Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
BACHELOR OF SCIENCE
IN
INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER
V
SUBJECT
CODE & NAME BIT501 - MOBILE AND WIRELESS TECHNOLOGIES
Assignment
Set - 1
Q.1 What is an antenna?
Differentiate Omni-directional antenna, directional antenna and sectorized
antenna. 10
Answer-
Antenna
:
In
a wireless mode of communication, we do not involve any form of wires for
communication. The wireless communication occurs due to the electromagnetic
waves that can be transmitted and received in the air or vacuum through
specialised transducer. This transducer is called antenna. It is sometimes
called aerial. An antenna is a conductor that can transmit and receive
electromagnetic
Q.2 Write a note on Digital
Modulation. 10
Answer-
Digital
modulation :
Digital
modulation is required if digital data has to be transmitted over a medium that
only allows transmission of analog data. Digital transmission is used in wired
local area networks or within a computer. But in wireless networks, digital
transmission cannot be used. In wireless
Q.3
Write a note on Code Division Multiple Access (CDMA). 10
Answer-
Code
Division Multiple Access (CDMA) :
CDMA technology was initially used in World War II
military operations to thwart enemy attempts to access radio communication
signals. In the early 1990s, Qualcomm introduced the possibility of using the
same concept with publicly-available cellular network technology. During this
time, an
Assignment
Set - 2
Q.1 Write a note on Global System
for Mobile (GSM) Communications. 10
Answer-
Global
System for Mobile (GSM) Communications :
The
groupe spéciale mobile (GSM) was founded in 1982. The name of this system was
soon changed to Global System for Mobile (GSM) communications in which the
specification process was controlled by
Q.2 Illustrate handover in
GSM. 10
Answer-
Handover
in GSM :
When
the Mobile station moves out of the range of a BTS, the received signal level
decreases continuously until it falls below the minimal requirements for
communication. And the quality of the radio link gets
Q.3
Discus Universal Mobile Telecommunication System (UMTS) 10
Answer-
Universal
Mobile Telecommunication System (UMTS) :
UMTS (Universal Mobile Telecommunications Service)
is a third-generation (3G) broadband, packet-based transmission of text,
digitized voice, video, and multimedia at data rates up to 2 megabits per
second (Mbps). UMTS offers a consistent set of services to mobile computer and
phone users,
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER
V
SUBJECT
CODE & NAME BIT502-SOFTWARE TESTING
Assignment
Set - 1
Q.1
List the testing strategies in Software testing. 10
Answer-
Testing
strategies in Software testing :
A
software testing strategy is an outline, which describes the software
development cycle testing approach. It is made to inform testers, project
managers and developers on some major issues of the testing process. Testing
activity can be planned and conducted systematically; hence, to be
Q.2 List the software development Life Cycle
Models. 10
Answer-
Software
Development Life Cycle Models :
The software development life
cycle (SDLC) is a framework defining tasks performed at each step in the
software development process. The software development life cycle has many
activities
Q.3 What is White Box Testing? 10
Answer-
White Box
Testing :
White box testing technique takes
into account the internal structure of the system or component. The entire
source code of the system must be available. This technique is known as white
box
Assignment
Set - 2
Q.1
List the Functional testing concepts.
10
Answer-
Functional
testing concepts :
Functional
testing is a type of testing which verifies that each function of the software
application operates in conformance with the requirement specification. This
testing mainly involves black box testing and it is not concerned about the
source code of the application. Each functionality of
Q.2 List the Test Planning
Activities. 10
Answer-
Test
Planning Activities:
Test
planning is concerned with the implementation of test strategy for each test
level or all the levels of testing. Ideally there is a master test plan that
spans all levels of testing and ensures that sufficient amount of testing
occurs for a particular test level, In addition to the master test plan that
spans
Q.3
Discuss about Object-Oriented Testing challenges. 10
Answer-
Object-Oriented
Testing challenges :
A
main problem with testing object- oriented is that standard testing
methodologies may not be useful. This model describes a passive store with
active processor acting upon store. It requires that there be an oracle to det
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER
V
SUBJECT
CODE & NAME BIT503 - CYBER SECURITY
Assignment
Set - 1
Q.1
Describe in brief Cyber Warfare.
10
Answer-
Cyber
Warfare :
A
definition of Cyber warfare is difficult. In fact, definition of Cyber warfare
is still under controversy. We can notice that states may be attacking the
information systems of other countries for spying and for interrupting their
critical infrastructure. For instance, the attacks on the websites of Estonia
in 2007 and of Georgia in 2008 have been widely reported. Since the cyber
attacks has become
Q.2 Describe in brief
vulnerabilities in Software. 10
Answer-
Vulnerabilities
in Software :
Matthew
Blaze, world-renowned security guru said that “Everybody knows that nobody
knows how to write software”. Winn Schwartau, author of the book Information
Warfare, told: "The bottom line is that
Q.3
List the method of message authentication. 10
Answer-
Message
Authentication :
It
guarantees that the message has not been changed. A message digest, however
does not authenticate the sender of the message. When a sender say ‘A’ sends a
message to a receiver say ‘B’, B needs to know if the message is coming from A.
To provide message authentication, A needs to provide
Assignment
Set - 2
Q.1 Elaborate about Cyber
Terrorism. 10
Answer-
Cyber
Terrorism :
Cyber
terrorism refers to the use of internet for activities based on terrorist
attacks. This also include the large scale disruption of computer networks by
means of tools like computer viruses. This can also be defined as the use of
communication network or computer to cause harm for personal objectives.
Terrorist attacks which is using cyberspace for communication, command and
control,
Q.2
Suggest different methods to address the problems of bad system
administration and their effect on security.
10
Answer-
Following
are the few suggestions to address the problems of bad system administration
and their effect on security.
·
Secure
Defaults: Manufacturer can set defaults for
protection. Usually,
·
vendors of software,
Q.3 What are
digital signatures? 10
Answer-
Digital
Signatures :
Signature
is a proof to the recipient which shows that the signed document comes from the
correct entity. So a signature is a sign of authentication, which means a
signature makes the document authentic. When ‘A’ sends a
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
PROGRAM
BCA
(REVISED FALL 2012)
SEMESTER
5
SUBJECT
CODE & NAME
BIT5043,
E-COMMERCE
SET
1
Qus:1 Briefly explain four
different types of E–Commerce.
Ans:
Four different types of
E–Commerce:
The
E–Commerce is divided into four main categories:
1)
B2B – Business to Business
2)
B2C – Business to Consumer
3)
C2B – Consumer to Business
4)
C2C –
Qus: 2 what is the purpose of HTTP
protocol? Briefly explain Website Communication.
An:
The purpose of HTTP
protocol:
The
Hypertext Transfer Protocol (HTTP) is a stateless protocol, which means that
there is no preservation of information whenever an HTTP request and response
takes place on the internet. A transaction on anew – commerce need
Qus: 3 explain the structure of an
XML document. What is X/Secure? What benefits X/secure offer.
Ans:
The structure of an XML
document:
The
XML document comprises two parts: the Document Type Definition (DTD) and the
Document Body. The Document Type Definition or DTD defines the vocabulary and
structure of the document that makes XML extensible in use. Two applications
using same DTD will be able to understand each other. The
SET 2
Qus:1 What do you mean by
Electronic funds transfer? What are the different requirements for Electronic
funds transfer?
Ans:
Electronic funds
transfer:
The
development of money is not dependent solely on objective characteristics.
Subjective evaluations play a critical role. Ultimately, consumers determine
what form of money is most desirable – people simply substitute cheaper and
more convenient forms of money for expensive and inconvenient forms. It is
Qus:2 Briefly explain application
areas of e-CRM.
Ans:
Application areas of
e-CRM:
E-CRM
has varied industrial applications. Examples of some these are:
·
Banking and Finance
·
Hospitality
·
Telecom
Qus:3 Explain
four dimensions in mobile technology.
Ans:
Four dimensions in
mobile technology:
The
expansion of mobile computing is in four dimensions:
·
Wireless delivery technology and
switching methods: It comprises cellular, radio, paging and
satellite LAN for
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
·
No comments:
Post a Comment