Tuesday 4 December 2018

mca 5 sem fall 2018 solved assignment help jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

Fall 2018 ASSIGNMENT
PROGRAM-MCA(REVISED FALL 2012)
SEMESTER-V
SUBJECT CODE & NAME-MCA512-ADVANCED SOFTWARE ENGINEERING
Set 1

Qus:1 What do you mean by product life cycle? Explain the seven stages of product life cycle
Answer:
Product life cycle:
A series of steps is required to manufacture a product..The product developed should satisfy the customer. The series of steps involved in developing the product is called the product life cycle.

The stages of product life cycle:
The seven stages in a product life

Qus: 2 List any ten major principles of agile software.
Answer.
 Principles of agile software:
The major principles of agile software are:

·         Satisfying the customers with early and continuous delivery of valuable software is agile software’s major priority.
·         Welcoming varying requirements, even during the later phases of development. Agile processes also support



Qus: 3. List the four developer practices of XP. Explain briefly about Adopt test-driven development
Answer:
Developer practices of XP:
XP values and the significance of time and resource for an XP practitioner. As a development model, the XP empowers the developers and stakeholders, associated with the project, to successfully carry out the project and develop efficient software. However, just like any other programming model, even in the XP, you must follow

Set 2

Qus:1. Briefly explain about tracker and coach in XP.
Answer.
Tracker and coach in XP:
Tracker:

A tracker is a person who keeps track of the schedule. A tracker can be a manager or a trusted developer. XP keeps track of certain metrics that include team velocity. This is the ratio of ideal time estimated for accomplishing a task to the actual time spent implementing them. The tracker also includes other

Qus:2. Explain XP prerequisites.
Answer.
XP prerequisites:
The following are the prerequisites for adopting XP:
Ø  Team agreement
Ø  A collocated team
Ø  On-site customers
Ø  The


Qus:3. List and explain any five basic principles of DSDM
Answer:
Principles of DSDM:
DSDM consists of nine basic principles. These principles form the cornerstones of development using DSDM and direct how development progresses. Ignoring any one of them will break with the frameworks

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

DRIVE
Fall 2018
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
5
SUBJECT CODE & NAME
MCA5131-PRINCIPLES OF MULTIMEDIA

Set 1

1 What is a Multimedia System? Explain any four Properties of a Multimedia System

Answer: In the application of

2 Briefly explain HTML. What are the essential features of HTML?

Answer: The prefix hyper- (comes from the Greek word which means "over" or "beyond") signifies the overcoming of the old linear constraints of written text. Hypertext is a type of formatted text that enables a related set of documents called pages to be created which contains links to other pages


3 Differentiate between Bitmap graphics and Vector graphics

Answer: Bitmap graphics, also known as "raster graphics," are composed of very small dots (pixels) of the same or different color that are placed so closely to each other that the human eye perceives them not as dots, but as a picture(for example, a photograph). So bitmap image is a matrix (grid) of digital

Set 2
1 Differentiate between filed mode and frame mode.

Answer: The

2. Explain the various hardware components required for Multimedia Applications. 4*2.5
Answer.
Hardware Components required for Multimedia Applications
To develop the system of multimedia the various hardware components required are:-
CPU: The CPU (Central Processing Unit) of a computer performs the main processing of data. The CPU is

3. What are the different types of multimedia servers? Explain. 5+5
Answer.
Types of multimedia servers
The multimedia server is where all the multimedia information or content is stored. That is why they are also called

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

DRIVE
SPRING 2018
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
5
SUBJECT CODE & NAME
MCA5142- Cryptography and Network Security

SET 1

1 a) List and explain the objectives of computer security.
b) What is the difference between passive and active security threats?

Answer: a) Objectives of Computer Security
Confidentiality
The first objective of security is confidentiality: keeping information away from people who should not have it. Accomplishing this objective requires that we know what data we are protecting and who should have access to it. It requires that we provide protection mechanisms for the data while it is stored in the computer and while it is being transferred over networks between computers. We will need to know the

2 a) What is avalanche effect?
b) Explain data encryption standard (DES).

Answer: a) In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions wherein if when an input is changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should


3 Explain the evaluation criteria for Advanced Encryption Standard (AES).

Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice for years, if not decades. In January 1997, NIST called for cryptographers to develop a new encryption system. As with the call for candidates from which DES was selected, NIST made several important restrictions. The

SET 2

1 a) What is key distribution?
b) Explain symmetric key distribution using symmetric encryption.

Answer: a) In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing encryption


2 a) Describe the four types of protocol of SSL.
b) What is Transport Layer Security (TLS)? Explain.

Answer: a) The SSL defines four protocols in two layers. They are:
Change CipherSpec Protocol
The change CipherSpec protocol is responsible for sending change CipherSpec messages. At any time, the client can request to change current cryptographic parameters such as the handshake key exchange. Following the change CipherSpec notification, the client sends a handshake key exchange and if available, certificate

3 a) Discuss intrusion detection.
b) What do you mean by malicious software? Explain in detail.

Answer: a) Intrusion detection:
Closely related to audit reduction is the ability to detect security lapses, ideally while they occur. As we have seen in the State Department example, there may well be too much information in the audit log for a human to analyze, but the computer can help correlate independent data. Intrusion detection software builds

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions




No comments:

Post a Comment