ASSIGNMENT
DRIVE
|
Spring 2019
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0086, Mobile Computing
|
CREDIT
|
4
|
BK ID
|
B2067
|
MAX. MARKS
|
60
|
Q.1. Explain simple
reference model. 5+5
Answer:-
Simple reference
model:-
The basic reference model used to structure communication
Systems. Mobile communication is influenced by layered reference model.
In Figure, you
can see a Personal Digital Assistant (PDA) which is one of the example of
wireless and portable device. PDA is capable
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
Q.2. Write short
notes on Signals. 10
Answer:-
Signals:-
Signals are the physical representation of data. Signals are
functions of time and location. Signal parameters represent the data values.
The most interesting
Q.3. What do you
understand by Analog Modulation?
10
Answer:-
Analog modulation:-
In Analog modulation, the information carrying base band
signal typically called the message or information signal m(t) varies either
the amplitude or the angle of the
carrier signal (or radio carrier). The carrier signal has a higher frequency
which shifts the center frequency of the baseband signal up to the radio
carrier. It is the radio carrier which is capable of transmitting through
wireless media and hence,
Q.4. What is
Universal Mobile Telecommunication System (UMTS)? 10
Answer:-
Universal Mobile
Telecommunication System (UMTS):-
The development community of the wireless and mobile
communication wanted the cellular system which would provide more functionality
and greater levels of efficiency than the GSM system. So the International
Q.5. Write short
notes on Space Division Multiple Access (SDMA).
10
Answer:-
Space Division
Multiple Access (SDMA):-
Space Division Multiple Access (SDMA) is a medium accessing
scheme wherein the spaces are divided and separate spaces are allocated for
users in wireless networks. This scheme is applied when a typical
Q.6. What are the
Properties of a MANET?
10
Answer:-
Properties of a
MANET:-
i. Mobile ad hoc networks are based on wireless radio links.
ii. MANET is able to provide seamless interaction and ubiquitous mobile
computing environment.
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
ASSIGNMENT
DRIVE
|
Spring 2019
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0087 ,WML and WAP Programming-Theory
|
CREDIT
|
2
|
BK ID
|
B1182
|
MAX.: MARKS
|
30
|
Q.1. What is wireless
markup language? 10
Answer:-
WML (Wireless
Markup Language):-
WML is a mark-up language inherited from HTML, but is based
on XML (eXtensible Markup Language).so it is much stricter than HTML. WML is
used to create pages that can be displayed in a WAP browser or we can say WML
is the
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
Q.2. Explain WAP
architecture with diagram.
5+5
Answer:-
WAP architecture:-
The WAP architecture provides a scalable and extensible
environment for application development of mobile communication devices. The
goals of the WAP architecture are as follows.
i. Provide a web-centric application model for wireless data services
that utilizes the telephony, mobility, and other unique
Q.3. Mention the
different format attributes.
10
Answer:-
Format Attribute:-
The format attribute of the <input> element is used to
control the type and number of characters that can be entered in an input
field. The format attribute takes a number of format characters as its value.
Each format character
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
ASSIGNMENT
DRIVE
|
Spring 2019
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0088, Cryptography and Network
Security
|
BK ID
|
B2069
|
CREDITS
|
4
|
MARKS
|
60
|
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
Q.1. What is the need
for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime.
When you refer to a computing system, it means a collection of hardware,
software, storage media, data, and people that an organization uses to perform
computing tasks. Sometimes, you can see that parts of a computing system are
not valuable to an outsider, but often it is mistaken. For instance, we tend to
think that the most valuable property in a bank is the cash, gold
Q.2.What do you
understand by cryptography? 10
Answer:-
The
word cryptography comes from the Greek words kryptos meaning hidden and
graphein meaning writing. So cryptography is the study of hidden writing, or is
the science of encrypting and decrypting text. A fundamental rule in
cryptography is that one must assume that the cryptanalyst knows the methods
used for encryption
Q.3.What are
intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from
virus and hacking of information from your computer while you are online. For
effective computer security, one should take care of physical security measures
Q.4. Write short note
on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same
effect as a real signature: It is a mark that only the sender can make, but
other people can easily recognize as belonging to the sender. Just like a real
signature,
Q.5. Write short
notes on DES. 10
Answer:-
Data Encryption
Standard (DES):-
The most widely used encryption scheme is based on Data
Encryption standard. Data Encryption Standard (DES), a system developed for the
U.S. government, was intended for use by the general public. It has been officially
accepted as a cryptographic standard both in the United States and abroad.
Moreover, many
Q.6. Give an overview
of IP security. 10
Answer:-
Overview of IP
security:-
IPSec provides
connectionless, best-effort delivery of datagrams through a network by
protecting it from snooping or modification. IPSec protects IP datagrams by
defining a method of specifying the traffic to protect, how that traffic Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
ASSIGNMENT
DRIVE
|
Spring 2019
|
PROGRAM
|
BSC IT
|
SEMESTER
|
V
|
SUBJECT CODE & NAME
|
BT8902, E-COMMERCE
|
CREDIT
|
4
|
BK ID
|
B1186
|
MAX. MARKS
|
60
|
Q.1. What are the
main activities of Electronic Commerce? 10
Answer:-
Main Activities of
Electronic Commerce:-
a) Buying and
selling of products
b) Shipping of
products
c) Producing
financial statements
All the above functions are
Q.2. Mention the
benefits of e commerce.
10
Answer:-
Benefits of e
commerce:-
i. Sale and purchase of goods between producers and consumers can take
place without depending upon time or distance.
ii. Consumers have the benefit of browsing through an entire range of
products manufactured by different producers, thereby giving them a pool of
options to
iii. .
Q.3. Mention the
various Elements and Resources Impacting Electronic Commerce and Changes.
10
Answer:-
Elements and
Resources Impacting Electronic Commerce and Changes:-
E – Commerce has the ability to affect the way that an
organization operates in a multidimensional way. These elements have direct
impact on the development of your strategy, and show how much assistance you
may need to bring it into
Q.4. What are the different
characteristics of internet?
10
Answer:-
Characteristics of
Internet:-
The internet is a global network made up of thousands of
networks that communicate with each other. It brings the outside world to your
Q.5. Write a short
notes on World Wide Web.
10
Answer:-
World Wide Web
(WWW):-
World Wide Web or WWW is a repository of information spread
all over the world and linked together. WWW uses the concept of hypertext. A
hypertext is commonly known as a page and the main page of on organization is
called as homepage.
World Wide Web and Internet are not same
Q.6. What are the
different steps to build a homepage?
10
Answer:-
Steps to build a
homepage:-
Every company expects that when a user visits their website,
he/she must have a positive feedback regarding the company's website and in a
bid to encourage more users visit their website they have to ensure that the
homepage of the website must fulfill certain criteria.
1) Make the page unique: Companies
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
ASSIGNMENT
DRIVE SPRING 2019
PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT9001, Data Mining
Q.1
What is the relation between Data Warehousing and Data Mining? 10
Answer
:
Relation between Data Warehousing and Data
Mining :
The
connection between data warehouse and data mining is indisputable. Popular
business organizations use these technologies together. The current section
describes the relation between data warehouse and data mining. Data mining is
concerned with finding hidden relationships present in business data to allow
businesses to make predictions for future use. It is the process of data-driven
extraction of not so obvious but useful information from large databases. Data
mining has emerged as a key business intelligence technology. Data Mining is a
multi disciplinary field
Q.2 What is Online Analytical Processing
(OLAP)? 10
Answer
:
Online Analytical Processing (OLAP) :
Online
Analytical Processing (OLAP) is a technology that is used to create decision support
software. OLAP and data mining are used to solve different kinds of analytic
problems:
●
OLAP
summarizes data and makes forecasts. For example, OLAP answers questions like
"What are the
●
Q.2 Write short notes on Operational database
Systems versus Data Warehouses. 10
Answer
:
Operational database Systems versus Data
Warehouses :
Since most
people are familiar with commercial relational database systems, it is easy to
understand what a data warehouse is by comparing these two kinds of systems.
The major
task of on – line operational database system is to perform on – line
transaction and query processing. These systems are called on- line transaction
processing (OLTP) systems. They cover most of the day – to – day operations
of an organization, such as purchasing, inventory, manufacturing, banking,
payroll, registration, and accounting. Data warehouse systems, on the other
hand
Q.4
What are the objectives of using data mining in business is? 10
Answer :
The Objectives of using data mining in business
is:
●
To
help data engineers in a large corporation investigate the bad debts database
and uncover useful patterns in selecting targets for debt recovery, thereby
dramatically improving the
Q.5 What are different Business Intelligence Tools? 10
Answer
:
Business Intelligence Tools :
Business
Intelligence Tools should help interested users to compare and select the best
solution for their needs. According to the list of best business intelligence
tools prepared by experts from Finances Online the leading solutions in this
category comprise of systems designed to capture, categorize, and analyze
Q.6
What do you understand by Data Cleaning? 10
Answer
:
Data cleaning:
This
refers to the preprocessing of data in order to remove or reduce noise (by
applying smoothing techniques) and the treatment of missing values (e.g., by
replacing a missing value with the most commonly occurring value for that
attribute, or with the most probable value based on statistics.) Although most
classification algorithms have some mechanisms for handling noisy or missing
data, this step can help reduce confusion during learning. Real-world data tend
to be incomplete, noisy, and inconsistent. Data cleaning routines attempt to
fill in missing values, smooth out noise while
Its half solved only
New
smu SPRING 2019 solved assignments available with us
LAST
DATE IS 08-07-2019
charges Rs 99 per assignment (new price)
or
contact any time 8791490301,
08273413412 (both whatsapp no)
No comments:
Post a Comment