Monday 1 July 2019

smu mca 5th sem spring 2019 solved assignment


ASSIGNMENT
DRIVE SPRING 2019
PROGRAM MASTER OF COMPUTER APPLICATION
SEMESTER V
SUBJECT CODE & NAME MCA5133 –OPEN SOURCE DB SYSTEMS
Assignment Set -1

Q.1 Explain ACID properties in transaction management.        2.5x4
Answer :
ACID properties in transaction management :

Transaction is an event which reads or writes a value on the database. Every transaction must adhere to four properties. Taking their initials letters collectively known as ACID properties. These properties are,

1. Atomicity: A transaction is an atomic unit of data processing i.e. it is either performed in its entirety or not performed at all.

2. Consistency preservation: A transaction is consistency preserving. That means complete execution of a transaction takes the database from one consistent state to another.

3. Isolation: A transaction should appear as though it is being executed in isolation from other transactions. That is, the execution of a transaction should not be interfered with by any other transactions executing


Q.2 What are the key issues one has to keep in mind while choosing open source software?      10
Answer :
Key issues one has to keep in mind while choosing open source software :

A developer chooses an open source or free software license depending on the situation. The developer may not carefully choose the license. Every license has its own advantages and disadvantages. Developer selects the license depending on the circumstance under which he has to operate the project. The
Q.3 Explain Relational algebra operations in detail.        10
Answer:
Relational algebra operations :
In addition to defining the database structure and constraints, a data model must include a set of operations to manipulate the data. A basic set of relational model operations constitute the relational algebra. These operations enable the user to specify basic retrieval requests. A sequence of relational algebra operations forms a relational algebra expression, whose result will also be a relation. The

Assignment Set -2

Q.1 Differentiate between PHP variables and constants. Also, explain PHP magic constants.      5+5
Answer :
PHP Variable :
Variables are used to store information in a PHP program. There are certain rules for creating variables in PHP. They are,
·         Variable names must begin with a letter or underscore character.
·         A variable name cannot use


Q.2 Explain inheritance in PostgreSQL and mention its limitations.       5+5
Answer:
Inheritance in PostgreSQL :
Inheritance is the property in which one table acquires or inherits the properties of another table. This is a concept from object-oriented database. Let's create two tables: A table Bank and a table Branches. Naturally, Branches are also Banks, so we need a way to show the Branches implicitly when we list all Banks. Consider the example given below,

CREATE TABLE


Q.3  Explain about Data management in InnoDB.               4x2.5
Answer :
Data management in InnoDB :
InnoDB uses B+tree structure. In this tree, the inner nodes do not contain data, and the leaves are connected to both directions, to the predecessor and the successor. A B+tree is particularly efficient when data doesn’t fit in memory and must be read from the disk, as it ensures that a fixed maximum number of reads would be required to access any data requested, based only on the depth of the tree. Every InnoDB table has a special index called the clustered index where the data for the rows is stored. Typically, the clustered index is synonymous with the


Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)


ASSIGNMENT
DRIVE SPRING 2019
PROGRAM MASTER OF COMPUTER APPLICATION
SEMESTER V
SUBJECT CODE & NAME MCA5142 Cryptography and Network Security

Assignment Set -1
Q.1 What are the two requirements for symmetric key encryption?     4
Describe the dimensions used to characterize the cryptographic systems     6
Answer :
Cryptographic systems are characterized along three independent dimensions:
1. The type of operations used for transforming plaintext to cipher text. All encryption algorithms are based on two general principles: substitution, in which each element in the plaintext (bit, letter, group of bits or letters) is mapped into another element, and transposition, in which elements in the plaintext are rearranged. The fundamental requirement is that no information be lost (i.e., that all operations are reversible). Most systems, referred to as product systems , involve

Q.2 Describe the following :    4x2.5
a) Asymmetric Keys   
b) Public Key Certificate
c) Public Key (Asymmetric) Cryptographic Algorithm
d) Public Key Infrastructure
Answer :
Asymmetric Key :
Asymmetric keys are the foundation of Public Key Infrastructure (PKI) a cryptographic scheme requiring two different keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One key is published (public key) and the other is kept private (private key). If the lock/encryption key is the one published, the system enables private communication from the public to the unlocking key's owner. If the unlock/decryption key is the one published,

Q.3 List and explain two categories of attacks on hash functions.    2+8
Answer :
Hashing is, simply put, taking an input string of any length and giving out an output of a fixed length.
Cryptographic hashing refers a special class of hash functions with set properties. To be considered secure, a cryptographic hash function needs to include properties such as always getting a consistent result irrespective of how many times you parse through an input, quick computation, and pre


Assignment Set -II

Q.1 Describe the three types of attacks on digital signatures. Also explain different The types of forgery        6+4
Answer :         
Message authentication protects two parties who exchange messages from any third party. However, it does notprotect the two parties against each other. Several forms of dispute between the two 

Q.2 Discuss the distribution of public keys using following methods:
a) Public announcement        5
b) Public-key authority               5
Answer :
Public Announcement of Public Keys :



Q.3 List and explain the different techniques used for ensuring non guessable passwords. 2+8
Answer :
In an exhaustive or brute force attack, the attacker tries all possible passwords, usually in some automated fashion. Of course, the number of possible passwords depends on the implementation of the particular computing system. For example, if passwords are words consisting of the
26 characters A–Z and can be of any length from 1 to 8 characters, there are 261 passwords of 1 character, 262 passwords of 2 characters,

Its half solved only
New smu SPRING 2019 solved assignments available with us 
LAST DATE IS  08-07-2019
charges Rs 99 per assignment (new price)
If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com
or contact any time 8791490301, 08273413412 (both whatsapp no)

·          


No comments:

Post a Comment