BCA 4th SEM Jul-Aug 2025 Solved Assignments 18 Jan 2026 last date

SESSION FEB-MARCH 2025
PROGRAM BACHELOR OF COMPUTER APPLICATIONS (BCA)
SEMESTER IV
COURSE CODE & NAME DCA2201 COMPUTER NETWORKING

Set-I

Q1. What is the purpose of having layered architecture in computer networks? Explain TCP/IP referenced model 5+5      

Ans 1.

Purpose of Layered Architecture in Computer Networks and TCP/IP Reference Model

Purpose of Layered Architecture

Layered architecture in computer networks refers to the structured division of communication processes into distinct functional layers. Each layer is responsible for specific tasks and interacts only with its adjacent layers. This modular approach simplifies the complex process of data communication, ensures standardization, and allows flexibility in protocol design.

The primary purpose of layering is to break down network functions into manageable parts. It provides abstraction,

Its Half solved only

Buy Complete from our online store

https://smuassignment.in/online-store/

MUJ Fully solved assignment available for session Jul-Aug 2025.

Lowest price guarantee with quality.

Charges INR 198 only per assignment. For more information you can get via mail or Whats app also

Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

 

Q2. Explain the various purposes of Transport layer. Also, discuss the main differences between TCP and UDP protocols. 10    

Ans 2.

Purposes of the Transport Layer and Differences Between TCP and UDP

The transport layer is the fourth layer of the OSI model and the second layer of the TCP/IP model. It plays a crucial role in ensuring reliable and efficient communication between devices. Its main purpose is to provide end-to-end communication services, manage data flow, and ensure the complete and accurate delivery of messages from one host to another.

Purposes of the Transport Layer

The transport layer

Q3. Give a contrast between unicast, multicast and broadcast. Also explain the way they implemented.        10           

Ans 3.

Unicast, Multicast, and Broadcast: Concepts and Implementation

Data transmission in computer networks can occur in different modes depending on how data is addressed and delivered to the recipients. The three fundamental types of data transmission are unicast, multicast, and broadcast. Each serves a unique purpose and uses specific addressing and delivery mechanisms within the network.

Unicast Transmission

Unicast refers to one-to-one

Set-II

Q4. Explain various routing methods follow in network layer. Discuss their purpose in different environments.            5+5     

Ans 4.

Various Routing Methods in the Network Layer and Their Purpose in Different Environments

Routing is the process of selecting the most efficient path for data packets to travel from source to destination across interconnected networks. It is performed by the Network Layer (Layer 3) of the OSI model using routing algorithms and protocols. The main purpose of routing is to ensure data delivery through optimal paths while maintaining speed, reliability, and scalability in communication.

Various Routing Methods

  1. Static Routing: In static routing, routes are manually configured by the network administrator. The path to each destination is fixed and does not change automatically, even if network

Q5. Discuss various queue management used in networking.       10       

Ans 5.

Various Queue Management Techniques Used in Networking

Queue management in computer networks deals with how data packets are stored and processed in router buffers before being transmitted. Effective queue management ensures optimal resource utilization, minimizes congestion, and maintains fair access for all users. As network traffic increases, routers must use appropriate queue management algorithms to handle packets efficientl

Q6. Explain the working of DNS step by step.       10

Ans 6.

Working of Domain Name System (DNS)

The Domain Name System (DNS) is a hierarchical and distributed naming system that translates human-readable domain names (like www.example.com) into machine-readable IP addresses (like 192.168.1.1). DNS acts as the “phonebook” of the Internet, enabling users to access websites without memorizing numeric IP addresses.

Step 1: User Request

When a user enters a

SESSION JULY/SEPTEMBER 2025
PROGRAM BACHELOR OF COMPUTER APPLICATIONS (BCA)
SEMESTER 4
COURSE CODE & NAME DCA2202 JAVA PROGRAMMING
   
   

 

 

SET-I

 

Q1. List any ten Java command tools with a short description of each. 10

Ans 1.

Ten Java command-line tools

java (Java Application Launcher)

This runs compiled bytecode on the JVM. You provide the fully qualified main class (or a JAR with Main-Class), optional JVM options like heap size (-Xms, -Xmx), system properties (-Dkey=value), and module/path flags. At runtime it loads classes, initializes the application, and manages the execution environment including JIT compilation and garbage collection interactions.

javac (Java Compiler)

This compiles .java sources into .class files. It supports classpath and module path resolution, annotation processing, preview features, linting (-Xlint), target bytecode levels (–release, -source, -target), and incremental compilation. Modern javac integrates tightly with JDK modules

Its Half solved only

Buy Complete from our online store

https://smuassignment.in/online-store/

MUJ Fully solved assignment available for session Jul-Aug 2025.

Lowest price guarantee with quality.

Charges INR 198 only per assignment. For more information you can get via mail or Whats app also

Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Q2. Write Java program to convert the Rupees to Dollars. 10    

Ans 2.

Java program to convert Rupees to Dollars

Currency conversion requires a numeric base and an exchange rate. Since hard-coding rates becomes outdated, the most robust console program accepts (i) an amount in Indian Rupees (INR) and (ii) the current market rate expressed as INR per USD. The program then divides the rupee amount by the entered rate to compute USD. For reliable I/O, we use java.util.Scanner, validate input, format the output to two decimals, and handle edge cases like zero/negative rates. This structure demonstrates clean separation of concerns: input capture, validation, computation, and presentation.

Q3. What are the different methods under DataInputStream and DataOutputStream? 10    

Ans 3.

Methods under DataInputStream and DataOutputStream

Overview and Rationale

DataInputStream and DataOutputStream wrap low-level streams to read and write Java’s primitive types and UTF strings in a machine-independent binary format. They guarantee consistent sizes and big-endian byte order across platforms, making them ideal for file formats and network protocols where interoperability is crucial. By pairing the two, data written with DataOutputStream can be losslessly recovered by DataInputStream in the exact order, ensuring type safety and predictabilit

SET-II

 

Q4.  What is the difference between manual and automated testing? 10           

Ans 4.

Difference between Manual and Automated Testing

Software testing ensures that an application functions as expected before it is released to end users. Testing can be done manually—by human testers who execute test cases step by step—or automatically—through scripts and tools that perform predefined actions and validations. Both have distinct benefits, limitations, and ideal use cases within the software development lifecycle.

Manual

Q5. Explain the purpose and functionality of the JList component in Java Swing. How does it differ from other list-type components? 5+5     

Ans 5.

Purpose and Functionality of the JList Component in Java Swing

The JList component in Java Swing is used to display a list of items from which the user can select one or more elements. It is a fundamental GUI control in Swing for presenting a series of options in a vertical scrollable list. JList enhances user interaction through flexible rendering, selection models, and event handling.

Purpose and Functionality

JList resides in the javax.swing package and is typically used to display items such as strings, objects, or data retrieved from collections. It can be initialized directly with an array or ListModel.

Q6. Differentiate between ArrayList and LinkedList. Provide suitable examples where each is preferred. 5+5           

Ans 6.

Difference between ArrayList and LinkedList

Both ArrayList and LinkedList are part of Java’s java.util package and implement the List interface. While they share a similar API and purpose—storing ordered elements with dynamic resizing—they differ fundamentally in internal structure, performance, and ideal usage scenarios.

ArrayList – Structure and Usage

ArrayList is backed by a dynamic array that grows automatically when the list exceeds its capacity. It provides fast random access (O(1)) through index-based retrieval, making it suitable for applications that frequently

SESSION SEPTEMBER 2025
PROGRAM BACHELOR OF COMPUTER APPLICATIONS (BCA)
SEMESTER IV
COURSE CODE & NAME DCA2203 SYSTEM SOFTWARE
   
   

 

 

 

SET-I

 

Q1. Define the differences between linker and loader.      10       

Ans 1.

Differences Between Linker and Loader

In system software, both the linker and the loader play crucial roles in the process of program execution. They are responsible for preparing object programs, combining modules, and placing them into memory for execution. Although they work in close coordination, their functions are distinct. Understanding the difference between these two components is essential for grasping how programs transition from compilation to execution.

Concept of Linker

A linker is a

Its Half solved only

Buy Complete from our online store

https://smuassignment.in/online-store/

MUJ Fully solved assignment available for session Jul-Aug 2025.

Lowest price guarantee with quality.

Charges INR 198 only per assignment. For more information you can get via mail or Whats app also

Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Q2. What is the role of the BIU and EU in 8086? How do they interact? 5+5   

Ans 2.

Role of BIU and EU in 8086 and Their Interaction

The Intel 8086 microprocessor, introduced by Intel in 1978, is a 16-bit processor that revolutionized computer architecture. It features a powerful Bus Interface Unit (BIU) and Execution Unit (EU), which work together to enhance processing speed through parallel operation. Understanding their roles and coordination is key to grasping 8086’s internal functioning.

Role of the Bus

 

Q3. Discuss the unique features that make Android superior to other mobile operating systems 10   

Ans 3.

Android, developed by Google, is the world’s most popular mobile operating system. Built on a modified version of the Linux kernel, it provides an open, flexible, and customizable platform for developers and users alike. Its architecture and ecosystem make it superior to other mobile OS platforms such as iOS and Windows Mobile.

  1. Open-Source Platform

One of Android’s biggest

SET-II

 

Q4. Define the difference between the Symbol Table, Pseudo Instruction Table (PIT), and Location Counter (LC) used in an assembler. 10         

Ans 4.

An assembler is a crucial system program that converts assembly language code into machine language. During this translation process, it maintains several internal data structures to organize instructions, symbols, and memory addresses. Among the most significant of these are the Symbol Table, the Pseudo Instruction Table (PIT), and the Location Counter (LC). Each serves a distinct function in ensuring the correctness and efficiency of the assembly process.

Symbol Table

The Symbol Table is a data structure that stores all symbols, labels, and identifiers used in an assembly program

Q5. What is an overlay-structured program and how does it help to reduce memory usage during execution? 5+5     

Ans 5.

An overlay-structured program is a programming technique designed to efficiently utilize limited main memory by dividing a large program into smaller, manageable parts called overlays. These overlays are loaded into memory only when required, thus reducing the overall memory usage during execution. This approach was widely used in older systems with limited physical memory, but its principles remain relevant even in modern computing through virtual memory

Q6. How do UPnP control points interact with devices and services during the discovery phase?           5+5 

Ans 6.

Interaction of UPnP Control Points with Devices and Services During the Discovery Phase

Universal Plug and Play (UPnP) is a networking protocol that allows devices to discover and communicate with each other automatically over a local network. It eliminates the need for manual configuration, enabling seamless interoperability among smart devices. The discovery phase is the initial stage of UPnP communication, during which control points (clients) identify