Internal Assignment
Set- 1st
1. What is number system? Explain how to convert decimal number to binary number with example?
Ans. A number is a mathematical value used for counting and measuring objects, and for performing arithmetic calculations. Numbers have various categories like natural numbers, whole numbers, rational and irrational numbers, and so on. Similarly, there are various types of number systems that Its Half solved only
Buy Complete from our online store
MUJ Fully solved assignment available for session Jul/Aug 2021,
Lowest price guarantee with quality.
Charges INR 200 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
2. Define Boolean Algebra. Simplify the following expression using Boolean algebra?
a. A+AB
b. AB +AB’
c. A’BC+AC
d. A’B+ABC’+ABC
Ans. A system of algebra in which there are only two possible values for a variable (often expressed as true and false or as 1 and 0) and in which the basic operations are the logical operations AND
3. Define K-map? Simplify f (a, b, c, d) =∑m(0, 2, 4, 6, 7, 8, 9, 11, 12, 14).
Ans. A Karnaugh map (K-map) is a pictorial method used to minimize Boolean expressions without having to use Boolean
Set- 2nd
4. Define Sequential Circuits. Draw and explain the working of JK, S-R, D Flip-Flops?
Ans. The sequential circuit is a special type of circuit that has a series of inputs and outputs. The outputs of the sequential circuits depend on both the combination of present inputs and previous outputs. The previous
5. What is a Digital counter? Explain types of counters in digital circuit?
Ans. A Digital Counter is obtained by arranging the flip-flops. These are the applications of flip-flops. Other than counting,
6. Explain the design of an electronic tennis scoring system?
Ans. The present tennis scoring system includes input devices for each player to indicate whether one player or the other has won a particular point. These input devices for each player may be in the form of transmitters each having two recessed pushbutton switches, one to indicate that one player has won the point and the other to indicate that the opposing player has won the particular point.
The input device may
Internal Assignment
Set- Ist
1 (a). What is identifier and how they are created in C++ and specify their naming Conventions.
Ans. Identifiers are used to define a name. They are mostly used to name variables (ex: array, structure), functions, class etc. Every language uses its own rules for naming the identifiers. In C++, identifiers can be named according to the following rules:
- Only alphabets, digits, characters and underscores are permitted.
- A name cannot start with a digit.
- An
1(b). Describe the object-oriented programming features of C++?
Its Half solved only
Buy Complete from our online store
MUJ Fully solved assignment available for session Jul/Aug 2021,
Lowest price guarantee with quality.
Charges INR 200 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
Ans. C++ is a general-purpose Object Oriented Programming (OOP) language. C++ includes features of object-oriented programming as well as conventional procedural programming. The major aim of developing object oriented programming language is to remove some of the flaws
encountered in programming a language of procedural approach. Object- Oriented Programming enables one to put data and functions in one container. This container is referred to as an object. An object
2. What is Operator overloading? Write a C++ program illustrating overloading ++ operator?
Ans. Operator overloading is a manner in which OO systems allow the same operator name or symbol to be used for multiple operations. That is, it allows the operator symbol or name to be bound to more than one implementation of the operator. A simple example of this is the “+” sign.
In an
3(A) Illustrate types of Inheritance?
Ans: Five types of inheritance:
- Single Inheritance
- Multiple Inheritance
- Multilevel Inheritance
- Hierarchical Inheritance
- Hybrid Inheritance
1) Single Inheritance:
- In single inheritance, a class derives from one base class only. This means that there is only one
3(B). What is a constructor? Write the syntax of declaring the constructor?
Ans. A constructor initializes an object when it is created. It has the same name as its class and is syntactically similar to a method. However, constructors have no explicit return type.
Typically, you will use a constructor to give initial values to the instance variables defined by the class, or to perform
Set- 2nd
4(A). Explain the exception handling mechanism in C++?
Ans. An exception is a problem that arises during the execution of a program. A C++ exception is a response to an exceptional circumstance that arises while a program is running, such as an attempt to divide by zero.
Exceptions provide a
5. What is Template? What is the need of Template? Declare a Template class?
Ans. A template is a form, mold, or pattern used as a guide to making something. Here are some examples: A ruler is a template when used to draw a straight line. A document in which the standard opening and closing parts are already filled in is a template that you can copy and then fill in the variable
6(A). What is a file mode? Describe the various file mode options available?
Ans. File Modes. A file can be opened in one of four modes. The mode determines where the file is positioned when opened, and what functions are allowed. After you close a file, you can reopen the file in a different mode, depending on what you are doing. For example, you can create a file in create mode.
Internal Assignment
Set- 1st
1(a). What is a linked list? Discuss the algorithms for insertion and deletion of values in the end of a linked list?
Ans. A linked list is asequence of data structures, which are connected together via links. Linked List is a sequence of links which contains items. Each link contains a connection to another link. Linked list is the second most-used data structure after array.
Inserting Elements to a Linked List:
Insert a Node at the end of a Linked list
Take a look at the linked Its Half solved only
Buy Complete from our online store
MUJ Fully solved assignment available for session Jul/Aug 2021,
Lowest price guarantee with quality.
Charges INR 200 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
1(b). Define stacks and what are the applications of Stack?
Ans. A Stack is a widely used linear data structure in modern computers in which insertions and deletions of an element can occur only at one end, i.e., top of the Stack. It is used in all those applications in which data must be stored and retrieved in the last.
An everyday analogy of a stack data structure is a stack of books on a desk, Stack of plates, table tennis, Stack of bootless,
2(a). What are Binary trees? How many types of Binary trees are there, discuss?
Ans. A binary tree is an important type of tree structure which occurs very often. It is characterized by the fact that any node can have at most two branches, i.e., there is no node with degree greater than two. For binary trees we distinguish between the subtree on the left and on the right,
2(b). What is a List Structure? Explain Adjacency list and Incidence list?
Ans. A list structure consists of a set of lists and an optional lock table of exclusive locks, which you can use to serialize the use of lists, list entries, or other resources in the list structure. Each list is pointed to by a header and can contain a number of list entries. A list entry consists of list entry controls and
3. Discuss the types of directed graphs and matrix representation of Digraph?
Ans. The different types of directed graphs are discussed below:
Definition: A directed graph (or) a digraph D consists of a non-empty set V (the elements of V are normally denoted by v1, v2, …) and a set E (the elements of E are normally denoted by e1, e2, ….) and a mapping that maps every element of E onto an ordered pair (vi, vj) of elements from V.
Set – II
4. a. Explain the algorithms of Bubble sort and Merge sort?
Ans. Bubble Sort: I would
4(b). What are the characteristics Building Blocks of an Algorithm?
Ans. The process of executing the individual statements in a given order is called control flow.
The control can be executed in three ways
1. sequence
2. selection
5(a). How is the Efficiency of an Algorithm measured?
Ans. Efficiency of an Algorithm measured:-
- Back to the Basics: Put simply, algorithms are a way of solving a class of problems. They are a ‘finite sequence’ made to work with any programming language. Think of these as instructions, just like a recipe! It includes step-by-step directions that can be applied to return the desired
6. Discuss about All Pair Shortest Paths and Travelling Salesman Problem?
Ans. All Pair Shortest Paths: Let G = (V, E) be a directed graph with n vertices and let cost be a cost adjacency matrix for G such that cost (i, i) = 0, 1 £ i £ n. Then cost (i,j) is the length (or cost) of edge <i,j> if <i,j> E(G) and cost (i,j) = ¥ if i ¹ j and < i, j > Ï E(G). The all pairs shortest path problem is to determine a matrix A such that A (i,j) is the length of a shortest path from i to j.
Let us examine a shortest i to j path in Gi ¹ j. This path originates at vertex I and goes through some intermediate vertices (possibly none) and terminates at vertex j. We can assume that this path contains no cycles for if there is a cycle, and then this can be deleted without increasing the path length. If
SESSION | JUL/AUG 2021 |
PROGRAM | BCA |
SEMESTER | II |
COURSE CODE & NAME | DCA1204 – COMMUNICATION SKILLS |
SET – I
Q1. Discuss any four barriers to communication and substantiate your answer with one example for each. (2.5×4)
Ans:
Barriers to Effective Communication: At each stage in the process of communication – encoding, transferring, and decoding, there is the possibility of interference. This may hinder the communication process. Such interference is known as ‘noise.’ Often, a comparison is made between communication and a leaky bucket. If you carry water in a leaky bucket, you will lose water at various points in your journey from the water tap to your destination
Its Half solved only
Buy Complete from our online store
MUJ Fully solved assignment available for session Jul/Aug 2021,
Lowest price guarantee with quality.
Charges INR 200 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
Q2. Elaborate upon the significance and purpose of reading for a graduate of Computer Applications. 5+5 10
Ans:
Significance of reading for a graduate of Computer Applications:
- Self-esteem is the ability to believe in yourself: This may be the most crucial aspect of all. Students gain ground in the categories listed below the sooner they establish reading abilities. This gives individuals more confidence in how they talk and write, as well as the certainty of a larger knowledge foundation.
Q3. What are the qualities of a business letter? Discuss its various types. 4+6 10
Ans:
The following are some qualities of a good business letters:
Simple and unambiguous language must be utilised during the communication process. The meaning of a term is unclear when it is unfamiliar.
- Integrity and sincerity: – To generate a sense of sincerity in the recipient, messages and information must be interwoven.
- Time: – The
SET 2
4. a. What are the characteristics of personality?
Answer:
Personality Characteristics in Organizations
Managers should learn as much as possible about personality in order to understand their employees. Hundreds of personality characteristics have been identified. We have selected eight characteristics because of their particular influences on individual behaviour in organizations.
They are:
b. What determines the development of personality?
Answer:
That Determine our Attitude
Are we born with attitudes or do we develop them as we mature? What are the factors that form our attitudes?
If you have a negative outlook on life because of your environment, can you change your attitude? Most of our attitude is shaped during our formative years.
There
5. a. What are the general principles of time management?
Answer:
As a student, there are some basic Principles of Time Management that you can apply.
- Identify “Best Time” for Studying: Everyone has high and low periods of attention and concentration. Are
6. Discuss the role and functions of an effective leader?
Answer:
Role & Functions of a Good Leader
The overall aim of a leader is to achieve the task with the help of his group. To meet the overall aim, the leader has three main objectives :
INTERNAL ASSIGNMENTS
SESSION | JUL/AUG 2021 |
PROGRAM | BCA |
SEMESTER | II |
COURSE CODE & NAME | BCA1201 – OPERATING SYSTEM |
CREDITS | 4 |
NUMBER OF ASSIGNMENTS & MARKS | 02 30 Marks each |
Set- I
Q1 a. Discuss the three Operating System Structures.
b. What is Deadlock avoidance? Discuss Banker’s algorithm for the same. 5+5
Ans 1(a).
Three Operating System Structures:
Layered approach: Dijkstra suggested the layered approach to lessen the design and implementation complexities of an operating system. The layered approach divides the operating system into several layers. The functions of operating system are divided among these layers. Each layer has well-defined functionality and input-output interfaces with the two adjacent layers. Its Half solved only
Buy Complete from our online store
MUJ Fully solved assignment available for session Jul/Aug 2021,
Lowest price guarantee with quality.
Charges INR 200 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Contact no is +91 87-55555-879
Q2 a. What do you understand by Virtual Environment & Machine Aggregation?
b. What is a Process Control Block? What information is stored in it? 5+5 10
Ans (a).
Virtual Environment & Machine Aggregation: A virtual environment (otherwise referred to as Virtual private server) is another kind of a virtual machine. In fact, it is a virtualized environment for running user-level programs (i.e. not the operating system kernel and drivers, but applications). Virtual environments are created using the software implementing operating system-level
Q3. Discuss the CPU scheduling algorithms 10
Ans (3).
CPU- I/O Burst Cycle: Process execution consists of alternate CPU (Central Processing Unit) execution and I/O (Input / Output) wait. A cycle of these two events repeats till the process completes execution (Figure). Process execution begins with a CPU burst followed by an I/O burst and then
Set – II
Q4 a. What is Page replacement? Discuss it’s FIFO algorithm with an example.
b. What is Thrashing? What are its causes? 5+5 10
Ans (a):
Page Replacement: Initially, execution of a process starts with none of its pages in memory. Each of its pages will have page fault at least once when it is first referenced. But it may so happen that some of its pages are never used. In such a case those pages which are not referenced even once will never be brought into memory. This saves load time and memory space. If this is so, the degree of multi-programming can be increased so that more ready processes can be loaded and executed. Now, we may come across a situation wherein all of sudden, a process
Q5 a. Discuss the different File Access Methods.
b. What are I/O Control Strategies? 5+5 10
Ans (a).
File Access Methods: Information is stored in files. Files reside on secondary storage. When this information is to be used, it has to be accessed and brought into primary main memory. Information in files could be accessed in many ways. It is usually dependent on an application. Access methods could be:-
- Sequential access
Q6. Discuss about Distributed processing and parallel processing. State the similarities and differences amongst them. 10
Ans (6).
Parallel and Distributed Processing: Operating systems have moved from single process systems to single processor, multi-user, and multitasking systems. Today the trend is towards multiprocessor, multitasking systems. Distributed processing and parallel processing are two technologies used to harness the power of a multiprocessor system. A proper mix of the technologies may yield better results.
Distributed processing and