Wednesday 10 January 2018

smu msc it fall 2017 (jan/feb 2018 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT306– Object Oriented Analysis and Design(OOAD)

Qus:1 What is usability testing? Write the rule for developing usability testing.
Answer:
Usability testing, a non-functional testing technique that is a measure of how easily the system can be used by end users. It is difficult to evaluate and measure but can be evaluated based on the below

Qus:2 What is meant by unified approach? Describe the steps, methods and tools of unified approach.
Answer:   Unified approach is a better way for understanding concepts of objects oriented system development. Unified approach is a methodology for software development. The unified approach, based on

Qus:3 Describe the various states of activity diagram.
Answer: Activity diagrams are special cases of state chart diagrams. An activity diagram has actions as sta


Qus:4 Discuss the strategies for designing classes.
Answer: The object oriented design process is a complex process. The following methods can help you design better classes:
1)      Analyze the role of the objects of the class in the application. An object can play any of the following


Qus:5 Mention and describe the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which cause unexpected results and eliminating them. The process of testing and identifying bugs is a balance of science, art and luck.
There are three

Qus:6 Explain the following:
(a) Black box testing
(b) White box testing
Answer: (a) Black box testing
This treats the system as one that cannot be seen in detail. The structure of the program is not taken into account. The tests are performed based on what the program does. This is sometimes called


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT) Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT307-WEB TECHNOLOGIES

Qus:1 Name the three types of pattern in event driven programming. Explain the advantages of event driven programming.
Answer:
In computer programming, event-driven programming is a programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses), sensor outputs, or messages from other programs/threads. Event-driven programming is the


Qus:2 Explain the features of XML. Write important rules for XML declaration?
Answer: XML is popular for many features and few of them are listed here:
1.      Easy Data Exchange: In XML, data and markup are stored as text that we can configure. If we like, we can use XML editors to create XML documents but if something goes wrong we can examine and modify document directly because it’s all just text.XML provides a very efficient way of



Qus:3 Write any four importance of XML Schema. Discuss the steps to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a document, they can:
 XML schema uses XML syntax. When you look at your first XML Schema, probably the most striking


Qus:4 Define AJAX. Explain AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX is not a new programming language, but a new way to use existing standards.
It is a technique, rather than a framework. it allows web pages to behave less like flat documents and more like dynamic GUI apps that users might expect from their desktop environments.

Qus:5 Describe the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have

Qus:6  What is meant by control statements in ASP. Explain with suitable example.
Answer: We can make a decision based on user input using an If statement. The If statement tests a condition and if the result is true then it runs the code that follows the If statement but if the result is

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3031– High Speed Networks

Qus:1 Explain WLAN components.
Answer:
WLAN components
A local area network (LAN) connects computers, printers and other devices to allow sharing of data and resources. LANs are limited to coverage of one location, typically a building, and usually use network

Qus:2 Describe Multi-server queue using suitable diagrams and equations.
Answer: The aim of the queuing analysis is to make use of analytic models to yield the desired parameters to determine the buffer size. The following two queuing models can be used as analytic


Qus:3 What is meant by congestion? List and describe different types of congestion.
Answer: The situation wherein network resources are constantly overloaded or the overall demand of a resource exceeds its capacity is termed as congestion. Congestion in a network occurs when the load on the network or the number of packets transmitted to the network is more than

Qus:4 In TCP what is timer? List the timers that TCP maintains for every connection and explain any three.
Answer: In TCP protocol, timers are applied in various positions and these timers restrain retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all timers. Function pointers in a timer structure take a behavior function when initialized. Once the timer ends

Qus:5 What is meant by Resource Reservation Protocol (RSVP)? Write any three salient characteristics. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup and control. It enables Integrated Services (IntServ) which is designed to emulate circuits on the Internet. This is the most complex QoS technology for elements of a network (routers, switches) and applications (hosts). But, it

Qus:6 with suitable diagram describe Routing Information Protocol (RIP) message format. Write two benefits and two drawbacks of RIP.
Answer: RIP is based on distance vector routing. It implements vector routing using the following considerations:
 An AS has both routers and networks. While routers have routing tables, networks don’t.
 The first


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412




1 comment: