Wednesday, 2 September 2015

MCA - SEMESTER - 5 - SUMMER - 2015

PROGRAM  - MCA
SEMESTER  V
SUBJECT CODE & NAME - MCA5010-WEB TECHNOLOGY

1. Differentiate between TCP and UDP.

Answer:

TCP (Transmission Control Protocol)

The TCP corresponds to the transport layer of OSI reference model, The TCP  is  known  as  a  connection-oriented  protocol,  which  means  that  a connection is established and maintained until such ti me as the message or messages to be exchanged by the application programs at each end have been  exchanged.  TCP  makes  sure  data  gets  to  the  destination  without errors. It is also responsible for disassembling and assembling the data.  It divides large messages into smaller packets of at the most 15KB size. Each of this                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2  Describe the features of XML. What are the important rules to keep in mind about the XML declaration?

Answer:

Features of XML:

XML is popular for many features and few of them are listed here:

Easy Data Exchange:  In XML, data and markup are stored as text that we  can  configure.  If  we  like,  we  can  use  XML  editors  to  create  XML documents  but  if  something  goes  wrong we can examine and modify document directly because it’s all just text.XML provides a very efficient way  of  storing  most  data.  In  addition,  when  we  standardize  markup languages, many different people can use them.

Customizing  markup  language:  We  can  create  customized markup languages using XML, and that represents its extraordinary power.  We can create a customized browsers to                                                         
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  List and explain the Components of XML processor.

Answer:

Components of XML processor

a) Parser

Every  XML  processor  has  a  parser.  An  XML  parser  converts  an  XML  document into an XML DOM object - which can then be manipulated with a  JavaScript.  The  parser's  job  is  to  translate  XML markup and data into a  stream  of bite-sized nuggets, called tokens, to be used for processing. A  token  may  be  an  element  start  tag,  a   string  of  character  content,  the  beginning  delimiter  of  a  processing  instruction,  or  some  other  piece  of markup that indicates a change between regions of the document.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4. Describe the procedure of fetching data from XML to HTML. Give an example.

Answer:

Loading XML Data into an HTML Page

The  process of fetching data from an XML files  to be filled in an HTML table, using  DSO  (Data  Source  Object)   and  JavaScript.  DSO  is  an object that operates like a database on the client side. It will accept information that is organized  in  a  certain  way  and  will  manipulate  it  with  its  own  database engine.

DSO allows data binding to HTML table elements. When a table element is bound there is no need to write out the code for individual rows for each record in the recordset. The DSO will                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Describe five different categories of PHP Operators.

Answer:

PHP – Operators

In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.

·         Assignment Operators
·         Arithmetic Operators
·         Comparison Operators
·         String Operators
·         The Concatenation Operator

Assignment operators  are used to set a variable equal to a value or set a variable to another variable's value. Such an assignment of value is done with the "=", or equal character. Example: $my_data = 2;   $another_data = $my_data

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6  Describe about ASP.

Answer:

Introduction of  ASP

Active  Serve r  Pages  (ASPs)  are  Web  pages  that  contain  server-side  scripts  in addition to the usual mixture of text and HTML (Hypertext Markup  Language) tags. Server-side  scripts  are  special  code that is put in Web Pages and that code is processed before it is sent to  the Web browser of someone  who's  visiting  your  Web  site.  When  we  type  a  URL  in  the Addressbox or click a link on a Web page it means we are  asking a Web server                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  - MCA
SEMESTER  V
SUBJECT CODE & NAME - MCA5020-ADVANCED SOFTWARE ENGINEERING

1. What do you mean by product life cycle? Explain the seven stages of product life cycle.

Answer:

Product Life Cycle

A series of steps is required to manufacture a product. Let us  in this  section,  the  different  stages  in  the  product  life  cycle.  The  product developed  should  satisfy  the  customer.  The  series  of  steps  involved  in developing the product is called the product life cycle. The seven stages in a product life cycle are:

·         Analysis stage
·         Design stage
·         Development stage
·         Testing stage
·         Implementation stage
·         Maintenance stage
·         End of life stage

The seven stages of the product life cycle in detail are as below:

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  List any ten major principles of agile software.


Answer:

Principles of Agile Software:

The 12 major principles of agile software are:
·         Satisfying the customers with early and continuous delivery  of valuable software is agile software’s major priority.
·         Welcoming  varying  requirements,  even  during  the  later  phases  of development.  Agile  processes  also  support  change  for  the  customer’s competitive benefit.
·         Delivering working software often, with a shorter timescale is preferred.
·         Involving  business  people  and  developers  in  development  of  agile process and making them work together everyday during the project.
·         Developing  projects  around  motivated  individuals  and  also  providing those  individuals  the  environment  and  the  support  they  require,  and trusting them to get the work done.
Considering face-to-face conversation as the most proficient and useful way of conveying                                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  List the four developer practices of XP. explain briefly about Adopt test-driven development.

Answer:

As shown in the figure below the four developer practices of XP are:
·         Adopt test-driven development
·         Practice pair programming
·         Adopt collective ownership
·         Integrate continually



Adopt test-driven development:

The main reason for adopting test-driven development practice is to prove that the code developed works  based on  the requirement. XP  emphasizes the need for  testing  every code as and when it is developed. You  must  test the code to check  if  the code actually does what it is intended to do and  if anything can make the code to behave erratically. Usually traditional testing is carried out by writing test  cases  to check  the conditions under which  the software  fails.  But  XP  also  writes                                    

                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




4.  Briefly explain about tracker and coach in XP.

Answer:

There are a few other roles in XP apart from the customers and developers. Even though they are  not part  of the core team, they  are essential for the execution of the project. They are:
·         Tracker
·         Coach

Tracker

A tracker is a person who keeps track of the schedule. A tracker can be a manager  or  a  trusted  developer.  XP  keeps  track  of  certain  metrics  that include  team  velocity.  This  is  the  ratio  of  ideal  time  estimated  for accomplishing  a  task  to  the  actual  time  spent  implementing  them.  The tracker  also  includes  other  data  such  as  change  in  velocity,  overtime worked, and the ratio of passing tests to failing tests.
It is the responsibility of the tracker to prepare good estimates  of the tasks. Preparing good                                                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Explain XP prerequisites.


Answer:

XP prerequisites

The following are the prerequisites for adopting XP:
·         Team agreement
·         A collocated team
·         On-site customers
·         The right team size
·         Use all XP practices

Let us now discuss these prerequisites.

Team agreement

The team’s agreement to use XP is as important as management support. If team members do  not want to use XP, it’s not likely to work. XP assumes that each  team member’s  willingness to adopt it.  It is not a good  practice to force the process on somebody who is resisting it.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





6.  List and explain any five basic principles of DSDM.

Answer:

The Principles of DSDM:

DSDM  consists  of  nine  basic  principles.  These  principles  form  the cornerstones  of  development  using  DSDM  and  direct  how  development progresses.  Ignoring  any  one  of  them  will  break  with  the  frameworks philosophy  and  significantly  increases  project  risks.  The  principles  are  as follows:
·         Active user involvemet is imperative.
·         Teams must be authorized to make decisions.
·         Focus on frequent delivery.
                                                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


PROGRAM  - MCA
SEMESTER  V
SUBJECT CODE & NAME - MCA5031-PRINCIPLES OF MULTIMEDIA


1.  What is a Multimedia System? Explain any four Properties of a Multimedia System

Multimedia System

The  word  multimedia  is  composed  from  two  words:  multi  and  media.  The prefix  Multi  comes  from  the  Latin  word  multus,  which  means  many  or numerous.  The  word  media  is  the  plural  form  of  the  Latin  word  medium which means middle or transmission channel. Therefore, multimedia is the integration of multiple forms of media. So, we can define  Multimedia  as the integration  of  text,  graphics,  drawings,  still  and  moving  images  (vide o), animation and audio delivered to you by an electronic media (computer). We  can  also  define  multimedia  as  the  processing  and  presentation  of
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. Briefly explain HTML. What are the essential features of HTML? 

HTML

The  prefix hyper- (comes  from  the  Greek  word  which  means  "over"  or "beyond")  signifies  the  overcoming  of  the  old  linear  constraints  of  written text.  Hypertext  is  a  type  of  formatted  text  that  enables  a  related  set  of documents called pages to be created which contains links to other pages referred  to  as  hyperlinks.  For  example,  most  universities  describe  their structure and the courses and facilities offered by them in a brochure known as prospectus. Now the reader can find out information about a particular course, and the                                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3. Differentiate between Bitmap graphics and Vector graphics.

Bitmap graphics are made up of group of small dots called pixels whereas  vector graphics are made up of lines, curves, and fills.

A bitmap image  uses a grid of individual pixels where each pixel can be a different  color  or  shade  whereas  vector  graphics  use  mathematical relationships  between  points/lines  and  the  paths  connecting  them  to describe an image. Below figure shows bitmap and vector image.

Bitmap  images  are  resolution  dependent  whereas  vector  graphics  are resolution independent.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4. Differentiate between filed mode and frame mode.

MP@ML:  The  application  for  which  MP@ML  is  purposed  is  for  digital television  broadcasting.  Hence  interlaced  scanning  is  used  with  a  frame refresh  rate  of  30Hz  for  NTSC  and  25Hz  for  PAL.  The  4:2:0  digitization format is used and the bit rate ranges from 4Mbps to 15 Mbps. The coding scheme  is  similar  to  MPEG-1  with  only  difference  in  scanning  method.  It uses  interlaced  scanning  instead  of  progressive  scanning  which                                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. Explain  the  various  hardware  components  required  for  Multimedia Applications.

The  various  hardware  components required are as follows:

CPU:  The CPU (Central Processing Unit) of a computer performs the main processing  of  data.  The  CPU  is  responsible  for  everything  the  computer does.  For  example,  the  CPU  runs  the  operating  system,  the  software programs installed on the computer, and device peripherals such as printers and scanners.  For multimedia computer the CPU should be fast so Pentium IV or other advanced processors are required.


Monitor:  The  multimedia  computer  should  be  equipped  with  a  monitor having Super Video Graphics Arrays (SVGA) card. The basic advantage of having SVGA is that it has a better                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6. What are the different types of multimedia servers? Explain. 

Different types of multimedia servers are as follows:

Data-processing  servers:  Data-processing  servers  are  traditional database  servers  that  contain  alphanumeric  data.  The  database  can  be relational or object-oriented database. In relational database, data fields or records are stored in columns in a table. In an object-oriented database, the records become the attributes of the object. In both the cases, some fields or attributes are indexed to provide fast access to data.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  V
SUBJECT CODE & NAME - MCA5042- Cryptography and Network Security

1.  Describe  the  stream  and  block  encryption  with  their advantages and disadvantages.

Block based  encryption system  is classified as  stream  and block encryption system.  Stream  encryption  algorithm  convert  one  symbol  of  plaintext immediately  into  a  symbol  of  ciphertext.  (The  exception  is  the  columnar transposition cipher.) The transformation depends only on the symbol, the key, and the control information of the encipherment algorithm. A model of stream enciphering is shown in below figure

Some  kinds  of  errors,  such  as  skipping  a  character  in  the  key  during encryption,  affect  the  encryption  of  all  future  characters.  However,  such errors  can  sometimes  be  recognized  during  decryption  because  the plaintext  will  be  properly  recovered  up  to  a  point,  and  then  all  following
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Compare DES and AES algorithms.

Comparison of DES and AES


DES
AES
Date
1976
1999
Block size
64 bits
128 bits
Key length
56 bits (effective length)
128, 192, 256 (and possibly more) bits
Encryption primitives
Substitution, permutation
Substitution, shift, bit mixing
Cryptographic primitives
Confusion, diffusion
Confusion, diffusion
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



3.  Explain Developmental Controls and Administrative Controls. 

Developmental Controls

Software  development  is  often  considered  a  solitary  effort;  a  programmer sits with a specification or design and grinds out line after line of code. But in fact,  software  development  is  a  collaborative  effort,  involving  people  with different  skill  sets  who  combine  their  expertise  to  produce  a  working product. Development requires people who can

·         specify  the system, by capturing the requirements and building a model of how the system should work from the users' point of view
·         design  the system, by proposing a solution to the problem described by the requirements and building a model of the solution
·         implement  the system, by using the design as a blueprint for building a working solution
                                                         
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  List all the models of security and explain any two models.

In  security  and  elsewhere,  models  are  often  used  to  describe,  study,  or  analyze  a  particular  situation  or relationship. In particular,  security  models  are  used  to  document  a  policy,  help  conceptualize  and  design  an implementation,  test  a  particular  policy  for  completeness  and  consistency,  check whether an implementation meets its requirements. We assume that some access control policy dictates whether a given user  can  access  a  particular  object.  We  also  assume  that  this  policy  is  established outside any model.
That  is,  a  policy  decision  determines  whether  a  specific  user should  have  access  to  a  specific                                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Define and explain IP security. Explain IP security architecture.

IPSec  provides connectionless, best-effort delivery of datagrams through a network  by  protecting  it  from  snooping  or  modification.  IPSec  protects  IP datagrams by defining a method of specifying the traffic to protect, how that traffic is to be protected, and to whom the traffic is sent. IPSec can protect packets  between  hosts,  between  network  security  gateways,  or  between hosts  and  security  gateways.  Since  an  IPSec-protected  datagram  is  itself just another IP packet it is possible to nest security services and provide, for example,  end-to-end  authentication  between  hosts  and  send  that                                                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Describe guard and personal firewalls.

Guard

A guard is a sophisticated firewall. Like a proxy firewall, it receives protocol data  units,  interprets  them,  and  passes  through  the  same  or  different protocol data units that achieve either the same result or  a modified result.
The  guard  decides  what  services  to  perform  on  the  user's  behalf  in accordance  with  its  available  knowledge,  such  as  whatever  it  can  reliably know of the (outside) user's identity, previous interactions, and so forth. The degree of control a guard can provide is limited only by what is computable. But  guards  and  proxy  firewalls  are  similar  enough  that  the  distinction between  them                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  V
SUBJECT CODE & NAME - MCA5043– Data Warehousing and Data Mining


1.  Explain the Top-Down and Bottom-up Data Warehouse development Methodologies.

Despite  the  fact  that  Data  Warehouses  can  be  designed  in  a  number  of different  ways,  they  all  share  a  number  of  important  characteristics.  Most Data  Warehouses  are  Subject  Oriented.  This  means  that  the  information that  is  in  the  Data  Warehouse  is  stored  in  a  way  that  allows  it  to  be connected to objects or event, which occur in reality.

Another characteristic that is frequently seen in Data Warehouses is called Time  Variant.  A  time  variant  Data  Warehouse  will  allow  changes  in  the information to be monitored and                                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Explain the Functionalities and advantages of Data Warehouses.


Functionality of Data Warehouses

Data  Warehouses  exist  to  facilitate  complex,  data-intensive  and  frequent adhoc  queries.  Data  Warehouses  must  provide  far  greater  and  more efficient query support than is demanded of transactional databases. Data Warehouses provide the following functionality:

Roll-up: Data is summarized with increased generalization.

Drill-down: Increasing levels of detail are revealed.

Pivot: Cross tabulation that is, rotation is performed.

Slice and Dice: Performing projection operations on the dimensions.

Sorting: Data is sorted by ordinal value.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Describe about Hyper Cube and Multicube. 

Multidimensional  databases  can  present  their  data  to  an  application  using two types of cubes:  hypercubes and multicubes. The Hypercube is the cube with  four  Dimensions.  In  the  hypercube  model,  as  shown  in  the  following illustration,  all  data  appears  logically  as  a  single  cube.  This  intuitive representation  is  a  hypercube,  a  representation  that  accommodates  more than three dimensions.  At a lower level of simplification, a Hypercube can very  well  accommodate  three  dimensions.  A  hypercube  is  a  general metaphor for                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  List and explain the Strategies for data reduction. 

Data  reduction  techniques  can  be  applied  to  obtain  a  reduced representation  of  the  data  set  that  is  much  smaller  in  volume,  yet  closely maintains the integrity of the original data. That is, mining on the reduced data set should be more efficient yet produce the same (or almost the same) analytical results.


Strategies for data reduction include the following:
1)  Date  cube  aggregation
2)  Dimension reduction
3)  Data  compression
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Describe  K-means  method  for  clustering.  List  its  advantages  and drawbacks.

K-means

K-means  (MacQueen,  1967)  is  one  of  the  simplest  unsupervised  learning algorithms  that  solve  the  well  known  clustering  problem.  The  procedure follows a simple and easy way to classify a given data set through a certain number  of  clusters  (assume k  clusters) fixed  a  priori. The  main  idea  is to define k centroids, one for each cluster.

The  basic  step  of  k-means  clustering  is  simple.  In  the  beginning  we determine  number  of  cluster  K  and  we  assume  the  centroid  or  center  of these clusters. We can take any random                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





6.  Describe about Multilevel Databases and Web Query Systems.

The  database  approaches  to  Web  mining  have  generally  focused  on techniques  for  integrating  and  organizing  the  heterogeneous  and  semistructured data on the Web into more structured and high-level collections of resources,  such  as  in  relational  databases,  and  using  standard  database querying  mechanisms  and  data  mining  techniques  to  access  and  analyze this information.

1)  Multilevel Databases

Several researchers have proposed a multilevel  database  approach to organizing  Web-based  information.  The  main  idea  behind  these proposals  is  that  the  lowest  level  of  the                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





No comments:

Post a Comment