Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
fall 2017
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0086, Mobile Computing
|
CREDIT
|
4
|
BK ID
|
B2067
|
MAX. MARKS
|
60
|
Q.1. Explain simple
reference model. 5+5
Answer:-
Simple reference
model:-
The basic reference model used to structure communication
Systems. Mobile communication is influenced by layered reference model.
In Figure, you
can see a Personal Digital Assistant (PDA) which is one of the example of
wireless and portable device. PDA is
Q.2. Write short
notes on Signals.
10
Answer:-
Signals:-
Signals are the physical representation of data. Signals are
functions of time and location. Signal parameters represent the data values.
The most
Q.3. What do you
understand by Analog Modulation?
10
Answer:-
Analog modulation:-
In Analog modulation, the information carrying base band
signal typically called the message or information signal m(t) varies either
the amplitude or the angle of the
carrier signal (or radio carrier). The carrier signal has a higher frequency
which shifts the center frequency of the baseband signal up to the radio
carrier. It is the radio carrier which is capable of transmitting through
wireless media and
Q.4. What is
Universal Mobile Telecommunication System (UMTS)? 10
Answer:-
Universal Mobile
Telecommunication System (UMTS):-
The development community of the wireless and mobile
communication wanted the cellular system which would
Q.5. Write short
notes on Space Division Multiple Access (SDMA). 10
Answer:-
Space Division
Multiple Access (SDMA):-
Space Division Multiple Access (SDMA) is a medium accessing
scheme wherein the spaces are divided and separate spaces are allocated for
users in wireless networks. This scheme is applied when a typical application
requires an optimal base station for a mobile phone user. When the spaces are
divided
Q.6. What are the
Properties of a MANET?
10
Answer:-
Properties of a
MANET:-
i. Mobile ad hoc networks are based on wireless radio links.
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
fall 2017
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0087 ,WML and WAP Programming-Theory
|
CREDIT
|
2
|
BK ID
|
B1182
|
MAX.: MARKS
|
30
|
Q.1. What is wireless
markup language? 10
Answer:-
WML (Wireless
Markup Language):-
WML is a mark-up language inherited from HTML, but is based
on XML (eXtensible Markup Language).so it is much stricter than HTML. WML is
used to create pages that can be displayed in a WAP browser or we can say WML
is the HTML of WAP browsers and is transmitted via the HTTP protocol. WML uses
Q.2. Explain WAP
architecture with diagram.
5+5
Answer:-
WAP architecture:-
The WAP architecture provides a scalable and extensible
environment for application development of mobile communication devices. The
goals of the WAP architecture are as follows.
i. Provide a web-centric application model for wireless data services
that utilizes the telephony, mobility, and other unique functions of wireless
devices and networks while allowing maximum flexibility
ii.
Q.3. Mention the
different format attributes.
10
Answer:-
Format Attribute:-
The format attribute of the <input> element is used to
control the type and number of characters that can be entered
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
fall 2017
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0088, Cryptography and Network
Security
|
BK ID
|
B2069
|
CREDITS
|
4
|
MARKS
|
60
|
Q.1. What is the need
for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime.
When you refer to a computing system, it means a collection of hardware,
software, storage media, data, and people that an organization uses to perform
computing tasks. Sometimes, you can see that parts of a computing system are
not valuable to an outsider, but
Q.2.What do you
understand by cryptography? 10
Answer:-
The
word cryptography comes from the Greek words kryptos meaning hidden and
graphein meaning writing. So cryptography is the study of hidden writing, or is
the science of encrypting and decrypting text. A fundamental rule in
cryptography is that one must assume that the cryptanalyst knows the methods
used for
Q.3.What are
intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from
virus and hacking of information from your computer while you are online. For
effective computer security, one should take care of physical security measures
to ensure that hardware and media are not stolen or damaged, to minimise the
risk and
Q.4. Write short note
on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same
effect as a real signature: It is a mark that only the sender can make, but
other people can easily recognize as belonging to the sender. Just like a real
signature, a
Q.5. Write short
notes on DES. 10
Answer:-
Data Encryption
Standard (DES):-
The most widely used encryption scheme is based on Data
Encryption standard. Data Encryption Standard (DES), a system developed for the
U.S. government, was intended for use by the general public. It has been
officially accepted as a cryptographic standard both in the United States and
abroad. Moreover,
Q.6. Give an overview
of IP security. 10
Answer:-
Overview of IP
security:-
IPSec provides connectionless, best-effort delivery of
datagrams through a network by protecting it from snooping or modification.
IPSec protects IP datagrams by defining a method of specifying the traffic to
protect, how that traffic is to be protected, and to whom the traffic is sent.
IPSec can protect
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
fall 2017
|
PROGRAM
|
BSC IT
|
SEMESTER
|
V
|
SUBJECT CODE & NAME
|
BT8902, E-COMMERCE
|
CREDIT
|
4
|
BK ID
|
B1186
|
MAX. MARKS
|
60
|
Q.1. What are the
main activities of Electronic Commerce? 10
Answer:-
Main Activities of
Electronic Commerce:-
a) Buying and
selling of products
b) Shipping of
products
c) Producing
financial statements
All the above functions are carried out without any human
intervention, and that is the reason of coining “
Q.2. Mention the
benefits of e commerce.
10
Answer:-
Benefits of e
commerce:-
i. Sale and purchase of goods between producers and consumers can take
place without depending upon time or distance.
ii. Consumers
iii.
Q.3. Mention the
various Elements and Resources Impacting Electronic Commerce and Changes.
10
Answer:-
Elements and
Resources Impacting Electronic Commerce and Changes:-
E – Commerce has the ability to affect the way that an
organization operates in a multidimensional way. These elements have direct
impact on the development of your strategy, and show how much assistance you
may need to bring it
Q.4. What are the
different characteristics of internet?
10
Answer:-
Characteristics of
Internet:-
The internet is a global network made up of thousands of
networks that communicate with each other. It brings the outside world to your
desktop in your home or in your office.
1) A Complex Network: The very nature of internet is that it comprises millions of
computers
Q.5. Write a short
notes on World Wide Web.
10
Answer:-
World Wide Web
(WWW):-
World Wide Web or WWW is a repository of information spread
all over the world and linked together. WWW uses the concept of hypertext. A
hypertext is commonly known as a page and the main page of
Q.6. What are the
different steps to build a homepage?
10
Answer:-
Steps to build a
homepage:-
Every company expects that when a user visits their website,
he/she must have a positive feedback regarding the company's website and in a
bid to encourage more users visit their website they have to ensure that
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT DRIVE - Fall 2017
PROGRAM - BSc IT
SEMESTER - FIFTH
SUBJECT CODE & NAME - BT9002, Grid
Computing
Q. 1 What is Grid Computing? 10
Answer:-
Grid computing is
a processor architecture that combines computer resources from various domains
to reach a main objective. In grid computing, the computers on the network can
work on a task together, thus functioning as a supercomputer.
Typically, a grid
works on various tasks within a network, but it is also capable of working on
specialized applications. It is
Q2 Write short notes on Computational and
Data Grids. 10
Answer:-
Computational Grid
This grid is
specifically for computing power. All systems are high performance
machine/server catered to the need of user
Q3 Mention the three main issues that
characterize computational grids. 10
Answer:-
The computation
grid is characterized into three types, they are
1) Heterogeneity:
In
Q4 Explain Evolution and Nature of Grid
Architecture. 10
Answer:-
In late 90’s, it
was stated that computational grid is the combination of hardware and software
infrastructure will provide cost effective, dependable, consistent access to
high-end computation. Initially the definition targeted only for computational
grid, later definition was widely spread across with problem solving,
coordinated
Q5 What is the need of Inter-grid
Protocols? 10
Answer:-
Need for
Intergrid Protocols
The grid
architecture provides the sharing of resources, services and other information
through common gateways are protocol and APIs. It doesn’t have any constrain in
implementation of protocol or APIs. It provides the different
Q6 What is Service-Oriented Architecture
(SOA) Model? 10
Answer:-
In service
oriented architecture (SOA), software services are well defined in distributed
system. These types of services are invoked
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment