Thursday 13 June 2019

msc it 4th semester spring 2019 solved assignment, call or mail us fast


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

ASSIGNMENT
DRIVE SPRING 2019
PROGRAM MASTER OF COMPUTER APPLICATION
SEMESTER V
SUBJECT CODE & NAME Mit405– Data Warehousing and Data Mining

Assignment Set -1
Q.1 Explain the key issues during data warehouse construction.
Differentiate between data warehouse and OLTP databases.   5+5
Answer :
Differences between OLTP and Data Warehouse :

       Application databases are OLTP (On-Line Transaction Processing) systems where every transaction has to be recorded as and when it occurs. Consider the scenario where a bank ATM has disbursed cash to a customer but was unable to record this event in the bank records. If this


Q.2 Explain metadata classification. Using suitable diagram show the relationship between metadata classifications.           7+3
Answer :
Metadata classification :

Before gathering the overall collection strategy for metadata, the organization must access metadata requirements. The method is iterative process with planned intermittent release. It is the warehouse architect responsibility to define and determine the scope and importance of metadata to be collected before a strategy is put into place. It is the responsibility of the development team to assign

Q.3 Elaborate the basic tasks involve in data transformation.    10
Answer :
Basic tasks involve in data transformation :

Data transformations are often the most complex and, in terms of processing time, the most costly part of the ETL process. They can range from simple data conversions to extremely complex data scrubbing techniques. Before moving the extracted data from the source systems into the Data Warehouse, you inevitably have to perform various kinds of data transformations. You have to transform the data according to standards because they come from many dissimilar source

Assignment Set -II

Q.1 Differentiate between the following:
(a) Business Intelligence vs. Data warehouse          5
(b) Business Intelligence vs. Data mining                 5
Answer :
BI versus Data Warehouse :
Data Warehousing deals with all aspects of managing the development, implementation and operation of a data warehouse or data mart including Meta data management, data acquisition, data cleansing, data transformation, storage management, data distribution, data archiving, operational reporting, analytical reporting, security management, backup/recovery planning, etc. Business

Q.2 Explain the following:
(a) Database Management Systems (DBMS) vs. Data Mining.       5
(b) Data mining techniques.          5
Answer :            
Data Mining Vs Database Management System (DBMS) :
DBMS stands for “Database Management System". This is the software that manages data on physical storage devices. The software provides the ability to store, access and modify the data. The software also provides a suite of utilities to manage and monitor the performance on those actions against the data. Examples of a DBMS would be Oracle, SQL/Server, DB2 and Informix in the relational (

Q.3 List and describe the categories of web mining.       10
Answer :
Categories of Web Mining :

Web mining can be broadly defined as the discovery and analysis of useful information from the World Wide Web. Web mining can be broadly divided into three categories:

       Web Content Mining
       Web Structure Mining
       Web Usage Mining.

All of the three categories focus on the process of knowledge discovery of implicit, previously unknown and

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

MIT4064– Customer Relationship Management
Assignment Set - 1

Q1 Describe operational CRM and its components.
Answer:
Operational CRM
The customer-facing applications of CRM such as sales automation, enterprise marketing automation and customer service are known as operational CRM. 
Operational CRM emphasizes on automation of horizontally integrated business processes, together with

Q2 Elaborate the two ways of using the e-mail management capabilities in Enterprise Marketing Automation.
Answer:
There are two ways of using the e-mail management capabilities in MA. They are:
• Inbound e-mail management – It helps organizations to handle inbound queries raised by the customers. The inbound e-mail management is totally considered as a service-oriented activity. Organizations carry out

Q3 Explain customer response management via following:
(a)e-mail
(b)SMS
Answer:
Customer response management via email:
One of the most popular channels these days is e-mail, as the urban customer prefers to receive all the communication through electronic mail. It helps the customer not only to check the e-mails as and when convenient, but also provide them sufficient information online and thus reduce the need to visit stores and shops. When a company chooses to capture the customer response via e-mail, the company has to decide what responses must be captured as multi-level responses can be

Assignment Set - 2
Q1 Describe the followings:
(a)First part call control
 (b)Third party call control
Answer:
(a)First party call control
 In first party call control, there is a direct connection between the user’s personal computer (PC) and the telephone system. The telephone functionality is typically built into the computer with a modem card. This can also be

Q2 Describe the steps followed in CRM project planning.
Answer:
The following steps are followed in project planning:
1. Breaking up of the requirement specifications into smaller subtasks or activities
2. Sequencing of activities and identifying activities that can be implemented at the same time
3. Framing a

Q3 Describe the three business advantages and disadvantages of implementing application service provider (ASP).
Answer:
The three business advantages of implementing application service provider are:
• Pay-as-you-go – An ASP charges the company a monthly rental which can help spread the costs for the company.
• No 'extras' needed – The Company need not pay for any specialist or expensive hardware. That is, the

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

MIT4073- WIRELESS AND MOBILE COMMUNICATION

Set -1
Q1 Briefly explain the functions of each layer in the TCP/IP reference model?     5x2
Answer:
The TCP/IP Reference Model :
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used in the current Internet architecture as well. Protocols are set of rules which govern every possible communication over a network. These protocols describe the movement of data between the source and destination or the

Q2 Explain how Frequency Division Duplex (FDD) is applied in GSM standard for 900 MHz         (5X2)    10
Answer:
Frequency Division Duplex (FDD) is applied in GSM standard for 900 MHz :\
Frequency division multiple access (FDMA) is a medium accessing scheme by allocating frequencies to transmission channels according to the Frequency Division Multiplexing (FDM) scheme. Note that in FDM, medium is accessed by the users through the frequency allocated to them. Allocation of frequencies can either be fixed or dynamic. For example, frequency allocated is fixed for radio

Q3 Explain about the GSM TDMA frame with the help of frame structure.
Answer:
GSM – TDMA/FDMA Frame :

In GSM architecture that the entities are connected through certain type of interface. Each interface has its own use and functionality. For example, Um is a radio interface that comprises the mechanism for multiplexing and media access. Let us study how this interface that deploys TDMA/FDMA for media access works. GSM implements Space Division Multiple Access (SDMA) using cells with

Set -2
Q1 Explain the IEEE 802.11 protocol architecture.
Answer:
IEEE 802.11 protocol architecture :
IEEE 802.11 standard is often termed as Wi-Fi and has become the defacto standard. This standard is an example of WLANs. There are variety of standards under the IEEE 802.11 standards, each with a letter suffix. IEEE 802.11 standards cover everything for the wireless standards and include standards for security aspects, quality of service and other related to wireless

Q2 Justify that “There is the problem with TCP when it is used with the fixed networks together with mobile and wireless devices”.  10 10
Answer:
Mobile and wireless devices are connected to the fixed network through the access point. Slow start algorithm is a useful mechanism in fixed networks but it is not efficient when TCP is used together with mobile receivers or senders. It is because in networks with mobile and wireless end-systems, the main reason for packet loss may not be due to congestion. Remember that TCP concludes that a congestion situation has occurred whenever it detects a missing
Q3 Explain in brief the configuration parameters that needs to be adapted by the TCP in the wireless environments.            10
Answer:
Configuration parameters that needs to be adapted by the TCP in the wireless environments :
Transaction-oriented TCP (T/TCP) was developed for the mobile host that requires reliable transmission while sending a short request to a server time to time and gets responded with a short message. Standard TCP requires packets for connection setup and release for reliable and successful transfer of data packets. Since standard TCP requires several packets over the wireless link, it is not be suitable just for the transmission of short request or short message with several packets. Moreover, setup

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)




bca 4th semester spring 2019 solved assignment


Spring 2019 ASSIGNMENT
PROGRAM MCA
SEMESTER FOURTH
SUBJECT CODE & NAME MCA411- MICROPROSESSOR
CREDIT 4 BK ID B1778 MAX. MARKS 60
SET 1
Q1. Write short notes on:
a) Central Processing Unit
b) Memory Unit 5+5

Answer:
Central Processing Unit:
The central processing unit (CPU) is the electronic brain of the computer. CPU consists of Arithmetic Logic Unit (ALU) and Control Unit (CU).

(I) Arithmetic Logic Unit (ALU): The arithmetic


2 Explain the pin diagram of 8086 microprocessor
Answer:
8086 was the first 16-bit microprocessor available in 40-pin DIP (Dual Inline Package) chip. Let us now discuss in detail the pin configuration of a 8086 Microprocessor.
8086 Pin Diagram
Here is the pin

3 Write short notes on:
a) REP Prefix
b) Table Translation 5+5 10
Answer: A)
REP Prefix
Because string operations inherently involve looping, the 8086 machine language includes a prefix that considerably simplifies the use of string primitives with loops. This prefix has the machine code
1 1 1 1 10 0 1 Z
where, for

SET 2
1 Explain the interfacing of keyboard with 8086.
Answer:


2 Write a note on
(a) RS 232 standard
 (b) IEEE 488 standard 5+5 10
Answer: A) RS232 Standard
RS232 standard is developed by the Electronic Industry Association (EIA) in 1962 and was revised and renamed as RS232C. RS stands for "recommended standard." This is a standard hardware interface used for implementing asynchronous serial data communication ports on devices such as CRT terminals,

3 Write short note on:
a) Parallel Printer Interface (LPT)
b) Universal Serial Bus (USB) 5+5 10
Answer: A)
Parallel Printer Interface (LPT)
The parallel printer interface (LPT) is located on the rear panel of the PC. The LPT stands for line printer. The Parallel Port Interface on the PC compatible computer is one of the most flexible interfaces for connecting the PC to a wide range of devices. The interface was originally intended purely for connection to printers but due to the simple nature of the digital control lines it has found many other uses. Its simplicity relies on the fact that the data to and from the port forms an 8 bit binary on/off

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

Spring 2019 PROGRAM- MCA(REVISED FALL 2012)
SEMESTER- FOURTH
SUBJECT CODE & NAME- MCA412- PROBABILITY AND STATISTICS
SET 1
Q1.  Three machines A, B and C produce respectively 60%, 30% and 10% of the total number of items of a factory. The percentage of defective output of these machines are respectively 2%, 3% and 4%. An item is selected at random and is found to be defective. Find the probability that the item was produced by machine C.

Solution: Let P(A), P(B) and P(C) denote the probabilities of choosing an item produced by A, B, C respectively. Also, let P(X/A), P(X/B), P(X/C) denote the probabilities of choosing a defective item from the outputs of A, B, C respectively. Then, from what


Q3. The data shows the distribution of weight of students of 1st standard of a school. Find the quartiles.

Class Interval
13 - 18
18 - 20
20 - 21
21 – 22
22 - 23
23 - 25
25 – 30














Frequency
22
27
51
42
32

16
10














Solution:





















Class interval

Frequency

Cumulative frequency
















13
– 18


22


22





















SET 2

Q1. Fit a trend line to the following data by the freehand method:

Year
Production of wheat
Year
Production of wheat

(in tonnes)

(in tonnes)




1995
20
2000
25




1996
22
2001
23




1997
24
2002
26




1998
21
2003
25




1999
23
2004
24






Solution: Graphical representation of trend line relating to the production of wheat by the method of free hand curve is

Q2. Let X be a random variable and its probability mass function is  find the m.g.f. of X and hence its mean and variance.

Solution: By definition,

Q3. The diastolic blood pressures of men are distributed as shown in table. Find the standard deviation and variance.

Pressure(men)
78-80
80-82
82-84
84-86
86-88
88-90







No. of Men
3
15
26
23
9
4








Solution: The table represents the frequency distribution of data required for calculating the standard deviation.

Class
Mid
Frequency
x-83
d = (x-
fd
fd2
Interval
value X
‘f’

83)/2













 Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

ASSIGNMENT
DRIVE SPRING 2019
PROGRAM Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER III
SUBJECT CODE & NAME mca413 – OBJECT ORIENTED PROGRAMMING – JAVA
Assignment Set -1
Q.1 List any ten Java command tools with a short description of each.    1x10
Answer :
Java command tools :
A Java software development kit (SDK or "devkit") is a set of development tools that is used in developing applications for certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar platform. If J2SE 1.2 is used to develop


Q.2 What are the different types of operators used in Java?      10
Answer ;
Types of operators used in Java :
Operators are special symbols (characters) that carry out operations on operands (variables and values). For example, + is an operator that performs addition. In Java variables article, you learned to declare variables and assign values to variables. Now, you will learn to use operators to manipulate

Q.3 Differentiate between packages and Interfaces.      10
Answer:
Defining a Package :

To create a package is quite easy: simply include a package command as the first statement in a Java source file. Any classes declared within that file will belong to the specified package. The package statement defines a name space in which classes are stored. If you omit the package statement, the class names


Assignment Set -2
Q.1 List and explain the different components of an event?        10
Answer :
Components of an Event :

An event comprises of three components:

       Event Object – When the user interacts with the application by pressing a key or clicking a mouse button, an event is generated. The operating system traps this event and the data associated with it, for example, the time at which the event occurred, the event type (like a keypress or a mouseclick). This data is then passed on to the application to which the


Q.2 What is JDBC? List down the steps to load ODBC driver?     10
Aswer :
Java Data Base Connectivity (JDBC) :
The JDBC API (Java Data Base Connectivity Application Program Interface) can access any kind of tabular data, especially data stored in a Relational Database. It works on top of ODBC (Open Data Base Connectivity) which was the driver for database connectivity since age old days but since ODBC was implemented in C so people from the VB background had some problems in

Q.3 Write short notes on:
a) CORBA                   5
b) BeanBox                  5
Answer :
Common Object Request Broker Architecture (CORBA) :
CORBA stands for Common Object Request Broker Architecture.  CORBA is a distributed computing technology where the participating objects need not only be written in Java.

Java IDL :
       Java IDL is a technology for distributed objects-that is, objects interacting on different platforms across


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


Spring 2019 ASSIGNMENT
PROGRAM - MCA
SUBJECT CODE & NAME – mca414- ANALYSIS AND DESIGN OF ALGORITHMS
SET 1
Q1. Write the steps involved in analyzing the efficiency of non-recursive algorithms.
Answer: Answer:
The steps involved in analyzing the efficiency of non-recursive algorithms are as follows:
 Decide the input size based on the constraint n
 Identify the basic
Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


2 Define selection sort and explain how to implement the selection sort? 3+7=10
Answer:
Definition: Selection sort is one of the simplest and performance oriented sorting techniques that work well for small files. It has time complexity as O(n2) which is unproductive on large lists.
Implementation of


3 What is mean by Topological sort? And explain with example. 5+5=10
Answer: Topological sort is done using a directed acyclic graph (DAG), which is a linear ordering of all vertices G= (V, E) is an ordering of all vertices such that if G contains an edge (u, v), then u appears before v in the ordering. A topological sort of a particular graph can be looked upon as a

SET 2
1. Explain good-suffix and bad-character shift in Boyer-Moore algorithm. 5+5=10
Answer: Good suffix Shift
This shift helps in shifting a matched part of the pattern, and is denoted by Q. Good suffix shift Q is applied after 0 < k < m characters are matched.
Q = distance

2 Solve the Knapsack problem using memory functions.
Item 1 2 3 4
Weight 2 6 4 8
Value (in Rs.) 12 16 30 40
Knapsack capacity is given as W=12. Analyze the Knapsack problem using memory functions with the help of the values given above. 10
Answer:
 Knapsack Problem by Memory Functions

3 Describe Variable Length Encoding and Huffman Encoding.
Answer:
Variable Length Encoding
Variable-length codes can allow sources to be compressed and decompressed with zero error (lossless data compression) and still be read back symbol by symbol. With the right coding strategy an independent and identically-distributed source may be compressed almost arbitrarily close to its

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)