Saturday 21 April 2018

smu msc it 3rd sem assignment Spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT306– Object Oriented Analysis and Design(OOAD)
SET 1
Qus:1 What is usability testing? Write the rule for developing usability testing.
Answer:
Usability testing, a non-functional testing technique that is a measure of how easily the system can be used by end users. It is difficult to evaluate and measure but can be evaluated based on the below parameters:
·        Level of Skill required to learn/use the software. It should maintain the balance for both novice
·         


Qus:2 What is meant by unified approach? Describe the steps, methods and tools of unified approach.
Answer:   Unified approach is a better way for understanding concepts of objects oriented system development. Unified approach is a methodology for software development. The unified approach, based on

Qus:3 Describe the various states of activity diagram.
Answer: Activity diagrams are special cases of state chart diagrams. An activity diagram has actions as states. It can be considered as some kind of elaborate flow diagram and has therefore some graphical stru


SET 2
Qus:1 Discuss the strategies for designing classes.
Answer: The object oriented design process is a complex process. The following methods can help you design better classes:
1)      Analyze the role of the objects of the class in the application. An object can play any of the

Qus:2 Mention and describe the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which cause unexpected results and eliminating them. The process of testing and identifying bugs is a balance of science, art and luc

Qus:3 Explain the following:
(a) Black box testing
(b) White box testing
Answer: (a) Black box testing
This treats the system as one that cannot be seen in detail. The structure of the program is not taken into account. The tests are performed based on what the program does. This is sometimes

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT) Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT307-WEB TECHNOLOGIES
SET 1
Qus:1 Name the three types of pattern in event driven programming. Explain the advantages of event driven programming.
Answer:
In computer programming, event-driven programming is a programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses), sensor outputs, or messages from other programs/threads. Event-driven programming

Qus:2 Explain the features of XML. Write important rules for XML declaration?
Answer: XML is popular for many features and few of them are listed here:
1.      Easy Data Exchange: In XML, data and markup are stored as text that we can configure. If we like, we can use


Qus:3 Write any four importance of XML Schema. Discuss the steps to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a document, they can:
 XML schema uses XML syntax. When you look at your first XML Schema, probably the most striking

SET 2

Qus:1 Define AJAX. Explain AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX is not a new programming language, but a new way to use existing standards.
It is a technique,
Qus:2 Describe the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.


Qus:3  What is meant by control statements in ASP. Explain with suitable example.
Answer: We can make a decision based on user input using an If statement. The If statement tests a condition and if the result is true then it runs the code that follows the If statement but if the result is false then it runs the code after the else statement. Here is an example for when someone enters their
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3081– High Speed Networks
Set 1
Qus:1 Explain WLAN components.
Answer:
WLAN components
A local area network (LAN) connects computers, printers and other devices to allow sharing of data and resources. LANs are limited to coverage of one location, typically a building, and usually use network cables for connections.

However, needing wires to connect devices can be inconvenient, especially in older buildings. As the name


Qus:2 Describe Multi-server queue using suitable diagrams and equations.
Answer: The aim of the queuing analysis is to make use of analytic models to yield the desired parameters to determine the buffer size. The following two queuing models can be used as



Qus:3 What is meant by congestion? List and describe different types of congestion.
Answer: The situation wherein network resources are constantly overloaded or the overall demand of a resource exceeds its capacity is termed as congestion. Congestion in a network occurs when the



Set 2

Qus:1 In TCP what is timer? Explain any timers that TCP maintains for every connection.
Answer: In TCP protocol, timers are applied in various positions and these timers restrain retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all timers. Function pointers in a timer structure take a behavior function when initialized. Once the timer ends, this

Qus:2 What is meant by Resource Reservation Protocol (RSVP)? Write any three salient characteristics. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup and control. It enables Integrated Services (IntServ) which is designed to emulate circuits on the Internet. This is the most complex QoS

Qus:3 With the help of suitable diagram explain Routing Information Protocol (RIP) message format. Mention two benefits and two drawbacks of RIP.
Answer: RIP is based on distance vector routing. It implements vector routing using the following considerations:
 An AS has both routers and networks. While routers have routing tables, networks don’t.
 The first column of a

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3091– Open Source System
Set 1
Qus:1 Elaborate the various types of Creative Common License.
Answer: It is very important to know that the licensable properties come from an array of sources. The definitions of various proprietary types are not always apparent. Although every licensing program is



Qus:2 Write a short note on the following:
(a)MIT license.
(b)Advertising clause

Answer:
(a)MIT license.
The Massachusetts Institute of
Technology initially developed a liberal software license which is called as the MIT license, for the release of X Window System source code. You can also call it as ‘X License’ or ‘MIT/X License’ or ‘X Window System License’.
The MIT license is nearly similar to the BSD (Berkeley Source Distribution) license which was developed at

Qus:3 (a)List any five features of Mozilla Public License.
(b)Comparison among GPL, LGPL, and MPL.
Answer: (a)List any five features of Mozilla Public License.
You can say that the MPL differs from the GPL in the way it regulates the distribution and licensing of works


SET 2
Q2. Open-source is a good choice for companies, Justify it.
Answer: As we have understood how we could join an existing open source project and also end an open source project, let us now learn how we can inculcate an open source culture in a company.
Running an open source project or joining an existing one can also be applied to corporate source where all the users and contributors are the employees of the company. What changes when

Qus:2 Explain the drawbacks of open source and free software licensing.
Answer: As we are aware of the global scenario of open source and free software licenses, let us now understand the issues related to them.
You can observe that the advantages of open source licensing sometime in some situations act as

Qus:3 Discuss Cross licensing.
Answer: When two or more companies sign agreement providing the rights of their intellectual property to the other, then this agreement is known as the cross licensing agreement. For example, two companies holding software patents, under cross licensing, agree to share information about the patented software between them. Instead of blocking each other’s

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412




smu msc it 2nd sem assignment Spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT DRIVE - SPRING 2018
PROGRAM - Master of Science in Information Technology (MSc IT)
SEMESTER - 2
SUBJECT CODE & NAME - MIT206 – OPERATING SYSTEM

Assignment Set - 1 Questions
Q1 Discuss in detail the process control block.
Answer:
While creating a process the operating system performs several operations. To identify these process, it must identify each process, hence it assigns a process identification number (PID) to each process. As the operating system supports multi-programming, it needs to keep track of the all the processes. For this task, the process control block (PCB) is used to track the process’s execution status.


Q2 Explain the priority CPU scheduling algorithm with example. Write the disadvantages associated with this algorithm
Answer:
Priority Based Scheduling
·        Priority
·         
Q3 Discuss Interprocess Communication. 10
Answer:-
Communication of co-operating processes’ shared-memory environment requires that these processes share a common buffer pool, and that the code for implementing the buffer be explicitly written by the application programmer. Another way to achieve the same effect is for the operating system to provide the means for co-operating

Assignment Set - 2 Questions
Q1 Explain the following page replacement algorithm:
 (a) Optimal
 (b) LRU 5+5 10
Answer:-

a)
§  Optimal Page replacement –
In this algorithm, pages are replaced which are not used for the longest duration of time in the future.
Let us consider page reference string 7 0 1 2 0 3 0 4 2 3 0 3 2 and 4 page slots.
Initially all

Q2 Compare Daisy chain bus arbitration and Priority encoded bus arbitration. 5+5 10
Answer:-
Daisy chain arbitration:
Here, the requesting device or devices assert the signal bus_request. The bus arbiter returns the bus_grant signal, which passes through each of the devices which can have access to the bus, as shown in figure below. Here, the


Q3 List and explain different types of multiprocessor operating systems. 1+9 10
Answer:-
Three basic types of multiprocessor operating systems are:
ü  Separate supervisors
ü  Master / slave 
ü  Symmetric

Separate supervisors
 In separate

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
SPRING 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT207– Data Base Management System(DBMS)

Assignment Set - 1

1 Describe various types of attribute with reference to E-R model with suitable example.

Answer: The entity-relationship (E-R) data model based on a perception of real world that consists of a set of basic objects called entities, and of relationships among these objects. It was developed to facilitate database design by allowing the specification of an enterprise schema, which represents the

2 What is database manager? Mention and describe the important responsibilities of database manager
Answer: A database manager is a program module which provides the interface between the low level data stored in the database and the application programs and queries submitted to the system. It is responsible for interfacing with file system. One of the functions of database manager is to convert user's


3 Define catalog. What information is stored in the system catalogs?
Answer: A fundamental property of a database system is that it maintains a description of all the data that it contains. A relational DBMS maintains information about every relation and index that it contains. The DBMS also maintains information about views, for which no tuples are stored explicitly; rather, a definition of the view is stored and used to compute the tuples that belong in the view when the


Assignment Set - 2

1 Explain the following normal forms:
(a) 2 NF
(b) 3 NF
Answer:

Normalization is a database design technique which organizes tables in a manner that reduces redundancy and dependency of data.
It divides

2 List and explain the basic operations of Relational algebra.

Answer:
These are basic operator of relational algebra:
·         Union (È)
·         Difference ( - )
·         Intersection (Ç)
·         Cartesian Product (x)

Union (È)
If we assume that P and Q are two union-compatible relations, then the union of P and Q is set-theoretic union of P and Q.
The resultant relation, R = P U Q, has tuples drawn from P and Q such that
R = { t |ÃŽ P v t ÃŽ Q }

3 Describe data distribution on the basis of benefits and drawbacks.

Answer: Benefits of Data Distribution
Data sharing and Distributed Control: If a number of different sites are connected to each other, then a user at one site may be able to access data that is available at another site. For example, in the distributed banking system, it is possible for a user in one branch to access data in another branch. Without this
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
SPRING 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT208- ANALYSIS AND DESIGN OF ALGORITHMS

Assignment Set - 1

1 Define and explain recursive algorithm with suitable example.
Answer:
recursive algorithm is an algorithm which calls itself with "smaller (or simpler)" input values, and which obtains the result for the current input by applying simple operations to the returned value for the smaller (or simpler) input. More generally if a problem can be solved utilizing solutions to smaller versions of the same problem, and the smaller versions reduce to easily solvable cases, then one can use a recursive algorithm to solve that problem


2 Explain the various types of basic efficiency classes with suitable examples.

Answer: Even though the efficiency analysis framework puts together all the functions whose orders of growth differ by a constant multiple, there are still infinitely many such classes. (For example, the exponential functions an have different orders of growth for different values of base a.)

3 Describe the procedure to perform Mergesort using suitable example.

Answer: Merge sort is a sorting technique based on divide and conquers technique. With worst-case time complexity being Ο(n log n), it is one of the most respected algorithms. While comparing two sublists for merging, the first element of both lists is taken into consideration. While sorting in ascending order, the


Assignment Set - 2

1 What is meant by AVL tree? Discuss the four rotations in an AVL tree.

Answer: AVL tree is a self balanced binary search tree. That means, an AVL tree is also a binary search tree but it is a balanced tree. A binary tree is said to be balanced, if the difference between the hieghts of left and right subtrees of every node in the tree is either -1, 0 or +1. In other words, a binary tree is said to be balanced



2 Describe Principle of Optimality. Explain the Knapsack problem with example.

Answer: The principle of optimality states that an optimal sequence of decisions has the property that whatever the initial state and decision are, the remaining decisions must constitute an optimal decision sequence with regard to the state resulting from the first decision.


3 For NP – Hard problems explain an approximation algorithm.
Answer: Combinatorial optimization problems lie within a finite but huge feasible region. In this section, we focus on finding approximation algorithms for optimization problems that are NP-Hard.

Underlying principles
An NP-Hard

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
SPRING 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT209– Data Communication and Networking

Assignment Set - 1

1 What is meant by security in internet? Describe the four categories of network security problems.
Answer:

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network

2 Explain the following:
a) Character stuffing
b) bit stuffing

Answer: a) Character stuffing
This method gets around the problem of synchronization after an error by having each frame start and end with special bytes. This method operates on bytes. The special bytes are reserved characters to



3 Explain the CSMA/CD protocol with suitable diagrams.

Answer: CSMA/CD Protocol
In computer networking, Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network control protocol in which a carrier sensing scheme is used. A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for


Assignment Set - 2

1 Explain the following routing algorithm:
(a) Multidestination
(b) Flooding
Answer: a. Routing is the process of selecting a path for traffic in a network, or between or across multiple networks. Routing is performed for many types of networks, including circuit-switched networks, such as the public switched telephone network (PSTN), computer networks, such as the Internet, as well as in networks used in public and private transportation, such as the system of streets, roads, and


2 With the help of suitable diagram describe TCP protocol.
Answer: The TCP IP protocol suit can be considered as a major step stone for communication network. Standards supported, flexibility and application  supported, services provided for various application from user end .The Transmission Control Protocol/Internet Protocol (TCP/IP) suite Uses standard


3 Mention and explain the different operations and responses with reference to Telnet protocol.
Answer: There are four modes of operation for most Telnet clients and servers.
1. Half-duplex: This is the default mode, but rarely used today . The default NVT is a half duplex device that requires a GO AHEAD (GA) from the server before accepting user input. The user input is echoed locally from the Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412