Wednesday, 2 September 2015

MCA - SEMESTER - 2 - SUMMER - 2015

PROGRAM  - MCA
SEMESTER  SECOND
SUBJECT CODE & NAME - MCA2010 – OPERATING SYSTEM


1. Define operating system. Explain any four major functions of Operating system.

Operating System – Definition

Operating  System  is  a  System  Software  (Set  of  system  programs)  which provides  an  environment  to  help  the  user  to  execute  the  programs.  The Operating  System  is  a  resource  manager  which  allocates  and  manages various resources like processor(s), main memory, input/output devices and information on secondary storage devices.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. Explain the different process states.

A process is executed sequentially,  one  instruction  at  a  time.  A  program  is  a  passive  entity. Example:  a file on the disk. A process on the other hand is an active entity. In addition to program code, it includes the values of the program counter, the contents of the CPU registers, the global variables in the data section and the contents of the stack that is used for subroutine calls. In reality, the CPU switches back and forth among processes.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Define Deadlock. Explain necessary conditions for deadlock.

Definition of Deadlock

Several  processes  compete  for  a  finite  set  of  resources  in  a  multiprogrammed  environment.  A  process  requests  for  resources  that  may  not be readily available at  the time of the request. In such a case the process goes into a wait state. It may so happen that this process may never change state because the requested resources are held by other processes which themselves are waiting for additional resources and hence in a wait state. This situation is called a deadlock.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  Differentiate  between  Sequential  access  and  Direct  access methods.

Sequential access

Sequential access increases interaction cost: the user has to inspect all the items that precede the item of interest in a list. With direct access, the user can focus on the element of interest without explicitly processing the items that come before it in the list.
Sequential access has two potential benefits:

•                                          Progressing linearly through an information space can be accomplished through particularly simple navigation controls: basically a “give me more” button.                                                                          
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. Differentiate  between  Daisy  chain  bus  arbitration  and  Priority encoded bus arbitration.

Daisy chain arbitration:  Here, the requesting device or devices assert the signal  bus_request.  The  bus  arbiter  returns  the  bus_grant  signal,  which passes through each of the devices which can have access to the bus, as shown  in  figure 10.5.  Here,  the  priority  of  a  device  depends  solely  on  its position  in  the  daisy  chain.  If  two  or  more  devices  request  the  bus  at  the same time, the                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6. Explain LRU page replacement algorithm with example.

LRU page replacement algorithm

The main distinction between FIFO and optimal algorithm is that the FIFO algorithm uses the time when a page was brought into memory (looks back) whereas the optimal algorithm uses the time when a page is to be used in future (looks ahead). If the recent past is used as an approximation of the near  future, then replace the page that has not been used for the longest period of time. This is the least recently used (LRU) algorithm.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  - MCA
SEMESTER  II
SUBJECT CODE & NAME - MCA2020- ADVANCED DATA STRUCTURE

1.  Define algorithm and write a note on  Complexity and TimeSpace Tradeoff with example

Algorithms: Complexity and Time- Space Tradeoff 
An  algorithm  is  a  step  by  step  procedure  for  solving  a  particular  problem. One  major  purpose  of  this  text  is  to  develop  efficient  algorithms  for  the processing of our data. The efficiency of the algorithm is depending on the time and space it uses. The complexity of an algorithm is the function which gives the running time and/ or space in terms of the input size.

Each  of  our  algorithms  will  involve  a  particular  data  structure.  The  data structure which we choose will depend  on many things, including the data and  the  frequency  with  which  various  data                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Define Queue and explain how we can implementation the Queue.

Queue

A queue is a linear list of elements in which deletions can take place only at one end, called the front and insertions can take place only at the other end, called the  rear  as referred  in the figure  4.7. The terms “front” and “rear” are used  in  describing  a  linear  list  only  when  it  is  implemented  as  a  queue. Following  are  the  two  methods  offered  by  queue  for  adding  and  deleting element from the queue.
·         enqueue - add a new item at the back of the queue
                                                             

                                               
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3. List the Advantages and Disadvantages of Linear and linked representation of tree.


Advantages of linear representation of binary tree

1)  Node can be accessed directly with the help of the index through which we can improve the efficiency of execution time of an algorithm.
2)  Data are stored without pointer reference of successor or predecessor
3)  This  representation  is  very  much  useful  where  the  language  does  not support the dynamic memory allocation.

Disadvantages of Linear representation of binary tree

1)  Memory  is  wasted  here  because  it  will  be  allocated  for  all  the  nodes absence of node will leads to empty entries in array.
2)  Since  the  array  size  is  limited  enhancement  of  tree  structure  is restricted.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  List and explain any Five types of graph.

Types of Graphs: Depending  upon  the  vertices  and  edges  and  the  weight  associated  to  it, graphs can be classified as:

1)  Undirected graph:  In Undirected Graph, the directions of edges are not assigned.  Edges in the Undirected graph only connect to each other.  In an undirected graph, edge (v1,v2)  is equivalent to  edge (v2,v1)  since they are unassigned. An example of Undirected graph is given in below figure.                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Explain
1.  Fixed block storage allocation.
2.  Variable block storage allocation

Fixed block storage allocation
First  block  storage  allocation  is  the  simplest  case  of  dynamic  storage allocation. This is the straight forward method in which, all the blocks are of identical in size. The user can decide the size of the block. The operating system  keeps  a  pointer  called  AVAIL.  This  pointer  points  to  memory  as shown in below figure.


                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



Variable block storage allocation

To  overcome  the  disadvantages  of  fixed  block  storage,  blocks  of  variable sizes are used, which is represented in the figure . Here also linked lists play a vital for the management of memory blocks. The procedures used for allocation  and  deallocation  of  memory  blocks  from  the  variable  block storage are as follows.
Figure : Availing a node from a pool with variable sized blocks.

Procedure GETNODE(NODE)
If (AVAIL=NULL) then
Print “Memory is insufficient”
Exit.
Endif
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  What  is  the  use  of  external  Storage  Devices?  Explain  any two external storage devices

External Storage Devices

The  capacity  of  main  memory  is  limited  by  two  factors,  the  cost  of  main memory and the technical problem in developing a large capacity of main memory. We discover that in some instances programs can also reside in storage units which do not belong to main memory.

An external storage device may be defined as device other than the main memory  on  which  information  or  data  can  be  stored  and  from  which  the information  retrieved  for  processing.  External  storage  devices  are  having larger capacities and fewer expenses to store compared to main memory.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  SECOND
SUBJECT CODE & NAME - MCA2030- OBJECT ORIENTED PROGRAMMING – C++


1.  Write short notes on:
a)  Inheritance
b)  Polymorphism

a)  Inheritance

Inheritance  is  a  very  powerful  feature  of  object  oriented  programming.  It allows  reuse  of  code  without  modifying  the  original  code.  It  also  allows flexibility  to  programmer  to  make  modifications  to  the  program  withoutaltering the original code which saves debugging and programming time and effort.

Inheritance feature has enabled to distribute class libraries which allows the programmer to use the standard code developed by some another company. Inheritance is the process of                                                        
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


b)  Polymorphism

Virtual  functions  in  C++  are  important  to  implement  the  concept  of polymorphism. Polymorphism means same content but different forms. In C++,  polymorphism  enables  the  same  program  code  calling  different functions  of  different classes. Imagine  a  situation  where  you  would  like  to create a class shape and derive classes such as rectangle, circle, triangle etc. Let us suppose each of the classes has a member function draw() that causes  the                                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Differentiate  between  Classes  and  Objects.  Write  an example program to represent a class and its object.
Classes provide users a method to create user defined datatypes. We have seen two types of user defined  datatypes  structures  and  enumeration  in  the  last  unit.  Both  are primarily used for modeling data only. In several real life situation, you would require to model functionality of the datatype along with the data. Classes enable  you  to  bind  data  and  functions  that  operate  on  data  together. However,  in  C++  you  can  use  structures  same                                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Describe operator  overloading. Which are the operators that cannot be overloaded?

Operator Overloading in C++

Operator  overloading  is  an  interesting  feature  of  C++  that  allows programmers to  specify how  various  arithmetic, relational  and  many  other operators work with user defined data types or classes. It provides a flexible way to work with classes and can make program code look obvious. To  perform
addition  of  two  distance  objects  we  used  a  call  d3.add(d1,d2).  Instead  of  such  statements  it  would  be  more  clear  if  we  could  use  statements  like d3=d1+d2. This is possible only if we inform compiler about how + operator works with distance class. This is exactly what operator overloading feature in  C++  does.  It  helps  to  use  the  default  operators  with  the  user  defined objects for            
                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  What  are the  advantages  of  Polymorphism?  How  it  can  be implemented?

Advantages  of  Polymorphism

Virtual  functions  in  C++  are  important  to  implement  the  concept  of polymorphism. Polymorphism means same content but different forms. In C++,  polymorphism  enables  the  same  program  code  calling  different functions  of  different classes. Imagine  a  situation  where  you  would  like  to create a class shape and derive classes such as rectangle, circle, triangle etc. Let us suppose each of the classes                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Differentiate between Containers and Iterators.


Containers

STL provides a number of container types, representing objects that contain other  objects.  The  STL  contains  sequence  containers  and  associative containers.  The  standard  sequence  containers  include  vector,  deque  and list.  sequence  containers  in,  as  their  name  suggests,  store  data  in  linear sequence  The  standard  associative  containers  are  set,  multiset,  map  and multimap.  Associative  containers  are  a  generalization  of  sequences. Sequences are indexed by integers;                                                                           
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Describe the two basic exception handling models. 

Of  course,  the  thrown  exception  must  end  up  someplace.  This  is  the exception  handler,  and  there’s  one  for  every  exception  type  you  want  to catch. Exception handlers immediately follow the try block and are denoted by the keyword catch:
try {
// code that may generate exceptions
} catch(type1 id1) {
// handle exceptions of type1
} catch(type2 id2) {
// handle exceptions of type2
}
// etc...
Each  catch  clause  (exception  handler)  is  like  a  little  function  that  takes  a single argument of one particular type. The identifier (id1, id2, and so on) may  be  used  inside  the  handler,                                                                                          
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  SECOND
SUBJECT CODE & NAME - MCA2040- COMMUNICATION SKILLS

1.  What is nonverbal communication? Give five examples for nonverbal communication

Non-verbal communication means  the messages that do not contain words. In this type of communication, words are not used in the process of sending and  receiving  messages.  You  may  wonder,  “How  is  this  possible?”  It  is  a proven fact  that most  of  our  communication through  words  are  laced  with non verbal communication. They can be categorized as:

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  What are the prosodic features of speech?

Prosodic features of speech such as intonation and stress. A segmentin spoken language is an individual  consonant,  vowel,  tone, or  stress  that makes up a word. An utterance is made up of both segments and suprasegmental features. These are broadly divided up into  Prosody and Paralinguistics. Prosody refers to pitch, loudness, duration, intonation and tempo. Para-linguistics,  which  is  much  more  difficult  to  measure,  r efers  to expression  of  voice  quality,  emotion,  speaking  style  and  speech  clarity. These features of the speech are responsible for the different meanings an individual can construe from a simple sentence.

                                           


                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



3.  Define hearing and Listening. How is ‘hearing’ different from ‘listening’

Listening  is  a  highly  complex,  interactive  process,  “by  which  spoken language is converted to meaning in the mind” (Lundsteen, 1979). As this definition  suggests,  listening  is  more  than  just  hearing,  although  children and  adults  often  use  the  two  terms,  hearing  and  listening,  synonymously. Hearing is only one important component of listening.

i)  Hearing  is  a  passive  process.  It  is  merely  the  detection  of  sounds around  us.  Normally,  we  come  across  ‘hearing’  in  certain  situations. E.g.: When your lecturer reprimands you for                                                                                        
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  SECOND
SUBJECT CODE & NAME - MCA2050- COMPUTER ARCHITECTURE

1.  Differentiate between Process and Thread.


Concept of process

In operating system terminology, instead of the term ‘program’, the notion of process is used in connection with execution. It designates a commission or job,  or  a  quantum  of  work  dealt  with  as  an  entity.  Consequently,  the resources  required,  such  as  address  space,  are  typically  allocated  on  a process  basis.  Each  process  has  a  life  cycle,  which  consists  of  creation,  an execution phase and termination.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Explain the any five types of addressing modes.

The following are the different types of address modes:

Implied  Mode:  The  operands  in  this  mode  are  specified  implicitly  in  the explanation  of  the  instruction.  For  example,  the  instruction  ‘‘complement accumulator’’  is  considered  as  an  implied  mode  instruction  as  the description of the instruction implies the operand in the accumulator register. In  fact,  all  register  references  instructions  that  use  an  accumulator  are implied  mode  instructions.  Zero-address  introductions  are  implied  mode instructions.
For example, the operation:
<a: = b + c;>
                                                                  
                                               
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Describe  the  logical  layout  of  both  RISC  and  CISC computers

Pipeline  in  RISC  architecture:  Before  discussing  pipelines  in  RISC machines,  let  us  first  discuss  what  is  a  RISC  machine?  The  term  RISC stands for Reduced Instruction Set Computing. RISC computers reduce chip complexity by using simpler instructions. As a result, RISC compilers have to  generate  software  routines  to  perform  complex  instructions  that  would have been done in hardware by CISC (Complex Instruction Set Computing) computers. The salient features of RISC architecture are as follows:
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4. Explain  the  concept  of  branch  handling.  What  is  delayed branching?

Branch  is  a  flow  altering  instruction  that  is  required  to  be  handled  in  a special  manner  in pipelined processors.  Branch instruction’s impact on the pipeline is shown in figure 1 (a) as below:



Figure 1: Branch Instruction’s impact on Pipeline
As  shown  in  figure  1,  the  instruction  Ib  is  considered  as  a  branch instruction. In  the case  when  branch is taken,  the control is transferred to instruction It. On the other hand, if branch is not taken, instructions available in pipeline are of use.
In the case when the branch is taken, every instruction available in pipeline, at  different                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Explain any five types of vector instructions in detail. 

Types of Vector Instructions: The various types of vector instructions for a register-register vector processor are:

(a)  Vector-scalar instructions
(b)  Vector-vector instructions
(c)  Vector-memory instructions
(d)  Gather and scatter instructions
(e)  Masking instructions
(f)  Vector reduction instructions
Let us discuss these.

(a)  Vector-scalar instructions: Using these instructions, a scalar operand can be combined with a vector one. If A and B are vector registers and f  is  a  function  that  performs  some  operation  on  each  element  of  a single or two vector operands, a vector-scalar operand can                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





6.  Write short notes on:
a) UMA
b) NUMA

a) UMA

UMA  (Uniform  Memory  Access):  In  this  category  every  processor  and memory module has  similar access time.  Hence each memory word can be read  as  quickly  as  other  memory  word.  If  not  then  quick  references  are slowed down to match the slow ones, so that programmers cannot find the difference  this is  called uniformity  here. Uniformity predicts the performance which  is  a  significant  aspect for  code  writing.    Below figure (2) shows  uniform memory access from the CPU on the left.

Modern  UMA  machines  are  of  small  size  and  with  single  bus multiprocessors.  In  the                                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


b) NUMA


NUMA (Non Uniform Memory Access): They are intended for avoiding the memory  access  disadvantage  of  Uniform  Memory  Access  machines.  The logically  shared  memory  is  spread  between  all  the  processing  nodes  of NUMA machines, giving rise to distributed shared memory architectures. Figure  (2)  shows  non  uniform  memory  between  the  left  and  right  disks. Although  these  parallel  computers  became  highly  scalable,  yet  they  are                 
                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



No comments:

Post a Comment