Saturday, 27 May 2017

mit209 smu msc it spring 2017 (jul/aug 2017 exam) IInd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject

DRIVE
SPRING 2017
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT209– Data Communication and Networking

Assignment Set - 1

1 Draw a diagram of OSI reference model and describe the role of each OSI layer.

Answer: OSI reference model


2 Explain the following:
a) Character stuffing
b) bit stuffing

Answer: a) Character stuffing
This method gets around the problem of synchronization after an error by having each frame start and end with special bytes. This method operates on bytes. The special bytes are reserved characters to indicate the start and end of a frame. A serious problem occurs when binary data like floating point numbers or object programs are transmitted. In such cases For instance, use the two-character



3 Explain the CSMA/CD protocol with suitable diagrams.

Answer: CSMA/CD Protocol
In computer networking, Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network control protocol in which a carrier sensing scheme is used. A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random

Assignment Set - 2

1 Write a short note on the following routing algorithm:
(a) Multi-destination routing algorithm
(b) Flooding routing algorithm

Answer: a. Routing is the process of selecting a path for traffic in a network, or between or across multiple networks. Routing is performed for many types of networks, including circuit-switched networks, such as the public switched telephone network (PSTN), computer networks, such as the Internet, as well as in networks

2 Explain TCP protocol with suitable diagram.

Answer: The TCP IP protocol suit can be considered as a major step stone for communication network. Standards supported, flexibility and application  supported, services provided for various application from user end .The Transmission Control Protocol/Internet Protocol (TCP/IP) suite Uses standard methodology for connecting the hosts, network and internet. The applications supported by TCP/IP

3 Mention and describe the different operations and responses with reference to Telnet protocol.

Answer: There are four modes of operation for most Telnet clients and servers.
1.       Half-duplex: This is the default mode, but rarely used today . The default NVT is a half duplex device that requires a GO AHEAD (GA) from the server before accepting user input. The user input is echoed locally from the NVT keyboard to yhe NVT printer so that only completed lines are sent from the client to the server. This provides the lowest common denominator for terminal support, but it does not



Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject



mit208 smu msc it spring 2017 (jul/aug 2017 exam) IInd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject

DRIVE
SPRING 2017
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT208- ANALYSIS AND DESIGN OF ALGORITHMS

Assignment Set - 1

1 Differentiate algorithm, pseudocode, and program. Write the properties of an algorithm.

Answer: An algorithm is a finite set of unambiguous statement to solve a problem in finite amount of time. It can be natural language expressions designed for any common man. Analysis of algorithm means to study the specification of the algorithm and come to conclusions about how the implementation of that algorithm



2 Explain the various types of basic efficiency classes with suitable examples.

Answer: Even though the efficiency analysis framework puts together all the functions whose orders of growth differ by a constant multiple, there are still infinitely many such classes. (For example, the exponential functions an have different orders of growth for different values of base a.) Therefore, it may come as a surprise that the time efficiencies of a large number of algorithms fall into only


3 Describe the procedure to perform Mergesort using suitable example.

Answer: Merge sort is a sorting technique based on divide and conquers technique. With worst-case time complexity being Ο(n log n), it is one of the most respected algorithms. While comparing two sublists for merging, the first element of both lists is taken into consideration. While sorting in ascending order, the element


Assignment Set - 2

1 What is AVL tree? Briefly explain the four rotations in an AVL tree.

Answer: AVL tree is a self balanced binary search tree. That means, an AVL tree is also a binary search tree but it is a balanced tree. A binary tree is said to be balanced, if the difference between the hieghts of left and right subtrees of every node in the tree is either -1, 0 or +1. In other words, a binary tree is said to be balanced if



2 Define Principle of Optimality. Explain Knapsack problem with suitable example.

Answer: The principle of optimality states that an optimal sequence of decisions has the property that whatever the initial state and decision are, the remaining decisions must constitute an optimal decision sequence with regard to the state resulting from the first decision.

Because of the use of the principle of optimality, decision sequences containing subsequences that are suboptimal are not


3 Discuss an approximation Algorithms for NP – Hard problems.

Answer: Combinatorial optimization problems lie within a finite but huge feasible region. In this section, we focus on finding approximation algorithms for optimization problems that are NP-Hard.

Underlying principles
An NP-Hard problem is one for which the algorithm can be translated to one that can solve any NP-problem (non-deterministic polynomial time). Many optimization problems do not have an algorithm that can find a solution for all instances. Sometimes, when trying to find an optimal solution to some

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject



mit207 smu msc it spring 2017 (jul/aug 2017 exam) IInd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject


DRIVE
SPRING 2017
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT207– Data Base Management System(DBMS)

Assignment Set - 1

1 Describe various types of attribute with reference to E-R model with suitable example.

Answer: The entity-relationship (E-R) data model based on a perception of real world that consists of a set of basic objects called entities, and of relationships among these objects. It was developed to facilitate database design by allowing the specification of an enterprise schema, which represents the overall logical structure of a database. The E-R data model is one of several semantic data models;

2 Define database manager. List and explain the important responsibilities of database manager.

Answer: A database manager is a program module which provides the interface between the low level data stored in the database and the application programs and queries submitted to the system. It is responsible for interfacing with file system. One of the functions of database manager is to convert user's queries coming directly via the query processor or indirectly via an application program from the user's logical view to the physical file system. In addition, the tasks of enforcing constraints to maintain the

3 What is catalog? What information is stored in the system catalogs?

Answer: A fundamental property of a database system is that it maintains a description of all the data that it contains. A relational DBMS maintains information about every relation and index that it contains. The DBMS also maintains information about views, for which no tuples are stored explicitly; rather, a definition of the

Assignment Set - 2

1 What is meant by Embedded SQL statement? Explain briefly.

Answer: All SQL statements that are embedded within a host program must be clearly marked, with the details dependent on the host language; in C, SQL statements must be pre-fixed by EXEC SQL. An SQL statement can essentially appear in any place in the host language program, where a host language statement

2 Mention and explain the basic operations of Relational algebra.

Answer: Union (È)
If we assume that P and Q are two union-compatible relations, then the union of P and Q is set-theoretic union of P and Q.
The resultant relation, R = P U Q, has tuples drawn from P and Q such that
R = { t |Î P v t Î Q }
The result relation

3 Describe the advantages and disadvantages of data distribution.

Answer: Advantages of Data Distribution
Data sharing and Distributed Control: If a number of different sites are connected to each other, then a user at one site may be able to access data that is available at another site. For example, in the distributed banking system, it is possible for a user in one branch to access data in another branch. Without

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject



mit206 smu msc it spring 2017 (jul/aug 2017 exam) IInd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject


ASSIGNMENT DRIVE - SPRING 2017
PROGRAM - Master of Science in Information Technology (MSc IT)
SEMESTER - 2
SUBJECT CODE & NAME - MIT206 – OPERATING SYSTEM
BK ID B1405 NUMBER OF ASSIGNMENTS, CREDITS & MARKS 2, 4 Credits, 30 marks each


Assignment Set - 1 Questions
Q1. Explain Unix kernel components using suitable diagram. 2+8 10
Answer:-
The UNIX kernel s divided in to three modes: user mode, kernel mode, and hardware. The user mode contains user programs which can access the services of the kernel components using system call interface.
The kernel mode has four major


Q2 Explain the Shortest-Job-First scheduling algorithm with suitable example. Write the drawbacks of this algorithm. 7+3 10
Answer:-
In this algorithm, the length of the CPU burst is considered. When the CPU is available, it is assigned to the process that has the smallest next CPU burst. Hence this is named shortest job first. In case there is a tie, FCFS scheduling is used to break the tie. As an example, consider the following set of processes P1, P2, P3, P4 and their


Q3 Discuss Interprocess Communication. 10
Answer:-
Communication of co-operating processes’ shared-memory environment requires that these processes share a common buffer pool, and that the code for implementing the buffer be explicitly written by the application programmer. Another way to achieve the same effect is for the operating system to provide the means for co-operating processes to communicate with each other via an inter-process-communication (IPC) facility

Assignment Set - 2 Questions
Q1 Explain the following page replacement algorithm:
 (a) FIFO
 (b) LRU 5+5 10
Answer:-
(a) FIFO
The first-in-first-out page replacement algorithm is the simplest page replacement algorithm. When a page replacement is required the oldest page in memory is the victim. The performance of the FIFO algorithm is not always good. The replaced page may have an initialization module that needs to be executed only once and therefore no longer

Q2 Compare Daisy chain bus arbitration and Priority encoded bus arbitration. 5+5 10
Answer:-
Daisy chain arbitration:
Here, the requesting device or devices assert the signal bus_request. The bus arbiter returns the bus_grant signal, which passes through each of the devices which can have access to the bus, as shown in figure below. Here, the priority of a

Q3 Mention and explain various types of multiprocessor operating systems. 1+9 10
Answer:-
Three basic types of multiprocessor operating systems are:
ü  Separate supervisors
ü  Master / slave 
ü  Symmetric

Separate supervisors
 In separate supervisor systems, each node is a processor having a separate operating system with a memory and I/O resources. Addition of a few additional services and data structures will help to support aspects of multiprocessors. 
A common example is the

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject



mf0018 smu mba spring 2017 (jul/aug 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject


DRIVE spring 2017
PROGRAM MBA
SEMESTER 4
SUBJECT CODE &
NAME
MF0018 & INSURANCE AND RISK MANAGEMENT

1. Explain price risk and its types. Explain Risk management methods
Explanation of price risk and types
Explanation on risk management methods

Answer: Price risk
Price risk represents the uncertainty about the magnitude of cash flows because of the probable changes in the input and output prices. Output price risk stands for the risk of changes in the prices which an organization may ask for its goods and services. Input price risk means the risk of changes in the prices which


2. An organization is a legal entity which is created to do some activity of some purpose. There are elements of a life insurance organization. Explain the elements of life insurance organization.
[Important activities-2
Internal organization-3
Distribution system-2
Functions of the agent-3]

Answer: Important activities
         Procuring applications or proposals from prospective buyers of life insurance.
         Scrutinizing and making decisions on the proposals for insurance. This is called underwriting.
         Issuing the



3. Explain the doctrine of indemnity, doctrine of subrogation and warranties and its types and classification.
Explanation of doctrine of indemnity
Explanation of doctrine of subrogation
Explanation of warranties and its types and classifications

Answer: Doctrine of indemnity
The contract of marine insurance is in the nature of indemnity. In any situation the insured is not allowed to earn a profit out of a claim. Profits could be made in the absence of the principle of indemnity. The insurer agrees to indemnify the assured only in the manner and only to the extent agreed upon. Marine insurance fails to provide complete indemnity due to large and varied nature of the



4. Give short notes on :
Evidence and claim notice.
Subrogation
Salvage

Answer: Evidence
To admit a claim, appropriate evidence related to the policy is needed. In marine insurance the policy is generally issued on mutual understanding and good faith of both the parties. However, at the time of claim, the insurer should satisfy itself about the information furnished by the insured. The value of




5. Explain the marketing mix (7 P’s) for insurance companies
Explanation on the marketing mix for insurance companies

Answer: Marketing Mix (7 P’s) for Insurance Companies
Marketing for insurance companies implies marketing insurance services with the objective to create a customer base and make profit by the means of customer satisfaction. This emphasizes on forming an appropriate


6. Explain the benefits of reinsurance. Elaborate on the application of reinsurance.
Benefits of reinsurance
Application of reinsurance

Answer: Benefits of Reinsurance
(i) Increase in risk-taking capacity
As the direct insurer can reinsure part of certain risks, it can therefore accept more of the original risk. It could be that a particu-lar insurer has calculated that it would not want to provide fire insurance cover for manufacturers of plastic goods for the sum insured in excess of `10,00,000. Should it then receive an


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject