Thursday, 3 September 2015

BSCIT - SEMESTER - 2 - SUMMER - 2015

                                          PROGRAM  BSc IT
SUBJECT CODE &  NAME BT0068, Computer Organization and Architecture

1.  Define micro operation and explain its types.  2+8  10
Microoperations
Shift microoperations are used for serial transfer of data. They are also used in conjunction with arithmetic, logic, and other data-processing operations.  The contents of a register can be shifted to the left or the right. At the same  time that the bits are shifted, the first flip-flop receives its binary information  from the serial input. During a shift-left operation the serial input transfers a  bit into the rightmost position. During a shift-right operation the serial input  transfers a bit into the leftmost position. The information transferred through  the serial input determines the type of shift. There are three types of shifts:  logical, circular, and arithmetic.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



2.  Describe bus in computer system and explain its structure.  4+6  10
A  computer  system  is  sometimes  subdivided  into  two  functional  entities:
hardware and software. The  hardware  of the computer consists of all the  electronic  components  and  electromechanical  devices  that  comprise  the  physical entity of the device. Computer software consists of the instructions  and  the  data  that  the  computer  manipulates  to  perform  various  dataprocessing tasks. A sequence of instructions for the computer is called a  program. The data that are manipulated by the program constitute the data
base.
                                           

                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



3.  Explain the simple instruction format with diagram and examples.  6+4  10
simple instruction format
In  most  modern  CPU's,  the  first  byte  contains  the  opcode,  sometimes including  the  register  reference  in  some  of  the  instructions.  The  operand  references are in the following bytes (byte 2, 3, etc...). Examples of few mnemonics:



                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4. Explain infinite-precision and finite-precision ten's complement.
Infinite-Precision Ten's Complement
Imagine the odometer of an automobile. It has a certain number of wheels,  each with the ten digits on it. When one wheel goes from  9  to  0, the wheel  immediately to the left of it advances by one position. If  that  wheel already  showed 9, it too goes to 0 and advances the wheel to its left, etc.  Now suppose we have an odometer with an  infinite number of wheels. We  are going to use this infinite odometer to represent all the integers.  When all the wheels are 0, we interpret the value as the integer 0.

A  positive  integer  n  is  represented  by  an  odometer  position  obtained  by  advancing the rightmost wheel  n  positions from 0. Notice that for each such  positive number, there will be an infinite  number                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5  Explain  the  mapping  functions  between  the  main  memory  and  CPU.
Mapping functions
The correspondence between the main memory and CPU are specified by a
mapping function. There are three standard mapping functions namely
1.  Direct mapping
2.  Associative mapping
3.  Block set associative mapping In order to discuss these methods consider a cache consisting of 128 blocks  of  16  words  each.  Assume  that  main  memory  is  addressable  by  a  16  bit  address. For mapping purpose main memory is viewed as composed of 4K  blocks.


                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Explain interrupt and interrupt driven I/O.  5+5  10
Interrupt Driven I/O
Using  Program-controlled  I/O  requires  continuous  involvement  of  the  processor  in  the  I/O  activities.  It  is  desirable  to  avoid  wasting  processor execution time. An alternative is for the CPU to issue an I/O command to a  module and then go on other work. The I/O module will then interrupt the
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



                                                     PROGRAM  BSc IT
                           SUBJECT CODE & NAME BT0069, Discrete Mathematics

1.  Find the sum of all the four digit number that can be obtained by
using the digits 1, 2, 3, 4 once in each.

Ans- The number of permutations (arrangements) can be made using  4 numbers (1, 2, 3, 4) taking 4 at a time is p(4, 4) = 0!4!= 24.

Each number occurs  6 times in unit place, 6 times in 10th place, 6 times in  100th place, 6 times in 1000 place.

Therefore sum of the numbers in the unit place is = 6.1 + 6.2 + 6.3 + 6.4 = 60; Total sum of the digits in the 10th place = 60  10


                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM








2.  (i)  State the principle of inclusion and exclusion.
(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5,  6, 7, 8, 9  contain at least one of the patterns 289, 234 or 487?

Answer:

Principle of Inclusion and Exclusion

For any two sets P and Q, we have ;

i)       |P È Q| £  |P| + |Q| where |P| is the number of elements in P, and |Q| is the number elements in Q.
ii)       |P Ç Q| £  min (|P|,  |Q|)

iii)       |P Å Q| = |P| + |Q| 2|P Ç Q| where Å  is the symmetric difference.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





2. (ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487?

Answer:

Let A289 be the event of having pattern 289. Similarly A234 and A487.

We have to find |A289 or A234 or A487|.

Now |A289| = 8! ,  as  289  considered as a group,  which is a single object and the remaining seven single digits. Similarly |A234| = |A487| = 8!

Also since 2 cannot be followed by both 3 and 8, we have |A289 Ç A234| = 0.
Similarly |A289 Ç A487| = 0. But

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





3.  If G is a group, then
i)  The identity element of G is unique.
ii)  Every element in G has unique inverse in G.
iii)  For any a  G, we have (a

Answer:

i)  Let  e,  f  be two identity elements in  G. Since  e  is the identity,  we have e.f  =  f. Since  f  is the identity,  we have  e.f  =  e. Therefore,  e  =  e.f  =  f. Hence the identity element is unique.

ii)  Let a be in G and a1, a2 are two inverses of a in G.
Now a1 = a1.e                          (since e is the identity)
= a1.(a.a2)                    (since a2 is the inverse of a)
= (a1.a).a2                    (by associativity)
= e.a2                           (since a1 is the inverse of a)= a2.
Hence the inverse of an element in G is unique.


                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  (i)Define valid argument
(ii) Show that  (P  Q) follows from   P  Q.

Answer:

Any  conclusion,  which  is  arrived  at  by following  the rules  is called  a  valid conclusion and argument is called a valid argument.

Let A and B be two statement formulas. We say that “B logically follows from A” or “B is a valid conclusion of A”, if and only if A à B is a tautology, that is, A  B.

Validity using rules of Inference

It is process of derivation by which one demonstrates that a particular formula is a valid consequence of a given set of premises. The following are the three rules of inference.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





4. (ii) Show that ~ (P Ù Q) follows from  ~ P Ù ~Q.

Answer:
Assume  ~ (~ (P Ù Q)) as an additional premise. Then,


(1)  ~ (~ (P Ù Q))
Rule P
{1}
(2) P Ù Q
Rule T
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






5.  (i)Construct a grammar for the language.
, , ' 3 L x x a b the number of a s in x is a multiple of 
(ii)Find the highest type number that can be applied to the following
productions:

Answer:
Let T = {a, b} and N = {S, A, B}, S is a starting symbol.
The set of productions: F

S
®
bS
S
®
b
S
®
aA
A
®
bA
A
®
aB
B
®
bB
B
®
aS
B
®
a
For instance,
bbababbab can be generated as follows.
S Þ bS Þ bbS Þ bbaA Þ bbabA Þ bbabaB Þ bbababbB Þ bbababbaS
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





5. (ii) Find  the  highest  type  number  that  can  be  applied  to  the  following productions:

1.  S ® A0, A ® 1 ç 2 ç B0, B ® 012.
2.  S ® ASB ç b, A ® bA ç c
3.  S ® bS ç bc.

Answer:

1.    Here, S ® A0, A ® B0 and B ® 012 are of type 2, while A ® 1 and A ® 2 are type 3. Therefore, the highest type number is 2.

2.    Here, S ® ASB is of type 2, while S ® b, A ® bA and A ® c are type 3. Therefore, the highest type number is 2.


                                           

                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






6.  (i) Define tree with example.
(ii)  Prove that any connected graph with ‘n’ vertices and n -1 edgesis a tree.

Answer:

The  concept  of  a  „tree‟  plays  a  vital  role  in  the  theory  of graphs.  First we introduce  the  definition  of  „tree‟,  study  some  of  its  properties  and  its applications. We also provide equivalent conditions for a tree.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





6. (ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.

Answer:

Let “G‟ be a connected graph with n vertices and n - 1 edges. It is enough to show that G contains no circuits.

If possible, suppose that G contains a circuit.

Let “e‟ be an edge in that circuit.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



  
PROGRAM  BSC.IT
SUBJECT CODE & NAME BT0071- TECHNICAL COMMUNICATION

1.  Explain the Characteristics of Technical Communication. What are the indicators of Excellence in Technical Communication?

Ans- Characteristics of Technical Communication

Technical Communication – Targets a Specific Reader The most  significant characteristics of technical communication is that you have to customize the information for a particular reader. This method is to
bring in personal warmth to your document. Sometimes you will be aware of  your potential reader, then your job is easy. For instance, writing a proposal  to  your  manager.  There  you  will  think  about  that  person‟s  background,  responsibilities,  history  with  organization,  attitudes  and  alike.  While preparing  the  proposal  you  will  be  considering  these  factors  to  entice  the  manager and to make it                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  Explain  the  preparatory  stage  in  SME  Interviews.  Prepare
notes on Post Interview Session and Validation.


Ans- Conducting SME Interviews

Perhaps the most universal and basic method for a technical communicator  to gather information is a face-to- face interview with a subject matter expert  (SME).  SMEs  may  be  engineers,  developers,  programmers,  operators,  clerks,  or  customer  support  personnel.  They  are  the  people  who  have
experience with and knowledge of a particular system, application, product,  process,  or  task  that  you  need  to  learn  about.  There  is  a  wide  variety  of  factors that can affect SME interviews. In most cases, the SME has a job to  do  beyond  taking  time  out  of  his  or  her  busy  day  to  talk  with  you.  It                                                           
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



3.  Explain the role of a technical editor. List the strength and  weakness of SDLC.

Ans- Role of a Technical Editor

A technical document, to be effective, requires not only a good writer, but  also a good editor.    The chief duties of a technical editor are realized when  the sections of  a technical document are submitted to him. The main duties  that he performs include: Improving text material: The editor determines  how appropriate the content  and  organization  are  for  the  purpose  and  audience.  He  is  instrumental  in
making the verbose material into concise and clear. In doing this he should  be  cautious  because  he                                                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  BSC IT
SUBJECT CODE & NAME BT0072 -  COMPUTER NETWORKS

1.  Describe Message switching and Packet switching.

Ans- Message switching

Message switching was the precursor of packet switching, where messages  were routed in their entirety and one hop at a time. It was first introduced by

Leonard  Kleinrock  in  1961.  Message  switching  systems  are  nowadays  mostly implemented over packet-switched or circuit-switched data networks. Hop-by-hop Telex forwarding are examples of message switching systems.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM







2.  What is Framing? Briefly explain Fixed-Size and Variable Size Framing.

Framing

Data transmission in the physical layer means  moving bits in the form of a signal  from  the  source  to  destination.  The  physical  layer  provides  bit synchronization  to  ensure  that  the  sender  and  receiver  use  the  same  bit durations and timing.

The data link layer on the other hand needs to pack bits into frames, so that each frame is distinguishable from another.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





3.  Briefly explain Stop-and-Wait Automatic Repeat Request. 

Stop-and-Wait Automatic Repeat Request

This  protocol  adds  a  simple  error  control  mechanism  to  the  stop-and-wait protocol.  To  detect  and  correct  corrupted  frames,  we  need  to  add redundancy bits to our data frame. When the frame arrives at the receiver site, it is checked and if it is corrupted, it is silently discarded. The detection of errors in this protocol is manifested by the silence of the receiver. Lost frames are more difficult to handle than corrupted ones. The corrupted and lost  frames                                                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






4.  What is the role of Internet Protocol version 4  (IPV4) in addressing and routing packets between hosts? Briefly explain the structure of  an IPV4 packet.

Internet Protocol version 4 (IPV4)

IPV4 is a datagram protocol primarily responsible for addressing and routing packets  between  hosts.  IPV4  is  connectionless,  which  means  that  it  does not  establish  a  connection  before  exchanging  data,  and  unreliable,  which means  that  it  does  not  guarantee  packet  delivery.  IPV4  always  makes  a “best  effort”  attempt  to  deliver  a  packet.  An  IPV4  packet  might  be  lost, delivered out of sequence, duplicated, or delayed. IPV4  does not attempt to recover from                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






5.  Explain the working and applications of SMTP.  10  10

SMTP  is  based  on  end-to-end  delivery:  An  SMTP  client  contacts  the destination host's SMTP server directly, on well-known port 25, to deliver the mail. It keeps the mail item being transmitted until it has been successfully copied to the recipient's SMTP. This is different from the store-and-forward principle that is common in many mailing systems, where the mail item can pass through a number of intermediate hosts in the same network on its way to the destination and where successful transmission from the sender only indicates that the mail                                                                              
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 6.  Describe Caching and TTL. How it is useful in query resolving?

Ans- Caching and TTL

For  each  resolved  query  (either  recursive  or  iterative),  the  DNS  resolver  caches the returned information for a time that is specified in each resource  record in the DNS response. This is known as positive caching. The amount  of time in seconds to cache the record data is referred to as the Time To
Live (TTL). The network administrator of the zone that contains the record  decides on the default TTL for the data in the zone. Smaller TTL values help  ensure that data about the domain is more consistent                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM









































































No comments:

Post a Comment