Wednesday 26 October 2016

mca4010 smu mca fall 2016 IVth sem solved assignments

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

fall 2016 ASSIGNMENT
PROGRAM MCA
SEMESTER FOURTH
SUBJECT CODE & NAME MCA4010- MICROPROSESSOR
CREDIT 4 BK ID B1778 MAX. MARKS 60

Q1. Write short notes on:
a) Central Processing Unit
b) Memory Unit 5+5

Answer:
Central Processing Unit:
The central processing unit (CPU) is the electronic brain of the computer. CPU consists of Arithmetic Logic Unit (ALU) and Control Unit (CU).

(I)              Arithmetic Logic Unit (ALU): The arithmetic logic unit (ALU) is responsible for arithmetic and logical operations. Basically an Arithmetic-Logic Unit (ALU) is an electronic circuit used to carry out the arithmetic operations like addition, subtraction, multiplication and division.

2 Write short notes on:
a) Bus Interface Unit (BIU)
b) Execution Unit (EU) 5+5 10
Answer: A)

Bus Interface Unit (BIU): The BIU handles all the data and address on the buses for the execution unit (EU). It performs all bus operations such as instruction fetching, reading and writing operands for memory and calculating the addresses of the memory operands. The instruction bytes are transferred to the instruction queue. Execution unit use the instruction queue to execute the instructions. Both BIU and EU work asynchronously to execute instructions by using Pipelining

3 Write short notes on:
a) REP Prefix
b) Table Translation 5+5 10
Answer: A)
REP Prefix
Because string operations inherently involve looping, the 8086 machine language includes a prefix that considerably simplifies the use of string primitives with loops. This prefix has the machine code
1 1 1 1 10 0 1 Z
where, for the CMPS and SCAS primitives, the Z bit helps control the loop. By prefixing MOVS, L


4 Describe about Key-code Data Formats and FIFO Status Word formats. 5+5 10
Answer: Key-code Data Formats:
After a valid Key closure, the key code is entered as a byte code into the FIFO RAM, in the following format, in scanned keyboard mode. The Key code format contains 3-bit contents of the internal row counter, 3-bit contents of the column counter and status of the SHIFT and CNTL Keys The data format of the Key code

5 Write a note on
(a) RS 232 standard
 (b) IEEE 488 standard 5+5 10
Answer: A) RS232 Standard
RS232 standard is developed by the Electronic Industry Association (EIA) in 1962 and was revised and renamed as RS232C. RS stands for "recommended standard." This is a standard hardware interface used for

6 Write short note on:
a) Parallel Printer Interface (LPT)
b) Universal Serial Bus (USB) 5+5 10
Answer: A)
Parallel Printer Interface (LPT)
The parallel printer interface (LPT) is located on the rear panel of the PC. The LPT stands for line printer. The Parallel Port Interface on the PC compatible computer is one of the most flexible interfaces for connecting the PC to a wide range of devices. The interface was originally intended purely for connection to printers but due to the simple nature of the digital control lines it has found many other uses. Its simplicity relies on the fact that the data to and from the port forms an 8 bit binary on/off

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mit106 smu msc it fall 2016 Ist sem solved assignments

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
FALL 2016
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
1
SUBJECT CODE & NAME
MIT106 - Fundamentals of IT& Programming

Q1. Explain functional aspects of following in a computer system:
(a) Input devices
(b) Output devices
Answer:
A Computer System is more than just a Computer. It is a combination of “components working together to perform a

Q2. Briefly explain the characteristics of computers.
Answer:
Basic characteristics about computer are:
1.      Speed: - As you know computer can work very fast. It takes only few seconds for calculations that we take hours to complete. You will be surprised to know that computer can perform millions (1,

Qus:3 List any five characteristics of an object-oriented design (OOD).

Answer:

Object–oriented design is a design strategy based on information hiding. It differs from the functional approach to design in that it views a software system as a set of interacting objects, with their private state, rather


Qus:4 What are the five major activities of an operating system in regard to process management?
Answer:

The operating system manages many kinds of activities ranging from user programs to system programs like printer

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



bt0092 smu bsc it fall 2016 VIth sem solved assignments

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

[ fall 2016 ]
ASSIGNMENT
PROGRAM                                                   BSc IT
SEMESTER                                                  SIXTH
SUBJECT CODE & NAME                       BT0092, Software Project Management
CREDIT                                                        4
BK ID                                                             B1363
MAX. MARKS                                             60
Answer all the questions

Ques1 Explain any five activities involved in project management.
Ans You may be aware that a lot of professional bodies are engaged in defining standards for Project Management. Every professional body will have their own definitions. Here are some of them:
According to PMBOK (Project Management Institute – PMI), “Project Management is the application of knowledge, skills, tools and techniques to project activities to meet the project requirements

Ques2 Define software cost estimation process. Why it is required?
A cost in a project is due to the requirements for software, hardware and human resources. The bulk of the cost of software development is due to the human resources needed, and most cost estimation procedures focus on this aspect. Most cost estimates are determined in terms of person-months

Ques3 Define risk assessment. Explain the elements of risk assessment and risk control.
Ans there are two stages in the process of Project Risk Management, Risk Assessment and Risk Control. Risk Assessment can take place at any time during the project, though the sooner

Ques4 Mention and explain different types of Software Testing.
Ans Software testing consists of several subcategories, each of which is done for different purposes, and often – using different techniques. Software testing categories include:
 Functionality testing to verify the proper functionality of the software, including validation of system and

Ques5 What is the role of software reengineering?
Ans A new business strategy now challenges software organizations. It is called Business Process Reengineering (BPR). The reader should never confuse business process reengineering with software reengineering. But we have included this sub-section because software reengineering is

Ques6 Explain the Role of Closure Analysis.
Ans Project closure analysis is the key to learning from the past so as to provide future improvements. To achieve this goal, it must be done carefully in an atmosphere of safety so that lessons can be captured and used to improve the process and future projects. Before we describe the details of the

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



bt0080 smu bsc it fall 2016 IVth sem solved assignments

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
BSc IT
SEMESTER
FOURTH
SUBJECT CODE & NAME
BT0080, Fundamentals of Algorithms
Qus:1 Describe insertion sort algorithm with the help of an example. Give the complexity of it.
Answer:
Insertion sort algorithm:
The insertion sort, algorithm for sorting a list L of n numbers represented by an array A [1... n] proceeds by picking up the numbers in the array from left one by one and each newly picked up number is placed at its

Qus:2 State the concept of divide and conquer strategy with the help of an example.
Answer:
The concept of divide and conquer strategy:
Given a function to compute on n inputs, the divide-and-conquer strategy suggests splitting the inputs into K distinct subsets, 1

Ques 3 Prove the theorem
“A given connected graph G is a Euler graph  all the vertices of G are of even degree.”
Ans: Proof: Suppose G is a Euler graph. Then G contains a Euler line. So, there exists a closed walk running through all the edges of G exactly once. Let vV be a vertex of G. Now, in tracing the walk, it goes

Ques 4 Explain Adjacency and Incidence Matrix.
Ans: Definition: Let G be a graph with n vertices v1, v2, …, vn and no self-loopsand no parallel edges. We define an n n adjacency matrix A = [ ij a ]n n, as follows:
aij = 1 if vi is

Q5. State Cook’s theorem.
Prove the theorem “CNF satisfiability is polynomially transformable to the clique problem. Therefore, the clique problem is NP complete.”
Answer:
Proof:

Cook’s Theorem
Cook’s theorem states that satisfiability is in P if and only if P=NP. We now prove this important theorem. We know that satisfiability in NP. Hence, if P = NP, then satisfiability is in P. It remains to be shown that if satisfiability is in P, then P = NP. To do this, we show how to obtain from any

Ques 6 Mention different classification of problems.
Ans: The fact of being engaged in solving problems may be the only sure indication of a living entity being alive (though, the distinction between entities being alive and not being alive is getting fuzzier day by day). The problems, attempted to be solved, may be due to the need for survival in a

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



bt0074 smu bsc it fall 2016 IIIrd sem solved assignments

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM BSc IT
SEMESTER THIRD
SUBJECT CODE &
NAME
BT0074, OOPS with JAVA
Qus:1 What are the keywords that java supports? Describe the data types available in java programming language.
Answer:
The keywords that java supports:
Keywords are special words that are of significance to the Java compiler. There are 48 reserved keywords currently defined in the Java language. These keywords combined with the syntax of the operators and separators, form the definition of the Java language. These keywords cannot be used as names for

Q2. Describe the syntax and working of if-else with an example. Also write a program in java that assigns a grade based on the value of a test score: an A for a score of 90% or above, a B for a score of 80% or above, and so on. 10
Answer:
Use the else if statement to specify a new condition if the first condition is false.
Syntax
if (condition1) {


Qus:3Describe with the help of an example the implementation of inheritance in java.
Answer:
The implementation of inheritance in java:
The extends keyword is used to derive a class from a superclass, or in other words, extend the functionality of a


Ques 4 What is needed to write JSP based web application? How does JSP look? How to test JSP?
Ans Programming with JSP will need a thorough knowledge of how servlets are written and executed as the code segments inserted in a JSP are mostly Servlet code. If you have already written some ASP programs you may find it easy to work with JSP as there are so many similarities

Ques 5 Discuss the information stored in X 509 certificates.
Ans The keytool utility can display import and export certificates, in addition to key pairs. These certificates are called X.509 certificates because they follow the X.509 standard, the only one presently


Ques 6 Explain the different JDK Security tools.
Ans Three tools are included in the JDK (Java Development Kit): Keytool, Jar and Jarsigner.
Keytool
Keytool, the Java security key tool, is used to create and manage public keys, private keys and security certificates. It can be used to do the following:
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412