Friday, 21 December 2018

smu M.Sc IT 4 sem fall 2018 solved assignment jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT405– Data Warehousing and Data Mining

Assignment Set - 1
Q.1 List the popular tools for Data Warehouse development. Explain data warehouse types.  2.5+7.5
Answer-
Tools for Data Warehouse Development
To maintain a leading edge in this highly competitive business world, the managers of every organization, big or small, strive to get the right information at the right time. As a result, every organization is now developing and deploying Data Marts (Data Mart is small Data Warehouse which is

Q.2 Describe metadata classification. Show the relationship between metadata classifications with suitable diagram.  7+3
Answer-
Metadata classification-

In order to have more clarity in Metadata requirements, it is often advisable to have a metadata classification strategy and share it with all the stakeholders.

metadata classifications

Q.3 Compare E-R modeling and Dimensional Modeling.     10
Answer-
E - R Modeling-

Entity - Relationship modelling is a very popular method for designing databases. E-R modelling, as it is often called, may be described as a top down approach, in that it encourages looking at the “big picture" first. We begin by describing the world in terms of entity types that are related to one another in various ways. We may then refine that picture to show the attributes of each entity type. Thus we start by looking for the major kinds of things that populate the

Assignment Set - 2
Q.1 Discuss the relation between data warehouse and data mining.    10
Answer-
Relation between Data Warehousing and Data Mining-

The connection between data warehouse and data mining is indisputable. Popular business organizations use these technologies together. The current section describes the relation between data warehouse and data mining. Data mining is concerned with finding hidden relationships present in business data to allow businesses to make predictions for future use. It is the process of data-

Q.2 Describe the following:
(a) Database Management Systems (DBMS) vs. Data Mining.      5
(b) Data mining techniques.                                                             5
Answer-
Database Management Systems (DBMS) vs. Data Mining-
Area
DBMS
DATA MINING
Task
Extraction of detailed
and summary data
Knowledge discovery of
hidden patterns and
insights

Q.3 Explain the concepts of data transformation.     10
Answer-
Data Transformation -

Data transformations are often the most complex and, in terms of processing time, the most costly part of the ETL process. They can range from simple data conversions to extremely complex data scrubbing techniques. Before moving the extracted data from the source systems into the Data Warehouse, you inevitably have to perform various kinds of data transformations. You

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT4062- Cryptography and Network Security

Assignment Set - 1
Q.1 Explain the three categories of evaluation criteria for Advanced Encryption Standard (AES).   10
Answer-
Three categories of evaluation criteria for Advanced Encryption Standard (AES) :
The three categories of criteria were:

Security: Security which was the most important category and the most difficult to assess refers to the effort required to cryptanalyze an algorithm. The emphasis in the evaluation is on the

Q.2 Write a short note on the following :
a) Asymmetric Keys                                              2.5
b) Public Key Certificate                                      2.5
c) Public Key (Asymmetric) Cryptographic Algorithm     2.5
d) Public Key Infrastructure      2.5
Answer-
Asymmetric Keys  :                                           
Asymmetric keys, also known as public/private key pairs, are used for asymmetric encryption. Asymmetric encryption is used mainly to encrypt and decrypt session keys and digital signatures. Asymmetric

Q.3 Explain how Hash functions is useful in following applications:
a) Message authentication    5
b) Digital signature               5
Answer-
Message authentication :
Message authentication is a mechanism or service used to verify the integrity of a message. It assures that data received are exactly as sent (i.e., contain no modification, insertion, deletion, or replay). When a hash function provides message authentication, the hash function value is called as a message digest. We can achieve message authentication using a message authentication code (MAC), also known as a keyed hash function. A MAC function takes as input a secret key and a data block and


Assignment Set - 2

Q.1 Describe the four types of protocol of SSL    (4x2.5)   10
Answer-
Protocol
The SSL defines four protocols in two layers. They are:
·         Change CipherSpec protocol
·         Handshake protocol


Q.2 Describe the distribution of public keys using following methods:  10
a) Public announcement   5
b) Public-key authority     5
Answer-
Public Announcement of Public Keys -

The very important point of public-key encryption is that the public key is public. In public-key algorithm, such as RSA, any participant can send his or her public key to any other participant or broadcast the

Q.3Describe security association in IP security policy. List and describe the three parameters used to identify security association.   (4+6)   10
Answer-
IP Security Policy :

A security policy is a rule that is programmed into the IPSec implementation that tells it how to process different datagram's received by the device. A security policy is applied to each IP packet that transits from

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT4064– Customer Relationship Management

Assignment Set - 1

Q.1 Describe five benefits of Computer Telephony Integration.    5 x 2
Answer-
Companies in varied sectors have recognized the above fact and have realized that their success depends on how much of the unique needs and expectations of their customers they are able to satisfy. As CTI is the primary interface between the company and its customers, it is necessary to make it a

Q.2 Reason out why marketing should lead the integration with operation process for better results in a company.     10
Answer-
Integrating marketing and operational choices helps an organization to grow more profitably. It helps a company to maximize cost effectiveness by creating a robust and healthy relationship between its


Q.3 List and explain the important elements for a successful CIC.     5 x 2
Answer-
Planning a Successful CIC
A successful CIC is accomplished only if the following conditions are sustained:

·         Maintain customer loyalty – Gradually, companies realized that the best way to retain customers is through positive relationship management and outstanding customer

Assignment Set – 2

Q.1 Describe the advantages and disadvantages of Application Service Provider under the business head.      5+5
Answer-
Advantages and disadvantages of Application Service Provider under the business head-
Though going in for an ASP solution might seem attractive to a company, the company needs to do a lot of thinking before taking this step. The company needs to identify its core business strengths

Q.2 List and describe the three sub processes of CRM.      1+9
Answer-
CRM Macro Business Processes-
CRM is considered as a strategic process-oriented, cross-functional, value creating
 ystem for companies and their customers. Hence, a more holistic view of cross functions needs to be present. This macro level crossfunctional view of CRM provides a structure for Business to Business (B2B) relationships. CRM process involves the activities and strategies that companies use


Q.3 What is social relationship management? Explain Kano’s model with respect to quality assessment of a web site.       2+8
Answer-
Social Relationship Management (SRM)-
SRM is the most modern form of social networking. The strong presence of the social era has enabled consumers to turn to social media for answers, recommendations and opinions. Forrester


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions




smu M.Sc IT 3 sem fall 2018 solved assignment jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT306– Object Oriented Analysis and Design(OOAD)
SET 1

Qus:1 Explain the tasks involve in different phases of the object oriented systems development life cycle.
Answer:
These stages can be characterized and divided up in different ways, including the following:

  • Preliminary analysis: Begin with a preliminary analysis, propose alternative solutions, describe costs and benefits, and submit a preliminary plan with


Qus:2 Define unified approach. Explain the steps, methods and tools of unified approach.
Answer:   Unified approach is a better way for understanding concepts of objects oriented system development. Unified approach is a methodology for software development. The unified approach, based on methodologies given by Booch, Rum Baugh and Jacobson tries to combine the methods

Qus:3 Describe the various states of activity diagram.
Answer: Activity diagrams are special cases of state chart diagrams. An activity diagram has actions as states. It can be considered as

SET 2
Qus:1 List the rules of constructing an object oriented system.
Answer:
An object-oriented database management system or OODBMS is a database management system that supports modeling and creation of data as objects. OODBMS is a new and

Qus:2 Mention and explain the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which cause unexpected results and eliminating them. The process of testing and identifying bugs is a balance of science, art and luck.
There are three


Qus:3 Explain the following:
(a) Black box testing
(b) White box testing
Answer: (a) Black box testing
This treats the system as one that cannot be seen in detail. The structure of the program is not taken into account. The tests are performed based on what the program does. This is sometimes called

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT) Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT307-WEB TECHNOLOGIES
SET 1
Qus:1 List the three types of patterns in event-driven programming. Write the benefits of event driven programming.
Answer:
In computer programming, event-driven programming is a programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses), sensor outputs, or messages from other programs/threads. Event-driven

Qus:2 Explain the advantages of DHTML.
Answer:
Advantages of DHTML
1. Supported by all browsers: DHTML is supported in every major browser, including Opera, Safari, Internet Explorer, and Firefox.

2. Open standards: You can create your pages according to the standardized technologies of DHTML and you can


Qus:3 Write any four importance of XML Schema. Discuss the steps to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a document, they can:
 XML schema uses XML


SET 2

Qus:1 What is meant by AJAX? Describe AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX is not a new programming language, but a new way to use existing standards.
It is a technique, rather than a framework. it allows web pages to behave less like flat documents and

Qus:2 Explain the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated

Qus3. What is meant by debugging? Explain fatal and non-fatal bugs in ASP.
Answer:
Debugging our ASP script
After working with common ASP components, we will be well versed with the ADRotator component. After completing the development of the banner rotation system, we are now ready to present it. However, any change in the name of our ADrotator file is being found. When we

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3081– High Speed Networks
Set 1
Qus1.What is control signaling in ATM? Explain four methods to establish/release connection.
Answer:
ATM Protocol Architecture
ATM is a technology that has the potential of revolutionizing data communications and telecommunications. Based on the emerging standards for Broadband Integrated Services Digital Networks (B-ISDN), ATM offers the economically sound "bandwidth on demand" features of packet-switching technology at the high speeds required for today's LAN and

Qus:2 Describe Multi-server queue using suitable diagrams and equations.
Answer: The aim of the queuing analysis is to make use of analytic models to yield the desired parameters to determine the buffer size. The following two queuing models can be used as analytic models:


Qus:3 Define congestion. List and explain different types of congestion.
Answer: The situation wherein network resources are constantly overloaded or the overall demand of a resource exceeds its capacity is termed as congestion. Congestion in a network occurs when the load on the network or the

Set 2

Qus:1 In TCP what is meant by timer? Mention the timers that TCP maintains for every connection and describe any three.
Answer: In TCP protocol, timers are applied in various positions and these timers restrain retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all timers. Function pointers in a timer structure take a behavior function when initialized. Once the

Qus:2 Define Resource Reservation Protocol (RSVP). Write any three salient characteristics of it. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup and control. It enables Integrated Services (IntServ) which is designed to emulate circuits on the Internet. This is the most complex QoS technology for elements of a network (routers, switches) and applications (hosts). But, it

Q3. Explain Subnet Bandwidth Management protocol operations.
Answer:
Subnet Bandwidth Management (SBM)
SBM is a signaling protocol that offers a method to map an Internet-level setup protocol like Resource Reservation Protocol (RSVP) onto IEEE 802- based networks. It specifies the operation of RSVP-

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3091– Open Source System
Set 1
Qus:1 Describe types of Creative Common License.
Answer: It is very important to know that the licensable properties come from an array of sources. The definitions of various proprietary types are not always apparent. Although every licensing program is exclusive, diverse areas of the licensing business have specific prototypes in terms of

Qus 2. Mention the types of licensing and briefly explain any two.
Answer:
Types of licensing
It is very important to know that the licensable properties come from an array of sources. The definitions of various proprietary types are not always apparent. Although every licensing program is

Qus:3 (a)Write five features of Mozilla Public License.
(b)Differentiate among GPL, LGPL, and MPL.
Answer: (a)
 five features of Mozilla Public License.
You can say that the MPL differs from the GPL in the way it regulates the distribution and licensing of works containing the MPL-licensed code. The new component built using the MPL-Licensed code can

SET 2
Q1. Open-source is a good choice for companies. Justify this statement.
Answer: As we have understood how we could join an existing open source project and also end an open source project, let us now learn how we can inculcate an open source culture in a company.
Running an open source
Qus:2 EDescribe the negative effects of open source and free software licensing.
Answer: As we are aware of the global scenario of open source and free software licenses, let us now understand the issues related to them.
You can observe that the advantages of open source licensing sometime in some situations act as disadvantages. Some


Qus:3 Explain the cathedral model of open source software development.
Answer:
Models of Open Source and Free Software Development
Answer:
The development model must encourage open source and free software licensing. The intention of these licenses’ is to permit, and encourage the contribution from other developers. Richard Stallman, an American computer programmer, the founder of GNU, and the president of the
Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology (MSc IT)
SEMESTER
3
SUBJECT CODE & NAME
MIT3093– Graphics and Multimedia Systems

Assignment Set - 1

Q.1 Explain the following 3D display devices:
a) Stereoscopy                                            5
b) Computer Generated Holography        5
Answer-
a) Stereoscopy  :   
                                     
Stereoscopy (also called stereoscopic or 3-D imaging) refers to a technique for creating or enhancing the

Q.2 Describe Midpoint circle algorithm.   10
Answer-
Midpoint circle algorithm :

In computer graphics, the midpoint circle algorithm is an algorithm used to determine the points needed for drawing a circle. The algorithm is a variant of Bresenham's line algorithm, and is thus sometimes known as Bresenham's circle algorithm. Let's simplify the function evaluation that takes place on each


Q.3 What is clipping? Describe Cohen-Sutherland Line-Clipping algorithm.    2+8
Answer-
Clipping Operation :
Clipping operations are used to remove unwanted portions of a picture – we either remove the outside or the inside of a clipping window, which can be rectangular (most common), polygonal or curved (complex).

Point clipping
It is desirable to

Assignment Set - 2

Q.1 Discuss the object-space method of visible surface detection.    10
Answer-
Object-space method of visible surface detection :

1. Object-space Methods

 Compare objects and parts of objects to each other within the scene definition to determine which surfaces, as a whole, we should label as visible:

Q.2 What is meant by shading? Describe its types.   (2+8)  10
Answer-
Shading :

Shading is a process used in drawing for depicting levels of darkness on paper by applying media more densely or with a darker shade for darker areas, and less densely or with a lighter shade for lighter areas. There are various techniques of shading including cross hatching where perpendicular

Q.3 Explain the two general ways of reducing video data.   (5+5)  10
Answer-
Following are the two common and powerful ways of reducing video data:

Spatial compression – Spatial refers to compression applied to a single frame of data. The frame is compressed independently of any surrounding frames. Compression can be Lossless or Lossy. A spatially compressed frame is often referred to as an “intraframe.”, I frame or Keyframe.

Intraframe:

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions