Friday, 1 February 2019

bsc it 5 sem fall 2018 solved assignment jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE FALL 2018
PROGRAM BACHELOR OF SCIENCE
IN
 INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER V
SUBJECT CODE & NAME BIT501 - MOBILE AND WIRELESS TECHNOLOGIES


Assignment Set - 1
Q.1 What is an antenna? Differentiate Omni-directional antenna, directional antenna and sectorized antenna.    10
Answer-
Antenna :
In a wireless mode of communication, we do not involve any form of wires for communication. The wireless communication occurs due to the electromagnetic waves that can be transmitted and received in the air or vacuum through specialised transducer. This transducer is called antenna. It is sometimes called aerial. An antenna is a conductor that can transmit and receive electromagnetic

Q.2 Write a note on Digital Modulation.      10
Answer-
Digital modulation :

Digital modulation is required if digital data has to be transmitted over a medium that only allows transmission of analog data. Digital transmission is used in wired local area networks or within a computer. But in wireless networks, digital transmission cannot be used. In wireless

Q.3  Write a note on Code Division Multiple Access (CDMA).    10
Answer-
Code Division Multiple Access (CDMA) :

CDMA technology was initially used in World War II military operations to thwart enemy attempts to access radio communication signals. In the early 1990s, Qualcomm introduced the possibility of using the same concept with publicly-available cellular network technology. During this time, an

Assignment Set - 2

Q.1 Write a note on Global System for Mobile (GSM) Communications.       10
Answer-
Global System for Mobile (GSM) Communications :

The groupe spéciale mobile (GSM) was founded in 1982. The name of this system was soon changed to Global System for Mobile (GSM) communications in which the specification process was controlled by


Q.2 Illustrate handover in GSM.       10
Answer-
Handover in GSM :

When the Mobile station moves out of the range of a BTS, the received signal level decreases continuously until it falls below the minimal requirements for communication. And the quality of the radio link gets

Q.3  Discus Universal Mobile Telecommunication System (UMTS)         10
Answer-
Universal Mobile Telecommunication System (UMTS) :
UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps). UMTS offers a consistent set of services to mobile computer and phone users,

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions
Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE FALL 2018
PROGRAM BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER V
SUBJECT CODE & NAME BIT502-SOFTWARE TESTING

Assignment Set - 1


Q.1  List the testing strategies in Software testing.           10
Answer-
Testing strategies in Software testing :

A software testing strategy is an outline, which describes the software development cycle testing approach. It is made to inform testers, project managers and developers on some major issues of the testing process. Testing activity can be planned and conducted systematically; hence, to be

Q.2  List the software development Life Cycle Models.       10
Answer-
Software Development Life Cycle Models :

The software development life cycle (SDLC) is a framework defining tasks performed at each step in the software development process. The software development life cycle has many activities


Q.3  What is White Box Testing?             10
Answer-
White Box Testing :

White box testing technique takes into account the internal structure of the system or component. The entire source code of the system must be available. This technique is known as white box


Assignment Set - 2

Q.1  List the Functional testing concepts.    10
Answer-
Functional testing concepts :

Functional testing is a type of testing which verifies that each function of the software application operates in conformance with the requirement specification. This testing mainly involves black box testing and it is not concerned about the source code of the application. Each functionality of


Q.2 List the Test Planning Activities.        10
Answer-
Test Planning Activities:

Test planning is concerned with the implementation of test strategy for each test level or all the levels of testing. Ideally there is a master test plan that spans all levels of testing and ensures that sufficient amount of testing occurs for a particular test level, In addition to the master test plan that spans

Q.3  Discuss about Object-Oriented Testing challenges.      10
Answer-
Object-Oriented Testing challenges :

A main problem with testing object- oriented is that standard testing methodologies may not be useful. This model describes a passive store with active processor acting upon store. It requires that there be an oracle to det

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE FALL 2018
PROGRAM BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER V
SUBJECT CODE & NAME BIT503 - CYBER SECURITY

Assignment Set - 1


Q.1  Describe in brief Cyber Warfare.        10
Answer-
Cyber Warfare :

A definition of Cyber warfare is difficult. In fact, definition of Cyber warfare is still under controversy. We can notice that states may be attacking the information systems of other countries for spying and for interrupting their critical infrastructure. For instance, the attacks on the websites of Estonia in 2007 and of Georgia in 2008 have been widely reported. Since the cyber attacks has become

Q.2 Describe in brief vulnerabilities in Software.         10
Answer-
Vulnerabilities in Software :

Matthew Blaze, world-renowned security guru said that “Everybody knows that nobody knows how to write software”. Winn Schwartau, author of the book Information Warfare, told: "The bottom line is that

Q.3  List the method of message authentication.         10
Answer-
Message Authentication :

It guarantees that the message has not been changed. A message digest, however does not authenticate the sender of the message. When a sender say ‘A’ sends a message to a receiver say ‘B’, B needs to know if the message is coming from A. To provide message authentication, A needs to provide


Assignment Set - 2

Q.1 Elaborate about Cyber Terrorism.      10
Answer-
Cyber Terrorism :

Cyber terrorism refers to the use of internet for activities based on terrorist attacks. This also include the large scale disruption of computer networks by means of tools like computer viruses. This can also be defined as the use of communication network or computer to cause harm for personal objectives. Terrorist attacks which is using cyberspace for communication, command and control,


Q.2  Suggest different methods to address the problems of bad system administration and their effect on security.        10
Answer-
Following are the few suggestions to address the problems of bad system administration and their effect on security.

·         Secure Defaults: Manufacturer can set defaults for protection. Usually,
·         vendors of software,


Q.3 What are digital signatures?      10
Answer-
Digital Signatures :

Signature is a proof to the recipient which shows that the signed document comes from the correct entity. So a signature is a sign of authentication, which means a signature makes the document authentic. When ‘A’ sends a

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

PROGRAM
BCA (REVISED FALL 2012)
SEMESTER
5
SUBJECT CODE & NAME
BIT5043, E-COMMERCE
SET 1
Qus:1 Briefly explain four different types of E–Commerce.
Ans:
Four different types of E–Commerce:
The E–Commerce is divided into four main categories:
1) B2B – Business to Business
2) B2C – Business to Consumer
3) C2B – Consumer to Business
4) C2C –

Qus: 2 what is the purpose of HTTP protocol? Briefly explain Website Communication.
An:
The purpose of HTTP protocol:
The Hypertext Transfer Protocol (HTTP) is a stateless protocol, which means that there is no preservation of information whenever an HTTP request and response takes place on the internet. A transaction on anew – commerce need

Qus: 3 explain the structure of an XML document. What is X/Secure? What benefits X/secure offer.
Ans:
The structure of an XML document:
The XML document comprises two parts: the Document Type Definition (DTD) and the Document Body. The Document Type Definition or DTD defines the vocabulary and structure of the document that makes XML extensible in use. Two applications using same DTD will be able to understand each other. The

SET 2
Qus:1 What do you mean by Electronic funds transfer? What are the different requirements for Electronic funds transfer?
Ans:
Electronic funds transfer:
The development of money is not dependent solely on objective characteristics. Subjective evaluations play a critical role. Ultimately, consumers determine what form of money is most desirable – people simply substitute cheaper and more convenient forms of money for expensive and inconvenient forms. It is

Qus:2 Briefly explain application areas of e-CRM.
Ans:
Application areas of e-CRM:
E-CRM has varied industrial applications. Examples of some these are:

·         Banking and Finance
·         Hospitality
·         Telecom


Qus:3 Explain four dimensions in mobile technology.
Ans:
Four dimensions in mobile technology:
The expansion of mobile computing is in four dimensions:

·         Wireless delivery technology and switching methods: It comprises cellular, radio, paging and satellite LAN for


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

·          


No comments:

Post a Comment