Thursday 28 May 2015

SMU BSCIT SPRING 2015 ASSIGNMENTS

 GET FULLY SOLVED AND PROFESSIONALLY WRITTEN  SMU ASSIGNMENTS AT NOMINAL COST
 
COST WILL BE RS.125 PER SUBJECT OR RS.600 PER SEMESTER
 
KINDLY EMAIL US AT:

assignmentsolutionshelp@gmail.com or call us at 07506193173

SMU BSCIT SEM 2 SPRING 2015 ASSIGNMENTS
 
BT0068, Computer Organization and Architecture
1. Explain various units of a digital computer with the help of a diagram.
2 Describe bus in computer system and explain its structure.
3 Explain the simple instruction format with diagram and examples.
4 Explain memory interleaving with the help of a diagram.
5 Explain interrupt and interrupt driven I/O.
6 Explain DMA controller with the help of diagram.
 
BT0069, Discrete Mathematics
1 U= {a,b, c, d, e}, A= {a, c, d} , B= {d, e},C= {b, c, e}
Evaluate the following:
2 (i) State the principle of inclusion and exclusion.
(ii) How many arrangements of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289, 234 or 487?
3 If G is a group, then
The identity element of G is unique.
Every element in G has unique inverse in G.
For any a  G, we have (a-1)-1 = a.
For all a, b  G, we have (a.b)-1 = b-1.a-1.
4 (i)Define valid argument
(ii) Show that  (P  Q) follows from  P  Q.
5 (i)Construct a grammar for the language.
(ii)Find the highest type number that can be applied to the following productions:
1. S  A0, A  1  2  B0, B  012.
2. S  ASB  b, A  bA  c ,3. S  bS  bc.
6 (i) Define tree with example
(ii) Any connected graph with ‘n’ vertices and n -1 edges is a tree.
 
BT0070, Operating Systems
1 Write short notes on:
1. Process Creation
2. Terminating Process.
2 Write short notes on:
1. Critical section problem
2. Buffering
3 What are TLBs? Why they are required in paging?
4 Describe the techniques of free space management of free space list.
5 What are computer viruses? How do they affect our system?
6List and explain the types of multiprocessor OS.
 
BT0071- TECHNICAL COMMUNICATION – THEORY
1 What’s Audience Analysis? Explain its significance in Technical Communication
2 Explain the role of a technical editor. Differentiate between Micro and Macro editing.
3 Explain the various phases involved in System Development Life Cycle (SDLC).
 
BT0072, COMPUTER NETWORKS
1 What is OSI model? Explain all its layers with diagram.
2 Write a short note on ALOHA protocols.
3 What is the function of data link layer? Explain its services.
4 Explain Shortest Path routing Algorithm.
5 Discuss any two design issues of Session Layer.
6 Describe the structure of the DNS namespace on the Internet
SMU BSCIT SEM 3 SPRING 2015 ASSIGNMENTS
 
BT0074, OOPS with JAVA
 
1 Describe the syntax and working of if-else with an example. Also write a program in java that assigns a grade based on the value of a test score: an A for a score of 90% or above, a B for a score of 80% or above, and so on.
2 List and explain all the string comparison functions. Write a program in java to reverse a string.
3 Describe with the help of an example the implementation of inheritance in java.
4 Describe the catch and finally block statement in java with examples.
5 Draw and Explain the Life cycle of a java applet with an example.
6 Define java beans and beanbox. Describe the advantages of java beanbox.
 
BT0075, RDBMS and MySQL
 
1 How to alter databases and tables? Explain with the help of examples.
2 1. Explain insert statement with example.
2. Exercise: Create table CUSTOMERS with fields – ID, name, age, address and salary and insert records in the table (insert at least five records.)
3 Explain update and replace statements with examples.
4 Explain the date and time functions in detail.
5 Define grant tables. Describe the steps to set up MySQL user accounts. Also explain the method to assign passwords to the anonymous accounts.
6 Briefly describe the error log and general query log.
 
BT0076, TCP/IP
 
1 Draw the diagram of TCP/IP protocol suit. Explain network interface layer and Internet layer.
2 Define and explain address resolution protocol (ARP). Describe ARP packet generation.
3 Define user datagram. Explain UDP datagram format and UDP Application Programming Interface.
4 Write note on:
1. The Hierarchical Namespace
2. Fully Qualified Domain Names (FQDNs)
5 Define Remote Execution Command Protocol (REXEC and RSH). Explain its principle of operation.
6 State unique features of following versions of SNMP:
1. SNMPv1
2. SNMPv2
3. SNMPv2 entity
4. SNMPv2 party
BT0077, Multimedia Systems
1 List all the elements of drawing and explain any four element.
2 Describe in brief the following
1. Calligraphy
2. Text in multimedia application
3 Describe the following file formats:
1. Photoshop Format
2. Photoshop EPS
3. EPS TIFF or EPS PICT Preview
4. PCX
 
BT0078, Website Design
1 Explain ISDN connections. Also explain its advantages and disadvantages.
2 Describe the following in context of validating XML documents with DTDs
1. Concept of data validation
2. Writing document type definition (DTD) files
3. Internal and external DTDs
4. Validating parsers
5. The NMTOKEN and NMTOKENS Type
3 Define XSL-FO.
Explain the following:
1. Purpose of XSL Formatting Objects (XSL-FO)
2. XSL-FO Documents and XSL-FO Processors
 
SMU BSCIT SEM 4 SPRING 2015 ASSIGNMENTS
 
BT0080, Fundamentals of Algorithms
1 Describe insertion sort algorithm with the help of an example. Give the complexity of it.
2 State the concept of divide and conquer strategy with the help of an example.
3 Explain knapsack problem. Write algorithm for it.
4 Explain trees and subgraphs with examples.
5 Define spanning trees. Explain Kruskal’s algorithm to find out minimal cost spanning trees.
6 Define and explain Hamiltonian circuit and path.
 
BT0081 - Software Engineering
 
1 Explain Information content and determinacy.
2 Describe spiral model and its various task regions.
3 Explain the various steps involved in establishing a reliability specification and statistical testing.
4 Differentiate object-oriented and function oriented approaches.
5 Identify the different documents which may be produced to aid the maintenance process.
6 Discuss the various test design methods used in real time software testing.
 
BT0082, Visual Basic
1 Explain the event driven applications in VB.NET. Explain common control events and common form events in VB.net.
2 Describe the concept of Exit Try statement in VB.NET with an example.
3 Define SQL. Explain the select statement of SQL with examples.
4 Describe the concept of record navigation in VB.NET.
5 Describe the concept of jagged arrays in visual basic with an example.
6 Describe the features of ListView Control. Also describe how to set its design time properties.
 
BT0083, Server Side Programming-Theory
1 Describe java servlets and compare it with CGI.
2 Explain handling the form elements to retrieve the data from form using servlet API. Give some examples
3 Describe the following exception handling methods in a servlet with the help of examples
1. Using the web.xml file
2. Using a Request Dispatcher.
4 Explain the two JSP architectures.
5 Draw and explain the diagram of custom tag life cycle.
6 Describe the usage of EL (Expression Language) operators with suitable examples
SMU BSCIT SEM 5 SPRING 2015 ASSIGNMENTS
BT0086, Mobile Computing
1 Write short notes on:
(a) Frequency modulation (FM)
(b) Phase modulation (PM).
2 What is near and far effect problem in wireless communication? Explain in brief.
3 Explain about the Operation Sub System (OSS) of GSM system.
4 Explain Hard handover and Soft handover in UMTS.
5 List the advantages and disadvantages of Infra-red technology.
6 Write short notes on:
(a) HiCoMo: High Commit Mobile Transaction Model
(b) Kangaroo mobile transaction model
 
BT0087, WML and WAP Programming-Theory
1 Explain the functions of WAP proxy.
2 Describe the various data types available in WML script.
3 Briefly explain the WML external functions with an example
.
BT0088- Cryptography and Network Security
1 Explain Caesar’s Cipher encryption technique.
2 Compare DES and AES algorithms.
3 Explain Developmental Controls and Administrative Controls for software development.
4 List all the models of security and explain any two models for operating system security
5 Define and explain IP security. Explain its architecture.
6 Describe guard and personal firewalls.
 
BT8902, E-COMMERCE
1 Explain the modes of operation associated with E – Commerce.
2 Explain the purpose of Network layer of the OSI model.
3 Differentiate between direct and indirect metrics.
4 Explain the architectural components of CRM.
5 Explain the working of a WAP transaction.
6 What is the purpose of Security and Resolution Centre of eBay? Explain.
 
BT8903, C# Programming
1 Explain the Web Services, Web Forms, and Windows Forms in .Net framework.
2 Write a note on the following :
1. Mutable strings
2. Arrays of strings
3. Regular expressions
3 Explain the following in context of methods in C# with examples:
1. Invoking methods
2. Nesting of methods
4 Define members. Explain constant members and read only members.
5 Define and explain the class visibility and class members’ visibility.
6 Describe the methods used to handle exceptions. Provide examples.
 
BT9001, Data Mining
1 What is Online Analytical Processing (OLAP)? Explain its benefits.
2 Define noisy data. Briefly explain the data smoothening techniques.
3 Briefly explain mining quantitative association rules.
4 Briefly explain Agent Based and Database Approaches to web mining.
5 Define text mining. State the text retrieval methods.
6 How data mining is used in telecommunication field? Explain.
 
BT9003, Data Storage management
1 State the reasons for data loss in some business corporations.
2 How ILM supports implementation of regulatory concerns? Explain with an example.
3 Describe the two product classes in storage networking.
4 Briefly explain redundant I/O path elements.
5 Describe file system hierarchy and parsing the file system.
6 Explain RAID 0, RAID1 and RAID 0+1
 
SMU BSCIT SEM 6 SPRING 2015 ASSIGNMENTS
 
BT0092, Software Project Management
1 Define software cost estimation process? Why software cost estimation is required?
2 A project has been defined to contain the following list of activities along with their required times for completion:
1. Draw the PERT chart for the activities.
2. Calculate the earliest expected completed time
3. Show the critical path.
3 Define risk assessment. Explain the elements of risk assessment and risk control.
4 What is conflict management? How do we remove conflicts among team members?
5 What are the qualities for which an SQE (Software Quality Engineering) evaluation is to be done? Describe all.
6 Describe briefly the activities of software reengineering. Draw the necessary diagram.
 
 
BT9301- COMPUTER GRAPHICS
1 Draw and explain the diagram of a Raster scan system with a display processor. Explain each unit of the diagram.
2 Write and explain midpoint circle drawing algorithm.
3 What do you mean by polygon filling? Explain flood fill algorithm for polygon filling.
4 Write Liang Barkey’s line clipping algorithm. Write advantages of it.
5 What is shear? Explain X shear and Y shear.
6 Derive the 3-D transformation matrix to transform world coordinates to viewing coordinates.
 
BT9402, Artificial Intelligence
1 Explain the first and second principle of AI.
2 Explain knowledge representation with an example.
3 Explain the Inheritance and Reification in semantic networks.
4 Explain the two principal parts of an expert system.
5 Describe the factors affecting learning performance of a system.
6 Briefly explain the hardware requirements for designing a robot

No comments:

Post a Comment

Note: only a member of this blog may post a comment.