Sl. No. | Topic | Roll No. |
1 | What is Artificial intelligence? Can a computer be intelligent? How do you test if an agent is intelligent or not? What do you think will be the consequences if machines can think? | CS08B012 CS11B001 CS11B002 |
2 | The 21st century has seen the growth of internet at an exponential pace. We are now in what is called the “information age”. Can you predict the future of this, 50 years from now, due to continuous development of both hardware and software technologies in this rapidly evolving field of advancing technology? How does the society benefit and react to such changes and challenges, if any? | CS11B003 CS11B004 CS11B005 |
3 | You must have heard the term 'Cloud computing'. Think about how this might influence the way we use our computers. Present you view of the world a few years from now where all data and processing power will be on a cloud. | CS11B006 CS11B007 CS11B008 |
4 | You are the architect of a library user portal, which apart from searching for books, also recommends 'similar' books to you(think 'Amazon'). What are the features you think would make this a good recommender system. | CS11B009 CS11B010 CS11B011 CS11B051 |
5 | You are Nandan Nilekani, the chief architect of the 'Aadhar', the Unique ID project deployed recently in India. Present your ideas and views about the possible challenges and your solutions to the same with regard to this. | CS11B012 CS11B013 CS11B014 CS11B052 |
6 | What do you think will be the characteristic features of next generation gaming? Comment from both the user experience point of view and also from a hardware architecture point of view. | CS11B015 CS11B016 CS11B017 |
7 | The market is today flooded with tablet PCs. Compare and contrast the hardware and software features of a conventional desktop/laptop computer to a tablet PC.[Bonus] What do you think would be the next step from tablet-PCs. | CS11B018 CS11B019 CS11B020 |
8 | You might be aware of 'Free and Open Source' software. Elaborate a few advantages and disadvantages of free and open source software against the conventional proprietary software; from a both economic and social perspective | CS11B021 CS11B022 CS11B023 |
9 | Home automation is picking up rapidly in India today. What are the aspects you would like to be automated and integrated in your dream house? What technology innovation do you think would help you with the same? | CS11B024 CS11B025 CS11B026 CS11B053 |
10 | All of us were victims of computer virus/malware sometime or the other. How does a computer virus work? Could you estimate the economic burden of computer viruses in the world today? | CS11B027 CS11B028 CS11B029 |
11 | Mobile phones were once used just to talk. But today, they have evolved as | CS11B030 |
multi-functional devices, almost replacing computers at places. Think about five futuristic features that could further reduce the gap between computers and mobile phones. Comment on the feasibility of these features. | CS11B031 CS11B032 | |
12 | Swarm robots allow coordinated behavior of a large number of robots, drawing inspiration from the behavior of social insects and ants. Think of five possible applications and challenges for swarm robots? | CS11B033 CS11B034 CS11B035 CS11B054 |
13 | As a manager of a shopping center, you may want to analyze the transaction data to find customer shopping patterns to improve the sales. What kind of patterns would you look out for? List few data mining techniques that help discover these patterns. | CS11B036 CS11B037 CS11B038 CS11B055 |
14 | Viral marketing is an advertising strategy that use social networks/friends'circles to increase awareness of a product. Imagine you have to advertise a product by viral marketing (say a new application in Face book). What are the desirable characteristics for the target profiles you would select for viral marketing? What do you think plays the key role in identifying such profiles (from a computer science perspective)? | CS11B039 CS11B040 CS11B041 CS09B003 |
15 | Intrusion detection systems are designed to safeguard computers in an organization from malicious activity. What are the different types of IDS available at present? Are they sufficient to protect against all possible attacks? Can you think of few features that could improve the functionality of current IDSes? | CS11B042 CS11B043 CS11B044 |
16 | What are the advantages of wearable computers? Describe two applications of wearable computers. What do you think are the features to be considered in the design of a wearable computer? | CS11B045 CS11B046 CS11B047 |
17 | Search engines have become an inevitable part of everyday life. Describe the working of a search engine. From a user's perspective, what are the features you would desire in an ideal search engine? | CS11B048 CS11B049 CS11B050 |