Saturday 28 February 2015

Mit204 smu M.sc it Winter 2014 IInd sem assignment

[Winter 2014] ASSIGNMENT
PROGRAM - Master of Science in Information Technology (MSc IT)
SEMESTER - 2
SUBJECT CODE & NAME - MIT204– Data Communication & Networking
CREDIT – 4 BK ID - B1389 MAX. MARKS - 60

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412


1 Write about transmission impairments.
Answer:
Analog signal consist of varying a voltage with time to represent an information steam. If the transmission media were perfectly, the receiver could receive exactly the same signal that the transmitter sent. But communication lines are usually not perfect, so the receive signal is not the same as the transmitted


2. Explain the major criteria for a Data Communication Network
Answer: The major criteria that a Data Communication Network must meet are:
Performance
Consistency
Reliability
Recovery
Security

1.       Performance
Performance is the defined as the rate of transferring error free data. It is measured by the Response


3. Write a note on a) 10Base2  b) 10Base- T
Answer:
10Base2:
10BASE2 (also known as cheapernet, thin Ethernet, thinnet, and thinwire) is a variant of Ethernet that uses thin coaxial cable (RG-58A/U or similar, as opposed to the thicker RG-8 cable used in 10BASE5 networks), terminated with BNC connectors. During the mid to late 1980s this was the dominant 10

4 What do you mean by congestion? Explain
Answer:
Definition: Congestion is a major problem when traffic in the network is very high.
 When too many packets are present in (a part of) the subnet, performance degrades. This situation is called congestion.

5 Explain the following
a) Class A networks
b) Class B networks [5+5] 10
Answer:
Class A networks
Each Class A network address has an 8-bit network-prefix with the highest order bit set to 0 and a seven-bit network number, followed by a 24-bit host-number. Today, it is no longer considered 'modern' to refer to a Class A network. Class A networks are now referred to as "/8s" (pronounced "slash eight" or just "

6.Explain the following.
a) Open loop congestion control
b) Closed loop congestion control

Answer: Open Loop Congestion Control

• In this method, policies are used to prevent the congestion before it happens.
• In this method of congestion control, congested router or node sends a special type of packet called

7. List the various categories of network security problems.
Answer: Network security problems can be divided roughly into four categories:

1) Secrecy:

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412


Mit203 smu M.sc it Winter 2014 IInd sem assignment

Winter 2014 ASSIGNMENT
PROGRAM - Master of Science in Information Technology (MSc IT)Revised Fall 2011
SEMESTER - 2
SUBJECT CODE & NAME – MIT203- ANALYSIS AND DESIGN OF ALGORITHMS
CREDIT 4 BK ID B1480 MAX. MARKS 60
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412

Q1. Write the steps involved in analyzing the efficiency of non-recursive algorithms.
Answer: Answer:
The steps involved in analyzing the efficiency of non-recursive algorithms are as follows:
 Decide the input size based on the constraint n

2 Define selection sort and explain how to implement the selection sort? 3+7=10
Answer:
Definition: Selection sort is one of the simplest and performance oriented sorting techniques that work well for small files. It has time complexity as O(n2) which is unproductive on large


3 What is mean by Topological sort? And explain with example. 5+5=10
Answer: Topological sort is done using a directed acyclic graph (DAG), which is a linear ordering of all vertices G= (V, E) is an ordering of all vertices such that if G contains an edge (u, v), then u appears before v in the ordering. A topological sort of a particular graph can be looked

4. Explain good-suffix and bad-character shift in Boyer-Moore algorithm. 5+5=10
Answer: Good suffix Shift
This shift helps in shifting a matched part of the pattern, and is denoted by Q. Good suffix shift Q is applied after 0 < k < m characters are matched.

5 Solve the Knapsack problem using memory functions.
Item 1 2 3 4
Weight 2 6 4 8
Value (in Rs.) 12 16 30 40
Knapsack capacity is given as W=12. Analyze the Knapsack problem using memory functions with the help of the values given above. 10
Answer:
 Knapsack Problem by Memory Functions

6 Describe Variable Length Encoding and Huffman Encoding.
Answer:
Variable Length Encoding
Variable-length codes can allow sources to be compressed and decompressed with zero error (lossless data compression) and still be read back symbol by symbol. With the right coding
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412



Mit202 smu M.sc it Winter 2014 IInd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412

[ Winter 2014 ] ASSIGNMENT
PROGRAM M.Sc IT
SEMESTER 2
SUBJECT CODE & NAME-MIT202– Data Base Management System(DBMS)
CREDIT 4, BK ID B1479, MAX. MARKS 60

Q1 Explain the functions of the following (a) Entities (b) Attributes (c) Relationships 3+3+4

Answer - 
Entities
Entities are the principal data objects about which information is to be collected; they usually denote a person, place, thing, or event of informational interest. A particular occurrence of an entity is called an entity instance or sometimes an entity occurrence. Consider a Company

Q2 Write the functions of the following (a) Storage Manager (b) Buffer Manager   3+2
Answer –    
Storage manager 

                The Storage Manager: The Storage Manager interfaces with the operating system (OS) to write data to the disk efficiently. Because the storage functions reside in a separate

Q3. What are the important responsibilities of database manager? Explain
Answer - Databases typically require a large amount of storage space. Corporate databases are usually measured in terms of gigabytes of data. Since the main memory of computers cannot

Q no 4 Explain the Sequential File Organization.
Answer - A sequential file is designed for efficient processing of records in sorted order based on some search-key. A search key is any attribute or set of attributes; it need not be the primary key, or even a superkey. To permit fast retrieval of records in search-key order, we chain

Qno 5 Explain basic operations of Relational algebra?
Answer - Basic operations are the traditional set operations: union, difference, intersection and Cartesian product. Three of these four basic operations- union, intersection, and difference –

Q6 What are the disadvantages of Data Distribution
Answer - Disadvantages of Data Distribution The primary disadvantage of distributed database systems is the added complexity required to ensure proper coordination among the sites. This increased complexity takes the form of:

Q no 7 Write a note on the following a) SUBSET Mapping b) SUPERSET Mapping  5+5
Answer -  As a result, VBSF supports two types of class-to-table mappings that help overcome the differences between relational and object models: SUBSET and SUPERSET.
SUBSET Mapping: This type of mapping is used when all the attributes of a persistent class are mapped to the same table. It is also used when a persistent class is not concerned with some
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412


Mit201 smu M.sc it Winter 2014 IInd sem assignment

Winter 2014 ASSIGNMENT
PROGRAM M.Sc IT
SEMESTER - 2
SUBJECT CODE & NAME –MIT201
CREDIT – 4 BK ID - B1405, MAX. MARKS - 60
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412

Q1. Define operating system. Explain any four major functions of Operating system.
Answer:
Operating System – Definition
Operating System is a System Software (Set of system programs) which provides an environment to help the user to execute the programs. The Operating System is a resource

Q2 Explain the different process states. 5*2
Answer.

Different process states

A program in execution is a process. A process is executed sequentially, one instruction at a time. A program is a passive entity.



Q3 Define Deadlock. Explain necessary conditions for deadlock. 2+(2*4)
Answer.


Deadlock

Deadlock occurs when we have a set of processes [not necessarily all the processes in the system], each holding some resources, each requesting some resources, and none of them is able to obtain what it needs, i.e. to make progress. We will usually reason in terms of resources R1, R2... Rm and processes P1, P2... Pn. A process Pi that is waiting for some currently unavailable


Q4 Differentiate between Sequential access and Direct access methods. 5+5
Answer.

Sequential access and Direct access methods

Sequential access

In this simple access method, information in a file is accessed sequentially one record after another. To process the ith record all the i-1 records previous to i must be accessed. Sequential access is based on the tape model that is inherently a sequential access device. Sequential access is best suited where most of the records in a file are to be processed. For example, transaction


Q5 Differentiate between Daisy chain bus arbitration and Priority encoded bus arbitration. 5+5
Answer.

Daisy chain bus arbitration and Priority encoded bus arbitration

There are many ways of addressing the “bus arbitration” problem; three techniques which are often implemented in processor systems are the following: Daisy chain arbitration, priority encoded arbitration and distributed arbitration by self-section. These are also often used to



Q6. Explain LRU page replacement algorithm with example.
Answer: The least recently used page (LRU) replacement algorithm, though similar in name to NRU, differs in the fact that LRU keeps track of page usage over a short period of time, while NRU just looks at the usage in the last clock interval. LRU works on the idea that pages that have been most heavily used in the past few instructions are most likely to be used heavily in the next few instructions too. While LRU can provide near-optimal performance in theory (almost as good as Adaptive Replacement Cache), it is rather expensive to implement in practice. There are a few implementation methods for this algorithm that try to reduce the cost yet keep as much of


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 500/semester only.
if urgent then call us on 08791490301, 08273413412


bba405 smu bba Winter 2014 IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

DRIVE Winter 2014
PROGRAM -Bachelor of Business Administration- BBA
SEMESTER-4
SUBJECT CODE & NAME -BBA405: RETAIL MANAGEMENT
BK ID-B1716
CREDIT & MARKS-2 CREDITS; 30 MARKS
Q.1. Write short notes on the following:   a) Functions of retailing  b) Retail marketing
a) Functions of retailing 5   b) Retail marketing 5?
ANS.
Functions of retailing
Retailers play a significant role as a conduit between manufacturers, wholesalers, suppliers and consumers. The retailers perform some important functions to create value to the product, the customer

Q.2. Explain the functions of merchandising manager.
Explanation of the various functions of merchandising manager: Planning, Directing, Coordinating and Controlling ?10
ANS-

Functions of Merchandising Manager
In order to understand the functions of the merchandising manager, it is important to know the basic structure of the retail store. If the retail store has separate departments for each product line, each product line will have a manager. The appointed manager is responsible for all tasks associated with the

Q.3. What is meant by retail space management? Describe the elements of store design?
Meaning of retail space management 3 ,  Elements of store design 7
Ans-
Retail space management-
Retail space management is critical to any form of retail business. Its relevance emerges from the link between shopping behaviour and physical environmental factors. For instance, physical environmental

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412