Wednesday, 29 May 2019

bsc it 3 semester smu spring 2019 solved assignment last date is 8 july 2019


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)
PROGRAM
Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT CODE & NAME
BIT301 – Operating System
SET 1
Qus:1 Summarize about Interprocess Communication.
Answer:
Interprocess Communication
Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system. This allows a program to handle many user requests at the same time. Communication of co-operating processes shared-memory environment requires that these processes share a common buffer pool, and that the code for implementing the buffer be explicitly written by the application programmer. Another way to achieve the same effect is for the operating system to provide the means for co-operating processes to communicate with

Qus:2 Write a note on External Fragmentation
Answer:
External fragmentation
Segments of user programs are allocated memory by the bob scheduler.
This is similar to paging where segments could be treated as variable sized pages. So a first-fit or best-fit allocation scheme could be used since this is a dynamic storage allocation problem. But, as with variable sized partition scheme, segmentation too causes external fragmentation. When any free memory segment is too small to be allocated to a segment to be loaded, then external fragmentation is said to have occurred. Memory compaction is a solution to overcome

Qus:3 Discuss the different methods of implementing a Directory.
Answer:
The two main methods of implementing a directory are:
Linear list
Hash table
Linear list
A linear list of file names with pointers to the data blocks is one way to implement a directory. A linear search is necessary to find a particular file. The method is simple but the search is time consuming. To create a file, a linear search is made to look for the existence of a file with the same file name and if no such file is found the new file created is added to the directory at the end. To delete a file, a linear search for the file name is made and if found allocated space is released. Every time making a linear search consumes time and increases access

SET 2

Qus:1 Write a short note on Multi-programmed Batched Operating Systems.
Answer: The concept of spooling introduced an important data structure called the job pool. Spooling creates several jobs on the disk ready for execution or processing. The operating system now has to choose from the job pool, a job that is to be executed next. This increases CPU utilization as CPU is continuously utilized for execution of multiple programs one after another.Jobs in the job pool may be scheduled for execution in any order (not necessarily in

Qus:2 What are the different information stored in a process control block (PCB)?
Answer: In order to manage and coordinate the various processes, the operating system identify these processes in terms of numbers and Process Control Block (PCB). A Process Control Block is a data structure maintained by the Operating System for every process. A PCB keeps all the information needed to keep track of a process. The PCB serves as a repository

Qus:3 Discuss in details about deadlock prevention.
Answer: The four necessary conditions for deadlocks to occur are mutual exclusion, hold and wait, no preemption and circular wait. If any one of the above four conditions does not hold, then deadlocks will not occur. Thus prevention of deadlock is possible by ensuring that at least one of the four conditions cannot hold.
 Mutual exclusion: Resources that can be shared are never involved in a deadlock because such resources can always be Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

PROGRAM
Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT CODE & NAME
BIT302 – Computer Networks

Qus:1 Discuss about Packet Scheduling.
Answer:
Packet Scheduling
Algorithms that allocate router resources among the packets of a flow and between competing flows are called packet scheduling algorithms. Three different kinds of resources can potentially be reserved for different flows. They are bandwidth, bufferspace and CPU cycles. Packet scheduling algorithms allocate bandwidth and other router resources by determining which of the buffered packets to send on the output line next. Each router buffers packets in a queue for each output line until they can be sent, and they are sent in the same order that they arrived. This algorithm is known as FIFO (First-In First-Out), or equivalently FCFS (First-Come Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)
Qus:2 Discuss working mechanism of SMTP.
Answer:
Simple Mail Transfer Protocol (SMTP)
The basic Internet mail protocols provide mail and message exchange between TCP/IP hosts, but generally require that data be represented as 7-bit ASCII text. Because this can be restrictive, facilities have been added for the transmission of data that cannot be represented in this manner.
Simple Mail Transfer Protocol (SMTP) is a standard for the exchange of mail between two computers, which specified the protocol used to send mail between TCP/IP hosts.

Working

Qus:3 Discuss briefly the Domain Name System.
Answer:
The Domain Name System
We can refer web pages, mailboxes and other resources by using network address (IP address) of the computers on which they are stored. But these addresses are hard for people to remember and reproduce. Consequently, high-level, readable names were introduced in order to decouple machine names from machine addresses.

The initial solution for name resolution on the Internet was a file named Hosts.txt that was used on the now obsolete Advanced Research Projects Agency network (ARPANET), the predecessor of the modern day Internet.
When the

Set 2
Qus:1 Discuss in details about OSI Reference Model.
Answer: The OSI Model is based on the protocol developed by ISO (International Standards Organization) as the first step towards international standardization of the protocols used in the various layers. This model deals with connecting open systems, so it is called ISO OSI (Open Systems Interconnection). OSI model has seven layers, each layer is created when where a different abstraction is needed, and each layer has well-defined function. The OSI model is shown in

Qus:2 Discuss in details about Clock-based Framing (SONET).
Answer: Clock- based framing is another approach to framing, and is represented by the Synchronous Optical Network (SONET) standard. SONET was first proposed by Bell Communications Research (Bellcore), and then developed under the American National Standards Institute (ANSI) for digital transmission over optical fiber; it has since been adopted by the ITU-T.
SONET has been

Qus:3 Discuss in details about Internet protocol version 4 (IPV4).
Answer: IPV4 is a connectionless protocol and is unreliable. It is primarily responsible for addressing and routing packets between hosts. A higher layer protocol such as TCP or an application protocol must acknowledge delivered packets and recover lost packets if required. IPV4 is defined in RFC 791. Figure shows the datagram format of IPV4. It consist of IPV4 header and Payload. Header consists of Source address, destination address, identification number, checksum

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

ASSIGNMENT
DRIVE SPRING 2019
PROGRAM Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER III
SUBJECT CODE & NAME BIT303 – OBJECT ORIENTED PROGRAMMING – JAVA
Assignment Set -1
Q.1 List any ten Java command tools with a short description of each.    1x10
Answer :
Java command tools :
A Java software development kit (SDK or "devkit") is a set of development tools that is used in developing applications for certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar platform. If J2SE 1.2 is used to develop applications, then you are using the platform what's known as the Java 2 Platform. The latest Java 8 or J2SE 1.8 is Oracle Corporation’s latest version that has several enhancements to the Java

Q.2 What are the different types of operators used in Java?      10
Answer ;
Types of operators used in Java :
Operators are special symbols (characters) that carry out operations on operands (variables and values). For example, + is an operator that performs addition. In Java variables article, you learned to

Q.3 Differentiate between packages and Interfaces.      10
Answer:
Defining a Package :

To create a package is quite easy: simply include a package command as the first statement in a Java source file. Any classes declared within that file will belong to the specified package. The package statement defines a name space in which classes are stored. If you omit the package statement, the class names are put into the default package, which has no name. (This is why


Assignment Set -2
Q.1 List and explain the different components of an event?        10
Answer :
Components of an Event :

An event comprises of three components:

       Event Object – When the user interacts with the application by pressing a key or clicking a mouse button, an event is generated. The operating system traps this event and the data associated with it, for example, the time at which the event occurred, the event type (like a keypress or a mouseclick). This data is then passed on to the application to which the event belongs. In Java, events are represented by objects that describe the events themselves. Java has a number of classes that describe and handle different categories of event.


 Q.2 What is JDBC? List down the steps to load ODBC driver?     10
Aswer :
Java Data Base Connectivity (JDBC) :
The JDBC API (Java Data Base Connectivity Application Program Interface) can access any kind of tabular data, especially data stored in a Relational Database. It works on top of ODBC (Open Data Base Connectivity) which was the driver for database connectivity since age old days but since ODBC was implemented in C so people from the VB background had some problems in understanding the implementation intricacies. Since JDBC works on top of ODBC we have something called as a JDBC-ODBC bridge to access the database. JDBC helps you to write Java applications that manage mainly three programming activities listed below namely:

Q.3 Write short notes on:
a) CORBA                   5
b) BeanBox                  5
Answer :
Common Object Request Broker Architecture (CORBA) :
CORBA stands for Common Object Request Broker Architecture.  CORBA is a distributed computing technology where the participating objects need not only be written in Java.

Java IDL :
       Java IDL is a


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


PROGRAM
Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER
III
SUBJECT CODE & NAME
BIT304 – Data Base Management System
SET 1
Qus: 1 What is the basic purpose of 4NF?
Answer:
Fourth and Fifth Normal Form
When attributes in a relation have multi-valued dependency, further Normalisation to 4NF and 5NF are required. We will illustrate this with an example. Consider a vendor supplying many items to many projects in an organisation. The following are the assumptions:
1. A vendor is capable of supplying many items.
2. A project uses many items.
3. A vendor

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


Qus:2 What is Heuristic Optimization?
Answer:
Heuristics in Query Optimization
Heuristic rule is applied for Query Optimization by modifying the internal representation of query. This form of query is generally in the form of query tree or a query graph data structure. Although some optimization technique were based on query graph, nowadays, this technique is not applied because query graph cannot show the order of operation which is needed by query optimizer for query execution. So this unit will deal mainly with the Heuristic


Qus:3 What are the advantages of a distributed database management system over a centralized DBMS?
Answer:
Trade offs in Distributing the Database
There are several reasons for building distributed database systems, including sharing of data, reliability and availability, and speedup of query processing. However, along with these advantages come several disadvantages, including software development cost, greater potential for bugs, and increased processing overhead. In this section, we shall elaborate briefly on each of

SET 2
Qus:1 Outline the different function of database management system.
Answer: There are several functions that a DBMS performs to ensure data integrity and consistency of data in the database. The ten functions in the DBMS are: data dictionary management, data storage management, data transformation and presentation, security management, multiuser access control, backup and recovery management, data integrity management, database access languages and application programming interfaces, database

Qus:2 Discuss briefly relative data model.
Answer: The relational model today, is the primary data model for commercial data processing applications. It has attained its primary position because of its simplicity, which eases the job of the programmer, as compared to earlier data models such as the network model or the hierarchical model.
A database based on the relational model developed by E.F. Codd allows the definition of data structures, storage and retrieval operations and integrity constraints. In such a database the data and


Qus:3 What are subqueries? Explain with example.
Answer: The expression following WHERE can be either a simple predicate as explained above or it can be a query itself! This part of the query following WHERE is called a Subquery.
A subquery, which in turn is a query, can have its own subquery and the process of specifying subqueries can continue ad infinitum! More practically, the process ends once the query has been fully Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)



No comments:

Post a Comment