Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM-MCASEMESTER-V
SUBJECT
CODE & NAME-MCA5010-WEB TECHNOLOGIES
CREDIT-4
MAX.
MARKS-60
Qus:1 Differentiate
between TCP and UDP
Answer:
Differentiate between
TCP and UDP:
TCP (Transmission Control
Protocol):
The
TCP corresponds to the transport layer of OSI reference model, The TCP is known
as a connection-oriented protocol, which means that connection is established
and maintained until such time as the message or messages to be exchanged by
the application programs at each end have been exchanged. TCP makes sure data
gets to the destination without errors. It is also responsible for
disassembling and assembling
Qus: 2 describe the
features of XML. What are the important rules to keep in mind about the XML
declaration?
Answer:
The features of XML:
XML
is popular for many features and few of them are listed here:
1.
Easy
Data Exchange: In XML, data and mark-up are
stored as text that we can configure. If we like, we can use XML editors to
create
2.
Qus: 3. List and explain the
Components of XML processor.
Answer.
Components of XML
processor:
a)
Parser:
Every
XML processor has a parser. An XML parser converts an XML document into an XML
DOM object - which can then be manipulated with a JavaScript. The parser's job
is to translate XML mark-up and data into a stream of bite-sized nuggets,
called tokens, to be used for processing. A token may be an element start tag,
a string of character content
Qus:4. Describe the procedure of
fetching data from XML to HTML. Give an example.
Answer.
Procedure of fetching
data from XML to HTML:
The
process of fetching data from an XML files to be filled in an HTML table, using
DSO (Data Source Object) and JavaScript. DSO is an object that operates like a
database on the client side. It will accept information that is organized in a
certain way and
Qus:5. Describe five different
categories of PHP Operators.
Answer.
Categories of PHP
Operators:
In
all programming languages, operators are used to manipulate or perform
operations on variables and values. There are many operators used in PHP, so we
have separated them into the following categories to make it easier to learn
them all.
Ø
Assignment Operators
Ø Arithmetic
Operators
Ø Comparison
Ø
Qus:6. Describe
about ASP.
Answer.
ASP:
The
page on the server called by the JavaScript is an ASP file called AJAX server
page. The server file could easily be rewritten in PHP, or some other server
languages. Look at the example in PHP. The source code in
"getcustomer.asp"
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Spring
2018 ASSIGNMENT
PROGRAM-MCA(REVISED
FALL 2012)
SEMESTER-V
SUBJECT
CODE & NAME-MCA5020-ADVANCED SOFTWARE ENGINEERING
Qus:1 What do you mean
by product life cycle? Explain the seven stages of product life cycle
Answer:
Product life cycle:
A
series of steps is required to manufacture a product..The product developed
should satisfy the customer. The series of steps involved in developing the
product is called the product life cycle.
The stages of product
life cycle:
The
seven stages in a product life cycle are:
Qus: 2 List any ten
major principles of agile software.
Answer.
Principles of agile software:
The
major principles of agile software are:
·
Satisfying
·
·
·
Qus: 3. List the
four developer practices of XP. Explain briefly about Adopt test-driven
development
Answer:
Developer practices of
XP:
XP
values and the significance of time and resource for an XP practitioner. As a
development model, the XP empowers the developers and stakeholders, associated
with the project, to successfully carry out the project and develop efficient
software.
Qus:4. Briefly explain about
tracker and coach in XP.
Answer.
Tracker and coach in XP:
Tracker:
A
tracker is a person who keeps track of the schedule. A tracker can be a manager
or a trusted developer. XP keeps track of certain metrics that include team
velocity. This is the ratio of ideal time estimated for accomplishing a task to
the actual time spent implementing them. The tracker also includes other data
Qus:5. Explain XP prerequisites.
Answer.
XP prerequisites:
The
following are the prerequisites for adopting XP:
Ø Team
agreement
Ø A
collocated team
Ø On-site
customers
Ø The
right team size
Ø Use
all XP practices
·
Team agreement: The
team’s agreement to use XP is as important as management support. If team
members do not want to use XP, it’s not likely to work. XP assumes that each
team member’s willingness to adopt it. It is not a good practice to force the
process on somebody who is resisting it.
Qus:6. List and explain any five
basic principles of DSDM
Answer:
Principles of DSDM:
DSDM
consists of nine basic principles. These principles form the cornerstones of
development using DSDM and direct how development progresses. Ignoring any one
of them will break with the frameworks philosophy and
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM - Master of
Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
- 4
SUBJECT CODE &
NAME – Mca5032- WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4
Q1.
Describe wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to mankind. Wireless
communication involves the transmission of information over a distance without
help of wires, cables or any other forms of electrical conductors. The
transmitted distance can be anywhere between a few meters (for example, a
2 Describe any five GSM PLMN basic services.
Answer: 5 GSM
PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic answering machines used in wireless telephone network
needs a controlling mechanism. For this purpose the GSM PLMN uses a tone
signalling service
Q3.
Differentiate BSC and MSC protocols. 10
Ans: BSC protocols: Once
the information is communicated from the BTS to the BSC, the Abis
interface
is used to
an
be routed to the user by the location information contained in the user’s HLR.
Q4.
What is CDMA? Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be
introduced to the concept of CDMA, its channel concept and its operation. Code
Division Multiple Access technology emerged as an alternative to the GSM
cellular architecture. Frequency reuse is an
Q5.
Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key
generation 10
Ans: A5 Algorithm – An
A5 encryption algorithm scrambles the user's voice and data traffic between the
handset and the base station to provide privacy. An A5 algorithm is implemented
in both the handset and the base station subsystem (BSS). This algorithm is
used to encipher and decipher the data that is being transmitted on the Um
interface. The Kc (ciphering key) and the
plaintext
data are inputted into the A5 algorithm and
Q6.
List and explain the different path loss models. 10
Ans: Path Loss Models: Path
loss models describe the signal attenuation between a transmit and a receive
antenna as a function of the propagation distance and other parameters.
Some models include many details of the topography profile to estimate
the signal reduction, whereas others just consider carrier frequency and
distance. Path loss is the reduction in power density of an electromagnetic
wave as it propagates through space. It is a major component in the
analysis and design of the link budget of a
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
DRIVE
SPRING
2018
PROGRAM
MCA(REVISED
FALL 2012)
SEMESTER
5
SUBJECT
CODE & NAME
MCA5042-
Cryptography and Network Security
1
a) List and explain the objectives of computer security.
b)
What is the difference between passive and active security threats?
Answer: a) Objectives of Computer Security
Confidentiality
The first objective of
security is confidentiality: keeping information away from people who should
not have it. Accomplishing this objective requires that we know what data we
are protecting and who should have access to it. It requires that we provide protection
mechanisms for the data while it is
2
a) What is avalanche effect?
b)
Explain data encryption standard (DES).
Answer: a) In cryptography, the avalanche
effect is the desirable property of cryptographic algorithms, typically block
ciphers and cryptographic hash functions wherein if when an input is changed
slightly (for example, flipping a single bit) the output changes significantly
(e.g., half the output bits flip). In the case of high-quality block ciphers,
such a small change in either the key or the plaintext should cause
3
Explain the evaluation criteria for Advanced Encryption Standard (AES).
Answer: The AES is likely to be the
commercial-grade symmetric algorithm of choice for years, if not decades. In
January 1997, NIST called for cryptographers to develop a new encryption
system. As with the call
4
a) What is key distribution?
b)
Explain symmetric key distribution using symmetric encryption.
Answer: a) In symmetric key cryptography, both
parties must possess a secret key which they must exchange prior to using any
encryption. Distribution of secret keys has been problematic until recently,
because it
5
a) Describe the four types of protocol of SSL.
b)
What is Transport Layer Security (TLS)? Explain.
Answer: a) The SSL defines four protocols in
two layers. They are:
Change
CipherSpec Protocol
The change CipherSpec
protocol is responsible for sending change CipherSpec messages. At any time,
the client can request to change current cryptographic parameters such as the
handshake key exchange.
6
a) Discuss intrusion detection.
b)
What do you mean by malicious software? Explain in detail.
Answer: a) Intrusion
detection:
Closely related to audit
reduction is the ability to detect security lapses, ideally while they occur.
As we have seen in the State Department example, there may well be too much
information in the audit log for a human to analyze, but
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment