Tuesday 4 December 2018

mca 4 sem fall 2018 solved assignment help jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Fall 2018 ASSIGNMENT
PROGRAM MCA
SEMESTER FOURTH
SUBJECT CODE & NAME MCA411- MICROPROSESSOR
CREDIT 4 BK ID B1778 MAX. MARKS 60
SET 1
Q1. Write short notes on:
a) Central Processing Unit
b) Memory Unit 5+5

Answer:
Central Processing Unit:
The central processing unit (CPU) is the electronic brain of the computer. CPU consists of Arithmetic Logic Unit (ALU) and Control Unit (CU).

(I)              Arithmetic Logic Unit (ALU): The arithmetic logic unit (ALU) is responsible for arithmetic and logical operations. Basically an Arithmetic-Logic Unit (ALU) is an electronic circuit used to carry out the arithmetic operations like addition, subtraction, multiplication and division. It also

2 Write short notes on:
a) Bus Interface Unit (BIU)
b) Execution Unit (EU) 5+5 10
Answer: A)

Bus Interface Unit (BIU): The BIU handles all the data and address on the buses for the execution unit (EU). It performs all bus operations such as instruction fetching, reading and writing operands for memory and calculating the addresses of the memory operands. The instruction bytes are transferred to the instruction queue. Execution unit use the instruction queue to execute the instructions.

3 Write short notes on:
a) REP Prefix
b) Table Translation 5+5 10
Answer: A)
REP Prefix
Because string operations inherently involve looping, the 8086 machine language includes a prefix that considerably simplifies the use of string primitives with loops. This prefix has the machine code
1 1 1 1 10 0 1 Z
where, for the CMPS and SCAS primitives, the Z bit helps control the loop. By prefixing MOVS, LODS and STOS, which do not affect the flags, with the REP prefix 11110011, they are repeated the number of times

SET 2
1 Describe about Key-code Data Formats and FIFO Status Word formats. 5+5 10
Answer: Key-code Data Formats:
After a valid Key closure, the key code is entered as a byte code into the FIFO RAM, in the following format, in scanned keyboard mode. The Key code format contains 3-bit contents of the internal row counter, 3-bit contents of the column counter and status of the SHIFT and CNTL Keys The data format of the Key code in


2 Write a note on
(a) RS 232 standard
 (b) IEEE 488 standard 5+5 10
Answer: A) RS232 Standard
RS232 standard is developed by the Electronic Industry Association (EIA) in 1962 and was revised and renamed as RS232C. RS stands for "recommended standard." This is a standard hardware interface used for implementing asynchronous serial data communication ports on devices such as CRT terminals, printers, modems and keyboards. RS-232 can be plugged straight into the computer’s serial port (know as COM or Comm port). RS-232 has been around as a standard for decades as an electrical interface between Data Terminal Equipment (DTE) and Data Circuit- Terminating Equipment

3 Write short note on:
a) Parallel Printer Interface (LPT)
b) Universal Serial Bus (USB) 5+5 10
Answer: A)
Parallel Printer Interface (LPT)
The parallel printer interface (LPT) is located on the rear panel of the PC. The LPT stands for line printer. The Parallel Port Interface on the PC compatible computer is one of the most flexible interfaces for connecting the PC to a wide range of devices. The interface was originally intended purely for connection to printers but due to the simple nature of the digital control lines it has found many other uses. Its simplicity relies on the fact that the data to and from the port forms an 8 bit binary on/off pattern. Unlike serial ports which rely on a chip to do the data transmission, parallel data is handled


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

Fall 2018 PROGRAM- MCA(REVISED FALL 2012)
SEMESTER- FOURTH
SUBJECT CODE & NAME- MCA412- PROBABILITY AND STATISTICS
SET 1
Q1.  Three machines A, B and C produce respectively 60%, 30% and 10% of the total number of items of a factory. The percentage of defective output of these machines are respectively 2%, 3% and 4%. An item is selected at random and is found to be defective. Find the probability that the item was produced by machine C.

Solution: Let P(A), P(B) and P(C) denote the probabilities of choosing an item produced by A, B, C respectively. Also, let P(X/A), P(X/B), P(X/C) denote the probabilities of choosing a defective item from the outputs of A, B, C respectively. Then, from what is given, we have



Q3. The data shows the distribution of weight of students of 1st standard of a school. Find the quartiles.

Class Interval
13 - 18
18 - 20
20 - 21
21 – 22
22 - 23
23 - 25
25 – 30














Frequency
22
27
51
42
32

16
10














Solution:





















Class interval

Frequency

Cumulative frequency

















SET 2

Q1. Fit a trend line to the following data by the freehand method:

Year
Production of wheat
Year
Production of wheat

(in tonnes)

(in tonnes)




1995
20
2000
25




1996
22
2001
23




1997
24
2002
26




1998
21
2003
25




1999
23
2004
24






Solution: Graphical representation of trend line relating to the production of wheat by the method of free hand curve is shown in figure


Q2. Let X be a random variable and its probability mass function is  find the m.g.f. of X and hence its mean and variance.

Solution: By definition,





=








Q3. The diastolic blood pressures of men are distributed as shown in table. Find the standard deviation and variance.

Pressure(men)
78-80
80-82
82-84
84-86
86-88
88-90







No. of Men
3
15
26
23
9
4








Solution: The table represents the frequency distribution of data required for calculating the standard deviation.

Class
Mid
Frequency
x-83
d = (x-
fd
fd2
Interval
value X
‘f’

83)/2











78-80
79
3
-4
-2
4
-6
12













Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

Fall 2018 PROGRAM- MCA
SEMESTER-4
SUBJECT CODE & NAME-mca413 - OBJECT ORIENTED PROGRAMMING

SET 1
Q1. Describe the following:
a) Multi-threading.
b) Significance of Java Bytecode
Answer.
Multi-threading
Multithreading is the ability of an application to perform multiple tasks at the same time. We can create multithreading programs using Java. The core of Java is also multithreaded.

Significance of


Q2. Differentiate Break and Continue statements in Java with example program.(5+5)
Answer.
Break and Continue statements in Java
Break statements
The break statement is used inside the switch to terminate a statement sequence. When a break statement is encountered, execution branches to the first line of code that follows the entire switch statement. This has the effect of "jumping out" of

Q3. Differentiate between packages and Interfaces.(5+5)
Answer.
Packages and Interfaces
Packages
Java provides a mechanism for partitioning the class name space into more manageable chunks. This mechanism is the package. The package is both a naming and a visibility control mechanism. You can define classes inside a package that are not accessible by code outside that package. You can also define class members that are only exposed to other members of the same package. This allows your classes to have intimate knowledge of each other, but not expose

SET 2
Q1. What are Applets? What are the restrictions of Applets? Describe about applet class.(2+3+5)
Answer.
Applets
An applet is a Java program that can be embedded in a web page. Java applications are run by using a Java interpreter. Applets are run on any browser that supports Java. Applets can also be tested using the appletviewer tool included in the Java Development Kit. In order to run an applet it must be included in a web page, using HTML tags


Q2. Compare JDBC and ODBC (5*2)
Answer.
JDBC and ODBC
Java Data Base Connectivity (JDBC)

The JDBC API (Java Data Base Connectivity Application Program Interface) can access any kind of tabular data, especially data stored in a Relational Database. It works on top of ODBC (Open Data Base Connectivity) which was the driver for database connectivity since age old days but since ODBC was implemented in C so people from the VB background had some problems in understanding the implementation intricacies. Since JDBC works on top of ODBC

Q3. Describe about Java Beans and BeanBox. (5+5)
Answer.
Java Beans and BeanBox
Java Beans
JavaBeans is the software component architecture for Java. It allows constructing applications efficiently by configuring and connecting components called Beans. The Beans need to be written and tested with a rich set of mechanisms for

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

·          


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions
Fall 2018 ASSIGNMENT
PROGRAM - MCA
SUBJECT CODE & NAME – mca414- ANALYSIS AND DESIGN OF ALGORITHMS
SET 1
Q1. Write the steps involved in analyzing the efficiency of non-recursive algorithms.
Answer: Answer:
The steps involved in analyzing the efficiency of non-recursive algorithms are as follows:
 Decide the input size based on the constraint n
 Identify the basic operations of algorithm
 Check the number of times the

2 Define selection sort and explain how to implement the selection sort? 3+7=10
Answer:
Definition: Selection sort is one of the simplest and performance oriented sorting techniques that work well for small files. It has time complexity as O(n2) which is unproductive on large lists.


3 What is mean by Topological sort? And explain with example. 5+5=10
Answer: Topological sort is done using a directed acyclic graph (DAG), which is a linear ordering of all vertices G= (V, E) is

SET 2
1. Explain good-suffix and bad-character shift in Boyer-Moore algorithm. 5+5=10
Answer: Good suffix Shift
This shift helps in shifting a matched part of the pattern, and is denoted by Q. Good suffix shift Q is applied after 0 < k < m characters are matched.
Q = distance between matched suffix of size k and its rightmost occurrence in the pattern that is not preceded by the


2 Solve the Knapsack problem using memory functions.
Item 1 2 3 4
Weight 2 6 4 8
Value (in Rs.) 12 16 30 40
Knapsack capacity is given as W=12. Analyze the Knapsack problem using memory functions with the help of the values given above. 10
Answer:
 Knapsack Problem by Memory Functions

3 Describe Variable Length Encoding and Huffman Encoding.
Answer:
Variable Length Encoding
Variable-length codes can allow sources to be compressed and decompressed with zero error (lossless data compression) and still be read back symbol by symbol. With the right coding strategy an independent and identically-distributed source may be compressed almost arbitrarily close to its


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM-BCA(REVISED FALL 2012)
SEMESTER-4
SUBJECT CODE & NAME-MCA413 - OBJECT ORIENTED PROGRAMMING – JAVA
CREDIT-4
BK ID-B1477
MAX. MARKS-60

SET 1
Q1. a. Explain any five features of Java.
In short, Java is a simple, robust and secure programming language. Here are the key features of Java:
* Simple:
The Java language

Q2. Differentiate Break and Continue statements in Java with example program.(5+5)
Answer.
Break and Continue statements in Java
Break statements
The break statement is used inside the switch to terminate a statement sequence. When a break statement is encountered, execution


Q3. Differentiate between packages and Interfaces.(5+5)
Answer.
Packages and Interfaces
Packages
Java provides a mechanism for partitioning the class name space into more manageable chunks. This mechanism is the package. The package is

SET 2
Q1. List and explain all three components of Event.
Explain Event Listener.
Answer:
Components of an Event
An event comprises of three components:

Event Object – When the user interacts with the application by pressing a key or clicking a mouse button, an event is generated. The

Q2. What is JDBC? How will you load the ODBC driver?
Answer.
Java Data Base Connectivity (JDBC)

The JDBC API (Java Data Base Connectivity Application Program Interface) can access any kind of tabular data, especially data stored in a Relational Database. It works on top of ODBC (Open Data Base Connectivity) which was the



Q3. Describe about Java Beans and BeanBox. (5+5)
Answer.
Java Beans and BeanBox
Java Beans
JavaBeans is the software component architecture for Java. It allows constructing applications efficiently by configuring and connecting components called Beans. The Beans need to be written and tested with a rich set of mechanisms for

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

·          


No comments:

Post a Comment