Internal Assignment- 1st
Java Programming
1.What
are the benefits of inheritance? Explain the various forms of inheritance with
suitable code segments.
Ans.
Inheritance are code reusability and readability. When child class inherits the
properties and functionality of parent class, we need not to write the same
code again in child class. This makes it easier to reuse the code, makes us
write the less code and the code becomes much more vvvIts Half solved only
SURESH GYAN VIHAR University Fully solved
assignment available
Lowest price guarantee with quality.
Charges INR 300 only per
assignment. For more information you can get via mail or Whats
app also
Mail id is aapkieducation@gmail.com
Our website www.aapkieducation.com
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
2(c). How to
define a package? How to access, import a package? Explain with examples.
Ans. A java package is a
group of similar types of classes, interfaces and sub-packages. Package in java
can be categorized in two form, built-in package and user-defined package.There
are many built-
Part- B
2(a). What are the advantages of multithreading?
Ans. 1) It doesn't block
the user because threads are independent and you can perform multiple
operations
2(b). What is an adapter class? What is its significance? List the
adapter classes.
Ans. An adapter class provides the default implementation of all methods in an event listener
interface. Adapter classes are very useful when you want to process only
few of the events that are
2(c). String manipulation functions of Java String class.
Ans.
Method |
Description |
Return Type |
2(d). The thread states.
Ans. A thread lies only in one of the shown states at any instant:
·
New.
2(e). Data Abstraction:
Ans. Data abstraction is the reduction of a particular body of data to a simplified representation
of the whole. Abstraction, in general
Assignment- 2nd
Java Programming
1(a).
Explain method overriding with a
suitable example program.
Ans. If subclass (child class) has the
same method as declared in the parent class, it is known as method
overriding in Java.
In other
2(c) Describe the need of thread
synchronization. How is it achieved in Java programming? Explain with a
suitable program.
Ans. The process of allowing
multiple threads to modify an object in a sequence is called synchronization.
We can allow multiple threads to modify the objects sequentially only by
executing that objects’ mutator methods logic in sequence from multiple
threads. This is possible by using an object locking
Part- 2nd
2(a).
AWT
Ans.:
Abstract Window Toolkit (AWT) is a set of application program
interfaces ( API s) used by Java
2(b).
The hash table constructors:
Ans.: It accepts an integer
parameter and creates a hashtable that contains a specified initial
capacity. It is used to create a hashtable having the specified initial
capacity and load Factor. It creates a new
.
2(c). Polymorphism Ans.: In programming languages and type theory, polymorphism
is the provision of a single interface to entities of different types
or the use of a single symbol to represent multiple different types. The
concept 2(d).
Interface and
Abstract class Ans.:
2(e).
Thread and Process Ans.: Process:
|
Internal Assignment-1st
Mobile Computing
1(a).
With neat sketch explain the architecture of WAP and its operational support.
with neat sketch explain the layered structural arrangement of mobile computing
and various service protocols used in it.
Ans.
WAP is designed in a layered fashion, so that it can
be extensible, flexible, and scalable. As a result, the WAP protocol stack is
divided into five layers −
Layers of
Its Half solved only
SURESH GYAN VIHAR University Fully solved
assignment available
Lowest price guarantee with quality.
Charges INR 300 only per
assignment. For more information you can get via mail or Whats
app also
Mail id is aapkieducation@gmail.com
Our website www.aapkieducation.com
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
1(b). Explain how GPRS
networks replace circuit switch services on second generation GSM
communications. Explain its services and operations in detail.
Ans. General Packet
Radio System is also known as GPRS is a
third-generation step toward internet access. GPRS is also known as GSM-IP that
is a Global-System Mobile Communications Internet Protocol as it keeps the
users of this system online, allows to make voice calls, and
Part- 2nd
2(a). What are the advantages and disadvantages of push-based
mechanism?
Ans. Advantages
of Push based mechanisms:
Push-based mechanisms enable broadcast
of data services to multiple devices. The server is not
2(b). Give reasons for a handover in GSM and the
problems associated with it.
Ans. The
typical reason for a handover is a weaker signal from the current base
station compared with a
2(c). Advantages of hoarding the data at mobile
device.
Ans. The advantage of
hoarding is that there is no access latency (delay in
retrieving the queried record from the server over
2(d).
Advantages of Snooping TCP.
Ans. Advantages of Snooping TCP:
·
The end-to-end TCP
semantic is preserved – The packet is not acknowledged by the FA. ...
·
No Modifications at
2(e). Differentiate
mobile computing, ubiquitous computing and pervasive computing.
Ans. Pervasive means "diffused throughout every part of." Pervasive computing would be in all
parts of your
Internal Assignment-2nd
Mobile Computing
1(a).
Describe the Two-tier
Client-Server Architecture in mobile environment. How it can be expanded to
n-tier architecture? Explain about Number of adaptations and various algorithms
for broadcast models.
Ans. 2-Tier Architecture:
It is like
Client-Server architecture, where communication takes place between client and
server.
In this type
2(b). What
do you mean by Query processing? Explain the Query Processing architecture.
Ans. Query
processing denotes the compilation
and execution of a query specification usually expressed in a declarative
database query language such as the structured query language
(SQL). Query processing
Part 2
2(a). What are the functions of authentication and encryption in
GSM?
Ans. GSM
encryption is the means by which phone conversations on networks using
GSM are scrambled, such that they cannot be descrambled and intercepted by
others. Due to their potential uses
2(b). Bluetooth Services in android.
Ans.Bluetooth Service: Bluetooth telephony services lets users stream calls and sync contacts
from a phone to
2(c).
How and why does I-TCP isolate
problems on the wireless link?
Ans. TCP performance
is affected by the frequent losses
occurring at the link layer, because TCP inherently assumes
2(d). How to create .apk file?
1.Make sure you have prepared your code for the Google Play Store.
2. In Android
.
2(e). Directory
method.
Ans. Directory. Create
Directory method creates a directory or folder in the specified
path with the specified Windows security. You can also create a directory on a
remote computer. The following code snippet
Internal Assignment- 1st
Optimization Technique
1
(b). Solve the following LPP by graphical method Minimize Z=3x1+2x2
Subject
to :
5x1+
x2 >l0 x1+ 4x2 > l2 x1, x2 > 0
Solution: Given that 5x1 + x2 ≥ 10
Let 5x1 + x2 = 10
Its Half solved only
SURESH GYAN VIHAR University Fully solved
assignment available
Lowest price guarantee with quality.
Charges INR 300 only per
assignment. For more information you can get via mail or Whats
app also
Mail id is aapkieducation@gmail.com
Our website www.aapkieducation.com
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
2.
Solve the LPP by graphical method
Minimize
Z = 25x + 30y Subject to
4x
+ 3y ≥ 60
2x
+ 3y ≥ 36
x,
y ≥ 0
Solution: Z= 25x+30y…… (i)
subject
to the constraints
4x+3y≥ 60
2x+3y≤
36
1(c).
Vehicle arrives at Petrol pump with mean rate of 30 per hour. The time required
to serve a customer has an exponential distribution with mean of 90 seconds.
Find the following.
i) Probability that Server is busy
ii)
Probability that vehicle should not wait
iii) Average waiting time of customer.
iv)
Average number of customer in the system
v)
Average queue length?
Sol:
(i). P0+P1+P3= (1- λ/ μ)+ λ/ μ (1-λ/ μ)+ (λ/ μ)^2 (1-λ/ μ)=
1- λ/ μ(1+ λ/ μ+ (λ/ μ)^2)
= 1- 30/40
Part- 2nd
2(a).
Economic Order Quantity by trial and error method
Ans. Under tabular approach of determining economic order
quantity, the combined ordering and holding
2(b). Solutions for sequencing problem
Ans. When a
number of jobs are given to be done and they require processing on two or more
machines, the main concern of a manager is to find the order or sequence to
perform these jobs. We shall consider the sequencing problems in respect of the
2(c). Economic order
Quantity for purchase model.
Ans. Economic order quantity (EOQ) is the ideal order quantity a company should
purchase to minimize inventory costs such as holding costs,
shortage costs, and order costs. This production-
2(d). Sequencing of 'N' Jobs On three machines
Ans. n jobs are to be processed on 2 machines, say,
machine A and machine B in the order AB. This means
2(e). Assumptions Made in Sequencing Problems
Ans. Each operation, once started, must be completed Assumptions
we use while dealing with sequencing
Internal Assignment- 2nd
Optimization Technique
1(c).
The marriott tube company manufactures two lines of bathtub, called model a and
model b.
1(b).The
sweet smell fertilizer company markets bags of manure labeled "not less
than 60 pounds dry weight." the packaged manure is a combination of
compost and sewage wastes. to provide good-quality fertilizer, each bag should
contain at least 30 pounds of compost but no more than 40 pounds of sewage.
each pound of compost costs sweet smell 5 cents and each pound of sewage costs
4 cents. use linear programming to determine the least cost blend of compost
and sewage in each bag.
Part- 2nd
2(a).Processing
of 2-Jobs on 'M' Machine
Ans.
No passing of jobs is
permitted i.e. the same order over each machine is maintained. Our objective
will be to find the optimal sequence of jobs which minimizes the total elapsed
time. No general procedure is available so far for obtaining an optimal
sequence in such case.
Solution.
Jobs |
2(b).
Probability or Stochastic Models
Ans.
Stochastic modeling
2(c).
CPM AND PERT: Network
Representation
Ans. PERT project
2(d). Formulation of an LPP
Ans. The process to formulate a Linear Programming problem
Identify the decision
2(e). Graphical Method
Ans. Graphical method, or Geometric method, allows solving simple linear programming problems intuitively and Internal Assignment 1st
Data
& Analysis of Algorithm
1(b). Explain Travelling sales person problem LCBB procedure with
the following instance and draw the portion of the state space tree and find an
optimal tour.
Ans.. The
traveling salesman problem consists of a salesman and a set of cities. The
salesman has to visit each one of the cities starting from a certain one (e.g.
the hometown) and returning to the same city. The challenge of the problem is
that the traveling salesman wants to minimize the total length of the trip.
The traveling
salesman problem can be described as follows:
TSP = {(G, f, t): G =
(V, E) a complete graph,
f is a function V×V
Z, →
t ∈ Z,
G is a graph Its Half solved
only
SURESH GYAN VIHAR University Fully solved
assignment available
Lowest price guarantee with quality.
Charges INR 300 only per
assignment. For more information you can get via mail or Whats
app also
Mail id is aapkieducation@gmail.com
Our website www.aapkieducation.com
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
1(c).
Discuss the time and space complexity of Dynamic Programming travelling
salesperson algorithm.
Ans.. Traveling salesman problem is a NP-hard problem.
Until now, researchers have not found a polynomial time algorithm for traveling
salesman problem. Among the existing algorithms, dynamic programming algorithm
can solve the problem in time O(n^2*2^n) where n is the number of nodes in the
graph. The branch-and-cut algorithm has been applied to solve the problem with
a large
2(a).
Optimal Solution.
Ans.. An optimal solution is a feasible
solution where the objective function reaches its maximum (
2(b). Distinguish between Algorithm and
Pseudocode.
Ans. 1. An algorithm is a step by step procedure to solve a given problem
while a pseudocode is a method of writing an algorithm.
2. An
2(c). What is the time complexity of the Job sequencing with
deadlines using greedy algorithm?
Ans. Job sequencing is
the set of jobs, associated with the job i where
deadline di
>= 0 and profit pi > 0. For any job i the profit
is earned if and only if the job is completed by its deadline. To complete a
job,
2(d). Describe Different characteristics of an algorithm.
Ans. Characteristics of an
Algorithm
·
Unambiguous −
Algorithm should be clear and unambiguous. ...
·
Input − An algorithm
should have 0 or more well-defined inputs.
·
Output
2(e). Dynamic Programming and Greedy method.
Ans. A Greedy method is an algorithmic paradigm that
builds up a solution piece by piece, always choosing the next piece that offers
the most obvious and immediate benefit. So the problems where
Internal Assignment 2nd
Data
& Analysis of Algorithm
1(b).
What are the advantages and disadvantages of Divide-And-Conquer? Write
Divide-And-Conquer recursive Quick sort algorithm and analyze the algorithm for
average time complexity.
Ans. Both merge sort and quicksort employ a common algorithmic
paradigm based on recursion. This paradigm, divide-and-conquer,
breaks a problem into subproblems that are similar to the original problem,
recursively solves the subproblems, and finally combines the solutions to the
1(c). Give the algorithm for matrix
multiplication and find the time complexity of the algorithm using step-count
method?
Ans. The matrix multiplication algorithm with best asymptotic
complexity runs in O(n2.3728596) time, given by Josh
Alman and Virginia Vassilevska Williams, however this algorithm is a galactic
algorithm because
Part 2nd
2(a).
Define Omega notation.
Ans.
Omega Notation, Ω
The
notation
2(b). What are
Hamiltonian circuit explain with an example?
Ans.
A Hamiltonian circuit is a circuit that
visits every vertex once with no repeats. Being a circuit, it must start
and end at the
2(c).
Write control abstraction of divide-and-conquer.
Ans.
A control abstraction is a procedure whose flow
of control is clear but whose primary operations
2(d). Distinguish between fixed-tuple sized and
variable tuple sized state space tree organization.
Ans. Fixed
tuple size formulation. ∗ Edges labeled such that an edge from a level i
node to a level i + 1 node
2(e).
List the applications of Backtracking.
Ans. Application of Backtracking:
·
To Find All
Hamiltonian Paths Present in a Graph. A Hamiltonian path, also known as a
Hamilton path, is a
Information
Security and Audit
Assignment 1st
1.(a)
Specify different elements that shape organization's culture and
influence the effectiveness of
agency internal control? Ans…Introduction: There are many obstacles and challenges organizations face on a daily
basis. This section will explore a variety of internal factors and how they
contribute toIts Half solved
only SURESH GYAN VIHAR University Fully solved
assignment available Lowest price guarantee with quality. Charges INR 300 only
per assignment. For more information you can get via mail or
Whats app also
Our website www.aapkieducation.com After mail, we will reply you instant or maximum 1 hour. Otherwise you can also contact on our whatsapp no 8791490301. Contact no is +91 87-55555-879 2(a). How to prepare BCP? Ans.. A
business continuity plan details processes and procedures that will help keep operations up and running — or
restore them as quickly as possible — in the event of a major
disaster, whether it be a physical disaster (e.g., extreme weather
event) or a technological one 2(b). Risk relationship formula? Ans..
A Common Formula for Risk A common
2(c). Telecommunication malfunction? Ans…Hardware and software failures are common in
telecommunication networks. Poor planning that results in telecommunications
products not being maintained and that 2(d) Explain Type I and Type II cybercrime.
Write characteristics of it. Ans…Type 2(e).
Chief Security Officer (CSO)?
Ans.. A chief security officer, or CSO, is an executive responsible for the safety and
security of company data, personnel, and assets. One key
responsibility of the CSO is Information
Security and Audit
Assignment 2nd 1.
What is outsourcing?
What kind of risks is involved in IT outsourcing? Also explain outsourcing
management? Ans… Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company. Companies today can outsource a
number of tasks or services. They often outsource information 2. Explain in detail all security
principles. Ans…
1. Confidentiality The confidentiality principle of security states
that only their intended sender and receiver should be able to access
messages, if an unauthorized person gets access to this message then the
confidentiality gets compromised. For example, suppose user X wants to send a
message to user Y, and X does not want some else to get access to this
message 2(a)
Vulnerability Ans..
Vulnerability refers to the
inability (of a system or a unit) to withstand the effects of a hostile
environment. A window of vulnerability (WOV) is a time frame within
which defensive 2(b) Cyber Attack Ans.. An attack,
via cyberspace, targeting an
enterprise's use of cyberspace for the purpose of disrupting, 2(c) Malware Ans… Malware is intrusive software that is designed to damage
and destroy computers 2(d) What is CDP? Ans… A Customer
Data Platform (CDP) is a type of packaged software which creates
a 2(e) Write down the eight R's of successful
recovery plan. Ans.. 1. Set Your
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) 2.
|
No comments:
Post a Comment