Old Question Papers

DUET PhD in Computer Science Question Paper with Answer Keys 2019-20 Download PDF

Duet phd in computer science question paper with answer keys 2019-20.

Delhi University Entrance Test (DUET) 2019-20 PhD in Computer Science Question Paper with answers DUET PhD in Computer Science Question Paper 2019-20 with solution you can download it in FREE, if DUET PhD in Computer Science Question Paper 2019-20 in text or pdf for DUET PhD in Computer Science Question Paper 2019-20 Answer Keys you can download DUET 2019-20 page also just Go to menu bar, Click on File->then Save.

Delhi University Entrance Test (DUET) 2019-20 PhD in Computer Science Question Paper with Answer Keys Free Download PDF is available in www.oldquestionpapers.net which has been provided by many students this DUET 2019-20 paper is available for all the students in FREE and also DUET PhD in Computer Science Question Paper 2019-20 fully solved DUET with answer keys and solution.

You can get daily updates on DUET 2019-20 from www.oldquestionpapers.net here  you can also check similar links for other related study materials on DUET PhD in Computer Science Question Paper question bank 2019-20 is also available in English and Hindi Language.

EXAMPLE QUESTIONS

Q1. Which of the following statements is true for TCP protocol?

  • 1. TCP is a connection-less unreliable protocol.
  • 2. TCP is a connection-less reliable protocol.
  • 3. TCP is a connection-oriented reliable protocol.
  • 4. TCP is a connection-oriented unreliable protocol.

Q2. The file space allocation of Unix Operating System is

  • 2. Single level indexed
  • 3. Multi-level Indexed
  • 4. Contiguous

Q3. This examination paper has 100 multiple-choice questions of one mark each, with each question having four choices only one of which is correct. Each incorrect answer fetches -0.25 mark. Suppose you choose all your answers randomly with uniform probability. Then the expected mark you obtain is

Q4. Suppose we are given pointers to first and last nodes of a singly linked list containing 𝑛 elements (where each node contains pointer to the next node). Which of the following operations cannot be performed in time independent on the length of the linked list?

  • 1. Insert a new element as the last element.
  • 2. Insert a new element as the first element.
  • 3. Delete the first element.
  • 4. Delete the last element.

Q5. A CPU has 32 bit address lines and 16 bit datalines. The maximum primary memory addressing capacity of the CPU is

Q6. Which of the following inter-process communication mechanism is most efficient in an operating system?

  • 1. Semaphore
  • 2. Shared memory
  • 3. Message Passing
  • 4. Message queue

Q7. In a QAM Modulation scheme, the baud-rate is 4 kilobaud/second. The lowest carrier frequency is 102 KHz. The bandwidth of the channel is 1 MHz. The number of digital channels created would be

Q8. To reduce thrashing in virtual memory, which of the following data structures is most suitable?

Q9. The number of 4 digit even numbers where all the digits are distinct is (Note that the most significant digit of these numbers cannot  be zero).

Q10. An Ethernet frame is 32 bytes long. How many extra bytes should be added to the frame before transmission?

  • 1. 32 bytes
  • 2. 48 bytes
  • 3. 64 bytes
  • 4. 16 bytes

DUET PhD in Computer Science Questio n Paper with Answer Keys 2019-20 Download PDF File:

Similar Pages…..

  • Delhi University B.Ed Admission Eligibility Qualification
  • Delhi University (DU) B.Ed Admission Form
  • DU BEd Entrance Exam Syllabus
  • DU B Ed Entrance Reasoning/Aptitude Question Paper
  • DU B Ed Entrance GK Question Paper
  • DU B Ed English Language Competency & Comprehension Test Paper
  • DU B Ed Entrance Books
  • B Ed Entrance Model Paper
  • DU B.EL.ED Entrance Question Papers
  • Previous Year Old Question Paper
  • Current Affairs 2023-2 4 MCQ Question Answers
  • Latest Govt Job Recruitment 2023-2 4
  • General Knowledge (GK) Question Answers 2023-2 4
  • Computer Knowledge For Bank Question Answers
  • Child Development and Pedagogy Question Answers
  • Reasoning and Aptitude Question Answer
  • Computing Resources
  • IT-Helpdesk

phd in computer science question paper

Department of Computer Science & Engineering

You are here, phd students, primary tabs.

  • View published (active tab)
  • What links here

About PhD program  PhD is typically the highest degree offered by any institute in the world.  After initial course work (3-7 courses depending on background), student spend most of his time in working on research problems.  Typically PhD in computer science takes 4-5 years to finish.

Why PhD in Computer Science  With PhD you learn a research aptitude that is finding and defining problem, solving them, and publishing the results. PhD prepares you to do research. Computer science still being a fast and growing field, requires lot of innovation to happen. So the research aptitude is a welcome skill by computer science industry. PhD are typically hired by top computer science companies like Microsoft, Google, Intel, Facebook, etc, as well as by research labs like HP Lab, MSR, IBM research labs, etc.  For academia, PhD is a minimum required qualification.

Admission process

Admissions for MS(R) and PhD happen twice a year. The advertisement is out in march/September with application deadline in April/October. Please visit admission website of IIT Ropar for regular update.

Typically following procedures is adopted:

Step 1: Applications received are shortlisted based on department criteria.

Step 2: Shortlisted applicants are called for interview/test.

Step 3: Candidates has to appear in person at IIT Ropar for test and interview. The syllabus of the written test is generally GATE syllabus of CS plus general aptitude.

Step 4: Student shortlisted in written test appear for interview. The selected candidates are announced on website.

Stages of PhD

1. Course work: Student with M.Tech. degree are supposed to take minimum 12 credits, and students with B.Tech. degree are supposed to take 18 credits of course work.

2. Comprehensive exam: There are three stages of comprehensive exams (a) Written comprehensive, (b) Oral comprehensive, (c) Thesis proposal seminar. Completing all the comprehensive requirements usually takes 24-30 months, after admission.  More detail about written and oral comprehesive exam format of CSE department is given below.  

3. Synopsis seminar: Synopsis seminar typically happens when most the work for PhD degree is finished. With in two months of successful synopsis seminar, scholar is supposed to submit PhD thesis for evaluation.

4. Thesis submission

5. Thesis defence. 

More detail about PhD program can be found in PG handbook of information, available in  Academics section  of IIT Ropar main website.

PhD Comprehensive Rules

1.     Written and Oral comprehensive: 

Objective: Breadth requirement in area of interest and research readiness.

Student is supposed to do a literature survey in a particular area of interest (may or may not be tightly coupled to research proposal), and find out at least 5 papers. The selected papers should be regular papers from A*/A/B ranked conferences/journals published in last 10 years. The list of papers will be vetted by doctoral committee. It is recommended that student should read/understand the relevant background.

Written Comprehensive:

    DC of the student will conduct a written exam based on the papers identified by student/DC. Scope of the written examination will be the content and underneath basics of the papers. DC will discuss the format and question paper before conducting the exam. The written exam could be open-book/close book, open-time/fixed duration as decided by DC. The evaluation of the written exam would be done by DC members. Question paper as well as answer sheets will be archived in department office after evaluation.

Oral comprehensive:    

·        Student will present these papers in front of department faculty members and doctoral committee members.

·        Doctoral committee will ask questions on basics as well as detail of the research problems being addressed in the given papers.

·        Based on presentation and viva-voce, doctoral committee would decide marks in the oral comprehensive examination.

Written exam and oral exam both will be of 100 marks. In overall score, both will have equal weightage. Minimum pass marks for written as well as oral exam is 50.

  • Quick Links
  • CSE Intranet
  • Room Booking
  • Current Timetable
  • Bus Timetable
  • Academic Calendar
  • Other Links
  • Associate Deans
  • Head of Departments
  • Administrative Officials
  • PhD Comprehensive
  • Resource Links
  • Downloads Forms
  • IT-Helddesk

S. Ramanujan Block, Department of Computer Science and Engineering, IIT Ropar,Bara Phool, Punjab 140001

  Tel: +91-1881-242105   Fax: +91-1881-223395

Follow us -

phd in computer science question paper

Copyright © 2024, Department of Computer Science & Engineering

Designed by Ashish Uniyal

Brown Logo

  • About Brown
  • Campus Life

Information for:

  • Current Students
  • Friends & Neighbors
  • A to Z Index
  • People Directory
  • Social@Brown
  • About the Department
  • Systems & Software
  • Socially Responsible    Computing
  • Positions / Jobs
  • Brown CS News
  • Brown CS Blog
  • Our Community
  • Grad Students
  • Ugrad Students
  • Research Links
  • Publications
  • Opportunities For    Visiting Students
  • Degree Programs
  • Computer Science
  • Cybersecurity
  • Undergraduate
  • Interdisciplinary
  • Miscellaneous
  • Course List
  • TA Program
  • Who We Are
  • Action Plan & Initiatives
  • Student Advocates
  • Data And Demographics
  • Student Groups
  • UTA Endowment
  • Home »
  • Research »
  • Publications »
  • Student Project Reports »

Icon

Computer Science at Brown University Providence, Rhode Island 02912 USA Phone: 401-863-7600 Map & Directions / Contact Us

Facebook

  • Trending Now
  • Foundational Courses
  • Data Science
  • Practice Problem
  • Machine Learning
  • System Design
  • DevOps Tutorial
  • Learn Data Structures and Algorithms | DSA Tutorial
  • Beyonce and Jay-Z Kids (Names & Ages of All 3 Children)
  • Sorting Algorithms
  • JavaScript Tutorial
  • Route 53 Realities: AWS CLI For Domain Name System
  • SQL Tutorial
  • AWS CLI For Identity And Access Management
  • How To Manage Multiple AWS Profiles For Boto3
  • AWS S3 CP Recursive
  • How Do I Create a Library in C++?
  • Text Translation Tool using MERN Stack
  • Quiz App using MERN Stack
  • Top 10 Most Handsome Men in the World 2024
  • Create a Chess Game in Python
  • Dynamic Programming
  • Building a Web-based Chess Game with React and Chess.js
  • Automatic Speech Recognition using Whisper
  • Real-Time Object Detection Using TensorFlow
  • 10 Most Beautiful Women in the World 2024
  • HTML Tutorial
  • Binary Search Tree
  • Graph Data Structure And Algorithms
  • Stack Data Structure
  • How to Track Someone's Location with Phone Number

UGC NET CS Previous Year Question Paper – With Solutions

The page contains solutions of previous year UGC NET CS (Computer Science) papers with explanations, topic wise Quizzes, notes/tutorials and important links for preparation.

  • UGC NET CS 2018 Dec – II
  • UGC NET CS 2018 July – II
  • UGC-NET CS 2017 Nov – II
  • UGC-NET CS 2017 Nov – III
  • UGC NET CS 2017 Jan – II
  • UGC NET CS 2017 Jan – III
  • UGC NET CS 2016 Aug – II
  • UGC NET CS 2016 Aug – III
  • UGC NET CS 2016 July – II
  • UGC NET CS 2016 July – III
  • UGC NET CS 2015 Dec – II
  • UGC NET CS 2015 Dec – III
  • UGC NET CS 2015 Jun – II
  • UGC NET CS 2015 Jun – III

Other Useful Links :

  • Articles on Computer Science
  • UGC NET CS Notes according to syllabus of Paper-II

Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above!

Please Login to comment...

  • How to Delete Whatsapp Business Account?
  • Discord vs Zoom: Select The Efficienct One for Virtual Meetings?
  • Otter AI vs Dragon Speech Recognition: Which is the best AI Transcription Tool?
  • Google Messages To Let You Send Multiple Photos
  • 30 OOPs Interview Questions and Answers (2024)

Improve your Coding Skills with Practice

 alt=

Chennai Mathematical Institute

Chennai Mathematical Institute

  • Events and News
  • Alumni Association
  • Practical Information
  • Google Search
  • CMI's CA Certificate

VTU PhD Question Papers

Theory of landscape architecture, subject code : 14phdar002, vtu civil phd question papers, transportation and highway technology, subject code : 14phdcv001, structural engineering, subject code : 14phdcv002, vtu geology phd question papers, applied engineering geology and advanced geo-informatics, subject code : 14phdge001, research methodology, subject code : 14phdrm, last updated: monday, november 13, 2020.

  • VTU last year question papers
  • VTU E Learning
  • VTU Time Table New
  • Model Question Papers New
  • VTU Syllabus New
  • VTU Results
  • VTU Question Bank
  • VTU Revaluation Results
  • SGPA to Percentage

VTU Updates

  • VTU NON-CBCS Results New
  • SSP Scholarship 2023 New
  • Cloud Computing vtu question papers New
  • Machine Learning Syllabus New
  • 18CS71-AiML VTU Question Papers New
  • Machine Learning VTU Question Papers New
  • Web Technology Syllabus New
  • VTU change of college Procedure New
  • VTU MTech Syllabus New
  • VTU MBA Results New
  • VTU Notes New
  • VTU PhD TimeTable New
  • VTU Academic Calendar 2023 Odd Sem
  • VTU Updates New
  • Infosys Recruitment 2022 New
  • Cyber Security Syllabus New
  • MBA in USA for Engineering Students New

Email forwarding for @cs.stanford.edu is changing on Feb 1, 2024. More details here . Looking for your W-2 form?  Read Here . CS Commencement Ceremony June 16, 2024.  Learn More .

Academics | PhD Program

Main navigation.

The PhD degree is intended primarily for students who desire a career in research, advanced development, or teaching. A broad Computer Science, Engineering, Science background, intensive study, and research experience in a specialized area are the necessary requisites.

The degree of Doctor of Philosophy (PhD) is conferred on candidates who have demonstrated to the satisfaction of our Department in the following areas:

  • high attainment in a particular field of knowledge, and
  • the ability to do independent investigation and present the results of such research.

They must satisfy the general requirements for advanced degrees, and the program requirements specified by our Department.

phd in computer science question paper

Program Requirements

On average, the program is completed in five to six years, depending on the student’s research and progress.

phd in computer science question paper

Progress Guidelines

Students should consider the progress guidelines to ensure that they are making reasonable progress.

phd in computer science question paper

Monitoring Progress

Annual reviews only apply to PhD students in their second year or later; yearly meetings are held for all PhD students.

For enquiries call:

+1-469-442-0620

banner-in1

  • Programming

Latest Computer Science Research Topics for 2024

Home Blog Programming Latest Computer Science Research Topics for 2024

Play icon

Everybody sees a dream—aspiring to become a doctor, astronaut, or anything that fits your imagination. If you were someone who had a keen interest in looking for answers and knowing the “why” behind things, you might be a good fit for research. Further, if this interest revolved around computers and tech, you would be an excellent computer researcher!

As a tech enthusiast, you must know how technology is making our life easy and comfortable. With a single click, Google can get you answers to your silliest query or let you know the best restaurants around you. Do you know what generates that answer? Want to learn about the science going on behind these gadgets and the internet?

For this, you will have to do a bit of research. Here we will learn about top computer science thesis topics and computer science thesis ideas.

Why is Research in Computer Science Important?

Computers and technology are becoming an integral part of our lives. We are dependent on them for most of our work. With the changing lifestyle and needs of the people, continuous research in this sector is required to ease human work. However, you need to be a certified researcher to contribute to the field of computers. You can check out Advance Computer Programming certification to learn and advance in the versatile language and get hands-on experience with all the topics of C# application development.

1. Innovation in Technology

Research in computer science contributes to technological advancement and innovations. We end up discovering new things and introducing them to the world. Through research, scientists and engineers can create new hardware, software, and algorithms that improve the functionality, performance, and usability of computers and other digital devices.

2. Problem-Solving Capabilities

From disease outbreaks to climate change, solving complex problems requires the use of advanced computer models and algorithms. Computer science research enables scholars to create methods and tools that can help in resolving these challenging issues in a blink of an eye.

3. Enhancing Human Life

Computer science research has the potential to significantly enhance human life in a variety of ways. For instance, researchers can produce educational software that enhances student learning or new healthcare technology that improves clinical results. If you wish to do Ph.D., these can become interesting computer science research topics for a PhD.

4. Security Assurance

As more sensitive data is being transmitted and kept online, security is our main concern. Computer science research is crucial for creating new security systems and tactics that defend against online threats.

Top Computer Science Research Topics

Before starting with the research, knowing the trendy research paper ideas for computer science exploration is important. It is not so easy to get your hands on the best research topics for computer science; spend some time and read about the following mind-boggling ideas before selecting one.

1. Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues, and Challenges

Welcome to the era of seamless connectivity and unparalleled efficiency! Blockchain and edge computing are two cutting-edge technologies that have the potential to revolutionize numerous sectors. Blockchain is a distributed ledger technology that is decentralized and offers a safe and transparent method of storing and transferring data.

As a young researcher, you can pave the way for a more secure, efficient, and scalable architecture that integrates blockchain and edge computing systems. So, let's roll up our sleeves and get ready to push the boundaries of technology with this exciting innovation!

Blockchain helps to reduce latency and boost speed. Edge computing, on the other hand, entails processing data close to the generation source, such as sensors and IoT devices. Integrating edge computing with blockchain technologies can help to achieve safer, more effective, and scalable architecture.

Moreover, this research title for computer science might open doors of opportunities for you in the financial sector.

2. A Survey on Edge Computing Systems and Tools

With the rise in population, the data is multiplying by manifolds each day. It's high time we find efficient technology to store it. However, more research is required for the same.

Say hello to the future of computing with edge computing! The edge computing system can store vast amounts of data to retrieve in the future. It also provides fast access to information in need. It maintains computing resources from the cloud and data centers while processing.

Edge computing systems bring processing power closer to the data source, resulting in faster and more efficient computing. But what tools are available to help us harness the power of edge computing?

As a part of this research, you will look at the newest edge computing tools and technologies to see how they can improve your computing experience. Here are some of the tools you might get familiar with upon completion of this research:

  • Apache NiFi:  A framework for data processing that enables users to gather, transform, and transfer data from edge devices to cloud computing infrastructure.
  • Microsoft Azure IoT Edge: A platform in the cloud that enables the creation and deployment of cutting-edge intelligent applications.
  • OpenFog Consortium:  An organization that supports the advancement of fog computing technologies and architectures is the OpenFog Consortium.

3. Machine Learning: Algorithms, Real-world Applications, and Research Directions

Machine learning is the superset of Artificial Intelligence; a ground-breaking technology used to train machines to mimic human action and work. ML is used in everything from virtual assistants to self-driving cars and is revolutionizing the way we interact with computers. But what is machine learning exactly, and what are some of its practical uses and future research directions?

To find answers to such questions, it can be a wonderful choice to pick from the pool of various computer science dissertation ideas.

You will discover how computers learn several actions without explicit programming and see how they perform beyond their current capabilities. However, to understand better, having some basic programming knowledge always helps. KnowledgeHut’s Programming course for beginners will help you learn the most in-demand programming languages and technologies with hands-on projects.

During the research, you will work on and study

  • Algorithm: Machine learning includes many algorithms, from decision trees to neural networks.
  • Applications in the Real-world: You can see the usage of ML in many places. It can early detect and diagnose diseases like cancer. It can detect fraud when you are making payments. You can also use it for personalized advertising.
  • Research Trend:  The most recent developments in machine learning research, include explainable AI, reinforcement learning, and federated learning.

While a single research paper is not enough to bring the light on an entire domain as vast as machine learning; it can help you witness how applicable it is in numerous fields, like engineering, data science & analysis, business intelligence, and many more.

Whether you are a data scientist with years of experience or a curious tech enthusiast, machine learning is an intriguing and vital field that's influencing the direction of technology. So why not dig deeper?

4. Evolutionary Algorithms and their Applications to Engineering Problems

Imagine a system that can solve most of your complex queries. Are you interested to know how these systems work? It is because of some algorithms. But what are they, and how do they work? Evolutionary algorithms use genetic operators like mutation and crossover to build new generations of solutions rather than starting from scratch.

This research topic can be a choice of interest for someone who wants to learn more about algorithms and their vitality in engineering.

Evolutionary algorithms are transforming the way we approach engineering challenges by allowing us to explore enormous solution areas and optimize complex systems.

The possibilities are infinite as long as this technology is developed further. Get ready to explore the fascinating world of evolutionary algorithms and their applications in addressing engineering issues.

5. The Role of Big Data Analytics in the Industrial Internet of Things

Datasets can have answers to most of your questions. With good research and approach, analyzing this data can bring magical results. Welcome to the world of data-driven insights! Big Data Analytics is the transformative process of extracting valuable knowledge and patterns from vast and complex datasets, boosting innovation and informed decision-making.

This field allows you to transform the enormous amounts of data produced by IoT devices into insightful knowledge that has the potential to change how large-scale industries work. It's like having a crystal ball that can foretell.

Big data analytics is being utilized to address some of the most critical issues, from supply chain optimization to predictive maintenance. Using it, you can find patterns, spot abnormalities, and make data-driven decisions that increase effectiveness and lower costs for several industrial operations by analyzing data from sensors and other IoT devices.

The area is so vast that you'll need proper research to use and interpret all this information. Choose this as your computer research topic to discover big data analytics' most compelling applications and benefits. You will see that a significant portion of industrial IoT technology demands the study of interconnected systems, and there's nothing more suitable than extensive data analysis.

6. An Efficient Lightweight Integrated Blockchain (ELIB) Model for IoT Security and Privacy

Are you concerned about the security and privacy of your Internet of Things (IoT) devices? As more and more devices become connected, it is more important than ever to protect the security and privacy of data. If you are interested in cyber security and want to find new ways of strengthening it, this is the field for you.

ELIB is a cutting-edge solution that offers private and secure communication between IoT devices by fusing the strength of blockchain with lightweight cryptography. This architecture stores encrypted data on a distributed ledger so only parties with permission can access it.

But why is ELIB so practical and portable? ELIB uses lightweight cryptography to provide quick and effective communication between devices, unlike conventional blockchain models that need complicated and resource-intensive computations.

Due to its increasing vitality, it is gaining popularity as a research topic as someone aware that this framework works and helps reinstate data security is highly demanded in financial and banking.

7. Natural Language Processing Techniques to Reveal Human-Computer Interaction for Development Research Topics

Welcome to the world where machines decode the beauty of the human language. With natural language processing (NLP) techniques, we can analyze the interactions between humans and computers to reveal valuable insights for development research topics. It is also one of the most crucial PhD topics in computer science as NLP-based applications are gaining more and more traction.

Etymologically, natural language processing (NLP) is a potential technique that enables us to examine and comprehend natural language data, such as discussions between people and machines. Insights on user behaviour, preferences, and pain areas can be gleaned from these encounters utilizing NLP approaches.

But which specific areas should we leverage on using NLP methods? This is precisely what you’ll discover while doing this computer science research.

Gear up to learn more about the fascinating field of NLP and how it can change how we design and interact with technology, whether you are a UX designer, a data scientist, or just a curious tech lover and linguist.

8. All One Needs to Know About Fog Computing and Related Edge Computing Paradigms: A Complete Survey

If you are an IoT expert or a keen lover of the Internet of Things, you should leap and move forward to discovering Fog Computing. With the rise of connected devices and the Internet of Things (IoT), traditional cloud computing models are no longer enough. That's where fog computing and related edge computing paradigms come in.

Fog computing is a distributed approach that brings processing and data storage closer to the devices that generate and consume data by extending cloud computing to the network's edge.

As computing technologies are significantly used today, the area has become a hub for researchers to delve deeper into the underlying concepts and devise more and more fog computing frameworks. You can also contribute to and master this architecture by opting for this stand-out topic for your research.

Tips and Tricks to Write Computer Research Topics

Before starting to explore these hot research topics in computer science you may have to know about some tips and tricks that can easily help you.

  • Know your interest.
  • Choose the topic wisely.
  • Make proper research about the demand of the topic.
  • Get proper references.
  • Discuss with experts.

By following these tips and tricks, you can write a compelling and impactful computer research topic that contributes to the field's advancement and addresses important research gaps.

From machine learning and artificial intelligence to blockchain, edge computing, and big data analytics, numerous trending computer research topics exist to explore.

One of the most important trends is using cutting-edge technology to address current issues. For instance, new IIoT security and privacy opportunities are emerging by integrating blockchain and edge computing. Similarly, the application of natural language processing methods is assisting in revealing human-computer interaction and guiding the creation of new technologies.

Another trend is the growing emphasis on sustainability and moral considerations in technological development. Researchers are looking into how computer science might help in innovation.

With the latest developments and leveraging cutting-edge tools and techniques, researchers can make meaningful contributions to the field and help shape the future of technology. Going for Full-stack Developer online training will help you master the latest tools and technologies. 

Frequently Asked Questions (FAQs)

Research in computer science is mainly focused on different niches. It can be theoretical or technical as well. It completely depends upon the candidate and his focused area. They may do research for inventing new algorithms or many more to get advanced responses in that field.  

Yes, moreover it would be a very good opportunity for the candidate. Because computer science students may have a piece of knowledge about the topic previously. They may find Easy thesis topics for computer science to fulfill their research through KnowledgeHut. 

 There are several scopes available for computer science. A candidate can choose different subjects such as AI, database management, software design, graphics, and many more. 

Profile

Ramulu Enugurthi

Ramulu Enugurthi, a distinguished computer science expert with an M.Tech from IIT Madras, brings over 15 years of software development excellence. Their versatile career spans gaming, fintech, e-commerce, fashion commerce, mobility, and edtech, showcasing adaptability in multifaceted domains. Proficient in building distributed and microservices architectures, Ramulu is renowned for tackling modern tech challenges innovatively. Beyond technical prowess, he is a mentor, sharing invaluable insights with the next generation of developers. Ramulu's journey of growth, innovation, and unwavering commitment to excellence continues to inspire aspiring technologists.

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Programming Batches & Dates

Course advisor icon

Registrations Closed

The registrations for spring term have been closed. Registrations for Academic session 2018-19 will start in the month of March 2018. Click here to enquire

LPUNEST Applications for Ph.D. (Spring Term) are closed. Applications for the next term will be updated shortly. For any kind of query please call 01824-404404 or Click here

LPUNEST Applications for Ph.D. (Spring term) will be updated shortly. For any kind of query please call 01824-404404 or Click here

Question Paper Pattern

Due to steep spike in infection cases in India and adhering to the central government’s guidelines to safeguard health and safety of candidates, conduct of physical test is postponed for now,  so currently LPUNEST for Ph.D. would be conducted in online mode only i.e. remotely proctored online LPUNEST from home will be conducted. Click here  to view General Guidelines for Remotely Proctored Online Exam from home.

It is divided into two papers, i.e. Paper-I and Paper-II.

  • Paper I of Agriculture disciplines will consist of questions from basic agriculture
  • Each question will carry 1 mark. There would be no negative marks for a wrong answer.
  • Political Science
  • Public Administration
  • Film and TV Production
  • Interior and Product Design
  • Product and Industrial Design
  • User Experience
  • Tourism Management
  • Hotel Management
  • Biochemistry
  • Bioinformatics
  • Biotechnology
  • Environmental Sciences
  • Food Science and Technology
  • Forensic Science
  • Mathematics
  • Microbiology
  • Pharmaceutical Chemistry
  • Pharmaceutical Analysis
  • Pharmaceutics
  • Pharmacognosy
  • Pharmacology
  • Pharmacy Practice
  • Genetics and Plant Breeding
  • Horticulture (Fruit Science)
  • Horticulture (Vegetable Science)
  • Plant pathology
  • Soil Science
  • Computer Science
  • Electronics and Communication
  • Molecularbio-Genetic
  • Geospatial Information Science and Technology

new-virtual-tour

Share your Feedback

Admission - 2023 live video counselling.

To continue interaction with our expert admission counsellors enter the passcode 123456 for career guidance to discover the best suited programmes for you. Available from 10 am to 5 pm on all working days.

  • The Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal) Act, 2013
  • UGC ( Prevention, Prohibition and Redressal of sexual harassment of Women employees and students in Higher Educational Institutions ) Regulations, 2015
  • Handbook on Sexual Harassment of Women at Workplace issued by the Ministry of Women and Child Development, Government of India
  • Internal Complaints Committee against Sexual harassment
  • Internal Complaints Committee
  • Sexual Harassment Complaint Registration: - [email protected]
  • Anti Sexual Harrasment Policy

Admissions for 2017-2018 are closed, except for the following programmes.

Integrated b.ed. - m.ed., important information - lpu admissions 2020 update., for b.tech. admissions:.

  • Last date to apply has been extended from 31st March, 2020 to 20th April, 2020. Click here to apply
  • LPUNEST Test Dates will be informed as and when Government announces JEE Mains schedule in order to provide candidates with clash free schedule. University is also evaluating the options to offer Online proctored LPUNEST remotely.
  • Two Schedules of Counselling will be conducted (both online):
  • Regular Schedule of Counselling – After the conduct of LPUNEST exam which is dependent upon Government decision on lockdown due to Covid-19.
  • Special Schedule of Counseling – Before the conduct of LPUNEST exam, for all those candidates who already have JEE Mains or LPUNEST score (exams conducted in January 2020).
  • Special Schedule of Counselling will be conducted online only as per the dates mentioned below:
  • This Special Schedule of counselling will help the students with existing score of JEE (Mains) or LPUNEST to confirm their admission and they need not to appear for LPUNEST exam again.
  • Regular Schedule of counselling may be conducted only on the basis of LPUNEST exam and not on the basis of JEE (Mains) score so all candidates having JEE Mains (Jan Schedule) score are advised not to wait for Regular Schedule of counselling and try to confirm the admission through Special Schedule of counselling .
  • Applicants who do not have LPUNEST score or JEE (Mains) score because they did not appear for exams in January / February shall apply on or before 20th April, 2020. The schedule of LPUNEST exam and counselling / admission process will be informed later.
  • Candidates participating in Special Counselling schedule (as per Table mentioned above), if interested, may appear for LPUNEST to improve their score for Scholarship and/or participate in Regular Schedule of counselling again for changing / improving the allotted branch.
  • The ranks declared in Special Counselling schedule will not be used for LPUNEST Study Grant.

For MBA Admissions:

  • Last date to apply has been extended till 20th April, 2020. Click here to apply
  • University has decided to conduct remote video Interviews for admission in MBA during the national lockdown period due to Covid-19. LPUNEST will now be conducted for scholarship only.
  • Considering the current COVID-19 Pandemic situation, University has also decided to extend the Last date of MBA Admissions for January applicants till 30th April, 2020.

For All other Programmes:

For ph.d. programme:.

  • LPUNEST and subsequent interview will be conducted as per schedule communicated earlier.
  • Slot booking for exam will be open from 15 April 2020 onwards. Click here to apply

phd in computer science question paper

Toll Free: 1800-102-4057

  • Students should download and install the “LPU Live” App for online/remote academic connect (the details in this regard have been updated on UMS). The students shall continue their studies through the “LPU Live” App and LPU-UMS.
  • The University shall remain functional and faculty/staff shall be available during the working hours for all kinds of academic support required by the students.
  • Incase students opt to undertake any personal domestic travel; it is advised that all necessary precautionary measures and hygiene advisories should be followed.
  • International travel by the students is strongly discouraged.
  • Students should avoid participation in large gatherings or venturing out to crowded places.
  • All University events scheduled till March 31st, 2020 stand postponed till further notice.
  • There shall be no changes in the Academic Calendar of the current term.

Notifications/ Events

Admission- 2021 Live Video Counselling

LPUNEST Studygrant 4th Edition result declared Result for LPUNEST Studygrant 4th Edition has been declared. Details of the award ceremony will be communicated shortly. Candidates who are eligible to get studygrant can check their result at https://lpu.in/studygrant.

Admissions-2020

LPUNEST Application Invited for Study Grant Lovely Professional University launched LPUNEST Study Grant 5th Edition to augment the same spirit of expanding the purview of previous Editions of LPUNEST Study Grant i.e. ‘LPUNEST Study Grant 1st Edition, 2019’, ‘LPUNEST Study Grant 2nd Edition, 2020’ and ‘LPUNEST Study Grant 3rd Edition, 2021’ LPUNEST Study Grant 4th Edition, 2022’.

  • Atal Ranking of Institutions on Innovation Achievements (ARIIA) - 2020
  • Email ID for Comments & Feedback : [email protected]
  • Report of NIRF Data Capturing System: Management
  • Report of NIRF Data Capturing System: Pharmacy
  • Report of NIRF Data Capturing System: Engineering
  • Report of NIRF Data Capturing System: Overall
  • Report of NIRF Data Capturing System: Law
  • Report of NIRF Data Capturing System: Architecture
  • Report of NIRF Data Capturing System: Agriculture

Applications for academic session 2020-21 are closed. For 2021-22, details will be updated shortly. You may call 01824-404404 or Click here to submit your query.

LPUNEST Applications for 2020-21 will be updated in 2nd week of September. For any kind of query please call 01824-404404 or Click here

LPUNEST Applications for 2020-21 will be updated Shortly. For any kind of query please call 01824-404404 or Click here

Applications are closed in Post Graduate Agriculture Programmes. If seats remain vacant after the first counselling, we will inform you and will guide you for further process. However to apply for any other Post Graduate Sciences Programme Click Here. For any kind of query please call 01824-404404 or Click Here.

Help | Advanced Search

Computer Science > Computer Vision and Pattern Recognition

Title: synthesize step-by-step: tools, templates and llms as data generators for reasoning-based chart vqa.

Abstract: Understanding data visualizations like charts and plots requires reasoning about both visual elements and numerics. Although strong in extractive questions, current chart visual question answering (chart VQA) models suffer on complex reasoning questions. In this work, we address the lack of reasoning ability by data augmentation. We leverage Large Language Models (LLMs), which have shown to have strong reasoning ability, as an automatic data annotator that generates question-answer annotations for chart images. The key innovation in our method lies in the Synthesize Step-by-Step strategy: our LLM-based data generator learns to decompose the complex question into step-by-step sub-questions (rationales), which are then used to derive the final answer using external tools, i.e. Python. This step-wise generation procedure is trained on synthetic data generated using a template-based QA generation pipeline. Experimental results highlight the significance of the proposed step-by-step generation. By training with the LLM-augmented data (LAMENDA), we significantly enhance the chart VQA models, achieving the state-of-the-art accuracy on the ChartQA and PlotQA datasets. In particular, our approach improves the accuracy of the previous state-of-the-art approach from 38% to 54% on the human-written questions in the ChartQA dataset, which needs strong reasoning. We hope our work underscores the potential of synthetic data and encourages further exploration of data augmentation using LLMs for reasoning-heavy tasks.

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Universities Have a Computer-Science Problem

The case for teaching coders to speak French

Photo of college students working at their computers as part of a hackathon at Berkeley in 2018

Listen to this article

Produced by ElevenLabs and News Over Audio (NOA) using AI narration.

Updated at 5:37 p.m. ET on March 22, 2024

Last year, 18 percent of Stanford University seniors graduated with a degree in computer science, more than double the proportion of just a decade earlier. Over the same period at MIT, that rate went up from 23 percent to 42 percent . These increases are common everywhere: The average number of undergraduate CS majors at universities in the U.S. and Canada tripled in the decade after 2005, and it keeps growing . Students’ interest in CS is intellectual—culture moves through computation these days—but it is also professional. Young people hope to access the wealth, power, and influence of the technology sector.

That ambition has created both enormous administrative strain and a competition for prestige. At Washington University in St. Louis, where I serve on the faculty of the Computer Science & Engineering department, each semester brings another set of waitlists for enrollment in CS classes. On many campuses, students may choose to study computer science at any of several different academic outposts, strewn throughout various departments. At MIT, for example, they might get a degree in “Urban Studies and Planning With Computer Science” from the School of Architecture, or one in “Mathematics With Computer Science” from the School of Science, or they might choose from among four CS-related fields within the School of Engineering. This seepage of computing throughout the university has helped address students’ booming interest, but it also serves to bolster their demand.

Another approach has gained in popularity. Universities are consolidating the formal study of CS into a new administrative structure: the college of computing. MIT opened one in 2019. Cornell set one up in 2020. And just last year, UC Berkeley announced that its own would be that university’s first new college in more than half a century. The importance of this trend—its significance for the practice of education, and also of technology—must not be overlooked. Universities are conservative institutions, steeped in tradition. When they elevate computing to the status of a college, with departments and a budget, they are declaring it a higher-order domain of knowledge and practice, akin to law or engineering. That decision will inform a fundamental question: whether computing ought to be seen as a superfield that lords over all others, or just a servant of other domains, subordinated to their interests and control. This is, by no happenstance, also the basic question about computing in our society writ large.

When I was an undergraduate at the University of Southern California in the 1990s, students interested in computer science could choose between two different majors: one offered by the College of Letters, Arts and Sciences, and one from the School of Engineering. The two degrees were similar, but many students picked the latter because it didn’t require three semesters’ worth of study of a (human) language, such as French. I chose the former, because I like French.

An American university is organized like this, into divisions that are sometimes called colleges , and sometimes schools . These typically enjoy a good deal of independence to define their courses of study and requirements as well as research practices for their constituent disciplines. Included in this purview: whether a CS student really needs to learn French.

The positioning of computer science at USC was not uncommon at the time. The first academic departments of CS had arisen in the early 1960s, and they typically evolved in one of two ways: as an offshoot of electrical engineering (where transistors got their start), housed in a college of engineering; or as an offshoot of mathematics (where formal logic lived), housed in a college of the arts and sciences. At some universities, including USC, CS found its way into both places at once.

The contexts in which CS matured had an impact on its nature, values, and aspirations. Engineering schools are traditionally the venue for a family of professional disciplines, regulated with licensure requirements for practice. Civil engineers, mechanical engineers, nuclear engineers, and others are tasked to build infrastructure that humankind relies on, and they are expected to solve problems. The liberal-arts field of mathematics, by contrast, is concerned with theory and abstraction. The relationship between the theoretical computer scientists in mathematics and the applied ones in engineers is a little like the relationship between biologists and doctors, or physicists and bridge builders. Keeping applied and pure versions of a discipline separate allows each to focus on its expertise, but limits the degree to which one can learn from the other.

Read: Programmers, stop calling yourself engineers

By the time I arrived at USC, some universities had already started down a different path. In 1988, Carnegie Mellon University created what it says was one of the first dedicated schools of computer science. Georgia Institute of Technology followed two years later. “Computing was going to be a big deal,” says Charles Isbell, a former dean of Georgia Tech’s college of computing and now the provost at the University of Wisconsin-Madison. Emancipating the field from its prior home within the college of engineering gave it room to grow, he told me. Within a decade, Georgia Tech had used this structure to establish new research and teaching efforts in computer graphics, human-computer interaction, and robotics. (I spent 17 years on the faculty there, working for Isbell and his predecessors, and teaching computational media.)

Kavita Bala, Cornell University’s dean of computing, told me that the autonomy and scale of a college allows her to avoid jockeying for influence and resources. MIT’s computing dean, Daniel Huttenlocher, says that the speed at which computing evolves justifies the new structure.

But the computing industry isn’t just fast-moving. It’s also reckless. Technology tycoons say they need space for growth, and warn that too much oversight will stifle innovation. Yet we might all be better off, in certain ways, if their ambitions were held back even just a little. Instead of operating with a deep understanding or respect for law, policy, justice, health, or cohesion, tech firms tend to do whatever they want . Facebook sought growth at all costs, even if its take on connecting people tore society apart . If colleges of computing serve to isolate young, future tech professionals from any classrooms where they might imbibe another school’s culture and values—engineering’s studied prudence, for example, or the humanities’ focus on deliberation—this tendency might only worsen.

Read: The moral failure of computer scientists

When I raised this concern with Isbell, he said that the same reasoning could apply to any influential discipline, including medicine and business. He’s probably right, but that’s cold comfort. The mere fact that universities allow some other powerful fiefdoms to exist doesn’t make computing’s centralization less concerning. Isbell admitted that setting up colleges of computing “absolutely runs the risk” of empowering a generation of professionals who may already be disengaged from consequences to train the next one in their image. Inside a computing college, there may be fewer critics around who can slow down bad ideas. Disengagement might redouble. But he said that dedicated colleges could also have the opposite effect. A traditional CS department in a school of engineering would be populated entirely by computer scientists, while the faculty for a college of computing like the one he led at Georgia Tech might also house lawyers, ethnographers, psychologists, and even philosophers like me. Huttenlocher repeatedly emphasized that the role of the computing college is to foster collaboration between CS and other disciplines across the university. Bala told me that her college was established not to teach CS on its own but to incorporate policy, law, sociology, and other fields into its practice. “I think there are no downsides,” she said.

Mark Guzdial is a former faculty member in Georgia Tech’s computing college, and he now teaches computer science in the University of Michigan’s College of Engineering. At Michigan, CS wasn’t always housed in engineering—Guzdial says it started out inside the philosophy department, as part of the College of Literature, Science and the Arts. Now that college “wants it back,” as one administrator told Guzdial. Having been asked to start a program that teaches computing to liberal-arts students, Guzdial has a new perspective on these administrative structures. He learned that Michigan’s Computer Science and Engineering program and its faculty are “despised” by their counterparts in the humanities and social sciences. “They’re seen as arrogant, narrowly focused on machines rather than people, and unwilling to meet other programs’ needs,” he told me. “I had faculty refuse to talk to me because I was from CSE.”

In other words, there may be downsides just to placing CS within an engineering school, let alone making it an independent college. Left entirely to themselves, computer scientists can forget that computers are supposed to be tools that help people. Georgia Tech’s College of Computing worked “because the culture was always outward-looking. We sought to use computing to solve others’ problems,” Guzdial said. But that may have been a momentary success. Now, at Michigan, he is trying to rebuild computing education from scratch, for students in fields such as French and sociology. He wants them to understand it as a means of self-expression or achieving justice—and not just a way of making software, or money.

Early in my undergraduate career, I decided to abandon CS as a major. Even as an undergraduate, I already had a side job in what would become the internet industry, and computer science, as an academic field, felt theoretical and unnecessary. Reasoning that I could easily get a job as a computer professional no matter what it said on my degree, I decided to study other things while I had the chance.

I have a strong memory of processing the paperwork to drop my computer-science major in college, in favor of philosophy. I walked down a quiet, blue-tiled hallway of the engineering building. All the faculty doors were closed, although the click-click of mechanical keyboards could be heard behind many of them. I knocked on my adviser’s door; she opened it, silently signed my paperwork without inviting me in, and closed the door again. The keyboard tapping resumed.

The whole experience was a product of its time, when computer science was a field composed of oddball characters, working by themselves, and largely disconnected from what was happening in the world at large. Almost 30 years later, their projects have turned into the infrastructure of our daily lives. Want to find a job? That’s LinkedIn. Keep in touch? Gmail, or Instagram. Get news? A website like this one, we hope, but perhaps TikTok. My university uses a software service sold by a tech company to run its courses. Some things have been made easier with computing. Others have been changed to serve another end, like scaling up an online business.

Read: So much for ‘learn to code’

The struggle to figure out the best organizational structure for computing education is, in a way, a microcosm of the struggle under way in the computing sector at large. For decades, computers were tools used to accomplish tasks better and more efficiently. Then computing became the way we work and live. It became our culture, and we began doing what computers made possible, rather than using computers to solve problems defined outside their purview. Tech moguls became famous, wealthy, and powerful. So did CS academics (relatively speaking). The success of the latter—in terms of rising student enrollments, research output, and fundraising dollars—both sustains and justifies their growing influence on campus.

If computing colleges have erred, it may be in failing to exert their power with even greater zeal. For all their talk of growth and expansion within academia, the computing deans’ ambitions seem remarkably modest. Martial Hebert, the dean of Carnegie Mellon’s computing school, almost sounded like he was talking about the liberal arts when he told me that CS is “a rich tapestry of disciplines” that “goes far beyond computers and coding.” But the seven departments in his school correspond to the traditional, core aspects of computing plus computational biology. They do not include history, for example, or finance. Bala and Isbell talked about incorporating law, policy, and psychology into their programs of study, but only in the form of hiring individual professors into more traditional CS divisions. None of the deans I spoke with aspires to launch, say, a department of art within their college of computing, or one of politics, sociology, or film. Their vision does not reflect the idea that computing can or should be a superordinate realm of scholarship, on the order of the arts or engineering. Rather, they are proceeding as though it were a technical school for producing a certain variety of very well-paid professionals. A computing college deserving of the name wouldn’t just provide deeper coursework in CS and its closely adjacent fields; it would expand and reinvent other, seemingly remote disciplines for the age of computation.

Near the end of our conversation, Isbell mentioned the engineering fallacy, which he summarized like this: Someone asks you to solve a problem, and you solve it without asking if it’s a problem worth solving. I used to think computing education might be stuck in a nesting-doll version of the engineer’s fallacy, in which CS departments have been asked to train more software engineers without considering whether more software engineers are really what the world needs. Now I worry that they have a bigger problem to address: how to make computer people care about everything else as much as they care about computers.

This article originally mischaracterized the views of MIT’s computing dean, Daniel Huttenlocher. He did not say that computer science would be held back in an arts-and-science or engineering context, or that it needs to be independent.

Sample 2024

Solved 2024 sample question paper cbse class 12 computer science (083), class 12 - cbse computer science solved question papers, section a (objective type questions 1 mark each).

State True or False:

"In a Python program, if a break statement is given in a nested loop, it terminates the execution of all loops in one go."

Reason — In a Python program, if a break statement is given in a nested loop, it only terminates the execution of the innermost loop where the break statement is encountered. It does not affect the outer loops or any remaining loops in the nested structure.

In a table in MYSQL database, an attribute A of datatype varchar(20) has the value "Keshav". The attribute B of datatype char(20) has value “Meenakshi”. How many characters are occupied by attribute A and attribute B ?

Reason — The datatype VARCHAR(20) is a variable-length character string that can store up to 20 characters. When "Keshav" (6 characters) is assigned to attribute A with VARCHAR(20), it occupies only 6 characters of storage space because VARCHAR adjusts the space based on the actual data length. The datatype CHAR(20) is a fixed-length character string that always occupies the specified amount of space, in this case, 20 characters. When "Meenakshi" (9 characters) is assigned to attribute B with CHAR(20), it still occupies all 20 characters of storage space because CHAR pads the data with spaces to fill up the allocated space, even if the actual data is shorter.

What will be the output of the following statement:

print(3 - 2 ** 2 ** 3 + 99/11)

Reason — In Python, both ** (exponentiation) and / (division) operators have the same level of precedence, which means they are evaluated from left to right if they appear together without parentheses. However, the exponentiation operator ** is right-associative, which means it is evaluated from right to left. In the given expression print(3 - 2 ** 2 ** 3 + 99 / 11) , the innermost exponentiation (2 ** 3) is evaluated first, followed by the outer exponentiation (2 ** 8). Then subtracting the result of the exponentiation from 3, 3 − 256 = −253, then adding the result of the division ((99/11) = 9) to the previously calculated value −253 + 9 = −244.0. The expression is evaluated as follows:

3 - 2 ** 2 ** 3 + 99 / 11

= 3 - 2 ** 8 + 99 / 11

= 3 - 256 + 99 / 11

= 3 - 256 + 9.0

= -253 + 9.0

Select the correct output of the code:

  • PYTHON-IS-Fun

PYTHON-is-Fun

  • Python-is-fun
  • PYTHON-Is -Fun

Reason — The code initializes a string variable s with the value 'Python is fun'. It splits the string into words using split() method, then converts the first word to uppercase ('PYTHON') using indexing and the upper() method, and capitalizes the third word ('Fun') with the capitalize() method. It then joins the modified words with a hyphen ('-') as the separator using the join() method and prints the result.

In MYSQL database, if a table, Alpha has degree 5 and cardinality 3, and another table, Beta has degree 3 and cardinality 5, what will be the degree and cardinality of the Cartesian product of Alpha and Beta?

Reason — When performing a Cartesian product (cross join) of two tables, the resulting table retains all columns from both tables. Therefore, the degree of the Cartesian product is the sum of the degrees of the two tables i.e., Degree of Alpha + Degree of Beta = 5 + 3 = 8. Similarly, the cardinality of the Cartesian product is the total number of rows resulting from the cross join, which is the product of the cardinalities of the two tables, i.e., Cardinality of Alpha * Cardinality of Beta = 3 * 5 = 15.

Riya wants to transfer pictures from her mobile phone to her laptop. She uses Bluetooth Technology to connect two devices. Which type of network will be formed in this case?

Reason — A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within 10 meters. Bluetooth technology is used to create PANs for short-range wireless communication between devices. In Riya's case, she is using Bluetooth to connect her mobile phone to her laptop within a range of about 10 meters, forming a PAN (Personal Area Network).

Which of the following will delete key-value pair for key = “Red” from a dictionary D1 ?

  • delete D1("Red")

del D1["Red"]

  • del.D1["Red"]
  • D1.del["Red"]

Reason — The syntax to delete a key-value pair from a dictionary in Python is : del dictionary_name[key] . Therefore, according to this syntax, del D1["Red"] is correct statement."

Consider the statements given below and then choose the correct output from the given options:

Reason — The code assigns the string "#G20 Presidency" to the variable pride . The slicing operation pride[-2:2:-2] starts from the second last character ("y"), which is at index -2, moves backward by 2 characters at a time due to the step value of -2, and stops before reaching the third character ("G"), which is at index 2. Hence, the output will be 'ceieP0'.

Which of the following statement(s) would give an error during execution of the following code ?

  • Statement 1
  • Statement 2
  • Statement 3

Statement 4

Reason — The statement that would give an error during execution of the given code is Statement 4 (tup[4] = 80). This is because tuples in Python are immutable, meaning we cannot modify the elements of a tuple after it has been created. Here, it is attempting to assign 80 to the element at the index 4 of a tuple, which results in an error because tuples do not support item assignment.

Question 10

What possible outputs(s) will be obtained when the following code is executed?

  • RED* WHITE* BLACK*

WHITE* BLACK*

  • WHITE* WHITE* BLACK* BLACK*
  • YELLOW* WHITE*WHITE* BLACK* BLACK* BLACK*

Reason — random.randint(0, 3) will generate a random integer between 0 and 3. Possible outcomes are 0, 1, 2, or 3. Since 0 and 1 would make the loop invalid, we consider 2 and 3.

When myNumber is 2:

The loop for i in range(1, myNumber) will iterate over range(1, 2), which includes only the number 1. The code will print COLOR[1], which is "WHITE", followed by an asterisk (*). So, one of the possible outputs is: WHITE*

When myNumber is 3:

The loop for i in range(1, myNumber) will iterate over range(1, 3), which includes the numbers 1 and 2. The code will print COLOR[1], which is "WHITE", followed by an asterisk (*), and then move to the next line. Then, it will print COLOR[2], which is "BLACK", followed by an asterisk (*). So, the other possible output is: WHITE* BLACK*

Since the output when myNumber is 3 is among the possible outputs, it's the correct answer.

Question 11

Fill in the blank:

The modem at the sender’s computer end acts as a ............... .

  • Demodulator

Reason — The modem at the sender's computer end acts as a modulator, which is responsible for converting digital data into analog signals for transmission over the communication channel.

Question 12

Consider the code given below:

Which of the following statements should be given in the blank for #Missing Statement, if the output produced is 110?

  • global b = 100
  • global a = 100

Reason — When we want to modify a global variable within a function in Python, we need to use the global keyword followed by the name of the global variable. In this case, since the variable b is declared as a global variable outside the function, we need to declare it as a global variable again inside the function using global b before attempting to modify its value.

Question 13

State whether the following statement is True or False:

An exception may be raised even if the program is syntactically correct.

Reason — An exception can be raised even if the program is syntactically correct. This can happen due to various runtime errors such as division by zero, accessing an index out of range, trying to perform an operation on incompatible data types, etc. These types of errors are detected during the execution of the program and can lead to exceptions being raised, even if the program's syntax is correct.

Question 14

Which of the following statements is FALSE about keys in a relational database?

  • Any candidate key is eligible to become a primary key.
  • A primary key uniquely identifies the tuples in a relation.

A candidate key that is not a primary key is a foreign key.

  • A foreign key is an attribute whose value is derived from the primary key of another relation.

Reason — A candidate key that is not chosen as the primary key remains a candidate key and is not automatically a foreign key.

Question 15

In case of ............... switching, before a communication starts, a dedicated path is identified between the sender and the receiver.

Question 16

Which of the following functions changes the position of file pointer and returns its new position?

Reason — The seek() function in Python is utilised to relocate the file pointer within a file to a specific position. It also accepts an optional second argument, which denotes the starting point for determining this new position.

Question 17

Assertion(A): List is an immutable data type.

Reasoning(R): When an attempt is made to update the value of an immutable variable, the old variable is destroyed and a new variable is created by the same name in memory.

  • Both A and R are true, and R is the correct explanation of A.
  • Both A and R are true, and R is not the correct explanation of A.
  • A is true but R is false.
  • A is false but R is true.

Assertion is false but Reason is true.

Reason — List is a mutable data type. When an attempt is made to update the value of an immutable variable, the old variable is destroyed and a new variable with the updated value is created, and the variable name is reassigned to point to this new object in memory.

Question 18

Assertion(A): Python Standard Library consists of various modules.

Reasoning(R): A function in a module is used to simplify the code and avoids repetition.

Both Assertion and Reason are true but Reason is not the correct explanation for Assertion.

Reason — The Python Standard Library is a collection of modules and packages that provide a wide range of functionalities. A function in a module helps to organize code, simplify it, and avoid repetition which makes programming more efficient.

Section B (Very Short Answer Questions 2 Marks Each)

Question 19(a).

(i) Expand the following terms: POP3, URL

(ii) Give one difference between XML and HTML.

(i) POP3 – Post Office Protocol 3 URL – Uniform Resource Locator

(ii) One difference between XML and HTML:

Question 19(b)

(i) Define the term bandwidth with respect to networks.

(ii) How is http different from https ?

(i) Bandwidth is the maximum rate of data transfer over a given transmission medium or the amount of information that can be transmitted over a network.

(ii) HTTPS (Hyper Text Transfer Protocol Secure) is the protocol that uses SSL (Secure Socket Layer) to encrypt data being transmitted over the Internet. Therefore, HTTPS helps in secure browsing while HTTP does not.

Question 20

The code given below accepts a number as an argument and returns the reverse number. Observe the following code carefully and rewrite it after removing all syntax and logical errors. Underline all the corrections made.

Explanation

  • correction 1 — The correct keyword to define a function is "def" not "define".
  • correction 2 — Instead of "While" (capital W) in the while loop, it should be "while" (lowercase w).
  • correction 3 — The comparison operator "==" in the line rem == num % 10 should be replaced with the assignment operator "=".
  • correction 4 — Moved the "return" statement outside the while loop to return the reversed number after the loop completes.

Question 21(a)

Write a function countNow(PLACES) in Python, that takes the dictionary, PLACES as an argument and displays the names (in uppercase) of the places whose names are longer than 5 characters. For example, Consider the following dictionary:

PLACES = {1: "Delhi", 2: "London", 3: "Paris", 4: "New York", 5:"Doha"}

The output should be:

LONDON NEW YORK

Question 21(b)

Write a function, lenWords(STRING), that takes a string as an argument and returns a tuple containing length of each word of a string. For example, if the string is "Come let us have some fun", the tuple will have (4, 3, 2, 4, 4, 3).

Question 22

Predict the output of the following code:

The code initializes variables S, L, and D, representing a string, list, and dictionary, respectively. The code iterates through the indices of string S. If the index is even, it assigns the popped element from list L as a key in dictionary D with the corresponding character from S as its value. If the index is odd, it assigns the popped element from L as a key in D with the value being the index plus 3. This process continues until the loop ends. After the loop, it prints each key-value pair from D, with keys and values separated by "*".

Question 23(a)

Write the Python statement for each of the following tasks using BUILT-IN functions/methods only:

(i) To insert an element 200 at the third position, in the list L1.

(ii) To check whether a string named, message ends with a full stop / period or not.

Question 23(b)

A list named studentAge stores age of students of a class. Write the Python command to import the required module and (using built-in function) to display the most common age value from the given list.

Question 24(a)

Ms. Shalini has just created a table named “Employee” containing columns Ename, Department and Salary. After creating the table, she realized that she has forgotten to add a primary key column in the table. Help her in writing an SQL command to add a primary key column EmpId of integer type to the table Employee. Thereafter, write the command to insert the following record in the table:

EmpId - 999 Ename - Shweta Department: Production Salary: 26900

SQL command to add primary key in the table:

SQL command for inserting data will be:

Question 24(b)

Zack is working in a database named SPORT, in which he has created a table named “Sports” containing columns SportId, SportName, no_of_players, and category. After creating the table, he realized that the attribute, category has to be deleted from the table and a new attribute TypeSport of data type string has to be added. This attribute TypeSport cannot be left blank. Help Zack write the commands to complete both the tasks.

SQL command to delete the attribute category from the table Sports:

SQL command to add the attribute TypeSport to the table Sports:

Question 25

The code snippet provided defines a function Changer that takes two parameters P and Q, where Q is assigned a default value of 10. Inside the function, P is divided by Q and P is assigned the quotient, and then Q is assigned the remainder of P divided by Q. The modified P value is returned from the function. In the main code, variables A and B are initialized with values 200 and 20, respectively. The Changer function is called first with A and B as arguments, modifying the value of A. The updated values of A and B are then printed with a separator of '$'. Next, the Changer function is called again with only B as an argument, updating B. Finally, the updated values of A and B are printed again with a separator of '$' and an end marker of '###'.

Section C (Short Answer Questions 3 Marks Each)

Question 26.

Predict the output of the Python code given below:

The provided Python code initializes a variable Text1 with the string value "IND-23". Then it initializes an empty string variable Text2 and an index variable I with the value 0. The while loop continues as long as I is less than the length of Text1 . Within the loop, each character of Text1 is checked: if it's a digit (0-9), it increments the digit by 1 and appends it to Text2 ; if it's an uppercase letter (A-Z), it appends the next character in Text1 to Text2 ; otherwise, it appends an asterisk "*". After processing all characters, the final value of Text2 is printed.

Question 27

Consider the table CLUB given below and write the output of the SQL queries that follow.

(i) SELECT COUNT(DISTINCT SPORTS) FROM CLUB;

(ii) SELECT CNAME, SPORTS FROM CLUB WHERE DOAPP<"2006-04-30" AND CNAME LIKE "%NA";

(iii) SELECT CNAME, AGE, PAY FROM CLUB WHERE GENDER = "MALE" AND PAY BETWEEN 1000 AND 1200;

Question 28(a)

Write a function in Python to read a text file, Alpha.txt and displays those lines which begin with the word ‘You’.

The Alpha.txt file includes following data :

Question 28(b)

Write a function, vowelCount() in Python that counts and displays the number of vowels in the text file named Poem.txt.

The Poem.txt file includes following data :

Question 29

Consider the table Personal given below:

Table: Personal

Based on the given table, write SQL queries for the following:

(i) Increase the salary by 5% of personals whose allowance is known.

(ii) Display Name and Total Salary (sum of Salary and Allowance) of all personals. The column heading 'Total Salary' should also be displayed.

(iii) Delete the record of personals who have salary greater than 25000.

Question 30

A list, NList contains following record as list elements:

[City, Country, distance from Delhi]

Each of these records are nested together to form a nested list. Write the following user defined functions in Python to perform the specified operations on the stack named travel.

(i) Push_element(NList) : It takes the nested list as an argument and pushes a list object containing name of the city and country, which are not in India and distance is less than 3500 km from Delhi.

(ii) Pop_element() : It pops the objects from the stack and displays them. Also, the function should display “Stack Empty” when there are no elements in the stack.

For example: If the nested list contains the following data:

NList=[["New York", "U.S.A.", 11734], ["Naypyidaw", "Myanmar", 3219], ["Dubai", "UAE", 2194], ["London", "England", 6693], ["Gangtok", "India", 1580], ["Columbo", "Sri Lanka", 3405]]

The stack should contain:

['Naypyidaw', 'Myanmar'], ['Dubai', 'UAE'], ['Columbo', 'Sri Lanka']

Section D (Long Answer Questions 4 Marks Each)

Question 31.

Consider the tables PRODUCT and BRAND given below:

Table: PRODUCT

Table: BRAND

Write SQL queries for the following:

(i) Display product name and brand name from the tables PRODUCT and BRAND.

(ii) Display the structure of the table PRODUCT.

(iii) Display the average rating of Medimix and Dove brands.

(iv) Display the name, price, and rating of products in descending order of rating.

Question 32

Vedansh is a Python programmer working in a school. For the Annual Sports Event, he has created a csv file named Result.csv, to store the results of students in different sports events. The structure of Result.csv is :

[St_Id, St_Name, Game_Name, Result]

St_Id is Student ID (integer) ST_name is Student Name (string) Game_Name is name of game in which student is participating(string) Result is result of the game whose value can be either 'Won', 'Lost' or 'Tie'.

For efficiently maintaining data of the event, Vedansh wants to write the following user defined functions:

Accept() – to accept a record from the user and add it to the file Result.csv. The column headings should also be added on top of the csv file.

wonCount() – to count the number of students who have won any event.

As a Python expert, help him complete the task.

Python code to accept records from users :

Python code to count the number of students who have won any event :

Section E (Source/Case Based Questions 5 Marks Each)

Question 33.

Meticulous EduServe is an educational organization. It is planning to setup its India campus at Chennai with its head office at Delhi. The Chennai campus has 4 main buildings – ADMIN, ENGINEERING, BUSINESS and MEDIA.

Block to Block distances (in Mtrs.)

Number of computers in each of the blocks/Center is as follows:

(a) Suggest and draw the cable layout to efficiently connect various blocks of buildings within the CHENNAI campus for connecting the digital devices.

(b) Which network device will be used to connect computers in each block to form a local area network?

(c) Which block, in Chennai Campus should be made the server? Justify your answer.

(d) Which fast and very effective wireless transmission medium should preferably be used to connect the head office at DELHI with the campus in CHENNAI?

(e) Is there a requirement of a repeater in the given cable layout? Why/ Why not?

(a) Below diagrams shows the cable layout for connecting CHENNAI campus blocks:

(b) Switch network device will be used to connect computers in each block to form a local area network.

(c) Admin block in chennai Campus should be made the server, as it has maximum number of computers.

(d) Using microwave wireless transmission medium is preferable for connecting the head office in Delhi with the campus in Chennai.

(e) No, a repeater is not required in the given cable layout as the length of transmission medium between any two blocks does not exceed 70m.

Question 34(a)

(i) Differentiate between r+ and w+ file modes in Python.

(ii) Consider a file, SPORT.DAT, containing records of the following structure: [SportName, TeamName, No_Players]

Write a function, copyData(), that reads contents from the file SPORT.DAT and copies the records with Sport name as “Basket Ball” to the file named BASKET.DAT. The function should return the total number of records copied to the file BASKET.DAT.

Question 34(b)

(i) How are text files different from binary files?

(ii) A Binary file, CINEMA.DAT has the following structure:

{MNO:[MNAME, MTYPE]}

MNO – Movie Number MNAME – Movie Name MTYPE is Movie Type

Write a user defined function, findType(mtype), that accepts mtype as parameter and displays all the records from the binary file CINEMA.DAT, that have the value of Movie Type as mtype.

Question 35(a)

(i) Define the term Domain with respect to RDBMS. Give one example to support your answer.

(ii) Kabir wants to write a program in Python to insert the following record in the table named Student in MYSQL database, SCHOOL:

  • rno(Roll number )- integer
  • name(Name) - string
  • DOB (Date of birth) – Date
  • Fee – float

Note the following to establish connectivity between Python and MySQL:

  • Username - root
  • Password - tiger
  • Host - localhost

The values of fields rno, name, DOB and fee has to be accepted from the user. Help Kabir to write the program in Python.

(i) Domain is a set of values from which an attribute can take value in each row. For example, roll no field can have only integer values and so its domain is a set of integer values.

Question 35(b)

(i) Give one difference between alternate key and candidate key.

(ii) Sartaj has created a table named Student in MYSQL database, SCHOOL:

Sartaj, now wants to display the records of students whose fee is more than 5000. Help Sartaj to write the program in Python.

(i) One difference between alternate key and candidate key:

IMAGES

  1. papers on computer science

    phd in computer science question paper

  2. 12th-computer-science-quarterly-exam-model-question-paper-2019-english

    phd in computer science question paper

  3. Advanced Networking 2012-2013 M.Sc Computer Science Semester 1 question

    phd in computer science question paper

  4. Free Download CBSE Question Papers For Class

    phd in computer science question paper

  5. PhD Computer Science entrance exam question papers of University of

    phd in computer science question paper

  6. Bilaspur University Question Paper 2021-2022:B. Sc. Part-II (Two

    phd in computer science question paper

VIDEO

  1. Degree B.Com First Semester 2022 Computer Previous Question Paper| Information Technology

  2. 11th standard computer science question paper in first midterm

  3. 12th Computer Science question paper 2024 JKBOSE

  4. HSLC 2024 Computer science question paper Solution

  5. Computer science Question paper Half yarly, 2nd Unit,Annual Exam 2023-2024 in Bongaigaon district👍👍

  6. class 10th Computer science question paper March 2024

COMMENTS

  1. PDF Entrance Test for 00814 Ph.D. (Computer Science) Programme

    Ph.D. (Computer Science) Programme - 2016 Time : 3 hours Maximum Marks :100 Note : (i) Question paper is comprised of two sections, namely A and B. (ii) Both section A and B are compulsory. (iii) Each section is of 50 marks. (iv) All questions in both sections are compulsory. (v) Use of scientific calculator/any calculator is allowed.

  2. phd

    This means that a successful PhD student should be able to. come up with new ideas to a field of research (normally the one in which the PI works) being able to implement them. It is good for both student and PI if only applicants are accepted for which it is reasonably certain that they can do both.

  3. PDF Entrance Examination

    3. This test is objective type and has two parts: Part A contains 35 questions on Research Method­ ology, and Part B contains 35 questions on Computer Science. Please make sure that all the questions are clearly printed in your paper. 4. Every correct answer gets 1 (one) mark. There is negative marking of 0.33 marks for every wrong answer. 5.

  4. DUET 2020 Ph.D. in Computer Science Question Paper with ...

    DUET 2020 Ph.D. in Computer Science Question Paper with Answer Key PDF (June 9 - Shift 2) DUET 2020 Ph.D. in Computer Science Question paper with answer key pdf conducted on June 9, 2020 in Shift 2 is available for download. The exam was successfully organized by National Testing Agency (NTA). The question paper comprised a total of 50 questions.

  5. PhD

    Three weeks after selecting the papers, turn in a 5-10 page report (not counting references) as well as pointers to any software or hardware artifacts created as part of the project (if any). Approximately one week after submitting the report, make an oral presentation to the panel, followed by questions.

  6. DUET 2021 DU PhD in Computer Science Question Paper with ...

    Collegedunia Team. Content Curator. DUET 2021 DU PhD in Computer Science Question paper with answer key pdf conducted on September 26, 2021 in Shift 2 is available for download. The exam was successfully organized by National Testing Agency (NTA). The question paper comprised a total of 50 questions.

  7. DUET PhD in Computer Science Question Paper with Answer Keys 2019-20

    This examination paper has 100 multiple-choice questions of one mark each, with each question having four choices only one of which is correct. Each incorrect answer fetches -0.25 mark. Suppose you choose all your answers randomly with uniform probability. Then the expected mark you obtain is. 1. 6.25.

  8. PhD Admissions

    The maximum score per course is defined on the transcript in almost all cases. For example, if the maximum score is 100 points per course and you have six courses per semester, your unconverted scale value would be 4800 (8x6x100) for the eight quarters of the undergraduate program. If you obtained 3700 points out of the potential 4800 points ...

  9. PhD students

    Typically PhD in computer science takes 4-5 years to finish. Why PhD in Computer Science With PhD you learn a research aptitude that is finding and defining problem, solving them, and publishing the results. PhD prepares you to do research. ... Question paper as well as answer sheets will be archived in department office after evaluation. Oral ...

  10. PhD

    This includes a cumulative list of requirements to be completed in order for students to confer their PhD degree in Computer Science. For any questions related to CS PhD milestone requirements, please email [email protected]. Note: A student may go to TGR status after all the Ph.D. requirements above have been completed, and ...

  11. PDF THE COMPUTER SCIENCE PhD PROGRAM AT CARNEGIE MELLON UNIVERSITY

    Carnegie Mellon's Computer Science PhD program aims to produce well-educated researchers, teachers, and future leaders in Computer Science. The PhD degree is a certification by the faculty that the student has a broad education in Com-puter Science and has performed original research in a topic at the forefront of the field.

  12. Brown CS: PhD Theses

    PhD; PhD Theses. 2023 Kristo, Ani Engineering a high-performing, learning-enhanced sorting algorithm (3.9 MB) • Tim Kraska, advisor Lee, Jun Ki Explaining Reinforcement Learning Agents by Policy Comparison (5.1 MB) ... Computer Science at Brown University Providence, Rhode Island 02912 USA

  13. PDF PhD Admissions Written Test (Basic)

    PhD Admissions Written Test (Basic) May 11, 2016 (Wednesday), 9:00 am-11:00 noon (Duration: 2 hours) Important Instructions The paper consists of 31 \ ll in the blank(s)" type questions with a total of 36 blanks to ll. All questions are compulsory. Each question may have a single blank or multiple blanks. The rst blank will be represented by

  14. PHD Entrance Previous Year Question Papers Computer Science PDF

    University of Hyderabad PHD Entrance Question Paper Computer Science 2013 Download. University of Hyderabad PHD Entrance Question Paper Computer Science 2014 Download. Sardar Patel University Gujarat PHD Entrance Question Paper Computer Science 2014 Download. Pondicherry University PHD Entrance Question Paper Computer Science 2010 Download.

  15. PHD Entrance Papers PDF Download

    The Maharaja Sayajirao University PHD Entrance Papers: The Maharaja Sayajirao University of Baroda. Kerala University PHD Entrance Papers: Kerala University. Sardar Patel University PHD Entrance Papers: Sardar Patel University Gujarat. Karnataka Samskrit University PHD Entrance Papers: Karnataka Samskrit University.

  16. VTU PhD Entrance Test Computer Science/ Information Science Syllabus 2021

    Jerry Banks, John S. Carson II, Barry L. Nelson, David M. Nicol: Discrete-Event System Simulation, VTU PhD Entrance Test COMPUTER SCIENCE/ INFORMATION SCIENCE Syllabus for 2021 Exams updated as per the latest notification from VTU for research entrance exams to be held in 2020.

  17. PDF DUET 2020 Ph%D% in Computer Science June 9 Shift 2 Question Paper

    DU PhD in Computer Science Topic:- CS PHD S2N PI 1) Consider the following recursive function fun(x, y). What is the value of fun(4, 3) int fun(int x, int y) ... An examination paper has 100 multiple choice questions of three mark each, with each question having four choices. Each incorrect answer fetches -1 mark.

  18. UGC NET CS Previous Year Question Paper

    The page contains solutions of previous year UGC NET CS (Computer Science) papers with explanations, topic wise Quizzes, notes/tutorials and important links for preparation. UGC NET CS 2018 Dec - II. UGC NET CS 2018 July - II. UGC-NET CS 2017 Nov - II. UGC-NET CS 2017 Nov - III.

  19. Entrance Exam Syllabus and Past Papers

    BSc (Hons) Mathematics and Physics The entrance examination is the same as BSc (Hons) Mathematics and Computer Science and will test aptitude for Mathematics at the 12th standard level. For the syllabus and sample question papers, follow the links under BSc (Hons) Mathematics and Computer Science. MSc/PhD Computer Science [2010 question paper ...

  20. Where To Earn A Ph.D. In Computer Science Online In 2024

    Frequently Asked Questions (FAQs) About Earning an Online Ph.D. in Computer Science Can I get a Ph.D. in computer science online? Several schools offer a fully remote or hybrid Ph.D. in computer ...

  21. computer science Latest Research Papers

    Computer science ( CS ) majors are in high demand and account for a large part of national computer and information technology job market applicants. Employment in this sector is projected to grow 12% between 2018 and 2028, which is faster than the average of all other occupations. Published data are available on traditional non-computer ...

  22. VTU PhD Question Papers

    Download Research Methodology PhD Question Paper. Last Updated: Monday, November 13, 2020. VTU PhD question papers all schemes updated upto 2019.

  23. Academics

    The PhD degree is intended primarily for students who desire a career in research, advanced development, or teaching. A broad Computer Science, Engineering, Science background, intensive study, and research experience in a specialized area are the necessary requisites. The degree of Doctor of Philosophy (PhD) is conferred on candidates who have ...

  24. Latest Computer Science Research Topics for 2024

    If you wish to do Ph.D., these can become interesting computer science research topics for a PhD. 4. Security Assurance. As more sensitive data is being transmitted and kept online, security is our main concern. Computer science research is crucial for creating new security systems and tactics that defend against online threats.

  25. Rules & Selection Criteria for Ph.D. Aspirants

    50 Objective Type. Paper-I (Teaching and Research Aptitude) The Ph.D. paper 1 syllabus evaluates candidates on the basis of, teaching and research abilities, cognitive skills, comprehension, analysis, evaluation, reasoning, awareness of higher education processes, and the impact of human-environment interactions on quality of life.

  26. CBSE Class 12 Computer Science Question Paper 2024 with ...

    CBSE will conduct the Computer Science exam on April 2, 2024 from 10:30 AM to 1:30 PM. The total marks for the theory paper are 70. The question paper will contain 20% MCQ-based questions, 40% competency-based questions, and 40% short and long answer type questions. CBSE Class 12 Computer Science Question Paper 2024 with Answer Key

  27. Retrieval-Enhanced Knowledge Editing for Multi-Hop Question Answering

    Large Language Models (LLMs) have shown proficiency in question-answering tasks but often struggle to integrate real-time knowledge updates, leading to potentially outdated or inaccurate responses. This problem becomes even more challenging when dealing with multi-hop questions since they require LLMs to update and integrate multiple knowledge pieces relevant to the questions. To tackle the ...

  28. Synthesize Step-by-Step: Tools, Templates and LLMs as Data Generators

    Understanding data visualizations like charts and plots requires reasoning about both visual elements and numerics. Although strong in extractive questions, current chart visual question answering (chart VQA) models suffer on complex reasoning questions. In this work, we address the lack of reasoning ability by data augmentation. We leverage Large Language Models (LLMs), which have shown to ...

  29. Universities Have a Computer-Science Problem

    The case for teaching coders to speak French. Updated at 5:37 p.m. ET on March 22, 2024. Last year, 18 percent of Stanford University seniors graduated with a degree in computer science, more than ...

  30. Solved 2024 Sample Question Paper CBSE Class 12 Computer Science (083)

    Solved 2024 Sample Question Paper CBSE Class 12 Computer Science (083) Class 12 - CBSE Computer Science Solved Question Papers. Section A (Objective Type Questions 1 Mark Each) Question 1. State True or False: "In a Python program, if a break statement is given in a nested loop, it terminates the execution of all loops in one go."