Sunday 13 May 2018

smu bsc it 2nd sem assignment spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301



DRIVE SPRING 2018
PROGRAM B.SC IT
SEMESTER SECOND
SUBJECT CODE & NAME BT0068, Computer Organization and Architecture


1. What is a digital computer? Explain using a diagram.

Answer: Digital computers use the binary number system, which has two digits: 0 and 1. A binary digit is called a bit. Information is represented in digital computers in groups of bits. By using various coding techniques, groups of bits can be made to represent not only binary numbers but also other discrete symbols, such as decimal digits or letters of the alphabet. By


2 Mention different types of buses. Give a brief explanation about each of them.

Answer: The CPU moves data around the computer on pathways that interconnect it to all the other components on the motherboard. These pathways are called 'buses'.

The internal bus carries data within


3 Using block diagram explain Von Neumann architecture.

Answer: The von Neumann Architecture is based on three key concepts:
1.      Data and instructions are stored in a single read-write memory.
2.      The content of this


4 What is a cache memory and on what principle it is based upon?

Answer: For all instruction cycles, the CPU accesses the memory at least once to fetch the instruction and sometimes again accesses memory to fetch the operands. The rate at which the CPU can execute instructions is limited by the memory cycle time. This limitation is due to the mismatch between the memory cycle


5 Write short notes on I/O modules.

Answer: It is the entity within a computer that is responsible for the control of one or more external devices and for the exchange of data between those devices and main memory and/or CPU. Thus I/O memory must have
Interface to CPU




6 Using a block diagram explain DMA controller.

Answer: DMA has been a built-in feature of PC architecture since the introduction of the original IBM PC. PC-based DMA was used for floppy disk I/O in the original PC and for hard disk I/O in later versions. PC-based DMA technology, along with high-speed bus technology, is


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301
 Spring 2018] ASSIGNMENT
PROGRAM BSc IT
SEMESTER SECOND
SUBJECT CODE & NAME BT0069, Discrete Mathematics
CREDIT 4 BK ID B0953 MAX. MARKS 60

Q1. Find the sum of all the four digit number that can be obtained by using the digits 1, 2, 3, 4 once in each.
Answer:
There are 4! or 24 such numbers. So there are 24 digits in each column.
There are the same number of 1's in each column as there are 2's, 3's  and 4's. so there are 24÷4 or 6 of each digit in each column.  So each column sums to 6*1+6*2+6*3+6*4 = 6(1+2+3+4) = 6(10) = 60, so the

2 (i) State the principle of inclusion and exclusion.
(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487? 4+6 10
Answer:
I)                 Principle of Inclusion and Exclusion
For any two sets P and Q, we have;
i)                   |P Q| ≤ |P| + |Q| where |P| is the number of elements in P, and |Q| is the number elements


3 If G is a group, then
i) The identity element of G is unique.
ii) Every element in G has unique inverse in G.
iii)
For any a єG, we have (a-1)-1 = a.

iv) For all a, b є G, we have (a.b)-1 = b-1.a-1.
Answer:i) Let ebe two identity elements in G. Since is the identity, we have e.ff. Since is the identity, we have e.e. Therefore, e.f. Hence the identity element is unique.
ii)Let 

4 (i)Define valid argument
(ii) Show that ~(P  ^Q) follows from ~ P ^ ~Q.5+5= 10
Answer: i)
Definition
Any conclusion, which is arrived at by following the rules is called a valid conclusion and argument is called a valid argument.
ii)

5 (i)Construct a grammar for the language.

 'L{x/ xє{ab} the number of as in x is a multiple of 3.

(ii)Find the highest type number that can be applied to the following productions:
1. SA0, A 1 І 2 І B0, B 012.
2. S ASB І b, A bA І c ,
3. S bS  І bc.

 Answer: i)
Let T = {a, b} and N = {S, A, B},
is a starting symbol.
The


6 (i) Define tree with example
(ii) Prove that any connected graph with ‘n’ vertices and n -1 edges is a tree.
Answer:i)
Definition
A connected graph without circuits is called a tree.
Example
Consider the two trees G1 = (V, E1) and G2 = (V, E2) where V = {a, b, c, d, e, f, g, h, i, j}
E1 = {{a, c


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301


DRIVE SPRING 2018
PROGRAM B.SC IT
SEMESTER SECOND
SUBJECT CODE & NAME BT0070, Operating System


1 What are the different functions of Operating Systems?

Answer: Functions of Operating System
Operating systems perform the following important functions:
·         Processor management : It means assigning processor to different tasks which has to be performed by the computer system.
·         Memory



2 What is a process? Explain different process in Operating System.

Answer: A program in execution is a process. A process is executed sequentially, one instruction at a time. A program is a passive entity. For example, a file on the disk. A process on the other hand is an active entity. In addition to program code, it includes the values of the program counter, the contents of the CPU registers, the global variables in the data section



3 Why are Round-Robin Scheduling algorithm designed for time-sharing systems? Explain.

Answer: Round-Robin Scheduling
The round-robin CPU scheduling algorithm is basically a preemptive scheduling algorithm designed for time-sharing systems. One unit of time is called a time slice(Quantum). Duration of a time slice may range between 10 msecs and about 100 msecs. The CPU scheduler



4 With the help of a block diagram discuss NOS architecture.

Answer: Network Operating System (NOS) Architecture
The architecture of typical NOS is shown below (Figure 9.1). The basic features in any NOS are explained by tracing the steps involved in a remote read. It is assumed that shared data resides on the server and


5 Describe computer worms and also mention the methods of prevention.

Answer: A computer worm is a full program by itself. It spreads to other computers over a network and while doing so consumes network resources to a very large extent. It can potentially bring the entire network

6 Discuss the advantages of Multiprocessors.

Answer: Advantages of Multiprocessors
Performance and Computing power: Use of multiprocessor systems speeds up an application. Problems with high inter-processor interaction can be solved quickly.
Fault tolerance: The inherent


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301


PROGRAM -  BSc IT
SEMESTER II
SUBJECT CODE & NAME
BT0071, TECHNICAL COMMUNICATION-THEORY
Q1. Write a note on Evolution and characteristics of Technical Communication. [5+5] = [10]
Ans: Evolution of Technical Communication: Documents in the form of invoices, receipts and deeds are the earliest samples of technical communication. The English poet Geoffrey Chaucer wrote some technical communication about the astrolabe, a navigational
instrument. The Origin of Species, Charles Darwins famous work on evolution, is another example of technical communication. But

Q2. Briefly explain primary and secondary audience.
Ans: Primary Audience: consists of people who have a direct role in responding to your documents. This includes people who use your information in doing jobs. They might evaluate and revise your document, or they might act on your

Q3. Explain the following. 4+3+3 =  10
1. Structural Clash
2. What is Information Chunk?
3. How do Chunks work?
Ans: 1. Structural clash: Most systems have a mix of dependent and non-dependent functions. Where there are dependencies, a numbered hierarchical structure for the user information is obvious. Where the functions are non-dependent, a nonlinear or horizontal structure makes more sense. But on paper, you cannot effectively represent a non-linear structure. So you must arbitrarily assign importance to

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301

DRIVE SPRING 2018
PROGRAM B.SC IT
SEMESTER SECOND
SUBJECT CODE & NAME BT0072, Computer Networks


1 Explain the architecture of OSI model with the help of a block diagram showing different layers of OSI model.

Answer: The layered model that dominated data communications and networking literature before 1990 was the Open Systems Interconnection (OSI) model. Everyone believed that the OSI model would become the ultimate standard for data communications, but this did


2 Differentiate between analog and digital signal.

Answer: Analog and Digital Signals
One of the major functions of the physical layer is to move data in the form of electromagnetic signals across a transmission medium. The data usable to a person or application is not in a


3 Briefly explain Stop-and-Wait Automatic Repeat Request?

Answer: Stop-and-Wait Automatic Repeat Request
This protocol adds a simple error control mechanism to the stop-and-wait protocol. To detect and correct corrupted frames, we need to add redundancy bits to our data frame. When the frame arrives at the receiver site, it is checked and if it is corrupted, it is silently discarded. The detection of


4 Mention and explain the model on which most mailing systems are built.

Answer: SMTP is based on end-to-end delivery: An SMTP client contacts the destination host's SMTP server directly, on well-known port 25, to deliver the mail. It keeps the mail item being


5 Mention the different DNS components and explain them.

Answer: DNS components
1. The domain namespace and resource records
DNS defines a specification for a structured namespace as an inverted tree in which each node and leaf of the tree names a set of information. Resource records are records in the DNS database that can be used to configure the DNS database server (such as the Start of Authority [SOA] record) or to contain information of different types to process client queries (such as Address [A] records or Mail Exchanger [MX] records). Typical resource records contain

6 Mention different ways of using Authentication Header and explain them.

Answer: Ways of using AH
AH can be used in two ways: transport mode and tunnel mode.
AH in transport mode
In this mode,


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301




No comments:

Post a Comment