Thursday 7 April 2016

mca2010 smu mca winter 2015 (april/may 2016 exam) IInd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject only.
if urgent then call us on 08791490301, 08273413412
Winter 2015 ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER - 2
SUBJECT CODE & NAME - PROGRAM MCA(REVISED FALL 2012)
CREDIT – 4 BK ID - B1405, MAX. MARKS - 60

Q1. Differentiate between Distributed Systems and Real-time Systems. 5+5
Answer:
Distributed Systems
In this type of system all the computations are distributed among several processors. Distributed systems are also referred as loosely coupledsystems because here the processors do not share memory or a clock.
Instead, each processor


Q2 Explain the different process states. 5*2
Answer.

Different process states

A program in execution is a process. A process is executed sequentially, one instruction at a time. A program is a passive entity.

Example: a file on



Q3 Define Deadlock. Explain necessary conditions for deadlock. 2+(2*4)
Answer.


Deadlock

Deadlock occurs when we have a set of processes [not necessarily all the processes in the system], each holding some resources, each requesting some resources, and none of them is able to obtain what it needs, i.e. to make progress. We will usually reason in terms of resources R1, R2... Rmand

Q4 Differentiate between Sequential access and Direct access methods. 5+5
Answer.

Sequential access and Direct access methods

Sequential access

In this simple access method, information in a file is accessed sequentially one record after another. To process the ithrecord all the i-1 records previous to i must be accessed. Sequential access is based on the tape model that is inherently a sequential access device. Sequential access is best

Q5 Differentiate between Daisy chain bus arbitration and Priority encoded bus arbitration. 5+5
Answer.

Daisy chain bus arbitration and Priority encoded bus arbitration

There are many ways of addressing the “bus arbitration” problem; three techniques which are often implemented in processor systems are the following: Daisy chain arbitration, priority encoded arbitration and distributed arbitration by self-section. These are also often used to determine the


Q6 Differentiate between encryption and decryption. What are the two basic methods for encryption? 5+5
Answer.
Encryption and Decryption

Encryption is an important tool in protection, security and authentication. The process involves two steps (as in Fig 6.a): :
·         Encryption:


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject only.
if urgent then call us on 08791490301, 08273413412


No comments:

Post a Comment