NEW B.Sc IT SMU SPRING 2019 SOLVED HELP IN ASSIGNMENTS

SMU B.Sc IT Spring 2019 sikkim assignment solved sample only

B.Sc IT 1st semester spring 2019
B.Sc IT 2nd semester spring 2019
B.Sc IT 3rd semester spring 2019
B.Sc IT 4th semester spring 2019
B.Sc IT 5th semester spring 2019
B.Sc IT 6th semester spring 2019

 


 

Its half solved only

New smu SPRING 2019 solved assignments available with us 

LAST DATE IS  08-07-2019

charges Rs 99 per assignment (new price)

If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com

Wesite– www.smuassignment.in

or contact any time 8791490301, 08273413412 (both whatsapp no)

PROGRAM

Bachelor of Science in Information Technology - B.SC(IT)

SEMESTER

III

SUBJECT CODE & NAME

BIT301 – Operating System

SET 1

Qus:1 Summarize about Interprocess Communication.

Answer:

Interprocess Communication

Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system. This allows a program to handle many user requests at the same time. Communication of co-operating processes shared-memory environment requires that these processes share a common buffer pool, and that the code for implementing the buffer be explicitly written by the application programmer. Another way to achieve the same effect is for the operating system to provide the means for co-operating processes to communicate with

 

Qus:2 Write a note on External Fragmentation

Answer:

External fragmentation

Segments of user programs are allocated memory by the bob scheduler.

This is similar to paging where segments could be treated as variable sized pages. So a first-fit or best-fit allocation scheme could be used since this is a dynamic storage allocation problem. But, as with variable sized partition scheme, segmentation too causes external fragmentation. When any free memory segment is too small to be allocated to a segment to be loaded, then external fragmentation is said to have occurred. Memory compaction is a solution to overcome

 

Qus:3 Discuss the different methods of implementing a Directory.

Answer:

The two main methods of implementing a directory are:

Linear list

Hash table

Linear list

A linear list of file names with pointers to the data blocks is one way to implement a directory. A linear search is necessary to find a particular file. The method is simple but the search is time consuming. To create a file, a linear search is made to look for the existence of a file with the same file name and if no such file is found the new file created is added to the directory at the end. To delete a file, a linear search for the file name is made and if found allocated space is released. Every time making a linear search consumes time and increases access

 

SET 2

 

Qus:1 Write a short note on Multi-programmed Batched Operating Systems.

Answer: The concept of spooling introduced an important data structure called the job pool. Spooling creates several jobs on the disk ready for execution or processing. The operating system now has to choose from the job pool, a job that is to be executed next. This increases CPU utilization as CPU is continuously utilized for execution of multiple programs one after another.Jobs in the job pool may be scheduled for execution in any order (not necessarily in

 

Qus:2 What are the different information stored in a process control block (PCB)?

Answer: In order to manage and coordinate the various processes, the operating system identify these processes in terms of numbers and Process Control Block (PCB). A Process Control Block is a data structure maintained by the Operating System for every process. A PCB keeps all the information needed to keep track of a process. The PCB serves as a repository

 

Qus:3 Discuss in details about deadlock prevention.

Answer: The four necessary conditions for deadlocks to occur are mutual exclusion, hold and wait, no preemption and circular wait. If any one of the above four conditions does not hold, then deadlocks will not occur. Thus prevention of deadlock is possible by ensuring that at least one of the four conditions cannot hold.

 Mutual exclusion: Resources that can be shared are never involved in a deadlock because such resources can always be Its half solved only

New smu SPRING 2019 solved assignments available with us 

LAST DATE IS  08-07-2019

charges Rs 99 per assignment (new price)

If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com

Wesite– www.smuassignment.in

or contact any time 8791490301, 08273413412 (both whatsapp no)

 

PROGRAM

Bachelor of Science in Information Technology - B.SC(IT)

SEMESTER

III

SUBJECT CODE & NAME

BIT302 – Computer Networks

 

Qus:1 Discuss about Packet Scheduling.

Answer:

Packet Scheduling

Algorithms that allocate router resources among the packets of a flow and between competing flows are called packet scheduling algorithms. Three different kinds of resources can potentially be reserved for different flows. They are bandwidth, bufferspace and CPU cycles. Packet scheduling algorithms allocate bandwidth and other router resources by determining which of the buffered packets to send on the output line next. Each router buffers packets in a queue for each output line until they can be sent, and they are sent in the same order that they arrived. This algorithm is known as FIFO (First-In First-Out), or equivalently FCFS (First-Come Its half solved only

New smu SPRING 2019 solved assignments available with us 

LAST DATE IS  08-07-2019

charges Rs 99 per assignment (new price)

If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com

Wesite– www.smuassignment.in

or contact any time 8791490301, 08273413412 (both whatsapp no)

Qus:2 Discuss working mechanism of SMTP.

Answer:

Simple Mail Transfer Protocol (SMTP)

The basic Internet mail protocols provide mail and message exchange between TCP/IP hosts, but generally require that data be represented as 7-bit ASCII text. Because this can be restrictive, facilities have been added for the transmission of data that cannot be represented in this manner.

Simple Mail Transfer Protocol (SMTP) is a standard for the exchange of mail between two computers, which specified the protocol used to send mail between TCP/IP hosts.

 

Working

 

Qus:3 Discuss briefly the Domain Name System.

Answer:

The Domain Name System

We can refer web pages, mailboxes and other resources by using network address (IP address) of the computers on which they are stored. But these addresses are hard for people to remember and reproduce. Consequently, high-level, readable names were introduced in order to decouple machine names from machine addresses.

 

The initial solution for name resolution on the Internet was a file named Hosts.txt that was used on the now obsolete Advanced Research Projects Agency network (ARPANET), the predecessor of the modern day Internet.

When the

 

Set 2

Qus:1 Discuss in details about OSI Reference Model.

Answer: The OSI Model is based on the protocol developed by ISO (International Standards Organization) as the first step towards international standardization of the protocols used in the various layers. This model deals with connecting open systems, so it is called ISO OSI (Open Systems Interconnection). OSI model has seven layers, each layer is created when where a different abstraction is needed, and each layer has well-defined function. The OSI model is shown in

 

Qus:2 Discuss in details about Clock-based Framing (SONET).

Answer: Clock- based framing is another approach to framing, and is represented by the Synchronous Optical Network (SONET) standard. SONET was first proposed by Bell Communications Research (Bellcore), and then developed under the American National Standards Institute (ANSI) for digital transmission over optical fiber; it has since been adopted by the ITU-T.

SONET has been

 

Qus:3 Discuss in details about Internet protocol version 4 (IPV4).

Answer: IPV4 is a connectionless protocol and is unreliable. It is primarily responsible for addressing and routing packets between hosts. A higher layer protocol such as TCP or an application protocol must acknowledge delivered packets and recover lost packets if required. IPV4 is defined in RFC 791. Figure shows the datagram format of IPV4. It consist of IPV4 header and Payload. Header consists of Source address, destination address, identification number, checksum

 

Its half solved only

New smu SPRING 2019 solved assignments available with us 

LAST DATE IS  08-07-2019

charges Rs 99 per assignment (new price)

If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com

Wesite– www.smuassignment.in

or contact any time 8791490301, 08273413412 (both whatsapp no)

 

 

PROGRAM

Bachelor of Science in Information Technology - B.SC(IT)

SEMESTER

III

SUBJECT CODE & NAME

BIT304 – Data Base Management System

SET 1

Qus: 1 What is the basic purpose of 4NF?

Answer:

Fourth and Fifth Normal Form

When attributes in a relation have multi-valued dependency, further Normalisation to 4NF and 5NF are required. We will illustrate this with an example. Consider a vendor supplying many items to many projects in an organisation. The following are the assumptions:

1. A vendor is capable of supplying many items.

2. A project uses many items.

3. A vendor

 

Its half solved only

New smu SPRING 2019 solved assignments available with us 

LAST DATE IS  08-07-2019

charges Rs 99 per assignment (new price)

If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com

Wesite– www.smuassignment.in

or contact any time 8791490301, 08273413412 (both whatsapp no)

 

 

Qus:2 What is Heuristic Optimization?

Answer:

Heuristics in Query Optimization

Heuristic rule is applied for Query Optimization by modifying the internal representation of query. This form of query is generally in the form of query tree or a query graph data structure. Although some optimization technique were based on query graph, nowadays, this technique is not applied because query graph cannot show the order of operation which is needed by query optimizer for query execution. So this unit will deal mainly with the Heuristic

 

 

Qus:3 What are the advantages of a distributed database management system over a centralized DBMS?

Answer:

Trade offs in Distributing the Database

There are several reasons for building distributed database systems, including sharing of data, reliability and availability, and speedup of query processing. However, along with these advantages come several disadvantages, including software development cost, greater potential for bugs, and increased processing overhead. In this section, we shall elaborate briefly on each of

 

SET 2

Qus:1 Outline the different function of database management system.

Answer: There are several functions that a DBMS performs to ensure data integrity and consistency of data in the database. The ten functions in the DBMS are: data dictionary management, data storage management, data transformation and presentation, security management, multiuser access control, backup and recovery management, data integrity management, database access languages and application programming interfaces, database

 

Qus:2 Discuss briefly relative data model.

Answer: The relational model today, is the primary data model for commercial data processing applications. It has attained its primary position because of its simplicity, which eases the job of the programmer, as compared to earlier data models such as the network model or the hierarchical model.

A database based on the relational model developed by E.F. Codd allows the definition of data structures, storage and retrieval operations and integrity constraints. In such a database the data and

 

 

Qus:3 What are subqueries? Explain with example.

Answer: The expression following WHERE can be either a simple predicate as explained above or it can be a query itself! This part of the query following WHERE is called a Subquery.

A subquery, which in turn is a query, can have its own subquery and the process of specifying subqueries can continue ad infinitum! More practically, the process ends once the query has been fully Its half solved only

New smu SPRING 2019 solved assignments available with us 

LAST DATE IS  08-07-2019

charges Rs 99 per assignment (new price)

If you need assignments please mail or whatsapp your questions at computeroperator4@gmail.com

Wesite– www.smuassignment.in

or contact any time 8791490301, 08273413412 (both whatsapp no)

 

 

ASSIGNMENT
DRIVE SPRING 2019
PROGRAM Bachelor of Science in Information Technology - B.SC(IT)
SEMESTER III
SUBJECT CODE & NAME BIT303 – OBJECT ORIENTED PROGRAMMING – JAVA
BK ID B2119
NUMBER OF ASSIGNMENTS, CREDITS &
MARKS
2, 4 Credits, 30 marks each
Note –The Assignment is divided into 2 sets. You have to answer all questions in both sets and submit as
one document. Average of both assignments marks scored by you will be considered as your IA marks.
Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is
followed by evaluation scheme.
Q.No Assignment Set -1
Questions Marks Total
Marks
1 List any ten Java command tools with a short description of
each.
1*10
10
2 What are the different types of operators used in Java? 10 10
3 Differentiate between packages and Interfaces. 10 10
Q.No Assignment Set -2
Questions Marks Total
Marks
1 List and explain the different components of an event? 10
10
2 What is JDBC? List down the steps to load ODBC driver? 10 10
3 Write short notes on: a) CORBA b) BeanBox 5+5 10

 

ASSIGNMENT
DRIVE SPRING 2019
PROGRAM BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER VI
SUBJECT CODE & NAME BIT6022 – MANAGING BIG DATA
BK ID B2141
NUMBER OF
ASSIGNMENTS, CREDITS
& MARKS
2, 4 CREDITS, 30 MARKS EACH
Note –The Assignment is divided into 2 sets. You have to answer all questions in both sets and
submit as one document. Average of both assignments marks scored by you will be considered
as your IA marks. Kindly note that answers for 10 marks questions should be approximately of
400 words. Each question is followed by evaluation scheme.
Q.No Assignment Set - 1
Questions
Marks Total
Marks
1 Summarize the use of Big Data in Social Networking. 10 10
2 List and elaborate about the different features of Hadoop. 10 10
3 Write a brief note on The MapReduce Framework. 10 10
Q.No Assignment Set - 2
Questions
Marks Total
Marks
1 Identify the role of Hbase in Big Data Processing. 10 10
2 Outline the steps for installing Hive with embedded metastore. 10 10
3 Distinguish between Reporting and Analysis. 10 10

 

ASSIGNMENT
Drive Spring 2019
PROGRAM Master of Computer Application
SEMESTER VI
SUBJECT CODE & NAME BIT601– Web Programming - II
BK ID B1960
Number of Assignmnets, CREDITS &
Marks
2, 4 Credits, 30 marks each
Note –The Assignment is divided into 2 sets. You have to answer all questions in both sets. Average of
both assignments score scored by you will be considered as your IA score. Kindly note that answers for 10
marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Assignment Set -1
Questions Marks Total
Marks
1 Identify the differences between SGML, XML, and HTML. 10 10
2 What is selectors? List few types of selectors and discuss them
shortly.
2.5+7.5 10
3 Discuss following XML publishing Methods
a) Use SQL/XML
b) Use DB2 XML Extender
5+5 10
Q.No Assignment Set -2
Questions Marks Total
Marks
1 List four types of J2ME profile and explain them shortly.
2.5*4
10
2 Discuss various audio preload attributes ofHTML5.
10 10
3 List down the steps to develop a mobile application and discuss
them briefly.
10 10

 

 

DRIVE SPRING 2019
PROGRAM BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY - B.SC(IT)
SEMESTER IV
SUBJECT CODE & NAME BIT401– HUMAN COMPUTER INTERFACE
BK ID B2124
NUMBER OF
ASSIGNMENTS, CREDITS
& MARKS
2, 4 CREDITS, 30 MARKS EACH
Note –The Assignment is divided into 2 sets. You have to answer all questions in both sets and
submit as one document. Average of both assignments marks scored by you will be considered
as your IA marks. Kindly note that answers for 10 marks questions should be approximately of
400 words. Each question is followed by evaluation scheme.
Q.No Assignment Set - 1
Questions
Marks Total
Marks
1 What is the importance of good user interface design? 10 10
2 Summarize the characteristics of Windows. 10 10
3 Discuss about Handwriting Recognition in brief. 10 10
Q.No Assignment Set - 2
Questions
Marks Total
Mark
s
1 State some of the models that may be considered for user interface
modeling are.
10 10
2 Discuss the advantages and disadvantages of trackball. 10 10
3 Discuss the direct and indirect methods of requirement analysis. 10 10

 

smu bsc it fall 2018 all semester sample jan/feb 2019 exam

click here

download sample for bsc it and other course