram for the scenario: “Late for work.” CO A 3
. 1
12 CO
U 3
. Distinguish between bribes and gifts. 2
13 CO
R 3
. List the types of work that are not eligible for copyright protection. 3
14 Represent the actions colleges can implement to address student CO U 3
. plagiarism and list available plagiarism detection tools. 4
15 Differentiate Internal Audit and External Audit. CO R 3
. 5
16 CO
U 3
. Identify the key components of a business continuity plan. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 a Describe the PDCA cycle and illustrate its use with a real-world CO U 6
. . example. 1
b Explain four leadership styles, including their key characteristics, CO U 6
. and provide real-world examples of each. 1
COURSE OUTCOMES
CO1 Identify professional ethics, leadership theories, and management styles relevant to engineering practice.
CO2 Describe cyberattacks, cybersecurity measures, and legal frameworks governing IT ethics and privacy
CO3 Explain intellectual property rights, patent procedures, and essential considerations regarding software
copyrights.
CO4 Apply strategies for engineering quality software and understand the impact of IT on productivity and
standards of living.
CO5 Analyse social networking platforms, ethical dilemmas, industry codes of conduct, and incorporate green
computing practices.
CO6 Explain the implementation of ISO 27001 information security management systems, along with
understanding auditing procedures and incident response protocols.
Q.
No Questions CO BL M
.
PART – A (10 X 1 = 10 MARKS)
1. Identify the output of the following Java code snippet: CO1 U 1
class Example {
public static void main(String[] args) {
int x = 5;
int y = 10;
System.out.println(x * y++ - --x + y);
}}
2. Rewrite the following code snippet using a foreach loop: CO1 U 1
String[ ] fruits = {"Apple", "Banana", "Cherry", "Date", "Elderberry"};
for (int i = 0; i < fruits.length; i++) {
System.out.println("Fruit: " + fruits[i]);
}
3. Identify the keyword used to prevent a class from being inherited in Java. CO2 U 1
4. Identify the method in a class which will be automatically called whenever new CO2 R 1
objects are created.
5. Identify the keyword used to pause the execution of a thread for a specified period CO3 U 1
in Java.
6. Predict the output of the following Java code snippet: CO3 A 1
try {
String[] colors = {"Red", "Green", "Blue"};
System.out.println(colors[3]);
}
catch (ArrayIndexOutOfBoundsException e) {
System.out.println("Array Index Out of Bounds Exception");
}
catch (Exception e) {
System.out.println("Exception");
}
System.out.println("Program Completed");
7. Predict the output of the following program: CO4 U 1
class Karunya {
enum Day{
SUN, MON, TUE, WED, THUR, FRI, SAT
}
public static void main(String[] args) {
System.out.println(Day.FRI.ordinal());
}}
8. Predict the output of the following program: CO4 U 1
class Dscs {
public static void main(String[] args) {
String obj = "I LIKE KARUNYA UNIVERISTY";
System.out.println(obj.charAt(5));
}}
9. State the use of iterator() method in Java. CO5 R 1
10. List any two standard dialog boxes in Java Swing. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Explain any four features of Java programming. CO1 U 3
12. Differentiate between super and this keyword in Java. CO2 U 3
13. Sketch the life cycle of the thread with a neat outline. CO3 A 3
14. Categorize the following classes into byte stream and character stream and explain CO4 An 3
it with an example.
i. BufferedReader
ii. FileReader
iii. FileInputStream
15. Write a Java code snippet that initializes a stack, adds elements, and prints them. CO5 A 3
16. Explain any three layout managers in Java Swing package. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. a. Explain the bitwise and relational operator with appropriate examples. CO1 U 6
b. Write a Java program that performs the following tasks with an array: CO1 A 6
i. Create an array of integers with a size of N (N should be specified by the
user).
ii. Allow the user to input N integer values to populate the array.
iii. Calculate and display the sum and average of the values in the array.
19. Write a Java program to validate employees in a company. The eligibility CO3 A 12
requirement is a minimum salary of 50,000 and a role as "Manager". If the
employee earns less than 50,000, throw a user-defined exception called
"SalaryTooLowException". If the role is not "Manager", throw the built-in
exception called "IllegalArgumentException".
20. Write the TCP socket programming program that demonstrates sending and CO4 A 12
receiving messages between the server and the client.
21. Explain the significance of Generic Class and Generic methods with an CO5 U 12
example.
22. a. Develop a class in Java named 'Rectangle' taking the values of its length and CO2 A 6
breadth as parameters of its constructor and having a method named
'calculateArea' which returns the area of the rectangle. Get the length and
breadth of the rectangle as user input. Demonstrate the above concept with
necessary object creation.
b. Write a package called library with a class Book that has properties such as CO2 A 6
title, author, and a method to display book details. Then, write a program in a
different package that imports the library package and creates a Book object to
display its details.
23. Construct a Java application that utilizes multi-threading to achieve the CO3 A 12
following tasks:
i. Implement a thread named “InputThread” to gather input from the user.
ii. Create another thread named “AdditionThread” to perform the addition
of two numbers provided by the user.
iii. Develop a third thread named “DivisionThread” to perform the division
of the two numbers.
COMPULSORY QUESTION
24. Develop a Java swing GUI application for the Login functionality as per the CO6 A 12
sample design given below. Show a message box “Login Successful” if
username and password is “karunya”, otherwise show a message box “Login
Failed”.
COURSE OUTCOMES
CO1 Identify core Java fundamentals and object-oriented principles.
CO2 Develop object-oriented features and interfaces to enhance software functionality and user interaction.
CO3 Analyze the mechanisms of multithreading and exception handling to optimize performance and reliability.
CO4 Evaluate file I/O and string manipulation techniques for improved data handling.
CO5 Utilize Java generics and collections for enhanced code efficiency.
CO6 Develop desktop applications using Java Swing to solve real-time problems.
Q.
No Questions CO BL M
.
PART – A (10 X 1 = 10 MARKS)
1. List any two characteristics of an algorithm. CO1 R 1
2. Group the following Big O notations in ascending order in terms of rate of growth: CO1 U 1
O (log n), O (n), O (n log n), O (n*n).
3. Differentiate between array and linked list. CO2 U 1
4. List any two operations performed on a stack. CO2 R 1
5. Define in-order traversal. CO3 R 1
6. Define binary tree with an example. CO3 R 1
7. Name any two data structures to represent a graph. CO4 U 1
8. Define a bi-connected graph. CO4 R 1
9. List any two ways to select a pivot element. CO5 R 1
10. Define a symbol table. CO6 R 1
PART – B (6 X 3 = 18 MARKS)
11. Write the steps in the mathematical analysis of recursive algorithms. CO1 A 3
12. Write an algorithm that counts the number of nodes in the linked list. CO2 A 3
13. Explain the properties of the AVL tree. CO3 U 3
14. Write an algorithm for breadth-first search. CO4 A 3
15. Illustrate the selection sort algorithm with a given array of numbers [2, 81, 6, 45, CO5 U 3
11, 21, 23, 41,11].
16. Explain the significance of sorting in searching algorithms. CO6 U 3
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17. Explain the different Asymptotic notations with definitions and examples. CO1 A 12
18. a. Determine the postfix expression for the given infix expression (X – Y / (Z + CO2 A 8
U) * V) and evaluate the postfix expression where X=5, Y=10, Z, U &V are
20.
b. Write an algorithm to insert an element at the beginning of a doubly linked list. CO2 A 4
19. a. Construct a binary search tree for the following numbers starting from an CO3 A 8
empty binary search tree. The data elements are 45, 15, 79, 90, 10, 55, 12, 20,
50. Delete keys 90, 77 and 45 one after the other and show the trees at each
stage.
b. Write an algorithm for inserting a node in a threaded binary tree. CO3 A 4
20. a. Apply the DFS-based algorithm to solve the topological sorting problem for CO4 A 5
the following digraph:
b. Apply Dijkstra’s algorithm for the below graph to find the shortest path from CO4 A 7
the sources to the other nodes.
21. a. Explain the heap sort algorithm and its construction in detail with a suitable CO5 A 6
example.
b. Analyze the given input {4371, 1323, 6173, 4199, 4344, 9679, 1989} and a CO5 An 6
hash function of h(X)=X (mod 10) show the resulting:
i. Separate Chaining hash table.
ii. Open addressing hash table using linear probing.
22. a. Compute the factorial function F(n) = n! for an arbitrary non-negative integer n CO1 A 6
with the recursive algorithm and analyze its efficiency.
b. Construct a minimum spanning tree using Prim’s algorithm for the graph CO4 A 6
below:
23. a. Write an algorithm for linear search with a suitable example and analyze its CO6 A 8
time complexity.
b. Illustrate the working of the string-matching algorithm. Consider the text string CO6 An 4
text= "AABAACAADAABAABA" and the pattern pattern= "AABA".
COMPULSORY QUESTION
24. Write an algorithm to implement binary search and analyze the time CO6 A 12
complexity of this algorithm.
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Define Industrial Internet of Things. CO1 U 1
2. Give two examples of industrial revolution 4.0. CO1 R 1
3. List two wireless technologies for Cyber Physical Systems. CO2 R 1
4. Name two real life examples of cyber physical systems. CO2 R 1
5. Define Continuous dynamics. CO3 U 1
6. Name the model which is a form of a set of definitions and CO3 R 1
mathematical formulas.
7. Define feedback model. CO4 U 1
8. List the layers in CPS architecture. CO5 R 1
9. Mention the primary goal of a Denial-of-Service (DoS) attack. CO6 U 1
10 List any two assets in CPS environment. CO6 U 1
.
PART – B (6 X 3 = 18 MARKS)
11 Explain the revolutionary advancement in industry 3.0. CO1 U 3
.
12 CO2 U 3
Describe the Sensors used in CPS.
.
13 CO3 R 3
Name the three key modelling issues.
.
14 CO4 U 3
Describe the Ill formed model with an example.
.
15 Explain Scheduling in embedded system design. CO5 R 3
.
16 Describe the CIA Triad in information security. CO6 U 3
.
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Describe the five key features of CPS with example. CO1 R 12
.
COURSE OUTCOMES
CO Describe how Cyber Physical Systems operate in reality and their significance in Industry 4.0 and
1 the Industrial Internet of Things (IIoT).
CO Identify how to design Cyber Physical Systems, learn their requirements, explore real-world uses,
2 and understand the hardware and wireless technologies involved.
CO Apply the concepts of continuous dynamics, discrete dynamics, and hybrid systems to understand
3 the models and behavioral dynamics of Cyber Physical Systems.
CO Analyze various models of computation such as synchronous reactive models, dataflow models,
4 and timed models to understand their role in Cyber Physical Systems.
CO Design embedded Systems, Internet of Things Architecture, and Cyber Physical System
5 Architecture, focusing on their respective components and structures.
CO Evaluate the security and privacy of Cyber Physical Systems, focusing on network safety, internet
6 communication, and privacy in cloud-connected setups
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Define IoT. CO R 1
1
2. Classify networks in IoT. CO U 1
1
3. Define smart network. CO R 1
2
4. Expand IFTTT. CO R 1
2
5. List the components of wearable biosensors. CO U 1
3
6. Define Internet of Medical Things. CO R 1
3
7. Is Arduino good for IoT? CO U 1
4
8. State the primary purpose of the Raspberry Pi. CO R 1
4
9. Expand LabVIEW. CO U 1
5
10 What is single rotor drone? CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 Inspect the technologies of connected devices in IoT. CO A 3
. 1 n
12 Infer the step-by-step procedure to make smart home. CO U 3
. 2
13 Interpret the concepts of wearable devices in IoT. CO A 3
. 3 n
14 State the use of GPIO pins in an IoT device. CO U 3
. 4
15 Analyze the use and future of IoT in agriculture. CO A 3
. 5 n
16 List the uses of drone in IoT. CO U 3
. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q.No. 17 to 23, Q.No. 24 is Compulsory)
17 a Interpret the User experience (UX) design for IoT. CO U 6
. . 1
b Discuss the security and privacy issues in IoT. CO U 6
. 1
20 Outline the pin diagram and functions of Arduino with a neat sketch. CO U 1
. 4 2
21 Infer the smart medical devices in IoT. Also give the benefits and CO A 1
. challenges of the IoT in smart medical devices. 5 n 2
COURSE OUTCOMES
CO Illustrate the Internet of Things and its hardware and software components.
1
CO Interface I/O devices, Sensors & Communication modules.
2
CO Demonstrate the data and control devices.
3
CO Differentiate the connectivity technologies and protocols in IoT.
4
CO Infer security issues in IoT.
5
CO Develop real-time IoT projects.
6
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. Identify the type of machine learning approach used in the following CO U 1
problem: 'Analyze a bank credit dataset to decide whether to approve a 1
loan for an applicant based on their profile’.
2. Differentiate between sample and population in statistics. CO U 1
1
3. Identify why MongoDB is considered a NoSQL database. CO R 1
2
4. Write a MongoDB query to update the email of a user in the 'users' CO A 1
collection where the username is ‘john_doe’. 2
5. Identify the importance of measures and dimensions in Tableau. CO R 1
3
6. List any four methods of filling missing values in the dataset. CO R 1
3
7. Differentiate between soft clustering and hard clustering. CO R 1
4
8. Define any two evaluation metrics for regression type with its CO R 1
mathematical representation. 4
9. Identify the stemmed form of each word in the sentence: 'The cats are CO U 1
running quickly.' 5
10 List any four credibility metrics used to determine content credibility. CO R 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 A sample mean of 75.2 was obtained from a sample of 40 oranges, CO A 3
. with a known population standard deviation of 3.1. Calculate the 1
confidence interval at a 90% confidence level using a critical value of
1.645
12 Relate the following SQL table to its equivalent MongoDB format. CO A 3
. Provide the MongoDB document representation. 2
first_name last_name email
20 a Calculate the linear regression model of the form y=a0+a1x and find CO A 8
. . the mean squared error (MSE) using the data provided below. 4
Price(Rs.) 10 12 13 12 16 15
Amount 40 38 43 45 37 43
Demanded
b Describe the dummy variable trap with an example. CO U 4
. 4
23 Analyze the given dataset with species information and apply Naive CO A 1
. Bayes classification to classify the data based on the provided 4 n 2
attributes.
Classify an entity with the following attributes:
Color = Red
Legs = 2
Height = Tall
Smelly = No
The goal is to classify whether the entity belongs to species X or Y.
COMPULSORY QUESTION
24 a Explain any two linear models and two nonlinear models used in CO U 8
. . machine learning classification. 6
b Describe how BERT works as a tokenizer and embedder. CO U 4
. 6
COURSE OUTCOMES
CO1 Understand the data science principles and inference techniques.
CO2 Analyze the unstructured data for insights and decision-making.
CO3 Develop expertise in various python libraries for data visualization, and dashboard design
principles.
CO4 Illustrate data science methods for real-world applications.
CO5 Manage text mining and NLP techniques.
CO6 Apply cutting-edge technologies for impactful decision-making in diverse domains.
Q.
B
N Questions CO M
L
o.
PART – A (10 X 1 = 10 MARKS)
1. What are the steps in Exploratory Data Analysis (EDA)? CO U 1
1
2. Write the importance of EDA. CO R 1
1
3. When and how to use the Line Charts for Visual analysis. CO R 1
2
4. Is Histogram a Bar Chart? Justify. CO R 1
2
5. Write a note on Data Cleaning in EDA. CO U 1
3
6. Why remove NaN values? CO R 1
3
7. What is discretization and binning? CO U 1
4
8. List the types of measures of dispersion. CO R 1
4
9. Show the characteristics of multivariate analysis. CO U 1
5
10 What is TSA in Statsmodel? CO U 1
. 6
PART – B (6 X 3 = 18 MARKS)
11 State the purpose of Data Aggregation. CO A 3
. 1 n
12 Compare EDA with classical and Bayesian Analysis. CO U 3
. 2
13 Differentiate between Pivot table and cross tabulation. Justify when CO A 3
. they are more effective. 3 n
14 Discuss the smoothing techniques for time series. CO U 3
. 4
15 What are quartiles in EDA? Give example. CO A 3
. 5 n
16 Write a note on Groupby Mechanics in Python. List and explain the CO U 3
. process steps. 6
PART – C (6 X 12 = 72 MARKS)
(Answer any five Questions from Q. No. 17 to 23, Q. No. 24 is Compulsory)
17 Describe the various transformation techniques in EDA. CO U 1
. 1 2
COURSE OUTCOMES
CO1 Describe exploratory data analysis fundamentals
CO2 Explain the appropriate visualization methods
CO3 Apply data cleaning techniques
CO4 Illustrate the benefits of data transformation in enhancing data quality and analysis accuracy
CO5 Examine the statistical concepts of data analysis and interpretation
CO6 Apply the advanced data analysis techniques and application of statistical methods in real-world scenarios.