BT9001 – Data Mining

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

PROGRAM BSc
SEMESTER V
SUBJECT CODE & NAME Data Mining
CREDIT 4
BK ID BT9001
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 What is the relation between data mining and data warehousing? Explain.

Answer: – In computing, a data warehouse (DW, DWH), or an enterprise data warehouse (EDW), is a system used for reporting and data analysis. Integrating data from one or more disparate sources creates a central repository of data, a data warehouse (DW). Data warehouses store current and historical data and are used for creating trending reports for senior management reporting such as annual and quarterly comparisons.

 

Q.2 Define data mining. State the differences between data mining and DBMS.

Answer:- Data mining (the analysis step of the “Knowledge Discovery in Databases” process, or KDD),an interdisciplinary subfield of computer science, is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the

 

Q. 3 Explain clustering and its applications.

Answer: - Application clustering (sometimes called software clustering) is a method of turning multiple computer servers into a cluster (a group of servers that acts like a single system). Clustering software is installed in each of the servers in the group. Each of the servers maintains the same information and collectively they perform administrative tasks such as load balancing, determining node failures, and assigning failover duty. The other clustering method, hardware clustering, requires that specialized hardware be installed in a single server that controls the cluster.

 

5 How data mining is used in telecommunication field? Explain

Answer: – The telecommunications industry was one of the first to adopt data mining technology. This is most likely because telecommunication companies routinely generate and store enormous amounts of high-quality data, have a very large customer base, and operate in a rapidly changing and highly competitive environment. Telecommunication companies utilize data mining to improve their marketing efforts, identify fraud, and better manage their telecommunication networks. However, these companies also face a number of data mining challenges

 

Q.6 Draw and explain the architecture of data mining based IDS and explain.

Answer: – Data mining is the process of discovering actionable information from large sets of data. Data mining uses mathematical analysis to derive patterns and trends that exist in data. Typically, these patterns cannot be discovered by traditional data exploration because the relationships are too complex or because there is too much data.

These patterns and trends can be collected and defined as a data mining model. Mining models can be applied to specific scenarios, such as:

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

BT8903 – C# Programming

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

PROGRAM BSc
SEMESTER V
SUBJECT CODE & NAME C# Programming
CREDIT 4
BK ID BT8903
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

Q.1 Describe the components of .Net framework with the help of a diagram. Also explain the Common Language Runtime (CLR) in .Net.

Answer:- The Common Language Runtime (CLR) is an Execution Environment . It works as a layer between Operating Systems and the applications written in .Net languages that conforms to the Common Language Specification (CLS). The main function of Common Language Runtime (CLR) is to convert the Managed Code into native code and

 

Q.2 Describe the C# program structure with the help of a diagram.

Answer: – C# programs can consist of one or more

 

Q.3 Write the following programs in C#:

1. Write a program in C# to reverse a string using for loop.

2. Write a program in C# that concatenates list of strings.

Answer:-

 

Q.4 Explain the following in C#:

1. Pass by value

2. Pass by reference

3. Output parameters

4. Variable argument list

Answer:- Pass By Value:-

 

 

Q.5 Give the similarities and differences between structure and classes.

Answer:-

  • The difference between a class and a structure is that, by default, all of the members of a class are private and, by default, all of the members of a structure are public.
  • Structure are value type where as class are reference type.
  • Structure are default public where as class are default private.’this’ pointer will work only in class.
  • Structure: Initially (in C) a structure was
  •  

 

6 Explain the concept of inheritance with the help of an example. Also explain containment inheritance.

Answer: - In object-oriented programming (OOP), inheritance is when an object or class is based on another object or class, using the same implementation (inheriting from a class) or specifying implementation to mantain the same behavior (realizing an interface; inheriting behavior). It is a mechanism for code reuse and to allow independent

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

BT0088 – Cryptography and Network Security

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

PROGRAM BSc
SEMESTER V
SUBJECT CODE & NAME Cryptography and Network Security
CREDIT 4
BK ID BT0088
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 Describe the stream and block encryption with their advantages and disadvantages.

Answer:- While both are symmetric ciphers, stream ciphers are based on generating an “infinite” cryptograpic keystream, and using that to encrypt one bit or byte at a time (similar to the one-time pad), whereas block ciphers work on larger chunks of data (i.e. blocks) at a time, often combining blocks for additional security (e.g. AES in CBC mode).

 

Q.2 Compare DES and AES algorithms.

Answer:- DES (Data Encryption Standard) is a rather old way of encrypting data so that the information could not be read by other people who might be intercepting traffic. DES is rather quite old and has since been replaced by a newer and better AES (Advanced Encryption Standard). The replacement was done due to the inherent weaknesses in DES that allowed the encryption to be broken using certain methods of attack. Common applications of AES, as of

 

Q.3 Explain Developmental Controls and Administrative Controls.

Answer:- ADMINISTRATIVE CONTROL At the end of the lecture student will be able to:-Understand the concept of Administrative Accountability and Control-Understand the types of internal accountability and external accountability Administrative AccountabilityAccording to Leonard D. White accountability is `the sum total of constitutional, statutory

 

Q.4 List all the models of security and explain any two models.

Answer:- A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all.

A security policy is a document that expresses clearly and concisely what the protection mechanisms are to achieve. Its a statement of the security we expect the

 

Q.5 Define and explain IP security. Explain IP security architecture.

Answer: - IP Security Architecture

The purpose of the IP Security Architecture (IPSEC) is to provide a standard security mechanism and services to the currently used IP version 4 (IPv4) and to the new IP version 6 (IPv6). It does this by specifying two standard headers to be used with both versions of IP datagrams: “IP Authentication Header” (AH) and “IP Encapsulating Security Payload” (ESP

 

6 Describe guard and personal firewalls

Answer: - Firewalls are an excellent tool for securing a network. A firewall is system designed to prevent unauthorized access to or from a private network and basically limits access to a network from another network. Firewall that can be implemented in hardware or software, or a combination of both either denies or allows outgoing traffic known as egress filtering or incoming traffic known as ingress filtering.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

BT0087 – WML and WAP Programming Theory

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

PROGRAM BSc
SEMESTER V
SUBJECT CODE & NAME WML and WAP Programming Theory
CREDIT 4
BK ID BT0087
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 What is wireless markup language? Where it is used? Explain its advantages and disadvantages.

Answer: - Wireless Markup Language (WML), based on XML, is a markup language intended for devices that implement the Wireless Application Protocol (WAP) specification, such as mobile phones. It provides navigational support, data input, hyperlinks, text and image presentation, and forms, much like HTML (HyperText Markup Language). It preceded the use of other markup languages now used with WAP, such as HTML itself, and XHTML (which are

 

Q.2 Explain doctype declaration and line breaking in WML with examples.

Answer:- All WML documents must have the DOCTYPE declaration. It should be placed between the XML declaration and the <wml> element. Below is the DOCTYPE declaration for WML 1.3. You can simply copy and paste it into your WML files

The DOCTYPE declaration specifies the name of the DTD (Document Type Definition) and the URL to the DTD. The DTD contains information about the

 

Q.3 What is the use of Lang library functions in WML? What are the functions available in Lang library? Explain any two of them in detail with examples.

Answer:- A programming language basically offers an environment encompassing conditional statements such as, the, if and for constructs, loops, arithmetic and logical operators etc. But, what really separates one programming language from another is its ability to enhance the productivity of the programmer. This is achieved by distributing free libraries, functions and utilities with the programming language. In this case, a large number of very useful

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

BT0086 – Mobile Computing

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

PROGRAM BSc
SEMESTER V
SUBJECT CODE & NAME Mobile Computing
CREDIT 4
BK ID BT0086
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 Explain CDMA technique. Draw necessary diagram.

Answer: – A CDMA communication system, comprising:

  • A plurality of base transceiver stations spatially distributed to communicate with mobile communication devices via radio links;
  • A plurality of base station controllers, each coupled to a plurality of base transceiver stations;
  • A mobile switching center connected to couple said base station controllers to a public telephone network.
  • A data communication system comprising (1) a plurality of packet control function devices respectively connected to said base
  •  

 

Q.2 List and explain the different kinds of domains available in wireless communication.

Answer:- The most mature wireless network technology today is 802.11b, which is what we will focus on. Let’s briefly go over the IEEE 802.11b standard.

IEEE 802.11b makes use of the 2.4 GHz ISM band and provides speeds from 1 Mbps up to 11 Mbps, with the range about 1500 feet. (Although in reality, you are hard

 

Q.3 What do you mean by mobile operating system? Explain Symbian operating system. List the mobile operating systems which are currently popular in market.

Answer:- A mobile operating system, also referred to as mobile OS, is an operating system that operates a smartphone, tablet, PDA, or other mobile device. Modern mobile operating systems combine the features of a personal computer operating system with other features, including a touchscreen, cellular, Bluetooth, Wi-Fi, GPS mobile navigation, camera, video camera, speech recognition, voice recorder, music player, near field communication and

 

 

Q.4 Explain WAP forum and mobile wireless devices.

Answer: – Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but needed interactivity to support Internet and Web applications such as:

  • Email by mobile phone
  • Tracking of stock-market prices
  •  

 

Q.5 what are the two methods of Spread Spectrum modulation? Explain in detail.

Answer:- Spread spectrum communication is the modulation method used in the current standard wireless systems such as wireless LAN, Bluetooth, ZigBee and other public-use radio. You may have heard of spread spectrum communication, but wouldn’t you like to know what it actually means?

 

There are two types of spread spectrum communication, direct sequence spread spectrum (DS) and frequency hopping (FH) spread spectrum. However, as a general term it’s called spread spectrum communication, but the only thing it has in common

 

Q.6 What is demand routing protocols? Explain cluster based routing protocols.

Answer: - A stub router can be thought of as a spoke router in a hub-and-spoke network topology—as shown in Figure 34—where the only router to which the spoke is adjacent is the hub router. In such a network topology, the IP routing information required to represent this topology is fairly simple. These stub routers commonly have a WAN connection to the hub

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

BCA3020 – Database Management System

 

Dear students get fully solved  SMU BBA Spring 2014 assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

SPRING 2014, ASSIGNMENT

 

DRIVE SPRING 2014
PROGRAM BACHELOR OF COMPUTER APPLICATION
SUBJECT CODE & NAME BCA3020/IMC3020- Database Management System
SEMESTER THIRD
CREDITS 4
MAX. MARKS 60
BK ID

 

B

 

 

Answer all questions

 

 

1 What is Database? Explain its properties.

Answer : A database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images.

 

 

In computing, databases are sometimes classified according to their organizational approach. The most prevalent approach is the relational database, a tabular database in which data is defined so that it can be reorganized and accessed in a number of different ways. A distributed database is one that can be dispersed or replicated among different points in a network. An object-oriented programming database is one that is

 

 

2 Write a note on:

  • MySQL Architecture

Answer : MySQL’s architecture consists of a web of interrelated function sets, which work together to fulfil the various needs of the database server. A number of authors3 have implied that these function sets are indeed components, or entirely encapsulated packages; however, there is little evidence in the source code that this is the case.

 

Indeed, the architecture includes separate function libraries, composed of functions that handle similar tasks, but there is not, in the traditional object-oriented programming sense, a full component-level separation of functionality.

 

 

  • Primary Subsystems

 

Answer : To increase availability and scalability, you can set up DB2 UDB for z/OS as a parallel database, known as DB2 data sharing. With this setup, multiple DB2 subsystems share the same SAP database. Each subsystem is called a data sharing member, and the set of subsystems is referred to as a data sharing

 

3 What are the attributes used in the E-R model? Explain with the example of Student database.

 

Answer : Entity-Relationship (ER) Model

In the ER model, the main concepts are entity, attribute, and relationship.

 

Entities and Attributes

 

Entity: An entity represents some “thing” (in the miniworld) that is of interest to us, i.e., about which we want to maintain some data. An entity could represent a physical object (e.g., house, person, automobile, widget) or a less tangible concept (e.g., company, job, academic course, business transaction).

 

4 What is Relational Database Management System? Explain three aspects of RDBMS.

 

Answer : A relational database management system (RDBMS) is a program that lets you create, update, and administer a relational database. Most commercial RDBMS’s use the Structured Query Language (SQL) to access the database, although SQL was invented after the development of the relational model and is not necessary for its use.

 

 

The leading RDBMS products are Oracle, IBM’s DB2 and Microsoft’s SQL Server. Despite repeated challenges by competing technologies, as well as the claim by some experts that no current RDBMS has fully implemented relational principles, the majority of new corporate databases are still being created and managed with an RDBMS.

 

 

5 What do you mean by Embedded SQL? How do you declare variables and exceptions?

 

Answer : Embedded SQL is a method of inserting inline SQL statements or queries into the code of a programming language, which is known as a host language. Because the host language cannot parse SQL, the inserted SQL is parsed by an embedded SQL preprocessor.

 

Embedded SQL (ESQL) is a SQL-92 standard application programming interface (API) for SQL database access. ESQL requires a two-step compilation process:

  • A precompiler translates Embedded SQL statements into commands in the programming language used to write the application.

 

6 Briefly explain the reasons behind Object-relational impedance mismatch.

 

Answer : The O/R Impedance Mismatch

 

Why does this impedance mismatch exist?  The object-oriented paradigm is based on proven software engineering principles.  The relational paradigm, however, is based on proven mathematical principles.  Because the underlying paradigms are different the two technologies do not work together seamlessly. The impedance mismatch becomes apparent when you look at the preferred approach to access: With the object paradigm you traverse objects via their relationships whereas with the relational paradigm you join

Dear students get fully solved  SMU BBA Spring 2014 assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

BC0056-UNIX OPERATING SYSTEM

Dear students get fully solved  SMU BBA Spring 2014 assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

SPRING 2014, ASSIGNMENT

 

 

PROGRAM BCA(REVISED 2007)
SEMESTER 5TH
SUBJECT CODE & NAME BC0056-UNIX OPERATING SYSTEM
CREDIT 4
BK ID B0973
MAX. MARKS 60

 

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

1.Define Boot Procedure and Kernel.

 

Answer: The Boot Procedure

 

Bootstrapping is the process of starting up a computer from a halted or powered-down condition. When the computer is switched on, it activates the

 

 

2. What are the privileges of using UNIX?

 

Answer: Unix was one of the first “modern” operating systems developed for computers. Because of advantages in security, speed and cost, Unix serves as the operating system of choice for many companies around the world. Unix systems (and Unix-like variants such as FreeBSD, Solaris, OSX and Linux) maintain prevalence on large computers such as mainframes and supercomputers, while being equally suited for desktops, laptops and netbooks.

 

Privileges of using UNIX :

 

Q.4 what is a Process? How to run a process at the background?

 

Answer:-A process is a mechanism in an operating system that can run a series of steps. The mechanism depends on the operating system. For example,

 

 

Q.5 Demonstrate how and when you can use the following commands: vi, cat, chmod, grep, man, pwd, ps, kill, mkdir, rm.

 

Answer:-

 

 

Q.6 Write a C program that illustrates the creation of child process using fork system call. One process finds sum of even series and other process finds sum of odd series.

 

Answer:-

 

Source Code::

==========

 

#include <stdio.h>

#include <sys/types.h>

#include <unistd.h>

Dear students get fully solved  SMU BBA Spring 2014 assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601