Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
DRIVE
SPRING 2018
PROGRAM
B.SC IT
SEMESTER
SECOND
SUBJECT
CODE & NAME BT0068, Computer Organization and Architecture
1. What is a digital computer? Explain using a diagram.
Answer: Digital computers use
the binary number system, which has two digits: 0 and 1. A binary digit is
called a bit.
Information is represented in digital computers in groups of bits. By using
various coding techniques, groups of bits can be made to represent not only
binary numbers but also other discrete symbols, such as decimal digits or
letters of the alphabet. By
2 Mention different types of buses. Give a brief explanation about
each of them.
Answer: The CPU
moves data around the computer on pathways that interconnect it to all the
other components on the motherboard. These pathways are called 'buses'.
The internal bus carries data
within
3 Using block diagram explain Von Neumann architecture.
Answer: The von Neumann
Architecture is based on three key concepts:
1. Data and
instructions are stored in a single read-write memory.
2.
The content of this
4
What is a cache memory and on what principle it is based upon?
Answer: For all instruction cycles, the CPU accesses the
memory at least once to fetch the instruction and sometimes again accesses
memory to fetch the operands. The rate at which the CPU can execute
instructions is limited by the memory cycle time. This limitation is due to the
mismatch between the memory cycle
5 Write short notes on I/O modules.
Answer: It is the entity within a computer that is
responsible for the control of one or more external devices and for the
exchange of data between those devices and main memory and/or CPU. Thus I/O
memory must have
�
Interface to CPU
6 Using a block diagram explain DMA controller.
Answer: DMA has been a built-in feature of PC architecture
since the introduction of the original IBM PC. PC-based DMA was used for floppy
disk I/O in the original PC and for hard disk I/O in later versions. PC-based
DMA technology, along with high-speed bus technology, is
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
Spring 2018] ASSIGNMENT
PROGRAM BSc IT
SEMESTER SECOND
SUBJECT CODE & NAME BT0069, Discrete Mathematics
CREDIT 4 BK ID B0953 MAX.
MARKS 60
Q1. Find the sum of all the
four digit number that can be obtained by using the digits 1, 2, 3, 4 once in
each.
Answer:
There
are 4! or 24 such numbers. So there are 24 digits in each column.
There
are the same number of 1's in each column as there are 2's, 3's and 4's. so there are 24÷4 or 6 of each digit
in each column. So each column sums to
6*1+6*2+6*3+6*4 = 6(1+2+3+4) = 6(10) = 60, so the
2 (i) State the principle
of inclusion and exclusion.
(ii) How many arrangements
of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns
289, 234 or 487? 4+6 10
Answer:
I)
Principle of Inclusion and
Exclusion
For any two
sets P and Q, we have;
i)
|P ﮟ Q| ≤ |P| + |Q| where |P| is the number of
elements in P, and |Q| is the number elements
3 If G is a group, then
i) The identity element of
G is unique.
ii) Every element in G has
unique inverse in G.
iii)
For any a єG, we have (a-1)-1
= a.
|
iv) For all a, b є G, we have (a.b)-1 = b-1.a-1.
Answer:i) Let e, f be two identity
elements in G. Since e is the identity, we have e.f= f.
Since f is the identity, we have e.f = e.
Therefore, e = e.f = f.
Hence the identity element is unique.
ii)Let
4 (i)Define valid argument
(ii) Show that ~(P ^Q)
follows from ~ P ^ ~Q.5+5= 10
Answer: i)
Definition
Any
conclusion, which is arrived at by following the rules is called a valid
conclusion and argument is called a valid argument.
ii)
5
(i)Construct a grammar for the language.
'L⁼{x/ xє{ab} the number of as in x is a
multiple of 3.
|
(ii)Find the highest type
number that can be applied to the following productions:
1. S→A0, A → 1 І 2 І B0,
B → 012.
2. S →ASB І b, A →bA І c ,
3.
S →bS І bc.
Answer: i)
Let T = {a, b} and N = {S, A, B},
S is a
starting symbol.
The
6 (i) Define tree with
example
(ii) Prove that any
connected graph with ‘n’ vertices and n -1 edges is a tree.
Answer:i)
Definition
A
connected graph without circuits is called a tree.
Example
Consider the two trees G1 = (V, E1) and
G2 = (V,
E2) where V = {a, b, c, d, e, f, g, h, i, j}
E1 =
{{a, c
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
DRIVE
SPRING 2018
PROGRAM
B.SC IT
SEMESTER
SECOND
SUBJECT
CODE & NAME BT0070, Operating System
1 What are the different functions of Operating Systems?
Answer: Functions of
Operating System
Operating systems perform the following important functions:
·
Processor management : It
means assigning processor to different tasks which has to be performed by the
computer system.
·
Memory
2 What is a process? Explain different process in Operating
System.
Answer: A program in execution is a process. A
process is executed sequentially, one instruction at a time. A program is a
passive entity. For example, a file on the disk. A process on the other hand is
an active entity. In addition to program code, it includes the values of the
program counter, the contents of the CPU registers, the global variables in the
data section
3 Why are Round-Robin Scheduling algorithm designed for
time-sharing systems? Explain.
Answer: Round-Robin
Scheduling
The round-robin CPU scheduling algorithm is basically a preemptive
scheduling algorithm designed for time-sharing systems. One unit of time is
called a time slice(Quantum). Duration of a time slice may range between 10
msecs and about 100 msecs. The CPU scheduler
4 With the help of a block diagram discuss NOS architecture.
Answer: Network Operating
System (NOS) Architecture
The architecture
of typical NOS is shown below (Figure 9.1). The basic features in any NOS are
explained by tracing the steps involved in a remote read. It is assumed that
shared data resides on the server and
5 Describe computer worms and also mention the methods of
prevention.
Answer: A computer
worm is a full program by itself. It spreads to other computers over a network
and while doing so consumes network resources to a very large extent. It can
potentially bring the entire network
6 Discuss the advantages of Multiprocessors.
Answer: Advantages of Multiprocessors
� Performance and Computing power: Use of multiprocessor systems
speeds up an application. Problems with high inter-processor interaction can be
solved quickly.
� Fault tolerance: The inherent
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
PROGRAM - BSc IT
SEMESTER II
SUBJECT CODE &
NAME
BT0071, TECHNICAL
COMMUNICATION-THEORY
Q1. Write a note on Evolution and
characteristics of Technical Communication. [5+5] = [10]
Ans: Evolution of Technical Communication: Documents in the form of
invoices, receipts and deeds are the earliest samples of technical
communication. The English poet Geoffrey Chaucer wrote some technical
communication about the astrolabe, a navigational
instrument. The Origin of Species, Charles Darwin‟s famous work on evolution, is
another example of technical communication. But
Q2. Briefly explain primary and
secondary audience.
Ans: Primary Audience:
consists of people who have a direct role in responding to your documents. This
includes people who use your information in doing jobs. They might evaluate and
revise your document, or they might act on your
Q3. Explain the following. 4+3+3
= 10
1. Structural Clash
2. What is Information Chunk?
3. How do Chunks work?
Ans: 1. Structural clash: Most
systems have a mix of dependent and non-dependent functions. Where there
are dependencies, a numbered hierarchical structure for the user
information is obvious. Where the functions are non-dependent, a nonlinear or
horizontal structure makes more sense. But on paper, you cannot
effectively represent a non-linear structure. So you must arbitrarily
assign importance to
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
DRIVE
SPRING 2018
PROGRAM
B.SC IT
SEMESTER
SECOND
SUBJECT
CODE & NAME BT0072, Computer Networks
1 Explain the architecture of OSI model with the help of a block
diagram showing different layers of OSI model.
Answer: The layered model that dominated data
communications and networking literature before 1990 was the Open Systems
Interconnection (OSI) model. Everyone believed that the OSI model would
become the ultimate standard for data communications, but this did
2 Differentiate between analog and digital signal.
Answer: Analog and Digital Signals
One of the major functions of the physical
layer is to move data in the form of electromagnetic signals across a
transmission medium. The data usable to a person or application is not in a
3 Briefly explain Stop-and-Wait Automatic Repeat Request?
Answer: Stop-and-Wait Automatic Repeat Request
This protocol adds a simple error
control mechanism to the stop-and-wait protocol. To detect and correct
corrupted frames, we need to add redundancy bits to our data frame. When the
frame arrives at the receiver site, it is checked and if it is corrupted, it is
silently discarded. The detection of
4 Mention and explain the model on which most mailing systems are
built.
Answer: SMTP is
based on end-to-end delivery: An SMTP client contacts the destination
host's SMTP server directly, on well-known port 25, to deliver the mail. It
keeps the mail item being
5 Mention the different DNS components and explain them.
Answer: DNS components
1. The domain namespace and resource records
DNS defines a specification for a structured
namespace as an inverted tree in which each node and leaf of the tree names a
set of information. Resource records are records in the DNS database that can
be used to configure the DNS database server (such as the Start of Authority
[SOA] record) or to contain information of different types to process client
queries (such as Address [A] records or Mail Exchanger [MX] records). Typical
resource records contain
6 Mention different ways of using Authentication Header and
explain them.
Answer: Ways
of using AH
AH can be used in two ways: transport mode and tunnel mode.
AH in transport mode
In this mode,
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
No comments:
Post a Comment