Sunday, 13 May 2018

smu bsc it 5th sem assignment spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
Spring 2018
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0086, Mobile Computing
CREDIT
4
BK ID
B2067
MAX. MARKS
60

Q.1. Explain simple reference model. 5+5
Answer:-
Simple reference model:-
The basic reference model used to structure communication Systems. Mobile communication is influenced by layered reference

Q.2. Write short notes on Signals.                                                                                                       10
Answer:-
Signals:-
Signals are the physical representation of data. Signals are functions of time and location. Signal parameters represent the data values.
The most interesting

Q.3. What do you understand by Analog Modulation?                                                                       10
Answer:-
Analog modulation:-
In Analog modulation, the information carrying base band signal typically called the message or information signal m(t) varies either the amplitude or the angle  of the carrier signal (or radio carrier). The carrier signal has a higher frequency which shifts the center frequency of the baseband signal up to the radio carrier. It is

Q.4. What is Universal Mobile Telecommunication System (UMTS)?                                                 10
Answer:-
Universal Mobile Telecommunication System (UMTS):-
The development community of the wireless and mobile communication wanted the cellular system which would provide more functionality and greater levels of efficiency than the GSM system. So the International Telecommunication Union (ITU) made a request to propose a Radio Transmission Technologies (RTT) for the International Mobile Telecommunications (IMT) 2000 program in 2002. The

Q.5. Write short notes on Space Division Multiple Access (SDMA).                                                    10
Answer:-
Space Division Multiple Access (SDMA):-
Space Division Multiple Access (SDMA) is a medium accessing scheme wherein the spaces are divided and separate spaces are allocated for users in wireless networks. This scheme is applied when a typical application requires an optimal base station for a mobile phone user. When the spaces are

Q.6. What are the Properties of a MANET?                                                                                            10
Answer:-
Properties of a MANET:-
 i.    Mobile ad hoc networks are based on wireless radio links.

ii.    MANET is able to provide seamless interaction and ubiquitous mobile computing environment.

iii.    MANET nodes are


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
Spring 2018
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0087 ,WML and WAP Programming-Theory
CREDIT
2
BK ID
B1182
MAX.: MARKS
30

Q.1. What is wireless markup language? 10
Answer:-
WML (Wireless Markup Language):-
WML is a mark-up language inherited from HTML, but is based on XML (eXtensible Markup Language).so it

Q.2. Explain WAP architecture with diagram.                                                                                      5+5
Answer:-
WAP architecture:-
The WAP architecture provides a scalable and extensible environment for application development of mobile communication devices. The goals of the WAP architecture are as follows.
      i.   Provide a web-


 Q.3. Mention the different format attributes.                                                                                10
Answer:-
Format Attribute:-
The format attribute of the <input> element is used to control the type and number of characters that can be entered in an input field. The format attribute takes a number of format characters as its value. Each format character has

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
Spring 2018
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0088, Cryptography and Network Security
BK ID
B2069
CREDITS
4
MARKS
60

Q.1. What is the need for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime. When you refer to a computing system, it means a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks. Sometimes, you can see that parts of a computing system are not valuable to an outsider, but often it


Q.2.What do you understand by cryptography?                                                                               10
Answer:-
The word cryptography comes from the Greek words kryptos meaning hidden and graphein meaning writing. So cryptography is the study of hidden writing, or is the science of encrypting and decrypting text. A fundamental rule in cryptography is that one must assume that the cryptanalyst knows the methods used for


Q.3.What are intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from virus and hacking of information from your computer while you are online. For effective computer security, one should take care of physical security measures to ensure that hardware and media are not stolen or damaged, to minimise the risk and





Q.4. Write short note on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make, but other people can easily recognize as belonging to the sender. Just like a real

Q.5. Write short notes on DES. 10
Answer:-
Data Encryption Standard (DES):-
The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has been

Q.6. Give an overview of IP security. 10
Answer:-
Overview of IP security:-
IPSec provides connectionless, best-effort delivery of datagrams through a network by protecting it from snooping or modification. IPSec protects IP datagrams by defining a method of specifying the traffic to protect, how that

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
WINTER 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT8901, Object Oriented Systems

Q.1 What is the need for Object Orientation?            10

Answer-

Need for Object Orientation
Object-oriented analysis (or OOA, as it is sometimes called) emphasizes the building of real-world models, using an object-oriented view of the world. Object-oriented analysis is a method of analysis that examines requirements from the perspective of the classes and objects found in the vocabulary of the problem domain. Now let‟s see how all the three OOA, OOD, and


Q.2 What is Unified Approach technique for software development?         10

Answer-
The Unified Approach-
The Unified Approach (UA) combines the best practices, processes, methodologies, and guidelines along with UML notations and diagrams for the better understanding of object-oriented concepts and system development. The unified approach to software development revolves around the


Q.3 Explain the Rumbaugh et. al.’s Object Modeling Technique.             10

Answer-

Rumbaugh et. al.’s Object Modeling Technique-
The Object Modeling Technique (OMT) presented by Jim Rumbaugh and his co-workers describes a method for the analysis, design, and implementation of a system using an object-oriented technique. OMT is a fast, intuitive approach for identifying and modeling all the objects making up a system. Details such as class attributes, method, inheritance, and association also can be



Q.4 Support the statement “The UML is a Language for Modeling”.          10

Answer-

The UML is a Language for Modeling-
The Unified Modeling Language (UML) was created to forge a common, semantically and syntactically rich visual modeling language for the architecture, design, and implementation of complex software systems both structurally and behaviorally. UML has applications beyond software development, such as process flow in manufacturing. It is analogous to the blueprints used in other fields, and consists of different types of diagrams. In the aggregate, UML diagrams describe the


Q.5 Mention how can you say that “The UML is a Language for Constructing”.       10

Answer-
The UML is a Language for Constructing-
The UML is not a visual programming language, but its models can be directly connected to a variety of programming languages. This means that it is possible to map from a model in the UML to a programming language such as Java, C++, or Visual Basic, or even to tables in a relational database or the persistent store of an object oriented database. Things that are best expressed graphically are

Q.6 Write a short note on Risk Analysis.                 10
Answer-
Risk Analysis-
A risk is an event or condition that can cause the delivery of an information system to be canceled, delayed, or over budget or not to meet its requirements. We have encountered a number of examples of risks earlier in \


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE Spring 2018
PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT9003, Data Storage management


1 What are the roles of different storage device? 10 10
Answer:
Storage Devices

Storage devices are used to store data and instructions permanently. Storage devices are also called secondary storage devices / backing storage devices / external storage devices or auxiliary storage devices. Examples of


2 How Data is accessed and Stored on Media? 10 10
Answer:
Data storage devices can be divided into 2 main categories:
Backing storage is used to store programs and data when they are not being used or when a computer is switched off. When programs and data are needed they are copied into main memory but also still remain on backing storage. Magnetic tape drives, floppy disk drives and hard disk drives are all examples of


3 What is the significance of Data Protection? 10 10
Answer:
During the second half of the 20th century, businesses, organisations and the government began using computers to store information about their customers, clients and staff in databases. For


4 Why Perimeter Defense is designed and what are the types of it? 5+5 10
Answer:
As the first layer of defense in your network, it is important to take a step back and review the design of your perimeter security. To ensure a sound architecture, you want to start with what ultimately must be protected and then design your perimeter security so it can scale as your needs grow/change.

5 What is the meaning of Information Lifecycle Management (ILM)? 10 10
Answer:
Information Life Cycle Management (ILM) is a complex Data Life Management Cycle (DLM) subset and Records and Information Management (RIM) practice used for data storage, system administration and management. The strategic ILM approach is used to determine how data is moved, deleted, destroyed or

6 What are the requirements for Network Storage?
Answer:
IBM Spectrum Control supports the monitoring of the NetApp Data ONTAP, as well as other network-attached storage (NAS) devices.
NetApp device can be added to IBM Spectrum Control as a block storage device, a file storage device,

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment