Sl. No.

Topic

Roll No.

1

What is Artificial intelligence? Can a computer be intelligent? How do you test if an agent is intelligent or not? What do you think will be the consequences if machines can think?

CS08B012

CS11B001

CS11B002

2

The 21st century has seen the growth of internet at an exponential pace. We are now in what is called the “information age”. Can you predict the future of this, 50 years from now, due to continuous development of both hardware and software technologies in this rapidly evolving field of advancing technology? How does the society benefit and react to such changes and challenges, if any?

CS11B003

CS11B004

CS11B005

3

You must have heard the term 'Cloud computing'. Think about how this might influence the way we use our computers. Present you view of the world a few years from now where all data and processing power will be on a cloud.

CS11B006

CS11B007

CS11B008

4

You are the architect of a library user portal, which apart from searching for books, also recommends 'similar' books to you(think 'Amazon'). What are the features you think would make this a good recommender system.

CS11B009

CS11B010

CS11B011

CS11B051

5

You are Nandan Nilekani, the chief architect of the 'Aadhar', the Unique ID project deployed recently in India. Present your ideas and views about the possible challenges and your solutions to the same with regard to this.

CS11B012

CS11B013

CS11B014

CS11B052

6

What do you think will be the characteristic features of next generation gaming? Comment from both the user experience point of view and also from a hardware architecture point of view.

CS11B015

CS11B016

CS11B017

7

The market is today flooded with tablet PCs. Compare and contrast the hardware and software features of a conventional desktop/laptop computer to a tablet PC.[Bonus] What do you think would be the next step from tablet-PCs.

CS11B018

CS11B019

CS11B020

8

You might be aware of 'Free and Open Source' software. Elaborate a few advantages and disadvantages of free and open source software against the conventional proprietary software; from a both economic and social perspective

CS11B021

CS11B022

CS11B023

9

Home automation is picking up rapidly in India today. What are the aspects you would like to be automated and integrated in your dream house? What technology innovation do you think would help you with the same?

CS11B024

CS11B025

CS11B026

CS11B053

10

All of us were victims of computer virus/malware sometime or the other. How does a computer virus work? Could you estimate the economic burden of computer viruses in the world today?

CS11B027

CS11B028

CS11B029

11

Mobile phones were once used just to talk. But today, they have evolved as

CS11B030

multi-functional devices, almost replacing computers at places. Think about five futuristic features that could further reduce the gap between computers and mobile phones. Comment on the feasibility of these features.

CS11B031

CS11B032

12

Swarm robots allow coordinated behavior of a large number of robots, drawing inspiration from the behavior of social insects and ants. Think of five possible applications and challenges for swarm robots?

CS11B033

CS11B034

CS11B035

CS11B054

13

As a manager of a shopping center, you may want to analyze the transaction data to find customer shopping patterns to improve the sales. What kind of patterns would you look out for? List few data mining techniques that help discover these patterns.

CS11B036

CS11B037

CS11B038

CS11B055

14

Viral marketing is an advertising strategy that use social networks/friends'circles to increase awareness of a product. Imagine you have to advertise a product by viral marketing (say a new application in Face book). What are the desirable characteristics for the target profiles

you would select for viral marketing? What do you think plays the key role in identifying such profiles (from a computer science perspective)?

CS11B039

CS11B040

CS11B041

CS09B003

15

Intrusion detection systems are designed to safeguard computers in an organization from malicious activity. What are the different types of IDS available at present? Are they sufficient to protect against all possible attacks? Can you think of few features that could improve the functionality of current IDSes?

CS11B042

CS11B043

CS11B044

16

What are the advantages of wearable computers? Describe two applications of wearable computers. What do you think are the features to be considered in the design of a wearable computer?

CS11B045

CS11B046

CS11B047

17

Search engines have become an inevitable part of everyday life. Describe the working of a search engine. From a user's perspective, what are the features you would desire in an ideal search engine?

CS11B048

CS11B049

CS11B050