Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject only.
if urgent then call us
on 08791490301, 08273413412
Winter 2015 ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER
- 2
SUBJECT
CODE & NAME - PROGRAM MCA(REVISED FALL 2012)
CREDIT
– 4 BK ID - B1405, MAX. MARKS - 60
Q1. Differentiate between
Distributed Systems and Real-time Systems. 5+5
Answer:
Distributed
Systems
In
this type of system all the computations are distributed among several
processors. Distributed systems are also referred as loosely coupledsystems
because here the processors do not share memory or a clock.
Instead,
each processor
Q2 Explain the different process
states. 5*2
Answer.
Different
process states
A program in execution is a
process. A process is executed sequentially, one instruction at a time. A
program is a passive entity.
Example: a file on
Q3 Define Deadlock. Explain
necessary conditions for deadlock. 2+(2*4)
Answer.
Deadlock
Deadlock occurs when we
have a set of processes [not necessarily all the processes in the system], each
holding some resources, each requesting some resources, and none of them is
able to obtain what it needs, i.e. to make progress. We will usually reason in terms
of resources R1, R2... Rmand
Q4 Differentiate between
Sequential access and Direct access methods. 5+5
Answer.
Sequential
access and Direct access methods
Sequential access
In this simple
access method, information in a file is accessed sequentially one record after
another. To process the ithrecord all the i-1 records previous to i must be
accessed. Sequential access is based on the tape model that is inherently a
sequential access device. Sequential access is best
Q5 Differentiate between Daisy
chain bus arbitration and Priority encoded bus arbitration. 5+5
Answer.
Daisy chain bus arbitration and Priority
encoded bus arbitration
There are many
ways of addressing the “bus arbitration” problem; three techniques which are
often implemented in processor systems are the following: Daisy chain
arbitration, priority encoded arbitration and distributed arbitration by
self-section. These are also often used to determine the
Q6 Differentiate between
encryption and decryption. What are the two basic methods for encryption? 5+5
Answer.
Encryption and Decryption
Encryption is an
important tool in protection, security and authentication. The process involves
two steps (as in Fig 6.a): :
·
Encryption:
Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject only.
if urgent then call us
on 08791490301, 08273413412
No comments:
Post a Comment