PROGRAM BSc IT
SUBJECT CODE &
NAME BT0068, Computer Organization and Architecture
1. Define micro operation and
explain its types. 2+8 10
Microoperations
Shift
microoperations are used for serial transfer of data. They are also used in
conjunction with arithmetic, logic, and other data-processing operations. The contents of a register can be shifted to
the left or the right. At the same time
that the bits are shifted, the first flip-flop receives its binary information from the serial input. During a shift-left
operation the serial input transfers a bit
into the rightmost position. During a shift-right operation the serial input transfers a bit into the leftmost position. The
information transferred through the
serial input determines the type of shift. There are three types of shifts: logical, circular, and arithmetic.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Describe bus in computer
system and explain its structure.
4+6 10
A computer
system is sometimes
subdivided into two
functional entities:
hardware and
software. The hardware of the computer consists of all the electronic
components and electromechanical devices
that comprise the
physical entity of the device. Computer software consists of the
instructions and the
data that the
computer manipulates to
perform various dataprocessing tasks. A sequence of
instructions for the computer is called a
program. The data that are manipulated by the program constitute the
data
base.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain the simple
instruction format with diagram and examples.
6+4 10
simple
instruction format
In most
modern CPU's, the
first byte contains
the opcode, sometimes including the
register reference in
some of the
instructions. The operand references are in the following bytes (byte 2,
3, etc...). Examples of few mnemonics:
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Explain infinite-precision and finite-precision ten's complement.
Infinite-Precision
Ten's Complement
Imagine the
odometer of an automobile. It has a certain number of wheels, each with the ten digits on it. When one wheel
goes from 9 to 0,
the wheel immediately to the left of it
advances by one position. If that wheel already showed 9, it too goes to 0 and advances the
wheel to its left, etc. Now suppose we
have an odometer with an infinite number
of wheels. We are going to use this
infinite odometer to represent all the integers. When all the wheels are 0, we interpret the
value as the integer 0.
A positive
integer n is
represented by an
odometer position obtained
by advancing the rightmost
wheel n
positions from 0. Notice that for each such positive number, there will be an
infinite number
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5 Explain the
mapping functions between
the main memory
and CPU.
Mapping functions
The
correspondence between the main memory and CPU are specified by a
mapping
function. There are three standard mapping functions namely
1. Direct mapping
2. Associative mapping
3. Block set associative mapping In order to
discuss these methods consider a cache consisting of 128 blocks of
16 words each.
Assume that main
memory is addressable
by a 16 bit
address. For mapping purpose main memory
is viewed as composed of 4K blocks.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Explain interrupt and
interrupt driven I/O. 5+5 10
Interrupt
Driven I/O
Using Program-controlled I/O
requires continuous involvement
of the processor
in the I/O
activities. It is
desirable to avoid
wasting processor execution time.
An alternative is for the CPU to issue an I/O command to a module and then go on other work. The I/O
module will then interrupt the
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM BSc IT
SUBJECT CODE &
NAME BT0069, Discrete Mathematics
1. Find the sum of all the four
digit number that can be obtained by
using the digits 1, 2, 3, 4 once in each.
Ans- The number of
permutations (arrangements) can be made using 4 numbers (1, 2, 3, 4) taking 4 at a time is
p(4, 4) = 0!4!= 24.
Each number occurs 6 times in unit place, 6 times in 10th
place, 6 times in 100th place,
6 times in 1000 place.
Therefore sum of the
numbers in the unit place is = 6.1 + 6.2 + 6.3 + 6.4 = 60; Total sum of the
digits in the 10th place = 60 10
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. (i) State the principle of inclusion and
exclusion.
(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234
or 487?
Answer:
Principle of Inclusion
and Exclusion
For any two sets P and Q, we
have ;
i)
|P È Q| £ |P| + |Q| where |P| is the number of elements
in P, and |Q| is the number elements in Q.
ii) |P Ç Q| £ min (|P|, |Q|)
iii) |P Ã… Q| = |P| + |Q| –
2|P Ç Q| where Å is the symmetric difference.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. (ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
contain at least one of the patterns 289, 234 or 487?
Answer:
Let A289 be the
event of having pattern 289. Similarly A234 and A487.
We have to find |A289
or A234 or A487|.
Now |A289| = 8! ,
as 289 considered as a group, which is a single object and the remaining
seven single digits. Similarly |A234| = |A487| = 8!
Also since 2 cannot be
followed by both 3 and 8, we have |A289 Ç A234| = 0.
Similarly |A289 Ç A487| = 0. But
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. If G is a group, then
i) The identity element of G is
unique.
ii) Every element in G has unique
inverse in G.
iii) For any a G, we have (a
Answer:
i) Let e, f be
two identity elements in G. Since e is
the identity, we have e.f = f.
Since f
is the identity, we have e.f
= e. Therefore, e
= e.f = f.
Hence the identity element is unique.
ii) Let a be in G and a1, a2
are two inverses of a in G.
Now a1 = a1.e (since
e is the identity)
= a1.(a.a2) (since
a2 is the inverse of a)
= (a1.a).a2 (by associativity)
= e.a2 (since
a1 is the inverse of a)= a2.
Hence the inverse of an
element in G is unique.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. (i)Define valid argument
(ii) Show that (P Q)
follows from P Q.
Answer:
Any conclusion,
which is arrived
at by following the rules
is called a valid conclusion and argument is called a
valid argument.
Let A and B be two statement
formulas. We say that “B logically follows from A” or “B is a valid conclusion
of A”, if and only if A Ã B is a
tautology, that is, A
B.
Validity using rules of Inference
It is process of derivation
by which one demonstrates that a particular formula is a valid consequence of a
given set of premises. The following are the three rules of inference.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. (ii) Show that ~ (P Ù Q) follows from
~ P Ù ~Q.
Answer:
Assume ~ (~ (P Ù Q)) as an additional premise. Then,
|
|
(1) ~ (~ (P Ù Q))
|
Rule P
|
|
{1}
|
(2) P Ù Q
|
Rule T
|
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. (i)Construct a grammar for the
language.
, , ' 3 L x x a b the number of a s in x is a multiple of
(ii)Find the highest type number that can be applied to the following
productions:
Answer:
Let T = {a, b} and N
= {S, A, B}, S is a starting symbol.
The set of productions: F
|
S
|
®
|
bS
|
|
S
|
®
|
b
|
|
S
|
®
|
aA
|
|
A
|
®
|
bA
|
|
A
|
®
|
aB
|
|
B
|
®
|
bB
|
|
B
|
®
|
aS
|
|
B
|
®
|
a
|
For instance,
bbababbab can be generated as follows.
S Þ bS Þ bbS Þ bbaA Þ bbabA Þ bbabaB Þ bbababbB Þ bbababbaS
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. (ii) Find
the
highest type
number that
can
be
applied to the following productions:
1. S ® A0, A ® 1 ç 2 ç B0, B ® 012.
2. S ® ASB ç b, A ® bA ç c
3. S ® bS ç bc.
Answer:
1.
Here, S ® A0, A ® B0 and B ® 012 are of type 2,
while A ® 1 and A ® 2 are type 3. Therefore, the highest type number is 2.
2.
Here, S ® ASB is of type 2, while S ® b, A ® bA and A ® c are type 3. Therefore,
the highest type number is 2.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. (i) Define tree with example.
(ii) Prove that any connected
graph with ‘n’ vertices and n -1 edgesis a tree.
Answer:
The concept
of a „tree‟
plays a vital
role in the
theory of graphs. First we introduce the
definition of „tree‟,
study some of its properties
and its applications. We also
provide equivalent conditions for a tree.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. (ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.
Answer:
Let “G‟ be a connected graph
with n vertices and n - 1 edges. It is enough to show that G contains no
circuits.
If possible, suppose that G
contains a circuit.
Let “e‟ be an edge in that
circuit.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM BSC.IT
SUBJECT CODE & NAME BT0071- TECHNICAL
COMMUNICATION
1. Explain the Characteristics of
Technical Communication. What are the indicators of Excellence in Technical
Communication?
Ans- Characteristics of Technical Communication
Technical Communication
– Targets a Specific Reader The most
significant characteristics of technical communication is that you have
to customize the information for a particular reader. This method is to
bring in
personal warmth to your document. Sometimes you will be aware of your potential reader, then your job is easy.
For instance, writing a proposal to your
manager. There you
will think about
that person‟s background,
responsibilities, history with
organization, attitudes and
alike. While preparing the
proposal you will
be considering these
factors to entice
the manager and to make it
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Explain the
preparatory stage in
SME Interviews. Prepare
notes on Post Interview Session and Validation.
Ans- Conducting SME Interviews
Perhaps the most
universal and basic method for a technical communicator to gather information is a face-to- face
interview with a subject matter expert
(SME). SMEs may
be engineers, developers,
programmers, operators, clerks,
or customer support
personnel. They are
the people who
have
experience
with and knowledge of a particular system, application, product, process,
or task that
you need to
learn about. There
is a wide
variety of factors that can affect SME interviews. In
most cases, the SME has a job to do beyond
taking time out
of his or
her busy day
to talk with
you. It
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain the role of a technical
editor. List the strength and weakness
of SDLC.
Ans- Role of a Technical Editor
A technical document,
to be effective, requires not only a good writer, but also a good editor. The chief duties of a technical editor are
realized when the sections of a technical document are submitted to him.
The main duties that he performs
include: Improving text material: The editor determines how appropriate the content and
organization are for
the purpose and
audience. He is
instrumental in
making
the verbose material into concise and clear. In doing this he should be
cautious because he
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM BSC IT
SUBJECT CODE & NAME BT0072 - COMPUTER NETWORKS
1. Describe Message switching and
Packet switching.
Ans- Message switching
Message switching was
the precursor of packet switching, where messages were routed in their entirety and one hop at
a time. It was first introduced by
Leonard Kleinrock
in 1961. Message
switching systems are
nowadays mostly implemented over
packet-switched or circuit-switched data networks. Hop-by-hop Telex forwarding are
examples of message switching systems.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. What is Framing? Briefly
explain Fixed-Size and Variable Size Framing.
Framing
Data transmission in the
physical layer means moving bits in the
form of a signal from the
source to destination.
The physical layer
provides bit synchronization to
ensure that the
sender and receiver
use the same
bit durations and timing.
The data link layer on the
other hand needs to pack bits into frames, so that each frame is
distinguishable from another.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Briefly explain Stop-and-Wait Automatic
Repeat Request.
Stop-and-Wait Automatic Repeat Request
This protocol
adds a simple
error control mechanism
to the stop-and-wait protocol. To
detect and correct
corrupted frames, we
need to add redundancy bits to our data frame. When
the frame arrives at the receiver site, it is checked and if it is corrupted,
it is silently discarded. The detection of errors in this protocol is
manifested by the silence of the receiver. Lost frames are more difficult to
handle than corrupted ones. The corrupted and lost frames
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. What is the role of Internet
Protocol version 4 (IPV4) in addressing
and routing packets between hosts? Briefly explain the structure of an IPV4 packet.
Internet Protocol version 4 (IPV4)
IPV4 is a
datagram protocol primarily responsible for addressing and routing packets between
hosts. IPV4 is
connectionless, which means
that it does not
establish a connection
before exchanging data,
and unreliable, which means
that it does
not guarantee packet
delivery. IPV4 always
makes a “best effort”
attempt to deliver
a packet. An
IPV4 packet might
be lost, delivered out of
sequence, duplicated, or delayed. IPV4
does not attempt to recover from
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Explain the working and
applications of SMTP. 10 10
SMTP
is based on
end-to-end delivery: An
SMTP client contacts
the destination host's SMTP server directly, on well-known port 25, to
deliver the mail. It keeps the mail item being transmitted until it has been
successfully copied to the recipient's SMTP. This is different from the
store-and-forward principle that is common in many mailing systems, where the
mail item can pass through a number of intermediate hosts in the same network
on its way to the destination and where successful transmission from the sender
only indicates that the mail
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Describe Caching and TTL. How
it is useful in query resolving?
Ans- Caching and TTL
For each
resolved query (either
recursive or iterative),
the DNS resolver
caches the returned information for a time that is specified in each
resource record in the DNS response.
This is known as positive caching. The amount
of time in seconds to cache the record data is referred to as the Time
To
Live
(TTL). The network administrator of the zone that contains the record decides on the default TTL for the data in
the zone. Smaller TTL values help ensure
that data about the domain is more consistent
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522