Saturday, 21 April 2018

smu bca 2nd sem assignment spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application - BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA211 – Operating System
Assignment Set -1 Questions
Q1 What are the components of UNIX Kernel? 10
Answer:-
The UNIX kernel s divided in to three modes: user mode, kernel mode, and hardware. The user mode contains user programs

Q2. Discuss First-Come-First-Served scheduling algorithm. 10
Answer:-
This is one of the brute force algorithms. A process that requests for the CPU first is allocated the CPU first. Hence, the name first come first serve.  The FCFS algorithm is implemented by using a first-in-first-out (FIFO) queue structure


Q3 a) What are the necessary conditions for deadlock to occur? b) Write a note on Resource Allocation Graph. 4+6
 Answer:-
a)
A deadlock occurs in a system if the following four conditions hold simultaneously:
1)      Mutual exclusion:


Assignment Set -2 Questions

Q1 Discuss the concept of Direct Memory Access.  10
Answer:-
In most mini and mainframe computer systems, a great deal of input and output occurs between the disk system and the processor. It would be very inefficient to perform these operations directly through the processor;

Q2 Explain demand paging in virtual memory system. 10
Answer:-
Demand paging is similar to paging with swapping (Refer figure below). When a process is to be executed then only that page of the process, which needs to be currently executed, is swapped into memory. Thus, only necessary pages

Q3 What are the different forms of Encryption in Distributed System? 10
Answer:-
Encryption in a distributed environment can be of two forms:
  End-to-end encryption
 Link encryption
 If end-to-end

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application – BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA212 – Data Structure and Algorithm

Assignment Set -1 Questions

Q1 Explain Adjacency Matrix and Incidence matrix form of representing a graph. 5+5
 Answer:-
Adjacency matrix
 It is a two-dimensional Boolean matrix to store the information about the graph nodes. Here the rows and columns represent source and destination vertices and entries in the matrix indicate whether an edge exists between the vertices

Q2 Explain in detail the traversing and searching of linked list. 5+5
Answer:-
Traversing a Linked List Traversing a linked list means processing each node of list exactly once. The linked list in

Q3 Discuss the stack data structure with Push () and Pop () operation. 10
Answer:-
A stack is a data structures in which insertion and deletion of items are made at the one end, called the top of the stack

Assignment Set -2 Questions

Q1 Write the Algorithm for sorting by Partitioning.
 Answer:-
In merge sort, the file a[1:n] was divided at its midpoint into subarrays which were independently sorted and later merged.
In quick sort,

Q2 Explain the Concept of travelling Salesman Problem 
Answer:-
A tour of G is a directed simple cycle that includes every vertex in V. The cost of the tour is the sum of the cost of the edges on the tour. The travelling salesperson problem is to find a tour of minimum cost. Let G=(V,E) be a

Q3 Explain how Dijkstra’s algorithm is used to find the shortest path of Directed weighted graph.
10
Answer:-
This algorithm is used to find the shortest path between the two vertices in a weighted directed graph and it is also very popular and efficient to find each and every path from starting (source) to terminal vertices.  Let w(vi , vj ) be the weight associated with every edge (vi , vj ) in a given weighted directed graph G.  Let us define that the weights are such that the


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application – BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA213 – Object Oriented Programming – C++


Assignment Set -1 Questions
Q1 Differentiate between an external variable and an automatic variable with the help of an example. 10
Answer:-
Automatic variables is default variable in C++. All the variables we have created and used in programs are automatic variables. These variables can also be declared by prefixing the keyword auto. One of important characteristics of

Q2 What is “this pointer” in C++? What are the features of “this pointer”? [3+7]
Answer:-
The this pointer is used as a pointer to the class object instance by the member function. The address of the class instance is passed as an implicit parameter to the member functions. The sample below, in this section shows how to use it. It is common knowledge that C++ keeps only one copy of each member function


Q3 Explain destructor in detail. 10
 Answer:-
Destructors are usually used to deallocate memory and do other cleanup for a class object and its class members when the object is destroyed. A destructor is called for a class object when that object passes out of scope or is



Assignment Set -2 Questions
Q1 What is Polymorphism? What are the different types of Polymorphism? 3+7
Answer:-
Polymorphism means same content but different forms. In C++, polymorphism enables the same program code calling different functions of different classes. Imagine a situation where you would like to create a class shape and derive classes such as rectangle, circle, triangle etc. Let us suppose each of the classes has a member function draw() that causes the object to be drawn on the screen. You would like to write a common code as

Q2 Explain sequence containers 10
Answer:-
STL provides a number of container types, representing objects that contain other objects. The STL contains sequence containers and associative containers. The standard sequence containers include vector, deque and list


Q3 Discuss the following functions of file operations a) tellg() b) seekp() c) ignore() d) getline() 2.5x4
Answer:-
a) tellg()
tellg() – Returns an int type, that shows the current position of the inside-pointer. This one works only when you read a file. Example:
#include <

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


ASSIGNMENT DRIVE – Spring 2018
PROGRAM Bachelor of Computer Application – BCA
SEMESTER - 2
SUBJECT CODE & NAME - BCA214 – Communication Skills


Assignment   Questions

Q1 Discuss the advantages and disadvantages of oral communication. Write a short note on the improvement of oral communication 5+5=10
Answer:-
Advantages of oral communication:-
In oral communication there is a possibility of immediate response. This makes speedy interaction and immediate feedback possible. This is the biggest advantage of oral communication.
Another advantage is that the speaker can observe the listener's reaction to what is being stated.

 Time saving: When action is

Q2 What is the difference between listening and hearing? Name the different types of listening. 5+5=10
Answer:
Hearing is a passive process. It is merely the detection of sounds around us. Normally, we come across ‘hearing’ in certain situations. E.g.: When your lecturer reprimands you for some of your shortcomings, you just hear it without paying

Q3 Discuss the definition and meaning of reading. 10
Answer:-

The following are a few definitions regarding the process of reading.
 Reading is thinking under the stimulus of the printed page (Webster, 1982:30)
 Reading is a Psycho-

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application – BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA215 – Computer Organization

Assignment Set -1 Questions

Q1 What do you mean by addressing modes? List the different types of addressing modes. 3+7
Answer:-
Addressing Modes
In general, a program operates on data that reside in the computer’s memory. These data can be organized in a variety of ways. If we want to keep track of students’ names, we can write them in a list. If we want to associate information with each name, for example to record telephone numbers or marks in various courses, we may organize this

Q2 Explain the programmer’s model of 8086. 10
Answer:-
The programmer’s model of 8086 is the most important concept to study in the 8086 model. Figure below shows the register organisation of 8086. This is termed as the Programmer’s model of 8086. The registers shown in the programmer’s

Q3 Explain the process of fetching a word from the memory. 10
 Answer:-
To fetch a word of information from the memory CPU must specify the address of the memory location where this word is located and request a read operation. This includes whether the information to be fetched represents an instruction

Assignment Set -2 Questions

Q1 Write a note on replacement algorithms. 10
Answer:-
When a new block is to be  brought into the cache and all the positions that it may occupy are full, then the cache controller must decide which of the old blocks to overwrite. Because the programs usually stay in localized areas for a reasonable period of time, there is high probability that the blocks that have been referenced recently will be

Q2 Explain the concept of coprocessor. Also explain its functions. 4+6
Answer:-
Coprocessor
Coprocessor is a relatively new concept in the area of multiprocessing. A coprocessor refers to a computer processor which is utilised as an addition to the functions of the cpu (the primary processor). A coprocessor is also known as a math processor or a numeric processor. It is capable of carrying out large amount of computations, thereby

Q3 How CPU responds to an interrupt? 10
Answer:-
The CPU checks periodically to determine if an interrupt signal is pending. This check is usually done at the end of each instruction, although some modern machines allow for interrupts to be checked for several times during the execution of very long instructions. When the CPU detects an interrupt, it then saves its current state (at least the PC

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412




smu msc it 3rd sem assignment spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT306– Object Oriented Analysis and Design(OOAD)
SET 1
Qus:1 What is usability testing? Write the rule for developing usability testing.
Answer:
Usability testing, a non-functional testing technique that is a measure of how easily the system can be used by end users. It is difficult to evaluate and measure but can be evaluated based on the below parameters:
·        Level of Skill required to learn/use the software. It should maintain the balance for both novice
·         


Qus:2 What is meant by unified approach? Describe the steps, methods and tools of unified approach.
Answer:   Unified approach is a better way for understanding concepts of objects oriented system development. Unified approach is a methodology for software development. The unified approach, based on

Qus:3 Describe the various states of activity diagram.
Answer: Activity diagrams are special cases of state chart diagrams. An activity diagram has actions as states. It can be considered as some kind of elaborate flow diagram and has therefore some graphical stru


SET 2
Qus:1 Discuss the strategies for designing classes.
Answer: The object oriented design process is a complex process. The following methods can help you design better classes:
1)      Analyze the role of the objects of the class in the application. An object can play any of the

Qus:2 Mention and describe the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which cause unexpected results and eliminating them. The process of testing and identifying bugs is a balance of science, art and luc

Qus:3 Explain the following:
(a) Black box testing
(b) White box testing
Answer: (a) Black box testing
This treats the system as one that cannot be seen in detail. The structure of the program is not taken into account. The tests are performed based on what the program does. This is sometimes

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT) Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT307-WEB TECHNOLOGIES
SET 1
Qus:1 Name the three types of pattern in event driven programming. Explain the advantages of event driven programming.
Answer:
In computer programming, event-driven programming is a programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses), sensor outputs, or messages from other programs/threads. Event-driven programming

Qus:2 Explain the features of XML. Write important rules for XML declaration?
Answer: XML is popular for many features and few of them are listed here:
1.      Easy Data Exchange: In XML, data and markup are stored as text that we can configure. If we like, we can use


Qus:3 Write any four importance of XML Schema. Discuss the steps to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a document, they can:
 XML schema uses XML syntax. When you look at your first XML Schema, probably the most striking

SET 2

Qus:1 Define AJAX. Explain AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX is not a new programming language, but a new way to use existing standards.
It is a technique,
Qus:2 Describe the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.


Qus:3  What is meant by control statements in ASP. Explain with suitable example.
Answer: We can make a decision based on user input using an If statement. The If statement tests a condition and if the result is true then it runs the code that follows the If statement but if the result is false then it runs the code after the else statement. Here is an example for when someone enters their
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3081– High Speed Networks
Set 1
Qus:1 Explain WLAN components.
Answer:
WLAN components
A local area network (LAN) connects computers, printers and other devices to allow sharing of data and resources. LANs are limited to coverage of one location, typically a building, and usually use network cables for connections.

However, needing wires to connect devices can be inconvenient, especially in older buildings. As the name


Qus:2 Describe Multi-server queue using suitable diagrams and equations.
Answer: The aim of the queuing analysis is to make use of analytic models to yield the desired parameters to determine the buffer size. The following two queuing models can be used as



Qus:3 What is meant by congestion? List and describe different types of congestion.
Answer: The situation wherein network resources are constantly overloaded or the overall demand of a resource exceeds its capacity is termed as congestion. Congestion in a network occurs when the



Set 2

Qus:1 In TCP what is timer? Explain any timers that TCP maintains for every connection.
Answer: In TCP protocol, timers are applied in various positions and these timers restrain retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all timers. Function pointers in a timer structure take a behavior function when initialized. Once the timer ends, this

Qus:2 What is meant by Resource Reservation Protocol (RSVP)? Write any three salient characteristics. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup and control. It enables Integrated Services (IntServ) which is designed to emulate circuits on the Internet. This is the most complex QoS

Qus:3 With the help of suitable diagram explain Routing Information Protocol (RIP) message format. Mention two benefits and two drawbacks of RIP.
Answer: RIP is based on distance vector routing. It implements vector routing using the following considerations:
 An AS has both routers and networks. While routers have routing tables, networks don’t.
 The first column of a

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3091– Open Source System
Set 1
Qus:1 Elaborate the various types of Creative Common License.
Answer: It is very important to know that the licensable properties come from an array of sources. The definitions of various proprietary types are not always apparent. Although every licensing program is



Qus:2 Write a short note on the following:
(a)MIT license.
(b)Advertising clause

Answer:
(a)MIT license.
The Massachusetts Institute of
Technology initially developed a liberal software license which is called as the MIT license, for the release of X Window System source code. You can also call it as ‘X License’ or ‘MIT/X License’ or ‘X Window System License’.
The MIT license is nearly similar to the BSD (Berkeley Source Distribution) license which was developed at

Qus:3 (a)List any five features of Mozilla Public License.
(b)Comparison among GPL, LGPL, and MPL.
Answer: (a)List any five features of Mozilla Public License.
You can say that the MPL differs from the GPL in the way it regulates the distribution and licensing of works


SET 2
Q2. Open-source is a good choice for companies, Justify it.
Answer: As we have understood how we could join an existing open source project and also end an open source project, let us now learn how we can inculcate an open source culture in a company.
Running an open source project or joining an existing one can also be applied to corporate source where all the users and contributors are the employees of the company. What changes when

Qus:2 Explain the drawbacks of open source and free software licensing.
Answer: As we are aware of the global scenario of open source and free software licenses, let us now understand the issues related to them.
You can observe that the advantages of open source licensing sometime in some situations act as

Qus:3 Discuss Cross licensing.
Answer: When two or more companies sign agreement providing the rights of their intellectual property to the other, then this agreement is known as the cross licensing agreement. For example, two companies holding software patents, under cross licensing, agree to share information about the patented software between them. Instead of blocking each other’s

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412