Saturday 19 February 2022

suresh gyan vihar university assignments 2022 mca 4 sem

                                            Internal Assignment- 1st   

                                                Java Programming

1.What are the benefits of inheritance? Explain the various forms of inheritance with suitable code segments.   

Ans. Inheritance are code reusability and readability. When child class inherits the properties and functionality of parent class, we need not to write the same code again in child class. This makes it easier to reuse the code, makes us write the less code and the code becomes much more vvvIts Half solved only

  

SURESH GYAN VIHAR University Fully solved assignment available

 

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is 
aapkieducation@gmail.com

 

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

 

2(c). How to define a package? How to access, import a package? Explain with examples.

Ans. java package is a group of similar types of classes, interfaces and sub-packages. Package in java can be categorized in two form, built-in package and user-defined package.There are many built-

 

     Part- B

2(a). What are the advantages of multithreading?

Ans. 1) It doesn't block the user because threads are independent and you can perform multiple operations

 

2(b). What is an adapter class? What is its significance? List the adapter classes.

Ans. An adapter class provides the default implementation of all methods in an event listener interface. Adapter classes are very useful when you want to process only few of the events that are

 

2(c). String manipulation functions of Java String class.

Ans.

Method

Description

Return Type

 

2(d). The thread states.

Ans. A thread lies only in one of the shown states at any instant:

·         New.

 

2(e). Data Abstraction:

Ans. Data abstraction is the reduction of a particular body of data to a simplified representation of the whole. Abstraction, in general

 

Assignment- 2nd

                                                Java Programming

1(a). Explain method overriding with a suitable example program.

Ans. If subclass (child class) has the same method as declared in the parent class, it is known as method overriding in Java.

In other

 

 

2(c) Describe the need of thread synchronization. How is it achieved in Java programming? Explain with a suitable program.

Ans. The process of allowing multiple threads to modify an object in a sequence is called synchronization. We can allow multiple threads to modify the objects sequentially only by executing that objects’ mutator methods logic in sequence from multiple threads. This is possible by using an object locking

 

   Part- 2nd

2(a). AWT

Ans.: Abstract Window Toolkit (AWT) is a set of application program interfaces ( API s) used by Java

 

2(b). The hash table constructors:

Ans.:  It accepts an integer parameter and creates a hashtable that contains a specified initial capacity. It is used to create a hashtable having the specified initial capacity and load Factor. It creates a new

.

 2(c). Polymorphism

Ans.:  In programming languages and type theory, polymorphism is the provision of a single interface to entities of different types or the use of a single symbol to represent multiple different types. The concept

 

2(d). Interface and Abstract class

Ans.:

Abstract Class

Interface

2(e). Thread and Process

Ans.: Process:
Process are basically the programs which are dispatched from the ready state and are scheduled in the CPU for execution. PCB (

 

 

                                                    Internal Assignment-1st

                                                       Mobile Computing

1(a). With neat sketch explain the architecture of WAP and its operational support. with neat sketch explain the layered structural arrangement of mobile computing and various service protocols used in it.

Ans. WAP is designed in a layered fashion, so that it can be extensible, flexible, and scalable. As a result, the WAP protocol stack is divided into five layers −

Layers of

Its Half solved only

  

SURESH GYAN VIHAR University Fully solved assignment available

 

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is 
aapkieducation@gmail.com

 

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

 

1(b).  Explain how GPRS networks replace circuit switch services on second generation GSM communications. Explain its services and operations in detail.

Ans. General Packet Radio System is also known as GPRS is a third-generation step toward internet access. GPRS is also known as GSM-IP that is a Global-System Mobile Communications Internet Protocol as it keeps the users of this system online, allows to make voice calls, and

 

                                                          Part- 2nd

2(a). What are the advantages and disadvantages of push-based mechanism?

Ans. Advantages of Push based mechanisms:

Push-based mechanisms enable broadcast of data services to multiple devices. The server is not

 

2(b).  Give reasons for a handover in GSM and the problems associated with it.

Ans. The typical reason for a handover is a weaker signal from the current base station compared with a

 

2(c). Advantages of hoarding the data at mobile device.

Ans. The advantage of hoarding is that there is no access latency (delay in retrieving the queried record from the server over

2(d). Advantages of Snooping TCP.

Ans. Advantages of Snooping TCP:

·         The end-to-end TCP semantic is preserved – The packet is not acknowledged by the FA. ...

·         No Modifications at

 

2(e). Differentiate mobile computing, ubiquitous computing and pervasive computing.

Ans. Pervasive means "diffused throughout every part of." Pervasive computing would be in all parts of your

 

 

 

 

 

 

 

 

 

 

 

                                                  Internal Assignment-2nd

                                                       Mobile Computing

1(a). Describe the Two-tier Client-Server Architecture in mobile environment. How it can be expanded to n-tier architecture? Explain about Number of adaptations and various algorithms for broadcast models.

Ans. 2-Tier Architecture:

It is like Client-Server architecture, where communication takes place between client and server.

In this type

 

 

2(b). What do you mean by Query processing? Explain the Query Processing architecture.

Ans. Query processing denotes the compilation and execution of a query specification usually expressed in a declarative database query language such as the structured query language (SQL). Query processing

Part 2

 

2(a). What are the functions of authentication and encryption in GSM?

Ans. GSM encryption is the means by which phone conversations on networks using GSM are scrambled, such that they cannot be descrambled and intercepted by others. Due to their potential uses

2(b). Bluetooth Services in android.

Ans.Bluetooth Service:  Bluetooth telephony services lets users stream calls and sync contacts from a phone to

 

2(c). How and why does I-TCP isolate problems on the wireless link?

Ans. TCP performance is affected by the frequent losses occurring at the link layer, because TCP inherently assumes

2(d). How to create .apk file?

1.Make sure you have prepared your code for the Google Play Store.

2. In Android

.

 

2(e). Directory method.

Ans. Directory. Create Directory method creates a directory or folder in the specified path with the specified Windows security. You can also create a directory on a remote computer. The following code snippet

                                                    Internal Assignment- 1st

                                                   Optimization Technique

1 (b). Solve the following LPP by graphical method Minimize Z=3x1+2x2

Subject to :

5x1+ x2 >l0 x1+ 4x2 > l2 x1, x2 > 0

Solution: Given that 5x1 + x2 ≥ 10

Let 5x1 + x2 = 10

Its Half solved only

  

SURESH GYAN VIHAR University Fully solved assignment available

 

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is 
aapkieducation@gmail.com

 

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

2. Solve the LPP by graphical method

Minimize Z = 25x + 30y Subject to

4x + 3y ≥ 60

2x + 3y ≥ 36

x, y ≥ 0

Solution: Z= 25x+30y…… (i)

subject to the constraints 

 

4x+3y60

2x+3y≤ 36

 

1(c). Vehicle arrives at Petrol pump with mean rate of 30 per hour. The time required to serve a customer has an exponential distribution with mean of 90 seconds. Find the following.

 i) Probability that Server is busy

ii) Probability that vehicle should not wait

 iii) Average waiting time of customer.

iv) Average number of customer in the system

v) Average queue length?

Sol: (i). P0+P1+P3= (1- λ/ μ)+ λ/ μ (1-λ/ μ)+ (λ/ μ)^2 (1-λ/ μ)= 1- λ/ μ(1+ λ/ μ+ (λ/ μ)^2)

= 1- 30/40

 

 

                                                          Part- 2nd

2(a). Economic Order Quantity by trial and error method

Ans. Under tabular approach of determining economic order quantity, the combined ordering and holding

2(b). Solutions for sequencing problem

Ans. When a number of jobs are given to be done and they require processing on two or more machines, the main concern of a manager is to find the order or sequence to perform these jobs. We shall consider the sequencing problems in respect of the

2(c).  Economic order Quantity for purchase model.

Ans. Economic order quantity (EOQ) is the ideal order quantity a company should purchase to minimize inventory costs such as holding costs, shortage costs, and order costs. This production-

 2(d). Sequencing of 'N' Jobs On three machines

Ans. n jobs are to be processed on 2 machines, say, machine A and machine B in the order AB. This means

 

2(e). Assumptions Made in Sequencing Problems

Ans. Each operation, once started, must be completed Assumptions we use while dealing with sequencing

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

                                             Internal Assignment- 2nd

                                             Optimization Technique

1(c). The marriott tube company manufactures two lines of bathtub, called model a and model b.

1(b).The sweet smell fertilizer company markets bags of manure labeled "not less than 60 pounds dry weight." the packaged manure is a combination of compost and sewage wastes. to provide good-quality fertilizer, each bag should contain at least 30 pounds of compost but no more than 40 pounds of sewage. each pound of compost costs sweet smell 5 cents and each pound of sewage costs 4 cents. use linear programming to determine the least cost blend of compost and sewage in each bag.

                                                         Part- 2nd

2(a).Processing of 2-Jobs on 'M' Machine

Ans. No passing of jobs is permitted i.e. the same order over each machine is maintained. Our objective will be to find the optimal sequence of jobs which minimizes the total elapsed time. No general procedure is available so far for obtaining an optimal sequence in such case.


Solution.

Jobs

 

2(b). Probability or Stochastic Models

Ans. Stochastic modeling

 

 

2(c). CPM AND PERT: Network Representation

Ans. PERT project

2(d). Formulation of an LPP

Ans. The process to formulate a Linear Programming problem

Identify the decision 

2(e). Graphical Method

Ans. Graphical method, or Geometric method, allows solving simple linear programming problems intuitively and                                                  Internal Assignment 1st

                                           Data & Analysis of Algorithm

 

1(b). Explain Travelling sales person problem LCBB procedure with the following instance and draw the portion of the state space tree and find an optimal tour.

Ans.. The traveling salesman problem consists of a salesman and a set of cities. The salesman has to visit each one of the cities starting from a certain one (e.g. the hometown) and returning to the same city. The challenge of the problem is that the traveling salesman wants to minimize the total length of the trip.

The traveling salesman problem can be described as follows:

TSP = {(G, f, t): G = (V, E) a complete graph,

f is a function V×V Z, →

t Z,

G is a graph Its Half solved only

  

SURESH GYAN VIHAR University Fully solved assignment available

 

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is 
aapkieducation@gmail.com

 

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

 

1(c). Discuss the time and space complexity of Dynamic Programming travelling salesperson algorithm.

Ans.. Traveling salesman problem is a NP-hard problem. Until now, researchers have not found a polynomial time algorithm for traveling salesman problem. Among the existing algorithms, dynamic programming algorithm can solve the problem in time O(n^2*2^n) where n is the number of nodes in the graph. The branch-and-cut algorithm has been applied to solve the problem with a large

2(a). Optimal Solution.

Ans.. An optimal solution is a feasible solution where the objective function reaches its maximum (

2(b). Distinguish between Algorithm and Pseudocode.

Ans.  1. An algorithm is a step by step procedure to solve a given problem while a pseudocode is a method of writing an algorithm.

2. An

2(c). What is the time complexity of the Job sequencing with deadlines using greedy algorithm?

Ans. Job sequencing is the set of jobs, associated with the job i where deadline di >= 0 and profit pi > 0. For any job i the profit is earned if and only if the job is completed by its deadline. To complete a job,

 

2(d). Describe Different characteristics of an algorithm.

Ans. Characteristics of an Algorithm

·         Unambiguous − Algorithm should be clear and unambiguous. ...

·         Input − An algorithm should have 0 or more well-defined inputs.

·         Output

 

2(e). Dynamic Programming and Greedy method.

Ans. A Greedy method is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. So the problems where

 

                                                  Internal Assignment 2nd

                                             Data & Analysis of Algorithm

 

1(b). What are the advantages and disadvantages of Divide-And-Conquer? Write Divide-And-Conquer recursive Quick sort algorithm and analyze the algorithm for average time complexity.

Ans. Both merge sort and quicksort employ a common algorithmic paradigm based on recursion. This paradigm, divide-and-conquer, breaks a problem into subproblems that are similar to the original problem, recursively solves the subproblems, and finally combines the solutions to the

 

1(c). Give the algorithm for matrix multiplication and find the time complexity of the algorithm using step-count method?

Ans. The matrix multiplication algorithm with best asymptotic complexity runs in O(n2.3728596) time, given by Josh Alman and Virginia Vassilevska Williams, however this algorithm is a galactic algorithm because

 

    Part 2nd 

2(a). Define Omega notation.

Ans. Omega Notation, Ω

The notation

2(b). What are Hamiltonian circuit explain with an example?

Ans. A Hamiltonian circuit is a circuit that visits every vertex once with no repeats. Being a circuit, it must start and end at the

 

2(c). Write control abstraction of divide-and-conquer.

Ans. A control abstraction is a procedure whose flow of control is clear but whose primary operations

2(d). Distinguish between fixed-tuple sized and variable tuple sized state space tree organization.

Ans.  Fixed tuple size formulation. Edges labeled such that an edge from a level i node to a level i + 1 node

2(e). List the applications of Backtracking.

Ans.  Application of Backtracking: 

·         To Find All Hamiltonian Paths Present in a Graph. A Hamiltonian path, also known as a Hamilton path, is a 

                                 Information Security and Audit

                                           Assignment 1st

1.(a) Specify different elements that shape organization's culture and influence         the effectiveness of agency internal control?

Ans…Introduction: There are many obstacles and challenges organizations face on a daily basis. This section will explore a variety of internal factors and how they contribute toIts Half solved only

  

SURESH GYAN VIHAR University Fully solved assignment available

 

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is 
aapkieducation@gmail.com

 

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

 

 

2(a). How to prepare BCP? 

Ans.. A business continuity plan details processes and procedures that will help keep operations up and running — or restore them as quickly as possible — in the event of a major disaster, whether it be a physical disaster (e.g., extreme weather event) or a technological one

2(b). Risk relationship formula?

Ans.. A Common Formula for Risk

A common

 

2(c). Telecommunication malfunction?

Ans…Hardware and software failures are common in telecommunication networks. Poor planning that results in telecommunications products not being maintained and that

2(d) Explain Type I and Type II cybercrime. Write characteristics of it.

Ans…Type

 

2(e). Chief Security Officer (CSO)?

 

Ans.. A chief security officer, or CSO, is an executive responsible for the safety and security of company data, personnel, and assets. One key responsibility of the CSO is

 

                                    Information Security and Audit

                                              Assignment 2nd

1. What is outsourcing? What kind of risks is involved in IT outsourcing? Also explain outsourcing management?

Ans… Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.

Companies today can outsource a number of tasks or services. They often outsource information

2. Explain in detail all security principles.

Ans… 1. Confidentiality

The confidentiality principle of security states that only their intended sender and receiver should be able to access messages, if an unauthorized person gets access to this message then the confidentiality gets compromised. For example, suppose user X wants to send a message to user Y, and X does not want some else to get access to this message

 

2(a) Vulnerability

Ans.. Vulnerability refers to the inability (of a system or a unit) to withstand the effects of a hostile environment. A window of vulnerability (WOV) is a time frame within which defensive

2(b) Cyber Attack           

Ans.. An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting,

2(c) Malware

Ans… Malware is intrusive software that is designed to damage and destroy computers

 

2(d) What is CDP?

Ans…Customer Data Platform (CDP) is a type of packaged software which creates a

2(e) Write down the eight R's of successful recovery plan.

Ans.. 1. Set Your Recovery Time Objective (RTO) and Recovery Point Objective (RPO)

2.

                                                   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

No comments:

Post a Comment