GET FULLY SOLVED AND PROFESSIONALLY WRITTEN SMU ASSIGNMENTS AT NOMINAL COST
COST WILL BE RS.125 PER SUBJECT OR RS.600 PER SEMESTER
KINDLY EMAIL US AT:
assignmentsolutionshelp@gmail.com or call us at 07506193173
SMU BSCIT SEM 2 SPRING 2015 ASSIGNMENTS
BT0068,
Computer Organization and Architecture
1. Explain various units of a
digital computer with the help of a diagram.
2 Describe bus in computer system
and explain its structure.
3 Explain the simple instruction
format with diagram and examples.
4 Explain memory interleaving
with the help of a diagram.
5 Explain interrupt and interrupt
driven I/O.
6 Explain DMA controller with the
help of diagram.
BT0069,
Discrete Mathematics
1 U= {a,b, c, d, e}, A= {a, c, d}
, B= {d, e},C= {b, c, e}
Evaluate the following:
2 (i) State the principle of
inclusion and exclusion.
(ii) How many arrangements of the
digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 contain at least one of the patterns 289,
234 or 487?
3 If G is a group, then
The identity element of G is
unique.
Every element in G has unique
inverse in G.
For any a
G, we have (a-1)-1 = a.
For all a, b
G, we have (a.b)-1 = b-1.a-1.
4 (i)Define valid argument
(ii) Show that
(P Q) follows from P Q.
5 (i)Construct a grammar for the
language.
(ii)Find the highest type number
that can be applied to the following productions:
1. S A0, A 1
2 B0, B 012.
2. S ASB b, A bA c ,3. S bS bc.
6 (i) Define tree with example
(ii) Any connected graph with ‘n’
vertices and n -1 edges is a tree.
BT0070,
Operating Systems
1 Write short notes on:
1. Process Creation
2. Terminating Process.
2 Write short notes on:
1. Critical section problem
2. Buffering
3 What are TLBs? Why they are
required in paging?
4 Describe the techniques of free
space management of free space list.
5 What are computer viruses? How
do they affect our system?
6List and explain the types of
multiprocessor OS.
BT0071-
TECHNICAL COMMUNICATION – THEORY
1 What’s Audience Analysis?
Explain its significance in Technical Communication
2 Explain the role of a technical
editor. Differentiate between Micro and Macro editing.
3 Explain the various phases
involved in System Development Life Cycle (SDLC).
BT0072,
COMPUTER NETWORKS
1 What is OSI model? Explain all
its layers with diagram.
2 Write a short note on ALOHA
protocols.
3 What is the function of data
link layer? Explain its services.
4 Explain Shortest Path routing
Algorithm.
5 Discuss any two design issues
of Session Layer.
6 Describe
the structure of the DNS namespace on the Internet
SMU BSCIT SEM 3 SPRING 2015 ASSIGNMENTS
BT0074, OOPS
with JAVA
1 Describe the syntax and working
of if-else with an example. Also write a program in java that assigns a grade
based on the value of a test score: an A for a score of 90% or above, a B for a
score of 80% or above, and so on.
2 List and explain all the string
comparison functions. Write a program in java to reverse a string.
3 Describe with the help of an
example the implementation of inheritance in java.
4 Describe the catch and finally
block statement in java with examples.
5 Draw and Explain the Life cycle
of a java applet with an example.
6 Define java beans and beanbox.
Describe the advantages of java beanbox.
BT0075,
RDBMS and MySQL
1 How to alter databases and
tables? Explain with the help of examples.
2 1. Explain insert statement
with example.
2. Exercise: Create table
CUSTOMERS with fields – ID, name, age, address and salary and insert records in
the table (insert at least five records.)
3 Explain update and replace
statements with examples.
4 Explain the date and time
functions in detail.
5 Define grant tables. Describe
the steps to set up MySQL user accounts. Also explain the method to assign
passwords to the anonymous accounts.
6 Briefly describe the error log
and general query log.
BT0076,
TCP/IP
1 Draw the diagram of TCP/IP
protocol suit. Explain network interface layer and Internet layer.
2 Define and explain address
resolution protocol (ARP). Describe ARP packet generation.
3 Define user datagram. Explain
UDP datagram format and UDP Application Programming Interface.
4 Write note on:
1. The Hierarchical Namespace
2. Fully Qualified Domain Names
(FQDNs)
5 Define Remote Execution Command
Protocol (REXEC and RSH). Explain its principle of operation.
6 State unique features of
following versions of SNMP:
1. SNMPv1
2. SNMPv2
3. SNMPv2 entity
4. SNMPv2 party
BT0077,
Multimedia Systems
1
List all the elements of drawing and explain any four element.
2 Describe in brief the following
1. Calligraphy
2. Text in multimedia application
3 Describe the following file
formats:
1. Photoshop Format
2. Photoshop EPS
3. EPS TIFF or EPS PICT Preview
4. PCX
BT0078,
Website Design
1 Explain ISDN connections. Also
explain its advantages and disadvantages.
2 Describe the following in
context of validating XML documents with DTDs
1. Concept of data validation
2. Writing document type
definition (DTD) files
3. Internal and external DTDs
4. Validating parsers
5. The NMTOKEN and NMTOKENS Type
3 Define XSL-FO.
Explain the following:
1. Purpose of XSL Formatting
Objects (XSL-FO)
2.
XSL-FO Documents and XSL-FO Processors
SMU BSCIT SEM 4 SPRING 2015 ASSIGNMENTS
BT0080,
Fundamentals of Algorithms
1 Describe insertion sort algorithm
with the help of an example. Give the complexity of it.
2 State the concept of divide and
conquer strategy with the help of an example.
3 Explain knapsack problem. Write
algorithm for it.
4 Explain trees and subgraphs
with examples.
5 Define spanning trees. Explain
Kruskal’s algorithm to find out minimal cost spanning trees.
6 Define and explain Hamiltonian
circuit and path.
BT0081 -
Software Engineering
1 Explain Information content and
determinacy.
2 Describe spiral model and its
various task regions.
3 Explain the various steps
involved in establishing a reliability specification and statistical testing.
4 Differentiate object-oriented
and function oriented approaches.
5 Identify the different
documents which may be produced to aid the maintenance process.
6 Discuss the various test design
methods used in real time software testing.
BT0082,
Visual Basic
1 Explain the event driven
applications in VB.NET. Explain common control events and common form events in
VB.net.
2 Describe the concept of Exit
Try statement in VB.NET with an example.
3 Define SQL. Explain the select
statement of SQL with examples.
4 Describe the concept of record
navigation in VB.NET.
5 Describe the concept of jagged
arrays in visual basic with an example.
6 Describe the features of
ListView Control. Also describe how to set its design time properties.
BT0083,
Server Side Programming-Theory
1 Describe java servlets and
compare it with CGI.
2 Explain handling the form
elements to retrieve the data from form using servlet API. Give some examples
3 Describe the following
exception handling methods in a servlet with the help of examples
1. Using the web.xml file
2. Using a Request Dispatcher.
4 Explain the two JSP
architectures.
5 Draw and explain the diagram of
custom tag life cycle.
6 Describe
the usage of EL (Expression Language) operators with suitable examples
SMU BSCIT SEM 5 SPRING 2015 ASSIGNMENTS
BT0086,
Mobile Computing
1 Write short notes on:
(a) Frequency modulation (FM)
(b) Phase modulation (PM).
2 What is near and far effect
problem in wireless communication? Explain in brief.
3 Explain about the Operation Sub
System (OSS) of GSM system.
4 Explain Hard handover and Soft
handover in UMTS.
5 List the advantages and
disadvantages of Infra-red technology.
6 Write short notes on:
(a) HiCoMo: High Commit Mobile
Transaction Model
(b) Kangaroo mobile transaction
model
BT0087, WML
and WAP Programming-Theory
1 Explain the functions of WAP
proxy.
2 Describe the various data types
available in WML script.
3 Briefly explain the WML
external functions with an example
.
BT0088-
Cryptography and Network Security
1 Explain Caesar’s Cipher
encryption technique.
2 Compare DES and AES algorithms.
3 Explain Developmental Controls
and Administrative Controls for software development.
4 List all the models of security
and explain any two models for operating system security
5 Define and explain IP security.
Explain its architecture.
6 Describe guard and personal
firewalls.
BT8902,
E-COMMERCE
1 Explain the modes of operation
associated with E – Commerce.
2 Explain the purpose of Network
layer of the OSI model.
3 Differentiate between direct
and indirect metrics.
4 Explain the architectural
components of CRM.
5 Explain the working of a WAP
transaction.
6 What is the purpose of Security
and Resolution Centre of eBay? Explain.
BT8903, C#
Programming
1 Explain the Web Services, Web
Forms, and Windows Forms in .Net framework.
2 Write a note on the following :
1. Mutable strings
2. Arrays of strings
3. Regular expressions
3 Explain the following in
context of methods in C# with examples:
1. Invoking methods
2. Nesting of methods
4 Define members. Explain
constant members and read only members.
5 Define and explain the class
visibility and class members’ visibility.
6 Describe the methods used to
handle exceptions. Provide examples.
BT9001, Data
Mining
1 What is Online Analytical
Processing (OLAP)? Explain its benefits.
2 Define noisy data. Briefly
explain the data smoothening techniques.
3 Briefly explain mining
quantitative association rules.
4 Briefly explain Agent Based and
Database Approaches to web mining.
5 Define text mining. State the
text retrieval methods.
6 How data mining is used in
telecommunication field? Explain.
BT9003, Data
Storage management
1 State the reasons for data loss
in some business corporations.
2 How ILM supports implementation
of regulatory concerns? Explain with an example.
3 Describe the two product
classes in storage networking.
4 Briefly explain redundant I/O
path elements.
5 Describe file system hierarchy
and parsing the file system.
6 Explain
RAID 0, RAID1 and RAID 0+1
SMU BSCIT SEM 6 SPRING 2015 ASSIGNMENTS
BT0092, Software Project Management
1 Define software cost estimation
process? Why software cost estimation is required?
2 A project has been defined to
contain the following list of activities along with their required times for
completion:
1. Draw the PERT chart for the
activities.
2. Calculate the earliest expected
completed time
3. Show the critical path.
3 Define risk assessment. Explain
the elements of risk assessment and risk control.
4 What is conflict management?
How do we remove conflicts among team members?
5 What are the qualities for
which an SQE (Software Quality Engineering) evaluation is to be done? Describe
all.
6 Describe briefly the activities
of software reengineering. Draw the necessary diagram.
BT9301- COMPUTER GRAPHICS
1 Draw and explain the diagram of
a Raster scan system with a display processor. Explain each unit of the
diagram.
2 Write and explain midpoint
circle drawing algorithm.
3 What do you mean by polygon
filling? Explain flood fill algorithm for polygon filling.
4 Write Liang Barkey’s line
clipping algorithm. Write advantages of it.
5 What is shear? Explain X shear
and Y shear.
6 Derive the 3-D transformation
matrix to transform world coordinates to viewing coordinates.
BT9402, Artificial Intelligence
1 Explain the first and second
principle of AI.
2 Explain knowledge
representation with an example.
3 Explain the Inheritance and Reification
in semantic networks.
4 Explain the two principal parts
of an expert system.
5 Describe the factors affecting
learning performance of a system.
6 Briefly
explain the hardware requirements for designing a robot
No comments:
Post a Comment
Note: only a member of this blog may post a comment.