Wednesday, 10 January 2018

smu bsc it fall 2017 (jan/feb 2018 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0086, Mobile Computing
CREDIT
4
BK ID
B2067
MAX. MARKS
60

Q.1. Explain simple reference model. 5+5
Answer:-
Simple reference model:-
The basic reference model used to structure communication Systems. Mobile communication is influenced by layered reference model.
In Figure, you can see a Personal Digital Assistant (PDA) which is one of the example of wireless and portable device. PDA is

Q.2. Write short notes on Signals.                                                                                                       10
Answer:-
Signals:-
Signals are the physical representation of data. Signals are functions of time and location. Signal parameters represent the data values.
The most

Q.3. What do you understand by Analog Modulation?                                                                       10
Answer:-
Analog modulation:-
In Analog modulation, the information carrying base band signal typically called the message or information signal m(t) varies either the amplitude or the angle  of the carrier signal (or radio carrier). The carrier signal has a higher frequency which shifts the center frequency of the baseband signal up to the radio carrier. It is the radio carrier which is capable of transmitting through wireless media and


Q.4. What is Universal Mobile Telecommunication System (UMTS)?                                                 10
Answer:-
Universal Mobile Telecommunication System (UMTS):-
The development community of the wireless and mobile communication wanted the cellular system which would

Q.5. Write short notes on Space Division Multiple Access (SDMA).                                                    10
Answer:-
Space Division Multiple Access (SDMA):-
Space Division Multiple Access (SDMA) is a medium accessing scheme wherein the spaces are divided and separate spaces are allocated for users in wireless networks. This scheme is applied when a typical application requires an optimal base station for a mobile phone user. When the spaces are divided

Q.6. What are the Properties of a MANET?                                                                                            10
Answer:-
Properties of a MANET:-
 i.    Mobile ad hoc networks are based on wireless radio links.

ii.    MANET is able



Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0087 ,WML and WAP Programming-Theory
CREDIT
2
BK ID
B1182
MAX.: MARKS
30

Q.1. What is wireless markup language? 10
Answer:-
WML (Wireless Markup Language):-
WML is a mark-up language inherited from HTML, but is based on XML (eXtensible Markup Language).so it is much stricter than HTML. WML is used to create pages that can be displayed in a WAP browser or we can say WML is the HTML of WAP browsers and is transmitted via the HTTP protocol. WML uses

Q.2. Explain WAP architecture with diagram.                                                                                      5+5
Answer:-
WAP architecture:-
The WAP architecture provides a scalable and extensible environment for application development of mobile communication devices. The goals of the WAP architecture are as follows.
      i.   Provide a web-centric application model for wireless data services that utilizes the telephony, mobility, and other unique functions of wireless devices and networks while allowing maximum flexibility
    ii.    



Q.3. Mention the different format attributes.                                                                                10
Answer:-
Format Attribute:-
The format attribute of the <input> element is used to control the type and number of characters that can be entered


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0088, Cryptography and Network Security
BK ID
B2069
CREDITS
4
MARKS
60

Q.1. What is the need for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime. When you refer to a computing system, it means a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks. Sometimes, you can see that parts of a computing system are not valuable to an outsider, but

Q.2.What do you understand by cryptography?                                                                               10
Answer:-
The word cryptography comes from the Greek words kryptos meaning hidden and graphein meaning writing. So cryptography is the study of hidden writing, or is the science of encrypting and decrypting text. A fundamental rule in cryptography is that one must assume that the cryptanalyst knows the methods used for


Q.3.What are intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from virus and hacking of information from your computer while you are online. For effective computer security, one should take care of physical security measures to ensure that hardware and media are not stolen or damaged, to minimise the risk and


Q.4. Write short note on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make, but other people can easily recognize as belonging to the sender. Just like a real signature, a

Q.5. Write short notes on DES. 10
Answer:-
Data Encryption Standard (DES):-
The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has been officially accepted as a cryptographic standard both in the United States and abroad. Moreover,
Q.6. Give an overview of IP security. 10
Answer:-
Overview of IP security:-
IPSec provides connectionless, best-effort delivery of datagrams through a network by protecting it from snooping or modification. IPSec protects IP datagrams by defining a method of specifying the traffic to protect, how that traffic is to be protected, and to whom the traffic is sent. IPSec can protect

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
fall 2017
PROGRAM
BSC IT
SEMESTER
V
SUBJECT CODE & NAME
BT8902, E-COMMERCE
CREDIT
4
BK ID
B1186
MAX. MARKS
60

Q.1. What are the main activities of Electronic Commerce? 10
Answer:-
Main Activities of Electronic Commerce:-
a) Buying and selling of products
b) Shipping of products
c) Producing financial statements
All the above functions are carried out without any human intervention, and that is the reason of coining “


Q.2. Mention the benefits of e commerce.                                                                                         10
Answer:-
Benefits of e commerce:-
 i.    Sale and purchase of goods between producers and consumers can take place without depending upon time or distance.

ii.    Consumers

iii.     



Q.3. Mention the various Elements and Resources Impacting Electronic Commerce and Changes.
10
Answer:-
Elements and Resources Impacting Electronic Commerce and Changes:-
E – Commerce has the ability to affect the way that an organization operates in a multidimensional way. These elements have direct impact on the development of your strategy, and show how much assistance you may need to bring it


Q.4. What are the different characteristics of internet?                                                                       10
Answer:-
Characteristics of Internet:-
The internet is a global network made up of thousands of networks that communicate with each other. It brings the outside world to your desktop in your home or in your office.
1)      A Complex Network: The very nature of internet is that it comprises millions of computers



Q.5. Write a short notes on World Wide Web.                                                                                  10
Answer:-
World Wide Web (WWW):-
World Wide Web or WWW is a repository of information spread all over the world and linked together. WWW uses the concept of hypertext. A hypertext is commonly known as a page and the main page of

Q.6. What are the different steps to build a homepage?                                                                      10
Answer:-
Steps to build a homepage:-
Every company expects that when a user visits their website, he/she must have a positive feedback regarding the company's website and in a bid to encourage more users visit their website they have to ensure that

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE - Fall 2017
PROGRAM - BSc IT
SEMESTER - FIFTH
SUBJECT CODE & NAME - BT9002, Grid Computing


Q. 1 What is Grid Computing? 10
Answer:-
Grid computing is a processor architecture that combines computer resources from various domains to reach a main objective. In grid computing, the computers on the network can work on a task together, thus functioning as a supercomputer.
Typically, a grid works on various tasks within a network, but it is also capable of working on specialized applications. It is

Q2 Write short notes on Computational and Data Grids. 10
Answer:-
Computational Grid
This grid is specifically for computing power. All systems are high performance machine/server catered to the need of user

Q3 Mention the three main issues that characterize computational grids. 10
Answer:-
The computation grid is characterized into three types, they are
1) Heterogeneity:
 In

Q4 Explain Evolution and Nature of Grid Architecture. 10
Answer:-
In late 90’s, it was stated that computational grid is the combination of hardware and software infrastructure will provide cost effective, dependable, consistent access to high-end computation. Initially the definition targeted only for computational grid, later definition was widely spread across with problem solving, coordinated

Q5 What is the need of Inter-grid Protocols? 10
 Answer:-
Need for Intergrid Protocols
The grid architecture provides the sharing of resources, services and other information through common gateways are protocol and APIs. It doesn’t have any constrain in implementation of protocol or APIs. It provides the different
Q6 What is Service-Oriented Architecture (SOA) Model? 10
Answer:-
In service oriented architecture (SOA), software services are well defined in distributed system. These types of services are invoked

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412




No comments:

Post a Comment