Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
Spring 2018
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0086, Mobile Computing
|
CREDIT
|
4
|
BK ID
|
B2067
|
MAX. MARKS
|
60
|
Q.1. Explain simple
reference model. 5+5
Answer:-
Simple reference
model:-
The basic reference model used to structure communication
Systems. Mobile communication is influenced by layered reference
Q.2. Write short
notes on Signals. 10
Answer:-
Signals:-
Signals are the physical representation of data. Signals are
functions of time and location. Signal parameters represent the data values.
The most interesting
Q.3. What do you
understand by Analog Modulation? 10
Answer:-
Analog modulation:-
In Analog modulation, the information carrying base band
signal typically called the message or information signal m(t) varies either
the amplitude or the angle of the
carrier signal (or radio carrier). The carrier signal has a higher frequency
which shifts the center frequency of the baseband signal up to the radio
carrier. It is
Q.4. What is
Universal Mobile Telecommunication System (UMTS)?
10
Answer:-
Universal Mobile
Telecommunication System (UMTS):-
The development community of the wireless and mobile
communication wanted the cellular system which would provide more functionality
and greater levels of efficiency than the GSM system. So the International
Telecommunication Union (ITU) made a request to propose a Radio Transmission
Technologies (RTT) for the International Mobile Telecommunications (IMT) 2000
program in 2002. The
Q.5. Write short
notes on Space Division Multiple Access (SDMA).
10
Answer:-
Space Division
Multiple Access (SDMA):-
Space Division Multiple Access (SDMA) is a medium accessing
scheme wherein the spaces are divided and separate spaces are allocated for
users in wireless networks. This scheme is applied when a typical application
requires an optimal base station for a mobile phone user. When the spaces are
Q.6. What are the
Properties of a MANET?
10
Answer:-
Properties of a
MANET:-
i. Mobile ad hoc networks are based on wireless radio links.
ii. MANET is able to provide seamless interaction and ubiquitous mobile
computing environment.
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
Spring 2018
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0087 ,WML and WAP Programming-Theory
|
CREDIT
|
2
|
BK ID
|
B1182
|
MAX.: MARKS
|
30
|
Q.1. What is wireless
markup language? 10
Answer:-
WML (Wireless
Markup Language):-
WML is a mark-up language inherited from HTML, but is based
on XML (eXtensible Markup Language).so it
Q.2. Explain WAP
architecture with diagram.
5+5
Answer:-
WAP architecture:-
The WAP architecture provides a scalable and extensible
environment for application development of mobile communication devices. The
goals of the WAP architecture are as follows.
i. Provide a web-
Q.3. Mention the different format
attributes. 10
Answer:-
Format Attribute:-
The format attribute of the <input> element is used to
control the type and number of characters that can be entered in an input
field. The format attribute takes a number of format characters as its value.
Each format character has
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
Spring 2018
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0088, Cryptography and Network
Security
|
BK ID
|
B2069
|
CREDITS
|
4
|
MARKS
|
60
|
Q.1. What is the need
for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime.
When you refer to a computing system, it means a collection of hardware,
software, storage media, data, and people that an organization uses to perform
computing tasks. Sometimes, you can see that parts of a computing system are
not valuable to an outsider, but often it
Q.2.What do you
understand by cryptography? 10
Answer:-
The
word cryptography comes from the Greek words kryptos meaning hidden and
graphein meaning writing. So cryptography is the study of hidden writing, or is
the science of encrypting and decrypting text. A fundamental rule in
cryptography is that one must assume that the cryptanalyst knows the methods
used for
Q.3.What are
intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from
virus and hacking of information from your computer while you are online. For
effective computer security, one should take care of physical security measures
to ensure that hardware and media are not stolen or damaged, to minimise the
risk and
Q.4. Write short note
on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same
effect as a real signature: It is a mark that only the sender can make, but
other people can easily recognize as belonging to the sender. Just like a real
Q.5. Write short
notes on DES. 10
Answer:-
Data Encryption
Standard (DES):-
The most widely used encryption scheme is based on Data
Encryption standard. Data Encryption Standard (DES), a system developed for the
U.S. government, was intended for use by the general public. It has been
Q.6. Give an overview
of IP security. 10
Answer:-
Overview of IP security:-
IPSec provides connectionless, best-effort delivery of
datagrams through a network by protecting it from snooping or modification.
IPSec protects IP datagrams by defining a method of specifying the traffic to
protect, how that
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
DRIVE
WINTER
2017
PROGRAM
BSc
IT
SEMESTER
FIFTH
SUBJECT
CODE & NAME
BT8901,
Object Oriented Systems
Q.1 What is the
need for Object Orientation?
10
Answer-
Need
for Object Orientation
Object-oriented
analysis (or OOA, as it is sometimes called) emphasizes the building of
real-world models, using an object-oriented view of the world. Object-oriented
analysis is a method of analysis that examines requirements from the
perspective of the classes and objects found in the vocabulary of the problem
domain. Now let‟s see how all the three OOA, OOD, and
Q.2 What is
Unified Approach technique for software development? 10
Answer-
The
Unified Approach-
The
Unified Approach (UA) combines the best practices, processes,
methodologies, and guidelines along with UML notations and diagrams for the
better understanding of object-oriented concepts and system development. The
unified approach to software development revolves around the
Q.3 Explain the
Rumbaugh et. al.’s Object Modeling Technique. 10
Answer-
Rumbaugh
et. al.’s Object Modeling Technique-
The
Object Modeling Technique (OMT) presented by Jim Rumbaugh and his co-workers
describes a method for the analysis, design, and implementation of a system
using an object-oriented technique. OMT is a fast, intuitive approach for
identifying and modeling all the objects making up a system. Details such as
class attributes, method, inheritance, and association also can be
Q.4 Support the
statement “The UML is a Language for Modeling”. 10
Answer-
The UML is a Language for Modeling-
The Unified Modeling
Language (UML) was created to forge a common, semantically and syntactically
rich visual modeling language for the architecture, design, and implementation
of complex software systems both structurally and behaviorally. UML has applications
beyond software development, such as process flow in manufacturing. It is
analogous to the blueprints used in other fields, and consists of different
types of diagrams. In the aggregate, UML diagrams describe the
Q.5 Mention how
can you say that “The UML is a Language for Constructing”. 10
Answer-
The UML is a Language for Constructing-
The
UML is not a visual programming language, but its models can be directly
connected to a variety of programming languages. This means that it is possible
to map from a model in the UML to a programming language such as Java, C++, or
Visual Basic, or even to tables in a relational database or the persistent
store of an object oriented database. Things that are best expressed
graphically are
Q.6 Write a short note on Risk
Analysis. 10
Answer-
Risk
Analysis-
A
risk is an event or condition that can cause the delivery of an information
system to be canceled, delayed, or over budget or not to meet its requirements.
We have encountered a number of examples of risks earlier in \
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
DRIVE Spring 2018
PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT
CODE & NAME BT9003, Data Storage management
1
What are the roles of different storage device? 10 10
Answer:
Storage
Devices
Storage devices are used to store data and instructions permanently. Storage devices are also called secondary storage devices / backing storage devices / external storage devices or auxiliary storage devices. Examples of
Storage devices are used to store data and instructions permanently. Storage devices are also called secondary storage devices / backing storage devices / external storage devices or auxiliary storage devices. Examples of
2
How Data is accessed and Stored on Media? 10 10
Answer:
Data storage devices
can be divided into 2 main categories:
Backing storage is used to store programs and data when
they are not being used or when a computer is switched off. When programs and
data are needed they are copied into main memory but also still remain on
backing storage. Magnetic tape drives, floppy disk drives and hard disk drives
are all examples of
3
What is the significance of Data Protection? 10 10
Answer:
During the second half of the 20th
century, businesses, organisations and the government began using computers to
store information about their customers, clients and staff in databases. For
4
Why Perimeter Defense is designed and what are the types of it? 5+5 10
Answer:
As the first layer of
defense in your network, it is important to take a step back and review the
design of your perimeter security. To ensure a sound architecture, you want to
start with what ultimately must be protected and then design your perimeter
security so it can scale as your needs grow/change.
5
What is the meaning of Information Lifecycle Management (ILM)? 10 10
Answer:
Information
Life Cycle Management (ILM) is a complex Data Life Management Cycle (DLM)
subset and Records and Information Management (RIM) practice used for data
storage, system administration and management. The strategic ILM approach is
used to determine how data is moved, deleted, destroyed or
6
What are the requirements for Network Storage?
Answer:
IBM
Spectrum Control supports the monitoring of the NetApp Data ONTAP, as well
as other network-attached storage (NAS) devices.
A NetApp
device can be added to IBM Spectrum Control as a block
storage device, a file storage device,
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
No comments:
Post a Comment