SlideShare a Scribd company logo
No. of Printed Pages : 7                               CS-601

                BACHELOR IN COMPUTER
-7r
00
                    APPLICATIONS
O                   Term-End Examination
O
                             June, 2011
       CS-601 : DIFFERENTIAL AND INTEGRAL
          CALCULUS WITH APPLICATIONS

  Time : 2 hours                            Maximum Marks : 75
  Note : Question no. 1 is compulsory. Attempt any three more
           questions from question No. 2 to 6. Use of calculator is
           permitted.

 1.     (a) Select the correct answer from the four given        6
              alternatives for each part given below :


                                 x2 —1
              (i)   If f (x) —         , then domain of the
                                  x+1
                    function is :

                    (A) R, the set of real numbers.

                    (B)      —1, ]

                    (C) All real numbers except - 1

                    (D) none of these


  CS-601                            1                      P.T.O.
(ii) If y = x tan -1 x, then dY -
                                      dx
                                                  2
                                              X
                 (A) x2 tan-ix +         II
                                     V1+x2

                                     x
                 (B) tan-1 x+                 2
                                    1+x
                                     x
                 (C) tan-1 x- 1+x 2

                 (D) (tan - 1x)2.

                 d ex
         (iii)      —) =
                 dx x

                       ex                             ex  1
                 (A)                (B)               - + - ex
                                                       2
                                                       -
                                                          x

                       1 x ex
                 (C)   - e ---y (D) ex log x
                       x

         (iv)    Jcosec (3x + 4) cot (3x + 4) dx =
                       1
                 (A) 2 cosec (3x +4) cot (3x +4) + C
                     1
                 (B) - cosec (3x + 4) + C
                     3
                       _1
                 (C)        cosec (3x +4) + C
                 (D) log cos (3x + 4) C

CS-601                       2
(v) If f (x) = (x —1) ex +1 and x 3 0 then
              f(x) is :
              (A) increasing function
              (B) decreasing function
              (C) Strictly increasing function
              (D) Strictly decreasing function

                 Lim sin 4x
         (vi)   x           is :
                        x

                (A) 0                    (B)   00
                (C) 1                    (D) 4
    (b) Fill in the blanks :


         (i) f                 dx
             0 NI -

                 Lim x 2
                x -4 0 sin X2

                       x
         (iii) . 2 sin 2 cos — dx =
               1       —
                             2
         (iv) The minimum value of the function
              f (x)= (2x —1)2 +3 is

                                      dy
         (v)    If y = cos x2, then      =
                                      dx
         (vi) The equation of the normal to the
              curve y=x3 at (1, 1) is

CS-601                         3                    P.T.O.
(c)   For each of the following functions, find      2
          whether the function is monotonically
          increasing or monotonically decreasing or
          neither, on given interval.
          (i)     f (x) = 2x3 — 8 on [0, 3]

                  f (x) = 2 sin x on [0,
                                            2

    (d)   If x= tan (in y), prove that                   4
                          (1 + x2) yi =y.
          Using Leibnitz theorem, find yn +1.
    (e)   The perimeter of a rectangle is 100 m. Find    3
          the length of its sides when the area is
          maximum.
    (f)   Find the value of 'b' for which the function   3

                    {
                         x 2+1 when x < 2
          f (x)              2
                        bx+- when x 2
                           x

          is continuous at x= 2.
    (g)   Evaluate ;                                     3

                                            3
            (logx3+9sin3 x) [27 sin2x cosx+ — ] dx


                         Lim 11x2 — 6x+8
    (h)   Evaluate                                       3
                         -- 9x2 —5x+5
                           >04


CS-601                          4
2.   (a) For what value of k is the function ;          3+4+4+4

                     2x+1 , x 5_ 2
           f (x)    Ix+k , x > 2

           is continuous at x = 2

              dy
     (b) Find — if y= sin x sin 2x sin 3x
              dx

     (c)   Evaluate ; fx3 log 2x dx

                        r   _      V x
                                     cos
     (d) Prove that                            dx = —
                                          c;;X
                                Vsin x+ fc-         4


3.   (a) Find the nth derivative of the following
          function f (x) = ( ax + b)m where a and b
          are real numbers and m is a positive integer.
     (b) Can Rolle's Theorem be applied to the
         following function ?                5+5+5
                 y = sin2x on the interval [0, 14 Find
           'C' such that f' (C) = 0, in case Rolle's
           theorem can be applied.
     (c)   Integrate any one of the following :
                   (x3 e2x dx

                   r1
           (ii)         dx
                   e +1

CS-601                           5                       P.T.O.
4
4.                  2x
     (a) Evaluate f e dx                             5+5+5
                 0
     (b)   Compute the area lying between the
           parabola y =4x — x2 and the line y = x.

     (c)   If z = eax + by f (ax — by), prove that
                   az   az
                 b — +a — = 2 abz
                   ax   ay


5.   (a) Solve any one of the following :            5+5+5

                   dy
           (i)   xy— =1+x+y+xy
                   dx

                  dy         X
                                 2
                                     +y 2
           (u) — =
               dx                xy

     (b)   For what value of 'k' is the following
           function continuous at x=1 ?

                    X 2 -1           X#1
           f (x) = {x -1 '
                      k    x =1

     (c)   If u =f (x—y, y — z, z— x), prove that
           au+ + =0
              au au
           ax ay az

CS-601                                 6
6.   (a) Calculate the radius and the height of a right
          circular cylinder of maximum volume which
          can be cut from a sphere of radius R.
     (b) Solve any one of the following :             5+5+5

          (i)    dY - e2x -3Y + 4x2 e - 3Y
                 dx -
          (ii)   (xy + x) dy - (xy + y) dx = 0
     (c) A river is 80 ft wide. The depth in feet at a
          distance x ft, from one bank is given by the
          following table

           x :   0   10 20 30 40 50 60 70 80
           d:    0    4 7 9 12 15 14 8 3

                                     1
          Using Simpson's           3rd      rule, find

          approximately the area of the cross-section.




CS-601                        7

More Related Content

What's hot

Pc12 sol c04_review
Pc12 sol c04_reviewPc12 sol c04_review
Pc12 sol c04_reviewGarden City
 
Summary of Integration Methods
Summary of Integration MethodsSummary of Integration Methods
Summary of Integration MethodsSilvius
 
Definite Integral Review
Definite Integral ReviewDefinite Integral Review
Definite Integral ReviewSharon Henry
 
Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia
Hope Scott
 
Remedial mtk
Remedial mtkRemedial mtk
Remedial mtkAzizaty
 
Number Theory for Security
Number Theory for SecurityNumber Theory for Security
Number Theory for Security
Abhijit Mondal
 
C++ ammar .s.q
C++  ammar .s.qC++  ammar .s.q
C++ ammar .s.q
ammarsalem5
 
Cea0001 ppt project
Cea0001 ppt projectCea0001 ppt project
Cea0001 ppt project
cea0001
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
David Evans
 
4.3 The Definite Integral
4.3 The Definite Integral4.3 The Definite Integral
4.3 The Definite IntegralSharon Henry
 
Pc12 sol c03_review
Pc12 sol c03_reviewPc12 sol c03_review
Pc12 sol c03_reviewGarden City
 
Lesson 25: Evaluating Definite Integrals (slides)
Lesson 25: Evaluating Definite Integrals (slides)Lesson 25: Evaluating Definite Integrals (slides)
Lesson 25: Evaluating Definite Integrals (slides)
Matthew Leingang
 
Introduction to inverse problems
Introduction to inverse problemsIntroduction to inverse problems
Introduction to inverse problemsDelta Pi Systems
 
Tutorial 1(julai2006)
Tutorial 1(julai2006)Tutorial 1(julai2006)
Tutorial 1(julai2006)wsf6276
 

What's hot (18)

C3 January 2012 QP
C3 January 2012 QPC3 January 2012 QP
C3 January 2012 QP
 
Pc12 sol c04_review
Pc12 sol c04_reviewPc12 sol c04_review
Pc12 sol c04_review
 
Summary of Integration Methods
Summary of Integration MethodsSummary of Integration Methods
Summary of Integration Methods
 
Functions
FunctionsFunctions
Functions
 
Definite Integral Review
Definite Integral ReviewDefinite Integral Review
Definite Integral Review
 
Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia
 
Remedial mtk
Remedial mtkRemedial mtk
Remedial mtk
 
Number Theory for Security
Number Theory for SecurityNumber Theory for Security
Number Theory for Security
 
C++ ammar .s.q
C++  ammar .s.qC++  ammar .s.q
C++ ammar .s.q
 
Cea0001 ppt project
Cea0001 ppt projectCea0001 ppt project
Cea0001 ppt project
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Algorithms DM
Algorithms DMAlgorithms DM
Algorithms DM
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
 
4.3 The Definite Integral
4.3 The Definite Integral4.3 The Definite Integral
4.3 The Definite Integral
 
Pc12 sol c03_review
Pc12 sol c03_reviewPc12 sol c03_review
Pc12 sol c03_review
 
Lesson 25: Evaluating Definite Integrals (slides)
Lesson 25: Evaluating Definite Integrals (slides)Lesson 25: Evaluating Definite Integrals (slides)
Lesson 25: Evaluating Definite Integrals (slides)
 
Introduction to inverse problems
Introduction to inverse problemsIntroduction to inverse problems
Introduction to inverse problems
 
Tutorial 1(julai2006)
Tutorial 1(julai2006)Tutorial 1(julai2006)
Tutorial 1(julai2006)
 

Similar to Cs 601

Calculus Final Exam
Calculus Final ExamCalculus Final Exam
Calculus Final Exam
Kuan-Lun Wang
 
Quadratic functions and models
Quadratic functions and modelsQuadratic functions and models
Quadratic functions and modelsTarun Gehlot
 
整卷
整卷整卷
Chapter 3
Chapter 3Chapter 3
Chapter 3
aabdel96
 
04 quadratic equations
04   quadratic equations04   quadratic equations
04 quadratic equationsprofashfaq
 
Maieee03
Maieee03Maieee03
Maieee03
Ashish Yadav
 
Aieee 2003 maths solved paper by fiitjee
Aieee 2003 maths solved paper by fiitjeeAieee 2003 maths solved paper by fiitjee
Aieee 2003 maths solved paper by fiitjeeMr_KevinShah
 
Calculus First Test 2011/10/20
Calculus First Test 2011/10/20Calculus First Test 2011/10/20
Calculus First Test 2011/10/20
Kuan-Lun Wang
 
cl 9 polynomial.pdf
cl 9 polynomial.pdfcl 9 polynomial.pdf
cl 9 polynomial.pdf
TanishqAgarwal27
 
Sslc maths-5-model-question-papers-english-medium
Sslc maths-5-model-question-papers-english-mediumSslc maths-5-model-question-papers-english-medium
Sslc maths-5-model-question-papers-english-mediummohanavaradhan777
 
ISI MSQE Entrance Question Paper (2004)
ISI MSQE Entrance Question Paper (2004)ISI MSQE Entrance Question Paper (2004)
ISI MSQE Entrance Question Paper (2004)
CrackDSE
 

Similar to Cs 601 (15)

Calculus Final Exam
Calculus Final ExamCalculus Final Exam
Calculus Final Exam
 
Mathematics
MathematicsMathematics
Mathematics
 
Quadratic functions and models
Quadratic functions and modelsQuadratic functions and models
Quadratic functions and models
 
整卷
整卷整卷
整卷
 
Cs 60
Cs 60Cs 60
Cs 60
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Tut 1
Tut 1Tut 1
Tut 1
 
04 quadratic equations
04   quadratic equations04   quadratic equations
04 quadratic equations
 
Maieee03
Maieee03Maieee03
Maieee03
 
Aieee 2003 maths solved paper by fiitjee
Aieee 2003 maths solved paper by fiitjeeAieee 2003 maths solved paper by fiitjee
Aieee 2003 maths solved paper by fiitjee
 
Calculus First Test 2011/10/20
Calculus First Test 2011/10/20Calculus First Test 2011/10/20
Calculus First Test 2011/10/20
 
gfg
gfggfg
gfg
 
cl 9 polynomial.pdf
cl 9 polynomial.pdfcl 9 polynomial.pdf
cl 9 polynomial.pdf
 
Sslc maths-5-model-question-papers-english-medium
Sslc maths-5-model-question-papers-english-mediumSslc maths-5-model-question-papers-english-medium
Sslc maths-5-model-question-papers-english-medium
 
ISI MSQE Entrance Question Paper (2004)
ISI MSQE Entrance Question Paper (2004)ISI MSQE Entrance Question Paper (2004)
ISI MSQE Entrance Question Paper (2004)
 

More from Web Developer (20)

Eco 2
Eco 2Eco 2
Eco 2
 
Cs 612
Cs 612Cs 612
Cs 612
 
Cs 611 (p)s4
Cs 611 (p)s4Cs 611 (p)s4
Cs 611 (p)s4
 
Cs 611 (p)s3
Cs 611 (p)s3Cs 611 (p)s3
Cs 611 (p)s3
 
Cs 611 (p)s2
Cs 611 (p)s2Cs 611 (p)s2
Cs 611 (p)s2
 
Cs 611 (p)s1
Cs 611 (p)s1Cs 611 (p)s1
Cs 611 (p)s1
 
Cs 611
Cs 611Cs 611
Cs 611
 
Cs 610
Cs 610Cs 610
Cs 610
 
Cs 74 (p)s8
Cs 74 (p)s8Cs 74 (p)s8
Cs 74 (p)s8
 
Cs 75
Cs 75Cs 75
Cs 75
 
Cs 74 (p)s7
Cs 74 (p)s7Cs 74 (p)s7
Cs 74 (p)s7
 
Cs 74 (p)s6
Cs 74 (p)s6Cs 74 (p)s6
Cs 74 (p)s6
 
Cs 74 (p)s5
Cs 74 (p)s5Cs 74 (p)s5
Cs 74 (p)s5
 
Cs 74 (p)s4
Cs 74 (p)s4Cs 74 (p)s4
Cs 74 (p)s4
 
Cs 74 (p)s3
Cs 74 (p)s3Cs 74 (p)s3
Cs 74 (p)s3
 
Cs 74 (p)s2
Cs 74 (p)s2Cs 74 (p)s2
Cs 74 (p)s2
 
Cs 74 (p)s1
Cs 74 (p)s1Cs 74 (p)s1
Cs 74 (p)s1
 
Cs 74
Cs 74Cs 74
Cs 74
 
Cs 73
Cs 73Cs 73
Cs 73
 
Cs 72 (p)s8
Cs 72 (p)s8Cs 72 (p)s8
Cs 72 (p)s8
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Cs 601

  • 1. No. of Printed Pages : 7 CS-601 BACHELOR IN COMPUTER -7r 00 APPLICATIONS O Term-End Examination O June, 2011 CS-601 : DIFFERENTIAL AND INTEGRAL CALCULUS WITH APPLICATIONS Time : 2 hours Maximum Marks : 75 Note : Question no. 1 is compulsory. Attempt any three more questions from question No. 2 to 6. Use of calculator is permitted. 1. (a) Select the correct answer from the four given 6 alternatives for each part given below : x2 —1 (i) If f (x) — , then domain of the x+1 function is : (A) R, the set of real numbers. (B) —1, ] (C) All real numbers except - 1 (D) none of these CS-601 1 P.T.O.
  • 2. (ii) If y = x tan -1 x, then dY - dx 2 X (A) x2 tan-ix + II V1+x2 x (B) tan-1 x+ 2 1+x x (C) tan-1 x- 1+x 2 (D) (tan - 1x)2. d ex (iii) —) = dx x ex ex 1 (A) (B) - + - ex 2 - x 1 x ex (C) - e ---y (D) ex log x x (iv) Jcosec (3x + 4) cot (3x + 4) dx = 1 (A) 2 cosec (3x +4) cot (3x +4) + C 1 (B) - cosec (3x + 4) + C 3 _1 (C) cosec (3x +4) + C (D) log cos (3x + 4) C CS-601 2
  • 3. (v) If f (x) = (x —1) ex +1 and x 3 0 then f(x) is : (A) increasing function (B) decreasing function (C) Strictly increasing function (D) Strictly decreasing function Lim sin 4x (vi) x is : x (A) 0 (B) 00 (C) 1 (D) 4 (b) Fill in the blanks : (i) f dx 0 NI - Lim x 2 x -4 0 sin X2 x (iii) . 2 sin 2 cos — dx = 1 — 2 (iv) The minimum value of the function f (x)= (2x —1)2 +3 is dy (v) If y = cos x2, then = dx (vi) The equation of the normal to the curve y=x3 at (1, 1) is CS-601 3 P.T.O.
  • 4. (c) For each of the following functions, find 2 whether the function is monotonically increasing or monotonically decreasing or neither, on given interval. (i) f (x) = 2x3 — 8 on [0, 3] f (x) = 2 sin x on [0, 2 (d) If x= tan (in y), prove that 4 (1 + x2) yi =y. Using Leibnitz theorem, find yn +1. (e) The perimeter of a rectangle is 100 m. Find 3 the length of its sides when the area is maximum. (f) Find the value of 'b' for which the function 3 { x 2+1 when x < 2 f (x) 2 bx+- when x 2 x is continuous at x= 2. (g) Evaluate ; 3 3 (logx3+9sin3 x) [27 sin2x cosx+ — ] dx Lim 11x2 — 6x+8 (h) Evaluate 3 -- 9x2 —5x+5 >04 CS-601 4
  • 5. 2. (a) For what value of k is the function ; 3+4+4+4 2x+1 , x 5_ 2 f (x) Ix+k , x > 2 is continuous at x = 2 dy (b) Find — if y= sin x sin 2x sin 3x dx (c) Evaluate ; fx3 log 2x dx r _ V x cos (d) Prove that dx = — c;;X Vsin x+ fc- 4 3. (a) Find the nth derivative of the following function f (x) = ( ax + b)m where a and b are real numbers and m is a positive integer. (b) Can Rolle's Theorem be applied to the following function ? 5+5+5 y = sin2x on the interval [0, 14 Find 'C' such that f' (C) = 0, in case Rolle's theorem can be applied. (c) Integrate any one of the following : (x3 e2x dx r1 (ii) dx e +1 CS-601 5 P.T.O.
  • 6. 4 4. 2x (a) Evaluate f e dx 5+5+5 0 (b) Compute the area lying between the parabola y =4x — x2 and the line y = x. (c) If z = eax + by f (ax — by), prove that az az b — +a — = 2 abz ax ay 5. (a) Solve any one of the following : 5+5+5 dy (i) xy— =1+x+y+xy dx dy X 2 +y 2 (u) — = dx xy (b) For what value of 'k' is the following function continuous at x=1 ? X 2 -1 X#1 f (x) = {x -1 ' k x =1 (c) If u =f (x—y, y — z, z— x), prove that au+ + =0 au au ax ay az CS-601 6
  • 7. 6. (a) Calculate the radius and the height of a right circular cylinder of maximum volume which can be cut from a sphere of radius R. (b) Solve any one of the following : 5+5+5 (i) dY - e2x -3Y + 4x2 e - 3Y dx - (ii) (xy + x) dy - (xy + y) dx = 0 (c) A river is 80 ft wide. The depth in feet at a distance x ft, from one bank is given by the following table x : 0 10 20 30 40 50 60 70 80 d: 0 4 7 9 12 15 14 8 3 1 Using Simpson's 3rd rule, find approximately the area of the cross-section. CS-601 7