Monday, 3 June 2019

bsc it 5th semester solved assignment bt0086 and many in rs 99 per assignment


ASSIGNMENT
DRIVE
Spring 2019
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0086, Mobile Computing
CREDIT
4
BK ID
B2067
MAX. MARKS
60

Q.1. Explain simple reference model. 5+5
Answer:-
Simple reference model:-
The basic reference model used to structure communication Systems. Mobile communication is influenced by layered reference model.
In Figure, you can see a Personal Digital Assistant (PDA) which is one of the example of wireless and portable device. PDA is capable
Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

Q.2. Write short notes on Signals.                                                                                                       10
Answer:-
Signals:-
Signals are the physical representation of data. Signals are functions of time and location. Signal parameters represent the data values.
The most interesting

Q.3. What do you understand by Analog Modulation?                                                                       10
Answer:-
Analog modulation:-
In Analog modulation, the information carrying base band signal typically called the message or information signal m(t) varies either the amplitude or the angle  of the carrier signal (or radio carrier). The carrier signal has a higher frequency which shifts the center frequency of the baseband signal up to the radio carrier. It is the radio carrier which is capable of transmitting through wireless media and hence,

Q.4. What is Universal Mobile Telecommunication System (UMTS)?                                                 10
Answer:-
Universal Mobile Telecommunication System (UMTS):-
The development community of the wireless and mobile communication wanted the cellular system which would provide more functionality and greater levels of efficiency than the GSM system. So the International

Q.5. Write short notes on Space Division Multiple Access (SDMA).                                                    10
Answer:-
Space Division Multiple Access (SDMA):-
Space Division Multiple Access (SDMA) is a medium accessing scheme wherein the spaces are divided and separate spaces are allocated for users in wireless networks. This scheme is applied when a typical

Q.6. What are the Properties of a MANET?                                                                                            10
Answer:-
Properties of a MANET:-
 i.    Mobile ad hoc networks are based on wireless radio links.

ii.    MANET is able to provide seamless interaction and ubiquitous mobile computing environment.


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

ASSIGNMENT
DRIVE
Spring 2019
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0087 ,WML and WAP Programming-Theory
CREDIT
2
BK ID
B1182
MAX.: MARKS
30

Q.1. What is wireless markup language? 10
Answer:-
WML (Wireless Markup Language):-
WML is a mark-up language inherited from HTML, but is based on XML (eXtensible Markup Language).so it is much stricter than HTML. WML is used to create pages that can be displayed in a WAP browser or we can say WML is the
Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

Q.2. Explain WAP architecture with diagram.                                                                                      5+5
Answer:-
WAP architecture:-
The WAP architecture provides a scalable and extensible environment for application development of mobile communication devices. The goals of the WAP architecture are as follows.
      i.   Provide a web-centric application model for wireless data services that utilizes the telephony, mobility, and other unique


Q.3. Mention the different format attributes.                                                                                10
Answer:-
Format Attribute:-
The format attribute of the <input> element is used to control the type and number of characters that can be entered in an input field. The format attribute takes a number of format characters as its value. Each format character

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


ASSIGNMENT
DRIVE
Spring 2019
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0088, Cryptography and Network Security
BK ID
B2069
CREDITS
4
MARKS
60
Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

Q.1. What is the need for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime. When you refer to a computing system, it means a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks. Sometimes, you can see that parts of a computing system are not valuable to an outsider, but often it is mistaken. For instance, we tend to think that the most valuable property in a bank is the cash, gold

Q.2.What do you understand by cryptography?                                                                               10
Answer:-
The word cryptography comes from the Greek words kryptos meaning hidden and graphein meaning writing. So cryptography is the study of hidden writing, or is the science of encrypting and decrypting text. A fundamental rule in cryptography is that one must assume that the cryptanalyst knows the methods used for encryption

Q.3.What are intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from virus and hacking of information from your computer while you are online. For effective computer security, one should take care of physical security measures


Q.4. Write short note on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make, but other people can easily recognize as belonging to the sender. Just like a real signature,

Q.5. Write short notes on DES. 10
Answer:-
Data Encryption Standard (DES):-
The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has been officially accepted as a cryptographic standard both in the United States and abroad. Moreover, many

Q.6. Give an overview of IP security. 10
Answer:-
Overview of IP security:-
IPSec provides connectionless, best-effort delivery of datagrams through a network by protecting it from snooping or modification. IPSec protects IP datagrams by defining a method of specifying the traffic to protect, how that traffic Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)
ASSIGNMENT
DRIVE
Spring 2019
PROGRAM
BSC IT
SEMESTER
V
SUBJECT CODE & NAME
BT8902, E-COMMERCE
CREDIT
4
BK ID
B1186
MAX. MARKS
60

Q.1. What are the main activities of Electronic Commerce? 10
Answer:-
Main Activities of Electronic Commerce:-
a) Buying and selling of products
b) Shipping of products
c) Producing financial statements
All the above functions are

Q.2. Mention the benefits of e commerce.                                                                                         10
Answer:-
Benefits of e commerce:-
 i.    Sale and purchase of goods between producers and consumers can take place without depending upon time or distance.

ii.    Consumers have the benefit of browsing through an entire range of products manufactured by different producers, thereby giving them a pool of options to

iii.    .

Q.3. Mention the various Elements and Resources Impacting Electronic Commerce and Changes.
10
Answer:-
Elements and Resources Impacting Electronic Commerce and Changes:-
E – Commerce has the ability to affect the way that an organization operates in a multidimensional way. These elements have direct impact on the development of your strategy, and show how much assistance you may need to bring it into

Q.4. What are the different characteristics of internet?                                                                       10
Answer:-
Characteristics of Internet:-
The internet is a global network made up of thousands of networks that communicate with each other. It brings the outside world to your



Q.5. Write a short notes on World Wide Web.                                                                                  10
Answer:-
World Wide Web (WWW):-
World Wide Web or WWW is a repository of information spread all over the world and linked together. WWW uses the concept of hypertext. A hypertext is commonly known as a page and the main page of on organization is called as homepage.
World Wide Web and Internet are not same

Q.6. What are the different steps to build a homepage?                                                                      10
Answer:-
Steps to build a homepage:-
Every company expects that when a user visits their website, he/she must have a positive feedback regarding the company's website and in a bid to encourage more users visit their website they have to ensure that the homepage of the website must fulfill certain criteria.
1)      Make the page unique: Companies


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


ASSIGNMENT
DRIVE SPRING 2019
PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT9001, Data Mining

Q.1 What is the relation between Data Warehousing and Data Mining?        10
Answer :
Relation between Data Warehousing and Data Mining :

The connection between data warehouse and data mining is indisputable. Popular business organizations use these technologies together. The current section describes the relation between data warehouse and data mining. Data mining is concerned with finding hidden relationships present in business data to allow businesses to make predictions for future use. It is the process of data-driven extraction of not so obvious but useful information from large databases. Data mining has emerged as a key business intelligence technology. Data Mining is a multi disciplinary field

Q.2  What is Online Analytical Processing (OLAP)?       10
Answer :
Online Analytical Processing (OLAP) :

Online Analytical Processing (OLAP) is a technology that is used to create decision support software. OLAP and data mining are used to solve different kinds of analytic problems:

       OLAP summarizes data and makes forecasts. For example, OLAP answers questions like "What are the
        


Q.2 Write short notes on Operational database Systems versus Data Warehouses.      10
Answer :
Operational database Systems versus Data Warehouses :

Since most people are familiar with commercial relational database systems, it is easy to understand what a data warehouse is by comparing these two kinds of systems.
The major task of on – line operational database system is to perform on – line transaction and query processing. These systems are called on- line transaction processing (OLTP) systems. They cover most of the day – to – day operations of an organization, such as purchasing, inventory, manufacturing, banking, payroll, registration, and accounting. Data warehouse systems, on the other hand

Q.4 What are the objectives of using data mining in business is?           10
Answer :        
The Objectives of using data mining in business is:

       To help data engineers in a large corporation investigate the bad debts database and uncover useful patterns in selecting targets for debt recovery, thereby dramatically improving the


Q.5 What are different Business Intelligence Tools?        10
Answer :
Business Intelligence Tools :
Business Intelligence Tools should help interested users to compare and select the best solution for their needs. According to the list of best business intelligence tools prepared by experts from Finances Online the leading solutions in this category comprise of systems designed to capture, categorize, and analyze


Q.6 What do you understand by Data Cleaning?           10
Answer :
Data cleaning:

This refers to the preprocessing of data in order to remove or reduce noise (by applying smoothing techniques) and the treatment of missing values (e.g., by replacing a missing value with the most commonly occurring value for that attribute, or with the most probable value based on statistics.) Although most classification algorithms have some mechanisms for handling noisy or missing data, this step can help reduce confusion during learning. Real-world data tend to be incomplete, noisy, and inconsistent. Data cleaning routines attempt to fill in missing values, smooth out noise while


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)






No comments:

Post a Comment