SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
USN 10cs52 
f#u t S-y's-te m Software **& 'q.dgdlion.Jr e: 3 hrs. Max. Marksr$bd d rr ^1^. ,a Drr/D t--r, ---^-ai^-^^ ^^t^^a: 
*r{#*  Note: Answer FIVEfull questions, selecting ffi I' .ff rt at least TWO questionsfrom each parl J*.* "* W4 E.) *p^um { # {&k E 'WpM-" pART - A m*""# 
Ela.Effilyrreinstructionformats*auf,ffi-desofSICD(E.*w*(,oMarks) : t a. L2Pryn1##,Lte urDlILrvLILrIl ILrIllIllL) aallu auulsJsur$ TITU(I(JS Ul 'JI-/A-D. fu 
* (rU lYrArKS, 
; b. Writd@QSram in.both SIC and SIC/XE to copy a character strigu.system software' to 
€g another-ff^iry%.ter' 's tring *(* (r0Marks) 
'ffiY e? u, -'#Y 
,ry W 
$= 2 a. Explain the difdruptures and pass-l algorithm of SIC arsql#r. (10 Marks) 
E$ 'tE b. Generate the ssyyrmnbbffffiSSaabbllee and write the object pprrooggrraammfffiofittlfiue folnloowwiinngg SIC/XE pprrooggrr{a}mm:: 
.__i.+ o H (( iiven :that: 4c). LDX ;Wp,on : 00, LDB : %" 68, ADpr: Td'fX = 2C, JLT : 38, STA : 0C. RSUB W ,= c ; SUMdq ;irftT*** START ffi 0 
€E /.&ior*DAd$. t'- ,4 #o 
oc;'E Q #o **I-*nB #TABLE2 
.E a TABLE2 
A E LOOP r y,sDry  TABLE, X 
5 A *KIADD " Trx *#. *" tagLE2,X 
E $E -#* ".& rr,r - / *frop 
gouNT ; .! *4#* +SrA ToffiS$. 
;€B € flrhyp4- oH *s*ourr RRSEUSBw 1 ** Es q- pqpp;;;;; ffij-RESW ;;;-r ---, *gadu 2000 -{ffi 
l cE. ffi *ffiTABLE =+c tra. 
-? .*4t*&4"" 
o JK,C,hffd,iLptrI TABLE2 TLOF'TiJALLLZ Rr(|RESW E,sSwW 2ooo 1tuu u &.*^ *r -/ l. ..1L lI;J vY I W*#**  -6 i r.S.'u* € END FIRST ff o'p s 
.,S tg "rW '%P 
(to Marks) EE - - -;*d3 
'fu,:!ffd , 1 nF r i.r. rr 'E E te q"{Fl* ErL' rlKS I f*,$ ru rWo %" E 3 a. *ffiare ffi 
I control sections? Explain how linking is performed between contr$$tections. 
i€ *LB" .. .9 [ " ffi -Explain 
"--*'#oMarks) 
how multipass assembler handles the following forward reference: do . 
6 =  1 HALFSZ Eeu MAxLEN/2 ' 
. 2 MAXLEN EQU BUFFEND-BUFFER w _* 
;A- : R ,,4U, ""'qq ism * 
fi E .%h3- 
E q"h# 3 PREVBT EQU BUFFER-I '[4d'&- 4 BUFFER RESB 4096 -1:{ 
-.: <*i 'l I''L,I I 'UI 'tljoL' 't''7-, s 
ij 5 BUFFEND EQU 
'< 2 Assume that, when assembler goes to hne 4,location counter contains 1034(Hex). (10 Marks) 
6 
ii 
3 4 a. With source code, explain the working of boot-strap loader. (10 Marks) 
b. Explain machine dependent features of loader. (10 Marks) 
I of2
10css2 
5 a. PART _ B Explain the overview of editing pro.F-- 
i, b. E1-i,r4 editor structure with a diagram. jll Y:::l 
rbi** * "' Explain the tunctions and ;;odilcapabilities of interactive debugging system. [3:ffiffi *#p, Qe Q -J ---""'""'%-d:-' 
n'{i " "#-u * 
6 *d6l*-rExplain the data structures used in macro processor with example. *. WL"ruu b5.'Bxplain machine independent features of macro processor. zu * *-'t/q (r2 Marks) 
".""#: _ d6 / 'f.:**up 
7 a' wrr"t@*rx an!-vac!? M b' Explain the different sections of LEX wlt{Wample. (10 Marks) what are'ie'@fohr* expressions? bxphin the characte"r-sffi; #s;S$'.##Ar;'.]j'nr. _ffp (loMarks) 
, ..,Yflk &^Wo 
* 
8 a. what is shift/redffiarsing? Explain the parsing orilr.ffiT.fi ed= 12+ 13,,and represent using parse tree. *ffr* W ^ b. . a*.& ,,o, w (10n nMra--r,k-s^) |:tff j,T T_bj.s"ity 
inrari,thmetic expressto,r. what is the ambiguity in parsing 2 + 3 x 4? Explain the solution for it. 16."g r,* 
'::';ki- ' ---Q----J L J / a i 't;"fu* .*.,  (l0Marks) 
Jfl;st r L 
i4. , 
. 
vP"sq&tx * 
-*,1* f4* u 
.**drrr. p t"  d 
*od* 
*""' * 
f "fr " df-l ;h' ttr *.".W6s*,! 
"-q h" q  d-  *+ qq,o ' s$ dfl$ JrNl 
e ":' "'"I {* ;3u" l #d- T$$ #,k# I "3 *ss''.-d;* 
d;^q e#"-$*' "*"* 
q&"' ffi"'r @i* e"Wp 
"' 6h 1Whl.d" kW" Ww df - dl" p*."' td e^. 
" "-] * s.s U** k# '*-v"' 
.d"fu 1 .iq-,^,, fu" ""ii'* 
** ,trtK i 
##" 
2 of2
USN 10cs52 
Max. Marks:100 
Fifth Semester B.E. 
L Time: 3 hrs. 
C) o 
o 
4) 
{) L 
4a 
!,) 
:e 
-ro 
ll 
coo 
.=N 
cd* 
itlobo 
oC eO 
=e 
8s 
dX 
oO 
do 
bO0Ec 
.8(B 
'>o# 26r6 
-? o) 5r 
o.A 
o.' 't -: 
o 
A'; 
LO 
.= 
-;o trbo '-C 6= 
tor.> bi 
5=o*: 
J t'i 
C) 
oZ 
o 
o. 
Note: Answer FIVE Ttestions, selecting 
atlesst TWO questions from each purt. 
" ,l;rt.n. 
. 'ART 
- A ';;,,,,. 
' 
I a. Bring olfthe difference between system software and application software. (06 Marks) 
b. With reSp Iq Pentium pro architecture, explain the following : 
i) Instruction format ii) Data format iii) Registers iv) addiessing mode. (10 Marks) 
c. Write sequenie of instruction for SIC to clear 20 by'tes strings to all blanks. (04 Marks) 
2 a. Write the fundamental functions of assembler. (05 Marks) 
b. Define assembler directive. F.xplain the different ty$$sof directives used in SIC machine. 
""'r{|,1, ,:,:,:: (07 Marks) 
c. Write and explain the algoritllm of PASS - 1 of two - pass assembler. (08 Marks) 
, ::,,,,, l, ; "" 3 a. Distinguish between literal and irnmediate operands. How does the assembler handle the 
literal operands? (07 Marks) 
b. What is a program block? How do€Sfu,,asSembler handle the program blocks? (10 Marks) 
c. What is the need of pass - 2 ulg5-rifinsZ Gin3 gNample. (03 Marks) 
4 a. Write a bootstrap loader alg#iftm. Explain it. (08 Marks) 
b. Illustrate linking and relocation with sample programs. (t2 Marks) 
*;":' 
.. PART - B ...;: ' ,, 
5 a. With a neat diagiam, explain the structure of text editor. ,:, (10 Marks) 
b. Explain the features of interactive debugging system. (10 Marks) 
6 a. List maihine independent macro processor features. Explain any two withan example. 
..,.,,,,,,,-4.'','.;.......,: (10 Marks) 
b. jlV,hat are the basic functions of macroprocessor? Explain the various data stfu0Jpres used in 
,,.r, 
,, , 1he implementation of one - pass macroprocessor. ,,r (10 Markg 
'.,.,.;,..,,""7-',,,':,'v. List.and explain the different design options for a macroprocessor. (li'Marks) 
,' b. Explain the structure of LEX program. (05 Marks) 
c. Explain the "communication parser". (03 Marks) 
8 a. Write a LEX program to count the number of vowels and consonants in a given string. 
(06 Marks) 
b. Write a YACC program to recognize the given arithmetic expression containing *, -, l, * 
operator. (08 Marks) 
c. What do you mean by ambiguous grarnmer? How it can be overcome? Illustrate with an 
example. (06Marks) 
*{<r<**
Fifth Semester B.E. 
USN 
Time: 3 hrs. 
la. 
b. 
tion, December 2Ol2 
Systems Software 
Note: Answer FIVEfull questions, selecting 
at least TI'VO questions from euch port. 
10cs52 
Max. Marks:100 
ooo 
o 
() 
E.5 
6e 
st 
- .= a.l dS 
o Y:J 
otr 
-O 
o> 
dX 
oc) 
(bgodi 
>(! 
3() 
.a' 
!) 
FO.,). o'" ()Fl 
rd 
LO 
)E 
>(F ^;o cbo 
0= 
tor->U 
=Oo 
J< 
-i ^i 
o 
o z 
f 
oo 
PART - A 
Explain the instruction formats and addressing modes of SICXE machine architecture. 
(10 Marks) 
Generate the target address for the following ob.ject codes: 
2a. 
b. 
i) 032600 ii) 010030 
Content ofX: 000090; Content ofB:006000; Content ofPC:003000 (04 Marks) 
Write a SIC/XE program to read 100 by.te record from a device 'F5' into BUFFER. Use 
immediate and register-to-register instructions. (06 Marks) 
With an algorithm, explain pass-l of a 2-pass assembler. (10 Marks) 
Generate the object code for each statement and write the object programs for the following 
SIC/XE program. 
Given that: CLEAR: B4, LDA: 00, LDB : 68, ADD : 18, 
TIX:2C, JLT : 38, STA: OC 
SUM START O 
FIRST CLEAR X 
LDA #O +LDB #TOTAL 
BASE TOTAL 
LOOP ADD TABLE, X 
TIX COLINT 
JLT LOOP 
STA TOTAL 
COLTNT RESW 1 
TABLE RESW 2OOO 
TOTAL RESW 1 END FIRST (10 Marks) 
3 a. With required data structures and processing logic, explain the implementation of literals 
within an assembler. (07 Marks) 
b. What are program blocks? How multiple program blocks are handled by an assembler? 
(07 Marks) 
c. Compare a two-pass assembler with a single pass assembler. How forward references are 
handled in one-pass assembler? (06 Marks) 
4 a. Define program relocation. Explain the different ways of doing program relocation. 
b. With an algorithm, explain pass 1 of a linking loader. 
c. Explain the facilities available in MS-DOS linker for program linking. 
(06 Marks) 
(08 Marks) 
(06 Marks) * 
I of2
5a. 
b. 
c. 
6a. 
b. 
c. 
ta. 
b. 
c. Write a short note on parser-lexar communication. (05 Marks) 
8a. 
b. 
PART - B 
With a neat diagram, explain the working of typical editor structure. 
Explain the debugging functions and capabilities of an interactive debugging system. 
List the four tasks of a document editing process. 
Define MACRO. Briefly explain the various data structures used in the design of MACRO 
PROCESSOR. 
With an example, explain generation of unique labels in macros. 
Explain the advantages and disadvantages of general purpose macro processors. (06 Marks) 
With an example, explain the structure of a LEX program. (07 Marks) 
Write regular expressions to identiff the following: 
i) Identifier ii) Decimal number iii) - ve integer iv) + ve fraction (08 Marks) 
c. Write a short note on shift/reduce parsing. 
10cs52 
(08 Marks) 
(08 Marks) 
(04 Marks) 
(08 Marks) 
(06 Marks) 
(07 Marks) 
(05 Marks) 
DefineYACCtools'WhatarethetwotypesofconflictsinYACC?Giveexamples. 
(08 Marks 
Write a YACC program to evaluate an arithmetic expression involving operators *, -, *, y 
2 of2

Mais conteúdo relacionado

Mais procurados (19)

35787646 system-software-lab-manual
35787646 system-software-lab-manual35787646 system-software-lab-manual
35787646 system-software-lab-manual
 
C++ io manipulation
C++ io manipulationC++ io manipulation
C++ io manipulation
 
THE IO LIBRARY in C++
THE IO LIBRARY in C++THE IO LIBRARY in C++
THE IO LIBRARY in C++
 
Managing console
Managing consoleManaging console
Managing console
 
Manipulators
ManipulatorsManipulators
Manipulators
 
Program For Parsing2
Program For Parsing2Program For Parsing2
Program For Parsing2
 
SQL Pattern Matching – should I start using it?
SQL Pattern Matching – should I start using it?SQL Pattern Matching – should I start using it?
SQL Pattern Matching – should I start using it?
 
StackOverflow
StackOverflowStackOverflow
StackOverflow
 
Advance C++notes
Advance C++notesAdvance C++notes
Advance C++notes
 
Lists
ListsLists
Lists
 
Assembler
AssemblerAssembler
Assembler
 
Assembler
AssemblerAssembler
Assembler
 
Cp unit 3
Cp unit 3Cp unit 3
Cp unit 3
 
C - aptitude3
C - aptitude3C - aptitude3
C - aptitude3
 
Embedded C - Lecture 4
Embedded C - Lecture 4Embedded C - Lecture 4
Embedded C - Lecture 4
 
Alp 05
Alp 05Alp 05
Alp 05
 
Polymorphic Table Functions in 18c
Polymorphic Table Functions in 18cPolymorphic Table Functions in 18c
Polymorphic Table Functions in 18c
 
Journey of Bsdconv
Journey of BsdconvJourney of Bsdconv
Journey of Bsdconv
 
Cic 5
Cic 5Cic 5
Cic 5
 

Semelhante a System software

Vtu cs 7th_sem_question_papers
Vtu cs 7th_sem_question_papersVtu cs 7th_sem_question_papers
Vtu cs 7th_sem_question_papersmegharajk
 

Semelhante a System software (20)

5th Semester (June; July-2015) Computer Science and Information Science Engin...
5th Semester (June; July-2015) Computer Science and Information Science Engin...5th Semester (June; July-2015) Computer Science and Information Science Engin...
5th Semester (June; July-2015) Computer Science and Information Science Engin...
 
7th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
7th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...7th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
7th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
 
5th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
5th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...5th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
5th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
 
6th Semester (June; July-2015) Computer Science and Information Science Engin...
6th Semester (June; July-2015) Computer Science and Information Science Engin...6th Semester (June; July-2015) Computer Science and Information Science Engin...
6th Semester (June; July-2015) Computer Science and Information Science Engin...
 
Vtu cs 7th_sem_question_papers
Vtu cs 7th_sem_question_papersVtu cs 7th_sem_question_papers
Vtu cs 7th_sem_question_papers
 
6th Semester (June; July-2014) Computer Science and Information Science Engin...
6th Semester (June; July-2014) Computer Science and Information Science Engin...6th Semester (June; July-2014) Computer Science and Information Science Engin...
6th Semester (June; July-2014) Computer Science and Information Science Engin...
 
7th Semester Electronics and Communication Engineering (Dec-2015; Jan-2016) Q...
7th Semester Electronics and Communication Engineering (Dec-2015; Jan-2016) Q...7th Semester Electronics and Communication Engineering (Dec-2015; Jan-2016) Q...
7th Semester Electronics and Communication Engineering (Dec-2015; Jan-2016) Q...
 
5th Semester (June; July-2014) Computer Science and Information Science Engin...
5th Semester (June; July-2014) Computer Science and Information Science Engin...5th Semester (June; July-2014) Computer Science and Information Science Engin...
5th Semester (June; July-2014) Computer Science and Information Science Engin...
 
7th Semester (June; July-2015) Computer Science and Information Science Engin...
7th Semester (June; July-2015) Computer Science and Information Science Engin...7th Semester (June; July-2015) Computer Science and Information Science Engin...
7th Semester (June; July-2015) Computer Science and Information Science Engin...
 
5th Semester (June-2016) Computer Science and Information Science Engineering...
5th Semester (June-2016) Computer Science and Information Science Engineering...5th Semester (June-2016) Computer Science and Information Science Engineering...
5th Semester (June-2016) Computer Science and Information Science Engineering...
 
6th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
6th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...6th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
6th Semester (Dec-2015; Jan-2016) Computer Science and Information Science En...
 
5th semester Computer Science and Information Science Engg (2013 December) Qu...
5th semester Computer Science and Information Science Engg (2013 December) Qu...5th semester Computer Science and Information Science Engg (2013 December) Qu...
5th semester Computer Science and Information Science Engg (2013 December) Qu...
 
1st Semester M Tech: Computer Science and Engineering (Jun-2016) Question Pa...
1st  Semester M Tech: Computer Science and Engineering (Jun-2016) Question Pa...1st  Semester M Tech: Computer Science and Engineering (Jun-2016) Question Pa...
1st Semester M Tech: Computer Science and Engineering (Jun-2016) Question Pa...
 
1st and 2nd Semester M Tech: Computer Science and Engineering (Dec-2015; Jan-...
1st and 2nd Semester M Tech: Computer Science and Engineering (Dec-2015; Jan-...1st and 2nd Semester M Tech: Computer Science and Engineering (Dec-2015; Jan-...
1st and 2nd Semester M Tech: Computer Science and Engineering (Dec-2015; Jan-...
 
3rd Semester (June; July-2014) Civil Engineering Question Papers
3rd Semester (June; July-2014) Civil Engineering Question Papers3rd Semester (June; July-2014) Civil Engineering Question Papers
3rd Semester (June; July-2014) Civil Engineering Question Papers
 
7th Semester (June; July-2014) Computer Science and Information Science Engin...
7th Semester (June; July-2014) Computer Science and Information Science Engin...7th Semester (June; July-2014) Computer Science and Information Science Engin...
7th Semester (June; July-2014) Computer Science and Information Science Engin...
 
2013-June: 5th Semester CSE / ISE Question Papers
2013-June: 5th  Semester CSE / ISE Question Papers2013-June: 5th  Semester CSE / ISE Question Papers
2013-June: 5th Semester CSE / ISE Question Papers
 
5th Semester CS / IS (2013-June) Question Papers
5th Semester CS / IS (2013-June) Question Papers5th Semester CS / IS (2013-June) Question Papers
5th Semester CS / IS (2013-June) Question Papers
 
8th Semester (June; July-2015) Computer Science and Information Science Engin...
8th Semester (June; July-2015) Computer Science and Information Science Engin...8th Semester (June; July-2015) Computer Science and Information Science Engin...
8th Semester (June; July-2015) Computer Science and Information Science Engin...
 
7th CS & IS question papers December 2013-14
7th CS & IS question papers December 2013-147th CS & IS question papers December 2013-14
7th CS & IS question papers December 2013-14
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

System software

  • 1. USN 10cs52 f#u t S-y's-te m Software **& 'q.dgdlion.Jr e: 3 hrs. Max. Marksr$bd d rr ^1^. ,a Drr/D t--r, ---^-ai^-^^ ^^t^^a: *r{#* Note: Answer FIVEfull questions, selecting ffi I' .ff rt at least TWO questionsfrom each parl J*.* "* W4 E.) *p^um { # {&k E 'WpM-" pART - A m*""# Ela.Effilyrreinstructionformats*auf,ffi-desofSICD(E.*w*(,oMarks) : t a. L2Pryn1##,Lte urDlILrvLILrIl ILrIllIllL) aallu auulsJsur$ TITU(I(JS Ul 'JI-/A-D. fu * (rU lYrArKS, ; b. Writd@QSram in.both SIC and SIC/XE to copy a character strigu.system software' to €g another-ff^iry%.ter' 's tring *(* (r0Marks) 'ffiY e? u, -'#Y ,ry W $= 2 a. Explain the difdruptures and pass-l algorithm of SIC arsql#r. (10 Marks) E$ 'tE b. Generate the ssyyrmnbbffffiSSaabbllee and write the object pprrooggrraammfffiofittlfiue folnloowwiinngg SIC/XE pprrooggrr{a}mm:: .__i.+ o H (( iiven :that: 4c). LDX ;Wp,on : 00, LDB : %" 68, ADpr: Td'fX = 2C, JLT : 38, STA : 0C. RSUB W ,= c ; SUMdq ;irftT*** START ffi 0 €E /.&ior*DAd$. t'- ,4 #o oc;'E Q #o **I-*nB #TABLE2 .E a TABLE2 A E LOOP r y,sDry TABLE, X 5 A *KIADD " Trx *#. *" tagLE2,X E $E -#* ".& rr,r - / *frop gouNT ; .! *4#* +SrA ToffiS$. ;€B € flrhyp4- oH *s*ourr RRSEUSBw 1 ** Es q- pqpp;;;;; ffij-RESW ;;;-r ---, *gadu 2000 -{ffi l cE. ffi *ffiTABLE =+c tra. -? .*4t*&4"" o JK,C,hffd,iLptrI TABLE2 TLOF'TiJALLLZ Rr(|RESW E,sSwW 2ooo 1tuu u &.*^ *r -/ l. ..1L lI;J vY I W*#** -6 i r.S.'u* € END FIRST ff o'p s .,S tg "rW '%P (to Marks) EE - - -;*d3 'fu,:!ffd , 1 nF r i.r. rr 'E E te q"{Fl* ErL' rlKS I f*,$ ru rWo %" E 3 a. *ffiare ffi I control sections? Explain how linking is performed between contr$$tections. i€ *LB" .. .9 [ " ffi -Explain "--*'#oMarks) how multipass assembler handles the following forward reference: do . 6 = 1 HALFSZ Eeu MAxLEN/2 ' . 2 MAXLEN EQU BUFFEND-BUFFER w _* ;A- : R ,,4U, ""'qq ism * fi E .%h3- E q"h# 3 PREVBT EQU BUFFER-I '[4d'&- 4 BUFFER RESB 4096 -1:{ -.: <*i 'l I''L,I I 'UI 'tljoL' 't''7-, s ij 5 BUFFEND EQU '< 2 Assume that, when assembler goes to hne 4,location counter contains 1034(Hex). (10 Marks) 6 ii 3 4 a. With source code, explain the working of boot-strap loader. (10 Marks) b. Explain machine dependent features of loader. (10 Marks) I of2
  • 2. 10css2 5 a. PART _ B Explain the overview of editing pro.F-- i, b. E1-i,r4 editor structure with a diagram. jll Y:::l rbi** * "' Explain the tunctions and ;;odilcapabilities of interactive debugging system. [3:ffiffi *#p, Qe Q -J ---""'""'%-d:-' n'{i " "#-u * 6 *d6l*-rExplain the data structures used in macro processor with example. *. WL"ruu b5.'Bxplain machine independent features of macro processor. zu * *-'t/q (r2 Marks) ".""#: _ d6 / 'f.:**up 7 a' wrr"t@*rx an!-vac!? M b' Explain the different sections of LEX wlt{Wample. (10 Marks) what are'ie'@fohr* expressions? bxphin the characte"r-sffi; #s;S$'.##Ar;'.]j'nr. _ffp (loMarks) , ..,Yflk &^Wo * 8 a. what is shift/redffiarsing? Explain the parsing orilr.ffiT.fi ed= 12+ 13,,and represent using parse tree. *ffr* W ^ b. . a*.& ,,o, w (10n nMra--r,k-s^) |:tff j,T T_bj.s"ity inrari,thmetic expressto,r. what is the ambiguity in parsing 2 + 3 x 4? Explain the solution for it. 16."g r,* '::';ki- ' ---Q----J L J / a i 't;"fu* .*., (l0Marks) Jfl;st r L i4. , . vP"sq&tx * -*,1* f4* u .**drrr. p t" d *od* *""' * f "fr " df-l ;h' ttr *.".W6s*,! "-q h" q d- *+ qq,o ' s$ dfl$ JrNl e ":' "'"I {* ;3u" l #d- T$$ #,k# I "3 *ss''.-d;* d;^q e#"-$*' "*"* q&"' ffi"'r @i* e"Wp "' 6h 1Whl.d" kW" Ww df - dl" p*."' td e^. " "-] * s.s U** k# '*-v"' .d"fu 1 .iq-,^,, fu" ""ii'* ** ,trtK i ##" 2 of2
  • 3. USN 10cs52 Max. Marks:100 Fifth Semester B.E. L Time: 3 hrs. C) o o 4) {) L 4a !,) :e -ro ll coo .=N cd* itlobo oC eO =e 8s dX oO do bO0Ec .8(B '>o# 26r6 -? o) 5r o.A o.' 't -: o A'; LO .= -;o trbo '-C 6= tor.> bi 5=o*: J t'i C) oZ o o. Note: Answer FIVE Ttestions, selecting atlesst TWO questions from each purt. " ,l;rt.n. . 'ART - A ';;,,,,. ' I a. Bring olfthe difference between system software and application software. (06 Marks) b. With reSp Iq Pentium pro architecture, explain the following : i) Instruction format ii) Data format iii) Registers iv) addiessing mode. (10 Marks) c. Write sequenie of instruction for SIC to clear 20 by'tes strings to all blanks. (04 Marks) 2 a. Write the fundamental functions of assembler. (05 Marks) b. Define assembler directive. F.xplain the different ty$$sof directives used in SIC machine. ""'r{|,1, ,:,:,:: (07 Marks) c. Write and explain the algoritllm of PASS - 1 of two - pass assembler. (08 Marks) , ::,,,,, l, ; "" 3 a. Distinguish between literal and irnmediate operands. How does the assembler handle the literal operands? (07 Marks) b. What is a program block? How do€Sfu,,asSembler handle the program blocks? (10 Marks) c. What is the need of pass - 2 ulg5-rifinsZ Gin3 gNample. (03 Marks) 4 a. Write a bootstrap loader alg#iftm. Explain it. (08 Marks) b. Illustrate linking and relocation with sample programs. (t2 Marks) *;":' .. PART - B ...;: ' ,, 5 a. With a neat diagiam, explain the structure of text editor. ,:, (10 Marks) b. Explain the features of interactive debugging system. (10 Marks) 6 a. List maihine independent macro processor features. Explain any two withan example. ..,.,,,,,,,-4.'','.;.......,: (10 Marks) b. jlV,hat are the basic functions of macroprocessor? Explain the various data stfu0Jpres used in ,,.r, ,, , 1he implementation of one - pass macroprocessor. ,,r (10 Markg '.,.,.;,..,,""7-',,,':,'v. List.and explain the different design options for a macroprocessor. (li'Marks) ,' b. Explain the structure of LEX program. (05 Marks) c. Explain the "communication parser". (03 Marks) 8 a. Write a LEX program to count the number of vowels and consonants in a given string. (06 Marks) b. Write a YACC program to recognize the given arithmetic expression containing *, -, l, * operator. (08 Marks) c. What do you mean by ambiguous grarnmer? How it can be overcome? Illustrate with an example. (06Marks) *{<r<**
  • 4. Fifth Semester B.E. USN Time: 3 hrs. la. b. tion, December 2Ol2 Systems Software Note: Answer FIVEfull questions, selecting at least TI'VO questions from euch port. 10cs52 Max. Marks:100 ooo o () E.5 6e st - .= a.l dS o Y:J otr -O o> dX oc) (bgodi >(! 3() .a' !) FO.,). o'" ()Fl rd LO )E >(F ^;o cbo 0= tor->U =Oo J< -i ^i o o z f oo PART - A Explain the instruction formats and addressing modes of SICXE machine architecture. (10 Marks) Generate the target address for the following ob.ject codes: 2a. b. i) 032600 ii) 010030 Content ofX: 000090; Content ofB:006000; Content ofPC:003000 (04 Marks) Write a SIC/XE program to read 100 by.te record from a device 'F5' into BUFFER. Use immediate and register-to-register instructions. (06 Marks) With an algorithm, explain pass-l of a 2-pass assembler. (10 Marks) Generate the object code for each statement and write the object programs for the following SIC/XE program. Given that: CLEAR: B4, LDA: 00, LDB : 68, ADD : 18, TIX:2C, JLT : 38, STA: OC SUM START O FIRST CLEAR X LDA #O +LDB #TOTAL BASE TOTAL LOOP ADD TABLE, X TIX COLINT JLT LOOP STA TOTAL COLTNT RESW 1 TABLE RESW 2OOO TOTAL RESW 1 END FIRST (10 Marks) 3 a. With required data structures and processing logic, explain the implementation of literals within an assembler. (07 Marks) b. What are program blocks? How multiple program blocks are handled by an assembler? (07 Marks) c. Compare a two-pass assembler with a single pass assembler. How forward references are handled in one-pass assembler? (06 Marks) 4 a. Define program relocation. Explain the different ways of doing program relocation. b. With an algorithm, explain pass 1 of a linking loader. c. Explain the facilities available in MS-DOS linker for program linking. (06 Marks) (08 Marks) (06 Marks) * I of2
  • 5. 5a. b. c. 6a. b. c. ta. b. c. Write a short note on parser-lexar communication. (05 Marks) 8a. b. PART - B With a neat diagram, explain the working of typical editor structure. Explain the debugging functions and capabilities of an interactive debugging system. List the four tasks of a document editing process. Define MACRO. Briefly explain the various data structures used in the design of MACRO PROCESSOR. With an example, explain generation of unique labels in macros. Explain the advantages and disadvantages of general purpose macro processors. (06 Marks) With an example, explain the structure of a LEX program. (07 Marks) Write regular expressions to identiff the following: i) Identifier ii) Decimal number iii) - ve integer iv) + ve fraction (08 Marks) c. Write a short note on shift/reduce parsing. 10cs52 (08 Marks) (08 Marks) (04 Marks) (08 Marks) (06 Marks) (07 Marks) (05 Marks) DefineYACCtools'WhatarethetwotypesofconflictsinYACC?Giveexamples. (08 Marks Write a YACC program to evaluate an arithmetic expression involving operators *, -, *, y 2 of2