PROGRAM - MCA
SEMESTER V
SUBJECT CODE & NAME - MCA5010-WEB TECHNOLOGY
1. Differentiate
between TCP and UDP.
Answer:
TCP (Transmission Control Protocol)
The TCP
corresponds to the transport layer of OSI reference model, The TCP is
known as a connection-oriented protocol,
which means that a
connection is established and maintained until such ti me as the message or messages
to be exchanged by the application programs at each end have been exchanged.
TCP makes sure
data gets to the
destination without errors. It is also responsible for
disassembling and assembling the data. It
divides large messages into smaller packets of at the most 15KB size. Each of
this
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2 Describe the features of XML. What are the
important rules to keep in mind about the XML declaration?
Answer:
Features
of XML:
XML is popular for many
features and few of them are listed here:
Easy
Data Exchange: In XML, data and markup are
stored as text that we can configure.
If we like,
we can use
XML editors to
create XML documents but
if something goes
wrong we can examine and modify document directly because it’s all just
text.XML provides a very efficient way
of storing most
data. In addition,
when we standardize
markup languages, many different people can use them.
Customizing
markup language: We
can create customized markup languages using XML, and
that represents its extraordinary power.
We can create a customized browsers to
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. List and explain the Components of XML
processor.
Answer:
Components
of XML processor
a)
Parser
Every XML
processor has a
parser. An XML
parser converts an XML
document into an XML DOM object - which
can then be manipulated with a JavaScript. The
parser's job is to translate
XML markup and data into a stream of bite-sized nuggets, called tokens, to be
used for processing. A token may
be an element
start tag, a
string of character
content, the beginning
delimiter of a
processing instruction, or
some other piece
of markup that indicates a change between regions of the document.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4.
Describe the procedure of fetching data from XML to HTML. Give an example.
Answer:
Loading
XML Data into an HTML Page
The process of fetching data from an XML
files to be filled in an HTML table,
using DSO (Data
Source Object) and
JavaScript. DSO is an
object that operates like a database on the client side. It will accept information
that is organized in a
certain way and
will manipulate it
with its own
database engine.
DSO allows
data binding to HTML table elements. When a table element is bound there is no
need to write out the code for individual rows for each record in the
recordset. The DSO will
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Describe five different categories of PHP
Operators.
Answer:
PHP
– Operators
In all programming
languages, operators are used to manipulate or perform operations on variables
and values. There are many operators used in PHP, so we have separated them
into the following categories to make it easier to learn them all.
·
Assignment Operators
·
Arithmetic Operators
·
Comparison Operators
·
String Operators
·
The Concatenation Operator
Assignment
operators are used to set a variable
equal to a value or set a variable to another variable's value. Such an
assignment of value is done with the "=", or equal character.
Example: $my_data = 2; $another_data =
$my_data
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6 Describe about ASP.
Answer:
Introduction
of ASP
Active Serve r
Pages (ASPs) are
Web pages that
contain server-side scripts
in addition to the usual mixture of text and HTML (Hypertext Markup Language) tags. Server-side scripts
are special code that is put in Web Pages and that code
is processed before it is sent to the
Web browser of someone who's visiting
your Web site.
When we type
a URL in the
Addressbox or click a link on a Web page it means we are asking a Web server
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM - MCA
SEMESTER V
SUBJECT CODE & NAME - MCA5020-ADVANCED SOFTWARE
ENGINEERING
1. What do
you mean by product life cycle? Explain the seven stages of product life cycle.
Answer:
Product Life
Cycle
A series of steps is required to manufacture a
product. Let us in this section,
the different stages
in the product
life cycle. The
product developed should satisfy
the customer. The
series of steps
involved in developing the
product is called the product life cycle. The seven stages in a product life
cycle are:
·
Analysis stage
·
Design stage
·
Development stage
·
Testing stage
·
Implementation stage
·
Maintenance stage
·
End of life stage
The seven stages of the product life cycle in detail
are as below:
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 -
8285115522
2. List any ten major principles of agile
software.
Answer:
Principles of
Agile Software:
The 12 major principles of agile software are:
·
Satisfying the customers with
early and continuous delivery of
valuable software is agile software’s major priority.
·
Welcoming varying
requirements, even during
the later phases
of development. Agile processes
also support change
for the customer’s competitive benefit.
·
Delivering working software
often, with a shorter timescale is preferred.
·
Involving business
people and developers
in development of
agile process and making them work together everyday during the project.
·
Developing projects
around motivated individuals
and also providing those individuals
the environment and
the support they
require, and trusting them to get
the work done.
Considering face-to-face conversation as the most proficient and
useful way of conveying
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 -
8285115522
3. List the four developer practices of XP.
explain briefly about Adopt test-driven development.
Answer:
As shown in the figure below the four developer
practices of XP are:
·
Adopt test-driven development
·
Practice pair programming
·
Adopt collective ownership
·
Integrate continually
Adopt
test-driven development:
The main reason for adopting test-driven development practice is to
prove that the code developed works
based on the requirement. XP emphasizes the need for testing
every code as and when it is developed. You must
test the code to check if the code actually does what it is intended to
do and if anything can make the code to
behave erratically. Usually traditional testing is carried out by writing
test cases to check
the conditions under which the
software fails. But
XP also writes
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 -
8285115522
4. Briefly explain about tracker and coach in
XP.
Answer:
There are a few other roles in XP apart from the
customers and developers. Even though they are
not part of the core team,
they are essential for the execution of
the project. They are:
·
Tracker
·
Coach
Tracker
A tracker is a person who keeps track of the
schedule. A tracker can be a manager
or a trusted
developer. XP keeps
track of certain
metrics that include team
velocity. This is
the ratio of
ideal time estimated
for accomplishing a task
to the actual
time spent implementing
them. The tracker also
includes other data
such as change
in velocity, overtime worked, and the ratio of passing
tests to failing tests.
It is the responsibility of the tracker to prepare good
estimates of the tasks. Preparing good
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 -
8285115522
5. Explain XP prerequisites.
Answer:
XP
prerequisites
The following are the prerequisites for adopting XP:
·
Team agreement
·
A collocated team
·
On-site customers
·
The right team size
·
Use all XP practices
Let us now discuss these prerequisites.
Team agreement
The team’s agreement to use XP is as important as
management support. If team members do
not want to use XP, it’s not likely to work. XP assumes that each team member’s
willingness to adopt it. It is
not a good practice to force the process
on somebody who is resisting it.
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 -
8285115522
6. List and explain any five basic principles of
DSDM.
Answer:
The Principles
of DSDM:
DSDM consists of
nine basic principles.
These principles form
the cornerstones of development
using DSDM and
direct how development progresses. Ignoring
any one of
them will break
with the frameworks philosophy and
significantly increases project
risks. The principles
are as follows:
·
Active user involvemet is
imperative.
·
Teams must be authorized to
make decisions.
·
Focus on frequent delivery.
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 -
8285115522
PROGRAM - MCA
SEMESTER V
SUBJECT CODE & NAME - MCA5031-PRINCIPLES OF
MULTIMEDIA
1. What is a Multimedia System?
Explain any four Properties of a Multimedia System
Multimedia System
The word
multimedia is composed
from two words:
multi and media.
The prefix Multi comes
from the Latin
word multus, which
means many or numerous.
The word media
is the plural
form of the
Latin word medium which means middle or transmission
channel. Therefore, multimedia is the integration of multiple forms of media.
So, we can define Multimedia as the integration of
text, graphics, drawings,
still and moving
images (vide o), animation and
audio delivered to you by an electronic media (computer). We can
also define multimedia
as the processing
and presentation of
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Briefly explain HTML. What are the essential features of HTML?
HTML
The prefix hyper- (comes from
the Greek word
which means "over" or "beyond") signifies
the overcoming of
the old linear
constraints of written text.
Hypertext is a
type of formatted
text that enables
a related set of
documents called pages to be created which contains links to other pages
referred to as
hyperlinks. For example,
most universities describe
their structure and the courses and facilities offered by them in a
brochure known as prospectus. Now the reader can find out information about a
particular course, and the
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Differentiate between Bitmap graphics and Vector graphics.
Bitmap graphics are made up of group of small dots called pixels
whereas vector graphics are made up of
lines, curves, and fills.
A bitmap image uses a grid of individual pixels where each
pixel can be a different color or
shade whereas vector
graphics use mathematical relationships between
points/lines and the
paths connecting them
to describe an image. Below figure shows bitmap and vector image.
Bitmap images
are resolution dependent
whereas vector graphics
are resolution independent.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Differentiate between filed mode and frame mode.
MP@ML: The
application for which
MP@ML is purposed
is for digital television broadcasting.
Hence interlaced scanning
is used with
a frame refresh rate
of 30Hz for
NTSC and 25Hz
for PAL. The
4:2:0 digitization format is used
and the bit rate ranges from 4Mbps to 15 Mbps. The coding scheme is
similar to MPEG-1
with only difference
in scanning method.
It uses interlaced scanning
instead of progressive
scanning which
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Explain the various
hardware components required
for Multimedia Applications.
The various hardware
components required are as follows:
CPU: The CPU (Central Processing Unit) of a
computer performs the main processing
of data. The
CPU is responsible
for everything the
computer does. For example,
the CPU runs
the operating system,
the software programs installed
on the computer, and device peripherals such as printers and scanners. For multimedia computer the CPU should be
fast so Pentium IV or other advanced processors are required.
Monitor: The
multimedia computer should
be equipped with
a monitor having Super Video
Graphics Arrays (SVGA) card. The basic advantage of having SVGA is that it has
a better
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. What are the different types of multimedia servers? Explain.
Different types of multimedia servers are as follows:
Data-processing servers: Data-processing servers
are traditional database servers
that contain alphanumeric
data. The database
can be relational or
object-oriented database. In relational database, data fields or records are
stored in columns in a table. In an object-oriented database, the records become
the attributes of the object. In both the cases, some fields or attributes are
indexed to provide fast access to data.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM - MCA
SEMESTER V
SUBJECT CODE & NAME - MCA5042- Cryptography and
Network Security
1. Describe the
stream and block
encryption with their advantages and disadvantages.
Block based encryption system is classified as stream
and block encryption system.
Stream encryption algorithm
convert one symbol
of plaintext immediately into
a symbol of
ciphertext. (The exception
is the columnar transposition cipher.) The
transformation depends only on the symbol, the key, and the control information
of the encipherment algorithm. A model of stream enciphering is shown in below
figure
Some kinds
of errors, such
as skipping a
character in the
key during encryption, affect
the encryption of
all future characters.
However, such errors can
sometimes be recognized
during decryption because
the plaintext will be
properly recovered up
to a point,
and then all
following
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Compare DES and AES algorithms.
Comparison of DES and AES
|
|
DES
|
AES
|
|
Date
|
1976
|
1999
|
|
Block size
|
64 bits
|
128 bits
|
|
Key length
|
56 bits (effective length)
|
128, 192, 256 (and possibly more) bits
|
|
Encryption primitives
|
Substitution, permutation
|
Substitution, shift, bit mixing
|
|
Cryptographic primitives
|
Confusion, diffusion
|
Confusion, diffusion
|
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain Developmental Controls
and Administrative Controls.
Developmental Controls
Software development
is often considered
a solitary effort;
a programmer sits with a
specification or design and grinds out line after line of code. But in fact, software
development is a
collaborative effort, involving
people with different skill
sets who combine
their expertise to
produce a working product. Development requires people
who can
·
specify
the system, by capturing the requirements and building a model of how
the system should work from the users' point of view
·
design
the system, by proposing a solution to the problem described by the
requirements and building a model of the solution
·
implement
the system, by using the design as a blueprint for building a working
solution
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. List all the models of security
and explain any two models.
In security and
elsewhere, models are
often used to
describe, study, or
analyze a particular
situation or relationship. In
particular, security models
are used to
document a policy,
help conceptualize and
design an implementation, test a particular
policy for completeness
and consistency, check whether an implementation meets its
requirements. We assume that some access control policy dictates whether a
given user can access
a particular object.
We also assume
that this policy
is established outside any model.
That is,
a policy decision
determines whether a
specific user should have
access to a
specific
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Define and explain IP security.
Explain IP security architecture.
IPSec
provides connectionless, best-effort delivery of datagrams through a
network by protecting
it from snooping
or modification. IPSec
protects IP datagrams by defining
a method of specifying the traffic to protect, how that traffic is to be
protected, and to whom the traffic is sent. IPSec can protect packets between
hosts, between network
security gateways, or between
hosts and security
gateways. Since an
IPSec-protected datagram is
itself just another IP packet it is possible to nest security services
and provide, for example,
end-to-end authentication between
hosts and send
that
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Describe guard and personal
firewalls.
Guard
A guard is a
sophisticated firewall. Like a proxy firewall, it receives protocol data units,
interprets them, and
passes through the
same or different protocol data units that achieve
either the same result or a modified
result.
The guard
decides what services
to perform on
the user's behalf
in accordance with its
available knowledge, such
as whatever it
can reliably know of the
(outside) user's identity, previous interactions, and so forth. The degree of
control a guard can provide is limited only by what is computable. But guards
and proxy firewalls
are similar enough
that the distinction between them
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
SEMESTER V
SUBJECT CODE & NAME - MCA5043– Data Warehousing
and Data Mining
1. Explain the Top-Down and
Bottom-up Data Warehouse development Methodologies.
Despite the
fact that Data
Warehouses can be
designed in a
number of different ways,
they all share
a number of
important characteristics. Most Data
Warehouses are Subject
Oriented. This means
that the information that is in the
Data Warehouse is
stored in a
way that allows
it to be connected to objects or event, which occur
in reality.
Another
characteristic that is frequently seen in Data Warehouses is called Time Variant.
A time variant
Data Warehouse will
allow changes in the
information to be monitored and
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Explain the Functionalities and
advantages of Data Warehouses.
Functionality of Data Warehouses
Data Warehouses
exist to facilitate
complex, data-intensive and
frequent adhoc queries. Data
Warehouses must provide
far greater and
more efficient query support than is demanded of transactional
databases. Data Warehouses provide the following functionality:
Roll-up: Data is
summarized with increased generalization.
Drill-down:
Increasing levels of detail are revealed.
Pivot: Cross
tabulation that is, rotation is performed.
Slice and Dice:
Performing projection operations on the dimensions.
Sorting: Data is
sorted by ordinal value.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Describe about Hyper Cube and
Multicube.
Multidimensional databases
can present their
data to an
application using two types of
cubes: hypercubes and multicubes. The
Hypercube is the cube with four Dimensions.
In the hypercube
model, as shown
in the following illustration, all
data appears logically
as a single
cube. This intuitive representation is a hypercube,
a representation that
accommodates more than three dimensions. At a lower level of simplification, a
Hypercube can very well accommodate
three dimensions. A
hypercube is a
general metaphor for
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. List and explain the Strategies
for data reduction.
Data reduction
techniques can be
applied to obtain
a reduced representation of
the data set
that is much
smaller in volume,
yet closely maintains the
integrity of the original data. That is, mining on the reduced data set should
be more efficient yet produce the same (or almost the same) analytical results.
Strategies for data
reduction include the following:
1) Date
cube aggregation
2) Dimension reduction
3) Data
compression
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Describe K-means
method for clustering.
List its advantages
and drawbacks.
K-means
K-means (MacQueen,
1967) is one
of the simplest
unsupervised learning
algorithms that solve
the well known
clustering problem. The
procedure follows a simple and easy way to classify a given data set
through a certain number of clusters
(assume k clusters) fixed a
priori. The main idea
is to define k centroids, one for each cluster.
The basic
step of k-means
clustering is simple.
In the beginning
we determine number of
cluster K and
we assume the
centroid or center
of these clusters. We can take any random
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Describe about Multilevel Databases
and Web Query Systems.
The database
approaches to Web
mining have generally
focused on techniques for
integrating and organizing
the heterogeneous and
semistructured data on the Web into more structured and high-level
collections of resources, such as
in relational databases,
and using standard
database querying mechanisms and
data mining techniques
to access and
analyze this information.
1) Multilevel Databases
Several
researchers have proposed a multilevel
database approach to organizing Web-based
information. The main
idea behind these proposals is
that the lowest
level of the
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522