Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
PROGRAM
Bachelor
of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT
CODE & NAME
BIT301 –
Operating System
SET 1
Qus:1 Summarize about Interprocess Communication.
Answer:
Interprocess
Communication
Interprocess
communication (IPC) is a set of programming interfaces that allow a programmer
to coordinate activities among different program processes that can run
concurrently in an operating system. This allows a program to handle many user
requests at the same time. Communication of co-operating processes
shared-memory environment requires that these processes share a common buffer
pool, and that the code for implementing the buffer be explicitly written by
the application programmer. Another way to achieve the same effect is for the
operating system to provide the means for co-operating processes to communicate
with
Qus:2 Write a note on External Fragmentation
Answer:
External
fragmentation
Segments
of user programs are allocated memory by the bob scheduler.
This
is similar to paging where segments could be treated as variable sized pages.
So a first-fit or best-fit allocation scheme could be used since this is a
dynamic storage allocation problem. But, as with variable sized partition scheme,
segmentation too causes external fragmentation. When any free memory segment is
too small to be allocated to a segment to be loaded, then external
fragmentation is said to have occurred. Memory compaction is a solution to
overcome
Qus:3 Discuss the different methods of implementing a
Directory.
Answer:
The
two main methods of implementing a directory are:
Linear list
Hash table
Linear
list
A linear list of file names with pointers to the
data blocks is one way to implement a directory. A linear search is necessary
to find a particular file. The method is simple but the search is time
consuming. To create a file, a linear search is made to look for the existence
of a file with the same file name and if no such file is found the new file
created is added to the directory at the end. To delete a file, a linear search
for the file name is made and if found allocated space is released. Every time making
a linear search consumes time and increases access
SET 2
Qus:1 Write a short note on Multi-programmed Batched
Operating Systems.
Answer: The concept of spooling introduced an important data
structure called the job pool. Spooling creates several jobs on the disk ready
for execution or processing. The operating system now has to choose from the
job pool, a job that is to be executed next. This increases CPU utilization as
CPU is continuously utilized for execution of multiple programs one after another.Jobs
in the job pool may be scheduled for execution in any order (not necessarily in
Qus:2 What are the different information stored in a process
control block (PCB)?
Answer: In order to manage and coordinate the various processes, the
operating system identify these processes in terms of numbers and Process
Control Block (PCB). A Process Control Block is a data structure maintained by
the Operating System for every process. A PCB keeps all the information needed
to keep track of a process. The PCB serves as a repository
Qus:3 Discuss in details about deadlock prevention.
Answer: The four necessary conditions for deadlocks to occur are
mutual exclusion, hold and wait, no preemption and circular wait. If any one of
the above four conditions does not hold, then deadlocks will not occur. Thus
prevention of deadlock is possible by ensuring that at least one of the four
conditions cannot hold.
Mutual
exclusion: Resources that can be shared are never involved in a deadlock
because such resources can always be Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
PROGRAM
Bachelor
of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT
CODE & NAME
BIT302 –
Computer Networks
Qus:1 Discuss about Packet Scheduling.
Answer:
Packet
Scheduling
Algorithms that allocate
router resources among the packets of a flow and between competing flows are
called packet scheduling algorithms. Three different kinds of resources can
potentially be reserved for different flows. They are bandwidth, bufferspace and
CPU cycles. Packet scheduling algorithms allocate bandwidth and other router
resources by determining which of the buffered packets to send on the output
line next. Each router buffers packets in a queue for each output line until
they can be sent, and they are sent in the same order that they arrived. This
algorithm is known as FIFO (First-In First-Out), or equivalently FCFS
(First-Come Its
half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
Qus:2 Discuss working mechanism of SMTP.
Answer:
Simple
Mail Transfer Protocol (SMTP)
The
basic Internet mail protocols provide mail and message exchange between TCP/IP
hosts, but generally require that data be represented as 7-bit ASCII text.
Because this can be restrictive, facilities have been added for the
transmission of data that cannot be represented in this manner.
Simple
Mail Transfer Protocol (SMTP) is a standard for the exchange of mail between
two computers, which specified the protocol used to send mail between TCP/IP
hosts.
Working
Qus:3 Discuss briefly the Domain Name System.
Answer:
The
Domain Name System
We
can refer web pages, mailboxes and other resources by using network address (IP
address) of the computers on which they are stored. But these addresses are
hard for people to remember and reproduce. Consequently, high-level, readable
names were introduced in order to decouple machine names from machine
addresses.
The
initial solution for name resolution on the Internet was a file named Hosts.txt
that was used on the now obsolete Advanced Research Projects Agency network
(ARPANET), the predecessor of the modern day Internet.
When
the
Set 2
Qus:1 Discuss in details about OSI Reference Model.
Answer: The OSI Model is based on the protocol developed by ISO
(International Standards Organization) as the first step towards international
standardization of the protocols used in the various layers. This model deals
with connecting open systems, so it is called ISO OSI (Open Systems
Interconnection). OSI model has seven layers, each layer is created when where
a different abstraction is needed, and each layer has well-defined function.
The OSI model is shown in
Qus:2 Discuss in details about Clock-based Framing (SONET).
Answer: Clock- based framing is another approach to framing, and is
represented by the Synchronous Optical Network (SONET) standard. SONET was
first proposed by Bell Communications Research (Bellcore), and then developed under
the American National Standards Institute (ANSI) for digital transmission over
optical fiber; it has since been adopted by the ITU-T.
SONET has been
Qus:3 Discuss in details about Internet protocol version 4 (IPV4).
Answer: IPV4 is a connectionless protocol
and is unreliable. It is primarily responsible for addressing and routing
packets between hosts. A higher layer protocol such as TCP or an application
protocol must acknowledge delivered packets and recover lost packets if
required. IPV4 is defined in RFC 791. Figure shows the datagram format of IPV4.
It consist of IPV4 header and Payload. Header consists of Source address,
destination address, identification number, checksum
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
ASSIGNMENT
DRIVE
SPRING 2019
PROGRAM
Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT
CODE & NAME BIT303 – OBJECT ORIENTED PROGRAMMING – JAVA
Assignment
Set -1
Q.1 List any ten Java command tools
with a short description of each. 1x10
Answer :
Java command tools :
A Java software development kit (SDK or "devkit")
is a set of development tools that is used in developing applications for
certain software package, software framework, hardware platform, computer
system, video game console, operating system, or similar platform. If J2SE 1.2
is used to develop applications, then you are using the platform what's known
as the Java 2 Platform. The latest Java 8 or J2SE 1.8 is Oracle Corporation’s
latest version that has several enhancements to the Java
Q.2 What are the different types of
operators used in Java? 10
Answer ;
Types of operators used in Java :
Operators are special symbols (characters) that carry out
operations on operands (variables and values). For example, + is an operator
that performs addition. In Java variables article, you learned to
Q.3 Differentiate between packages
and Interfaces. 10
Answer:
Defining a Package :
To create a package is quite easy:
simply include a package command as the first statement in a Java source file.
Any classes declared within that file will belong to the specified package. The
package statement defines a name space in which classes are stored. If you omit
the package statement, the class names are put into the default package, which
has no name. (This is why
Assignment
Set -2
Q.1 List and explain the different
components of an event? 10
Answer :
Components of an Event :
An event comprises of three
components:
● Event Object – When the user interacts with the application by pressing a key
or clicking a mouse button, an event is generated. The operating system traps
this event and the data associated with it, for example, the time at which the
event occurred, the event type (like a keypress or a mouseclick). This data is
then passed on to the application to which the event belongs. In Java, events
are represented by objects that describe the events themselves. Java has a
number of classes that describe and handle different categories of event.
Q.2 What is JDBC?
List down the steps to load ODBC driver?
10
Aswer :
Java Data Base Connectivity (JDBC) :
The JDBC API (Java Data Base
Connectivity Application Program Interface) can access any kind of tabular
data, especially data stored in a Relational Database. It works on top of ODBC
(Open Data Base Connectivity) which was the driver for database connectivity
since age old days but since ODBC was implemented in C so people from the VB
background had some problems in understanding the implementation intricacies.
Since JDBC works on top of ODBC we have something called as a JDBC-ODBC bridge
to access the database. JDBC helps you to write Java applications that manage
mainly three programming activities listed below namely:
Q.3 Write short notes on:
a) CORBA 5
b) BeanBox 5
Answer :
Common Object Request Broker Architecture (CORBA) :
CORBA stands for Common Object Request Broker Architecture. CORBA is a distributed computing technology
where the participating objects need not only be written in Java.
Java IDL :
● Java IDL is a
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
PROGRAM
Bachelor
of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT
CODE & NAME
BIT304 –
Data Base Management System
SET 1
Qus: 1 What is the basic purpose of
4NF?
Answer:
Fourth
and Fifth Normal Form
When
attributes in a relation have multi-valued dependency, further Normalisation to
4NF and 5NF are required. We will illustrate this with an example. Consider a
vendor supplying many items to many projects in an organisation. The following
are the assumptions:
1.
A vendor is capable of supplying many items.
2.
A project uses many items.
3.
A vendor
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
Qus:2 What is Heuristic Optimization?
Answer:
Heuristics
in Query Optimization
Heuristic
rule is applied for Query Optimization by modifying the internal representation
of query. This form of query is generally in the form of query tree or a query
graph data structure. Although some optimization technique were based on query
graph, nowadays, this technique is not applied because query graph cannot show
the order of operation which is needed by query optimizer for query execution.
So this unit will deal mainly with the Heuristic
Qus:3 What are
the advantages of a distributed database management system over a centralized
DBMS?
Answer:
Trade
offs in Distributing the Database
There
are several reasons for building distributed database systems, including
sharing of data, reliability and availability, and speedup of query processing.
However, along with these advantages come several disadvantages, including
software development cost, greater potential for bugs, and increased processing
overhead. In this section, we shall elaborate briefly on each of
SET 2
Qus:1 Outline the different function of database management
system.
Answer: There are several functions that a DBMS performs to ensure
data integrity and consistency of data in the database. The ten functions in
the DBMS are: data dictionary management, data storage management, data transformation
and presentation, security management, multiuser access control, backup and
recovery management, data integrity management, database access languages and
application programming interfaces, database
Qus:2 Discuss briefly relative data model.
Answer: The relational model today, is the primary data model for
commercial data processing applications. It has attained its primary position
because of its simplicity, which eases the job of the programmer, as
compared to earlier data models such as the network model or the hierarchical
model.
A database based on the relational
model developed by E.F. Codd allows the definition of data structures, storage
and retrieval operations and integrity constraints. In such a database the data
and
Qus:3 What are subqueries? Explain with example.
Answer: The expression following WHERE can be either a simple
predicate as explained above or it can be a query itself! This part of the
query following WHERE is called a Subquery.
A subquery, which in turn
is a query, can have its own subquery and the process of specifying subqueries
can continue ad infinitum! More practically, the process ends once the query
has been fully Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
No comments:
Post a Comment