Thursday, 3 September 2015

BSCIT - SEMESTER - 4 - SUMMER - 2015

PROGRAM  - BSC IT
SEMESTER  4
SUBJECT CODE & NAME - BT0081 - Software Engineering


1.  Explain different kinds of software applications.

Software  applications  can  be  neatly  compartmentalized  into  different categories.

System  software:  System  software  is  a  collection  of  programs  written  to service  other  programs.  Some  system  software  processes  complex information  structures.  Other  systems  applications  process  largely indeterminate data. It is characterized  by heavy  interaction with hardware, heavy  usage  by  multiple  users,  concurrent  operation  that  requires scheduling,  resource  sharing,  and  sophisticated  process  management, complex data structures and multiple external interfaces.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  What are the Limitations of waterfall model? Explain in brief.

Limitation of the waterfall model

1.  The linear sequential model or waterfall model assumes the requirement of  a  system  which  can  be  frozen  (baseline)  before  the  design  begins. This  is  possible for systems  designed to  automate  an  existing  manual system. But for a new system, determining the requirements is difficult as  the  user  does  not  even  know  the  requirements.  Hence,  having unchanging requirements is unrealistic for such projects.

2.  Freezing  the  requirements  usually  requires  choosing  the  hardware (because  it  forms  a  part  of  the  requirement  specifications)  A  large project might take a few years to complete. If the hardware is                                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





3.  Describe the operation of Data flow model with the help of a block diagram.

Data-flow models

Data-flow model is a way of showing how data is processed by a system. At the analysis level, they should be used to model the  way in which data is processed  in  the  existing  system.  The  notations  used  in  these  models represents functional processing, data stores and data movements between
functions.

Data-flow models are used to show how data flows through a sequence of processing steps. The data is transformed at each step before moving on to the  next  stage.  These  processing  steps  or  transformations  are  program functions when data-flow diagrams are used to document a software                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





4.  Explain  the  various  activities  involved  in  Software Reengineering process model.

Software Reengineering Process Model

Reengineering  takes  time;  it  costs  significant  amounts  of  money;  and  it absorbs  resources  that  might  be  otherwise  occupied  on  immediate concerns. For all of this reason, reengineering is not accomplished in a few months  or  even  a  few  years.  Reengineering  of  information  systems  is  an
activity  that  will  absorb  information  technology  resources  for  many  years. That‟s  why  every  organization  needs  a  practical  strategy  for  software reengineering.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





5.  Explain Black-Box Testing in detail.

Black-Box Testing

Black-box testing, also called behavioral testing, focuses on the functional requirements of the software. That is, black-box testing enables the software engineer  to  derive  sets  of  input  conditions  that  will  fully  exercise  all functional requirements for a program. Black-box testing is not an alternative to  white-box  techniques.  Rather,  it  is  a  complementary  approach  that  is likely to uncover a different class of errors than white-box methods.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  With the help of bock diagram explain how global problem solving can apply a software-driven approach to enhance the efficiency of problem solving.


A View of Problem Solving and Software Engineering

As we know a  view  of  problem  solving  utilizing  software technology and the impact of global problem-solving strategies on softwaredriven  problem-solving  strategies.  They  illustrated  how  global  problem solving can apply a software-driven approach to enhance the efficiency of problem  solving.  The  effectiveness  of  these  approaches  on  business performance  in  terms  of  the  business  value  created  and  software  project optimization  achieved  was  projected.  Business  value  and  project                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




BSCIT - SEMESTER - 2 - SUMMER - 2015

                                          PROGRAM  BSc IT
SUBJECT CODE &  NAME BT0068, Computer Organization and Architecture

1.  Define micro operation and explain its types.  2+8  10
Microoperations
Shift microoperations are used for serial transfer of data. They are also used in conjunction with arithmetic, logic, and other data-processing operations.  The contents of a register can be shifted to the left or the right. At the same  time that the bits are shifted, the first flip-flop receives its binary information  from the serial input. During a shift-left operation the serial input transfers a  bit into the rightmost position. During a shift-right operation the serial input  transfers a bit into the leftmost position. The information transferred through  the serial input determines the type of shift. There are three types of shifts:  logical, circular, and arithmetic.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



2.  Describe bus in computer system and explain its structure.  4+6  10
A  computer  system  is  sometimes  subdivided  into  two  functional  entities:
hardware and software. The  hardware  of the computer consists of all the  electronic  components  and  electromechanical  devices  that  comprise  the  physical entity of the device. Computer software consists of the instructions  and  the  data  that  the  computer  manipulates  to  perform  various  dataprocessing tasks. A sequence of instructions for the computer is called a  program. The data that are manipulated by the program constitute the data
base.
                                           

                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



3.  Explain the simple instruction format with diagram and examples.  6+4  10
simple instruction format
In  most  modern  CPU's,  the  first  byte  contains  the  opcode,  sometimes including  the  register  reference  in  some  of  the  instructions.  The  operand  references are in the following bytes (byte 2, 3, etc...). Examples of few mnemonics:



                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4. Explain infinite-precision and finite-precision ten's complement.
Infinite-Precision Ten's Complement
Imagine the odometer of an automobile. It has a certain number of wheels,  each with the ten digits on it. When one wheel goes from  9  to  0, the wheel  immediately to the left of it advances by one position. If  that  wheel already  showed 9, it too goes to 0 and advances the wheel to its left, etc.  Now suppose we have an odometer with an  infinite number of wheels. We  are going to use this infinite odometer to represent all the integers.  When all the wheels are 0, we interpret the value as the integer 0.

A  positive  integer  n  is  represented  by  an  odometer  position  obtained  by  advancing the rightmost wheel  n  positions from 0. Notice that for each such  positive number, there will be an infinite  number                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5  Explain  the  mapping  functions  between  the  main  memory  and  CPU.
Mapping functions
The correspondence between the main memory and CPU are specified by a
mapping function. There are three standard mapping functions namely
1.  Direct mapping
2.  Associative mapping
3.  Block set associative mapping In order to discuss these methods consider a cache consisting of 128 blocks  of  16  words  each.  Assume  that  main  memory  is  addressable  by  a  16  bit  address. For mapping purpose main memory is viewed as composed of 4K  blocks.


                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Explain interrupt and interrupt driven I/O.  5+5  10
Interrupt Driven I/O
Using  Program-controlled  I/O  requires  continuous  involvement  of  the  processor  in  the  I/O  activities.  It  is  desirable  to  avoid  wasting  processor execution time. An alternative is for the CPU to issue an I/O command to a  module and then go on other work. The I/O module will then interrupt the
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



                                                     PROGRAM  BSc IT
                           SUBJECT CODE & NAME BT0069, Discrete Mathematics

1.  Find the sum of all the four digit number that can be obtained by
using the digits 1, 2, 3, 4 once in each.

Ans- The number of permutations (arrangements) can be made using  4 numbers (1, 2, 3, 4) taking 4 at a time is p(4, 4) = 0!4!= 24.

Each number occurs  6 times in unit place, 6 times in 10th place, 6 times in  100th place, 6 times in 1000 place.

Therefore sum of the numbers in the unit place is = 6.1 + 6.2 + 6.3 + 6.4 = 60; Total sum of the digits in the 10th place = 60  10


                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM








2.  (i)  State the principle of inclusion and exclusion.
(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5,  6, 7, 8, 9  contain at least one of the patterns 289, 234 or 487?

Answer:

Principle of Inclusion and Exclusion

For any two sets P and Q, we have ;

i)       |P È Q| £  |P| + |Q| where |P| is the number of elements in P, and |Q| is the number elements in Q.
ii)       |P Ç Q| £  min (|P|,  |Q|)

iii)       |P Ã… Q| = |P| + |Q| 2|P Ç Q| where Ã…  is the symmetric difference.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





2. (ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487?

Answer:

Let A289 be the event of having pattern 289. Similarly A234 and A487.

We have to find |A289 or A234 or A487|.

Now |A289| = 8! ,  as  289  considered as a group,  which is a single object and the remaining seven single digits. Similarly |A234| = |A487| = 8!

Also since 2 cannot be followed by both 3 and 8, we have |A289 Ç A234| = 0.
Similarly |A289 Ç A487| = 0. But

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





3.  If G is a group, then
i)  The identity element of G is unique.
ii)  Every element in G has unique inverse in G.
iii)  For any a  G, we have (a

Answer:

i)  Let  e,  f  be two identity elements in  G. Since  e  is the identity,  we have e.f  =  f. Since  f  is the identity,  we have  e.f  =  e. Therefore,  e  =  e.f  =  f. Hence the identity element is unique.

ii)  Let a be in G and a1, a2 are two inverses of a in G.
Now a1 = a1.e                          (since e is the identity)
= a1.(a.a2)                    (since a2 is the inverse of a)
= (a1.a).a2                    (by associativity)
= e.a2                           (since a1 is the inverse of a)= a2.
Hence the inverse of an element in G is unique.


                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  (i)Define valid argument
(ii) Show that  (P  Q) follows from   P  Q.

Answer:

Any  conclusion,  which  is  arrived  at  by following  the rules  is called  a  valid conclusion and argument is called a valid argument.

Let A and B be two statement formulas. We say that “B logically follows from A” or “B is a valid conclusion of A”, if and only if A à B is a tautology, that is, A  B.

Validity using rules of Inference

It is process of derivation by which one demonstrates that a particular formula is a valid consequence of a given set of premises. The following are the three rules of inference.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





4. (ii) Show that ~ (P Ù Q) follows from  ~ P Ù ~Q.

Answer:
Assume  ~ (~ (P Ù Q)) as an additional premise. Then,


(1)  ~ (~ (P Ù Q))
Rule P
{1}
(2) P Ù Q
Rule T
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






5.  (i)Construct a grammar for the language.
, , ' 3 L x x a b the number of a s in x is a multiple of 
(ii)Find the highest type number that can be applied to the following
productions:

Answer:
Let T = {a, b} and N = {S, A, B}, S is a starting symbol.
The set of productions: F

S
®
bS
S
®
b
S
®
aA
A
®
bA
A
®
aB
B
®
bB
B
®
aS
B
®
a
For instance,
bbababbab can be generated as follows.
S Þ bS Þ bbS Þ bbaA Þ bbabA Þ bbabaB Þ bbababbB Þ bbababbaS
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





5. (ii) Find  the  highest  type  number  that  can  be  applied  to  the  following productions:

1.  S ® A0, A ® 1 ç 2 ç B0, B ® 012.
2.  S ® ASB ç b, A ® bA ç c
3.  S ® bS ç bc.

Answer:

1.    Here, S ® A0, A ® B0 and B ® 012 are of type 2, while A ® 1 and A ® 2 are type 3. Therefore, the highest type number is 2.

2.    Here, S ® ASB is of type 2, while S ® b, A ® bA and A ® c are type 3. Therefore, the highest type number is 2.


                                           

                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






6.  (i) Define tree with example.
(ii)  Prove that any connected graph with ‘n’ vertices and n -1 edgesis a tree.

Answer:

The  concept  of  a  „tree‟  plays  a  vital  role  in  the  theory  of graphs.  First we introduce  the  definition  of  „tree‟,  study  some  of  its  properties  and  its applications. We also provide equivalent conditions for a tree.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





6. (ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.

Answer:

Let “G‟ be a connected graph with n vertices and n - 1 edges. It is enough to show that G contains no circuits.

If possible, suppose that G contains a circuit.

Let “e‟ be an edge in that circuit.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



  
PROGRAM  BSC.IT
SUBJECT CODE & NAME BT0071- TECHNICAL COMMUNICATION

1.  Explain the Characteristics of Technical Communication. What are the indicators of Excellence in Technical Communication?

Ans- Characteristics of Technical Communication

Technical Communication – Targets a Specific Reader The most  significant characteristics of technical communication is that you have to customize the information for a particular reader. This method is to
bring in personal warmth to your document. Sometimes you will be aware of  your potential reader, then your job is easy. For instance, writing a proposal  to  your  manager.  There  you  will  think  about  that  person‟s  background,  responsibilities,  history  with  organization,  attitudes  and  alike.  While preparing  the  proposal  you  will  be  considering  these  factors  to  entice  the  manager and to make it                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  Explain  the  preparatory  stage  in  SME  Interviews.  Prepare
notes on Post Interview Session and Validation.


Ans- Conducting SME Interviews

Perhaps the most universal and basic method for a technical communicator  to gather information is a face-to- face interview with a subject matter expert  (SME).  SMEs  may  be  engineers,  developers,  programmers,  operators,  clerks,  or  customer  support  personnel.  They  are  the  people  who  have
experience with and knowledge of a particular system, application, product,  process,  or  task  that  you  need  to  learn  about.  There  is  a  wide  variety  of  factors that can affect SME interviews. In most cases, the SME has a job to  do  beyond  taking  time  out  of  his  or  her  busy  day  to  talk  with  you.  It                                                           
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



3.  Explain the role of a technical editor. List the strength and  weakness of SDLC.

Ans- Role of a Technical Editor

A technical document, to be effective, requires not only a good writer, but  also a good editor.    The chief duties of a technical editor are realized when  the sections of  a technical document are submitted to him. The main duties  that he performs include: Improving text material: The editor determines  how appropriate the content  and  organization  are  for  the  purpose  and  audience.  He  is  instrumental  in
making the verbose material into concise and clear. In doing this he should  be  cautious  because  he                                                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  BSC IT
SUBJECT CODE & NAME BT0072 -  COMPUTER NETWORKS

1.  Describe Message switching and Packet switching.

Ans- Message switching

Message switching was the precursor of packet switching, where messages  were routed in their entirety and one hop at a time. It was first introduced by

Leonard  Kleinrock  in  1961.  Message  switching  systems  are  nowadays  mostly implemented over packet-switched or circuit-switched data networks. Hop-by-hop Telex forwarding are examples of message switching systems.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM







2.  What is Framing? Briefly explain Fixed-Size and Variable Size Framing.

Framing

Data transmission in the physical layer means  moving bits in the form of a signal  from  the  source  to  destination.  The  physical  layer  provides  bit synchronization  to  ensure  that  the  sender  and  receiver  use  the  same  bit durations and timing.

The data link layer on the other hand needs to pack bits into frames, so that each frame is distinguishable from another.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





3.  Briefly explain Stop-and-Wait Automatic Repeat Request. 

Stop-and-Wait Automatic Repeat Request

This  protocol  adds  a  simple  error  control  mechanism  to  the  stop-and-wait protocol.  To  detect  and  correct  corrupted  frames,  we  need  to  add redundancy bits to our data frame. When the frame arrives at the receiver site, it is checked and if it is corrupted, it is silently discarded. The detection of errors in this protocol is manifested by the silence of the receiver. Lost frames are more difficult to handle than corrupted ones. The corrupted and lost  frames                                                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






4.  What is the role of Internet Protocol version 4  (IPV4) in addressing and routing packets between hosts? Briefly explain the structure of  an IPV4 packet.

Internet Protocol version 4 (IPV4)

IPV4 is a datagram protocol primarily responsible for addressing and routing packets  between  hosts.  IPV4  is  connectionless,  which  means  that  it  does not  establish  a  connection  before  exchanging  data,  and  unreliable,  which means  that  it  does  not  guarantee  packet  delivery.  IPV4  always  makes  a “best  effort”  attempt  to  deliver  a  packet.  An  IPV4  packet  might  be  lost, delivered out of sequence, duplicated, or delayed. IPV4  does not attempt to recover from                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






5.  Explain the working and applications of SMTP.  10  10

SMTP  is  based  on  end-to-end  delivery:  An  SMTP  client  contacts  the destination host's SMTP server directly, on well-known port 25, to deliver the mail. It keeps the mail item being transmitted until it has been successfully copied to the recipient's SMTP. This is different from the store-and-forward principle that is common in many mailing systems, where the mail item can pass through a number of intermediate hosts in the same network on its way to the destination and where successful transmission from the sender only indicates that the mail                                                                              
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 6.  Describe Caching and TTL. How it is useful in query resolving?

Ans- Caching and TTL

For  each  resolved  query  (either  recursive  or  iterative),  the  DNS  resolver  caches the returned information for a time that is specified in each resource  record in the DNS response. This is known as positive caching. The amount  of time in seconds to cache the record data is referred to as the Time To
Live (TTL). The network administrator of the zone that contains the record  decides on the default TTL for the data in the zone. Smaller TTL values help  ensure that data about the domain is more consistent                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM