Friday, 21 December 2018

smu M.Sc IT 3 sem fall 2018 solved assignment jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT306– Object Oriented Analysis and Design(OOAD)
SET 1

Qus:1 Explain the tasks involve in different phases of the object oriented systems development life cycle.
Answer:
These stages can be characterized and divided up in different ways, including the following:

  • Preliminary analysis: Begin with a preliminary analysis, propose alternative solutions, describe costs and benefits, and submit a preliminary plan with


Qus:2 Define unified approach. Explain the steps, methods and tools of unified approach.
Answer:   Unified approach is a better way for understanding concepts of objects oriented system development. Unified approach is a methodology for software development. The unified approach, based on methodologies given by Booch, Rum Baugh and Jacobson tries to combine the methods

Qus:3 Describe the various states of activity diagram.
Answer: Activity diagrams are special cases of state chart diagrams. An activity diagram has actions as states. It can be considered as

SET 2
Qus:1 List the rules of constructing an object oriented system.
Answer:
An object-oriented database management system or OODBMS is a database management system that supports modeling and creation of data as objects. OODBMS is a new and

Qus:2 Mention and explain the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which cause unexpected results and eliminating them. The process of testing and identifying bugs is a balance of science, art and luck.
There are three


Qus:3 Explain the following:
(a) Black box testing
(b) White box testing
Answer: (a) Black box testing
This treats the system as one that cannot be seen in detail. The structure of the program is not taken into account. The tests are performed based on what the program does. This is sometimes called

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT) Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT307-WEB TECHNOLOGIES
SET 1
Qus:1 List the three types of patterns in event-driven programming. Write the benefits of event driven programming.
Answer:
In computer programming, event-driven programming is a programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses), sensor outputs, or messages from other programs/threads. Event-driven

Qus:2 Explain the advantages of DHTML.
Answer:
Advantages of DHTML
1. Supported by all browsers: DHTML is supported in every major browser, including Opera, Safari, Internet Explorer, and Firefox.

2. Open standards: You can create your pages according to the standardized technologies of DHTML and you can


Qus:3 Write any four importance of XML Schema. Discuss the steps to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a document, they can:
 XML schema uses XML


SET 2

Qus:1 What is meant by AJAX? Describe AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX is not a new programming language, but a new way to use existing standards.
It is a technique, rather than a framework. it allows web pages to behave less like flat documents and

Qus:2 Explain the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated

Qus3. What is meant by debugging? Explain fatal and non-fatal bugs in ASP.
Answer:
Debugging our ASP script
After working with common ASP components, we will be well versed with the ADRotator component. After completing the development of the banner rotation system, we are now ready to present it. However, any change in the name of our ADrotator file is being found. When we

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3081– High Speed Networks
Set 1
Qus1.What is control signaling in ATM? Explain four methods to establish/release connection.
Answer:
ATM Protocol Architecture
ATM is a technology that has the potential of revolutionizing data communications and telecommunications. Based on the emerging standards for Broadband Integrated Services Digital Networks (B-ISDN), ATM offers the economically sound "bandwidth on demand" features of packet-switching technology at the high speeds required for today's LAN and

Qus:2 Describe Multi-server queue using suitable diagrams and equations.
Answer: The aim of the queuing analysis is to make use of analytic models to yield the desired parameters to determine the buffer size. The following two queuing models can be used as analytic models:


Qus:3 Define congestion. List and explain different types of congestion.
Answer: The situation wherein network resources are constantly overloaded or the overall demand of a resource exceeds its capacity is termed as congestion. Congestion in a network occurs when the load on the network or the

Set 2

Qus:1 In TCP what is meant by timer? Mention the timers that TCP maintains for every connection and describe any three.
Answer: In TCP protocol, timers are applied in various positions and these timers restrain retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all timers. Function pointers in a timer structure take a behavior function when initialized. Once the

Qus:2 Define Resource Reservation Protocol (RSVP). Write any three salient characteristics of it. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup and control. It enables Integrated Services (IntServ) which is designed to emulate circuits on the Internet. This is the most complex QoS technology for elements of a network (routers, switches) and applications (hosts). But, it

Q3. Explain Subnet Bandwidth Management protocol operations.
Answer:
Subnet Bandwidth Management (SBM)
SBM is a signaling protocol that offers a method to map an Internet-level setup protocol like Resource Reservation Protocol (RSVP) onto IEEE 802- based networks. It specifies the operation of RSVP-

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3091– Open Source System
Set 1
Qus:1 Describe types of Creative Common License.
Answer: It is very important to know that the licensable properties come from an array of sources. The definitions of various proprietary types are not always apparent. Although every licensing program is exclusive, diverse areas of the licensing business have specific prototypes in terms of

Qus 2. Mention the types of licensing and briefly explain any two.
Answer:
Types of licensing
It is very important to know that the licensable properties come from an array of sources. The definitions of various proprietary types are not always apparent. Although every licensing program is

Qus:3 (a)Write five features of Mozilla Public License.
(b)Differentiate among GPL, LGPL, and MPL.
Answer: (a)
 five features of Mozilla Public License.
You can say that the MPL differs from the GPL in the way it regulates the distribution and licensing of works containing the MPL-licensed code. The new component built using the MPL-Licensed code can

SET 2
Q1. Open-source is a good choice for companies. Justify this statement.
Answer: As we have understood how we could join an existing open source project and also end an open source project, let us now learn how we can inculcate an open source culture in a company.
Running an open source
Qus:2 EDescribe the negative effects of open source and free software licensing.
Answer: As we are aware of the global scenario of open source and free software licenses, let us now understand the issues related to them.
You can observe that the advantages of open source licensing sometime in some situations act as disadvantages. Some


Qus:3 Explain the cathedral model of open source software development.
Answer:
Models of Open Source and Free Software Development
Answer:
The development model must encourage open source and free software licensing. The intention of these licenses’ is to permit, and encourage the contribution from other developers. Richard Stallman, an American computer programmer, the founder of GNU, and the president of the
Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology (MSc IT)
SEMESTER
3
SUBJECT CODE & NAME
MIT3093– Graphics and Multimedia Systems

Assignment Set - 1

Q.1 Explain the following 3D display devices:
a) Stereoscopy                                            5
b) Computer Generated Holography        5
Answer-
a) Stereoscopy  :   
                                     
Stereoscopy (also called stereoscopic or 3-D imaging) refers to a technique for creating or enhancing the

Q.2 Describe Midpoint circle algorithm.   10
Answer-
Midpoint circle algorithm :

In computer graphics, the midpoint circle algorithm is an algorithm used to determine the points needed for drawing a circle. The algorithm is a variant of Bresenham's line algorithm, and is thus sometimes known as Bresenham's circle algorithm. Let's simplify the function evaluation that takes place on each


Q.3 What is clipping? Describe Cohen-Sutherland Line-Clipping algorithm.    2+8
Answer-
Clipping Operation :
Clipping operations are used to remove unwanted portions of a picture – we either remove the outside or the inside of a clipping window, which can be rectangular (most common), polygonal or curved (complex).

Point clipping
It is desirable to

Assignment Set - 2

Q.1 Discuss the object-space method of visible surface detection.    10
Answer-
Object-space method of visible surface detection :

1. Object-space Methods

 Compare objects and parts of objects to each other within the scene definition to determine which surfaces, as a whole, we should label as visible:

Q.2 What is meant by shading? Describe its types.   (2+8)  10
Answer-
Shading :

Shading is a process used in drawing for depicting levels of darkness on paper by applying media more densely or with a darker shade for darker areas, and less densely or with a lighter shade for lighter areas. There are various techniques of shading including cross hatching where perpendicular

Q.3 Explain the two general ways of reducing video data.   (5+5)  10
Answer-
Following are the two common and powerful ways of reducing video data:

Spatial compression – Spatial refers to compression applied to a single frame of data. The frame is compressed independently of any surrounding frames. Compression can be Lossless or Lossy. A spatially compressed frame is often referred to as an “intraframe.”, I frame or Keyframe.

Intraframe:

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions




No comments:

Post a Comment