Wednesday, 10 January 2018

smu msc it fall 2017 (jan/feb 2018 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT306– Object Oriented Analysis and Design(OOAD)

Qus:1 What is usability testing? Write the rule for developing usability testing.
Answer:
Usability testing, a non-functional testing technique that is a measure of how easily the system can be used by end users. It is difficult to evaluate and measure but can be evaluated based on the below

Qus:2 What is meant by unified approach? Describe the steps, methods and tools of unified approach.
Answer:   Unified approach is a better way for understanding concepts of objects oriented system development. Unified approach is a methodology for software development. The unified approach, based on

Qus:3 Describe the various states of activity diagram.
Answer: Activity diagrams are special cases of state chart diagrams. An activity diagram has actions as sta


Qus:4 Discuss the strategies for designing classes.
Answer: The object oriented design process is a complex process. The following methods can help you design better classes:
1)      Analyze the role of the objects of the class in the application. An object can play any of the following


Qus:5 Mention and describe the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which cause unexpected results and eliminating them. The process of testing and identifying bugs is a balance of science, art and luck.
There are three

Qus:6 Explain the following:
(a) Black box testing
(b) White box testing
Answer: (a) Black box testing
This treats the system as one that cannot be seen in detail. The structure of the program is not taken into account. The tests are performed based on what the program does. This is sometimes called


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT) Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT307-WEB TECHNOLOGIES

Qus:1 Name the three types of pattern in event driven programming. Explain the advantages of event driven programming.
Answer:
In computer programming, event-driven programming is a programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses), sensor outputs, or messages from other programs/threads. Event-driven programming is the


Qus:2 Explain the features of XML. Write important rules for XML declaration?
Answer: XML is popular for many features and few of them are listed here:
1.      Easy Data Exchange: In XML, data and markup are stored as text that we can configure. If we like, we can use XML editors to create XML documents but if something goes wrong we can examine and modify document directly because it’s all just text.XML provides a very efficient way of



Qus:3 Write any four importance of XML Schema. Discuss the steps to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a document, they can:
 XML schema uses XML syntax. When you look at your first XML Schema, probably the most striking


Qus:4 Define AJAX. Explain AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX is not a new programming language, but a new way to use existing standards.
It is a technique, rather than a framework. it allows web pages to behave less like flat documents and more like dynamic GUI apps that users might expect from their desktop environments.

Qus:5 Describe the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have

Qus:6  What is meant by control statements in ASP. Explain with suitable example.
Answer: We can make a decision based on user input using an If statement. The If statement tests a condition and if the result is true then it runs the code that follows the If statement but if the result is

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3031– High Speed Networks

Qus:1 Explain WLAN components.
Answer:
WLAN components
A local area network (LAN) connects computers, printers and other devices to allow sharing of data and resources. LANs are limited to coverage of one location, typically a building, and usually use network

Qus:2 Describe Multi-server queue using suitable diagrams and equations.
Answer: The aim of the queuing analysis is to make use of analytic models to yield the desired parameters to determine the buffer size. The following two queuing models can be used as analytic


Qus:3 What is meant by congestion? List and describe different types of congestion.
Answer: The situation wherein network resources are constantly overloaded or the overall demand of a resource exceeds its capacity is termed as congestion. Congestion in a network occurs when the load on the network or the number of packets transmitted to the network is more than

Qus:4 In TCP what is timer? List the timers that TCP maintains for every connection and explain any three.
Answer: In TCP protocol, timers are applied in various positions and these timers restrain retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all timers. Function pointers in a timer structure take a behavior function when initialized. Once the timer ends

Qus:5 What is meant by Resource Reservation Protocol (RSVP)? Write any three salient characteristics. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup and control. It enables Integrated Services (IntServ) which is designed to emulate circuits on the Internet. This is the most complex QoS technology for elements of a network (routers, switches) and applications (hosts). But, it

Qus:6 with suitable diagram describe Routing Information Protocol (RIP) message format. Write two benefits and two drawbacks of RIP.
Answer: RIP is based on distance vector routing. It implements vector routing using the following considerations:
 An AS has both routers and networks. While routers have routing tables, networks don’t.
 The first


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412




smu bsc it fall 2017 (jan/feb 2018 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0086, Mobile Computing
CREDIT
4
BK ID
B2067
MAX. MARKS
60

Q.1. Explain simple reference model. 5+5
Answer:-
Simple reference model:-
The basic reference model used to structure communication Systems. Mobile communication is influenced by layered reference model.
In Figure, you can see a Personal Digital Assistant (PDA) which is one of the example of wireless and portable device. PDA is

Q.2. Write short notes on Signals.                                                                                                       10
Answer:-
Signals:-
Signals are the physical representation of data. Signals are functions of time and location. Signal parameters represent the data values.
The most

Q.3. What do you understand by Analog Modulation?                                                                       10
Answer:-
Analog modulation:-
In Analog modulation, the information carrying base band signal typically called the message or information signal m(t) varies either the amplitude or the angle  of the carrier signal (or radio carrier). The carrier signal has a higher frequency which shifts the center frequency of the baseband signal up to the radio carrier. It is the radio carrier which is capable of transmitting through wireless media and


Q.4. What is Universal Mobile Telecommunication System (UMTS)?                                                 10
Answer:-
Universal Mobile Telecommunication System (UMTS):-
The development community of the wireless and mobile communication wanted the cellular system which would

Q.5. Write short notes on Space Division Multiple Access (SDMA).                                                    10
Answer:-
Space Division Multiple Access (SDMA):-
Space Division Multiple Access (SDMA) is a medium accessing scheme wherein the spaces are divided and separate spaces are allocated for users in wireless networks. This scheme is applied when a typical application requires an optimal base station for a mobile phone user. When the spaces are divided

Q.6. What are the Properties of a MANET?                                                                                            10
Answer:-
Properties of a MANET:-
 i.    Mobile ad hoc networks are based on wireless radio links.

ii.    MANET is able



Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0087 ,WML and WAP Programming-Theory
CREDIT
2
BK ID
B1182
MAX.: MARKS
30

Q.1. What is wireless markup language? 10
Answer:-
WML (Wireless Markup Language):-
WML is a mark-up language inherited from HTML, but is based on XML (eXtensible Markup Language).so it is much stricter than HTML. WML is used to create pages that can be displayed in a WAP browser or we can say WML is the HTML of WAP browsers and is transmitted via the HTTP protocol. WML uses

Q.2. Explain WAP architecture with diagram.                                                                                      5+5
Answer:-
WAP architecture:-
The WAP architecture provides a scalable and extensible environment for application development of mobile communication devices. The goals of the WAP architecture are as follows.
      i.   Provide a web-centric application model for wireless data services that utilizes the telephony, mobility, and other unique functions of wireless devices and networks while allowing maximum flexibility
    ii.    



Q.3. Mention the different format attributes.                                                                                10
Answer:-
Format Attribute:-
The format attribute of the <input> element is used to control the type and number of characters that can be entered


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0088, Cryptography and Network Security
BK ID
B2069
CREDITS
4
MARKS
60

Q.1. What is the need for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime. When you refer to a computing system, it means a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks. Sometimes, you can see that parts of a computing system are not valuable to an outsider, but

Q.2.What do you understand by cryptography?                                                                               10
Answer:-
The word cryptography comes from the Greek words kryptos meaning hidden and graphein meaning writing. So cryptography is the study of hidden writing, or is the science of encrypting and decrypting text. A fundamental rule in cryptography is that one must assume that the cryptanalyst knows the methods used for


Q.3.What are intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from virus and hacking of information from your computer while you are online. For effective computer security, one should take care of physical security measures to ensure that hardware and media are not stolen or damaged, to minimise the risk and


Q.4. Write short note on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make, but other people can easily recognize as belonging to the sender. Just like a real signature, a

Q.5. Write short notes on DES. 10
Answer:-
Data Encryption Standard (DES):-
The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has been officially accepted as a cryptographic standard both in the United States and abroad. Moreover,
Q.6. Give an overview of IP security. 10
Answer:-
Overview of IP security:-
IPSec provides connectionless, best-effort delivery of datagrams through a network by protecting it from snooping or modification. IPSec protects IP datagrams by defining a method of specifying the traffic to protect, how that traffic is to be protected, and to whom the traffic is sent. IPSec can protect

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSC IT
SEMESTER
V
SUBJECT CODE & NAME
BT8902, E-COMMERCE
CREDIT
4
BK ID
B1186
MAX. MARKS
60

Q.1. What are the main activities of Electronic Commerce? 10
Answer:-
Main Activities of Electronic Commerce:-
a) Buying and selling of products
b) Shipping of products
c) Producing financial statements
All the above functions are carried out without any human intervention, and that is the reason of coining “


Q.2. Mention the benefits of e commerce.                                                                                         10
Answer:-
Benefits of e commerce:-
 i.    Sale and purchase of goods between producers and consumers can take place without depending upon time or distance.

ii.    Consumers

iii.     



Q.3. Mention the various Elements and Resources Impacting Electronic Commerce and Changes.
10
Answer:-
Elements and Resources Impacting Electronic Commerce and Changes:-
E – Commerce has the ability to affect the way that an organization operates in a multidimensional way. These elements have direct impact on the development of your strategy, and show how much assistance you may need to bring it


Q.4. What are the different characteristics of internet?                                                                       10
Answer:-
Characteristics of Internet:-
The internet is a global network made up of thousands of networks that communicate with each other. It brings the outside world to your desktop in your home or in your office.
1)      A Complex Network: The very nature of internet is that it comprises millions of computers



Q.5. Write a short notes on World Wide Web.                                                                                  10
Answer:-
World Wide Web (WWW):-
World Wide Web or WWW is a repository of information spread all over the world and linked together. WWW uses the concept of hypertext. A hypertext is commonly known as a page and the main page of

Q.6. What are the different steps to build a homepage?                                                                      10
Answer:-
Steps to build a homepage:-
Every company expects that when a user visits their website, he/she must have a positive feedback regarding the company's website and in a bid to encourage more users visit their website they have to ensure that

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE - Fall 2017
PROGRAM - BSc IT
SEMESTER - FIFTH
SUBJECT CODE & NAME - BT9002, Grid Computing


Q. 1 What is Grid Computing? 10
Answer:-
Grid computing is a processor architecture that combines computer resources from various domains to reach a main objective. In grid computing, the computers on the network can work on a task together, thus functioning as a supercomputer.
Typically, a grid works on various tasks within a network, but it is also capable of working on specialized applications. It is

Q2 Write short notes on Computational and Data Grids. 10
Answer:-
Computational Grid
This grid is specifically for computing power. All systems are high performance machine/server catered to the need of user

Q3 Mention the three main issues that characterize computational grids. 10
Answer:-
The computation grid is characterized into three types, they are
1) Heterogeneity:
 In

Q4 Explain Evolution and Nature of Grid Architecture. 10
Answer:-
In late 90’s, it was stated that computational grid is the combination of hardware and software infrastructure will provide cost effective, dependable, consistent access to high-end computation. Initially the definition targeted only for computational grid, later definition was widely spread across with problem solving, coordinated

Q5 What is the need of Inter-grid Protocols? 10
 Answer:-
Need for Intergrid Protocols
The grid architecture provides the sharing of resources, services and other information through common gateways are protocol and APIs. It doesn’t have any constrain in implementation of protocol or APIs. It provides the different
Q6 What is Service-Oriented Architecture (SOA) Model? 10
Answer:-
In service oriented architecture (SOA), software services are well defined in distributed system. These types of services are invoked

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412