Wednesday, 2 September 2015

MCA - 4 - SEMESTER - 4 - SUMMER - 2015

PROGRAM  - MCA
SEMESTER  - FOURTH
SUBJECT CODE & NAME - MCA4010- MICROPROSESSOR

1.  Write short notes on:
a)  Central Processing Unit
b)  Memory Unit

a)  Central Processing Unit

The central processing unit (CPU) is the electronic brain of the computer. CPU consists of Arithmetic Logic Unit (ALU) and Control Unit (CU).

(a)  Arithmetic  Logic  Unit  (ALU):  The  arithmetic  logic  unit  (ALU)  is responsible for arithmetic and logical operations. Basically an ArithmeticLogic Unit (ALU) is an electronic circuit used to carry out the arithmetic operations like addition, subtraction, multiplication and division.  It  also carries out logical operations like greater than, less than, equal to etc. It performs the operation on the data provided by                                                        
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


Memory  Unit

Memory  unit  stores  the  data,  instructions,  intermediate results and output  temporarily, during the processing of data. This memory is also called the  main memory  or  primary memory  of the computer. The input  data  that  is  to  be  processed  will  be  usually  brought  into  the  main memory  before  processing.  It  also  stores  the  instructions  required  for processing  of  data  and  any  intermediate  results.  The  output  is  stored  in memory before being transferred to the output device. CPU can work                                         


                                           
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  Write short notes on:
a)  Bus Interface Unit (BIU)
b)  Execution Unit (EU)

a)  Bus Interface Unit (BIU)

Bus Interface Unit  (BIU):  The BIU handles all the data and address on the buses for the execution unit (EU). It performs all bus operations such as  instruction  fetching,  reading  and  writing  operands  for  memory  and calculating  the  addresses  of  the  memory  operands.  The  instruction bytes  are  transferred  to  the  instruction  queue.  Execution  unit  use  the instruction  queue  to  execute  the  instructions.  Both  BIU  and  EU  work asynchronously  to  execute  instructions  by  using  Pipelining                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



b)  Execution Unit (EU)

Execution Unit (EU)

It  decodes  the  instructions  fetched  by  BIU,  generates  control  signals  and executes the instruction. The main parts of Execution unit are:
i)  Control system,
ii)  Arithmetic and Logic Unit (ALU)
iii)  Instruction decoder unit.
iv)   Flag Register
v)  General purpose registers and
vi)  Pointers and index registers

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Write short notes on:
a)  REP Prefix
b)  Table Translation

a)  REP Prefix

Because  string  operations  inherently  involve  looping,  the  8086  machine language  includes  a  prefix  that  considerably  simplifies  the  use  of  string primitives with loops. This prefix has the machine code
1 1 1 1 10 0 1 Z
where, for the CMPS and SCAS primitives, the Z bit helps control the loop. By prefixing MOVS, LODS and STOS, which do not affect the flags, with the REP prefix 11110011, they are repeated the number of times indicated by the CX register according to the following steps:

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


b)  Table Translation

It is sometimes necessary to  translate from one code to another. A terminal may communicate with the computer using the EBCDIC  (Extended Binary Coded  Decimal  Interchange  Code)  alphanumeric  code  even  though  the computer's software is designed to work with the ASCII (American Standard Code  for  Information  Interchange)  code,  or  vice  versa.  Code  conversions involving fewer than 8 bits (which accommodates up to 256 distinct entities) can be performed most easily by storing the desired code in                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  Describe  about  Key-code  Data  Formats  and  FIFO  Status Word formats.


Key-code Data Formats:

After a valid Key closure, the key code is entered as a byte code into the FIFO  RAM,  in  the  following  format,  in  scanned  keyboard  mode.  The  Key code  format  contains  3-bit  contents  of  the  internal  row  counter,  3-bit contents  of  the  column  counter  and  status  of  the  SHIFT  and  CNTL  Keys The  data  format  of  the  Key  code  in  scanned  keyboard  mode  is  shown  in below figure.

In the sensor matrix mode, the data from the return lines is directly entered into an appropriate row of sensor  RAM that  identifies the row of the sensor that  changes  its  status.  The  SHIFT  and  CNTL  Keys                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. Write a note on
(a) RS 232 standard
(b) IEEE 488 standard

RS232 Standard

RS232 standard is developed by the Electronic Industry Association (EIA) in 1962  and  was  revised  and  renamed  as  RS232C.  RS  stands  for "recommended  standard."  This  is  a  standard  hardware  interface  used  for implementing  asynchronous  serial  data  communication  ports  on  devices such as CRT terminals, printers, modems and keyboards.  RS-232 can be plugged  straight  into  the  computer’s  serial  port  (know  as  COM  or  Comm port).  RS-232 has been around as a standard for decades as an                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



IEEE-488 Standard

IEEE-488 refers to the Institute of Electrical and Electronics Engineers (IEEE) Standard number 488.  IEEE-488 was created as  HP-IB  (Hewlett-Packard  Interface  Bus),  and  is  commonly  called  GPIB (General  Purpose  Interface  Bus).  The  IEEE-488,  General  Purpose Interface Bus (GPIB), is a general purpose digital interface system that can be used to transfer data between two or more devices. The GPIB system is a  parallel  communication  system,  which  can  communicate  with  several devices through                                                         
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6. Write short note on:
a)  Parallel Printer Interface (LPT)
b)  Universal Serial Bus (USB)

a)  Parallel Printer Interface (LPT)

The parallel printer interface (LPT) is located on the rear panel of the  PC. The  LPT  stands  for  line  printer.  The  Parallel  Port  Interface  on  the  PC compatible computer is one of the most flexible interfaces for connecting the PC to a wide range of devices. The interface was originally intended purely
for connection to printers but due to the simple nature of the digital control lines it has found many other uses.  Its  simplicity relies on the fact that the data to and from the port forms an 8 bit binary on/off pattern. Unlike serial ports  which  rely  on  a  chip  to  do  the  data  transmission,  parallel  data                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


b)  Universal Serial Bus (USB)

The two main problems  associated with peripherals connected to computer systems  today  are  "plug  and  play"  and  speed  of  data  transfer.  USB (Universal Serial Bus) is designed to overcome these problems. Each USB port provides a single connector for any device that previously used parallel, serial,  keyboard,  and  mouse  or  game  ports.  USB  provides  a  serial  bus standard  for  connecting  peripherals  devices  to  PC  with  simplified  addition and removal.  USB can connect peripherals  such as mice, keyboards, game pads  and  joysticks,  scanners,  digital  cameras,  printers,  external  storage,
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  - MCA
SEMESTER  FOURTH
SUBJECT CODE & NAME - MCA4020- PROBABILITY AND STATISTICS


1.  Three machines A, B and C produce respectively 60%, 30% and 10% of the total number of items of a factory. The percentage of defective output of these machines are respectively 2%, 3% and 4%. An item is selected at random and is  found  to  be  defective.  Find  the  probability  that  the  item  was  produced  by machine C.


Solution:  Let P(A), P(B) and P(C) denote the probabilities of choosing an item  produced  by  A,  B,  C  respectively.  Also,  let  P(X/A),  P(X/B),  P(X/C) denote the probabilities of choosing a defective item from the outputs of A, B, C respectively. Then, from what is given, we have

We  are  required  to  find  P(C/X),  the  probability  that  the  item  selected  is
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. Find the constant k so that
Is a joint probability density function. Are X and Y independent?


                                               
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM






3. The  data  shows  the  distribution  of  weight  of  students  of  1st standard  of  a school. Find the quartiles.
 

                                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




4. Fit a trend line to the following data by the freehand method:


Solution: Graphical representation of trend line  relating to the production of wheat by the method of free hand curve is shown in figure                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. Let X be a random variable and its probability mass function is  Find the m.g.f. of X and hence it’s mean and variance.


               
                                                                                                                                                              
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6. The diastolic blood pressures of men are distributed as shown in table. Find the standard deviation and variance.


Solution:  The table  represents  the frequency  distribution  of  data  required for calculating the standard deviation.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  4
SUBJECT CODE & NAME - MCA 4030 -  PROGRAMMING IN JAVA


1.  Describe the following:
a)  Multi-threading.
b)  Significance of Java Bytecode

Multithreading is the ability of a program or an operating system process to manage its use by more than one user at a time and to even manage multiple requests by the same user without having to have multiple copies of the programming running in the computer. Central processing units have hardware support to efficiently execute multiple threads. These are distinguished from multiprocessing systems (such as multi-core systems) in that the threads have to share the resources of a single core: the computing units, the CPU caches and the translation lookaside buffer (TLB). Where multiprocessing                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


Java Magic: Byte Code

A  programming  language  has  to  be  portable  and  also  provide  enough ground  for  security.  The  key  factor  that  allows  Java  to  solve  both  the security and the portability problems is that the output of a Java compiler is not executable code. Rather, it is bytecode.  Bytecode  is a highly optimized set  of  instructions  designed  to  be  executed  by  the  Java  run-time  system, which  is  called  the  Java                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



2.  Differentiate Break and Continue statements in Java with example program.

Break Statement

By using  break, you can force immediate termination of a loop, bypassing the conditional expression and any remaining code in the body of the loop. When  a  break  statement  is  encountered  inside  a  loop,  the  loop  is terminated and program control resumes at the next statement following the loop. Here is a simple example:

// Using break to exit a loop
class BreakLoop {
public static void main(String args[ ]) {
for(int i=0; i<100; i++) {
if(i == 10) break; // terminate loop if i is 10
System.out.println("i: " + i);
}
System.out.println("Loop complete.");
}
}

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Differentiate between packages and Interfaces.

Packages

To create a package is quite easy: simply include a package command as the first statement in a Java source file. Any classes declared within that file will  belong  to  the  specified  package.  The  package  statement  defines  a name space in which classes are stored. If you omit the package statement, the class names are put into the default package, which has no name. (This is  why  you  haven't  had  to  worry  about  packages  before  now.)  While  the default package is fine for short, sample  programs, it is inadequate for real applications. Most of the time, you will define a package for your code. This is the general form of the package statement: package pkg;
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  What  are  Applets? What  are  the  restrictions  of  Applets?  Describe about applet class.

An  applet  is  a  Java  program  that  can  be  embedded  in  a  web  page. Java applications  are  run  by  using  a  Java  interpreter.  Applets  are  run  on  any browser  that  supports  Java.  Applets  can  also  be  tested  using  the appletviewer  tool included in the Java Development Kit. In order to run an applet it must be included in a web page, using HTML tags. When a user browses  a  web  server  and  it  runs  applets  on  the  user’s  system. 


Applets have certain restrictions put on them :

·         They can not read or write files on the user’s system.
·         They can not load or run any programs stored on the user’s system.
                                                                       
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





5.  Compare JDBC and ODBC .

Java Data Base Connectivity (JDBC)

The  JDBC  API  (Java  Data  Base  Connectivity  Application  Program Interface)  can access any kind of tabular data, especially data stored in a Relational  Database.  It  works  on  top  of  ODBC  (Open  Data  Base Connectivity)  which was the driver for database connectivity since  age old days  but  since  ODBC  was  implemented  in  C  so  people  from  the  VB background  had  some  problems  in  understanding  the  implementation intricacies. Since JDBC works on top of ODBC we have something called as a  JDBC-                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Describe about Java Beans and BeanBox.

Java Beans

JavaBeans  is  the  software  component  architecture  for  Java.  It  allows constructing  applications  efficiently  by  configuring  and  connecting components called Beans.  The Beans need to be written and tested with a rich set of mechanisms for interaction between objects, along with common actions that most objects will need to support such as persistence and event handling.

The BeanBox

The BeanBox is a very simple test container. It allows you to try out both the BDK example beans and           



                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  FOURTH
SUBJECT CODE & NAME - MCA4040- ANALYSIS AND DESIGN OF ALGORITHM

1.  Write  the  steps  involved  in  analyzing  the  efficiency  of  nonrecursive algorithms.

Analyzing efficiency of non recursive algorithms

The  steps  involved  in  analyzing  the  efficiency  of  non-recursive  algorithms are as follows:

·        Decide the input size based on the constraint n
·        Identify the basic operations of algorithm
·        Check the number of times the basic operation is executed. Find whether the execution of basic operation is dependent on input size n or not. If the basic operation is depending on worst case, best case and average case then analysis of algorithm needs more attention.
Set up summation  formula  for the number of times the basic operation is                                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. Define  selection  sort  and  explain  how  to  implement  the selection sort?

Selection  sort  is  one  of  the  simplest  and  performance  oriented  sorting techniques  that  work  well  for  small  files.  It  has  time  complexity  as  O(n2) which is unproductive on large lists.
Let us see an example for selection sort. In below figure , we use selection sort to sort five names in alphabetical order.                                                           
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3. Define Topological sort. And explain with example.  

Topological  sort  is  done  using  a  directed  acyclic  graph (DAG),  which  is  a linear ordering of all vertices G= (V, E) is an ordering of all vertices such that if  G  contains  an  edge  (u,  v),  then  u  appears  before  v  in  the  ordering.  A topological sort of a particular graph can be looked upon as a horizontal line where  all  directed  edges  travel  from  left  to  right.  Thus,  topological  sort differs  from  the  usual  sorting                                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4. Explain  good-suffix  and  bad-character  shift  in  Boyer-Moore algorithm.

The  Boyer-Moore  algorithm  uses  two  heuristics:  good-suffix  and  badcharacter shift.

Bad character shift

We use this when mismatch occurs. We decide the number of places to shift by using bad character shift.

·        As  in  Horspool’s  algorithm  if  the  rightmost  character  does  not  match, then the pattern is shifted to the right by its length.
·        When  the  rightmost  character  of  the  pattern  matches  with  that  of  the text,  then each character is compared from right to left. If at some point a  mismatch  occurs  after  a  certain  number  of  ‘k’  matches  with  text’s character ‘T’, then bad character shift is denoted by P. P = max { text (T) – k,1}

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. Solve the Knapsack problem using memory functions.
Item                                        1          2          3          4
Weight                                   2          6          4          8
Value (in Rs.)                         12        16        30        40
Knapsack capacity is given as W=12. Analyze the Knapsack problem using memory functions with the help of the values given above.

Answer:

If we apply the recurrence formulas to this set of data, then we will get the following table

0
1
2
3
4
5
6
7
8
9
10
1
0
12
12
12
12
12
12
12
12
12
2
0
12
12
12
12
16
16
16
16
16
3
0
12
12
30
30
30
30
30
30
54
4
0
16
16
30
30
30
30
40
40
64

w1= 2, v1=12
w2= 6, v2= 16
w3= 4, v3= 30
w4= 8, v4= 40
We can compute the maximum value of V[4,10] as Rs.64. We can use the table to track  the optimal subset. Since V[4,10]  V[3,10], item 4 is included in  an  optimal  solution  along  with  an  optimal  subset  for  filling  10-3=7 remaining  units  of  the  Knapsack                                                        
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




6.  Describe Variable Length Encoding and Huffman Encoding. 

Huffman codes are digital data compression codes  which  are  the outcome of  the  brilliant  piece  of  work  by  Prof.  David  A.  Huffman  (1925-1999). Huffman codes give good compression ratios. Even today,  after  50 years, Huffman codes have not only survived but  are unbeatable  in many cases. Huffman compression is a compression technique where  there  is no loss of information when the data is compressed i.e. after                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



No comments:

Post a Comment