MCA Solved assignments last date is 31 March 2024

SESSION SEPTEMBER 2022

PROGRAM BACHELOR OF COMPUTER APPLICATION (BCA)

SEMESTER II

COURSE CODE & NAME DCA6201 – OPERATING SYSTEM

Assignment Set – 1

1. What are the types of Operating System? Discuss the application areas of Real-time software.

Ans: Types of Operating System:-

Personal Computer Operating Systems

The main mode of use of a PC (as its name implies) is by a single user. Thus Os for PCs were designed as a single user single task operating system, that is, it is assumed that only one user uses the machine and runs only one program at a time. The operating system of PCs consists of two parts. One part is Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2022, Exam Sep 2022.

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

2. What is Preemptive and Non-preemptive Scheduling? Discuss any three CPU scheduling algorithms.

Ans: Scheduling can either be pre-emptive or non-pre-emptive. If pre-emptive, then an executing process can be stopped and returned to ready state to make the CPU available for another ready process.

But if non-preemptive

3. Discuss the use of semaphores. What are monitors?

Ans: Semaphores are the classic method for restricting access to shared resources (e.g. storage) in a multi-processing environment. They were invented by Dijkstra and first used in T.H.E operating system.

A semaphore is a protected variable (or abstract data type) which can only be accessed using the following

Assignment Set – 2

4. a. What is a Process Control Block? Explain its use.

Ans: Every process has a number and a process control block (PCB) represents a process in an operating system. The PCB serves as a repository of information about a process and varies from process to process. The PCB contains information that makes the process an active entity. A PCB

b. What is Thrashing? What are its causes?

Ans: Thrashing: When a process does not have enough frames or when a process is executing with a minimum set of frames allocated to it which are in active use, there is always a possibility that the process will page fault quickly. The page in active use becomes a victim and hence

5. a. Discuss the different File Access Methods.

Ans: Information is stored in files. Files reside on secondary storage. When this information is to be used, it has to be accessed and brought into primary main memory. Information in files could be accessed in many ways. It is usually dependent on an application. Access methods

b. What are I/O Control Strategies?

Ans: Several I/O strategies are used between the computer system and I/O devices, depending on the relative speeds of the computer system and the I/O devices. The simplest strategy is to use the processor itself as the I/O controller, and to require that the device follow a strict order of events under direct program control, with the processor waiting for the I/O device at

6. Explain the different Multiprocessor Interconnections and types of Multiprocessor Operating Systems.

Ans: The nature of multiprocessor interconnections has an effect on the bandwidth for communication. Complexity, cost, IPC and scalability are some features considered in interconnections. Basic

SESSION SEPTEMBER 2022

PROGRAM MASTER OF COMPUTER APPLICATION (MCA)

SEMESTER II

COURSE CODE & NAME DCA6202 – Advanced Data Structure

Assignment Set – 1

1. a. Explain the advantages of linked list over arrays.

Ans: Let us see how stack is implemented using linked list. As we have seen in previous section the advantages of linked list over array is that, it is not necessary to declare the size of linked list a-head and the size can be changed dynamically. So, at any point we can expand or shrink the stack size.

Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2022, Exam Sep 2022.

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

2. Define and explain the structure of AVL tree.

Ans: AVL tree: An  AVL  tree  is another  balanced binary search tree  named  after their inventors, Adelson-Velskii and Landis. An empty binary tree is an AVL tree. A non empty binary tree T is an AVL tree if given TL and TR to be the left and right subtrees of T and h(TL) and h(TR) to be the heights of subtrees TL and TR respectively. TL and TR are AVL trees and h(TL)-h(TR) ≤ 1. h(TL) – h(TR) is known as the balance factor. AVL tree is referred in the figure.

3. a. Define and explain the concept of binary search tree and discuss the algorithm for insertion in BST.

Ans: Concept of Binary Search Tree T is a binary tree. Then T is called binary search tree if each node of n of T has the following property. The value at n is greater than every value in the left sub tree of n and is less than every value in the right sub tree of n. We can say one of the most important data structure is binary search tree. This enables one to search for and find an element with an average running

Assignment Set – 2

4. a. What is static memory allocation and dynamic memory allocation?

Ans: Static memory allocation: It is a memory allocation strategy in which the operating system allocates a predetermined amount of memory during build time and manages it using a data structure called stack.

For example, th

b. Give algorithm/pseudocode for DFS. Demonstrate DFS using suitable example?

Ans: Depth First Search (DFS) In this tutorial, you will learn about depth first search algorithm with examples and pseudocode. Also, you will learn to implement DFS in C, Java, Python, and C++.  Depth first Search or Depth first traversal is a recursive algorithm for se

5. a. Write an algorithm to implement Bubble sort with suitable example.

Ans: Bubble sort Bubble sort:- Itis a straightforward and simplistic method of sorting data that is used very commonly. The algorithm starts at the beginning of the data set. It compares the first two elements, and if the first is greater than the second, then it swaps them. It continues doing this for

6. Explain how Dijkstra’s algorithm is used to find the shortest path of Directed weighted graph.

Ans: Weighted Shortest Paths – Dijkstra’s Algorithm This algorithm is used to find the shortest path between the two vertices in a weighted directed graph and it is also very popular and efficient to find each and every path from starting (source) to terminal vertices. Let w(vi , vj ) be the weight associated

SESSION SEPTEMBER 2022

PROGRAM MCA

SEMESTER II

COURSE CODE & NAME DCA6203 – WEB TECHNOLOGIES

Assignment Set – 1

1. a. What are different list types? Discuss.

Ans: Lists are the preferred way to display items one after the other, instead of just using <br> tags. Lists are another nice formatting tool for the content of your web pages. The most commonly used list types are:

• unordered Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2022, Exam Sep 2022.

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

b. How can you insert image hyperlink? Write an HTML code that uses image hyperlink to open a page/link in new browser tab?

Ans: The border attribute specifies the width of the border around an image.

<img src=”Manipal_logo.gif” alt=”Distance education” border=”5″/>

How we can

2. a. What do you understand by CSS selectors? Elaborate.

Ans: A CSS selector is the first part of a CSS Rule. It is a pattern of elements and other terms that tell the browser which HTML elements should be selected to have the CSS property values inside

3. a. How can you insert external JavaScript code in your HTML document? Explain with suitable example.

Ans: External JavaScript file

We can create external JavaScript file and embed it in many html page.

It

Assignment Set – 2

4. a. Why is XML namespace used? Explain.

Ans: An XML Namespace is a concept. It is a named collection of names. It is not a DTD reference, nor a pointer to an XML schema. A namespace does not even need to exist as a physical or network resource.

An XML Namespace

5. a. Write steps to create XML Style sheet?

Ans: XML-style sheet (XSLT) is a special declaration in XML for linking XML with

stylesheets. Place this after your

b. Discuss about ADO Connection object. Why is it used?

Ans: ADO (ActiveX data object) record set

To be able to read database data, the data must first be loaded into a recordset. Then Create an ADO Table Recordset.

6. a. What different events are defined in Global.asa file? Explain.

Ans: Events in Global.asa

In Global.asa you can tell the application and session objects what to do when the application/session starts and what to do when the application/session ends. The code for this is placed in event handlers. The

SESSION SEPTEMBER 2022

PROGRAM MASTER OF COMPUTER APPLICATION (MCA)

SEMESTER II

COURSE CODE &amp; NAME DCA6204 – ADVANCED COMPUTER NETWORK

Assignment Set – 1

1. a. Discuss the hardware components required for the computer network.

Ans: Network interface card: Unlike other hardware component it does not connect one system to other or one network to other network; rather it provides the physical connection between computer workstation and the network. It plays a major role to determine the speed and performance of a network. In the previous section we acquainted with one example of NIC card, i.e. EtherneIts Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2022, Exam Sep 2022.

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

2. a. What are the differences between analog and digital networks?

Ans:

FeatureAnalog characteristicsDigital characteristics
Signal  Continuously variable, in both amplitude and frequency  Discrete signal, represented as either changes in voltage or changes in light levels

b. What are the major goals of SONET design?

Ans: SONET were designed to transmit circuit mode communications (e.g., DS1, DS3) from a variety of different sources, but they were principally meant to enable real-time, uncompressed, circuit-switched audio encoded in PCM format. Prior to SONET/SDH, the main challenge was that the synchronization sources of these multiple circuits were all different. This

3. Explain different types of topologies of computer networks. Discuss the advantages and disadvantages also.

Ans: Types of topology Based on the geometric representation of all the links and linking devices there are four basic topologies are possible:

Mesh network topology This network topology is one which a node not only captures and broadcast its own data, but also serves as a relay for other nodes that is, it must collaborate to propagate the data in the network. Each node connected with a dedicated point-to-point link with every other node

Assignment Set – 2

4. a. Define unicast routing protocol. What are the differences between dynamic routes and static routes?

Ans:-

KeyStatic RoutingDynamic Routing
Routing patternIn static routing, user-defined routes are used in the routing table.In dynamic routing, routes are updated as per the changes in network.

5. a. Discuss the requirements of web security.

Ans: The following are some of the web security requirements:

 Use a capable SSL Web server: The web server should comply with the appropriate requirements.

 Use a dual- home for the SSL Web server: The sever host must have two separate network interfaces; connect the Internet to one and the internal enterprise network to the other. Configure

6. Discuss symmetric key and asymmetric key cryptography in detail.

Ans: Symmetric Key Cryptography

Symmetric Key Cryptography, or Symmetric Encryption, uses a secret key for both encryption and decryption. This approach is the inverse of Asymmetric Encryption, which uses one key to encrypt and another to decrypt. Data is translated to a format that cannot be interpreted or inspected by someone who does not have the secret key used to encrypt it during this phase.

The strength of

SESSION SEPTEMBER 2022

PROGRAM MASTER OF COMPUTER APPLICATIONS (MCA)

SEMESTER II

COURSE CODE &amp; NAME DCA6205 – COMMUNICATION SKILLS

Assignment Set – 1

1. Define Communication. Mention any four barriers to communication and substantiate your answer with one example for each.   

Ans: Bradley calls Communication “It is a process, a series of progressive and interdependent steps leading to the attainment of an end, in speech the end being the communication of some specific meaning from one person to another.

Barriers to Effective Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2022, Exam Sep 2022.

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

2. Differentiate between listening and hearing. List the different types of listening.

Ans:

HEARINGLISTENING
Hearing is the act of perceiving sound and receiving sound waves or vibrations through your ear.Listening is the act of hearing a sound and understanding what you hear.

3. What is a paragraph? Discuss the steps one should follow while writing a paragraph.

Ans: The smallest unit of prose composition is the paragraph. A paragraph may be defined as a group of sentences relating to a single topic, or developing a single central idea. Just as a sentence contains one main thought, in the same way a paragraph contains one main topic or theme. All the sentences should be so grouped that they must serve to develop the main theme. Letters, essays, stories, etc., are divided into paragraphs with each paragraph developing a

Assignment Set – 2

4. Comment on Reading as a skill. Explain the various types of readings. 

Ans: Reading, for most of us, is a ‘passive process’, where we sit down, relax and run our eyes through the words on the page. This is the method we incorporate to understand the information that is given in the book. But today, reading is considered an active process.

The above definitions suggest that when you read any piece of text, you understand the given text at

5. What is a job application? What are the points that one needs to keep in mind while writing a job application?

Ans: A job application is nothing but a medium to sell your services. So it should show all qualities that are required by the buying agent i.e. the employer.

Normally a job application contains two parts: a covering letter and a Resume. It is also known as Bio-

6. Define a memo. Discuss the points one needs to consider in terms of the language of a memo.

Ans: The term ‘memo’ comes from the Latin word ‘memorandum,’ which means “a thing which must be remembered.” The plural form is memoranda. The document that you use to communicate within the organization is called as memorandum. It has to stay within the organization. So, it is also called ‘inter office memorandum.’ When you need to convey information and decisions or to make short requests with the members of your department, upper