Monday 22 August 2016

mca5010 smu mca summer 2016 (oct/nov 2016 exam) VTH sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM-MCASEMESTER-V
SUBJECT CODE & NAME-MCA5010-WEB TECHNOLOGIES
CREDIT-4
BK ID-B1547
MAX. MARKS-60
Qus:1 Differentiate between TCP and UDP
Answer:
Differentiate between TCP and UDP:
TCP (Transmission Control Protocol):
The TCP corresponds to the transport layer of OSI reference model, The TCP is known as a connection-oriented protocol, which means that connection is established and maintained until such time as the message or messages

Qus: 2 describe the features of XML. What are the important rules to keep in mind about the XML declaration?
Answer:
The features of XML:
XML is popular for many features and few of them are listed here:
1.      Easy Data Exchange: In XML, data and mark-up are stored as text that we can configure. If we like, we can use

Qus: 3. List and explain the Components of XML processor.
Answer.
Components of XML processor:
a) Parser:

Every XML processor has a parser. An XML parser converts an XML document into an XML DOM object - which can then be manipulated with a JavaScript. The parser's job is to translate XML mark-up and data into a stream of bite-sized nuggets, called tokens, to be used for processing. A token may be an element start tag, a string of character content, the beginning delimiter of a processing instruction, or some other


Qus:4. Describe the procedure of fetching data from XML to HTML. Give an example.
Answer.
Procedure of fetching data from XML to HTML:
The process of fetching data from an XML files to be filled in an HTML table, using DSO (Data Source Object)


Qus:5. Describe five different categories of PHP Operators.
Answer.
Categories of PHP Operators:
In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it

Qus:6. Describe about ASP.
Answer.
ASP:
The page on the server called by the JavaScript is an ASP file called AJAX server page. The server file could easily be rewritten in PHP, or some other server languages. Look at the example in PHP. The source code in

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


er through the select customer table query.

BT0086 smu bsc it summer 2016 (oct/nov 2016 exam) VTH sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Bt0086
Summer 2016

1 How “wireless and mobile are two different concepts”. Explain any two applications that use wireless networks and mobile communications.

Answer: TDMA is the access method used by the Electronics Industry Alliance and the Telecommunications Industry Association for Interim Standard 54 (IS-54) and Interim Standard 136 (IS-136). Using TDMA, a narrow band that is 30 kHz wide and 6.7 milliseconds long is split time-wise into three



2 What is modulation? Briefly explain Amplitude Modulation (AM), Frequency Modulation (FM) & Phase modulation (PM).

Answer: Modulation
The modulation technique used on the radio channel is Gaussian Minimum Shift Keying (GMSK). GMSK belongs to a family of continuous-phase modulation procedures, which have the special advantages of a narrow transmitter power spectrum with low adjacent channel interference, on the one


3 Explain the GSM TDMA frame with the help of frame structure.

Answer: There are five kinds of burst GSM TDMA frame:
Normal Burst (NB): The NB is used to transmit information on traffic and control (except RACH) channels. The individual bursts are separated from each other by guard periods during which no

4 Explain Hard handover and Soft handover in UMTS.

Answer: Hard handover: When the User Equipment (UE) switches between different antenna and different systems then there the carrier frequency used for communication also changes. When the carrier frequency changes for communication, we say this type of handover as

5 List the advantages and disadvantages of Infra-red technology.

Answer: Infra- red Technology uses light at 900 nm wavelength. Transmitters can be simple light emitting diodes (LEDs) or laser diodes whereas photodiodes act as receivers. PDAs, laptops, notebooks, mobile phones etc. have an infrared data association (IrDA)

6 Write short notes on:
(a) HiCoMo: High Commit Mobile Transaction Model
(b) Kangaroo mobile transaction model

Answer: a) HiCoMo is a mobile transaction execution model and mainly processes aggregate data stored in a data warehouse in the mobile units. Since the data warehouse resides in mobile units, HiCoMo transactions are always initiated on mobile units where they are processed in a disconnected mode. As a result, transaction commitments are quite fast. The
.

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


BT0074 smu bsc it summer 2016 (oct/nov 2016 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Bt0074
Summer 2016

Q1. List and explain the primitive data type in Java.

Answer:

Primitive Data Types

The Java programming language is statically-typed, which means that all variables must first be declared before they can be used. This involves stating the variable's type and name, as you've

2 Write a note on:
1. String Handling
2. String Literals
3. Character Extraction.

Answer: String Handling
An array represents a number of variables which occupy contiguous spaces in the memory. Each element in the array is distinguished by its index. All elements in an array must be of the same


3 Describe with the help of an example the implementation of inheritance in java.

Answer: Implementing Inheritance in Java
The extends keyword is used to derive a class from a superclass, or in other words, extend the functionality of a superclass.
Syntax


4 Describe the catch and finally block statement in java with examples.

Answer: The catch Block
You associate an exception-handler with the try block by providing one or more catch handlers


5 Draw and Explain the Life cycle of a java applet with an example.

Answer: Life Cycle of an Applet
You can describe the life cycle of an applet through four methods. These methods are:
Ø  The init() method.
\

6 What are the information required while creating a new key pair using key tool? Explain self-signed certificates?

Answer: The –genkey option of keytool is used to create a new public / private key pair. There are many configuration options that can be used to retrieve, replace or delete the pair. Key store aliases are not case sensitive. If the –keystore option is not used, the key pair will be stored in the default key store

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



BCA4010 smu BCA summer 2016 (oct/nov 2016 exam) IVTH sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM BSC IT
SEMESTER 2
SUBJECT CODE &
NAME
BCA4010, COMPUTER NETWORKS

Q1 What is Fast Ethernet? Explain in brief. [10] 10
Answer: Fast Ethernet is a collective term for a number of Ethernet standards that carry traffic at the nominal rate of 100 Mbit/s, against the original Ethernet speed of 10 Mbit/s. Of the 100 megabit Ethernet standards 100baseTX is by far the most common and is supported by the vast majority of Ethernet hardware currently produced. Full duplex fast Ethernet is sometimes referred to as "200 Mbit/

Q2 How are services of data link layer categorized? Explain in brief

Answer:
The services of the data link layer can be categorized as:

1.      Unacknowledged Connectionless Service: In this the source machine sends independent frames to the destination machine without having the destination machine acknowledge them. No connection is


Qus:3 What is Stop-and-Wait Automatic Repeat Request? Briefly explain.
Answer:
Stop-and-Wait Automatic Repeat Request:
This protocol adds a simple error control mechanism to the stop-and-wait protocol. To detect and correct corrupted frames, we need to add redundancy bits to our data frame. When the frame arrives at the receiver site, it is checked and if it is corrupted, it is silently discarded. The detection of


Qus:4 What is the role of Internet Protocol version 4 (IPV4) in addressing and routing packets between hosts? Briefly explain the structure of an IPV4 packet.
Answer:
The role of Internet Protocol version 4 (IPV4) in addressing and routing packets between hosts:
IPV4 is a datagram protocol primarily responsible for addressing and routing packets between hosts. IPV4 is connectionless, which means that it does not establish a connection before exchanging data,

Qus:5 How SMTP works? Briefly explain applications of SMTP.
Answer:
SMTP works:
SMTP is based on end-to-end delivery: An SMTP client contacts the destination host's SMTP server directly, on well-known port 25, to deliver the mail. It keeps the mail item being transmitted until it has been successfully copied to the recipient's SMTP. This is different from the store-and-

Qus:6 What is SSL protocol? How SSL handles a message?
Answer:
SSL protocol:
The SSL protocol is located at the top of the transport layer. SSL is also a layered protocol itself. It simply takes the data from the application layer, reformats it, and transmits it to the transport layer.

SSL handles

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mb0053 smu mba summer 2016 (oct/nov 2016 exam) IVTH sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 700/sem
if urgent then call us on 08791490301, 08273413412


DRIVE
SUMMER 2016
PROGRAM
Master of Business Administration- MBA
SEMESTER
Semester 4
SUBJECT CODE & NAME
MB0053 –International Business Management

1 Write down the difference between international Vs global business? And what are the benefits of globalization?
Write down the difference between international Vs global business
What are the benefits of globalization

Answer: International vs. global business
Most of us assume that international and global business are the same and that any company that deals with another country for its business is an international or global company. In fact, there is a


2 Elaborate in detail comparative study on cultures of Japan, China, Brazil and France.
Elaborate in detail comparative study on cultures of Japan, China, Brazil and France

Answer: Comparative study on cultures of Japan, China,



3 Write a short note on Advantages of foreign direct investment and types of foreign direct investment.
Write a short note on Advantages of foreign direct investment and types of foreign direct investment

Answer: Advantages of Foreign Direct Investment
a.      Easier integration into global economy: A developing country like India is keenly interested to have foreign investment in their economy as it can gain greater access and foothold in other economies of the


4 What are the key objectives and function of World Trade organization?
What are the key objectives of WTO
What are the key functions of WTO

Answer: The key objective of WTO is to promote and ensure international trade in developing countries. The other major functions include:
·         Helping trade flows by encouraging nations to adopt discriminatory trade policies.
·         Promoting employment, expanding productions and trade and raising standard of living and income
·          

5 Explain in detail about international regulatory Bodies.
Explain in detail about international regulatory Bodies.

Answer: International Regulatory Bodies
European Union
European Union is pro-active in the harmonisation process. European Commission sets directives, which


6 What are the various export promotion schemes offered by government in order to promote export from the country?
What are the various export promotion schemes offered by government.

Answer: Export promotion and assistance schemes in India


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 700/sem
if urgent then call us on 08791490301, 08273413412