MCA_DCA6103_Foundation of Mathematics__InternalAssignments_Set 1&2

SESSION JUL/AUG 2021

PROGRAM MASTER OF COMPUTER APPLICATIONS (MCA)

SEMESTER I

COURSE CODE & NAME DCA6103 – FOUNDATION OF MATHEMATICS

Ques 1 a) Suppose that p and q are prime numbers and that n = pq. Use the principle of inclusion-exclusion to find the number of positive integers not exceeding n that are relatively prime to n

Answer:

Since n is the product of two prime numbers p and q, any number which is relatively prime to n must be relatively prime to both p and q. Consider the following two sets of . Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2021,

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

Ques1 b) Show that ~[p V(~p ^q)] and ~p ^~q are logically equivalent.

Answer:

Ques 2 a) Find lim x~0 (27x-9x-3x+1)/(1-cos x)

Answer:

Ques2 b)Find the derivative of f(x)=log e x ,x>0, using first principle.

Sol:

F(x)=

Ques 3 a)If y = e ^ (a * sin-1(x)) , prove that (1-x2)yn+2 -(2n+1)xyn+1-(n² + a²)yn = 0.

Answer:

Hence find the value of yn when x=0.

Sol:

Differentiate

Ques 3 b)Find all the asymptotes of the curve y ^ 3 – 6x * y ^ 2 + 11x ^ 2 * y – 6x ^ 3 + x + y = 0.

Sol:

Given :

Ques 4 a)Show that

Sol:

Ques 4 b) Ifu = (3xy-y3)-(y²-2x)³/2 show that

Sol:

Ques 5 Verify Green’s theorem for , where c is the region bounded by the parabola y = x and the line y=x.

Sol:

Boundary condition

x=0,1

Ques 6 a)Solve the system of equations x + y + z = 9; 2x + 5y + 7z = 52; 2x+y=z=0.

Sol:

x+y+z=9

Ques 6 b)Find the value of √-5+12i.

Sol:

Let z=x+iy

MCA_DCA6204_Advanced Computer Networks_InternalAssignments_Set1_2

INTERNAL ASSIGNMENTS

SESSIONJUL/AUG 2021
PROGRAMMCA
SEMESTERII
COURSE CODE & NAMEDCA6204 & ADVANCED COMPUTER NETWORKS

SET-I

Q1. Discuss the functions of layers of OSI model and compare it with TCP/IP model.  5+5     10

Ans:

OSI model: The Open Systems Interconnection (OSI) reference model was defined by the International Standards Organization (ISO) as a first step towards international standardization. In 1995, it was revised and known as ISO OSI (Open System Interconnection) because it deals with systems that are open for communication with other system. The model has seven layers. They are: physical layer, data link layer, network layer, transport layer,

Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2021,

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

Q2. Compare Circuit and Packet Switching with example. Describe some SONET/SDH devices.       5+5     10

Ans (2).

Circuit switching: Circuit  switching  assures  dedicated  communication  link  between  two stations. Usually this types of networks consists a set of switches connected by a sequence of links. On each physical link, a logical channel is dedicated to  the  connections.  And  each  link  is  divided  into  n  channels  by  using different  multiplexing  techniques.  Circuit  switching  method  follows  three steps for a successful communication. These are: circuit establishment

Q3. Explain the data transfer steps of Frame Relay call control. Explain TCP retransmission strategy. 5+5   10

Ans:

Call control: As we have seen frame relay supports multiple connection over the single line and these connection are called data link connection. For each connection there exist a unique DLIC (Data link Connection Identifier).

Following steps are

SET-II

Q4. What are the differences between dynamic routes and static routes, explain with example? Explain the functioning of the Open Shortest Path First (OSPF) protocol.     5+5      10

Ans:

Dynamic Routes: Dynamic routes are typically learned by the routing protocols RIP, OSPF and BGP. Routers that use the routing protocols exchange information in their routing tables by advertising. Using dynamic routes,  the 

Q5. Discuss the problems of symmetric key cryptography, discuss with suitable example. Explain RSA technique with an example.  5+5      10

Ans:

Q6. Explain single and multi-server queues. What is feedback mechanism for preventing network congestion and discus feedback information?    5+5        10

Ans:

Single server queue: The important element in a single server queue is the server, which provides services to packets. Different packets arrive at the system to be served. If the server is idle at the time of packet arrival, the packet is served immediately. Otherwise arriving packets enter into a waiting queue. When the server completes serving a

MCA_DCA6205_Communication Skills_InternalAssignments_Set1_2

SESSIONJUL/AUG 2021
PROGRAMMASTER OF COMPUTER APPLICATIONS (MCA)
SEMESTERII
COURSE CODE & NAMEDCA6205 – COMMUNICATION SKILLS

SET – I

Q1. Discuss any four barriers to communication and substantiate your answer with one example for each. (2.5×4)

 Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2021,

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

Ans:

Barriers to Effective Communication: At each stage in the process of communication – encoding, transferring, and decoding, there is the possibility of interference. This may hinder the communication process. Such interference is known as ‘noise.’ Often, a comparison is made between communication and a leaky bucket. If you carry water in a leaky bucket, you will lose water at various points in your journey from the water tap to your

Q2. Elaborate upon the significance and purpose of reading for a graduate of Computer Applications.       5+5            10

Ans:

Significance of reading for a graduate of Computer Applications:

  • Self-esteem is the ability to believe in yourself: This may be the most crucial aspect of all. Students gain ground in the categories listed below the sooner they establish reading abilities. This gives individuals more confidence in how they talk and write, as well as the certainty of a larger knowledge foundation.
  • Concentration Enhancement: Reading and student literacy are emphasised, which aids in the development of greater

Q3. What are the qualities of a business letter? Discuss its various types.           4+6      10

Ans:

The following are some qualities of a good business letters:

Simple and unambiguous language must be utilised during the communication process. The meaning of a term is unclear when it is unfamiliar.

MCA_DCA6203_Web Technologies_InternalAssignments_Set1_2

INTERNAL ASSIGNMENTS

SESSIONJUL/AUG 2021
PROGRAMMASTER OF COMPUTER APPLICATION (MCA)
SEMESTERII
COURSE CODE & NAMEDCA6203 – Web Technologies
CREDITS4
NUMBER OF ASSIGNMENTS & MARKS02 4 Credits, 30 Marks each

SET-I

1. a)  Discuss  about  different  protocols  used  on  the Internet.

b)  Explain tags to insert hyperlink and images in the HTML document.           5+5     

Ans (a).

Different  protocols  used  on  the Internet: TCP (Transmission Control Protocol): The TCP corresponds to the transport layer of OSI reference model, The TCP is known as a connection-oriented protocol, which means that a connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged.

IP (Internet Protocol)

IP is the protocol that controls how data Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2021,

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

2. a)  Explain different ways of inserting a style sheet.

b)  What do you understand by DHTML? Explain differences between HTML & DHTML. 5+5     10

Ans (a).

There are three ways of inserting a style sheet:

1.  External style sheet

2.  Internal style sheet

3.  Inline styles

External Style Sheet:

If you have to give same look and feel to many pages then it is a good idea to keep all the style sheet rules in a single style sheet file and include this file in all the HTML pages. HTML allows authors to associate any number of external style sheets with a document. You can include a style sheet file into HTML document using <link

3. a)  Explain various events used in DHTML.

b)  What is XML? Explain features and applications of XML.   5+5      10

Ans (a):

There are various DHTML events that will be helpful for us to understand event handling in DHTML:

1.  Onclick Event: If the user clicks the left mouse button, the onclick event for an object occurs only if the mouse pointer is over the object, but if the user clicks the mouse on the object but moves the mouse pointer away from the object before releasing, no onclick event occurs.

In line HTML syntax

SET-II

4. a)  What is AJAX? How does it work? Explain its advantages.

b)  How do you handle Dynamic HTML with Ajax?        5+5     10

Ans:

AJAX: AJAX can be used for interactive communication with a database. Database allows  web  applications  to  store  information  in  a  systematic  way,  and retrieve that information later through the use of structured query. Database also allows many clients to access and save information concurrently. It is becoming more sophisticated

Ans (b).

Handling Dynamic HTML with Ajax

DHTML is a powerhouse of option for the Ajax programmer. Like CSS, DHTML offers ways to update and manage your web page. In many ways, DHTML is more powerful than CSS, because by using DHTML, we can alter the HTML in a page. DHTML allows authors to add effects to their pages that are otherwise difficult to

5. a)  How can you load XML Data into an HTML Page? Explain with example.

b)  Write  a  PHP  script  that  retrieve  data  from database table and return the XML string.          5+5    

Ans (a):

Loading XML Data into an HTML Page: The process of fetching data from an XML files to be filled in an HTML table, using DSO (Data Source Object) and JavaScript. DSO is an object that operates like a database on the client side. It will accept information that is organized in a certain way and will manipulate it with its own database engine.

DSO allows data binding

6. a)  Explain different operators used in PHP.

b)  Explain    ASP    AdRotator    Component    with example.    5+5     10

Ans (a)

PHP Operators: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make

MCA_DCA6202_Advanced Data Structure__InternalAssignments_Set1&2

SESSIONJUL/AUG 2021
PROGRAMMCA
SEMESTERII
COURSE CODE & NAMEDCA6202 – Advanced Data Structure
CREDITS4
NUMBER OF ASSIGNMENTS & MARKS02 & 30 Marks each

SET-I

Q1. A. What is time complexity and space complexity? Analyze the performance   of   Binary   Search   using   time   and   space complexities. 5

Ans:

An algorithm is a step by step procedure for solving a particular problem. One major purpose of this text is to develop efficient algorithms for the processing of our data. The efficiency of the algorithm is depending on the time and space it uses. The complexity of an algorithm is the function which gives the running time and/ or space in terms of the input size. Each of our algorithms will involve a particular data structure. The data structure which we choose will depend on many things, including the data and   the   frequency   with   which   various   data   operation   are   applied. Sometimes the choice of data structure involves a time- space tradeoff by increasing the amount of space for storing the data, one may be able to reduce the time needed for processing the data, or vice versa. So, we may not always be able to use the

B.            Write an algorithm/pseudocode to delete the node following a given node in linked list.           5

Ans:

Deletion Algorithm: We have algorithms for deletion from linked list in various situations. The first one deletes the node following a given node and the second one deletes the node with a given ITEM of information.All of our deletion algorithms will return the memory space of the deleted node N to the beginning of the AVAIL list. Accordingly, all of our algorithms will include the following pair of assignments, where LOC is

Q2.  What are the applications of stack?        10       

Ans:

Applications of Stack:

Arithmetic Expression

Generally in all arithmetic expression the operators are placed in between the operands, this is called infix notation.

A+B and (X+Y)* Z

In some type of notation the operator is placed before its two operands, this is called prefix notation or polish notation. Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2021,

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

Q3A. Explain the postorder traversals on binary tree.          5         

Ans (a).

Postorder traversals on binary tree:

In  postorder  traversal,  traversal  starts  with  the  left  most  subtree  then proceeds with right sub tree and print the parent of those nodes.

1)  Traverse the

B.            What  is  a  binary  search  tree?  What  are  the  common operations that can be performed on binary search trees?      5         

Ans (b).

Binary Search Tree: T is a binary tree. Then T is called binary search tree if each node of n of T has the following property. The value at n is greater than every value in the left subtree of n and is less than every value in the right subtree of n. We can say one of the most important data structure is binary search tree. This enables one to search for and find an element with an average running time f(n)=O(log2 n). It

SET-II

Q4 A. What  is  static  memory  allocation  and  dynamic  memory allocation?      5

Ans (a).

Static Memory Allocation: Static Memory Allocation, also known as Compile-time Memory Allocation, is used for the allocation of memory during the process of compilation of data in a fixed size. The compiler allocates memory

5. What is an AVL tree. How do you perform search operation in an AVL tree? Explain with the help of an example.        10      

Ans (5).

AVL tree: An  AVL  tree  is another  balanced binary search tree  named  after their inventors, Adelson-Velskii and Landis. An empty binary tree is an AVL tree. A non empty binary tree T is an AVL tree if given TL and TR to be the left and right subtrees of T and h(TL) and h(TR) to be the heights of subtrees TL and TR

Q6  A. Give algorithm/pseudocode for DFS. Demonstrate DFS using suitable example?   5       

Ans (a):

Depth first search (DFS) algorithm starts with the initial node of the graph G, and then goes to deeper and deeper until we find the goal node or the node which has no children. The algorithm, then backtracks from the dead end towards the most recent node that is yet to be completely unexplored.

B.            Design an algorithm/ pseudocode for selection sort.          5         

Ans (b):

Selection sort: Selection sort is one of the sorting techniques that is typically used for sequencing small lists. It starts by comparing the entire list for the lowest item and moves it to the #1 position. It then compares the rest of the list for the next-lowest item and places it in the #2 position and so on until all items

MCA_DCA6201_Operating System_InternalAssignments_Set1_2

                                            INTERNAL ASSIGNMENTS

SESSIONJUL/AUG 2021
PROGRAMMASTER OF COMPUTER APPLICATION (MCA)
SEMESTERII
COURSE CODE & NAMEDCA6201 – OPERATING SYSTEM
CREDITS4
NUMBER OF ASSIGNMENTS & MARKS02 30 Marks each

Set- I

Q1 a.  Discuss the three Operating System Structures.

b. What is Deadlock avoidance? Discuss Banker’s algorithm for the same.       5+5     

Ans 1(a).

Three Operating System Structures:

Layered approach: Dijkstra suggested the layered approach to lessen the design and implementation complexities of an operating system. The layered approach divides the operating system into several layers. The functions of operating system are divided among these layers. Each layer has well-defined functionality and input-output interfaces with the two adjacent layers. Typically, the bottom layer is concerned with machine hardware and the top layer is concerned Its Half solved only

Buy Complete from our online store

MUJ Fully solved assignment available for session Jul/Aug 2021,

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also


Mail id is aapkieducation@gmail.com

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

  1. Q2 a.  What do you understand by Virtual Environment & Machine Aggregation?

b. What is a Process Control Block? What information is stored in it?   5+5      10

Ans (a).

Virtual Environment & Machine Aggregation: A virtual environment (otherwise referred to as Virtual private server) is another kind of a virtual machine. In fact, it is a virtualized environment for running user-level programs (i.e. not the operating system kernel and drivers, but applications). Virtual environments are created using the software implementing operating system-level

Q3. Discuss the CPU scheduling algorithms           10       

Ans (3).

CPU- I/O Burst Cycle: Process execution consists of alternate CPU (Central Processing Unit) execution and I/O (Input / Output) wait. A cycle of these two events repeats till the process completes execution (Figure). Process execution begins with a CPU burst followed by an I/O burst and

Set – II

Q4 a.  What is Page replacement? Discuss it’s FIFO algorithm with an example.

b.  What is Thrashing? What are its causes?          5+5      10

Ans (a):

Page Replacement: Initially, execution of a process starts with none of its pages in memory. Each of its pages will have page fault at least once when it is first referenced. But it may so happen that some of its pages are never used. In such a case those pages which are not referenced even once will never be brought into memory. This saves load time and memory space. If this is so, the degree of multi-programming can be increased so that more ready processes can be loaded and executed. Now, we may come across a situation wherein all of sudden, a process hitherto not accessing certain pages starts accessing those pages. The degree of multi-

Q5 a.  Discuss the different File Access Methods.

b. What are I/O Control Strategies?            5+5      10

Ans (a).

File Access Methods: Information is stored in files. Files reside on secondary storage. When this information is to be used, it has to be accessed and brought into primary main memory. Information in files could be accessed in many ways. It is usually dependent on an application. Access

Q6. Discuss about Distributed processing and parallel processing. State the similarities and differences amongst them.           10       

Ans (6).

Parallel and Distributed Processing: Operating systems have moved from single process systems to single processor, multi-user, and multitasking systems. Today the trend is towards multiprocessor, multitasking systems. Distributed processing and parallel processing are two

MCA DCA6102 SET 2 1 SEM SOLVED ASSIGNMENT MANIPAL JAIPUR UNIVERSITY

 

 

Directorate of Online Education

 

 

INTERNAL ASSIGNMENT SET-II

 

 

SESSION        FEB/MAR 2021

PROGRAMME          MASTER OF COMPUTER APPLICATION (MCA)

SEMESTER    I

COURSE CODE & NAME    DCA6105 – COMPUTER ARCHITECTURE

CREDITS        4

NUMBER OF ASSIGNMENTS,

CREDITS &MARKS  02

4 Credits, 30 Marks each

 

Question 1  What do you understand by pipelining? Discuss with an example the different hazards possible with pipelining?

Answer An implementation technique by which the execution of multiple instructions can be overlapped is called pipelining. This pipeline technique splits up the sequential process of an instruction cycle into sub-processes that operates concurrently in separate segments. As you know computer processors can execute millions of instructions per second. At the time one instruction is getting processed, the following one in line also gets processed within the same time, and so on. A pipeline permits multiple instructions to get executed at the same time. Without a pipeline, every instruction has to wait for

Manipal University

Fully solved assignment available for session Feb/March 2021,

your last date is 31th July 2021.

Lowest price guarantee with quality.

Charges INR 150 only per assignment. For more information you can get via mail or Whats app also

Mail id is aapkieducation@gmail.com

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

 

Question  2 What do you understand by multithreading? Discuss the principles of multithreading?

Answer Multithreading: Multithreading is another method for reducing or hiding latency. Multithreading is a process which is very common in modern computers. Basically it is multi-programming in which several processes can run at the same time. If we want the switching process to be speedy then we have to provide each process a memory map and hardware registers. Now if one process blocks while waiting for remote data, then

the switching can

 

Question  3  Discuss the various types of Vector Instructions for a register- register vector processor.

Answer  Types of Vector Instructions: The various types of vector instructions for a register-register vector processor are:

MCA DCA6102 SET 1 1 SEM SOLVED ASSIGNMENT MANIPAL JAIPUR UNIVERSITY

SESSION

FEB/MAR 2021

PROGRAMME

MASTER OF COMPUTER APPLICATION (MCA)

SEMESTER

I

COURSE CODE & NAME

DCA6105 – COMPUTER ARCHITECTURE

 

 

  1. What do you understand by parallelism in computer architecture? Discuss the different classes of parallelism and parallel architectures?

Ans 1.

Parallel Computing:

It is the use of multiple processing elements simultaneously for solving any problem. Problems are broken down into instructions and are solved concurrently as each resource that has been applied to work is working at the same time.

  1. It can be impractical to solve larger problems on Serial Computing.

Its Half solved only

Buy Complete from our online store

Manipal University

Fully solved assignment available for session Feb/March 2021,

your last date is 31th July 2021.

Lowest price guarantee with quality.

Charges INR 150 only per assignment. For more information you can get via mail or Whats app also

Mail id is aapkieducation@gmail.com

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

  1. What do you understand by process and threads? Differentiate between them?

Answer:

Process:
Process means any program is in execution. Process control block controls the operation of any process. Process control block contains information about processes for example Process priority, process id, process state, CPU, register, etc. A process can create other processes which are known as Child Processes. Process takes more time to terminate and it

  1. Explain Amdahl’s Law of computer design.

Answer:

Amdahl’s Law:

In computer architecture, Amdahl’s law (or Amdahl’s argument) is a formula which gives the theoretical speedup in latency of the execution of a task at fixed workload that can be expected of a system whose resources are improved.

In computer architecture, Amdahl’s law is a formula which It is named after computer

 

SESSION

FEB/MAR 2021

PROGRAMME

MASTER OF COMPUTER APPLICATION (MCA)

SEMESTER

I

COURSE CODE & NAME

DCA6104 – ADAVANCED DATABASE MANAGEMENT SYSTEMS

 

 

 

 

  1. Consider two tables named ‘Student’ and ‘Course’ as follows

Table: Student       

 

 

(a) Find the Cartesian Product of Tables ‘Student’ and ‘Course’.       

 (b) What will be the result after the successful execution of the following Relational Algebra Expressions?

  • σ age> 18(Student)