BSC IT 2nd Sem WINTER 2013 Solved Assignments



Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601



PROGRAM
BSc IT
SEMESTER
SECOND
SUBJECT CODE & NAME
BT0068, Computer Organization and Architecture

Q1. Perform the following conversions:
1. (11 101 110)2 = () 8
2. (1110 0010 1111) 2 = () 16
3. (85)10 = () 2
4. (10101)2 = () 10
5. (111.001)2 = () 8
Answer:
1. (11 101 110)2 = (365)8
Q2. Differentiate between primary memory and secondary memory.
Answer:
secondary memory:
Primary memory
Secondary memory
The memory devices used for primary memory are semiconductor memories
The secondary memory devices are magnetic and optical memories.
The primary memory is categorized as volatile and non volatile memories, RAM is the volatile memory and ROM is the non volatile memory
The secondary memory is always non volatile
The primary memory is composed of programs and data that are presently being used by the  micro processor
The secondary memory is enough capable to store huge amount of information

Q3. Explain CPU organization of 8085 microprocessor with diagram.
Answer:
Memory
Program, data and stack memories occupy the same memory space. The total addressable memory size is 64 KB.
Program memory - program can be located anywhere in memory. Jump, branch and call instructions use 16-bit addresses, i.e. they can be used to jump/branch anywhere within 64 KB. All jump/branch instructions use absolute addressing.

Q4. Explain fundamental Computer Architectures.
Answer:
Here we describe the most common Computer Architectures, all of which use stored program control concept.
The three most popular computer architectures are:
1) The Stack Machine
2) The Accumulator Machine

Q5. Explain direct and associative mapping functions.
Answer:

Cache Memory - Direct Mapped Cache

If each block from main memory has only one place it can appear in the cache, the cache is said to be Direct Mapped. Inorder to determine to which Cache line a main memory block is mapped we can use the formula shown below

Cache Line Number = (Main memory Block number) MOD (Number of Cache lines)
Let us assume we have a Main Memory of size 4GB (232), with each byte directly addressable by a 32-bit address. We will divide Main memory into blocks of each 32 bytes (25). Thus there are 128M (i.e. 232/25 = 227) blocks in Main memory. We have a Cache memory of 512KB (i.e. 219), divided into blocks of each 32 bytes (25). Thus there are 16K (i.e. 219/25 = 214) blocks also known as Cache slots or Cache

Q6. Explain any five addressing modes with example.
Answer:

·         Immediate
·         Direct
·         Indirect
·         Register
·         Register indirect




Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601



[ WINTER 2013 ] ASSIGNMENT
PROGRAM BSc IT
SEMESTER SECOND
SUBJECT CODE & NAME - BT0070, Operating Systems


Q. No. 1 What do you mean by batch operating system? Explain advantages and disadvantages of it.
[4+6] 10
Answer: Batch operating system
The users of batch operating system do not interact with the computer directly. Each user prepares his job on an off-line device like punch cards and submits it to the computer operator. To speed up processing, jobs with similar needs are batched together and run as a group. Thus, the programmers left their programs with the operator. The operator then sorts programs into batches with similar requirements.


2 Why do we need threads in designing of OS? Describe similarity and differences between processes and threads.
[5+5] 10
Answer: Following are some reasons why we use threads in designing operating systems.
1. A process with multiple threads make a great server. For example printer server.

2. Because threads can share common data, they do not need to use interprocess communication.
3. Because of the very nature, threads can take advantage of multiprocessors.
Threads are cheap in the sense that:

3 Explain process state with diagram.
[7+3] 10
Answer:
Process State
·                     There are a number of states that can be attributed to a process: indeed, the operation of a multiprogramming system can be described by a state transition diagram on the process states. The states of a process include:
o                  New-a process being created but not yet included in the pool of executable processes (resource acquisition).
o                  Ready-processes that are prepared to execute when given the opportunity.
o                  Active, Running-the process that is currently being executed by the CPU.

4 Explain the concept of paging with the help of an example.
[7+3] 10
Answer: In computer operating systems, paging is one of the memory-management schemes by which a computer can store and retrieve data from secondary storage for use in main memory. In the paging memory-management scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. The main advantage of paging over memory segmentation is that it allows the physical address space of a process to be noncontiguous. Before paging came into use, systems had to fit whole programs into storage contiguously, which caused various storage and fragmentation problems.

5 Explain any two basic architectures for multiprocessor interconnections.
[ 5x2] 10
Answer: The base network provided in the RSIM distribution is a 2-dimensional bi-directional mesh (without wraparound connections), and is taken from the NETSIM simulation system. The interconnection network includes separate request and reply networks for deadlock-avoidance. Unlike the other subsystems discussed in this chapter, the network is not built using the standard module framework.
The network flit delay, arbitration delay, width, and buffer sizes can be configured as described in Chapter. Additionally, the system can be directed to simulate pipelined switches, by which the flit delay of

6 Explain the methods of directory implementation.
[5+5] 10
Answer: Directory Implementation
·                     Directories need to be fast to search, insert, and delete, with a minimum of wasted disk space.
1 Linear List
·                     A linear list is the simplest and easiest directory structure to set up, but it does have some drawbacks.
·                     Finding a file ( or verifying one does not already exist upon creation ) requires a linear search.
·                     Deletions can be done by moving all entries, flagging an entry as deleted, or by moving the last entry into the newly vacant position.






















Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601



[ WINTER 2013 ] ASSIGNMENT
PROGRAM B.Sc IT
SEMESTER SECOND
SUBJECT CODE & NAME - BT0071, Technical Communication



Q. No.1 Explain meaning of technical writers and also explain its role. 10
Answer:
MEANING: A technical writer is a professional writer who engages in technical writing and produces technical documentation for technical, business, and consumer audiences. The Institute of Scientific and Technical Communicators defines the profession as preparing information that helps users who use the product. This documentation includes online help, user guides/manuals, white papers, design specifications, system manuals, project plans, test plans, business correspondence, etc. Technical writers create documentation in many forms, such as printed, web-based, or other electronic means.

2 What is Audience Analysis? Explain its significance in Technical Communication. 10
Answer:
Audience analysis is a task that is often performed by technical writers in a project's early stages. It consists of assessing the audience to make sure the information provided to them is at the appropriate level. The audience is often referred to as the end-user, and all communications need to be targeted towards the defined audience. Defining an audience requires the consideration of many factors, such as

3 Explain any five things that are needed to be kept in mind before interview. 10
Answer: Before the interview begins, there are things that you can do to build a good foundation for a productive interview experience.

Define your objectives

Define the purpose of the interview. Are you interviewing to identify problem areas within a process? Or are you documenting the steps a user performs to complete a task? Once established, the purpose will help set the scope for your interview. You should also try to establish the expected or needed level of detail for the final product. Doing so on the front-end will ensure that you ask the right questions and at the right level of detail. (For example, a policy-level document requires more general information than a work instruction, which requires more explicit step-by-step detail.)



Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601


[ WINTER 2013 ] ASSIGNMENT
PROGRAM BSc IT
SEMESTER SECOND
SUBJECT CODE & NAME BT0072, Computer Networks


Q. No. 1 What is Computer networking? Explain LAN and WAN.
4+6=10 marks.
Answer:
A computer network or data network is a telecommunications network that allows computers to exchange data. In computer networks, networked computing devices pass data to each other along data connections. The connections (network links) between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.

Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as servers and personal computers, as well as networking hardware. Two devices

2 How do you Implement packet switching? Briefly explain. 10 marks
Answer: Implementation of packet switching
For a message to be sent through a packet-switching network that is of length greater than the maximum packet size, it breaks the message up into packets and sends these packets, one at a time, to the network. A question arises as to how the network will handle this stream of packets as it attempts to route them through the network and deliver them to the intended destination. Two approaches are used in

3 What is the function of data link layer? Explain the services of the data link layer.
3+7=10 marks.
Answer:
Data Link Layer Functions:
It provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames, dealing with transmission errors, regulating the flow of frames so that slow receivers are not swamped by fast senders, and general link management.

The main function of the data link layer is to provide services to the network layer. The principal service is transferring data from the network layer on the source machine to the network layer on the destination machine. The services of the data link layer can be categorized as:


4 Explain sliding window protocol.                          10 marks.
Answer: In this protocol, the sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver. The sender and the receiver need to deal with only part of the possible sequence numbers. The range which is the concern of the sender is called the send sliding window; the range that is the concern of the receiver is called the receive sliding window. Both would be discussed here.

The send window is an imaginary box covering the sequence numbers of the data frames which can be in transit. In each window position, some of these sequence numbers define the frames that have been


5 Discuss any two design issues of Session Layer.
5+5=10 marks.
Answer:
The design issues of the session layer include:

Dialog Management
In principle, all OSI connections are full duplex, i.e., PDUs can move in both directions over the same connection simultaneously. However, there are many situations in which the upper layer software is designed to expect the users to take turns (half-duplex communication).
For example, consider a database management system that can be accessed from remote terminal (e.g., airline reservation or home banking). The most natural mode of operation is for the user to send a query to the database management system and then wait for a reply. Allowing users to send a second and a third query before the first one has been answered needlessly complicates the system. Logically, it is desirable

6 Explain the types of modes on which IPSec operates.
5+5=10 marks.
Answer: IPSec operates in one of the following two modes:
1. Transport Mode
In this mode, IPSec protects what is delivered from the transport layer to the network layer. i.e. the transport mode protects the network layer payload, the payload to be encapsulated in the network layer. This mode does not protect the IP header, i.e. it protects only the packet from the transport layer (the IP layer payload). In this mode, the IPSec header and trailer are added to the information coming from the transport layer. The IP header is added later.


Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601

No comments:

Post a Comment

Note: only a member of this blog may post a comment.