Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
PROGRAM
Master of Science in Information
Technology(MSc IT)Revised Fall 2011
SEMESTER
SUBJECT CODE & NAME
MIT306– Object Oriented Analysis and
Design(OOAD)
SET 1
Qus:1
Explain the tasks involve in different phases of the object oriented systems
development life cycle.
Answer:
These
stages can be characterized and divided up in different ways, including the
following:
- Preliminary
analysis:
Begin with a preliminary analysis, propose alternative solutions, describe
costs and benefits, and submit a preliminary plan with
Qus:2 Define unified approach. Explain the steps, methods
and tools of unified approach.
Answer: Unified approach is a better way for understanding concepts
of objects oriented system
development. Unified approach is a methodology for software development. The unified approach, based on
methodologies given by Booch,
Rum Baugh and Jacobson tries to combine the methods
Qus:3
Describe the various states of activity diagram.
Answer:
Activity diagrams are special cases
of state chart diagrams. An activity diagram has actions as states. It can be
considered as
SET 2
Qus:1
List the rules of constructing an object oriented system.
Answer:
An object-oriented database
management system or OODBMS is a database management system that supports
modeling and creation of data as objects. OODBMS is a new and
Qus:2
Mention and explain the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which
cause unexpected results and eliminating them. The process of testing and
identifying bugs is a balance of science, art and luck.
There are three
Qus:3
Explain the following:
(a)
Black box testing
(b)
White box testing
Answer: (a) Black box testing
This treats the system as one that
cannot be seen in detail. The structure of the program is not taken into
account. The tests are performed based on what the program does. This is
sometimes called
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
PROGRAM
Master of Science in Information
Technology(MSc IT) Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT307-WEB TECHNOLOGIES
SET 1
Qus:1
List the three types of patterns in event-driven programming. Write the
benefits of event driven programming.
Answer:
In computer programming,
event-driven programming is a programming paradigm in which the flow of the
program is determined by events such as user actions (mouse clicks, key presses),
sensor outputs, or messages from other programs/threads. Event-driven
Qus:2
Explain the advantages of DHTML.
Answer:
Advantages
of DHTML
1.
Supported by all browsers: DHTML is supported in every major browser,
including Opera, Safari, Internet Explorer, and Firefox.
2.
Open standards: You can create your pages according to the standardized
technologies of DHTML and you can
Qus:3
Write any four importance of XML Schema. Discuss the steps
to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a
document, they can:
XML schema uses XML
SET
2
Qus:1
What is meant by AJAX? Describe AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX
is not a new programming language, but a new way to use existing standards.
It is a technique, rather than a
framework. it allows web pages to behave less like flat documents and
Qus:2
Explain the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to
manipulate or perform operations on variables and values. There are many
operators used in PHP, so we have separated
Qus3.
What is meant by debugging? Explain fatal and non-fatal bugs in ASP.
Answer:
Debugging our ASP script
After working with common ASP
components, we will be well versed with the ADRotator component. After
completing the development of the banner rotation system, we are now ready to
present it. However, any change in the name of our ADrotator file is being found.
When we
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
PROGRAM
Master of Science in Information
Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3081– High Speed Networks
Set 1
Qus1.What
is control signaling in ATM? Explain four methods to establish/release
connection.
Answer:
ATM
Protocol Architecture
ATM
is a technology that has the potential of revolutionizing data communications
and telecommunications. Based on the emerging standards for Broadband
Integrated Services Digital Networks (B-ISDN), ATM offers the economically
sound "bandwidth on demand" features of packet-switching technology
at the high speeds required for today's LAN and
Qus:2
Describe Multi-server queue using suitable diagrams and equations.
Answer: The aim of the queuing analysis is to make use of analytic
models to yield the desired
parameters to determine the buffer size. The following two queuing models can be used as analytic models:
Qus:3
Define congestion. List and explain different types of
congestion.
Answer: The situation wherein network
resources are constantly overloaded or the overall demand of a resource exceeds
its capacity is termed as congestion. Congestion in a network occurs when the
load on the network or the
Set 2
Qus:1
In TCP what is meant by timer? Mention the timers that TCP maintains for every
connection and describe any three.
Answer: In TCP protocol, timers are applied in various positions and
these timers restrain
retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all
timers. Function pointers in a timer structure
take a behavior function when initialized. Once the
Qus:2
Define Resource Reservation Protocol (RSVP). Write any three
salient characteristics of it. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup
and control. It enables Integrated Services (IntServ) which is designed to
emulate circuits on the Internet. This is the most complex QoS technology for
elements of a network (routers, switches) and applications (hosts). But, it
Q3. Explain
Subnet Bandwidth Management protocol operations.
Answer:
Subnet
Bandwidth Management (SBM)
SBM
is a signaling protocol that offers a method to map an Internet-level setup
protocol like Resource Reservation Protocol (RSVP) onto IEEE 802- based
networks. It specifies the operation of RSVP-
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
PROGRAM
Master of Science in Information
Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3091– Open Source System
Set 1
Qus:1
Describe types of Creative Common License.
Answer: It is very important to know that the licensable properties
come from an array of sources. The definitions of various proprietary types are
not always apparent. Although every licensing program is exclusive, diverse
areas of the licensing business have specific prototypes in terms of
Qus
2. Mention the types of licensing and briefly explain any two.
Answer:
Types
of licensing
It
is very important to know that the licensable properties come from an array of
sources. The definitions of various proprietary types are not always apparent.
Although every licensing program is
Qus:3 (a)Write five features of Mozilla
Public License.
(b)Differentiate
among GPL, LGPL, and MPL.
Answer: (a)
five features of Mozilla Public License.
You can say that the MPL differs
from the GPL in the way it regulates the distribution and licensing of works
containing the MPL-licensed code. The new component built using the
MPL-Licensed code can
SET 2
Q1.
Open-source is a good choice for companies. Justify this statement.
Answer: As we have understood how we could join an existing open
source project and also end an open source project, let us now learn how we can
inculcate an open source culture in a company.
Running an open source
Qus:2 EDescribe the negative effects of
open source and free software licensing.
Answer: As we are aware of the global scenario of open source and
free software licenses, let us now understand the issues related to them.
You can observe that the advantages
of open source licensing sometime in some situations act as disadvantages. Some
Qus:3
Explain the cathedral model of open source software
development.
Answer:
Models
of Open Source and Free Software Development
Answer:
The development model must encourage
open source and free software licensing. The intention of these licenses’ is to
permit, and encourage the contribution from other developers. Richard Stallman,
an American computer programmer, the founder of GNU, and the president of the
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in
Information Technology (MSc IT)
SEMESTER
3
SUBJECT CODE & NAME
MIT3093– Graphics and
Multimedia Systems
Assignment Set - 1
Q.1 Explain the following 3D
display devices:
a) Stereoscopy 5
b) Computer Generated
Holography 5
Answer-
a)
Stereoscopy :
Stereoscopy (also called stereoscopic or 3-D
imaging) refers to a technique for creating or enhancing the
Q.2 Describe Midpoint circle
algorithm. 10
Answer-
Midpoint
circle algorithm :
In
computer graphics, the midpoint circle algorithm is an algorithm used to
determine the points needed for drawing a circle. The algorithm is a variant of
Bresenham's line algorithm, and is thus sometimes known as Bresenham's circle
algorithm. Let's simplify the function evaluation that takes place on each
Q.3 What is clipping? Describe
Cohen-Sutherland Line-Clipping algorithm.
2+8
Answer-
Clipping
Operation :
Clipping
operations are used to remove unwanted portions of a picture – we either remove
the outside or the inside of a clipping window, which can be rectangular (most
common), polygonal or curved (complex).
Point
clipping
It
is desirable to
Assignment Set - 2
Q.1 Discuss the object-space method
of visible surface detection. 10
Answer-
Object-space
method of visible surface detection :
1. Object-space Methods
Compare objects and parts
of objects to each other within the scene definition to determine which
surfaces, as a whole, we should label as visible:
Q.2 What is meant by shading?
Describe its types. (2+8) 10
Answer-
Shading :
Shading is a process used in
drawing for depicting levels of darkness on paper by applying media more
densely or with a darker shade for darker areas, and less densely or with a
lighter shade for lighter areas. There are various techniques of shading including
cross hatching where perpendicular
Q.3 Explain the two general ways of
reducing video data. (5+5) 10
Answer-
Following are the two common and powerful ways of
reducing video data:
Spatial
compression – Spatial refers to
compression applied to a single frame of data. The frame is compressed
independently of any surrounding frames. Compression can be Lossless or Lossy.
A spatially compressed frame is often referred to as an “intraframe.”, I frame
or Keyframe.
Intraframe:
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
No comments:
Post a Comment