Sunday, 12 June 2016

mit4032 smu msc it spring 2016 (jul/aug 2016 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


PROGRAM - Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER - 4
SUBJECT CODE & NAME - MIT4032– Cloud Computing
CREDIT - 4
BK ID - B1637
MAX. MARKS – 60

Qus:1 What are the services of cloud computing? Explain.
Answer:
The services of cloud computing:
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories:

·         Infrastructure-as-a-Service (IaaS),

Q2. Write a note on “Software as a Service. 10
Ans: Software as a Service: SaaS is the most basic form of cloud computing. It includes implementation of specific business functions, customized business applications, etc. The major benefit of SaaS is that there is no licensing risk involved and neither there is any version compatibility issue. It reduces the hardware cost as well. You pay for the software and the underlying infrastructure and does not require technical know-how. Typical examples of SaaS application software are ERP, CRM, Google Docs, etc. SaaS ensures lower capital, better cash flow and


Q3. List the areas of the organization which has the effect of cloud computing and explain any two. 10
Ans: List the areas of the organization : Let us now discuss the few areas of the organization which has the effect of cloud computing.

v  Finance
v  Internal audit
v  Tax
v  Risk and compliance
v  Marketing and sales
v  Vendor lock-in

Internal audit: cloud service providers need to modify, upgrade, or replace systems to process, measure, and control use in order to accommodate the cloud computing. This will also be critical for billing



Qus:4 Explain the different Software clients.
Answer:
The different Software clients:
Software clients in general can be put in one of three groups. These different types include (in order from more desktop-related to more web-related):

Rich or Fat Client:


Q5. Explain the different types of data controls in cloud. 10
Ans: Different types of data controls in cloud: Now we will discuss different types of controls aimed to ensure the completeness and accuracy of data input, output and processing. The different types of data controls are given below:

·         Access controls: To guarantee that only those who are authorized to access the data can do so.
·          
Q6. List the most popular cloud applications. 10
Ans: five popular cloud applications: Let’s take a look at some of the most popular cloud applications out there.

Apple Mobile Me (http://www.me.com/) this service synchronizes emails, photos, and contacts among multiple devices. Your computer, laptop, and mobile devices can remain in sync as long as they have access to Apple’s cloud server

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


mit4022 smu msc it spring 2016 (jul/aug 2016 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

MIT4022
SPRING 2016



1 List and explain the types of Security Attacks in Network.

Answer: When you test any computer system, one of your jobs is to imagine how the system could malfunction. Then, you improve the system's design so that the system can withstand any of the problems you have identified. In the same way, we analyze a system from a security perspective,


2 Explain Feistel Cipher.

Answer: Feistel Cipher is not a specific scheme of block cipher. It is a design model from which many different block ciphers are derived. DES is just one example of a Feistel Cipher. A cryptographic system based on Feistel cipher structure uses the same algorithm for both encryption

3 Explain the following.
(a) Asymmetric Keys
(b) Public Key Certificate
(c) Public Key (Asymmetric) Cryptographic Algorithm
(d) Public Key Infrastructure (PKI)

Answer: a) Asymmetric cryptography or public-key cryptography is cryptography in which a pair of keys


4 (a) Explain digital signature
(b) Explain the different types of attacks on digital signatures.

Answer: a) A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message (


5 Explain the benefits of IP security.

Answer: Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. IPSec is a suite of cryptography-based protection services and security protocols


6 Define the following terms used in the IEEE 802.11 standard.
(a) Access Point (AP)
(b) Basic Service Set (BSS)
(c) Coordination function
(d) Distribution System (DS)
(e) Extended Service Set (ESS)

Answer: a) Inter-Access Point Protocol is a recommendation that describes an optional extension to IEEE 802.11 that provides wireless access point communications among multivendor systems.[1] 802.11 is a set of IEEE standards that govern wireless networking transmission methods. They are commonly used today in their 802.11a, 802.11b, 802.11g and 802.11n versions to provide wireless connectivity in the home, office and some commercial


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mit4021 smu msc it spring 2016 (jul/aug 2016 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


MIT 4021
SPRING 2016

1 Explain the steps to execute C# programs using visual studio IDE.

Answer: Visual Studio is Microsoft’s integrated programming environment. It lets you edit, compile, run, and debug a C# program, all without leaving its well thought out environment. Visual studio offers convenience and helps manage your programs. It is most effective for larger projects. The steps required to edit, compile, and run a C# program using the Visual Studio IDE are given below:


2 What do you mean by type conversions in C#? Explain implicit and explicit type conversions in C#.

Answer: Type Conversions
We often encounter situations where there is a need to convert a data of one type to another before it is used in arithmetic operations or to store a value of one type into a variable of another type


3 Explain the following in context of methods in C# with the help of examples:
1. Invoking methods
2. Nesting of methods

Answer: Invoking Methods
The process of activating a method is known as invoking or calling. A method once declared in a class can be


4 What do you mean by members in C#? Explain constant members and read only members. Also explain properties in C#.

Answer: Members
Classes in C# consists of data and methods that operate on data called as member data and member functions. Everything you define within a class is considered to be a member of that class. In this section, you are going to see two types of members of a class: Constant Members and Read-



5 How to handle exception in C#. Explain the syntax. Also give an example.

Answer: An exception is a condition caused by a runtime error in the program. When the C# compiler encounters an error such as dividing an integer by zero, it creates an exception object and throws it. If the exception object is not caught and handled properly, the computer will display an error message and will terminate the program. If we want the program to continue with the

6 Elaborate the steps for the following:
Creating the show.aspx page
Adding code to the show.aspx page

Answer: Creating the show.aspx page
The show.aspx page displays the values entered by a user in the default.aspx page of the website1 web based application. To create the show.aspx page:
1. Right click the C:\.....\website1\node that appears in the Solution Explorer to display to display a shortcut menu.
2. Select the Add New Item option to display Add New Item dialog box.
3. Enter a name such as show.aspx in the Name text box to specify a name for new page, which you need to add


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mit3043 smu msc it spring 2016 (jul/aug 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM-BCA (REVISED FALL 2012)
SEMESTER-5
SUBJECT CODE & NAME-BCA5042– Graphics and Multimedia Systems
CREDIT-4
BK ID-B1552
MAX. MARKS-60
Qus:1 What are the advantages of interactive graphics?

Answer:

The advantages of interactive graphics:
·         Today, a high quality graphics display of personal computer provide one of the most natural means of communication with a computer.

·         It provides tools for producing pictures not only of concrete, “real-world” objects but also of abstract, synthetic objects such as mathematical surfaces in 4D and of data that have no inherent geometry, such

·          
Qus:2 What is a digitizer? Explain.

Answer:

Digitizer is a device used to convert an image into a series of dots that can be read, stored and manipulated by the computer. It converts analog or physical input into digital images. Significance of digitizers is carrying out important work in computer-aided design, graphics design and engineering. They also help convert hand-drawn images into textures and animation in video games and movie CGI. Modern


Qus:3 Write a note on 3D viewing.
Answer:

3D viewing:

Viewing a scene in 3D is much more complicated than 2D viewing, where in the latter the viewing plane on which a scene is

Q4. Explain different types of coherence. Explain any three.
Answer.
Types of coherence:
1. Object Coherence
2. Face Coherence
3. Edge

Q5. What is multimedia? Explain briefly the uses of multimedia.
Answer.
Multimedia:
Multimedia refers to content that uses a combination of different content forms. This contrasts with media that use only rudimentary computer displays such as text-only or traditional forms of printed or hand-produced material. Multimedia includes a combination of text, audio, still images, animation, video, or interactivity content

Q6. Explain the following
(a) Full animation
(b) Limited animation
(c) Rotoscoping
Answer:
a) Full animation:
Full animation refers to the process of producing high-quality traditionally animated films, which regularly use detailed drawings and possible movement. Fully animated films can be done in a variety of styles, from more


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mit3033 smu msc it spring 2016 (jul/aug 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM Master of Science in Information Technology (MSc IT)Revised Fall 2011
SEMESTER 3
SUBJECT CODE &
NAME
MIT3033– Software Architecture
Qus:1 What are the advantages and disadvantages of layered systems?
Answer:
Advantages of layered systems:
The advantages of layered systems are:

·         It facilitates design based on the increasing levels of abstraction. This permits division of a complex problem into incremental sequence of steps.

·         It facilitates improvements without complexity. This is true as the change made in the functions of

Qus:2 What are the benefits and properties of architectural styles?
Answer:
The benefits and properties of architectural styles:
Benefits of architectural styles:
Some of the benefits of architectural styles are:

·         It provides a common language that can be understood by the architect as well as the developers of the system.

·         It helps to exhibit various quality attributes such as availability, modifiability, testability,
security, and


Qus:3 List the steps involved in the implementation of the blackboard pattern.
Answer:
The steps involved in the implementation of the blackboard pattern:
The steps involved in the implementation of the blackboard pattern, which are as follows:

Step 1: The problem has to be defined by:

·         Specifying the problem domain and the field of knowledge necessary to find a solution.

Qus:4 List and explain the two design methods used in software engineering.
Answer:
The two design methods used in software engineering:
The two design methods used in software engineering. They are:
·         Routine Design Method.
·         Innovative Design Method.

·         Routine

·          


Qus:5 List the different types of design patterns and explain any three.
Answer:
The different types of design patterns:

Qus:6 Explain the importance of documenting architecture.
Answer:
The importance of documenting architecture:
Documenting the software architecture is considered as a blueprint for analysis and offers a high level view of the evolving system. Documenting the various views and every stage of architectural development helps communicate the information of the evolving system to the development


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412