Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then
call us on 08791490301, 08273413412
DRIVE
fall 2017
PROGRAM
Bachelor of Science in Information Technology
SEMESTER
II
SUBJECT
CODE & NAME BIT201 – Object Oriented Programming – C++
Assignment
Set -1
1
What is Polymorphism? What are the different types of Polymorphism?
Answer: Virtual functions in C++ are important to implement the concept of polymorphism.
Polymorphism means same content but different forms. In C++, polymorphism
enables the same program code calling different functions of different classes.
Imagine a situation where you would like to create a
2
Discuss the following functions of file operations
a)
tellg()
b)
seekp()
c)
ignore()
d)
getline()
Answer: A. tellg() – Returns an int type, that shows the current position of the inside-pointer.
This one works only when you read a file. Example:
#include <fstream.h>
void main
3
Explain sequence containers
Answer: Sequence Containers
There are three types of sequence
containers in the STL. These, as their name suggests, store data in
linear sequence. They are the vector, deque and list:
·
vector<
Assignment
Set -2
1
Differentiate between an external variable and an automatic variable with the
help of an example.
Answer: Automatic variables is default variable in C++. All the variables we
have created and used in programs are automatic variables. These variables can also
be declared by prefixing the keyword auto. One of important characteristics of
these variables are that they are created only when the function or
2
What is “this pointer” in C++? What are the features of “this pointer”?
Answer: The this pointer is used
as a pointer to the class object instance by the member function. The address
of the class instance is passed as an implicit parameter to the member
functions. The sample below, in this section shows how to use it. It is common
knowledge that C++ keeps only one copy of each member function and the data
members are allocated memory for all of their instances. This kind
3
Explain destructor in detail.
Answer: Destructors are usually used to deallocate memory and do other cleanup
for a class object and its class members when the object is destroyed. A destructor
is called for a class object when that object passes out of scope or is
explicitly deleted. A destructor is a member function with the same name as its
class
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then
call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
DRIVE
fall 2017
PROGRAM
Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER
II
SUBJECT
CODE & NAME BIT202 – Basic Mathematics
Assignment
Set -1
1 Integrate the following w.r.t. x
i) x √(x + a)
ii) x /√(a + bx)
Answer: a) x √(x + a)
∫x√(x+a)
dx = I (say)
2 If a = cos q
+ i sin q, 0<q <2p
prove that {1+a}/{1-a} = i cot q/2
Answer: i. If a = cos q
+ i sin q,0 <q <
2p prove that 1+a/1-a = i cot q/2
L.H.S
= 1+ cos q + i sin q
1 - cos q
- i sin q
= 2 cos^2 q/2
+ 2 i sin q/2 cos q/2
2
sin^ 2
3 Solve: 3/1 + (3.5/1.2) . (1/3) +
(3.5.7/1.2.3) . (1/3^2) + …………..∞]
Answer: Comparing the given series with one of the general
Binomial series, we get
P=3,
q=2, x/q=1/3
x=2/3
But
the
Assignment
Set -2
1 a) If in group G, (ab)^2 = a^2b^2 for
every a, b Î G prove that G is abelian.
b) Show that if every element of a group
G is its own inverse then G is abelian.
Answer: a) (ab)^2 = a^2.b^2
Ø
(ab)
(ab) = (a . a) (b . b)
Ø
a[b(ab)]
= a[a(bb)] (Associative)
2 If tan A = 1- cos B . show that
tan 2A = tan B.
sinB
Answer: Given that tan A = 1-cosB
SinB
i.e
tan
3 Evaluate dy/dx, when y = log[√(1+x^2)+x]) / [√(1+x^2)-x])
Answer: d/dx{(log[√(1+x^2)+x]) - log[√(1+x^2)-x])
(Since
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved
assignment. Buy online from website
online store
or
plz drop a mail with
your sub code
we will revert you
within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
fall 2017 ASSIGNMENT
PROGRAM - MCA (REVISED FALL 2012)
SEMESTER - II
SUBJECT CODE & NAME – Bit203- DATA File
STRUCTURE
CREDIT
– 4, BK ID - B1476, MAX. MARKS 60
Set 1
Q1. Describe any Five types of graph.
[5*2]= 10
Answer:
Types
of Graphs
Depending
upon the vertices and edges and the weight associated to it, graphs can be
Q2. Describe the following storage
allocation:
1. Fixed block
2. Variable block
Answer:
Fixed
block storage allocation
First
block storage allocation is the simplest case of dynamic storage allocation.
This is the straight forward method in which, all the blocks are of identical
in size. The user can decide the
3. Define sorting. Explain merge sort with
suitable example.
Answer:
Sorting
Sorting is the process of
arranging a collection of items in some specified order. The items/records in a
file or data structures in memory, consist of one or more fields or members.
One of these fields is designated as the "sort key" which means the
records will be ordered
Set 2
Q1. What do you mean by complexity of
algorithm? Explain asymptotic notations.
Answer:
Complexity
of Algorithm
To
compare the efficiency of the algorithms we need some criteria to measure the
efficiency. Time and space are two main measures for the efficiency of an
algorithm.
Time
is the number of time the basic operation is executed. For example in sorting
and
Q2. What is Queue? Describe the two ways of
implementing the Queue.
Answer:
A
queue is a linear list of elements in which deletions can take place only at
one end, called the front and insertions can take place only at the
other end, called the rear as referred in the
Q3. List the benefits and drawbacks of
Linear and linked representation of tree.
Answer:
Advantages
of linear representation of binary tree
1)
Node can be accessed
directly with the help of the index through which we can improve the
Get fully solved
assignment. Buy online from website
online store
or
plz drop a mail with
your sub code
we will revert you
within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved
assignment. Buy online from website
online store
or
plz drop a mail with
your sub code
we will revert you
within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
fall 2017 ASSIGNMENT
PROGRAM - MCA (REVISED
FALL 2012)
SEMESTER - SECOND
SUBJECT CODE
& NAME – BIT204- COMPUTER ARCHITECTURE
CREDIT 4, BK ID - B1648, MAX. MARKS 60
Set 1
Q1. Differentiate
between Process and Thread. 5+5=10
Answer:
Concept
of process
In
operating system terminology, instead of the term ‘program’, the notion of
process is used in connection with execution. It designates a commission or
job, or a quantum of work dealt with as an entity
Q2. Explain the any
five types of addressing modes. 5*2= 10
Answer:
Every
instruction of a computer states an operation on certain data. There are a
numerous ways of specifying address of the data to be operated on. These
different ways of specifying data
Q3. Describe the
logical layout of both RISC and CISC computers 5+5= 10
Answer:
While
processing operates instructions, RISC pipelines have to cope only with
register operands. By contrast, CISC pipelines must be able to deal with both
register and memory
Set 2
Q1. Explain the
concept of branch handling. What is delayed branching? 5+5= 10
Answer:
Branch
Handling
Branch is a flow altering instruction that is required to be
handled in a special manner in pipelined
Q2. Explain any five
types of vector instructions in detail.5*2= 10
Answer: Types of Vector Instructions:
(a) Vector-scalar instructions: Using these instructions, a
scalar operand can be combined with a vector one. If A and B are vector
registers and f is a function that performs some operation on each element of a
single or two vector operands, a vector-scal
Q3. Write short notes
on:
a) UMA
b) NUMA 5+5= 10
Answer:
a)
UMA
(Uniform Memory Access):
In this
category every processor and memory module has similar access time. Hence each
memory word can be read as quickly as other memory word. If not then quick references
are
Get fully solved
assignment. Buy online from website
online store
or
plz drop a mail with
your sub code
we will revert you
within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Drive
fall – 2017
PROGRAM
Bachelor of Science in Information Technology
SEMESTER
II
SUBJECT
CODE & NAME BIT205 – Basics of Data Communication
Assignment
Set -1
1 What are the criteria for a Data
Communication Network?
Answer: Communication Network is set of equipment or say
facilities that provide a communication services like to transfer of data
between two or more nodes located in any of its geographical point. Example of
such networks includes computer networks (LAN/WAN), telephone networks,
2 Explain the TCP/IP Protocol
Architecture.
Answer: Two protocol architectures have served as the basis for
the development of interoperable communications standards: the TCP/IP protocol
suite and the Open Systems Interconnection (OSI)
3 Write short notes on Delta Modulation
(DM).
Answer: Delta Modulation (DM)
In delta
modulation, an analog input is approximated by a staircase function that moves
up or down by one quantization level ᵟ at each sampling interval (TS). An
example is shown in figure below, where the staircase
Assignment
Set -2
1 What are communication model?
Answer: Data communication model:
The figure below shows the simple
2 What is the need for Protocol
Architecture?
Answer: The architecture of the TCP / IP protocol is the result of
protocol development and experimental packet-switched
3 Write short notes on Pulse Code
Modulation (PCM).
Answer: Pulse Code Modulation
Pulse code
modulation (PCM) is based on the sampling theorem.
Sampling
Theorem: It states that “If a signal f(t) is sampled at regular intervals of
time and at a rate higher than twice the highest signal frequency, then the
samples contain all the information of the original signa
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM
Bachelor
of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT
CODE & NAME
BIT301 –
Operating System
Qus:1 What are the different operation performed by
operating system?
Answer: Operating System is a System Software (Set of system
programs) which provides an environment to the user so that they can execute
the programs or instruct the computer to do certain work i.e. provide interface
for user to communicate with the computer system. The Operating System acts as
a resource manager which allocates and manages various resources like processor(s),
main
Qus:2 Mention different states of a process.
Answer: A program in execution is called a process. A process is
executed sequentially, one instruction at a time. A program is a passive
entity. For example, a file on the disk. A process on the other hand is an
Qus:3 What are the necessary conditions for a deadlock?
Answer: Deadlock
prevention algorithms ensure that at least one of the four necessary conditions
for deadlocks namely mutual exclusion, hold and wait, no preemption and
circular wait do
Qus:4 Write a short note on Multi-programmed Batched Operating
Systems.
Answer: The concept of spooling introduced an important data
structure called the job pool. Spooling creates several jobs on the disk ready
for execution or processing. The operating system now has to choose from the
job pool, a job that is to be executed next. This increases CPU utilization as
CPU is
Qus:5 What are the different information stored in a process
control block (PCB)?
Answer: In order to manage and coordinate the various processes, the
operating system identify these processes in terms of numbers and Process
Control Block (PCB). A Process Control Block is a data structure maintained by
the Operating System for every process. A PCB keeps all the information needed
to keep track of a process. The PCB serves as a repository of
Qus:6 Discuss in details about deadlock prevention.
Answer: The four necessary conditions for deadlocks to occur are
mutual exclusion, hold and wait, no preemption and circular wait. If any one of
the above four conditions does not hold, then deadlocks will not occur. Thus
prevention of deadlock is possible by ensuring that at least one of the
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM
Bachelor
of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT CODE
& NAME
BIT302 –
Computer Networks
Qus:1 Discuss about different network hardware by scale.
Answer: In broadcast network, communication channel is shared by all
the machines on the network. Broadcast systems allow the possibility of
addressing a packet to all the destinations by specifying a special code in the
address field. This packet is received and processed by every machine on the
network
Qus:2 Discuss briefly about Byte-Oriented Protocols (BISYNC,
PPP, DDCMP).
Answer: This is one of the oldest approach in framing, which
consider each frame as a collection of bytes, rather than a collection of bits.
Byte-oriented approach is represented by older protocols such
Qus:3 Discuss briefly Virtual-Circuit Networks.
Answer: Networks
having connection oriented services in the network layer are called Virtual
Circuit networks and these network layer connections are called virtual
circuits (VCs). Let’s now consider how a VC
Qus:4 Discuss in details about OSI Reference Model.
Answer: The OSI Model is based on the protocol developed by ISO
(International Standards Organization) as the first step towards international
standardization of the protocols used in the various layers. This model deals
with connecting open systems, so it is called ISO OSI (Open Systems
Interconnectio
Qus:5 Discuss in details about Clock-based Framing (SONET).
Answer: Clock- based framing is another approach to framing, and is
represented by the Synchronous Optical Network (SONET) standard. SONET was
first proposed by Bell Communications Research (Bellcore), and then developed
under the American National Standards Institute (
Qus:6 Discuss in details about Internet protocol version 4 (IPV4).
Answer: IPV4 is a connectionless protocol
and is unreliable. It is primarily responsible for addressing and routing
packets between hosts. A higher layer protocol such as TCP or an application
protocol must acknowledge delivered packets and recover lost packets if
required. IPV4 is defined in RFC 791. Figure shows the datagram format of IPV4.
It consist of IPV4 header and Payload.
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM
Bachelor
of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT
CODE & NAME
BIT303 –
OBJECT ORIENTED PROGRAMMING – JAVA
Qus:1 What are the different features of Java?
Answer: The Java buzzwords or features of Java
The fundamental forces that
necessitated the invention of Java are portability and security but other
factors also played an important role in molding the final form of the
language. The key considerations that characterizes Java programming language
are the following list of buzzwords:
Qus:2 Discuss different control flow statements in Java.
Answer: To control the flow of execution in a program the following
statements are used:
1. Decision Making Statements
If-else
Qus:3 Explain with example exception handling techniques.
Answer: Java
creates an object of appropriate exception class whenever there a error occurs
in your method. Once the exception objects are created it is passed to your
program. This is called throwing an
Qus:4 What is a Java Virtual Machine (JVM)?
Answer: JVM (Java Virtual Machine) is an abstract machine, i.e., it
is a software implementation of a computer that executes programs like a real
machine. It specifies and provides runtime environment where java bytecode can
be executed. Since JVM is a software implementation, it is written specifically
for a specific operating system. So JVM is platform dependent because
configuration of each OS differs. For example, a special implementation is
required for Lin
Qus:5 What do you understand by enhance for statement?
Answer: An another form of for statement also exists. It
performs iteration
Qus:6 What are exception in Java? (Mention different types).
Answer: The term exception in Java means occurrence of an
exceptional event. It is defined as abnormality that occurs while the program
is in execution which hinders successful execution of the program, which means
the way the program is meant to produce result it doesn’t do so. When you are
developing apps Error Handling is very necessary. The abnormalities or
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM
Bachelor
of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT
CODE & NAME
BIT304 –
Data Base Management System
Qus:1 What are the properties of database?
Answer: The database is a collection of related data. In a file
system, the fundamental component of a file is a data item, which is the smallest named unit of data that has
meaning in the real world – for example, last name, first name, street address,
ID number, or political party. A group of
Qus:2 Write a note on hierarchal model.
Answer: The hierarchical data model organizes data in a tree
structure. There is a hierarchy of parent and
Qus:3 Discuss select statement with example.
Answer: The
select statement specifies the method of selecting the tuples of the
relations(s). The tuples processed are from one or more relations specified by
the form clause of the select statement. The basic form of
Qus:4 What are the different function of database management
system?
Answer: There are several functions that a DBMS performs to ensure
data integrity and consistency of data in the database. The ten functions in
the DBMS are: data dictionary management, data storage management, data
transformation and presentation, security management, multiuser access control,
backup and recovery management, data integrity management,
Qus:5 Discuss briefly relative data model.
Answer: The relational model today, is the primary data model for
commercial data processing applications. It has attained its primary position
because of its simplicity, which eases the job of the programmer, as
compared to earlier data models such as the network model or
Qus:6 What are subqueries? Explain with example.
Answer: The expression following WHERE can be either a simple
predicate as explained above or it can be a query itself! This part of the
query following WHERE is called a Subquery.
A subquery, which
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment