QB
QB
QB
QUESTION BANK
FOR EIGHTH SEMESTER
(2017- 2018)
INDEX
SUBJECT
S.NO SUBJECT NAME PAGE NO
CODE
WIRELESS
1 EC 6801 5 - 61
COMMUNICATION
2 EC 6802 WIRELESS NETWORKS 62 - 106
PROFESSIONAL ETHICS
3 GE 6075 107 - 178
IN ENGINEERING
ENTREPRENEURSHIP
4 MG 6071 179 - 231
DEVELOPMENT
1
PANIMALAR ENGINEERING COLLEGE
DEPARTMENT OF ECE
VISION
To emerge as a centre of excellence in providing quality education and produce
technically competent Electronics and Communication Engineers to meet the needs of the
industry and society.
MISSION
M1: To Provide the best facilities, infrastructure and environment to our students, researchers
and faculty members to meet the challenges in the field of Electronics and Communication
Engineering.
M2: To provide quality education through effective teaching learning process for their future
career, viz placement and higher education.
M3: To provide insight in to the core domains with industry interaction.
M4: To prepare graduates adaptable to the changing requirements of the society through lifelong
learning.
PROGRAMME OUTCOMES
1. Engineering Knowledge: Able to apply the knowledge of Mathematics, Science, Engineering
fundamentals and an Engineering specialization to the solution of complex Engineering
problems.
2. Problem Analysis: Able to identify, formulate, review research literature, and analyze
complex Engineering problems reaching substantiated conclusions using first principles of
Mathematics, Natural sciences, and Engineering sciences.
3. Design / Development of solutions: Able to design solution for complex Engineering
problems and design system components or processes that meet the specified needs with
appropriate considerations for the public health and safety and the cultural, societal, and
2
environmental considerations.
4. Conduct investigations of complex problems: Able to use Research - based knowledge and
research methods including design of experiments, analysis and interpretation of data, and
synthesis of the information to provide valid conclusions.
5. Modern tool usage: Able to create, select and apply appropriate techniques, resources, and
modern Engineering IT tools including prediction and modeling to complex Engineering
activities with an understanding of the limitations.
6. The Engineer and society: Able to apply reasoning informed by the contextual knowledge to
access societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional Engineering practice.
7. Environment and sustainability: Able to understand the impact of the professional
Engineering solutions in societal and environmental context, and demonstrate the knowledge
of, and need for sustainable development.
8. Ethics: Able to apply ethical principles and commit to professional ethics and responsibilities
and norms of the Engineering practice.
9. Individual and Team work: Able to function effectively as an individual, and as a member
or leader in diverse teams, and in multidisciplinary settings.
10. Communication: Able to communicate effectively on complex Engineering activities with
the Engineering community and with society at large, such as, being able to comprehend and
write effective reports and design documentation, make effective presentations, and give and
receive clear instructions.
11. Project Management and Finance: Able to demonstrate knowledge and understanding of
the engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
12. Life – long learning: Able to recognize the needs for, and have the preparation and ability to
engage in independent and life-long learning in the broadest contest of technological change.
1. Graduates should demonstrate an understanding of the basic concepts in the primary area
of Electronics and Communication Engineering, including: analysis of circuits containing
both active and passive components, electronic systems, control systems, electromagnetic
systems, digital systems, computer applications and communications
2. Graduates should demonstrate the ability to utilize the mathematics and the fundamental
knowledge of Electronics and Communication Engineering to design complex systems which
may contain both software and hardware components to meet the desired needs.
3
BLOOM’S TAXONOMY LEVELS (BTL)
Level 1 – Remembering (R)
Level 2 – Understanding (U)
Level 3 – Applying (A)
Level 4 – Analyzing (AZ)
Level 5 – Evaluating (E)
Level 6 – Creating (C)
4
SUBJECT CODE: EC 6801
5
UNIT -I
WIRELESS CHANNELS
Part – A
with each as the angle measured from the normal of the boundary, as
the velocity of light in the respective medium (SI units are meters per
second, or m/s) and as the refractive index (which is unitless) of the
respective medium.
6
4. Define EIRP. (Remembering)
EIRP of a transmitting system in a given direction as the transmitter
power that would be needed, with an isotropic radiator, to produce the same
power density in the given direction EIRP=Pt.Gt.
Where Pt-transmitted power in w
Gt-transmitting antenna gain.
Friis law seems to indicate that the attenuation in free space increases with
7
frequency.
9. Summarize the different types of wireless channels. (Understanding)
10. Compare small scale fading and large scale fading. (Understanding)
Small scale fading is used to describe the rapid fluctuations of the
amplitudes, phases, or multipath delays of a radio signal over a short period
of time or travel distance.
Large scale fading used to describe the Long term variation in the mean
signal level caused by the mobile unit moving into the shadow of
surrounding objects.
11. Solve the far field distance for an antenna with maximum dimension of
1m and operating frequency of 900 MHz. (Applying)
8
12. Solve the Brewster Angle for wave impinging on ground having a
permittivity
ϵr = 4. (Applying)
9
The MS has to move over large distances. For this reason Shadowing
gives rise to large scale fading.
10
20. Define large scale propagation model. (Remembering)
The propagation models that characterize the signal strength over large T-R
separation distances (several hundreds or thousands of meters.)
31. What are the factors influencing small scale fading? (Remembering)
Factors influencing small scale fading are
1. Speed of surrounding objects
2. Multipath propagation
3. Speed of the mobile
4. Transmission bandwidth of the signal.
13
PART - B
1.What you mean by path loss model? Explain in detail about large scale path
loss. (Remembering)
2.What is the need for link calculation? Explain with suitable example.
(Remembering)
3. Derive the final expression for (Remembering)
(a) The free space path loss model, and derive the gain expression.
(b) Two Ray Model propagation mechanisms.
4.Write short notes on the following concepts (Remembering)
(a) With system theoretic description, explain the characteristics of time
dispersive Channels.
(b) Frequency selective fading.
5.How would you explain fading due to multipath delay spread?
(Remembering)
6.Explain in detail about the free space propagation and describe how the
signals are affected by reflection, diffraction and scattering.
(Understanding)
7.Summarize the following (Understanding)
(i) Doppler shift
(ii) Doppler spread
(iii) Coherence time
(iv) Calculate the Doppler spread if the carrier frequency is 1900 MHz
and Velocity is 50 m/s.
8. Illustrate fading due to Doppler spread and coherence time in detail?
(Understanding)
9. Build the impulse response model of a multipath channel and also obtain
the relationship between bandwidth and received power. (Applying)
14
10. Identify the various parameters involved in mobile multipath channels and
explain in detail. (Applying)
11. (a) Examine the advantages and disadvantages of the two-ray ground
reflection model in the Analysis of path loss. (Analyzing)
(b) Analyze the following cases tell whether the two-ray model could be
applied, and justify Why or why not:
Case (i) h1= 35m,hr = 3m, d=250 m
Case (ii) h1= 30m, hr = 1.5m, d=450 m
Case (iii) Prove that in the two-ray ground reflected model
▲= d” – d’=2hthr/d.
12. Distinguish fast fading and slow fading in wireless channel and explain in
detail. (Analyzing)
13. Categorize what are the factors that influence small-scale fading.
(Analyzing)
14. Assume if a transmitter produces 50W of power, express the transmit
power in units of dBM and dBW. If 50W is applied to a unity gain antenna with
a 900 MHz carrier frequency, find the received power in dBM at a free space
distance of 100m from the antenna. What is Pr = (10km?) Assume unity gain
for the receiver antenna. (Analyzing)
15.Explain in detail about the small scale fading and, what are the factors
affecting the small scale fading. (Evaluating)
16.Briefly explain the factors that influence small-scale fading.
(Understanding)
17.Briefly explain the three basic propagation mechanisms which impact
propagation in a mobile communication system. (Understanding)
18. What is Brewster angle? Calculate Brewster angle for a wave impinging on
ground having a permittivity of εr = 4. (Remembering)
19. Explain the time-variant two-path model of a wireless propagation channel.
(Understanding)
20. Brief about the properties of Rayleigh distribution. (Remembering)
15
21. Explain the narrow band modeling methods for Short scale fading and Long
scale fading. (Understanding)
22.Brief about the properties of Nakagami distribution.
23. How the received signal strength is predicted using the free space
propagation model? Explain. (Understanding)
24. Find the far-field distance for an antenna with maximum dimension of 1m
and operating frequency of 900 MHz. (Understanding)
25.With system theoretic description explain the characteristics of Time-
Dispersive Channels. (Understanding)
26.Explain the three basic propagation mechanisms in a mobile
communication system. (Understanding)
27.Describe any two methods of diffraction by multiple screens.
(Remembering)
28.Discuss about ultra wide band channel. (Remembering)
29.Compare Coherence Bandwidth and Coherence time. (Understanding)
30. Discuss the mathematical formulation of narrowband and wideband
system, with relevant figures. (Understanding)
31. Explain the free space propagation model. (Understanding)
32. What is reflection? Explain in detail the reflection from dielectric and
conductors. (Remembering)
33. Write short notes on diffraction and scattering . (Remembering)
34. Explain in detail the indoor & outdoor propagation model .
(Understanding)
35. Explain in detail the small scale multipath propagation and its different
measurements (Understanding)
36. Explain about propagation mechanism for wireless channel.
(Understanding)
37. Discuss about propagation effects with mobile radio. (Remembering)
38. Explain about channel classification. (Understanding)
39. Brief notes about link calculations for various applications.
16
40. What are narrow band models? Explain the significance of each model.
(Understanding)
41. Discuss on wide band models. (Remembering)
42. Derive the equation of the Path loss using Two-Ray Model with neat
diagrams. (Understanding)
43. Explain knife Edge Diffraction Model. (Understanding)
44. Explain Rayleigh fading and Rician fading effects with mobile radio.
(Understanding)
45.Determine the proper spatial sampling interval required to make small scale
propagation measurements which assume that consecutive samples are highly
correlated in time. How many samples will be required over 10m travel distance
if fc = 1900MHz and v=50m/s. how long would it take to make these
measurements, assuming they could be made in real time from a moving
vehicle. What is the Doppler spread BD for the channel. (Applying)
46. Compare and contrast fast fading and slow fading. “In practice fast fading
only occurs for very low data rate (Communications)”. Why?
17
UNIT II CELLULAR ARCHITECTURE
Part – A
1. Define co-channel reuse ratio. (Remembering)
It is define as the ratio between the distance between the centers of
nearest co channel cells to the radius of the cell. Q = D/R.
18
Space division multiple access (SDMA)
Power division multiple access (PDMA)
Less stringent power control than CDMA due to reduced intra cell
interference.
Soft capacity limit, hence system performance degrades for all users as
number of users increase
Wide frequency spectrum reduces fading, E.g., Rake receiver in which
separate multipath signals of different delays by “chip” unit
Cell frequency reuse, so no frequency planning required
Soft Handover increases capacity therefore it is “make before break” vs.
“break before make”
Utilization of voice activity (talk spurts)
21
modulated carrier power S or C and the average received co-channel
interference power I, i.e. cross-talk, from other transmitters than the useful
signal.
The CIR resembles the carrier-to-noise ratio (CNR or C/N), which is
the signal-to-noise ratio (SNR or S/N) of a modulated signal before
demodulation. The interfering radio transmitters referred as I may be
controlled by radio resource management, while N involves noise power from
other sources, typically additive white gaussian noise (AWGN).
The aim for creating microcells is for increasing the capacity of cellular
network in areas where population is high. According to the Microcell Zone
concept, large base station is replaced by several lower powered transmitters
on the edge of the cell. The mobile retains the same channel and the base
station simply switches the channel to a different zone site and the mobile
moves from zone to zone. Since a given channel is active only in a particular
zone in which mobile is traveling, base station radiation is localized and
interference is reduced.
22
19. Discuss a few techniques used to improve the capacity of a cellular
system. (Creating)
The main difference from a cell phone is that the cordless telephone is
associated with, and can communicate with, only a single Base Station.
A fixed station in mobile radio system used for radio communication with
mobiles. It has transmitter and receiver section. It is located at the centre of
coverage area.
23
22. What is MSC? (Remembering)
24. What is the function of control channel? What are the types?
(Remembering)
Control channel is used for transmission of call setup, call request, call
initiation & Control. Types are forward control channel, reverse control
channel.
24
27. What is hand off? (Remembering)
The time over which the call may be maintained within a cell without
handoff is called as dwell time. This time is governed by factors such as
propagation, interference, distance between subscribers and base station.
In a cellular network, among a handoff call and a new call, priority is given to
Handoff call, to provide continuous service to the existing call.
25
Part – B
1.What is Handoff and interference systems and explain with neat diagram.
(Remembering)
2.Can you recall interference and system capacity of cellular system?
(Remembering)
3.Write short note on (i) Trunking, (ii) Grade of service of cell system.
(Remembering)
4.How to select various methods to improve coverage and channel capacity in
cellular systems? (Remembering)
5.Summarize the features of various multiple access technique used in wireless
mobile communication and State the advantages and disadvantages of each
technique. (Understanding)
6.Explain in detail about the following (i) Cellular network architecture (ii) Any
one type of multiple access schemes. (Understanding)
7.Illustrate multiple access techniques (i)TDMA (ii)FDMA (iii)CDMA (iv)Compare
various multiple access techniques with each other. (Understanding)
8. (i) How would you apply frequency reuse? (Applying)
(ii)Explain in detail about channel assignment strategies. (Applying)
9. Identify the channel capacity of TDMA in cell system. (Applying)
10.Analyze what approaches are used to calculate channel capacity of CDMA in
cell system. (Analyzing)
11.Categorize the techniques to improve coverage and capacity. (Analyzing)
12.Examine the concept of (i) Repeaters for range extension (ii) Microcell zone
concept. (Analyzing)
13. If signal-to-interference ratio of 15dB is required for satisfactory forward
channel performance of a cellular system, what is the frequency reuse factor
and cluster size that Should be used for maximum capacity if the path loss
exponent is (1) n=4 (2) n=3? (Creating)
14. Describe in detail about the effects of multipath propagation in wireless
environment. (Remembering)
26
15. Discuss the principle of cellular networks. (Remembering)
16. Write short notes on frequency reuse & channel assignment.
(Remembering)
17. Discuss different techniques used for improving coverage and capacity in
cellular systems. (Remembering)
18. Explain the various types of Handoff processes available. (Understanding)
19. If a total of 33MHz bandwidth is allocated to a particular FDD cellular
telephone system which uses two 25KHz simplex channels to provide full
duplex voice and control channels, compute the number of channels available
per cell if a system uses (1) 4 cell reuse (2) 7 cell reuse and (3) 12 cell reuse. If
1 MHz of the allocated spectrums is dedicated to control channels, determine
the equitable distribution of control channels and voice channels in each cell of
each of the three systems. (Analyzing)
20. Consider global system for mobile which is a TDMA/FDD system that uses
25MHz for the forward link, which is broken into radio channels of 200MHz. If
8 speech signals are supported on a single radio channel and if no guard band
is assumed, find the number of simultaneous users that can be accommodated
in GSM. (Applying)
21. If GSM uses a frame structure where each frame consists of 8 time slots,
and each time slot contains 156.25 bits, and data is transmitted at 270.833
Kbps, in the channel, find (1) the time duration of a bit (2) the time duration of
a slot (3) the time duration of a frame and (4) how long must a user occupying
a single time slot wait between two successive transmissions. (Analyzing)
22. Describe channel assignment strategies and Handoff strategies.
(Understanding)
27
UNIT-III DIGITAL SIGNALLING FOR FADING CHANNELS
Part – A
1. List the advantages of digital modulation.(Remembering)
i) Immunity to channel noise and external interference.
ii)Flexibility operation of the system.
iii)Security of information.
iv)Reliability of digital circuits used.
v) Multiplexing of various sources of information into a common format is
possible.
vi) Error detection correction is easy.
28
4. List the advantages of OQPSK. (Remembering)
OQPSK prevents phase transition from the origin by shifting one stream
by a bit period and allowing only one bit to change between the
transitions.
Offset provides an advantage when non-rectangular data pulses are
used.
It supports more efficient RF amplification.
MSK: It has smooth waveforms than QPSK scheme, constant envelope, main
lobe is wider and contains 99% signal energy and good Spectral efficiency.
GMSK: Simple binary modulation scheme, Premodulation is done by Gaussian
pulse shaping filter so sidelobe levels are much reduced, Excellent power
efficiency and spectral efficiency.
30
10.Why is MSK referred to as fast FSK? (Applying)
11. Find the 3-dB bandwidth for a Gaussian low pass filter used to produce
0.25 GMSK With a channel data rate of Rb = 270kbp. What is the 90%
power bandwidth in the RF channel? (Applying)
13. List any two criteria for choosing a modulation technique for a
specific wireless communication. (Analyzing)
Bandwidth efficiency is defined as the ratio of the data (bit) rate to the
occupied bandwidth
31
15. Analyze the importance of constellation diagram? What do you infer
from it? (Analyzing)
17.A 880 MHz carrier signal is frequency modulated using a100 kHz
sinusoidal modulating waveform. The peak deviation of the FM signal is
500 kHz. If this FM signal is received by a super heterodyne receiver
having an IF frequency of 5MHz, determine the IF bandwidth necessary to
pass the signal. (Creating)
32
18. Draw possible state of (a) , (b) and
33
20.Mention any two criteria for choosing a modulation technique for a
specific wireless application.(Understanding)
(i).In QPSK the phase changes by 90degree or 180 degree .This creates
abrupt amplitude variations in the waveform, Therefore bandwidth requirement
of QPSK is more filters of other methods overcome these problems , but they
have other side effects.
QPSK is a multilevel modulation in which four phase shifts are used for
representing four different symbols.
i) Constant envelope
ii) Spectral efficiency
iii) Good BER performance
iv) Self-synchronizing capability
v) MSK is a spectrally efficient modulation scheme and is particularly attractive
for use in mobile radio communication systems.
35
29. Give some examples of linear modulation. (Remembering)
36
34. Why GMSK is preferred for multiuser, Cellular communications?
(Remembering)
i) It is a simple binary modulation scheme.
ii) Premodulation is done by Gaussian pulse shaping filter,so side lobe levels
are much reduced.
iii) GMSK has excellent power efficiency and spectral efficiency than FSK.
37
Part –B
38
17. Explain the principle of π/4 Differential Quadrature-Phase Shift Keying
from a signal space diagram. (Understanding)
18. Derive the expression for probability of error in Flat-Fading Channels.
(Remembering)
19. Explain the principle of Minimum Shift Keying (MSK) modulation and
derive the expression for power spectral density.
(Understanding)
20. Derive the expression for probability of error in Frequency-Dispersive
Fading channels. (Remembering)
21. Briefly explain the structure of a Wireless communication link.
(Understanding)
22. With block diagram, explain the MSK transmitter and receiver. Derive an
expression for MSK and its power spectrum. (Understanding)
23. Derive an expression for : (Remembering)
(i) M-ary phase shift keying and
(ii) M-ary Quadrature amplitude modulaton
also derive an expression for their bit error probability.
24. Discuss in detail any two demodulation techniques of minimum shift
keying method. (Understanding)
25. Explain in detail about optimum receiver structure for non Coherent
detection. (Understanding)
26. Explain in detail the generation & detection of MSK technique.
(Understanding)
27. Explain in detail the generation & detection of GMSK modulation.
(Understanding)
28. Explain the performance of digital modulation in slow flat fading channel.
(Understanding)
29. Draw and explain the structure of a wireless communication link.
(Understanding)
30. Explain the generation, detection and bit error probability of QPSK
39
technique. (Understanding)
31. What is Offset QPSK? What is its advantage? Describe the offset QPSK
scheme and its salient features. (Understanding)
32. Explain the principle and operation of differential QPSK transmission and
reception. (Understanding)
33.What is BPSK? Derive the bit error probability of BPSK and also explain the
constellation diagram of it. (Understanding)
34.Explain Gaussian MSK. Why we prefer it for wireless communication?
(Understanding)
35.Discuss about the error performance of various modulation techniques in
fading channels. (Understanding)
40
UNIT- IV Multipath Mitigation Techniques
Part – A
1. What is the need of equalization? (Remembering)
41
7. Differentiate between macro and micro diversity. (Understanding)
S.No Micro diversity Macro diversity
1. Used to reduce small scale Used to reduce large scale fading
fading effects. effects.
2. Multiple reflections causes deep Deep shadow causes fading.This
fading. This effect is reduced. effect is reduced.
3. BS-MS are separated by a small BS-MS are separated by a Large
distance. distance.
8. Give the advantages of LMS algorithm. (Remembering)
i) The LMS equalizer maximizes the signal to distortion at its output within
the constraints of the equalizer filter length.
ii) Low computational complexity’.
iii) Simple program.
42
11. Classify the diversity and its combining techniques. (Remembering)
12. Compare and contrast linear equalizers and non linear equalizers.
(Remembering)
Linear equalizers:
1. In linear equalizer, the current and past values of the received signal
are linearly weighted by the filter coefficients and summed to produce
the output. No feedback path is used.
2. Simple, easy to implement.
3. Not suitable for severely distorted channel, noise power signal is
enhanced.
1. If the past decisions are correct, then the ISI contributed by present
symbol can be cancelled exactly, feedback path is used.
2. Suitable for severely distorted channel, also noise power is not
enhanced.
3. Complex in structure, Channels with low SNR, the DFE suffers from
error propagation.
43
14. Why non linear equalizers are preferred? Justify. (Remembering)
The linear equalizers are very effective in equalizing channels where ISI is
not severe. The severity of ISI is directly related to the Spectral
characteristics. In this case there are spectral nulls in the transfer function
of the effective channel; the additive noise at the receiver input will be
dramatically enhanced by the linear equalizer. To overcome this problem,
non linear equalizers can be used.
16. Design the structure of maximum like hood sequence estimator (MLSE)
in nonlinear equalizer. (Creating)
44
17. What is Diversity? (Remembering)
The principle of diversity is to ensure that the same information reaches the
receiver on Statistically independent channels.
Equalizer is a linear pulse shaping filter, used to reduce the effect of ISI.
22. Write a short note on linear equalizers and non linear equalizers?
(Remembering)
Linear equalizers: If the output d(t) is not used in the feedback path to
adapt the equalizer. his type of equalizers is called linear equalizer.
Nonlinear equalizers: If the output d(t) is fed back to change the subsequent
outputs of the equalizers is called non linear equalizers.
45
23. Define spatial diversity. (Remembering)
46
27. What is tracking mode in an adaptive equalizer? (Remembering)
Immediately following this training sequence the user data is sent and
the adaptive equalizer at the receiver utilizes a recursive algorithm to evaluate
the channel and estimate filter coefficients to compensate for the distortion
created by multipath in the channel.
47
Part –B
1. Describe Linear in detail about (Remembering)
(i) Equalizers, (ii) Non-linear equalizers
2. (i) Derive the mean square error for a generic adaptive equalizer.
(Remembering)
(ii) Define zero forcing equalizer and derive the mean square error criteria.
3. (i) With a neat block diagram, state and explain the principle of diversity.
(ii) Describe in detail, Decision feedback equalizer. (Remembering)
4. What is linear and decision feedback equalizer and derive an expression for
its minimum mean square error. (Remembering)
5. (i) Describe about space diversity with necessary diagrams.(Understanding)
(ii) Express the LMS algorithm for an adaptive equalizer.
6. Illustrate the following (Understanding)
(i) Spatial Diversity
(ii) Temporal Diversity
(iii) Polarization Diversity
(iv) Macro Diversity
7. With a neat block diagram, discuss the principle of macro diversity.
(Remembering)
8. Discuss the operation of an adaptive equalizer at the receiver side.
(Remembering)
9. Examine the different types of diversity techniques and Explain Frequency,
Angular and Polarization diversity techniques.
(Analyzing)
10. Analyze various diversity techniques used in wireless communication.
(Analyzing)
11. Compare the performance of signal combining techniques.(Understanding)
12. Describe the following (Remembering)
(i) Error probability in flat-fading channels
(ii) Symbol error rate in frequency selective fading channel.
48
13. Explain combining techniques using combination of signal (Understanding)
(i) Maximum ratio combining
(ii) Equal gain combining
(iii) optimum combining
(iv) Hybrid selection -maximum ratio combining
14. Draw the block diagram and explain the operation of a RAKE Receiver.
(Understanding)
15. Explain in detail about: (i) Polarization diversity.(ii)Time
diversity.(iii)Frequency diversity. (Understanding)
16. Explain the basic idea about linear and behind decision feedback
Equalizers and derive an expression for its minimum mean square error.
(Understanding)
17.With a neat block diagram discuss the structure of a decision feedback
equalizer. (Understanding)
18. Explain about micro diversity. (Understanding)
19. Explain about macro diversity. (Understanding)
20. Discuss on transmit diversity. (Remembering)
21. Compare the performance of signal combining techniques.
(Understanding)
22. Describe the role played by equalization and diversity as multipath
mitigation techniques. Compare and contrast these two techniques.
23.Consider the design of the US digital cellular equalizer, where f=900MHz
and the mobile velocity v=80Km/hr, determine the maximum Doppler shift, the
coherence time of the channel and the maximum number of symbols that
could be transmitted without updating the equalizer assuming that the symbol
rate is 24.3 k symbols/sec.
24. Assume four branch diversity is used, where each branch receives an
independent Rayleigh fading signal. If the average SNR is 20dB, determine the
probability that the SNR will drop below 10dB. Compare this with the case of
single receiver without diversity.
49
UNIT-V MULTIPLE ANTENNA TECHNIQUES
Part – A
This is the expected value of capacity taken over all realizations of the
channel.
51
11. How would you explain the capacity of a fading channel?
(Remembering)
The capacity of a fading channel is given as C =log 2 (1 + γ|H|2); where γ
is the signal to noise ratio at the receiver. H is normalized transfer function
from the transmitter to the receiver.
13. What was the main idea behind linear precoding with full CSI.
(Remembering)
In wireless communications, Channel state information refers to known
channel properties of a communication link.CSI describes how a signal
propagates from the transmitter to the receiver and represents the
combined effect of reflection, diffraction and scattering.
14. State the point of view of CSI at the transmitter and receiver side.
(Understanding)
Channel State Information at Transmitter refers to the channel values
known at the transmitter. Channel State Information refers to the wireless
channel magnitude and phase values. Channel State Information at
Receiver (CSIR) refers to the channel values known at receiver.
52
15. Classify beamforming and explain opportunistic beamforming.
(Understanding)
Opportunistic beamforming is one in which channel fluctuation can be
induced in situations when the natural fading has small dynamic range
and is slow.From the cellular system point of view, this technique also
increases the fluctuations of the interference imparted on adjacent cells,
and presents an opposing philosophy to the notion of interference
averaging in CDMA systems.
54
PART- B
1. What is meant by MIMO systems? Explain the system model with necessary
diagrams. (Remembering)
2. Describe the operation of spatial multiplexing. (Remembering)
3. Define precoding and explain the operation of transmit precoding.
(Remembering)
4. Why beamforming is important for wireless systems, explain transmit
beamforming, receive beamforming and opportunistic beamforming.
(Remembering)
5. What is diversity? Explain the operation of transmit diversity.
(Remembering
6. Compare transmit diversity and receive diversity. (Remembering)
55
15. Compare the capacity of a fading and a non fading channel for information
transmitted from a wireless system. (Analyzing)
16. What is the function of smart antennas and explain the various purposes of
it. ( Analyzing)
17. Can you distinguish between different beamforming techniques.
( Analyzing)
18. Classify precoding schemes based on channel state information at
transmitter and receiver sides . ( Analyzing)
19. Explain precoding and precoding for multi-user MIMO systems.
(Evaluating)
20. Design the capacity for MIMO systems in flat fading channels and compare
it with fading and non-fading channels. (Creating)
21. Describe MIMO systems with emphasis on their requirement in a wireless
communication environment.
56
Assignment Topics
Unit –I
Figure below, using 2-m-tall antennas. Convert the building into a series
of semi-infinite screens and determine the field strength at the receive antenna
caused by diffraction using Bullington’s method for (a) f = 900 MHz, (b) f =
1,800 MHz, and (c) f = 2.4 GHz. ( Analyzing)
(a) If you aim at making the system capable of communicating when the
terminal is moving at 200 km/h, which maximal Doppler spread should it be
able to handle?
57
(b) If you design the system to be able to operate at 200 km/h when using the
900-MHz band, at what maximal speed can you communicate if the 1,800-MHz
band is used (assuming the same Doppler spread is the limitation)?
Unit –II
by
(b) Figure below shows an illustration of the worst case uplink scenario, where
communication from MS 0 to BS 0 is affected by interference from other co-
channel mobiles in first-tier co-channel cells. The worst interference scenario is
when co-channel mobiles (MS 1 to MS 6) communicating with their respective
BSs (BS 1 to BS 6) are at their respective cell boundaries, in the direction of BS
0. Calculate the C/I at BS 0, given that all mobiles transmit with the same
power, and compare your expression with the one above. (Evaluating)
58
2) TDMA requires a temporal guard interval. (Evaluating)
(a) The cell radius of a mobile system is specified as 3,000m and the longest
impulse response in the cell is measured as 10 μs. What is the minimum
temporal guard interval needed to avoid overlapping transmissions?
(b) Justify the temporal guard interval reduced in GSM?
Unit –III
59
can be treated as an AWGN channel without fading. How much transmit power is
required (disregarding power losses at TX and RX ends) for a maximum BER of
10−5:
(a) When using coherently detected BPSK, FSK, differentially detected BPSK, or
non coherently detected FSK?
(b) Derive the exact bit and symbol error probability expressions for coherently
detected Gray coded QPSK. Start by showing that the QPSK signal can be
viewed as two antipodal signals in quadrature.
(c) What is the required transmit power if Gray-coded QPSK is used?
(d) What is the penalty in increased BER for using differential detection of
Gray-coded QPSK in (c)? (Evaluating)
Unit –IV
Unit-V
1) Design the capacity for MIMO systems in flat fading channels and compare
it with fading and non-fading channels. ( Analyzing)
2) Compare the capacity of a fading and a non fading channel for information
transmitted from a wireless system. ( Analyzing)
61
SUBJECT CODE: EC 6802
62
UNIT I - WIRELESS LAN
PART – A
1. What are the goals of HIPERLAN?(R)
1. Quality Of Service
2. Strong Security.
3. Handoff when moving between local area and wide area.
4. Increased throughput.
5. Ease of use, deployment and maintenance.
6. Affordability.
7. Scalability.
• HIPERLAN-1
• HIPERLAN-2
• HIPER Access
• HIPERLINK
• Flexibility
• Planning
• Robustness
• Design
• Cost
63
5. Define HIPERLAN-2. (R)
64
9. What are the layers in IEEE 802.11 architecture? (R)
Physical Layer
- Physical layer convergence procedure(PLCP)
- Physical Medium dependent Sublayer(PMD).
Data link layer
- Logical Link Control Layer.(LLC)
- Medium Access Control (MAC ).
Data:
DSAP:
I/G DSAP value
I/G – Individual / Group
65
DSAP – Destination Service Access Point
SSAP:
C/R SSAP value
C / R – Command / Response
SSAP --Source Service Access Point
13. What are the characteristics of MANET? (May /Jun ‘12) (R)
Dynamic topologies.
Bandwidth constrained and variable capacity links.
Energy constrained operations.
Limited physical security
Defense applications
Crisis management applications.
Telemedicine applications.
Tele geo processing applications.
Virtual navigation.
Education via the Internet.
15. What are the building blocks of IEEE 802.11 architecture? (R)
Basic Service SET. (BSS)
Distribution System (DS)
66
Access Point (AP).
16. What are the other IEEE.802.11 protocols? (R)
67
19. List Some of the salient features supported by WiMAX are: (R)
i. High data rates: - WiMAX can typically support data rates from 500
Kbps to 2 Mbps. - The inclusion of multi-input multi-output(MIMO) antenna
techniques along with flexible sub-channelization schemes, advanced coding
and modulation all enable mobile to support peak downlink data rates of 63
Mbps per sector and peak uplink data rates of up to 28 Mbps per sector in a
10 MHz channel.
WiMAX has clearly defined QoS classes for applications with different
requirements such as VoIP, real time video streaming, file transfer and
web traffic.
iii. Scalability:
iv. Security:
There is support for diverse set of user credentials like SIM/USIM cards,
smart cards, digital certificates, username/password schemes.
All this is based on relevant ‘extensible authentication protocol (EAP)’
methods for credential type.
v. Mobility:
Mobile WiMAX supports optimized handoff schemes with latencies less than
50ms to ensure that real time applications such as VoIP can be performed
without service degradation.
ii. The other bands are around 3.5HZ, 2.3/2.5GHz, or 5GHz, with
2.3/2.5GHz.
3. The stations gain access to media There is time slot for each station
based on CSMA/CA and back off and there is scheduling
algorithm schemes. algorithm used by base station.
69
22. What are the differences between the 802.11a and HIPER LAN-2?(R)
The HIPER LAN-2 standard uses the same physical layer as 802.11a with
a MAC that supports the needs of the cellular telephone industry is
supporting mechanisms for tariff, integration with existing cellular systems
and providing QOS. IEEE 802.11camp is a connectionless WLAN camp that
evolved from data oriented computer communications. HIPER LAN-2 camp
is connection based WLANs addressing the needs of voice oriented cellular
telephone.
23. State the relationship between HYPER LAN-2 and WATM. (R)
24. How many transport channels and logical channels are implemented
in the HIPERLAN-2 DLC layer? (R)
HIPERLAN-2 DLC layer has four transport channels and five logical
channels.
70
27. State the Significance of radio transmission over infrared. (R)
Long Range Communication and High bandwidth are two main factors of
radio transmission as compared to infrared.
PART-B
1. What are the basic differences between wireless WANs and WLANs, and
what are the common features? (R)
2. What are the problems of WLANs? What level of security can WLANs
provide, what is needed additionally and how far do the standards go? (R)
3. Compare IEEE 802.11, HiperLAN2, and Bluetooth with regard to their
ad-hoc Capabilities. (U)
4. What are the reasons for the use of infra-red transmission for WLANs?
(R)
5. Why is the PHY layer in IEEE 802.11 subdivided? What about HiperLAN2
and Bluetooth? (R)
6. How do IEEE 802.11, HiperLAN2 and Bluetooth, respectively, solve the
hidden terminal problem? (R)
7. What are advantages and problems of forwarding mechanisms in
Bluetooth networks regarding security, power saving, and network
stability? (R)
8. Why did WATM not succeed as stand-alone technology, what parts of
WATM succeeded? (R)
9. Discuss the methods by which data services get integrated with voice
oriented networks.(AZ) [AUMay/June 2012]
10. Explain in detail about security and privacy in wireless
networks(E) (Nov/Dec 2014)
11. Write a note on security issues in wireless networks (Apr/May
2015)
71
12. Distinguish between collisions on PHY and MAC layer. How do the
three wireless networks, try to solve the collisions or minimize the
probability of collisions?(E)
13. Compare the power saving mechanisms in all three LANs. What are
the negative effects of the power saving mechanisms, what are the trade-
offs between power consumption and transmission QoS?(E)
14. Compare the QoS offered in all three LANs in ad-hoc mode. What
advantages does an additional infrastructure offer? How is QoS provided
in Bluetooth? (E)
15. Explain and compare the medium access mechanism of DCF
methods adopted in IEEE 802.11 WLAN. (U)
16. Describe the user scenario architecture and protocol stack of
Bluetooth technology (U)
72
UNIT II MOBILE NETWORK LAYER
PART – A
1. What is Dynamic source Routing? (R)
Dynamic Source Routing eliminates all periodic routing updates. If
a node needs to discover a route, it broadcast a route request with a
unique identifier and the destination address as parameters. Any node
that receivers a route request gives a list of addresses representing a
possible path on its way toward the destination.
74
10. What advantages does the use of IPv6 offer for mobility? (R)
11. Name the main differences between multi-hop ad hoc networks? (R)
Ease of deployment
Speed of deployment
Decreased dependence on infrastructure
Packet header size grows with route length due to source routing.
Flood of route requests may potentially reach all nodes in the
network
76
Extensibility
19. What are the advantages of IPv6 over IPv4? (R)
77
20. Write the differences between IPv4 and IPv6?(U)
IPv4 IPv6
78
21. What is the care of address in mobile IP? (R)
Used in Internet routing, a care-of address (usually referred to as CoA) is a
temporary IP address for a mobile device. This allows a home agent to
forward messages to the mobile device.
22. What is encapsulation in mobile IP? (R)
The default encapsulation process used in Mobile IP is called IP
EncapsulationWithin IP, defined in RFC 2003 and commonly
abbreviated IP-in-IP. It is a relatively simple method that describes how to
take an IP datagram and make it the payload of another IP datagram.
PART – B
1. Name the consequences and problems of using IP together with the standard
routing protocols for mobile communications. (R)
2. What could be quick ‘solutions’ and why don’t they work? (R)
3. Name the requirements for a mobile IP and justify them. Does mobile IP
fulfill them all? (R)
4. List the entities of mobile IP and describe data transfer from a mobile node
to a fixed node and vice versa. Why and where is encapsulation needed? (R)
5. How does registration on layer 3 of a mobile node work? (R)
6. Show the steps required for a handover from one foreign agent to another
foreign agent including layer 2 and layer 3.(A)
7. Explain packet flow if two mobile nodes communicate and both are in
foreign networks.(U)
What additional routes do packets take if reverse tunneling is required?
8. Explain how tunneling works in general and especially for mobile IP using
IP-in-IP, minimal, and generic routing encapsulation, respectively. Discuss the
advantages and disadvantages of these three methods.(U)
9. Name the inefficiencies of mobile IP regarding data forwarding from a
correspondent node to a mobile node. What are optimizations and what
79
additional problems do they cause? (R)
10. What advantages does the use of IPv6 offer for mobility? Where are the
entities of mobile IP now? (R)
11. What are general problems of mobile IP regarding security and support of
quality of service? (R)
12. What is the basic purpose of DHCP? Name the entities of DHCP. (R)
13. How can DHCP be used for mobility and support of mobile IP? (R)
14. Name the main differences between multi-hop ad-hoc networks and other
networks. What advantages do these ad-hoc networks offer? (R)
15. Why is routing in multi-hop ad-hoc networks complicated, what are the
special challenges? (R)
16. Recall the distance vector and link state routing algorithms for fixed
networks. Why are both difficult to use in multi-hop ad-hoc networks? (U)
17.State the entities and terminologies used in mobile IP along with tunneling
and also explain the three types of encapsulation mechanisms used in mobile
IP. (U)
18. Explain and compare the working mechanism of both destination sequence
distance vector and dynamic source routing protocol when applied on a mobile
adhoc network scenario. (U)
80
UNIT III MOBILE TRANSPORT LAYER
PART – A
1. What is TCP? (R)
TCP is a connection-oriented protocol, which means a connection is
established and maintained until the application programs at each end have
finished exchanging messages. It determines how to break application data
into packets that networks can deliver, sends packets to and accepts
packets from the network layer, manages flow control, and—because it is
meant to provide error-free data transmission—handles retransmission of
dropped or garbled packets as well as acknowledgement of all packets that
arrive. In the Open Systems Interconnection (OSI) communication model,
TCP covers parts of Layer 4, the Transport Layer, and parts of Layer 5,
the Session Layer.
81
3. What is a TCP packet? (R)
Most networks use TCP/IP as the network protocol, or set of rules for
communication between devices, and the rules of TCP/IP require
information to be split into packets that contain both a segment of data to
be transferred and the address where the data is to be sent.
HTTP - Used between a web client and a web server, for non-secure data
transmissions. A web client (i.e. Internet browser on a computer) sends a
request to a web server to view a web page. The web server receives that
request and sends the web page information back to the web client.
HTTPS - Used between a web client and a web server, for secure data
transmissions. Often used for sending credit card transaction data or
other private data from a web client (i.e. Internet browser on a computer)
to a web server.
FTP - Used between two or more computers. One computer sends data to
or receives data from another computer directly.
82
6. What do you mean by congestion window? (R)
This step is congestion avoidance, since TCP is down to one-half the rate
it was at when the packet was lost. The fast retransmit algorithm first
appeared in the 4.3BSD Tahoe release, and it was followed by slow start.
83
10. Define fast retransmit in TCP? (R)
84
13. Enumerates the advantages of indirect TCP?(R)
85
19. Define Mobile TCP? (R)
The M – TCP has the same goals as that of I – TCP and snooping
TCP to prevent the sender window from shrinking if bit errors or
disconnection but not congestion cause current problems. The M – TCP
improves the overall throughput, to lower the delay, to maintain end to
end semantics of TCP to provide more efficient handover.
M – TCP assumes low bit error rates which are not always a valid
assumption.
A modified TCP on the wireless link requires modification to the
MH protocol software but also new network elements like
bandwidth manager.
86
23. Write the applications of 3G? (R)
Applications of 3G
Overhead at the proxy for per packet processing (up to TCP and back
down)
87
26. Mention the advantages of mobile TCP. (R)
1. Maintains semantics
2. Supports disconnection
3. No buffer forwarding
PART – B
88
can act as a gateway to translate between the different protocols in Indirect
TCP. (R)
8. Compare the different types of transmission errors that can occur in
wireless and wired networks. What additional role does mobility play?(A)
9. What is the reaction of standard TCP in case of packet loss? In what
situation does this reaction make sense and why is it quite often
problematic in the case of wireless networks and mobility? (R)
10. Can the problems using TCP be solved by replacing TCP with UDP?
Where could this be useful and why is it quite often dangerous for network
stability?(A)
11. How and why does I-TCP isolate problems on the wireless link? What are
the main drawbacks of this solution? (R)
12. Show the interaction of mobile IP with standard TCP. Draw the packet
flow from a fixed host to a mobile host via a foreign agent. Then a handover
takes place. What are the following actions of mobile IP and how does TCP
react?
13. Now show the required steps during handover for a solution with a PEP.
What are the state and function of foreign agents, home agents,
correspondent host, mobile host, PEP and care-of-address before, during,
and after handover? What information has to be transferred to which entity
to maintain consistency for the TCP connection?(A)
14. What are the influences of encryption on the proposed schemes?
Consider for example IP security that can encrypt the payload, i.e., the TCP
packet. (R)
15. Name further optimizations of TCP regarding the protocol overhead
which are important especially for narrow band connections. Which
problems may occur?
16. Describe the working mechanism of traditional TCP.(U)
17. Write your understanding on indirect TCP, Snooping TCP, Mobile TCP
and transaction oriented TCP. (A)
89
UNIT – IV WIRELESS WIDE AREA NETWORK]
PART – A
1. What is UMTS? (R)
92
12. What is SMS – GMSC? (R)
The SMS – GMSC interfaces with the MSC/VLR and or the SGSN to
deliver a short message, stored in the SM –SC to the recipient mobile
subscriber.
13. Define DHCP? (R)
Dynamic Host Configuration Protocol (DHCP) is a client/server
protocol that automatically provides an Internet Protocol (IP) host with its
IP address and other related configuration information such as the
subnet mask and default gateway.
93
them to Internet Protocol (IP) addresses. This is necessary because,
although domain names are easy for people to remember, computers or
machines, access websites based on IP addresses.
94
22. What is the purpose of firewall in UMTS network? (U)
To provide Access Control and network security to the input and output
side of a network.
23. Name the 3G radio access schemes identified to support different
spectrum scenario. (R)
CDMA, TDMA, FDMA, MSC, GMSC, GGSN and SGSN
PART – B
1. Discuss two evolution paths for the GSM to offer 3G services. (AZ)
2. What is the high-speed circuit switched data (HSCSD) in the GSM? (R)
3. What is the role of the general packet radio service (GPRS) in the GSM? (R)
4. What are the QoS classes in the UMTS? (R)
5. Define roles of two new network entities in the GPRS. (R)
6. Name the physical channels of the GPRS and discuss their functions.
7.What are some of the point-to-point (PTP) and point-to-multipoint (PTM)
applications of the GPRS? (R)
8.How are higher data rates achieved in the enhanced data rates for GSM
enhancement (EDGE)? Discuss. (R)
9.What are the modulation and coding schemes that are used for the packet
mode in the EDGE? (R)
10. Discuss the roles of 3G systems.(AZ)
11.What is the UMTS? List important features of the UMTS air interface. (R)
12.What are three channel types that are used in the UMTS? Discuss the role
of each channel type. (R)
13. What are the three main entities of the UMTS network? Discuss their
functions. (R)
14. Discuss the responsibilities of the RNC in the UMTS network. (AZ)
15. What are the responsibilities of Node B in the UMTS network? (R)
16. Discuss the role of the access link control application part (ALCAP) in the
95
UMTS.
17. Discuss Iu, Iur, and Iub interfaces in the UMTS.
18. The core network of the UMTS is divided into three different functional
areas. Name these areas and discuss their roles.
19. What is adaptive multi-rate (AMR) codec? (R)
20. Discuss the UMTS bearer service layered architecture.
21. How is isolation between users in the downlink accomplished in a WCDMA
system? (R)
22. Explain the UMTS network architecture with GSM, 3G and also explain
the reference architecture. (U)
23. Explain the UMTS core network architecture (U)
UNIT – V 4G NETWORKS
PART – A
1. What is 4 g? (R)
4G is the fourth generation of mobile phone technology and follows on
from 2G and 3G. 2G technologies was suitable for making calls and
sending text messages while 3G makes it possible to access the internet
more effectively through your mobile phone.
96
4. How fast is the 3g network? (R)
The average mobile broadband download speed on 4G (15.1Mbit/s)
was more than twice as fast as 3G (6.1Mbit/s) across all the networks.
The research found that performance varied by operator. EE and O2
offered faster than average 4G download speeds at 18.4 Mbit/s and
15.6Mbit/s respectively.
97
7. Write the advantages and limitations of 4G? (R)
98
Virtual navigation — 4G will provide users with virtual navigation
through which a user can access a database of streets, buildings, etc.,
of a large city.
This requires high speed transmission.
Tele-medicine — 4G will support the remote health monitoring of
patients via video conference assistance for a doctor at anytime and
anywhere.
Tele-geo-processing applications — 4G will combine geographical
information systems (GIS) and global positioning systems (GPS) in
which a user will get location querying.
99
13. List the OFDM advantages(R)
OFDM has been used in many high data rate wireless systems because of the
many advantages it provides.
Immunity to selective fading
Resilience to interference
Spectrum efficiency
Resilient to ISI
Resilient to narrow-band effects
Simpler channel equalization
100
17. Define cognitive radio? (R)
Cognitive radio (CR) is a form of wireless communication in which a
transceiver can intelligently detect which communication channels are in
use and which are not, and instantly move into vacant channels while
avoiding occupied ones.
PART – B
1. Define the role of the 4G system. (R)
2. Compare the 3G and 4G systems.(AZ)
3. Discuss multicarrier modulation (MCM). (AZ)
4. What is a multi-input multi-output (MIMO) system? Explain. (R)
5. How are higher spectral efficiency and increased throughput achieved in
the OFDM-MIMO system? (R)
6. What is the BLAST system? Explain. (R)
7. Explain in detail about software-defined radio system? (R)
8. Discuss briefly about cognitive radio? (AZ)
9. List some of the new technologies that will be used in the 4G system. (R)
10.Write your understanding on behaviour of smart antenna techniques. (A)
11. Explain adaptive modulation and coding with time-slot scheduler along
with cognitive radio concept. (U)
102
ASSIGNMENT QUESTIONS
Questions
103
Questions
104
address before, during, and after handover? What information
has to be transferred to which entity to maintain consistency for
the TCP connection? (R)
3.Show the interaction of mobile IP with standard TCP. Outline
the packet flow from a fixed host to a mobile host via a foreign
agent. Then a handover takes place. What are the following
actions of mobile IP and how does TCP react? (U)
Questions
2.Using the following data for a GSM network, estimate the voice
and data traff c per subscriber. If there are 40 BTS sites,
calculate voice and data traffic per cell.
105
Subscriber usage per month: 150 ,minutes Days per month: 24
,Busy hours per day: 6 ,Allocated spectrum: 4.8 MHz ,Frequency
reuse plan: 4/12 ,RF channel width: 200 kHz (full rate) ,Present
number of subscribers in a zone: 50,000, Subscriber growth per
year: 5%, Network roll-over period: 4 years, Number of packet
calls per session (NPCS): 5 (see Figure 17.1) ,Number of packets
within a packet call (NPP): 25, Reading time between packet calls
(Tr): 120 s ,Packet size (NBP): 480 bytes, Time interval between
two packets inside a packet call (Tint): 0.01 s, Total packet
service holding time during one hour (Ttot): 3000 s, Busy hour
packet sessions per subscriber: 0.15. (C)
Questions
106
SUBJECT CODE: GE 6075
SUBJECT NAME: PROFESSIONAL ETHICS IN
ENGINEERING
107
Unit – I
Human Values
Part – A
1. What are human values? (R)
Values decide the standard of behavior. Some universally accepted values are
freedomjustice and equality. Other principles of values are love, care, honesty,
integrity, self-respect.
9. Explainhonesty. (U)
Any human being should imbibe honesty-honesty in acts, honesty in speech and
honesty inbeliefs. Honesty is the fundamental virtue in human relationship even
though in may bedifficult to follow some times.
109
18. What is Yoga?(R)
A Hindu spiritual and ascetic discipline, a part of which, including breath
control, simple meditation, and the adoption of specific bodily postures, is
widely practiced for health and relaxation
Part – B
1. Briefly discuss honesty as value. (C)
2. Write short notes on courage, co -operation. (U)
3. Elaborate on service learning? (R)
4. Distinguish values from ethics and culture. (AZ)
110
5. What do you understand by the term spirituality? Explain in detail. (U)
6. Briefly write about the terms Values, Morals & Ethics? (R)
7. Write about Human Values?(U)
8. ‘Yoga and Meditation aids in Professional Excellence’. Comment.(C)
9. What is Stress? Write about Stress Management in detail.(R)
Assignment Questions
111
Unit – II
Engineering Ethics
Part – A
1. Define Ethics.(R)
Moral principles that govern a person's behavior or the conducting of an
activity.Study of right or wrong, good and evil, obligations and rights, justice,
social & political deals.
112
6. What are the Senses of Engineering Ethics? (R)
An activity and area of inquiry.
Ethical problems, issues and controversies.
Particular set of beliefs, attitudes and habits.
Morally correct.
113
mentally handicapped. Hence the study of engineering ethics is very essential
requirement for an Engineer to become a real manager.
114
19. What are the technical functions an Engineer require involving ethical
decisions? (AZ)
Engineers may have technical functions which involve ethical decisions-
designing a safe product, making false claim regarding product performance,
concealing product deficiencies from customers, shifting the blame on others
wrongfully, use of incorrect materials in product manufacture etc.
20. Explain how moral issues are related with (i) organization (ii)
Environment and (iii) Society? (U)
Most of the Engineers are not self-employed; they are employees of some
organization or other. As an employee, an Engineer should utilize his/her skills
to the benefit of the organization and should take decisions in the interest of
the organization.
It is very essential to use the resources carefully without depleting them.
An Engineer should take care of not to spoil the nature resources like air,
land and water
An Engineer is expected to have a certain amount of social responsibility
in addition to his core activities. Thus his motive should not solely to
earn profit, at the cost of society's interests
21. Explain how an engineer's morality is related with (i) Finance (H)
Competitor and (iii) Government? (U)
If a product is priced higher than optimum, it means that the engineers
are charging his inefficiencies upon the innocent customers. For a long
lasting business, a right price for the product is a very good indicator of
ethics
An engineer must An Engineer must do better than his competitors, by
all means; but he should not practice cut-throat competition. He should
not practice business strategies aim at finishing-off competitor practice
honesty with government in all the areas.
He should voluntarily comply with all Governmental regulations, pay
taxes and duties regularly, try to save foreign exchange and must co-
operate with enforcement agencies like police, customs, safety inspectors
etc.
115
Bureaucratic servant
Social servant
Social enabler and catalyst
Game player
27. What are the sorts of complexity and murkiness that may be involved
in moral situations? (AZ)
a) Vagueness b) conflicting reasons c) Problems of disagreement
116
29. What do you mean by problems of disagreement? (U)
In simple terms, even the most responsible people will have differing views on
interpreting moral issues. If it happens in an organization with differing
authority levels and boss-subordinate relationships, there could be severe
disagreements indeed.
32. What are the factors that influence the moral concern? (U)
Early childhood atmosphere.
Immediate neighborhood.
Interactions with friends and relations.
Type of family and family atmosphere.
Influence of media like Television and newspapers.
Emotional balance and intellectual capabilities of each individual.
33. What are the three levels of moral development in Kohlberg's theory?
(R)
(i) Pre-conventional level (ii) Conventional level and (iii) Post-conventional level
119
It is the generally believed technology and engineers hold the key for any
improvement in society. Therefore, this group holds the engineer as savior, who
will redeem the society of much ills-like poverty, low productivity, waste and
the hardships of manual labor.
120
54. Define Compromise.(R)
In a negative sense it means to undetermined integrity by violating one’s
fundamental moral principles.
In a positive sense, however, it means to settle differences by mutual
concessions or to reconcile conflicts through adjustments in attitude and
conduct.
57. What are the types of Theories about Morality/ Right action? (R)
Virtue ethics – Virtues and vices
Utilitarianism – Most good for the most people
Duty ethics – Duties to respect people
Rights ethics – Human rights
121
Right ethics followers will examine the same issue in terms of rights of public
vs. rights of the management.
64. List the various tests required to evaluate the Ethical Theories. (U)
Theory must be clear, and formulated with concepts that are coherent and
applicable.
It must be internally consistent in that none of its tenets contradicts any
other.
Neither the theory nor its defense can rely upon false information.
It must be sufficiently comprehensive to provide guidance in specific
situations of interests to us.
It must be compatible with our most carefully considered moral
convictions about concrete situations.
122
67. Listthe drawbacks of Rights Ethics. (U)
How do we prioritize the rights of different individuals?
It often promotes the rights of individuals at the expense of large groups
/ society.
Part-B
1. What are the ethical theories? How can you classify them? (R & U)
2. What is meant by virtues? Do engineers need virtues?(R & U)
3. What is meant by professional responsibility? Also discuss the theories about
virtues. (R & U)
4. Explain the various types of virtues.(U)
123
5. Illustrate the interconnectedness among the virtues of integrity and self-respect. (U)
6. Explain Gilligan’s theory of moral development. (U)
7. Explain Kohlberg’s model of moral development. (U)
8. Give the steps in confronting moral dilemmas.(R)
9. Explain the skills needed to handle problems about issues in engineering ethics. (U)
10. Discuss the different model of professional roles.(U)
11. What is the different ethical theory available for right action, self-interest, and
duty ethics?(R)
12. Explain how Gilligan view the three levels of moral development initiated by
Kohlberg. What is moral autonomy?(U & R)
13. Explain the skill needed to handle problems about moral issues in engineering
ethics. (E)
14. Explain the scope of engineering ethics. (U)
15. Discuss the importance of duty ethics and virtue in engineering profession. (U)
16. Explain the ethical theories and how these theories are useful in justifying moral
obligation to engineers.(U)
17. Discuss three types of inquiry. (U)
Assignment Questions
1. Identify the moral values, issues, and dilemmas, if any, involved in the following
cases, and explain why you consider them moral values and dilemmas.(A)
a. An engineer notified his firm that for a relatively minor cost a flashlight
could be made to last several years longer by using a more reliable bulb.
The firm decides that it would be in its interests not to use the new bulb,
both to keep costs lower and to have the added advantage of “built-in
obsolescence” so that consumers would need to purchase new flashlights
more often.
b. A linear electron accelerator for therapeutic use was built as a dual-mode
system that could either produce X-rays or electron beams. It had been
in successful use for some time, but every now and then some patients
received high overdoses, resulting in painful after-effects and several
deaths. One patient on a repeat visit experienced great pain, but the
remotely located operator was unaware of any problem because of lack of
communication between them: The intercom was broken, and the video
monitor had been unplugged. There also was no way for the patient to
exit the examination chamber without help from the outside, and hence
the hospital was partly at fault. On cursory examination of the machine,
the manufacturer insisted that the computerized and automatic control
system could not possibly have malfunctioned and that no one should
spread unproven and potentially libelous information about the design. It
was the painstaking, day-and-night effort of the hospital’s physicist that
124
finally traced the problem to a software error introduced by the
manufacturer’s efforts to make the machine more user-friendly.
2. Regarding the following example, comment on why you think simple human
contact made such a large difference. What does it say about what motivated
the engineers, both before and after the encounter? Is the case too unique to
permit generalizations to other engineering products?(A)
A team of engineers are redesigning an artificial lung marketed by their
company. They are working in a highly competitive market, with long hours
and high stress. The engineers have little or no contact with the firm’s
customers, and they are focused on technical problems, not people. It
occurs to the project engineer to invite recipients of artificial lungs and their
families to the plant to talk about how their lives were affected by the
artificial lung. The change is immediate and striking: “When families began
to bring in their children who for the first time could breathe freely, relax,
learn, and enjoy life because of the firm’s product, it came as a revelation.
The workers were energized by concrete evidence that their efforts really did
improve people’s lives, and the morale of the workplace was given a great
lift.”
3. With regard to each of the following cases, answer several questions. First, what
is the moral dilemma (or dilemmas), if any? In stating the dilemma, make
explicit the competing moral reasons involved. Second, are there any concepts
(ideas) involved in dealing with the moral issues that it would be useful to
clarify? Third, what factual inquiries do you think might be needed in making a
reliable judgment about the case? Fourth, what are the options you see
available for solving the dilemma? Fifth, which of these options is required
(obligatory, all things considered) or permissible (all right)?(A)
Case 1.An inspector discovers faulty construction equipmentand applies
a violation tag, preventing its continued use. Theinspector’s supervisor, a
construction manager, views the caseas a minor infraction of safety
regulations and orders the tagremoved so the project will not be delayed.
What should she do?
Case 2.A software engineer discovers that a colleague has
beendownloading restricted files that contain trade secrets about anew
product that the colleague is not personally involved with. Heknows the
colleague has been having financial problems, and hefears the colleague
is planning to sell the secrets or perhaps leavethe company and use them
in starting up his own company. Companypolicy requires him to inform
his supervisor, but the colleagueis a close friend. Should he first talk
with the friend about what heis doing, or should he immediately inform
his supervisor?
125
Case 3.An aerospace engineer is volunteering as a mentor fora high
school team competing in a national contest to build arobot that
straightens boxes. The plan was to help the studentson weekends for at
most eight to ten hours. As the national competitionnears, the robot’s
motor overheats, and the engine burnsout. He wants to help the
dispirited students and believes hismentoring commitment requires he
do more. But doing so wouldinvolve additional evening work that could
potentially harm hiswork, if not his family.
Case 4.During an investigation of a bridge collapse, Engineer
Ainvestigates another similar bridge, and finds it to be only
marginallysafe. He contacts the governmental agency responsible forthe
bridge and informs them of his concern for the safety of thestructure. He
is told that the agency is aware of this situation andhas planned to
provide in next year’s budget for its repair. Untilthen, the bridge must
remain open to traffic. Without this bridge,emergency vehicles such as
police and fire apparatus would haveto use an alternate route that would
increase their response timeby approximately twenty minutes. Engineer
A is thanked forhis concern and asked to say nothing about the
condition of thebridge. The agency is confident that the bridge will be
safe.
Case 5.A cafeteria in an office building has comfortable tablesand chairs,
indeed too comfortable: They invite people to linger longer than the
management desires. You are asked to designuncomfortable ones to
discourage such lingering.
4. Apply act-utilitarianism and rule-utilitarianism in resolving the following moral
problems. Do the two versions of utilitarianism lead to the same or different
answers to the problems?(A)
a. George had a bad reaction to an illegal drug he acceptedfrom friends at a
party. He calls in sick the day after, andwhen he returns to work the
following day he looks ill. Hissupervisor asks him why he is not feeling well.
Is it morallypermissible for George to lie by telling his supervisor that hehad
a bad reaction to some medicine his doctor prescribedfor him?
b. Jillian was aware of a recent company memo remindingemployees that
office supplies were for use at work only.Yet she knew that most of the other
engineers in her divisionthought nothing about occasionally taking home
notepads,pens, computer disks, and other office “incidentals.” Hereight-
year-old daughter had asked her for a companyinscribedledger like the one
she saw her carrying. Theledger costs less than $20, and Jillian recalls that
she hasprobably used that much from her personal stationery
suppliesduring the past year for work purposes. Is it all right forher to take
home a ledger for her daughter without askingher supervisor for
permission?
126
Unit – III
Engineering as Social Experimentation
Part – A
127
6. What are the basic similarities between engineering experiments and
standard experiments? (U)
Both the engineering and standard experiments are carried out in partial
ignorance.
The overall results of both the experiments remain mostly uncertain.
In both the experiments, monitoring is very essential to gain new
knowledge.
Final results have to be properly analyzed to get good results in both
engineering.
7. What are the various reasons for the repeated recurrences of tragedies
like that of titanic incident? (C)
Lack of interest and willingness of engineers to learn from their own earlier
designs, lack of established channels of communications, reservations in
obtaining relevant details of information, mental frustration and
embarrassment at failures and negligent attitude are the reasons for the titanic
tragedy.
9. What are the two main elements which are included to understand
informed consent? (R)
Knowledge [Subjects should be given not only the information they
request, but all the information needed to make a reasonable decision].
Voluntariness [Subjects must enter into the experiment without being
subjected to force, fraud, or deception].
128
It reflects the respects for the fundamental rights of minority people
involved in the experimental procedures.
It enables both the public and clients to be aware of the practical risks
and benefits of that experimentation.
11. What are the salient features of informed consent in engineering
experimentation? (R)
Consent is given on voluntary basis.
All the information requested and wanted by the persons, are provided in
understandable forms.
The person who gives the consent is allowed to process the information
before taking any rational decisions.
12. What are the general features of morally responsible engineers? (R)
a. Conscientiousness. b. Comprehensive perspective.c. Autonomy. d.
Accountability
129
effectively by the preventive measures. Such type of defensive measures to
prevent scientific ills is called preventive technology.
18. How will you relate the role of moral autonomy in professional
engineering? (U)
Moral autonomy imposes moral commitments on an engineer to serve in the
best interest of a company. It also helps to restore a conducive climate for an
autonomous participation in his professional work. It enables him to act as an
experimenter by enhancing his professional outlook.
25. What are the problems with the law in engineering? (U)
a. Minimal compliance b. Many laws are without enforceable sanctions.
26. What was the primary reason that caused the failure of space shuttle
program "challenger"? (C)
The consequent rupturing of O-ring that constitute the field joints due to
extreme cold weather was the primary reason that resulted in the failure of
challenger as space shuttle.
27. Name the aerospace experts and scientists who were associated with
the launching of challenger. (R)
Allan McDonald of Morton-Thiokol at Cape Kennedy, Arnold Thomson and
Roger Boisjoly who were the seal experts at Morton- Thiokol and engineering
managers, Bob Lund and Joe Kilminster were the experts associated with the
launching of challenger space program.
28. How exactly the tragic collapse of challenger space shuttle took
place? (AZ)
When challenger was launched on 28th January 1986 at the final countdown
of 11.38 AM, smoke puff emanated from one of the field joints on the right
booster rocket. This was followed by intense firing in the hydrogen tank and
subsequently booster rocket smashed into challenger's wing. Finally, when
challenger reached the height of 50,000 feet, it was completely engulfed in a
fireball, thereby killing all the cabin crews on board.
131
29. Name some of the safety issues concerned with the launching of
challenger. (R)
There was no escape mechanism for the crews.
The challenger astronauts were not informed of the problems of field
joints.
The crew members were not asked for their consent about the unsafe
mission.
132
Codes create differences of opinions in moral values, since the different
entries in codes overlap with each other.
Codes do not serve as the final authority for professional conduct. The
conventional and customary practices are not properly endorsed by the
codes.
Presence of separate codes for different professional engineering societies
through successive multiplications.
Part - B
1. Explain in detail the challenger accident. What are the ethical problem involved in
this?(U)
2. How can engineer become a responsible experimenter?(U)
3. Highlight the code of ethics for Engineers. (R)
4. What is the important code of ethics? Give brief account on ‘4’canons of codes of
ethics quoted by international standard or association.(U & R)
5. State the similarities to view engineering projects as experiments. (U)
6. How engineering project differs from standard experimentation. (U)
7. Discuss on the roles played by the codes of ethics set by professional societies. (U)
8. Give justification on how the challenger disaster could have been avoided by
engineers.(U)
9. Compare and contrast engineering experiments with standard experiments. (AZ)
10.Explain with help of example that engineers would learn not only from their earlier
design and operating results, but also from those of other engineers. (U)
11. Discuss Research Ethics.(U)
12. Explain work ethics in detail.(U)
133
Assignment Questions
1. From the Web site of an engineering professional society, select a code of ethics
of interest to you, given your career plans; for example, the American Society of
Civil Engineers, the American Institute of Chemical Engineers, the American
Society of Mechanical Engineers, or the Institute of Electrical and Electronics
Engineers. Compare and contrast the code with the NSPE code, selecting three
or four specific points to discuss. Do they state the same requirements with the
same emphasis?(A)
2. With regard to the same two codes you used in question 1, list three examples
of responsibilities that you believe would be incumbent on engineers even if the
written code did not exist, and explain why. Also list two examples, if any, of
responsibilities created (entirely or in part) because the code was written as a
consensus document within the profession.(A)
3. Is the following argument for ethical relativism a good argument? That is, is its
premise true and does the premises provide good reason for believing the
conclusion?(A)
a. People’s beliefs and attitudes in moral matters differ considerably from
society to society. (Call this statement “descriptive relativism,” because it
simply describes the way the world is.)
b. Therefore, the dominant conventional beliefs and attitudes in the society
are morally justified and binding (ethical relativism).
4. Reflection on the Holocaust led many anthropologists and other social scientists
to reconsider ethical relativism. The Holocaust also reminds us of the power of
custom, law, and social authority to shape conduct. Nazi Germany relied on the
expertise of engineers, as well as other professionals, in carrying out genocide,
as well as its war efforts.(A)
a. Do you agree that the Holocaust is a clear instance of where a cross-
cultural judgment about moral wrong and right can be made?
b. Judging actions to be immoral is one thing; blaming persons for
wrongdoing is another (where blame is a morally negative attitude toward
a person). Present and defend your view about whether the Nazi
engineers and other professionals are blameworthy. Is blaming pointless,
because the past is past? Or is cross-cultural blame, at least in this
extreme instance, an important way of asserting values that we cherish?
134
5. Moral skeptics challenge whether sound moral reasoning is possible. An
extreme form of moral skepticism is called ethical subjectivism: Moral judgments
merely express feelings and attitudes, not beliefs that can be justified or
unjustified by appeal to moral reasons. The most famous version of ethical
subjectivism is called emotivism: Moral statements are merely used to express
emotions—to emote—and to try to influence other people’s behavior, but they
are not supportable by valid moral reasons. What would ethical relativists say
about ethical subjectivism? What should be said in reply to the ethical
subjectivist?(A)
135
Unit–IV
Safety, Responsibilities and Rights
Part – A
1. Define Risk. (R)
A risk is the potential that something unwanted and harmful may occur. Risk
is the possibility of suffering harm or loss. It is also defined as the probability
of a specified level of hazardous consequences, being realized. Hence Risk (R) is
the product of Probability (P) and consequence(C) (i.e.) Risk = Probability X
Consequences.
137
The hazard presented by a system/substance is its potential to cause harm.
Hazard is associated with degree of danger and it’s quantifiable.
17. What are the methods by which you control risk? (R)
There are four methods by which we can control risk. They are risk avoidance,
risk retention, risk transfer and risk reduction.
20. Give the criteria which helps to ensure a safety design? (R)
The minimum requirement is that a design must comply with the
applicable laws.
138
An acceptable design must meet the standard of “accepted engineering
practice.”
Alternative designs that are potentially safer must be explored.
Engineer must attempt to foresee potential misuses of the product by the
consumer and must design to avoid these problems.
Once the product is designed, both the prototypes and finished devices
must be rigorously tested.
21. What are the factors for safety and risk? (R)
Voluntary and Involuntary risk Short-term and Long-term risk
Expected probability Reversible effects
Threshold levels to risk Delayed or Immediate risk etc.
24. What are the factors that affect Risk Acceptability? (R)
Voluntarism and control Effect of information on risk assessment
Job related pressures Magnitude and proximity of the people facing risk
26. What are the steps involved in design for safety? (R)
1. Define the problem
2. Generate alternate solutions
3. Analyze each solution
4. Test the solution
5. Select the best solution
6. Implement the chosen solution.
139
27. What are the ways in which risks are identified? (U)
1. Work place inspection
2. Management/worker discussions
3. Job safety analysis
4. Hazard and operate ability studies
5. Accident statistics.
28. Give any two action plan that would ensure safe design. (U)
1. Ensure advice on health and safety is made available to the project
2. Conduct brainstorming meeting of key personnel associated with the
development of the project to establish, identify risk and control action if
necessary.
32. What are the three conditions referred as safe exit? (R)
Assure when a product fails it will fail safely.
Assure that the product can be abandoned safely.
Assure that the user can safely escape the product.
140
The costs must be weighed against both organizational goals and degrees
of acceptability of risks to clients and the public.
The project or product must be tested and then either carried out or
manufactured.
35. Are the engineers responsible to educate the public for safe operation
of the equipment? How? (E)
Yes, as per the engineers are concerned with they should have their duty as to
protect for the safety and wellbeing of the general public. Analyzing the risk
and safety aspects of their designs can do this.
36. What are the safety measures an engineer must know before assessing
a risk of any product? (U)
The factors are:
a. Does the engineer have the right data?
b. Is he satisfied with the present design?
c. How does he test the safety of a product?
d. How does he measure and weigh the risks with benefits for a product.
43. Give the reasons for the Three Mile Island disaster? (U)
i. Inadequate training to the operators.
ii. Use of B & W reactors.
45. What happens to the products that are not safe? (U)
142
Products that are not safe incur secondary costs to the manufacturer beyond
the primary costs that must also be taken into account costs associated with
warranty expenses, loss of customer will and even loss of customers and so.
50. Write short notes on (i) Respect (ii) Commitment (iii) Connectedness
(U)
Respect is value for their professional expertise and their devotion to the social
goods promoted by the profession. Like friendship, collegial respect ought to be
reciprocal, but unlike friendship it need not involve personal affection
Commitment means sharing moral ideals inherent in the practice of
engineering. This also means how members of competing teams in sports
maintain a sense of underlying values beyond winning.
Connectedness is an awareness of being a co-operative undertaking created by
shared commitments and expertise
143
52. What are the two senses of Loyalty? (R)
i. Agency Loyalty – Acting to fulfill one’s contractual duties to an
employer. It’s a matter of actions, whatever its motives.
ii. Identification Loyalty – Has as much as to do with attitudes, emotions,
and a sense of personal identity as it does with actions.
62.Distinguish between human moral rights and special moral rights. (AZ)
Human rights such as the right to life, liberty, and pursuit of happiness are
possessed by virtue of being a person not by virtue of an institution. Special
moral rights are the right an employee acquires through employment
agreement to protectproprietary information, and employers have an
institutional right to require that employee do so.
145
Employees recognize their employer's authority when for the most part they
accept the guidance and obey the directive issued by the employer having to do
with the area of activity covered by the employer's institutional authority. There
are exceptions, since it is possible in special cases to recognize someone's
authority but to disobey an order on moral grounds. But our present concern
is to obtain a clearer idea of what accepting authority under normal conditions
should and should not involve
65. What are the criteria for identifying that information is “labeled”
confidential at the workplace? (R)
* Engineers shall treat information coming to them in the course of their
as confidential.
* Identify any information which if it became known would cause harm to
the corporation or client.
* Confidential information is any information that the employer or client
would like to have kept secret in order to compete effectively against
business rivals.
146
69.Explain Patents. (U)
Patents legally protect specific products from being manufactured and sold by
competitors without the express permission of the patent holder. Trade secrets
do not have such protection.
150
96. What are the types of Patents? (R)
a. Utility patents b. Design patents c. Plant patents
105. What are the two general ways to apply ethical theories to justify the
basic right of professional conscience? (R)
i. Proceed piecemeal by reiterating the justifications given for the specific
professional duties.
ii. Justify the right of professional conscience, which involves grounding
it more directly in the ethical theories.
152
outside activities of his choice, or for objecting to a directive that violates
common norms of morality.
110. What are the general procedures for implementing the right to due
process? (R)
i. Written explanations should be established that is available to all
employees who believe their rights have been violated.
ii. An appeals procedure should be established that is available to all
employees who believe their rights have been violated.
Part – B
1. Define Collegiality. State and explain the elements of collegiality. Why collegiality a
virtue? What are its negative aspects?(R & U)
2. What is meant by Loyalty? Explain Sense of Loyalty? Is loyalty Obligatory? What
are the relationship between responsibility and loyalty to employees? (R & U)
3. Describe the Various occupational crimes among the professional. (U)
4. Write a note on Intellectual Property Rights. Explain the various elements of IPR.
(U)
5. Explain in detail conflict of interest with examples. (U)
6. Explain the meaning of Professional Rights. (U)
7. Define collective bargaining. Explain the role of collective bargaining in work place
rights and responsibilities. (R & U)
8. How will you apply confidentiality for avoiding harmful conflicts of interest in work
place? (U)
9. What are the procedures to be followed in whistle blowing? How he avoids risks?(U)
10. Discuss human rights and professional rights in engineering field. (U)
11. Discuss the significance of IPR. Also explain the legislations covering IPR in India.
(U)
12. Explain in detail about the effect of information on risk assessments. (U)
13. How to account publicly for benefits and risks? (U)
14. Give a detailed discussion on safety and risk. (U)
154
15. Discuss on safety. Explain what safety measures are to be taken to establish a
nuclear power plant in a country. (R & U)
16. Write short notes on a) personal risk b) public risk. (U)
17. Describe the concept of risk benefit analysis. (U)
18. Give any four examples of improved safety and explain.(U)
19. Discuss on safety. Explain what safety measures to be taken by an engineer
working in deep ground mine. (U)
20. Explain various measures for assessing and reducing risk. (U)
21. Discuss the concept of safety exists in the Chernobyl case studies. (U)
22. A nuclear accident anywhere is a nuclear accident everywhere’. Explain this with
respect to Three Mile Island case study. (U)
23. What is risk-benefit analysis? Explain the different analytical methods used when
testing are inappropriate.(R & U)
Assignment Questions
1. On June 5, 1976, Idaho’s Teton Dam collapsed, killing eleven people and
causing $400 million in damage. The Bureau of Reclamation, which built the
ill-fated Teton Dam, allowed it to be filled rapidly, thus failing to provide
sufficient time to monitor for the presence of leaks in a project constructed with
less-than ideal soil. Drawing on the concept of engineering as social
experimentation, discuss the following facts uncovered by the General
Accounting Office and reported in the press.(A)
a. Because of the designers’ confidence in the basic design of Teton Dam, it
was believed that no significant water seepage would occur. Thus
sufficient instrumentation to detect water erosion was not installed.
b. Significant information suggesting the possibility of water seepage was
acquired at the dam site six weeks before the collapse. The information
was sent through routine channels from the project supervisors to the
designers and arrived at the designers the day after the collapse.
c. During the important stage of filling the reservoir, there was no around-
the-clock observation of the dam. As a result, the leak was detected only
five hours before the collapse. Even then, the main outlet could not be
opened to prevent the collapse because a contractor was behind schedule
in completing the outlet structure.
d. Ten years earlier the Bureau’s Fontenelle Dam had experienced massive
leaks that caused a partial collapse, an experience the bureau could have
drawn on.
155
3. Debates over responsibility for safety in regard to technological products often
turn on who should be considered mainly responsible, the consumer (“buyer
beware”) or the manufacturer (“seller beware”). How might an emphasis on the
idea of informed consent influence thinking about this question?(A)
6. “Airless” paint spray guns do not need an external source of compressed air
connected to the gun by a heavy hose (although they do need a cord to attach
them to a power source) because they have incorporated a small electric motor
and pump. One common design uses an induction motor that does not cause
sparking because it does not require a commutator and brushes (which are
sources of sparking). Nevertheless the gun carries a label warning users that
electrical devices operated in paint spray environments pose special dangers.
Another type of gun that, like the first, also requires only a power cord is
designed to weigh less by using a high-speed universal motor and a disk type
pump. The universal motor does require a commutator and brushes, which
cause sparking. This second kind of spray gun carries a warning similar to that
attached to the first, but it states in addition that the gun should never be used
with paints that employ highly volatile and flammable thinners such as
naphtha.The instruction booklet is quite detailed in its warnings.
A painter had been lent one of the latter types of spray guns. To clean the
apparatus, he partially filled it with paint thinner and operated it. It caught fire,
156
and the painter was severely burned as the fire spread. The instruction booklet
was in the cardboard box in which the gun was kept, but it had not been read
by the painter, who was a recent immigrant and did not read English very well.
He had, however, used the first type of airless paint spray gun in a similar
manner without mishap. The warning messages on both guns looked pretty
much the same. Do you see any ethical problems in continuing over-the-
counter sales of this second type of spray gun? What should the manufacturer
of this novel, lightweight device do?
In answering these questions, consider the fact that courts have ruled that
hidden design defects are not excused by warnings attached to the defective
products or posted in salesrooms. Informed consent must rest on a more
thorough understanding than can be transmitted to buyers by warning
labels.(A)
7. It has been said that Three Mile Island showed us the risks of nuclear power
and the Arab oil embargo the risk of having no energy. Forcing hazardous
products or services from the market has been criticized as closing out the
options of those individuals or countries with rising aspirations who can now
afford them and who may all along have borne more than their share of the
risks without any of the benefits. Finally, pioneers have always exposed
themselves to risk. Without risk there would be no progress. Discuss this
problem of “the risk of no risk.”(A)
8. Discuss the notion of safe exit, using evacuation plans for communities near
nuclear power plants or chemical process plants. (A)
9. Research the events at Chernobyl in 1986, and discuss what you see as the
main similarities and differences with Three Mile Island.(A)
157
11. In the following case, are the actions of Client A morally permissible?(A)
a. Client A solicits competitive quotations on the design and construction of a
chemical plant facility. All the bidders are required to furnish as a part of
their proposals the processing scheme planned to produce the specified final
products. The process generally is one which has been in common use for
several years. All of the quotations are generally similar in most respects
from the standpoint of technology.
b. Contractor X submits the highest-price quotation. He includes in his
proposals, however, a unique approach to a portion of the processing
scheme. Yields are indicated to be better than current practice, and quality
improvement is apparent. A quick laboratory check indicates that the
innovation is practicable.
c. Client A then calls on Contractor Z, the low bidder, and asks him to evaluate
and bid on an alternate scheme conceived by Contractor X. Contractor Z is
not told the source of alternative design. Client A makes no representation
in his quotation request that replies will be held in confidence.
12. Present and defend your view as to whether affirmative action is morally
permissible and desirable in (a) admissions to engineering schools, (b) hiring
and promoting within engineering corporations.(A)
13. .The majority of employers have adopted mandatory random drug testing
on their employees, arguing that the enormous damage caused by the pervasive
use of drugs in our society carries over into the workplace. Typically the tests
involve taking urine or blood samples under close observation, thereby raising
questions about personal privacy as well as privacy issues about drug use away
from the workplace that is revealed by the tests. Present and defend your view
concerning mandatory drug tests at the workplace.
In your answer, take account of the argument that, except where safety is a clear
and present danger (as in the work of pilots, police, and the military), such tests
are unjustified. Employers have a right to the level of performance for which they
pay employees, a level typically specified in contracts and job descriptions. When
a particular employee fails to meet that level of performance, then employers will
take appropriate disciplinary action based on observable behavior. Either way, it
is employee performance that is relevant in evaluating employees, not drug use
per se.(A)
158
women. Ms. X was alerted by other women engineers to expect unchallenging,
trivial assignments from a supervisor with Mr. Y’s background. Is there
anything she can and should do? Would it be ethical for her to try to forestall
the appointment of Mr. Y?(A)
159
Unit – V
Global Issues
Part – A
161
The ethical values that underline the welfare and interest of all animals and
humans who are capable of feeling the basic senses of pain, sight, smell and
pleasure is called sentient - centered ethics. This ethics further emphasizes the
important need of protecting the animals in their natural surroundings, when
engineering projects are undertaken.
162
Professional Issues
Computer Failures Computer Implementation Health conditions
20. What are the professional issues that are related with computer
ethics? (U)
Computer failures due to errors in software and hardware, switch over to a new
computer system only after incorporating the operational data of the old
system and comfortable working conditions to prevent any health problem to
any individual are the important professional issues in computer ethics.
26. What are the special features of an ethical corporate climate? (U)
Ethical valueis widely appreciated by managers and employees.
A corporate code of ethics is emphasized for using ethical language.
Moral tonesare set up in policies by management by providing suitable
guidelines for professional codes of ethics.
Proper methods and procedures for conflict resolution are suitably
evolved.
164
The management has to establish some procedures for resolving
conflicts.
30. What are the normative models to be used to avoid conflicts? (R)
Hired Guns Value-neutral Analysts Value-guided Advocates
31. How do you evaluate that engineers are best suited to be managers?
(U)
The high technical knowledge with professional enrichment to manage the
technological companies, easy accessibility of understanding the corporate
works than the non-engineering individuals and possession of high strength of
quantitative analysis are the positive qualities of engineers for considering
them as managers.
165
33. What are the characteristics of an engineer as expert advisers in
public planning and policy making? (U)
a. Honesty; b. Competence; c. Diligence; d. Loyalty
34. What are the four important areas that highlight the important
responsibilities of consulting engineers? (U)
Advertising services in the product sales divisions, competitive bidding by
submitting priced proposals, and contingency fees for the payment of their
works and necessary provisions for resolving disputes and conflicts are the
responsible duties of consulting Engineers.
35. What are the qualities of engineers to act as expert witnesses and
advisers? (U)
Engineers must act as consultants by providing expert testimony in
adversarial contexts.
They must involve in public planning and policy making.
They should act as impartial seekers and communicators of truth.
They should function as advocates in the interest of their corporations,
instead of becoming hired guns.
166
38. How engineers could act as morally creative leaders? (U)
Engineers should direct, motivate and organize the groups towards morally
valuable goal. They should have the total participation and involvement at all
levels of organizations. They should act in positive way for the betterment of
the professional society.
39. What are the ideals of voluntary service in engineering profession? (U)
Although engineers are restrained to have voluntary service, they must tend to
help the needy people through group efforts just like doctors and lawyers. They
should be properly motivated to help elderly and minority people who are
leading sub-standard life even without the basic amenities such as drinking
water, sewage systems and electricity. They could provide a· comparatively
cheaper services than the normal costs or free services by associating with
philanthropic engineering service organizations.
167
ii. To avoid real or perceived conflicts of interest whenever possible and to
disclose them to the affected parties when they do exist.
iii. To be honest and realistic in stating claims or estimates based on
available data.
iv. To reject bribery in all its forms.
v. To improve the understanding of technology, it’s appropriate
application, and potential consequences.
vi. To maintain and improve their technical competence and to undertake
technological tasks for others only if qualified by training or experience,
or after full disclosure of pertinent limitations.
vii. To seek, accept and offer honest criticism of technical work, to
acknowledge and correct errors, and to credit properly the contributions
of others.
viii. To treat fairly all persons regardless of such factors such as religion,
gender, disability, age or national origin.
ix. To avoid injuring others, their property, reputation or employment by
false or malicious action.
x. To assist colleagues and co-workers in their professional development
and to support them in following this code of ethics.
168
Cybercrime, or computer crime, is crime that involves a computer and a
network. The computer may have been used in the commission of a
crime, or it may be the target.
Part – B
1. Explain the issues related to computer ethics and internet with personal experience.
(U)
2. Discuss on the Professional Societies? (U)
3. Describe the concept of environmental ethics with a case study. (U)
4. What are the professional issues that are related with computer ethics? (U)
5. Describe how the sample code of ethics serves as a model guide for professional
conduct. (U)
6. Discuss on Engineers involved in weapon development and analyze the problems
faced by Defenseindustry. (U)
7. Write briefly a)Engineer as expert witness b)Engineer as good manager’s c)Engineers
as consulting engineers’ d)Engineer as advisor. (U)
8. Discuss on the pros and cons of multinational companies from the point of view of
ethics. (U)
Assignment Questions
169
to assume any moral or legal responsibility for the safety of the people affected
by the flood control plans, arguing that they are merely providing tools whose
use is entirely up to the engineers. Should the civil engineers be held
accountable for any harm caused by poor computer programs? Presumably
their accountability does extend to errors resulting from their own inadequate
specifications that they supply to the computer experts. Yet should not the
engineers also be expected to contract with computer specialists who agree to
be partially accountable for the end-use effects of their programs? (A)
4. A project leader working for a large retail business was assigned the task of
developing a customer billing and credit system. The budget assigned for the
project appeared at first to be adequate. Yet by the time the system was half
completed it was clear the funds were not nearly enough. The project leader
asked for more money, but the request was denied. He fully informed
management of the serious problems that were likely to occur if he had to stay
within the original budget. He would be forced to omit several important
program functions for convenience and safety: for example, efficient detection
and correction mechanisms for errors, automatic handling and reporting of
special customer exceptions, and audit controls. Management insisted that
these functions could be added after the more minimal system was produced
and installed in stores. Working under direct orders, the project leader
completed the minimal system, only to find his worst fears realized after it was
installed. Numerous customers were given incorrect billings or ones they could
not understand. It was easy for retail salespersons to take advantage of the
system to steal from the company, and several did so. Within a year the
company’s profits and business were beginning to drop. This led to middle-level
170
management changes, and the project leader found himself blamed for
designing an inadequate system. Did the project leader have an obligation
either to clients or to the company to act differently than he did? Did he have a
moral right to take further steps in support of his original request or later to
protect himself from managerial sanctions? (A)
6. The following warning to parents whose children use home computers was
carried by the Associated Press: “In recent years more sexually oriented
materials have been showing up for home computers—some on floppy disks
with X-rated artwork and games, and other accessed by phone lines from
electronic bulletin boards . . . with names like Cucumber, . . . Orgy, Nude pics,
Porno, Xpics, and Slave.” Discuss the ethical issues raised by pornography in
this new medium, as well as the issues raised by racist, sexist, and libelous
(false and defamatory) statements. How can access be denied to children?
Should there be controls for adults? Already there are thousands of bulletin
boards, largely because it is so easy and inexpensive to create them. Should
bulletin board operators be held liable for failing to filter illegal forms of verbal
assaults, even if that forces them to buy liability insurance and thereby raise
the costs of creating bulletin boards? (A)
171
7. Write a short research paper exploring the threats to privacy posed by data
banks. In your essay, comment on some specific advantages and disadvantages
of having one centralized national data bank that pools all available
government information on citizens. (A)
10. Identify and discuss the moral issues involved in the following case. The
great marshes of southern Florida have attracted farmers and real estate
developers since the beginning of the century. When drained, they present
valuable ground. From 1909 to 1912 a fraudulent land development scheme
was attempted in collusion with the U.S. Secretary of Agriculture. Arthur
Morgan blew the whistle on that situation, jeopardizing not only his own
position as a supervising drainage engineer with the U.S. Department of
Agriculture, but also that of the head of the Office of Drainage Investigation. An
attempt to drain the Everglades was made again by a Florida governor from
1926 to 1929. Once more Arthur Morgan, this time in private practice, stepped
in to reveal the inadequacy of the plans and thus discourage bond sales. But
schemes affecting the Everglades did not end then. Beginning in 1949, the U.S.
Army Corps of Engineers started diverting excess water from the giant Lake
Okeechobee to the Gulf of Mexico to reduce the danger of flooding to nearby
172
sugar plantations. As a result, the Everglades, lacking water during the dry
season, were drying up. A priceless wildlife refuge was falling prey to
humanity’s appetite. In addition, the diversion of waters to the Gulf and the
ocean also affected human habitations in southern Florida. Cities that once
thought they had unlimited supplies of fresh groundwater found they were
pumping salt water instead as ocean waters seeped in. Current estimates are
that $10 billion will be needed to reverse generations of damage, but initial
federal funding faded quickly after the combination of September 11, 2001 and
Hurricane Katrina diverted money in other directions. (A)
11. Discuss one of the following topics with an eye to how individual choices in
everyday life affect the environment: (a) drinking from disposable cups for
coffee or soda pop, (b) driving a sports utility vehicle that gets low gas mileage,
(c) eating beef, (d) going the extra mile to dispose of your spent dry cell at a
collection point (such as Radio Shack). (A)
14. Do you agree or disagree, and why, with Peter Singer’s claim that it is a
form of bigotry—“speciesism”—to give preference to human interests over the
interests of other sentient creatures? Also, should we follow Albert Schweitzer
in refusing to rank life forms in terms of their importance? (A)
15. Exxon’s 987-foot tanker Valdez was passing through Prince William Sound
on March 24, 1989, carrying 50 million gallons of oil when it fetched up on
Bligh Reef, tore its bottom, and spilled 11 million gallons of oil at the rate of a
thousand gallons a second. The immediate cause of the disaster was negligence
by the ship’s captain, Joseph J. Hazelwood, who was too drunk to perform his
duties. Additional procedural violations, lack of emergency preparedness, and a
single- rather than double-hull on the ship all contributed in making matters
worse. This was one of the worst spills ever, not in quantity, but in its effect on
a very fragile ecosystem. No human life was lost, but many thousands of birds,
fish, sea otters, and other creatures died. Discuss how each of the human-
173
centered and nature centered ethical theories would interpret the moral issues
involved in this case, and apply your own environmental ethic to the case. (A)
16. Discuss the “last person scenario”: You are the last person left on earth
and can press a button (connected to nuclear bombs) destroying all life on the
planet. Is there a moral obligation not to press the button, and why? How
would each of the environmental ethics answer this question? (A)
17. Evaluate the following argument from W. Michael Hoffman. In most cases,
what is in the best interests of human beings may also be in the best interests
of the rest of nature. . . . But if the environmental movement relies only on
arguments based on human interests, then it perpetuates the danger of
making environmental policy and law on the basis of our strong inclination to
fulfill our immediate self-interests. . . . Without some grounding in a deeper
environmental ethic with obligations to nonhuman natural things, then the
temptation to view our own interests in disastrously short-term ways is that
much more encouraged. (A)
19. Write an essay on one of the following topics: “Why Save Endangered
Species?” “Why Save the Everglades?” “What are corporations’ responsibilities
concerning the environment?” In your essay, explain and apply your
environmental ethics. (A)
20. Following the disaster at Bhopal, Union Carbide argued that officials at its
U.S. corporate headquarters had no knowledge of the violations of Carbide’s
official safety procedures and standards. This has been challenged as
documents were uncovered showing they knew enough to have warranted
inquiry on their part, but let us assume they were genuinely ignorant. Would
ignorance free them of responsibility? (A)
174
21. The moving of hazardous technologies, such as the manufacture of
asbestos, to less-developed countries is motivated in part by cheaper labor
costs, but another factor is that workers are willing to take greater risks. How
does Donaldson’s view apply to this issue? Also, do you agree with Richard De
George’s view that taking advantage of this willingness need not be unjust
exploitation if several conditions are met: (1) Workers are informed of the risks.
(2) They are paid more for taking the risks. (3) The company takes some steps
to lower the risks, even if not to the level acceptable for U.S. workers. How
would you assess Union Carbide’s handling of worker safety? Take into
account the remarks of an Indian worker interviewed after the disaster. The
worker was then able to stand only a few hours each day because of permanent
damage to his lungs. During that time he begged in the streets while he
awaited his share of the legal compensation from Union Carbide. When asked
what he would do if offered work again in the plant knowing what he knew
now, he replied: “If it opened again tomorrow I’d be happy to take any job they
offered me. I wouldn’t hesitate for a minute. I want to work in a factory, any
factory. Before ‘the gas’ [disaster] the Union Carbide plant was the best place in
all Bhopal to work.” (A)
22. How would you balance respect for diversity with commitments to respect
for individual rights in the following two cases? (A)
a. You are a woman assigned to work in a Middle Eastern country that requires
women to wear traditional clothing, but doing so conflicts with your religious
faith; or, you are a man who is a member of a team whose members include
women who are required to wear traditional clothing. If you decline the
assignment, your career advancement might suffer.
b. Your company is asked to design a more efficient weaving apparatus whose
size is quickly adjustable to young children, and you are assigned to the
project. You know that the primary market for the apparatus is countries that
use child labor.
23. During 1972 and 1973 the president of Lockheed, A. Carl Kotchian,
authorized secret payments totaling around $12 million beyond a contract to
representatives of Japan’s Prime Minister Tanaka. Later revelations of the
bribes helped lead to the resignation of Tanaka and also to the Foreign Corrupt
Practices Act that forbade such payments by American-based corporations. In
1995, long after Tanaka’s death, the agonizingly slow trial and appeals process
came to an end as Japan’s Supreme Court reaffirmed the guilty verdicts, but so
175
far no one has been jailed, and the case appears to have had little recent
impact on business and politics in Japan. Mr. Kotchian believed at that time it
was the only way to assure sales of Lockheed’s TriStar airplanes in a much-
needed market. In explaining his actions, Mr. Kotchian cited the following
facts:
There was no doubt in his mind that the only way to make the sales was
to make the payments.
No U.S. law at the time forbade the payments. Only later, in 1977, was
the Foreign Corrupt Practices Act signed into law, largely based on the
Lockheed scandal forbidding the payment of overseas bribes.
The payments were financially worthwhile, for they totaled only 3 percent
of an expected $430 million income for Lockheed.
The sales would prevent Lockheed layoffs, provide new jobs, and thereby
benefit workers’ families and their communities as well as the
stockholders.
He himself did not personally initiate any of the payments, which were all
requested by Japanese negotiators.
To give the TriStar a chance to prove itself in Japan, he felt he had to
“follow the functioning system” of Japan. That is, he viewed the secret
payments as the accepted practice in Japan’s government circles for this
type of sale.
Present and defend your view about whether Mr. Kotchian’s actions were
morally justified. In doing so, apply utilitarianism, rights ethics, and other
ethical theories that you see as relevant. (A)
24. The World Trade Organization (WTO) was established to oversee trade
agreements, enforce trade rules, and settle disputes. Some troublesome issues
have arisen when WTO has denied countries the right to impose environmental
restrictions on imports from other countries. Thus, for example, the United
States may not impose a ban on fish caught with nets that can endanger other
sea life such as turtles or dolphins, while European countries and Japan will
not be able to ban imports of beef from U.S. herds injected with antibiotics. Yet,
other countries ban crops genetically modified to resist certain pests, or
products made there from, unless labeled as such. Investigate the current
disputes and, using a case study, discuss how such problems may be resolved.
(A)
176
25. Corporations’ codes of ethics have to take into account international
contexts. Compare and contrast the benefits and liabilities of the types of
ethics programs (a and b) at Texas Instruments at two different times,
described as follows: (A)
a. Texas Instruments (TI) always had a long-standing emphasis on trust and
integrity, but during the 1980s it greatly intensified its efforts to make ethics
central to the corporation. In 1987 TI appointed a full-time ethics director, Carl
Skooglund, who was then a vice president for the corporation. Skooglund
reported to an ethics committee that in turn reported directly to the board of
directors. His activities included raising employees’ ethical awareness through
discussion groups and workshops on ethics, making himself directly available
to all employees through a confidential phone line, and—especially relevant
here—addressing specific cases and concerns in weekly newsletters and
detailed brochures called “Cornerstones.”
b. In 1995, TI’s popular chairman died suddenly, prompting a rapid review of
its policies. In two years, it made 20 acquisitions and divestitures, including
selling its defense-industry business, leaving it with more non-U.S. employees
than U.S. employees. The new chairman called for rethinking its ethics
programs to have both a greater international focus and more emphasis on a
competitive and “winning” attitude. Before his retirement, Carl Skooglund
scrapped the Cornerstone series, focused on specific issues and cases, and
replaced it with three core values: integrity (honesty together with respect and
concern for people), innovation, and commitment (take responsibility for one’s
conduct).
26. The following problem is taken from an article by Tekla Perry in the IEEE
Spectrum. Although it involves the U.S. National Aeronautics and Space
Administration rather than the Defense Department, many of the actors
(companies and government) involved in space research are also involved in
weapons development: Arthur is chief engineer in a components house. As
such, he sits in meetings concerning bidding on contracts. At one such meeting
between top company executives and the National Aeronautics and Space
Administration, which is interested in getting a major contract, NASA presents
specifications for components that are to be several orders of magnitude more
reliable than the current state of the art. The components are not part of a life-
support system, yet are critical for the success of several planned experiments.
Arthur does not believe such reliability can be achieved by his company or any
other, and he knows the executives feel the same. Nevertheless, the executives
indicate an interest to bid on the contract without questioning the
177
specifications. Arthur discusses the matter privately with the executives and
recommends that they review the seemingly technical impossibility with NASA
and try to amend the contract. The executives say that they intend, if they win
the contract, to argue mid-stream for a change. They remind Arthur that if they
don’t win the contract, several engineers in Arthur’s division will have to be laid
off. Arthur is well-liked by his employees and fears the layoffs would affect
some close friendships. What should Arthur do? (A)
27. Are there any ethical grounds for maintaining a large nuclear stockpile
today? Discuss any stabilizing or destabilizing effects you see. (A)
28. The just-war theory considers a war acceptable when it satisfies several
stringent criteria: The war must be fought for a just cause, the motives must be
good, it must follow a call from a legitimate authority, and the use of force
must be based on necessity (as a last resort). Central to notions of a just war
are the principles of noncombatant immunity and proportionality.
Noncombatants are those who will not be actively participating in combat and
therefore do not need to be killed or restrained. Proportionality addresses the
extent of damage or consequences allowable in terms of need and cost.
Describe a scenario for the conduct of a just war and describe the kinds of
weapons engineers might have to develop to wage one. In your view, is the
U.S.-Iraq war a just war? (A)
29.Wernher von Braun designed Hitler’s V-2 rocket that terrorized London
toward the end of World War II; after the War he worked for the U.S. Army and
designed the Saturn rockets that launched Apollo astronauts to the moon.
Research his career and comment on its implications for thinking about
engineering (A)
178
SUBJECT CODE: MG 6071
SUBJECT NAME: ENTREPRENEURSHIP
DEVELOPMENT
179
UNIT I – ENTREPRENEURSHIP
PART - A
1. Who is an entrepreneur? (R)
A person who is able to identify business opportunities and implement
actions to maximize on the opportunities.
An entrepreneur initiates enterprise creation, undertakes risks, and
manages resources to establish and operate a business enterprise that is
capable of self-sustainance.
180
5. Who are ultrapreneurs? (R)
Business Idea
Skills (Technical/Managerial)
Market
Capital (Opening. Working or Long Term)
Machinery (Technology)
Raw Materials
Location (Strategic)
181
Legal Issues
Competition
8. What the characteristics/traits of an entrepreneur? (R)
Entrepreneur Entrepreneurship
Entrepreneur is a person who is Entrepreneurship is one who
willing to launch a new venture or undertakes innovations, finance and
enterprise and accept full business acumen in an effort to
responsibility for the outcome. transform innovations into economic
goods.
Entrepreneur is an individual who Entrepreneurship is the combining of
take upon himself the risk of going all factors of production which include
into business with the aim of making LAND,LABOUR and CAPITAL
profit
Entrepreneur one who undertakes and The process in which an entrepreneur
operates a new enterprise and starts and operates his business
182
assumes some accountability for the enterprise is entrepreneurship.
inherent risks.
183
gratification. entrepreneur.
Status Owner of the enterprise. Servant in the enterprise
owned by the
entrepreneur.
Risk Bearing Assumes all risks and Does not bear any risk
uncertainty involved in running involved in the
the enterprise. enterprise.
Qualification High achievement motive, origi- Possess distinct
nality in thinking, foresight, risk qualifications in terms of
-bearing ability and so on. sound knowledge in
management theory and
practice.
Risk-bearing function
Organizational function
Innovative function
Managerial function
Decision making function
185
17. Define Drone Entrepreneur. (R)
Problem of finance
Scarcity of raw materials
Limited Mobility
186
Lack of Education
Male dominated society
Low Risk bearing ability
Rural Entrepreneurship
Tourism Entrepreneurship
Agricultural Entrepreneurship
Social Entrepreneurship
187
UNIT II - MOTIVATION
1. List the major motives influencing on entrepreneurs. (Az)
Self-Actualization Motives
Work Motives
Autonomy and Power Motives
Status Motives
Application Motives
Doentic Motives
Educational Background
Occupational experience
Desire to work independently
Family Background
Assistance from Government
Assistance from financial institutions
188
There are people who take on the role of achievement motivation in a
different manner.
o There are some who are motivated to achieve their goals only if
there performance is evaluated and an award is given.
o There are some who are motivated to achieve their goals because of
their fear of success or failure
189
7. What is self-employment? (R)
10. List the exercises and games for Entrepreneurial Motivation Training
(EMT). (Az)
Micro-labs
Thematic Apperception Test (TAT)
Achievement Planning (APO) exercises/Boat Making Exercise
Tower Building
Creating Games
Convice and Crown
190
11. What is Thematic Apperception Test? (R)
Competition
Unrealistic goals
Limited Capital
Meeting expectations
Growth and expansion issues
Change and Challenges
191
14. What is self-efficacy? (R)
Self-efficacy is defined as people's beliefs about their capabilities to
produce designated levels of performance that exercise influence over
events that affect their lives.
Self-efficacy beliefs determine how people feel, think, motivate
themselves and behave.
Competence Competency
Skill Based Behaviour Based
Standard attained Means of Behavior
Helps what is to be measured Helps how the standard is achieved
192
18. List the major competencies of successful entrepreneurs. (Az)
Pro-activity
o Initiative
o Assessiveness
Achievement Orientation
o Sees and acts as opportunity
o Efficiency orientation
o Concern for high quality work
o Systematic Planning
Commitment to Others
o Commitment to work contract
o Recognizing the importance of business relationships
19. What is Entrepreneurship Development Program (EDP)? (R)
193
21. What are the objectives of Entrepreneurship Development Program?
(R)
Develop and strengthen the entrepreneurial quality, i.e. motivation or
need for achievement.
Analyse environmental set up relating to small industry and small
business.
Understand the process and procedure involved in setting up a small
enterprise.
Acquire the necessary managerial skills required to run a small-scale
industry.
Appreciate the needed entrepreneurial discipline.
Pre-training EDP
Training Phases
Post training phase (Also Follow up)
194
24. What are the entrepreneurial dimensions to be assigned to become
potential entrepreneurs? (R)
Achievement Motivation
Risk propensity
Personal efficacy
Leadership quality
Commitment to task
Planning and organizing ability
195
UNIT III - BUSINESS
Labor intensive
Flexibility
One-man show
Use of indigenous raw materials
Localized operation
Lesser gestation period
197
9. What are the differences between micro and macro enterprises? (R)
10. List the rationale behind micro and small enterprise development in
the country. (Az)
Employment argument
Equality argument
Decentralization argument
Latent resource argument
198
11. What are objectives of developing micro enterprises? (R)
To generate immediate and large scale employment opportunities with
relatively low investment.
To eradicate unemployment problem from the country.
To encourage dispersal of industries to all over country covering small
towns, villages and economically lagging regions.
To promote balanced regional development in the whole country.
12. What are the various rationale arguments behind micro and macro
enterprises? (R)
Employment argument
Equality argument
Decentralization argument
Latent resources argument
13. Infer how society helps and cooperates with enterprise / business? (U)
14. What are problems faced by micro and small enterprises? (R)
Problems in procuring raw materials due to scarcity, poor quality and
high cost.
Problems of finance due to weak economic base, poor financial
assistance from commercial banks and financial institutions.
199
Problem of marketing by comparing products unfavorably with the
quality of products of large scale industries
Problem of under-utilization of capacity because of poor power
supply, cannot afford to go for alternatives like large-scale industries.
15. What are the steps in setting up of a small business enterprise? (R)
Information collection
Information organization
Acquiring required / vocational skills
Financial requirements
Market assessment
Provision of Crisis
18. What is a business plan? (R)
Development of a written document that spells out like a roadmap where
you are, whey you want to be, and how you want to get there.
It is a formal written expression of the entrepreneurial vision, describing
the strategy and operations of the proposed venture.
17. List the contents of business plan. (Az)
General information
Promoter
Location
Land and building
Plant and Machinery
Production Process
Utilities
Transport and Communication
Raw material and Manpower
Products and Market
Requirements of working capital and funds
200
18. What is project formulation? (R)
It is the process of examining technical, economic, financial and
commercial aspects of a project.
It is the process and steps through which an opportunity becomes a
project in which the entrepreneur is willing to invest his time, money and
other resources.
19. Illustrate the need for project formulation. (U)
Knowledge About Government Regulations
Absence of External Economies
Non-Availability of Technically Qualified Personnel.
Resource Mobilization
Selection of Appropriate Technology
20. What are the elements of project formulation? ®
Feasibility Analysis
Techno-Economic Analysis
o Estimation of demand or market potential
o Selection of Technology
Project Design and Network Analysis
Input Analysis
Financial Analysis
Social Cost Benefit Analysis
Pre-investment Appraisal
General information
Project Description
Market Potential
Capital Costs and sources of finance
201
Assessment of working capital requirements
Other financial aspects
Economic and social variables
Project implementation
202
24. Summarize the factors to consider while preparing feasibility report.
(U)
Technical considerations
o Employment, ecology, infrastructure demands, capital services,
balance of payments
o Description of product, selected manufacturing process
o Determination of plant size and production schedule
o Selection of machinery and equipment
o Identification of plant location and design
Economic considerations
o Identifying the market potential in terms of current demand
o Cost and project at different price levels
o Competitors both direct and indirect to be analyzed
o Data related to per capita income, level of consumption
expenditure, inventories, new orders etc.
Financial considerations
o Assessment of total cost, initial capital requirements and cash
flows
o Financial analysis showing return on investment, return on equity
o Details regarding equity shares, preference shares, debentures,
long term loans, bank loans etc.
Managerial competence
o Activity analysis involving anticipated work flow and activities
involved in project
o Grouping of activities into tasks which employees perform
Implementation Schedule
o Helps when to apply for term loans, procurement of land site,
construction of factory shed, getting water and power connections,
purchase of plant, recruitment of human resources, trial
production etc.
203
25. What is a project report? (R)
A project report may be defined as a document with respect to any
investment proposal based on certain information and factual data for
the purpose of appraising the project.
Project report is an essential document for procuring assistance from
financial institutions and for fulfilling other formalities for
implementation of the project.
204
Product demand, capital resources, raw material availability, labour
resources etc. must be estimated properly after considering varied
factors.
The end result should be to receive finance and to get the project
implemented.
Complete satisfaction of the entrepreneur/promoter should be ensured
before the report is submitted to the financial institutions.
29. What are the problems faced in the preparation of project report? (R)
Strict condition of promoter’s contribution may dampen the enthusiasm
of entrepreneurs.
All lending institutions demand a lot of documents before credit is
granted.
Problems regarding working capital assessment due to unrealistic
assumptions
Time overrun will lead to cost overrun.
Lending institutions expect strict specifications with regard to size of the
land, buildings, sources of machinery, their costs etc.
A number of clearances have to be obtained from the government
departments. This causes strain and wastage among entrepreneurs.
205
31. What are the methods of project appraisal? (R)
Economic analysis
Financial analysis
Market analysis
Technical feasibility
Management competence
32. What the various forms of ownership in small scale enterprises? (R)
Sole Proprietorship
Partnership
Company
o Private Limited company
o Public Limited company
Co-operative
33. What are the criteria for selection of an appropriate form of business
ownership? (R)
Nature of business
Area of operations
Degree of control
Capital requirements
Extent of risk and liability
Duration of business
Government regulations
206
It does not require legal recognition and attendant formalities.
207
UNIT IV – FINANCING AND ACCOUNTING
1. Justify the classifications of financial needs. (E)
Based on Performance
Fixed Capital
Working Capital
Based on period of use
Long term capital
Short term capital
209
Manpower assessment with respect to skilled, semi-skilled workers.
Assessment of availability of infrastructure facilities like quality testing,
research and development, transport, prototype development, warehouse
etc.
Provides information about various government schemes, subsidies,
grants and assistance available from the other corporations set up for
promotion of industries.
Acts as a link between the entrepreneurs and the lead bank of the
district.
210
11. What is capital structure? (R)
It is defined as the composition of debt and equity by which the
organization funds its overall operations. Simply it is the mix or composition of
debt and equity in the firm’s capital.
212
Stock
Cyclical fluctuation
213
29. What is the basis of charge of income tax? (R)
Income tax is an annual tax on income
Income of previous year is taxable in the next following assessment
year
Tax rate are fixed by the annual finance act
Annual finance act shall be amended every year
Tax is charged on every person
Tax is charged on total income of every person
214
32. What are the components of income? (R)
Profits and gains
Dividends
Value of any benefit or amenity whether convertible into money or not
Any capital gain
Profits and gains of any business
Any sum received by the assessee as his employees contributions to
any provident fund etc.
33. What are the pre-requisites taxable for all employees on income? (R)
Rent free house
Concessional Rent house
Obligation of employee met by employer
Amounts paid by employer club bill, gas and electricity, education bill
of children
34. What are the pre-requisites exempted for all employees on income?
(R)
Free medical facilities
Free refreshments
Free recreational facilities
Provision of telephone
Free meals
Free education, training or refresher course
Goods sold at concessional rates
Rent free house given to an officer of parliament
Conveyance facilities to judges of supreme court or high court
215
o Income from salaries
o Income from houseproperty
o Profit and gains of business or profession
o Capital gains
o Income from other source
36. What is salary? (R)
Salary includes the following amounts received by an employee from
its employer. It includes:
o Wages
o Any annuity or pension
o Encashment of earned leave
o Compensation for retirement
o Any gratuity
o Any fees, commission, bonus, allowances perquisites or profit in
lieu of salary
o Any advance salary
o Provident Fund
37. What are four kinds of provident fund? (R)
Statutory Provident fund
Recognized Provident Fund
Unrecognized Provident Fund
Public Provident Fund
38. List out the various deductions under section 16. (Az)
Standard deduction
Entertainment deduction
Tax on employment
39. What is capital gain? (R)
Any profit earned from the transfer of a capital asset.
216
40. What the types of capital gains? (R)
Short term capital gain – Capital asset held by an assessee for not
more than 36 months immediately before the date of transfer
Long term capital gain – Means a capital asset held by an assessee
for more than 36 months preceding the date of retirement.
41. What is a sales Tax? (R)
Sales tax is a levy either on purchase or sales of goods under the
basic scheme of taxation of India.
State Government will get revenue from Sales Tax including Tax on
inter-state purchase or sales of goods, excise on liquor and tax on
agricultural income.
42. What is excise duty? (R)
Excise duty is any duty or tax levied upon the manufacture or sale or
consumption of commodities within the country.
43. List the kinds of excise duty. (Az)
Basic Excise duty
Special duties of Excise
Additional Excise Duty in lieu of Sales tax
Less of excise duties leviable on certain specified commodities
under various act
217
UNIT V – SUPPORT TO ENTRPRENEURS
Any industrial company (being a company registered for not less than
five years) which has, at the end of any financial year, accumulated losses
equal to, or exceeding, its entire net worth and has also suffered cash losses in
such financial year and the financial year immediately preceding such financial
year.
A sick unit is that which has incurred a cash loss for one year and is
likely to continue incurring losses for the current year as well as in the
following year and the unit has an imbalance in its financial structure.
Normal Unit
Tending towards sickness
Incipient Sickness
4. What are the important signals of industrial sickness? (R)
218
5. What the important symptoms which characterize industrial sickness?
(R)
Persisting shortage of cash
Deteriorating financial rations
Widespread use of creative accounting
Continuous tumble in the prices of the shares
Frequent request to banks and financial institutions for loans
Delay and default in the payment of statutory dues
220
It is an organization designed to accelerate the growth and success of
entrepreneurial companies through an array of business support
resources and services.
221
o Developing business idea
o Business and strategic planning
o Proactive support
o Financial and legal advice
o Management
Provide the following business services
o Book Keeping and word processing
o Photocopier, fax and postage services
o Conference and meeting rooms
o Reception and telephone answering
o Secretarial services
Provide an environment where small business are not alone; thereby
reducing the anxiety of starting a new venture.
14. List the various government policies for development and promotion
of small scale industries. (Az)
Industrial Policy Resolution (IPR) 1948
Industrial Policy Resolution (IPR) 1956
Industrial Policy Resolution (IPR) 1977
Industrial Policy Resolution (IPR) 1980
Industrial Policy Resolution (IPR) 1990
222
16. What is Industrial Policy Resolution (IPR) 1956? (R)
IPR 1956 provides continuing policy support to the small sectors.
During this period ‘Rural Industries Projects’ and ‘Industrial Estates
Projects’ were started to strengthen the small-scale sector in the country.
IPR 1956 for small-scale industries aimed at “Protection plus
Development.”
Also initiated the modem SSI in India.
21. What the salient features of small enterprise policy 1991? (R)
The MSMED Act, 2006 defines the Micro, Small and Medium Enterprises
224
based:
23. What are the strategies used for the growth of small-scale enterprise?
(R)
Expansion
Diversification
Joint Venture
Mergers and Acquisitions
Sub-Contracting and 6. Franchising.
225
26. Distinguish between Franchising, Distributorship and Agency (Az)
Product Franchising
Manufacturing Franchising
Business-Format Franchising
28. What are the reasons for the buyer to merge? (R)
29. What are the reasons for the seller to merge? (R)
226
30. List down the types if Mergers & Acquisitions (M & A) (Az)
Horizontal M & A
Vertical M & A
Concentric M & A
Conglomerate M & A
Horizontal Diversification
Vertical Diversification
Concentric Diversification, and
Conglomerate Diversification
33. Discuss the various triggers to make joint ventures effective and
successful. (C)
Technology
Geography
Regulation
Sharing of Risk and Capital
Intellectual Exchange
227
PART B QUESTIONS
UNIT I - ENTREPRENEURSHIP
1. What is entrepreneurship? Distinguish between entrepreneur and
entrepreneurship. (R)
2. Determine the various functions performed by entrepreneurs. (E)
3. Explain the salient characteristics of successful entrepreneurs. (E)
4. Who is an intrapreneur? How intrapreneur differs from an entrepreneur? (R)
5. Elaborate the various charms people found in becoming entrepreneurs. (C)
6. Classify the types of entrepreneurs. Which one do you think most suitable
for India? (Az)
7. Outline an essay on the growth of entrepreneurship in India. (U)
8. Summarize the evolution and growth of industrial entrepreneurship in India.
(U)
9. What is the meaning of social entrepreneur? Explain with examples how
social entrepreneurs benefit society and humanity at large. (R)
10. What factors do influence the emergence and development of
entrepreneurship? (R)
11. Explain the role of Government in promoting entrepreneurship in India. (U)
UNIT II - MOTIVATION
1. Define entrepreneurial motivation. Discuss the major themes of
entrepreneurial motivation. (R)
2. Infer how achievement motivation can be developed? (U)
3. What are the various factors motivating people to become entrepreneurs? (R)
4. Summarize the various exercises and games used for developing
achievement motivation. (U)
5. Examine the need and objectives of Entrepreneurship Development Program
(EDP) in India. (Az)
6. Classify the various phases involved in an EDP. (U)
7. Develop course content and curriculum of an EDP. (A)
228
UNIT III - BUSINESS
1. What is a micro enterprise? Justify the need for developing micro
enterprises in our country. (R)
2. Interpret the various types of small scale industries. (U)
3. Elaborate the essentials, features and characteristics of small enterprises.
(C)
4. Perceive the scope and objectives of micro enterprises. (E)
5. What do you mean by opportunity? Justify the need for and significance of
opportunity identification and selection. (R)
6. Explain the various steps in setting up of a small business enterprise. (U)
7. What is the need and significance of the preparation of a project report for a
small scale entrepreneur? Explain with example. (R)
8. Determine the essential elements of a good business plan. (E)
9. List out the various stages involved in formulation of a business plan. (Az)
10. Demonstrate the common errors made in writing a business plan that
make it failure or poor. (U)
11. Recall how a project formulated? Give an overview. (R)
12. Justify the common errors made by the entrepreneurs in project
formulation. (E)
13. What do you understand by project appraisal? Why is it done? (R)
14. Outline the need for and importance of project appraisal. (U)
15. Summarize the methods of project appraisal used to appreciate a proposed
proposal. (U)
ASSIGNMENT QUESTIONS