Sunday 27 September 2015

mit3043 smu msc it summer 2015 IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

PROGRAM Master of Science in Information Technology (MSc IT)Revised Fall 2011
SEMESTER 3
SUBJECT CODE &
NAME
MIT3043– Graphics and Multimedia Systems
Qus:1 Explain the following
(a) Image enhancement.
(b) Pattern detection and recognition.
(c) Scene analysis and computer.
(d) Visualization.
Ans:
(a) Image enhancement:
The image enhancement deals with the improvement in the image quality by eliminating noise or by increasing image contrast.
(b)

Qus: 2 Write a note on digitizers.
Ans:
Digitizers:
Digitizer is a device used to convert an image into a series of dots that can read, stored and manipulated by the computer. It converts analog or physical input into digital images.

Qus:3 Explain 3D viewing.
Answer:
3D viewing:
Viewing a scene in 3D is much more complicated than 2D viewing, where in the latter the viewing plane


Qus:4 Explain different types of coherence.
Answer:
The different types of coherence:
1.      Object Coherence
2.      Face Coherence
3.      Edge Coherence

Qus:5 What is multimedia? Explain briefly the uses of multimedia.
Answer:
Multimedia:
Multimedia is the media that uses multiple forms of information content and information processing (e.g. text, audio, graphics, animation, and video, interactivity) to inform or entertain the user


Qus:6 Explain the following
(a) Full animation
(b) Limited animation
(c) Rotoscoping
Ans:
(a) Full animation:
Full animation refers to the process of producing high-quality traditionally animated films, which regularly use detailed drawings and possible movement. Fully animated films can be done in a variety of styles, from more realistically animated works such as those produced by the Walt Disney

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412



mit3041 smu msc it summer 2015 IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3041– Open Source System
Qus:1 (a) What is open source software? List the examples of open source systems.
(b) What are the common tools required for the development of open source software?
Ans:
(a) What is open source software? List the examples of open source systems:
Open source software is the way in which it handles the situation when, someone wants to walk out of the open source project. This could be seen in some of the licenses like the shrink-wrap, click wrap, and browse wrap. The people who participate in the open source projects cannot simply walk away from

Qus: 2 Explain the OSS licensing strategies.
Ans:
The OSS licensing strategies:
OSS licensing strategies which are given below:

·         Expansion strategy: It is an open source demonstration of the “law of conservation of modularity


Qus: 3 (a) What is Academic Free License (AFL)? Explain.
(b) List the features of the AFL.
Ans:
(a) What is Academic Free License (AFL)? Explain:
The Academic Free License (AFL) is a free software license created by Lawrence E. Rosen, an attorney, and computer specialist, in the year2002. It has no limits or restrictions on model size. As we briefly discussed in the introduction the Academic free license is generally used by faculty, students

Qus: 4 Explain Public code archive.
Ans:
Public code archive:
The philosophy behind Open Source Software is simple, and according to that everyone or the public should be able to access the software and use it in any way they want. Therefore, making the code accessible to the public is the most crucial factor of an open source project. Public code archive is one of the important infrastructures needed for an open source project which enables the

Qus:5 What is mutual consent? Explain the two ways by which the parties entering attack each other.
Ans:
Mutual consent:
Mutual consent or a meeting of the minds, as the terms of the contract which is usually described as the offer and the acceptance.

The two ways by which the parties entering attack each other:
The parties can be

Qus: 6 Write a note on Forking.
Ans:
Forking:
Forking is a phenomenon that occurs when a software project splits, and both develop into unique software. Therefore, when software is split into two and developed independently then the

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412



mit3032 smu msc it summer 2015 IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology (MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3032– Distributed Operating System

Qus:1 Explain (a) tightly coupled systems (b) loosely coupled systems.
Ans:
(a) Tightly coupled systems:
In tightly coupled systems, there is a single system wide primary memory (address space) that is shared by all the processors. If any processor writes, for example, the value 100 to the memory location x, any other


Qus:2 Write a note on Distributed Algorithms.
Ans:
Distributed Algorithms:
We know that externally synchronized clocks are also internally synchronized. That is, if each node’s clock is independently synchronized with real time, all the clocks of the system remain mutually

Qus: 3 List and explain the desirable features of a good message passing system.
Ans:
The desirable features of a good message passing system:
Desirable features of a good message passing system are:

·         Simplicity
·         Efficiency
·         Reliability
·         Correctness
·         Flexibility
·         Security


Qus:4 Explain the object locating mechanisms.
Ans:
The object locating mechanisms:
Object locating is mapping the system oriented names of objects to the location of the object. Some object locating mechanisms are listed below:
I)                   Broadcasting: Object’s location is found by broadcasting a request from the client node. Expanding ring broadcast: This approach is employed in an internetwork consisting of LANs connected

Qus:5 (a) Explain any two approaches to replication in a DFS.
(b) What is Ceph? Explain.
Ans:
(a) Explain any two approaches to replication in a DFS:
1. Explicit replication: The client explicitly writes files to multiple servers. This approach requires explicit support from the


Qus:6 (a) What is key management in cryptography? Explain.
(b) Explain the means of authentication
Ans:
(a) What is key management in cryptography? Explain.
Key management is the set of techniques and procedures supporting the establishment and maintenance of keying relationships between authorized parties.

Key management encompasses techniques and procedures supporting:
1.      Initialization


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412


mit3031 smu msc it summer 2015 IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412


PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 3
SUBJECT CODE &
NAME
MIT3031– High Speed Networks
Qus:1 Write a note on Frame Relay Networks.
Ans:
Frame Relay Networks:
The traditional approach to packet switching (X.25), used in-band signaling, and includes end-to-end and well as per-hop flow control and error control. This approach results in considerable overhead. Frame relay is a packet modetrans mission service that exploits characteristics of modern networks by

Qus:2 List and explain the advantages of virtual path connection (VPC)
Answer:
The advantages of virtual path connection (VPC):
A virtual path connection (VPC) is a bunch of VCCs share the same endpoints where all the cells flowing over all the VCCs in a single VPC are switched together. Grouping connections that share a common path over the network reduces the control costs. There are many advantages of VPC some of

Qus:3 What are issues that we need to resolve while using a mixed ATM LAN architecture? Explain.
Answer:
The issues that we need to resolve while using a mixed ATM LAN architecture:
·        Difference in protocols – In connectionless protocols like Ethernet, a station can send data packets to another station without establishing or terminating a connection. But connection-oriented protocols like ATM must first establish a connection and then terminate the connection once

Qus:4 List and explain the types of congestion.
Ans:
The types of congestion:
1.      User-generated congestion
2.      Network-generated congestion
3.      Failure-generated congestion
There are three types of


Qus:5 What are the seven timers that TCP maintains for every connection? Explain any three.
Answer:
The timers that TCP maintains for every connection:
There are seven timers that TCP maintains for every
connection and they are:

·        SYNACK timer


Qus:6 What are the advantages and disadvantages of Routing Information Protocol (RIP)?

Ans:

The advantages and disadvantages of Routing Information Protocol (RIP):

Advantages of RIP:

The advantages of RIP are:
·         It is easy to deploy. It can be implemented in a network just by enabling the protocol on every router of the network.
·         It is


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412


mit302 smu msc it summer 2015 IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

PROGRAM- M.Sc IT (REVISED FALL 2012)
SEMESTER-III
SUBJECT CODE & NAME-Mit302-WEB TECHNOLOGIES
CREDIT-4
BK ID-B1547
MAX. MARKS-60
Q1. Differentiate between TCP and UDP.
Answer:
Differentiate between TCP and UDP:
TCP (Transmission Control Protocol):
The TCP corresponds to the transport layer of OSI reference

Qus:2. Describe the features of XML. What are the important rules to keep in mind about the XML declaration?
Answer:
The features of XML:
XML is popular for many features and few of them are listed here:

1.      Easy Data Exchange: In XML, data and markup are stored as text that we can configure. If we like, we can use XML editors to create XML documents but if something goes wrong we can examine and modify document directly because it’s



Qus:3. List and explain the Components of XML processor.
Answer.
Components of XML processor:
a)      Parser: Every XML processor has a parser. An XML parser converts an XML document into an XML DOM object - which can then be manipulated with a  JavaScript. The parser's job is to translate XML markup and data into a



Qus:4. Describe the procedure of fetching data from XML to HTML. Give an example.
Answer.
Procedure of fetching data from XML to HTML
The process of fetching data from an XML files to be filled in an HTML table, using DSO (Data Source Object) and JavaScript. DSO is an object that operates like a database on the client side. It will accept information that is


Qus:5. Describe five different categories of PHP Operators.
Answer.
Categories of PHP Operators:
In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.
·         Assignment
·          


Qus:6. Write short note on ASP.
Answer.
ASP:
The page on the server called by the JavaScript is an ASP file called AJAX server page. The server file could easily be rewritten in PHP, or some other server languages. Look at the example in PHP. The source code in "getcustomer.asp" runs a query against a database, and returns the result in an HTML table:


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412