| SESSION | FEB-MARCH 2025 |
| PROGRAM | BACHELOR OF COMPUTER APPLICATIONS (BCA) |
| SEMESTER | IV |
| COURSE CODE & NAME | DCA2201 COMPUTER NETWORKING |
Set-I
Q1. What is the purpose of having layered architecture in computer networks? Explain TCP/IP referenced model 5+5
Ans 1.
Purpose of Layered Architecture in Computer Networks and TCP/IP Reference Model
Purpose of Layered Architecture
Layered architecture in computer networks refers to the structured division of communication processes into distinct functional layers. Each layer is responsible for specific tasks and interacts only with its adjacent layers. This modular approach simplifies the complex process of data communication, ensures standardization, and allows flexibility in protocol design.
The primary purpose of layering is to break down network functions into manageable parts. It provides abstraction,
Its Half solved only
Buy Complete from our online store
https://smuassignment.in/online-store/
MUJ Fully solved assignment available for session Jul-Aug 2025.
Lowest price guarantee with quality.
Charges INR 198 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Q2. Explain the various purposes of Transport layer. Also, discuss the main differences between TCP and UDP protocols. 10
Ans 2.
Purposes of the Transport Layer and Differences Between TCP and UDP
The transport layer is the fourth layer of the OSI model and the second layer of the TCP/IP model. It plays a crucial role in ensuring reliable and efficient communication between devices. Its main purpose is to provide end-to-end communication services, manage data flow, and ensure the complete and accurate delivery of messages from one host to another.
Purposes of the Transport Layer
The transport layer
Q3. Give a contrast between unicast, multicast and broadcast. Also explain the way they implemented. 10
Ans 3.
Unicast, Multicast, and Broadcast: Concepts and Implementation
Data transmission in computer networks can occur in different modes depending on how data is addressed and delivered to the recipients. The three fundamental types of data transmission are unicast, multicast, and broadcast. Each serves a unique purpose and uses specific addressing and delivery mechanisms within the network.
Unicast Transmission
Unicast refers to one-to-one
Set-II
Q4. Explain various routing methods follow in network layer. Discuss their purpose in different environments. 5+5
Ans 4.
Various Routing Methods in the Network Layer and Their Purpose in Different Environments
Routing is the process of selecting the most efficient path for data packets to travel from source to destination across interconnected networks. It is performed by the Network Layer (Layer 3) of the OSI model using routing algorithms and protocols. The main purpose of routing is to ensure data delivery through optimal paths while maintaining speed, reliability, and scalability in communication.
Various Routing Methods
- Static Routing: In static routing, routes are manually configured by the network administrator. The path to each destination is fixed and does not change automatically, even if network
Q5. Discuss various queue management used in networking. 10
Ans 5.
Various Queue Management Techniques Used in Networking
Queue management in computer networks deals with how data packets are stored and processed in router buffers before being transmitted. Effective queue management ensures optimal resource utilization, minimizes congestion, and maintains fair access for all users. As network traffic increases, routers must use appropriate queue management algorithms to handle packets efficientl
Q6. Explain the working of DNS step by step. 10
Ans 6.
Working of Domain Name System (DNS)
The Domain Name System (DNS) is a hierarchical and distributed naming system that translates human-readable domain names (like www.example.com) into machine-readable IP addresses (like 192.168.1.1). DNS acts as the “phonebook” of the Internet, enabling users to access websites without memorizing numeric IP addresses.
Step 1: User Request
When a user enters a
| SESSION | JULY/SEPTEMBER 2025 |
| PROGRAM | BACHELOR OF COMPUTER APPLICATIONS (BCA) |
| SEMESTER | 4 |
| COURSE CODE & NAME | DCA2202 JAVA PROGRAMMING |
SET-I
Q1. List any ten Java command tools with a short description of each. 10
Ans 1.
Ten Java command-line tools
java (Java Application Launcher)
This runs compiled bytecode on the JVM. You provide the fully qualified main class (or a JAR with Main-Class), optional JVM options like heap size (-Xms, -Xmx), system properties (-Dkey=value), and module/path flags. At runtime it loads classes, initializes the application, and manages the execution environment including JIT compilation and garbage collection interactions.
javac (Java Compiler)
This compiles .java sources into .class files. It supports classpath and module path resolution, annotation processing, preview features, linting (-Xlint), target bytecode levels (–release, -source, -target), and incremental compilation. Modern javac integrates tightly with JDK modules
Its Half solved only
Buy Complete from our online store
https://smuassignment.in/online-store/
MUJ Fully solved assignment available for session Jul-Aug 2025.
Lowest price guarantee with quality.
Charges INR 198 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Q2. Write Java program to convert the Rupees to Dollars. 10
Ans 2.
Java program to convert Rupees to Dollars
Currency conversion requires a numeric base and an exchange rate. Since hard-coding rates becomes outdated, the most robust console program accepts (i) an amount in Indian Rupees (INR) and (ii) the current market rate expressed as INR per USD. The program then divides the rupee amount by the entered rate to compute USD. For reliable I/O, we use java.util.Scanner, validate input, format the output to two decimals, and handle edge cases like zero/negative rates. This structure demonstrates clean separation of concerns: input capture, validation, computation, and presentation.
Q3. What are the different methods under DataInputStream and DataOutputStream? 10
Ans 3.
Methods under DataInputStream and DataOutputStream
Overview and Rationale
DataInputStream and DataOutputStream wrap low-level streams to read and write Java’s primitive types and UTF strings in a machine-independent binary format. They guarantee consistent sizes and big-endian byte order across platforms, making them ideal for file formats and network protocols where interoperability is crucial. By pairing the two, data written with DataOutputStream can be losslessly recovered by DataInputStream in the exact order, ensuring type safety and predictabilit
SET-II
Q4. What is the difference between manual and automated testing? 10
Ans 4.
Difference between Manual and Automated Testing
Software testing ensures that an application functions as expected before it is released to end users. Testing can be done manually—by human testers who execute test cases step by step—or automatically—through scripts and tools that perform predefined actions and validations. Both have distinct benefits, limitations, and ideal use cases within the software development lifecycle.
Manual
Q5. Explain the purpose and functionality of the JList component in Java Swing. How does it differ from other list-type components? 5+5
Ans 5.
Purpose and Functionality of the JList Component in Java Swing
The JList component in Java Swing is used to display a list of items from which the user can select one or more elements. It is a fundamental GUI control in Swing for presenting a series of options in a vertical scrollable list. JList enhances user interaction through flexible rendering, selection models, and event handling.
Purpose and Functionality
JList resides in the javax.swing package and is typically used to display items such as strings, objects, or data retrieved from collections. It can be initialized directly with an array or ListModel.
Q6. Differentiate between ArrayList and LinkedList. Provide suitable examples where each is preferred. 5+5
Ans 6.
Difference between ArrayList and LinkedList
Both ArrayList and LinkedList are part of Java’s java.util package and implement the List interface. While they share a similar API and purpose—storing ordered elements with dynamic resizing—they differ fundamentally in internal structure, performance, and ideal usage scenarios.
ArrayList – Structure and Usage
ArrayList is backed by a dynamic array that grows automatically when the list exceeds its capacity. It provides fast random access (O(1)) through index-based retrieval, making it suitable for applications that frequently
| SESSION | SEPTEMBER 2025 |
| PROGRAM | BACHELOR OF COMPUTER APPLICATIONS (BCA) |
| SEMESTER | IV |
| COURSE CODE & NAME | DCA2203 SYSTEM SOFTWARE |
SET-I
Q1. Define the differences between linker and loader. 10
Ans 1.
Differences Between Linker and Loader
In system software, both the linker and the loader play crucial roles in the process of program execution. They are responsible for preparing object programs, combining modules, and placing them into memory for execution. Although they work in close coordination, their functions are distinct. Understanding the difference between these two components is essential for grasping how programs transition from compilation to execution.
Concept of Linker
A linker is a
Its Half solved only
Buy Complete from our online store
https://smuassignment.in/online-store/
MUJ Fully solved assignment available for session Jul-Aug 2025.
Lowest price guarantee with quality.
Charges INR 198 only per assignment. For more information you can get via mail or Whats app also
Mail id is aapkieducation@gmail.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
1 hour.
Otherwise you can also contact on our
whatsapp no 8791490301.
Q2. What is the role of the BIU and EU in 8086? How do they interact? 5+5
Ans 2.
Role of BIU and EU in 8086 and Their Interaction
The Intel 8086 microprocessor, introduced by Intel in 1978, is a 16-bit processor that revolutionized computer architecture. It features a powerful Bus Interface Unit (BIU) and Execution Unit (EU), which work together to enhance processing speed through parallel operation. Understanding their roles and coordination is key to grasping 8086’s internal functioning.
Role of the Bus
Q3. Discuss the unique features that make Android superior to other mobile operating systems 10
Ans 3.
Android, developed by Google, is the world’s most popular mobile operating system. Built on a modified version of the Linux kernel, it provides an open, flexible, and customizable platform for developers and users alike. Its architecture and ecosystem make it superior to other mobile OS platforms such as iOS and Windows Mobile.
- Open-Source Platform
One of Android’s biggest
SET-II
Q4. Define the difference between the Symbol Table, Pseudo Instruction Table (PIT), and Location Counter (LC) used in an assembler. 10
Ans 4.
An assembler is a crucial system program that converts assembly language code into machine language. During this translation process, it maintains several internal data structures to organize instructions, symbols, and memory addresses. Among the most significant of these are the Symbol Table, the Pseudo Instruction Table (PIT), and the Location Counter (LC). Each serves a distinct function in ensuring the correctness and efficiency of the assembly process.
Symbol Table
The Symbol Table is a data structure that stores all symbols, labels, and identifiers used in an assembly program
Q5. What is an overlay-structured program and how does it help to reduce memory usage during execution? 5+5
Ans 5.
An overlay-structured program is a programming technique designed to efficiently utilize limited main memory by dividing a large program into smaller, manageable parts called overlays. These overlays are loaded into memory only when required, thus reducing the overall memory usage during execution. This approach was widely used in older systems with limited physical memory, but its principles remain relevant even in modern computing through virtual memory
Q6. How do UPnP control points interact with devices and services during the discovery phase? 5+5
Ans 6.
Interaction of UPnP Control Points with Devices and Services During the Discovery Phase
Universal Plug and Play (UPnP) is a networking protocol that allows devices to discover and communicate with each other automatically over a local network. It eliminates the need for manual configuration, enabling seamless interoperability among smart devices. The discovery phase is the initial stage of UPnP communication, during which control points (clients) identify
