Sunday, 22 June 2014

BCA3020 - Database Management System


Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


SPRING 2014, ASSIGNMENT

DRIVE
SPRING 2014
PROGRAM
BACHELOR OF COMPUTER APPLICATION
SUBJECT CODE & NAME
BCA3020/IMC3020- Database Management System
SEMESTER
THIRD
CREDITS
4
MAX. MARKS
60
BK ID

B


Answer all questions


1 What is Database? Explain its properties.
Answer : A database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images.


In computing, databases are sometimes classified according to their organizational approach. The most prevalent approach is the relational database, a tabular database in which data is defined so that it can be reorganized and accessed in a number of different ways. A distributed database is one that can be dispersed or replicated among different points in a network. An object-oriented programming database is one that is


2 Write a note on:
Ø  MySQL Architecture
Answer : MySQL's architecture consists of a web of interrelated function sets, which work together to fulfil the various needs of the database server. A number of authors3 have implied that these function sets are indeed components, or entirely encapsulated packages; however, there is little evidence in the source code that this is the case.

Indeed, the architecture includes separate function libraries, composed of functions that handle similar tasks, but there is not, in the traditional object-oriented programming sense, a full component-level separation of functionality.


Ø  Primary Subsystems

Answer : To increase availability and scalability, you can set up DB2 UDB for z/OS as a parallel database, known as DB2 data sharing. With this setup, multiple DB2 subsystems share the same SAP database. Each subsystem is called a data sharing member, and the set of subsystems is referred to as a data sharing

3 What are the attributes used in the E-R model? Explain with the example of Student database.

Answer : Entity-Relationship (ER) Model
In the ER model, the main concepts are entity, attribute, and relationship.

Entities and Attributes

Entity: An entity represents some "thing" (in the miniworld) that is of interest to us, i.e., about which we want to maintain some data. An entity could represent a physical object (e.g., house, person, automobile, widget) or a less tangible concept (e.g., company, job, academic course, business transaction).

4 What is Relational Database Management System? Explain three aspects of RDBMS.

Answer : A relational database management system (RDBMS) is a program that lets you create, update, and administer a relational database. Most commercial RDBMS's use the Structured Query Language (SQL) to access the database, although SQL was invented after the development of the relational model and is not necessary for its use.


The leading RDBMS products are Oracle, IBM's DB2 and Microsoft's SQL Server. Despite repeated challenges by competing technologies, as well as the claim by some experts that no current RDBMS has fully implemented relational principles, the majority of new corporate databases are still being created and managed with an RDBMS.


5 What do you mean by Embedded SQL? How do you declare variables and exceptions?

Answer : Embedded SQL is a method of inserting inline SQL statements or queries into the code of a programming language, which is known as a host language. Because the host language cannot parse SQL, the inserted SQL is parsed by an embedded SQL preprocessor.

Embedded SQL (ESQL) is a SQL-92 standard application programming interface (API) for SQL database access. ESQL requires a two-step compilation process:
·         A precompiler translates Embedded SQL statements into commands in the programming language used to write the application.

6 Briefly explain the reasons behind Object-relational impedance mismatch.

Answer : The O/R Impedance Mismatch

Why does this impedance mismatch exist?  The object-oriented paradigm is based on proven software engineering principles.  The relational paradigm, however, is based on proven mathematical principles.  Because the underlying paradigms are different the two technologies do not work together seamlessly. The impedance mismatch becomes apparent when you look at the preferred approach to access: With the object paradigm you traverse objects via their relationships whereas with the relational paradigm you join
Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601

  

BC0056-UNIX OPERATING SYSTEM

Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


SPRING 2014, ASSIGNMENT


PROGRAM
BCA(REVISED 2007)
SEMESTER
5TH
SUBJECT CODE & NAME
BC0056-UNIX OPERATING SYSTEM
CREDIT
4
BK ID
B0973
MAX. MARKS
60



Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.


1.Define Boot Procedure and Kernel.

Answer: The Boot Procedure

Bootstrapping is the process of starting up a computer from a halted or powered-down condition. When the computer is switched on, it activates the


2. What are the privileges of using UNIX?

Answer: Unix was one of the first "modern" operating systems developed for computers. Because of advantages in security, speed and cost, Unix serves as the operating system of choice for many companies around the world. Unix systems (and Unix-like variants such as FreeBSD, Solaris, OSX and Linux) maintain prevalence on large computers such as mainframes and supercomputers, while being equally suited for desktops, laptops and netbooks.

Privileges of using UNIX :

Q.4 what is a Process? How to run a process at the background?

Answer:-A process is a mechanism in an operating system that can run a series of steps. The mechanism depends on the operating system. For example,


Q.5 Demonstrate how and when you can use the following commands: vi, cat, chmod, grep, man, pwd, ps, kill, mkdir, rm.

Answer:-


Q.6 Write a C program that illustrates the creation of child process using fork system call. One process finds sum of even series and other process finds sum of odd series.

Answer:-

Source Code::
==========

#include <stdio.h>
#include <sys/types.h>
#include <unistd.h>
Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


BC0055 - TCP/IP

Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


ASSIGNMENT
PROGRAM
BCA(REVISED 2007)
SEMESTER
V
SUBJECT CODE & NAME
BC0055, TCP/IP
CREDIT
4
BK ID
B0965
MAX.MARKS
60

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.
Q.1 Draw the diagram of TCP/IP protocol suit. Explain network interface layer and Internet layer.
Answer: - The acronyms TCP and IP stand for Transmission Control Protocol and Internet Protocol, respectively. Thus, you could be forgiven for thinking that the amalgamation TCP/IP was simply a grouping of these two protocols. However, it is

Q.2 Define and explain address resolution protocol (ARP). Describe ARP packet generation.
Answer: - The Address Resolution Protocol (ARP) is a telecommunication protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982. It is Internet Standard STD 37. It is also the name of the program for manipulating these addresses in most operating

Q.3 Define user datagram. Explain UDP datagram format and UDP Application Programming Interface.
Answer: - The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite (the set of network protocols used for the Internet). With UDP, computer applications can send messages, in this case referred to as datagrams, to other

Q.4 Write note on:
 Answer: - The Hierarchical Namespace:-
The DNS hierarchical namespace is a map of how DNS servers determine what IP address to connect to given a URL.
Registrars: - Registars such as VeriSign, the operator of the .com and .net top-level domains, let any company, organization, or private individual register a TLD for any number of years. The domain name is then added to the Whois directory, and may point to a specific DNS server, which translates the domain name into an IP address.

Q.5 Define Remote Execution Command Protocol (REXEC and RSH). Explain its principle of operation.
Answer:- REXECD (Remote EXEcution Command Daemon) is a server that allows execution of the REXEC or RSH (Remote Shell Protocol) command from a remote host over the TCP/IP network. The client function is performed by the REXEC process.
Principle of Operation:- REXECD is a server (or daemon). It handles commands issued by foreign hosts, and transfers orders to slave virtual machines for job execution. The daemon performs automatic login, and user authentication when user ID and password


Q.6 Explain the following versions of SNMP:
Answer: - SNMPv1:- Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks". Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more.SNMP is used mostly in network management systems to monitor network-attached
Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


BC0054 – SOFTWARE PROJECT MANAGEMENT & QUALITY ASSURANCE

Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601



WINTER 2013, ASSIGNMENT

DRIVE
WINTER 2013
PROGRAM
BACHELOR OF COMPUTER APPLICATION
SUBJECT CODE & NAME
BC0054 – SOFTWARE PROJECT MANAGEMENT & QUALITY ASSURANCE
SEMESTER
5TH SEM
CREDITS
4
MAX. MARKS
60
BK ID

B0958


Answer all questions

1.Explain the importance of four P’s in the software project management spectrum.

Answer : The  effective   software  project  management Focuses  on  four   P's.

1)      The  People
2)      The  Product
3)      The  Process
4)      The  Project


2.Define Statement of Work (SOW). Which are the Project Management Associations?

Answer : When it comes to implementing or constructing large and complex systems (such as an enterprise software system), the work requirements and conditions should be properly documented. Statement of Work (SOW) is such document that describes what needs to be done in the agreed contract.

Usually, the SOW is written in a precise and definitive language that is relevant to the field of business. This prevents any misinterpretations


3.Explain briefly about the basic COCOMO Model.
Answer: The Constructive Cost Model (COCOMO) is an algorithmic software cost estimation model developed by Barry Boehm. The model uses a basic regression formula, with parameters that are derived from historical project data and current project characteristics.
Basic COCOMO computes software development effort (and cost) as a   function of program size. Program size is expressed in estimated thousands of source lines of code (SLOC).



4.Write the Conventions followed in PERT.
Answer : Definition of PERT :
A PERT chart is a graph that represents all of the tasks necessary to a project's completion, and the order in which they must be completed along with the corresponding time requirements. Certain tasks are dependent on serial tasks, which must be completed in a certain sequence.

Four requirements of PERT :
1. Identify the specific activities and milestones.
2. Determine the proper sequence of the


5  List the various activities under the risk management.
Answer : Four foundational elements frame what executive management and directors need to consider when evaluating the best way to implement enterprise risk management (ERM). These four elements – process, integration, culture and infrastructure – are intended to be flexible in application because strategies, organizational structures, operating philosophies and risk profiles vary in complexity across industries and firms. We


6  Define

a) Software assurance,

Answer : Software assurance (SwA) is defined as "the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at anytime during its lifecycle, and that the software functions in the intended manner."

The main objective of software assurance is to ensure that the processes, procedures, and products used to produce and sustain the software


(b) Software Engineering,
Answer : Software engineering (SE) is concerned with developing and maintaining software systems that behave reliably and efficiently, are affordable to develop and maintain, and satisfy all the requirements that customers have defined for them. It is important because of the impact of large, expensive software systems and the role of software in safety-critical applications. It integrates significant mathematics, computer science and


(c) Software Management,
Answer : "Managing software" and "managing software development" is a complex subject which is surrounded by a lot of bruhahah and fancy marketing presentations full of neat-looking flow charts and ambiguous terminology. I'm trying to establish some common vocabulary so we sort-of know what we're talking about.
Real life software management

(d) Software reviews,
Answer : A software review is "A process or meeting during which a software product is examined by a project personnel, managers, users, customers, user representatives, or other interested parties for comment or approval".

In this context, the term "software product" means "any technical document or partial document, produced as a deliverable of a software development activity", and may include documents such as contracts, project plans and budgets, requirements documents, specifications, designs, source code, user documentation, support and


(e) Code Reviews

Answer : Code review is systematic examination (often known as peer review) of computer source code. It is intended to find and fix mistakes overlooked in the initial development phase, improving both the overall quality of software and the developers' skills. Reviews are done in various forms such as pair programming, informal walkthroughs, and formal inspections.

Code reviews can often find and remove common vulnerabilities such as format string exploits, race conditions, memory leaks and buffer overflows, thereby improving software security. Online software repositories based on Subversion (
Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


BC0053 – VB.NET & XML

Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


ASSIGNMENT
PROGRAM
BCA(REVISED 2007)
SEMESTER
V
SUBJECT CODE & NAME
BC0053 – VB.NET & XML
CREDIT
4
BK ID
B0975
MAX.MARKS
60

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.
Q.1 Briefly describes the components of the .NET Framework.
Answer: - The .NET Framework is a technology that supports building and running the next generation of applications and XML Web services. The .NET Framework is designed to fulfill the following objectives:
·         To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely.
·         To provide a code-execution
·          
·          
Q.2 Write the structure of for…Next loop in VB.Net and also write a program to print integers from 1 to 10 on the console.
Answer: - It repeats a group of statements a specified number of times and a loop index counts the number of loop iterations as the loop executes.
The syntax for this loop construct is

Q.3 State important properties and methods of an Exception.
Answer: Message property to get message from exception location
Message property will supply message from exception location. We can log this information to know exact message regarding exception. Here is sample code

Q.4 How can DTD be declared inside an XML document? Illustrate it with example.
Answer: - XML provides an application independent way of sharing data. With a DTD, independent groups of people can agree to use a common DTD for interchanging data. Your application can use a standard DTD to verify that data that you receive from the outside world is valid. You can also use a DTD to verify your own data.
A DTD is associated with an XML or SGML document by means of a document type declaration (DOCTYPE). The DOCTYPE appears in the syntactic fragment doctypedecl near the start of an XML document. The declaration establishes that the

Q.5 Design a form to create basic calculator in VB.NET.
Answer:-

Q.6 Write a XML with database with book details (BOOK ID, Title, Author, subject, published Year, language, vendor, price)
Answer:-
A simple string is interpreted as an element name. For instance, this query specification returns all <table> elements:
table
The child operator ("/") indicates hierarchy. This query specification returns <author> elements that are children of <front> elements:
Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


BC0052 – THEORY OF COMPUTER SCIENCE

Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


SPRING 2014, ASSIGNMENT


PRIGRAM
BCA(REVISED 2007)
SEMESTER
5TH
SUBJECT CODE & NAME
BC0052 – THEORY OF COMPUTER SCIENCE
CREDIT
4
BK ID
B0972
MAX. MARKS
60



Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.
                                                                                                                                                           


Q.1Define g.c.d. (m,n)
Solve recursively: (i) f(x, y) = x + y
(ii) g(x, 0) = 0, g(x, y + 1) = g(x, y) + x.

Answer:Define g.c.d. (m,n)
The greatest common divisor (gcd), also known as the greatest common factor (gcf), or highest common factor (hcf), of two or more integers (at least one of which is not zero), is the largest positive integer that divides the numbers without a remainder. For example, the GCD of 8 and 12 is 4


Q.2 Obtain a DFA to accept strings of a’s and b’s starting with the string ab.

Answer: It is clear that the string should start with ab and so, the minimum string that can be accepted by the machine is ab.

To accept the string ab, we need three states and the machine can be written as


Q.3 Prove by mathematical induction.
          12 + 22 + 32+------+ n2 = (n(n+1)(2n+1))/6
Answer:- 12 + 22 + 32+------+ n2 = (n(n+1)(2n+1))/6
First of all Identify the general term and nth partial sum before beginning the problem

The general term, an, is the last term on the left hand side. an = n2
The nth partial sum, Sn, is the right hand side. Sn = n (n + 1) (2n + 1) / 6


Q.4 briefly describes Moore and Mealy machines.

Answer: -Describe Moore
An automation system in which the output depends only on the present input is called a Moore machine. Alternatively, an automaton system in which output depends both on the present input and the present state is called Mealy machine.

A Moore machine can be defined as a 6-tuple ( S, S0, Σ, Λ, T, G ) consisting of the following:
·         A finite set of states ( S )
·         A start state (also called initial state) S0 which is an element of (S)
·         A finite set called the input alphabet ( Σ )

Q.5 If G = ({ S }, { 0,1}, { S →0S1, S →Ʌ}, S ) then find L(G),
the language generated by G.

Answer:-
Since S → ^ is a production, S ^.  This implies that ^ L(G).
Now, for all n ≥ 1, we can write the following:
S 0S1 00S11 … 0nS1n 0n1n.

Q.6 Prove that “A tree G with n vertices has (n–1) edges”
Answer:-
We prove this theorem by induction on the number vertices n.
Basic step: If n = 1, then G contains only one vertex and no edge. So the number of edges in
G is n –1 = 1 – 1 = 0.

Induction hypothesis: The statement is true for all trees with less than ‘n’ vertices. Induction step: Now
let us consider a tree with ‘n’ vertices. Let ‘ek ’ be any edge in T whose end vertices are vi and v j.
Since T is a tree, by there is no other path between vI and v

Dear students get fully solved  SMU BBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601