Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Fall
2018 ASSIGNMENT
PROGRAM-MCA(REVISED
FALL 2012)
SEMESTER-V
SUBJECT
CODE & NAME-MCA512-ADVANCED SOFTWARE ENGINEERING
Set 1
Qus:1 What do you mean
by product life cycle? Explain the seven stages of product life cycle
Answer:
Product life cycle:
A
series of steps is required to manufacture a product..The product developed
should satisfy the customer. The series of steps involved in developing the
product is called the product life cycle.
The stages of product
life cycle:
The
seven stages in a product life
Qus: 2 List any ten
major principles of agile software.
Answer.
Principles of agile software:
The
major principles of agile software are:
·
Satisfying the customers with early and continuous
delivery of valuable software is agile software’s major priority.
·
Welcoming varying requirements, even during the later
phases of development. Agile processes also support
Qus: 3. List the
four developer practices of XP. Explain briefly about Adopt test-driven
development
Answer:
Developer practices of
XP:
XP
values and the significance of time and resource for an XP practitioner. As a
development model, the XP empowers the developers and stakeholders, associated
with the project, to successfully carry out the project and develop efficient
software. However, just like any other programming model, even in the XP, you
must follow
Set
2
Qus:1. Briefly explain about
tracker and coach in XP.
Answer.
Tracker and coach in XP:
Tracker:
A
tracker is a person who keeps track of the schedule. A tracker can be a manager
or a trusted developer. XP keeps track of certain metrics that include team
velocity. This is the ratio of ideal time estimated for accomplishing a task to
the actual time spent implementing them. The tracker also includes other
Qus:2. Explain XP prerequisites.
Answer.
XP prerequisites:
The
following are the prerequisites for adopting XP:
Ø Team
agreement
Ø A
collocated team
Ø On-site
customers
Ø The
Qus:3. List and
explain any five basic principles of DSDM
Answer:
Principles of DSDM:
DSDM
consists of nine basic principles. These principles form the cornerstones of
development using DSDM and direct how development progresses. Ignoring any one
of them will break with the frameworks
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments
available in rs 125 per assignment
only
You can mail us your
questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
DRIVE
Fall
2018
PROGRAM
MCA(REVISED
FALL 2012)
SEMESTER
5
SUBJECT
CODE & NAME
MCA5131-PRINCIPLES
OF MULTIMEDIA
Set
1
1 What is a Multimedia System? Explain
any four Properties of a Multimedia System
Answer: In the application of
2 Briefly explain HTML.
What are the essential features of HTML?
Answer: The prefix hyper- (comes from the Greek
word which means "over" or "beyond") signifies the
overcoming of the old linear constraints of written text. Hypertext is a type
of formatted text that enables a related set of documents called pages to be
created which contains links to other pages
3 Differentiate between
Bitmap graphics and Vector graphics
Answer: Bitmap graphics, also known as
"raster graphics," are composed of very small dots (pixels) of the
same or different color that are placed so closely to each other that the human
eye perceives them not as dots, but as a picture(for example, a photograph). So
bitmap image is a matrix (grid) of digital
Set
2
1 Differentiate between
filed mode and frame mode.
Answer: The
2. Explain the various
hardware components required for Multimedia Applications. 4*2.5
Answer.
Hardware Components required for Multimedia Applications
To develop the system of multimedia the various hardware
components required are:-
CPU: The CPU (Central Processing Unit) of a computer performs
the main processing of data. The CPU is
3. What are the different
types of multimedia servers? Explain. 5+5
Answer.
Types of multimedia servers
The multimedia server is where all the multimedia
information or content is stored. That is why they are also called
Complete Smu assignments
available in rs 125 per assignment
only
You can mail us your
questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
DRIVE
SPRING
2018
PROGRAM
MCA(REVISED
FALL 2012)
SEMESTER
5
SUBJECT
CODE & NAME
MCA5142-
Cryptography and Network Security
SET
1
1
a) List and explain the objectives of computer security.
b)
What is the difference between passive and active security threats?
Answer: a) Objectives of Computer Security
Confidentiality
The first objective of
security is confidentiality: keeping information away from people who should
not have it. Accomplishing this objective requires that we know what data we
are protecting and who should have access to it. It requires that we provide
protection mechanisms for the data while it is stored in the computer and while
it is being transferred over networks between computers. We will need to know
the
2
a) What is avalanche effect?
b)
Explain data encryption standard (DES).
Answer: a) In cryptography, the avalanche
effect is the desirable property of cryptographic algorithms, typically block
ciphers and cryptographic hash functions wherein if when an input is changed
slightly (for example, flipping a single bit) the output changes significantly
(e.g., half the output bits flip). In the case of high-quality block ciphers,
such a small change in either the key or the plaintext should
3
Explain the evaluation criteria for Advanced Encryption Standard (AES).
Answer: The AES is likely to be the
commercial-grade symmetric algorithm of choice for years, if not decades. In
January 1997, NIST called for cryptographers to develop a new encryption
system. As with the call for candidates from which DES was selected, NIST made
several important restrictions. The
SET
2
1
a) What is key distribution?
b)
Explain symmetric key distribution using symmetric encryption.
Answer: a) In symmetric key cryptography, both
parties must possess a secret key which they must exchange prior to using any
encryption. Distribution of secret keys has been problematic until recently,
because it involved face-to-face meeting, use of a trusted courier, or sending
the key through an existing encryption
2
a) Describe the four types of protocol of SSL.
b)
What is Transport Layer Security (TLS)? Explain.
Answer: a) The SSL defines four protocols in
two layers. They are:
Change
CipherSpec Protocol
The change CipherSpec
protocol is responsible for sending change CipherSpec messages. At any time,
the client can request to change current cryptographic parameters such as the
handshake key exchange. Following the change CipherSpec notification, the client
sends a handshake key exchange and if available, certificate
3
a) Discuss intrusion detection.
b)
What do you mean by malicious software? Explain in detail.
Answer: a) Intrusion
detection:
Closely related to audit
reduction is the ability to detect security lapses, ideally while they occur.
As we have seen in the State Department example, there may well be too much
information in the audit log for a human to analyze, but the computer can help
correlate independent data. Intrusion detection software builds
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
No comments:
Post a Comment