Saturday 5 March 2016

mca3050 smu mca winter 2015 (april/may 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

Winter 2015  ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3050- ADVANCED COMPUTER NETWORKS
CREDIT 4 BK ID B1650 MAX. MARKS 60
Q. No. 1 Describe OSI Model. List and explain its seven layers. 3+7 10
Answer: OSI model
The Open Systems Interconnection (OSI) reference model was defined by the International Standards Organization (ISO) as

Q2. Describe about DWDM. Explain the components of a basic DWDM system 10
Answer: Dense Wavelength Division Multiplexing (DWDM): In previous unit we discussed about WDM (Wavelength Division Multiplexing). It is conceptually similar to frequency division multiplexing. Only difference is, it is purposefully designed for fibre-optic cable to support high data-rate. In the literature, the term dense WDM (DWDM) is often used. This term does not imply a different technology to that used for WDM. In fact, the two terms are used interchangeably. WDM, DWDM are based on the same concept of using multiple wavelengths of light on a single fiber,

Q3. Describe Peak cell rate (PCR) and Sustained cell rate (SCR). 10
Answer: Peak cell rate (PCR): This is the maximum amount of traffic that can be submitted by a source to an ATM network, and is expressed as ATM cells per second. Due to the fact the transmission speeds are expressed in bits per second. It is more convenient to talk about the peak bit rate of a source, i.e., the maximum number of bits per second submitted to an ATM connection, rather than its peak cell rate. The


Q4 Describe the following:
a) Open Shortest Path First (OSPF) protocol
b) Broader Gateway Routing Protocol (BGP) 5+5 10
Answer: a)
Open Shortest Path First (OSPF) protocol
OSPF is a commonly deployed link-state routing protocol. It views the Internet as a star configuration. OSPF

Q5 Write short notes on:
a) Cryptography
b) Encryption
c) Decryption
d) Cryptanalysis
e) Cryptology 5*2 10
Answer: a) Cryptography
Most initial computer applications had no or at best, very little security. This continued for a number of years and until the importance of data is truly realized. Until then, computer data was considered to be

Q6 Differentiate Single server queue and Multi-server queue 5+5 10
Answer:
Single server queue
The important element in a single server queue is the server, which provides services to packets. Different packets arrive at the system to be served. If the server is idle at the time of packet arrival, the packet is served

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412


mca3040 smu mca winter 2015 (april/may 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

Winter 2015 ASSIGNMENT
PROGRAM MCA (REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME - MCA3040- TECHNICAL WRITING
CREDIT 2 BK ID B0955 MAX. MARKS 30

Q. No. 1 What’s Audience Analysis? Explain its significance in Technical Communication [5+5] [10]
Answer:

Audience Analysis
It's important to determine which of the four categories just discussed the potential readers of your document belong to, but that's not the end of it. Audiences, regardless of category, must also be

Q2 Explain the role of a technical editor. Differentiate between Micro and Macro editing. [5+5] [10]
Answer: Role of a Technical Editor:
A technical document, to be effective, requires not only a good writer, but also a good editor. The chief duties of a technical editor are realized when the sections of a technical document are submitted to

Q3 Explain the various phases involved in System Development Life Cycle (SDLC).[5*2] [10]
Answer: SDLC Phases
1. Feasibility
The feasibility study is used to determine if the project should get the go ahead. If the project is to proceed, the feasibility study will produce a project plan and budget estimates for the future stages of development.

2.

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412



mca3030 smu mca winter 2015 (april/may 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

Winter 2015 ASSIGNMENT
PROGRAM MCA (REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3030-LINUX OS
CREDIT 2 BK ID B1563 MAX. MARKS 30

1. Explain briefly the history of Linux. List and explain different Linux distributions. 6+4 = 10
Ans: History of Linux: About 30 years ago, computers were very expensive and the cost per unit of computing power was very high. Software was used for a specific purpose. Software that ran on one system generally did not


2. Explain briefly the shell variables and their environment. What are the rules for naming variables? 5+5 = 10
Ans: The Shell Variables and Their Environment: When you login, Linux will create certain parameters for your login shell. These parameters can be in the form of features or variables. Linux provides a predefined set of variables for both system and shell use and
these variables are allocated system values which in effect sets the parameters. Linux sets up parameter shell variables which are used to configure the user shell. When you login, the system defines most of the parameter shell variables. The shell automatically creates some of the parameter shell variables. The initialization scripts


3 Describe the following:
a) GNOME desktop
b) X Window system
5+5 10
Answer:
A)    GNOME desktop
GNOME desktop environment is written in C. It is based on the GTK + widget sets. The name GNOME was initially an acronym for GNU Network Object Model Environment, however, that derivation currently does not

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412



mca3020 smu mca winter 2015 (april/may 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

Winter 2015 ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM
CREDIT 4 BK ID B1649 MAX. MARKS 60
Q. No.  1 Differentiate DBMS and RDBMS 5+5 10
Answer:
DBMS
DBMS is defined as the software program that is used to manage all the databases that are stored on the network or system hard disk. There are different types of database management systems and

2 Differentiate 3NF and BCNF 5+5 10
Answer:
For understanding the differences between BCNF and 3NF, we must again carefully look back to the definition of 3NF and BNF.
According

3. Explain Buffer Management in detail. What are the roles of a buffer manager 5+5 10
Answer:
Buffer Management
We have assumed that operators on relations have some number of main-memory buffers that they can utilize to store required data. Actually, these buffers are not often allocated in advance to the

4 Describe five different lock modes. 5*2 10
Answer:
The lock modes are as bellow:

1.       Shared Locks: In case of Row-level shared locks, various users are permitted by shared locks to read data, but no user is permitted to change that data. In case of Table-level, various users are permitted by shared locks to carry out read and write operations on the table, but any user is


5 Differentiate homogeneous and heterogeneous Database. 5+5 10
Answer:
Differences between Homogeneous and Heterogeneous Database:

When the database technology is the same at each of the locations and the data at the several locations


6 Write short notes on ODMG standards. What are the various components of ODMG-93? 5+5 10
Answer:
ODMG-93 standard. It provides an inclusive framework for designing an object database, writing

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412



mca3010 smu mca winter 2015 (april/may 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

Winter 2015 ASSIGNMENT
PROGRAM MCA (REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME-MCA3010- FINANCIAL MANAGEMENT AND ACCOUNTING
CREDIT 4 BK ID B1624 MAX. MARKS 60

Q. No. 1 Explain the process involved in accounting. What are the objectives of accounting?10
Answer:
Accounting Process:

1.       Identifying the transactions and events – This is the first step in the accounting process. It recognises the transactions of financial character that are essential to be recorded in the books of accounts

Q.2 Briefly explain the role of management accounting. Also describe the functions of management accounting.10
Answer:
Roles of Management Accounting:
Management accounting helps the management in the following:
 It guides the management to fix most appropriate objectives for the company and also ensures that

Q.3 What is fund flow analysis? What are the objectives of analysing flow of fund?10
Answer:
Fund flow analysis:
The term ‘flow’ refers to change and therefore the term ‘funds flow’ refers to ‘change in funds’ or ‘change in working capital’. In other words, any increase or decrease in working capital means ‘flow of funds’

Q.4 What is cash flow statement and how is the cash flow statement subdivided?10
Answer: Meaning of Cash Flow Analysis
Cash flow analysis is an important tool of financial analysis. It is the process of understanding the change in position with respect to cash in the current year and the reasons responsible for such a

Q.5 What are the merits of budgets? 10
Answer: The merits are as follows:
1. It aims at the maximisation of profits.
2. Budgets fix the goals and targets without which operations lack direction.
3. It reduces


Q.6 Describe the essential features of budgetary control. 10
Answer: Essential Features of Budgetary Control
An effective budgeting system should have essential features to get the best results. In this direction, the following may be considered as essential features of an effective budgeting.
Business policies defined The top management of an organisation should have an action plan

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412