Saturday, 21 April 2018

smu bca 2nd sem assignment Spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application - BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA211 – Operating System
Assignment Set -1 Questions
Q1 What are the components of UNIX Kernel? 10
Answer:-
The UNIX kernel s divided in to three modes: user mode, kernel mode, and hardware. The user mode contains user programs

Q2. Discuss First-Come-First-Served scheduling algorithm. 10
Answer:-
This is one of the brute force algorithms. A process that requests for the CPU first is allocated the CPU first. Hence, the name first come first serve.  The FCFS algorithm is implemented by using a first-in-first-out (FIFO) queue structure


Q3 a) What are the necessary conditions for deadlock to occur? b) Write a note on Resource Allocation Graph. 4+6
 Answer:-
a)
A deadlock occurs in a system if the following four conditions hold simultaneously:
1)      Mutual exclusion:


Assignment Set -2 Questions

Q1 Discuss the concept of Direct Memory Access.  10
Answer:-
In most mini and mainframe computer systems, a great deal of input and output occurs between the disk system and the processor. It would be very inefficient to perform these operations directly through the processor;

Q2 Explain demand paging in virtual memory system. 10
Answer:-
Demand paging is similar to paging with swapping (Refer figure below). When a process is to be executed then only that page of the process, which needs to be currently executed, is swapped into memory. Thus, only necessary pages

Q3 What are the different forms of Encryption in Distributed System? 10
Answer:-
Encryption in a distributed environment can be of two forms:
  End-to-end encryption
 Link encryption
 If end-to-end

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application – BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA212 – Data Structure and Algorithm

Assignment Set -1 Questions

Q1 Explain Adjacency Matrix and Incidence matrix form of representing a graph. 5+5
 Answer:-
Adjacency matrix
 It is a two-dimensional Boolean matrix to store the information about the graph nodes. Here the rows and columns represent source and destination vertices and entries in the matrix indicate whether an edge exists between the vertices

Q2 Explain in detail the traversing and searching of linked list. 5+5
Answer:-
Traversing a Linked List Traversing a linked list means processing each node of list exactly once. The linked list in

Q3 Discuss the stack data structure with Push () and Pop () operation. 10
Answer:-
A stack is a data structures in which insertion and deletion of items are made at the one end, called the top of the stack

Assignment Set -2 Questions

Q1 Write the Algorithm for sorting by Partitioning.
 Answer:-
In merge sort, the file a[1:n] was divided at its midpoint into subarrays which were independently sorted and later merged.
In quick sort,

Q2 Explain the Concept of travelling Salesman Problem 
Answer:-
A tour of G is a directed simple cycle that includes every vertex in V. The cost of the tour is the sum of the cost of the edges on the tour. The travelling salesperson problem is to find a tour of minimum cost. Let G=(V,E) be a

Q3 Explain how Dijkstra’s algorithm is used to find the shortest path of Directed weighted graph.
10
Answer:-
This algorithm is used to find the shortest path between the two vertices in a weighted directed graph and it is also very popular and efficient to find each and every path from starting (source) to terminal vertices.  Let w(vi , vj ) be the weight associated with every edge (vi , vj ) in a given weighted directed graph G.  Let us define that the weights are such that the


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application – BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA213 – Object Oriented Programming – C++


Assignment Set -1 Questions
Q1 Differentiate between an external variable and an automatic variable with the help of an example. 10
Answer:-
Automatic variables is default variable in C++. All the variables we have created and used in programs are automatic variables. These variables can also be declared by prefixing the keyword auto. One of important characteristics of

Q2 What is “this pointer” in C++? What are the features of “this pointer”? [3+7]
Answer:-
The this pointer is used as a pointer to the class object instance by the member function. The address of the class instance is passed as an implicit parameter to the member functions. The sample below, in this section shows how to use it. It is common knowledge that C++ keeps only one copy of each member function


Q3 Explain destructor in detail. 10
 Answer:-
Destructors are usually used to deallocate memory and do other cleanup for a class object and its class members when the object is destroyed. A destructor is called for a class object when that object passes out of scope or is



Assignment Set -2 Questions
Q1 What is Polymorphism? What are the different types of Polymorphism? 3+7
Answer:-
Polymorphism means same content but different forms. In C++, polymorphism enables the same program code calling different functions of different classes. Imagine a situation where you would like to create a class shape and derive classes such as rectangle, circle, triangle etc. Let us suppose each of the classes has a member function draw() that causes the object to be drawn on the screen. You would like to write a common code as

Q2 Explain sequence containers 10
Answer:-
STL provides a number of container types, representing objects that contain other objects. The STL contains sequence containers and associative containers. The standard sequence containers include vector, deque and list


Q3 Discuss the following functions of file operations a) tellg() b) seekp() c) ignore() d) getline() 2.5x4
Answer:-
a) tellg()
tellg() – Returns an int type, that shows the current position of the inside-pointer. This one works only when you read a file. Example:
#include <

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


ASSIGNMENT DRIVE – Spring 2018
PROGRAM Bachelor of Computer Application – BCA
SEMESTER - 2
SUBJECT CODE & NAME - BCA214 – Communication Skills


Assignment   Questions

Q1 Discuss the advantages and disadvantages of oral communication. Write a short note on the improvement of oral communication 5+5=10
Answer:-
Advantages of oral communication:-
In oral communication there is a possibility of immediate response. This makes speedy interaction and immediate feedback possible. This is the biggest advantage of oral communication.
Another advantage is that the speaker can observe the listener's reaction to what is being stated.

 Time saving: When action is

Q2 What is the difference between listening and hearing? Name the different types of listening. 5+5=10
Answer:
Hearing is a passive process. It is merely the detection of sounds around us. Normally, we come across ‘hearing’ in certain situations. E.g.: When your lecturer reprimands you for some of your shortcomings, you just hear it without paying

Q3 Discuss the definition and meaning of reading. 10
Answer:-

The following are a few definitions regarding the process of reading.
 Reading is thinking under the stimulus of the printed page (Webster, 1982:30)
 Reading is a Psycho-

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT DRIVE – Spring 2018
PROGRAM - Bachelor of Computer Application – BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA215 – Computer Organization

Assignment Set -1 Questions

Q1 What do you mean by addressing modes? List the different types of addressing modes. 3+7
Answer:-
Addressing Modes
In general, a program operates on data that reside in the computer’s memory. These data can be organized in a variety of ways. If we want to keep track of students’ names, we can write them in a list. If we want to associate information with each name, for example to record telephone numbers or marks in various courses, we may organize this

Q2 Explain the programmer’s model of 8086. 10
Answer:-
The programmer’s model of 8086 is the most important concept to study in the 8086 model. Figure below shows the register organisation of 8086. This is termed as the Programmer’s model of 8086. The registers shown in the programmer’s

Q3 Explain the process of fetching a word from the memory. 10
 Answer:-
To fetch a word of information from the memory CPU must specify the address of the memory location where this word is located and request a read operation. This includes whether the information to be fetched represents an instruction

Assignment Set -2 Questions

Q1 Write a note on replacement algorithms. 10
Answer:-
When a new block is to be  brought into the cache and all the positions that it may occupy are full, then the cache controller must decide which of the old blocks to overwrite. Because the programs usually stay in localized areas for a reasonable period of time, there is high probability that the blocks that have been referenced recently will be

Q2 Explain the concept of coprocessor. Also explain its functions. 4+6
Answer:-
Coprocessor
Coprocessor is a relatively new concept in the area of multiprocessing. A coprocessor refers to a computer processor which is utilised as an addition to the functions of the cpu (the primary processor). A coprocessor is also known as a math processor or a numeric processor. It is capable of carrying out large amount of computations, thereby

Q3 How CPU responds to an interrupt? 10
Answer:-
The CPU checks periodically to determine if an interrupt signal is pending. This check is usually done at the end of each instruction, although some modern machines allow for interrupts to be checked for several times during the execution of very long instructions. When the CPU detects an interrupt, it then saves its current state (at least the PC

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412




smu mca 5th sem assignment Spring 2018 (july/aug 2018 exam)


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM-MCASEMESTER-V
SUBJECT CODE & NAME-MCA5010-WEB TECHNOLOGIES
CREDIT-4
MAX. MARKS-60
Qus:1 Differentiate between TCP and UDP
Answer:
Differentiate between TCP and UDP:
TCP (Transmission Control Protocol):
The TCP corresponds to the transport layer of OSI reference model, The TCP is known as a connection-oriented protocol, which means that connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged. TCP makes sure data gets to the destination without errors. It is also responsible for disassembling and assembling

Qus: 2 describe the features of XML. What are the important rules to keep in mind about the XML declaration?
Answer:
The features of XML:
XML is popular for many features and few of them are listed here:
1.      Easy Data Exchange: In XML, data and mark-up are stored as text that we can configure. If we like, we can use XML editors to create
2.       
Qus: 3. List and explain the Components of XML processor.
Answer.
Components of XML processor:
a) Parser:

Every XML processor has a parser. An XML parser converts an XML document into an XML DOM object - which can then be manipulated with a JavaScript. The parser's job is to translate XML mark-up and data into a stream of bite-sized nuggets, called tokens, to be used for processing. A token may be an element start tag, a string of character content

Qus:4. Describe the procedure of fetching data from XML to HTML. Give an example.
Answer.
Procedure of fetching data from XML to HTML:
The process of fetching data from an XML files to be filled in an HTML table, using DSO (Data Source Object) and JavaScript. DSO is an object that operates like a database on the client side. It will accept information that is organized in a certain way and


Qus:5. Describe five different categories of PHP Operators.
Answer.
Categories of PHP Operators:
In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.

Ø  Assignment Operators
Ø  Arithmetic Operators
Ø  Comparison
Ø   



Qus:6. Describe about ASP.
Answer.
ASP:
The page on the server called by the JavaScript is an ASP file called AJAX server page. The server file could easily be rewritten in PHP, or some other server languages. Look at the example in PHP. The source code in "getcustomer.asp"


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Spring 2018 ASSIGNMENT
PROGRAM-MCA(REVISED FALL 2012)
SEMESTER-V
SUBJECT CODE & NAME-MCA5020-ADVANCED SOFTWARE ENGINEERING
Qus:1 What do you mean by product life cycle? Explain the seven stages of product life cycle
Answer:
Product life cycle:
A series of steps is required to manufacture a product..The product developed should satisfy the customer. The series of steps involved in developing the product is called the product life cycle.

The stages of product life cycle:
The seven stages in a product life cycle are:

Qus: 2 List any ten major principles of agile software.
Answer.
 Principles of agile software:
The major principles of agile software are:

·         Satisfying
·          
·          
·          



Qus: 3. List the four developer practices of XP. Explain briefly about Adopt test-driven development
Answer:
Developer practices of XP:
XP values and the significance of time and resource for an XP practitioner. As a development model, the XP empowers the developers and stakeholders, associated with the project, to successfully carry out the project and develop efficient software.


Qus:4. Briefly explain about tracker and coach in XP.
Answer.
Tracker and coach in XP:
Tracker:

A tracker is a person who keeps track of the schedule. A tracker can be a manager or a trusted developer. XP keeps track of certain metrics that include team velocity. This is the ratio of ideal time estimated for accomplishing a task to the actual time spent implementing them. The tracker also includes other data


Qus:5. Explain XP prerequisites.
Answer.
XP prerequisites:
The following are the prerequisites for adopting XP:
Ø  Team agreement
Ø  A collocated team
Ø  On-site customers
Ø  The right team size
Ø  Use all XP practices

·         Team agreement: The team’s agreement to use XP is as important as management support. If team members do not want to use XP, it’s not likely to work. XP assumes that each team member’s willingness to adopt it. It is not a good practice to force the process on somebody who is resisting it.


Qus:6. List and explain any five basic principles of DSDM
Answer:
Principles of DSDM:
DSDM consists of nine basic principles. These principles form the cornerstones of development using DSDM and direct how development progresses. Ignoring any one of them will break with the frameworks philosophy and



Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM - Master of Science in Information Technology(MSc IT)Revised Fall 2011
                                                                 SEMESTER - 4
SUBJECT CODE & NAME – Mca5032- WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4

Q1. Describe wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a



2 Describe any five GSM PLMN basic services.

Answer: 5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic answering machines used in wireless telephone network needs a controlling mechanism. For this purpose the GSM PLMN uses a tone signalling service

Q3. Differentiate BSC and MSC protocols. 10
Ans: BSC protocols: Once the information is communicated from the BTS to the BSC, the Abis
interface is used to

an be routed to the user by the location information contained in the user’s HLR.

Q4. What is CDMA? Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be introduced to the concept of CDMA, its channel concept and its operation. Code Division Multiple Access technology emerged as an alternative to the GSM cellular architecture. Frequency reuse is an




Q5. Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans: A5 Algorithm – An A5 encryption algorithm scrambles the user's voice and data traffic between the handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being transmitted on the Um interface. The Kc (ciphering key) and the
plaintext data are inputted into the A5 algorithm and

Q6. List and explain the different path loss models. 10
Ans: Path Loss Models: Path loss models describe the signal attenuation between a transmit and a receive antenna as a function of the propagation distance and other parameters. Some models include many details of the topography profile to estimate the signal reduction, whereas others just consider carrier frequency and distance. Path loss is the reduction in power density of an electromagnetic wave as it propagates through space. It is a major component in the analysis and design of the link budget of a

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
SPRING 2018
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
5
SUBJECT CODE & NAME
MCA5042- Cryptography and Network Security


1 a) List and explain the objectives of computer security.
b) What is the difference between passive and active security threats?

Answer: a) Objectives of Computer Security
Confidentiality
The first objective of security is confidentiality: keeping information away from people who should not have it. Accomplishing this objective requires that we know what data we are protecting and who should have access to it. It requires that we provide protection mechanisms for the data while it is



2 a) What is avalanche effect?
b) Explain data encryption standard (DES).

Answer: a) In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions wherein if when an input is changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause


3 Explain the evaluation criteria for Advanced Encryption Standard (AES).

Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice for years, if not decades. In January 1997, NIST called for cryptographers to develop a new encryption system. As with the call


4 a) What is key distribution?
b) Explain symmetric key distribution using symmetric encryption.

Answer: a) In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it


5 a) Describe the four types of protocol of SSL.
b) What is Transport Layer Security (TLS)? Explain.

Answer: a) The SSL defines four protocols in two layers. They are:
Change CipherSpec Protocol
The change CipherSpec protocol is responsible for sending change CipherSpec messages. At any time, the client can request to change current cryptographic parameters such as the handshake key exchange.



6 a) Discuss intrusion detection.
b) What do you mean by malicious software? Explain in detail.

Answer: a) Intrusion detection:
Closely related to audit reduction is the ability to detect security lapses, ideally while they occur. As we have seen in the State Department example, there may well be too much information in the audit log for a human to analyze, but

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412