BT0064 – LOGIC DESIGN

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

 

ASSIGNMENT

 

WINTER

2013

PROGRAM

BSc IT

SEMESTER

1

SUBJECT CODE & NAME

BT0064-LOGIC DESIGN

CREDIT

4

BK ID

B0948

MAX. MARKS

60

 

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Eachquestion is followed by evaluation scheme.

 

 

 

 

Q.1Expand the following Boolean functions into their canonical form:

i. f(X,Y,Z) =XY+YZ+ X Z+ X Y

ii. f(X,Y, Z) =XY+ X Y + X YZ

 

Answer: Canonical Form: -The word “canonical” simply means “standard” and it is used throughout mathematics and science to denote some standard form for equations. In digital electronics, Boolean equations are considered to be in canonical form when each of the terms in the equation includes all of the possible inputs and those terms appear in the same order as in the truth table. The canonical form is important when simplifying a circuit.

 

For example, imagine the solution to a given problem generated the following truth table:

Canonical Example #1 Inputs     Output

 

 

 

 

 

 

 

Q.2 Explain the concepts of Gray code and Excess-3 Code with their respective properties.

 

Answer: Gray code:-

 

The reflected binary code, also known as Gray code after Frank Gray, is a binary numeral system where two successive values differ in only one bit. The reflected binary code was originally designed to prevent spurious output from electromechanical switches. Today, Gray codes are widely used to facilitate error correction in digital communications such as digital terrestrial television and some cable TV systems.

 

The reflected binary code solves this problem by changing only one switch at a time, so there is never any ambiguity of position:-

 

 

 

 

 

Q.3 Explain the working of JK flip-flop in detail.

 

Answer: The J-K Flip-Flop IC is used to shift data from one point to another in a circuit in a timed fashion using a clock/strobe pulse to control the data flow. The J-K is also used as a binary counter. The number of bits in the counter byte is determined by the number of J-Ks that are linked (output-to-input fashion). As a teacher I found the J-K ideal for teaching the concepts of data shifting (control) and binary counting. My students could underatand these concepts easily enough. However, they had great difficulty visualizing the workings of the Flip-Flop action

 

 

Q.4 Define shift registers and explain SISO shift registers.

 

 

Answer: Shift registers: -In digital circuits, a shift register is a cascade of flip flops, sharing the same clock, in which the output of each flip-flop is connected to the “data” input of the next flip-flop in the chain, resulting in a circuit that shifts by one position the “bit array” stored in it, shifting in the data present at its input and shifting out the last bit in the array, at each transition of the clock input. More generally, a shift register may be multidimensional, such that it’s “data in” and stage outputs are themselves bit arrays: this is implemented simply by running several shift registers of the same bit-length in parallel.

 

 

 

 

 

Q.5 Explain how the error correction and compression take place in modems.

 

Answer: When transferring data over telephone lines using a modem, accidents can and do happen. Because the telephone network was not originally designed to transfer data, noise on the line can cause a modem to misinterpret the signal received from another modem causing data corruption. Under many circumstances, such corruption can cause severe problems (money lost and data rendered useless).

 

To combat such problems, the modem incorporates two separate methods of error correction, the Microcom Network Protocol (MNP) and the ITU-

 

 

 

 

Q.6 Explain any five common types of DAC.

 

Answer: A digital-to-analog converter (DAC or D-to-A) is a device for converting a digital (usually binary) code to an analog signal (current, voltage or charges). A DAC inputs a binary number and outputs an analog voltage or current signal.

 

 

The most common types of electronic DAC’s are:

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0062 – Fundamentals of IT

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

ASSIGNMENT

 

WINTER

2013

PROGRAM

BSc IT

SEMESTER

FIRST

SUBJECT CODE & NAME

BT0062, Fundamentals of IT

CREDIT

3

BK ID

B0946

MAX. MARKS

60

 

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 Write differences between mainframe computers and supercomputers.

 

Answer:- Technology advances since the introduction of the mainframe computer in the mid-20th century have blurred the distinctions between mainframes and large servers, but there are still distinctions that classify some computing machines as mainframe computers — including speed, total throughput, environmental considerations and operating systems. Mainframe computers are alive and well, evidenced by the fact that IBM announced the release the zEnterprise mainframe in July of 2010.

Both mainframes and supercomputers push the limits of what can be accomplished through computing. They are both large and powerful machines, but they are not the same thing. Because of their similarities (big black boxes hidden away in locked-up data centers), the terms are often used interchangeably by those who don’t know any better. However, they refer to very different kinds of hardware and types of computing.

The biggest distinction between mainframes and supercomputers is the type of problems they tackle. Each of these types of large computers is specially designed and optimized to perform a particular type of task, and to do it better than any other computer. Not only do supercomputers and mainframes do their tasks more efficiently than other types of computers, they do things that no other computers can do!

 

Q.2 i. Find 1’s complement of (100101)2

ii. Find 2’s complement of (1011010)2

iii. Perform the subtraction using 1’s complement

(11001)2-(10100)2.

Show the steps

iv. Perform subtraction using 2’s complement method

(0111)2-(0001)2

Show the steps

 

Answer:- (i) 1’s complement of (100101)2 = 011010

(ii)Find 2’s

 

 

Q.3 what is symbol? How to insert a symbol in a Word document?

Answer: - Sometimes the standard characters, numbers, and punctuation marks are just not enough. If you are preparing an MS Word document and need to insert a special symbol such as a copyright symbol, trademark, the ever-popular Euro symbol, and much more, here are a few ways to do it.

 

There are four ways to insert a symbol in a Word document

 

 

Q.4 How do you adjust the system date and time?

Answer: -Important notice for users of Office 2003    To continue receiving security updates for Office, make sure you’re running Office 2003 Service Pack 3 (SP3). The support for Office 2003 ends April 8, 2014. If you’re running Office 2003 after support ends, to receive all important security updates for Office, you need to upgrade to a later version such as Office 365 or Office 2013. For more information, see Support is ending for Office 2003.

  • Click where you want to insert the date or time.
  • On the Insert menu, click Date and Time.
  • If you want to insert the date or time in
  •  

 

 

Q.5 briefly explains formatting option in PowerPoint.

 

Answer: -Microsoft Office PowerPoint Viewer is a program used to run presentations on computers that do not have PowerPoint installed. Office PowerPoint Viewer is added by default to the same disk or network location that contains one or more presentations packaged by using the Package for CD feature.

 

  • PowerPoint Viewer is installed by default with a Microsoft Office 2003 installation for use with the Package for CD feature. The PowerPoint Viewer file is also available for download from the Microsoft Office Online Web site.
  •  

Q.6 what is the importance of graphics multimedia? Explain the two types of graphics.

 

Answer:- Graphics can be used in multimedia applications as backgrounds, buttons, icons, navigational items, colors, maps, and charts; illustrations to explain concepts, information, and moods; and logos to communicate corporate image.

 

In addition, once images are in a digital format, image-editing software such as Adobe Photoshop can be used to edit and manipulate them even further. Using image-editing software, multimedia developers can combine text and images to create almost any

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BC0056-UNIX OPERATING SYSTEM

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

 

PROGRAM BACHELOR OF COMPUTER APPLICATION
SEMESTER 5TH
SUBJECT CODE & NAME BC0056-UNIX OPERATING SYSTEM
CREDIT 4
BK ID B0973
MAX. MARKS 60

 

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

Q.1 Explain the Layers of UNIX Operating System in detail.

 

Answer: -UNIX Operating System:- Unix (officially trademarked as UNIX) is a multitasking, multi-user computer operating system that exists in many variants. The original UNIX was developed at AT&T’s Bell Labs research center by Ken Thompson, Dennis Ritchie, and others. From the power user’s or programmer’s perspective, Unix systems are characterized by a modular design that is sometimes called the “Unix philosophy,” meaning the OS provides a set of simple tools that each perform a limited, well-defined function, with a unified file system as the main means of communication and a shell scripting and command language to combine the tools to perform complex workflows.

 

 

 

 

Q.2 Write a short note on

a. The fork() System Call

b. The pipe() System Call

 

Answer: -  System call fork() is used to create processes. It takes no arguments and returns a process ID. The purpose of fork() is to create a new process, which becomes the child process of the caller. After a new child process is created, both processes will execute the next instruction following the fork() system call. Therefore, we have to distinguish the

 

 

Q.3 Describe the UNIX file system.

 

Answer: – Most UNIX machines store their files on magnetic disk drives. A disk drive is a device that can store information by making electrical imprints on a magnetic surface. One or more heads skim close to the spinning magnetic plate, and can detect, or change, the magnetic state of a given spot on the disk. The drives use disk controllers to position the head at the correct place at the correct time to read from, or write to, the magnetic surface of the plate. It is often possible to partition a single disk drive into more than one logical storage area. This section describes how the UNIX operating system deals with a raw storage device like a disk drive, and how it manages to make organized use of the space.

 

 

 

Q.4 what is a Process? How to run a process at the background?

 

Answer:-A process is a mechanism in an operating system that can run a series of steps. The mechanism depends on the operating system. For example, on Linux an Oracle background process is a Linux process. On Windows, an Oracle background process is a thread of execution within a process.

A background process is a computer process that runs “behind the scenes” (i.e. in the background) and without user intervention. Typical tasks for these processes include logging, system monitoring, scheduling,[2] and user notification.

 

 

 

Q.5 Demonstrate how and when you can use the following commands: vi, cat, chmod, grep, man, pwd, ps, kill, mkdir, rm.

 

Answer:-

 

 

 

Q.6 Write a C program that illustrates the creation of child process using fork system call. One process finds sum of even series and other process finds sum of odd series.

 

Answer:-

 

Source Code::

==========

 

#include <stdio.h>

#include <sys/types.h>

#include <unistd.h>

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BC0055 – TCP/IP

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

 

WINTER 2013, ASSIGNMENT

 

DRIVE WINTER 2014
PROGRAM BACHELOR OF COMPUTER APPLICATION
SUBJECT CODE & NAME BC0055, TCP/IP
SEMESTER 5TH SEM
CREDITS 4
MAX. MARKS 60
BK ID

 

B0965

 

 

Answer all questions

 

1. Define PPP. What are its three components? Draw the diagram and explain PPP encapsulation frame.

Answer : PPP stands for the Point-to-Point Protocol, but even the standard that defines PPP immediately starts describing protocols that comprise it, which is why I consider it a protocol suite. At the highest level, the functions of PPP can be broken down into several components. Each of these encompasses a general class of PPP functionality, and is represented by either one protocol in the suite or a set of protocols.

 

Main PPP Components

The PPP standard itself describes three “main” components of PPP:

 

 

 

 

2. What do you mean by user datagram protocol? Draw and explain the diagram of UDP datagram format.

 

Answer: UDP (User Datagram Protocol) is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP). UDP is an alternative to the Transmission Control Protocol (TCP) and, together with IP, is sometimes referred to as UDP/IP. Like the Transmission Control Protocol, UDP uses the Internet Protocol to actually get a data unit (called a

 

 

 

3. Explain in brief Ports and Sockets.

Answer: Ports

 

Each process that wants to communicate with another process identifies itself to the TCP/IP protocol suite by one or more ports. A port is a 16-bit number, used by the host-to-host protocol to identify to which higher-level protocol or application program (process) it must deliver incoming messages.

 

 

 

4. Give an overview of FTP. List the FTP operations and explain any two of them.

 

Answer: An Overview of the File Transfer Protocol

 

The File Transfer Protocol (FTP) was one of the first efforts to create a standard means of exchanging files over a TCP/IP network, so the FTP has been around since the 1970′s.  The FTP was designed with as much flexibility as possible, so it could be used over networks other than TCP/IP, as well as being engineered to have the capability with exchanging files with a broad variety of machines.

 

 

5. Explain HTTP operations with necessary diagrams.

 

Answer: HTTP Operations

The HTTP category includes the following operations:

 

 

 

HTTP is a good example of a protocol demonstrating RESTful design principles. In fact, proponents of REST argue that it is precisely the RESTful qualities of HTTP that enabled the rapid expansion of the World Wide Web. In keeping with REST principles,

 

6. What is SNMP manager? Explain types of requests to the SNMP agent.

 

Answer: What is SNMP?

 

Simple Network Management Protocol (SNMP) is an application–layer protocol defined by the Internet Architecture Board (IAB) in RFC1157 for exchanging management information between network devices. It is a part of Transmission Control Protocol⁄Internet Protocol (TCP⁄IP) protocol suite.

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BC0053 – VB.NET & XML

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

WINTER 2013, ASSIGNMENT

 

DRIVE WINTER 2014
PROGRAM BACHELOR OF COMPUTER APPLICATION
SUBJECT CODE & NAME BC0053 – VB.NET & XML
SEMESTER 5TH SEM
CREDITS 4
MAX. MARKS 60
BK ID

 

B0975

 

 

Answer all questions

 

1.Describe Visual Studio .NET and the .NET Framework

 

Answer : Visual Studio .NET

 

Visual Studio .NET is a complete set of development tools for building ASP Web applications, XML Web services, desktop applications, and mobile applications. Visual Basic .NET, Visual C++ .NET, Visual C# .NET, and Visual J# .NET all use the same integrated development environment (IDE), which allows them to share tools and facilitates in the creation of mixed-language solutions. In addition, these languages leverage the functionality of the .NET Framework, which provides access to key technologies that simplify the development of ASP Web applications and XML Web services.

 

 

 

2.List the various Arithmetic, Concatenation, Comparison, Logical and Bitwise Operators.

 

Answer : Arithmetic and Concatenation Operators

 

  • Exponentiation (^)

 

  • Unary negation (–)

 

  • Multiplication and division (*, /)

 

 

 

3.State important properties and methods of an Exception.

 

Answer : Exception Properties

 

The System.Exception base class is the class that is inherited by all exception classes in the .NET Framework. Therefore, the properties of the Exception class is available to other exception classes. The following table shows some notable properties of the System.Exception class which is shared by all of the other exception classes.

 

 

4.List some of the applications of XML and related technologies.

 

Answer : XML Applications

The XML Document Used

In this application we will use the “cd_catalog.xml” file.

 

Display the First CD in an HTML div Element

 

 

 

 

5.Design a form to create basic calculator in VB.NET.

 

Answer : First we design an interface in VB.Net form as shown in the picture.

In the code window of the form write the code as under:

First create two variables f and res as shown under.

 

Public Class Form1

Dim f As Double

Dim res As Double

 

 

 

 

6.Write a XML with database with book details (BOOK ID, Title, Author, subject, published Year, language, vendor, price)

 

Answer : The following XML file is used in various samples throughout the Microsoft XML Core Services (MSXML) SDK.

 

XML

<?xml version=”1.0″?>

<catalog>

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

MCA 2nd Sem WINTER 2013 Solved Assignments

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

WINTER 2013 ASSIGNMENT

PROGRAM MCA (REVISED FALL 2012)

SEMESTER SECOND

SUBJECT CODE & NAME MCA2050- COMPUTER ARCHITECTURE

CREDIT 4

BK ID B1648

 

 

Q. No.1 Differentiate between Process and Thread.

[5+5]

Answer:

 

Concept of process

In operating system terminology, instead of the term ‘program’, the notion of process is used in connection with execution. It designates a commission or job, or a quantum of work dealt with as an entity. Consequently, the resources required, such as address space, are typically allocated on a process basis. Each process has a life cycle, which consists of creation, an execution phase and termination.

Process creation involves the following four main actions:

 

2 What are instruction sets? Give the classification of the various instruction sets.

[5+5]

Answer: An instruction set, or instruction set architecture (ISA), is the part of the computer architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external I/O. An ISA includes a specification of the set of opcodes (machine language), and the native commands implemented by a particular processor.

 

 

3 What do you mean by hazards? Explain the types of hazards

[4+6]

Answer:

Hazards are the situations that stop the next instruction in the instruction stream from being executed during its designated clock cycle.

 

Hazards reduce the performance from the ideal speedup gained by pipelining. In general, there are three major categories of hazards that can affect normal operation of a pipeline.

1. Structural hazards (also called resource conflicts): They occur from resource conflicts when the hardware cannot support all possible combinations of instructions in simultaneous overlapped execution. These are caused by multiple accesses to memory performed by segments. In most cases this problem can be resolved by using separate instruction and data memories.

 

2. Data hazards (also called data dependency)They occur when an instruction depends on the result of

 

4 What do you understand by parallel processing? Describe Pipeline Processing.

[3+7]

Answer: Parallel processing is basic part of our everyday life. The concept of parallel processing is so natural in our life that we use it without even realising. When we face some crisis, we take help from others and involve them to solve it more easily. This cooperation of using two or more helpers to make easy the solution of some problem may be termed parallel processing. The aim of parallel processing is therefore to solve a particular problem more rapidly, or to enable the solution of a particular problem that would otherwise be not solvable by one person. The principles of parallel processing are, however, not recent, as evidence suggests that the computational devices used over 2000 years ago also used this.

 

5 Differentiate between unconditional and conditional branch.

[5+5]

Answer:

Unconditional Branch

This type of branch is considered as the simplest one. It is used to transfer control to a particular target. Let us discuss an example as follows:

branch target

Target address specification can be performed in any of the following ways:

 

6 Write short notes on:

a) Vector Length

b) Vector Stride

[5+5]

Answer: Vector length

Particularly, we have two cases in our hands:

One in which the vector size is less than the vector register size, and·

The second in which the vector size is larger than the vector register size.·

 

Let’s observe the easier of these two problems.

 

Handling smaller vectors: In case the vector size is less than 64, we have to permit the system to be aware that it should not function on all the 64 elements in the vector registers. This can be simply done 

 

 

 

 

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

WINTER 2013 ASSIGNMENT

PROGRAM MCA (REVISED FALL 2012)

SEMESTER SECOND

SUBJECT CODE & NAME MCA2040- COMMUNICATION SKILLS

 

 

 

Q. No.1 what is nonverbal communication? Give five examples for non-verbal communication

5+5

10

Answer:

Non-verbal communication means the messages that do not contain words. In this type of communication, words are not used in the process of sending and receiving messages. You may wonder, “How is this possible?” It is a proven fact that most of our communication through words are laced with non verbal communication. They can be categorized as:

i) word-less communication like gesture; body language or posture; facial expression and eye gaze.

 

2 What are the prosodic features of speech?

Answer:

 Prosodic features (sometimes known as suprasegmental phonology) are those aspects of speech which go beyond phonemes and deal with the auditory qualities of sound. In spoken communication, we use and interpret these features without really thinking about them. There are various conventional ways of representing them in writing, although the nuances are often hard to convey on paper.

 

3. Define hearing and Listening. How is ‘hearing’ different from ‘listening’

4+6=10

Answer:

Hearing is a passive process. It is merely the detection of sounds around us. Normally, we come across ‘hearing’ in certain situations.

E.g.: When your lecturer reprimands you for some of your shortcomings, you just hear it without paying much attention.

Listening: It is an active process. It involves the conscious desire to determine the meaning of what is 

 

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

WINTER 2013 ASSIGNMENT

PROGRAM MCA (REVISED FALL 2012)

SEMESTER SECOND

SUBJECT CODE & NAME MCA2030- OBJECT ORIENTED PROGRAMMING – C++

 

 

Q. No.1 Differentiate between Objects and Classes

[5+5]

Answer: An Object is a program representation of some real-world thing (i.e person, place or an event). Objects can have both attributes(data) and behaviours (functions or methods). Attributes describe the object with respect to certain parameters and Behaviour or functions describe the functionality of the object.

According to Pressman, Objects can be any one of the following:

a) External entities b) Things c) Occurrences or events d) Roles e) Organisational units f) Places g) Data Structures

 

2 Explain about friend functions and friend classes in detail

Answer:

Friend Functions

Friend functions can be declared anywhere within a class declaration, but it is common practice to list friends at the beginning of the class. The public and protected keywords do not apply to friend functions, as the class has no control over the scope of friends.

If we want to declare an external function as friend of a class, thus allowing this function to have access to the private and protected members of this class, we do it by declaring a prototype of this external function

 

3 Differentiate between Constructors and Destructors

Answer: Constructor:

  • Constructor is Used to Initialize the Object.
  • Constructor can takes arguments.
  • Constructor overloading can be possible means more than one constructors can be defined

 

4 Discuss operator overloading. What are the advantage and disadvantage of operator overloading in brief.

Answer:

Operator overloading is the ability to tell the compiler how to perform a certain operation when its corresponding operator is used on one or more variables. In object-oriented programming, operator overloading less commonly known as operator ad-hoc polymorphism is a specific case of polymorphism, where different operators have different implementations depending on their arguments. Operator overloading is generally defined by the language, the programmer, or both.

 

5 Explain the concept of virtual function and polymorphism in OOPS with example.

Answer:

Virtual Functions

Virtual means existing in effect but not in reality. Virtual functions are primarily used in inheritance. Let us suppose you have a class base as shown in the following program and two classes derv1 and derv2 are publicly derived from class base. You would like to create a pointer that points to any of the derived class objects. If you create a pointer of derv1, then it can point to derv1 object only. Compiler will complain if

 

6 Describe the two basic exception handling models.

Answer:

If you encounter an exceptional situation in your code – that is, one where you don’t have enough information in the current context to decide what to do – you can send information about the error into a larger context by creating an object containing that information and “throwing” it out of your current context. This is called throwing an exception. Here’s what it looks like:

throw myerror(“something bad happened”);

myerror is an ordinary class, which takes a char* as its argument. You

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

WINTER 2013 ASSIGNMENT

PROGRAM MCA (REVISED FALL 2012)

SEMESTER SECOND

SUBJECT CODE & NAME MCA2020- ADVANCED DATA STRUCTURE

 

 

Q. No.1 Define data structure? Explain different types of data structures

[3+7] 10

Answer: A data structure is a particular way of storing and organizing data in a computer so that it can be used efficiently.

Different kinds of data structures are suited to different kinds of applications, and some are highly specialized to specific tasks. For example, B-trees are particularly well-suited for implementation of databases, while compiler implementations usually use hash tables to look up identifiers.

Data structures provide a means to manage large amounts of data efficiently, such as large databases and internet indexing services. Usually, efficient data structures are a key to designing efficient algorithms. Some formal design methods and programming languages emphasize data structures, rather than algorithms, as the key organizing factor in software design. Storing and retrieving can be carried out on data stored in both main memory and in secondary memory.

 

2 Discuss in detail any two Mathematical notations and functions which appear on algorithmic analysis.

[2*5] 10

Answer:

The following are the some of the mathematical functions.

Floor and ceiling functions·

Remainder function·

Integer and absolute value functions·

 

3 Describe the following types of linked list

a. Doubly linked list

Answer:

Doubly linked list

In some situation we need to traverse both forward and backward of a linked list. The linked list with this property needs two link field one to point the next node is called next link field and another to point the previous node is called previous link field. The linked list containing this type of nodes is called doubly linked list or two- way list. Here first nodes previous link field and the last nodes next link field are marked as null. The figure 3.15 shows the node structure.

 

 

4 Differentiate between Breadth-first and depth-first search algorithm.

[5+5] 10

Answer: Graph algorithms are generally used in computer science to find and examine a path between the nodes using algorithm like depth-first search and breadth-first search. These algorithms are used generally for the examination of the graph so that further manipulation of data structure becomes easier and more appropriate

 

Breadth first search

This algorithm uses a queue data structure to perform the search. The effect of this is to process all nodes adjacent to the start node before we process the nodes adjacent to those nodes.

If all of the edges in a graph are unweighted (or the same weight) then the first time a node is visited is the

 

5 Explain the meaning of dynamic storage management. Also explain the concept of storage release.

[5+5] 10

Answer: Memory holds basically programs and their data. All the program need to manipulate the data in order to complete the task. These data should be stored in the memory for manipulation, so these data can be managed in two different ways. Like static storage management and dynamic storage management.

Primitive and static natures of data structures like integer, real, or character variable has the characters

 

6 Write short note on:

a) Sequential search

Answer:

Sequential searching

The simplest type of searching process is the sequential search or linear search. In the sequential search, each element of the array is compared to the key, in the order it appears in the array, until the first element matching the key is found. If you are looking for an element that is near the front of the array, the sequential search will find it quickly. The more data that must be searched, the longer it will take to find the data that matches the key using this process.

For a list with n items, the best case is when the value is equal to the first element of the list, in which case only one comparison is needed. The worst case is when the value is not in the list (or occurs only once at the end of the list), in which case n comparisons are needed. The input to a search algorithm is an array of objects A, the number of objects n, and the key value being sought x.

 

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

WINTER 2013 ASSIGNMENT

PROGRAM MCA (REVISED FALL 2012)

SEMESTER SECOND

MCA2010 – OPERATING SYSTEM

 

 

Q.No 1 Differentiate between Simple Batch Operating Systems and Timesharing

Operating Systems. 5+5= 10

Answer:

 

Simple Batch Operating Systems

In the earliest days digital computers usually run from a console. I/O devices consisted of card readers, tape drives and line printers. Direct user interaction with the system did not exist. Users made a job consisting of programs, data and control information. The job was submitted

 

2 What is the best methodology available to create a modular kernel? List the seven types of loadable kernel modules in Solaris.

3+7 10

Answer: Perhaps the best current methodology for operating-system design involves using object-oriented programming techniques to create a modular kernel. Here, the kernel has a set of core components and dynamically links in additional services either during boot time or during run time. Such a strategy uses dynamically loadable modules and is common in modern implementations of UNIX, such as Solaris, Linux and MacOS. For example, the Solaris operating system structure is organized around a core kernel with seven types of loadable kernel modules:

 

3 Explain the following scheduling algorithm.

a) First come First served

Answer:

This is one of the brute force algorithms. A process that requests for the CPU first is allocated the CPU first. Hence, the name first come first serve. The FCFS algorithm is implemented by using a first-in-first-out (FIFO) queue structure for the ready queue. This queue has a head and a tail. When a process joins the ready queue its PCB is linked to the tail of the FIFO queue. When the CPU is idle, the process at the head of the FIFO queue is allocated the CPU and deleted from the queue.

 

4. Define deadlock. Discuss any four conditions that lead to deadlock.

2+8 10

Answer:

Several processes compete for a finite set of resources in a multi-programmed environment. A process requests for resources that may not be readily available at the time of the request. In such a case the process goes into a wait state. It may so happen that this process may never change state because the requested resources are held by other processes which themselves are waiting for additional resources and hence in a wait state. This situation is called a deadlock.

 

5 Write short notes on:

a) Segmentation

Answer: Memory management using paging provides two entirely different views of memory – User / logical / virtual view and the actual / physical view. Both are not the same. In fact, the user’s view is mapped on to the physical view. How do users visualize memory? Users prefer to view memory as a collection of variable sized segments.

Segmentation is a memory management scheme that supports user’s view of main memory described above. The logical address is then a collection of segments, each having a name and a

 

6 What is computer virus? List the types of virus and its various infection methods

2+2+6 10

Answer: A computer virus is written with an intention of infecting other programs. It is a part of a program that piggybacks on to a valid program. It differs from the worm in the following ways:

Worm is a complete program by itself and can execute independently whereas virus does not operate independently.·

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

BCA 2nd Sem WINTER 2013 Solved Assignments

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

WINTER 2013 ASSIGNMENT

PROGRAM – BCA REVISED 2012

SEMESTER II

SUBJECT CODE & NAME BCA2030- OBJECT ORIENTED PROGRAMMING – C++

 

 

Q. No. 1 Differentiate between Objects and Classes

[5+5] 10

Answer: Objects can be a menu or button in an graphic user interface program or it may be an employee in an payroll application. Objects can also represent a data structure such as a stack or a linked list. It may be a server or a client in a networking environment.

Objects with the same data structure and behavior are grouped together as class. In other words, Objects are “instances” of a class. Classes are templates that provide definition to the objects of similar type. Objects are like variables created whenever necessary in the program. For example, Employee may be a class and Pawan, Sujay and Ganesh are objects of the class employees. Just as you can create as many

 

2 Explain about friend functions and friend classes in detail

[5+5]

10

Answer: Friend functions can be declared anywhere within a class declaration, but it is common practice to list friends at the beginning of the class. The public and protected keywords do not apply to friend functions, as the class has no control over the scope of friends.

If we want to declare an external function as friend of a class, thus allowing this function to have access to the private and protected members of this class, we do it by declaring a prototype of this external function

 

 

3 Differentiate between Constructors and Destructors

[5+5]

10

Answer:

Constructors

Constructors are member functions of a class which have same name as the class name. Constructors are called automatically whenever an object of the class is created. This feature makes it very useful to initialize the class data members whenever a new object is created. It also can perform any other function that needs to be performed for all the objects of the class without explicitly specifying it.

A constructor only knows how to build an object of its own class.

 

 

4 Discuss operator overloading. What are the advantage and disadvantage of operator overloading in brief.

[5+5]

10

Answer:

Operator overloading is an interesting feature of C++ that allows programmers to specify how various arithmetic, relational and many other operators work with user defined data types or classes. It provides a flexible way to work with classes and can make program code look obvious. To perform addition of two distance objects we used a call d3.add(d1,d2). Instead of such statements it would be more clear if we could use statements like d3=d1+d2. This is possible only if we inform compiler about how + operator works with distance class. This is exactly what operator overloading feature in C++ does. It helps to use

 

5 Explain the concept of virtual function and polymorphism in OOPS with example.

[5+5]

10

Answer:

Virtual means existing in effect but not in reality. Virtual functions are primarily used in inheritance. Let us suppose you have a class base as shown in the following program and two classes derv1 and derv2 are publicly derived from class base. You would like to create a pointer that points to any of the derived class objects. If you create a pointer of derv1, then it can point to derv1 object only. Compiler will complain if you assign any other object is assigned to the pointer. The solution is to create a pointer to Base class.

 

6 Describe the two basic exception handling models.

[5+5]

10

Answer:

If you encounter an exceptional situation in your code – that is, one where you don’t have enough information in the current context to decide what to do – you can send information about the error into a larger context by creating an object containing that information and “throwing” it out of your current context. This is called throwing an exception. Here’s what it looks like: throw myerror(“something bad happened”); myerror is an ordinary class, which takes a char* as its argument. You can use any type when you throw (including built-in types), but often you’ll use special types created just for throwing

 

 

 

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

WINTER 2013 ASSIGNMENT

PROGRAM BCA

SEMESTER SECOND

SUBJECT CODE & NAME BCA2040- COMMUNICATION SKILLS

 

 

 

Q. No. 1 What is nonverbal communication? Give five examples for non-verbal communication

5+5= 10

Answer:

Non-verbal communication

Non-verbal communication means the messages that do not contain words.

In this type of communication, words are not used in the process of sending and receiving messages. You may wonder, “How is this possible?” It is a proven fact that most of our communication through words

 

2 What are the prosodic features of speech?

10

Answer:

Prosodic features (sometimes known as suprasegmental phonology) are those aspects of speech which go beyond phonemes and deal with the auditory qualities of sound. In spoken communication, we use and interpret these features without really thinking about them. There are various conventional ways of representing them in writing, although the nuances are often hard to convey on paper.

 

3 Define hearing and Listening. How is ‘hearing’ different from ‘listening’

4+6

10

Answer:

Listening is a highly complex, interactive process, “by which spoken language is converted to meaning in the mind” (Lundsteen, 1979). As this definition suggests, listening is more than just hearing, although children and adults often use the two terms, hearing and listening, synonymously.

Hearing is only one important component of listening.

In order to become a good learner, you need to become a good listener.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

WINTER 2013, ASSIGNMENT

PROGRAM BCA REVISED 2012

SEMESTER II

SUBJECT CODE & NAME BCA 2050 & COMPUTER ORGANISATION

 

Q.No 1 What is signed number? Briefly explain the best-known methods of extending the binary numeral system to represent signed numbers.

[4+6] 10

Answer: In computing, signed number representations are required to encode negative numbers in binary number systems. In mathematics, ‘+’ sign is used for a positive number and ‘−‘sign for negative numbers in any base. However, in computer hardware, numbers are represented in bit vectors only without extra symbols. The best-known methods of extending the binary numeral system to represent signed numbers are:

i) Sign-and-magnitude method

ii) Ones’ complement method

2 Explain the Programmer’s Model of 8086.

Answer: programmer’s model of 8086 is the most important concept to study in the 8086 model. Figure 4.4 shows the register organisation of 8086. This is termed as the Programmer’s model of 8086.

The registers shown in the programmer’s model are the one accessible to the programmer. Register set is the most visible component of the CPU. The 80×86

3 Explain the four micro operations involved in the instruction cycle. 10

Answer:

Each phase of instruction cycle can be decomposed into a sequence of elementary operations called micro operations. Thus there is one sequence of micro operation in every phase for every op code. The flow chart of all the sequence of micro operations is tied up together and is as shown in figure 5.3. Here we assume a new 2 bit register called instruction cycle code (ICC). The ICC values give the state of the CPU and

4 What is Cache Memory? Explain the principle of cache memory with relevant diagrams.

[2+8] 10

Answer: For all instruction cycles, the CPU accesses the memory at least once to fetch the instruction and sometimes again accesses memory to fetch the operands. The rate at which the CPU can execute instructions is limited by the memory cycle time. This limitation is due to the mismatch between the memory cycle time and processor cycle time. Ideally, the main memory should be built with the same technology as that of CPU registers, giving memory cycle times comparable to processor cycle times but this is a too expensive strategy. The solution is to exploit the principle of locality by providing a small, fast

5 What is the difference between Synchronous and Asynchronous Data Transfer?

[5+5] 10

Answer: Asynchronous and synchronous communication represents methods through which signals are transferred in computing technology. Such signals permit computers to move data between components inside the computer or between an external network and the computer. Majority of the operations and actions which occur in computers are carefully controlled and happen at particular times and intervals. The data transfer on the system bus might be synchronous or asynchronous.

6 What is Multiprocessing? State two advantages and disadvantages of multiprocessing. How is it different form multitasking?

[2+4+4] 10

Answer: Multiprocessing is concerned with the capability of a computer system to provide support to more than one processor or the capability to accomplish more than one program simultaneously. The term multiprocessing is also used to describe interconnected computers’ configurations or computers with two or more independent CPUs that have the ability to simultaneously execute several programs. In such a system, instructions from different and independent programs are processed at the same time by different CPUs or the CPUs may execute different instructions from the same program.

 

 

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

WINTER 2013, ASSIGNMENT

PROGRAM – BCA REVISED 2012

SEMESTER II

SUBJECT CODE & NAME BCA 2020 & DATA STRUCTURE AND ALGORITHMS

 

Q.No 1 What is a data structure? Briefly explain the types of data structures.

[4 + 6]= 10

Answer: Data structure represents the logical relationship of the particular data sets.

Data structures can be divided in to two types

  • Linear data structure
  • Non Linear data structure

 

 

Q2 Explain the algorithm for evaluation of a postfix expression. Also give one example.

[6+4] 10

Answer:

Evaluation of a postfix expression

Suppose we have an arithmetic expression written in postfix notation. By using STACK we are going to evaluate the expression. The following algorithm, which uses a stack to hold operands, evaluates the expression.

 

 

Q3 Explain any five types of Graph. 10

Answer:

Depending upon the vertices and edges and the weight associated to it, graphs can be classified as:

 

1) Undirected graph: In Undirected Graph, the directions of edges are not assigned. Edges in the Undirected graph only connect to each other. In an undirected graph, edge (v1,v2) is equivalent to edge (v2,v1) since they are unassigned.

 

Q4 Explain the steps involved in Prim’s Minimum Spanning Tree Algorithm. Illustrate it with one example

[5+5] 10

Answer:

In Prim’s algorithm for the minimum spanning tree problem, the strategy is to   begin with a single node in a graph. We start with ({v1},{ }), and grow further until it includes all vertices in the given graph. Initially the tree contains just an arbitrary starting node v1. At each stage a vertex not yet in the tree but closest (lower in weight) to some vertex that is in the tree is found. This closest vertex is added to the tree.

 

Q5 Elaborate the steps involved in the analysis of first prefix- averages with its algorithm. 10

ANSWER:

Analysis of First-Averages

The different steps involved in the analysis of first averages is discussed below

 

Step 1: Initialization step for setting up of the array A [1. .n] takes constant time, say, C1, in view of the fact that for the purpose, only address of (or of A[1] is to be passed. Also after all the values of B [1...n]

 

 

Q6 Briefly explain Greedy Method Strategy. 10

ANSWER:

The greedy method suggests that one can device an algorithm that works in stages, considering one input at a time. At each stage, a decision is made regarding whether a particular input is in an optimal solution. This is done by considering the inputs in an order determined by some selection procedure.

If the inclusion of the next input into the partially constructed optimal solution will result in an infeasible solution, then this input is not added to the partial solution. Otherwise, it is added. The 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

WINTER 2013 ASSIGNMENT

PROGRAM BCA REVISED 2012

SEMESTER II

SUBJECT CODE & NAME- BCA2010 – OPERATING SYSTEM

Q. No 1 Differentiate between Simple Batch Operating Systems and Time-sharing Operating Systems.5+5=10 marks

Answer:

Simple Batch Operating Systems

In the earliest days digital computers usually run from a console. I/O devices consisted of card readers, tape drives and line printers. Direct user interaction with the system did not exist. Users made a job consisting of programs, data and control information. The job was submitted to an operator who would execute the job on the computer system. The output appeared after minutes, hours or sometimes days. The user collected the output from the operator, which also included a memory dump. The operating system was very simple and its major task was to transfer control from one job to another.

 

 

Q2 What is the best methodology available to create a modular kernel? List the seven types of loadable kernel modules in Solaris. 3+7=10

Answer:

Modules

Perhaps the best current methodology for operating-system design involves using object-oriented programming techniques to create a modular kernel. Here, the kernel has a set of core components and dynamically links in additional services either during boot time or during run time. Such a strategy uses dynamically loadable modules and is common in modern implementations of UNIX, such as Solaris, Linux and MacOS. For example, the Solaris operating system structure is organized around a core kernel with seven types of loadable kernel modules:

 

Q3. Explain the following scheduling algorithm.

a) First come First served

b) Shortest Job First

5+5=10 marks.

Answer: Scheduling algorithms differ in the manner in which the CPU selects a process in the ready queue for execution. In this section, we shall describe several of these algorithms.

a)     First-Come-First-Served

 

Q4. Define deadlock. Discuss any four conditions that leads to deadlock.

2+8=10 marks

Answer:

Definition:

Several processes compete for a finite set of resources in a multi-programmed environment. A process requests for resources that may not be readily available at the time of the request. In such a case the process goes into a wait state. It may so happen that this process may never change state because the requested resources are held by other processes which themselves are waiting for additional resources and hence in a wait state. This situation is called a deadlock.

 

 

 

Q5. Write short notes on:

a) Segmentation

Answer: Segmentation is a memory management scheme that supports user’s view of main memory described above. The logical address is then a collection of segments, each having a name and a length. Since it is easy to work with numbers, segments are numbered. Thus a logical address is represented as <segment number, offset>. User programs when compiled reflect segments present in the input. Loader while loading segments into memory assign them segment numbers.

 

Segmentation hardware

Even though segments in user view are same as segments in physical view, the two-dimensional visualization in user view has to be mapped on to a one-dimensional sequence of physical memory

 

Q6 What is computer virus? List the types of virus and its various infection methods

2+2+6=10

Answer:

 

Computer Virus

A computer virus is written with an intention of infecting other programs. It is a part of a program that piggybacks on to a valid program. It differs from the worm in the following ways:

 

Worm is a complete program by itself and can execute independently whereas virus does not operate independently.·

Worm consumes only system resources but virus causes direct harm to the system by corrupting code as well as data.·

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601