SlideShare une entreprise Scribd logo
1  sur  9
Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT DRIVE - SPRING 2018
PROGRAM - Master of Science in Information Technology (MSc IT)
SEMESTER - 2
SUBJECT CODE & NAME - MIT206 – OPERATING SYSTEM
Assignment Set - 1 Questions
Q1 Discuss in detail the process control block.
Answer:
While creating a process the operating system performs several operations. To identify these
process, it must identify each process, hence it assigns a process identification number (PID) to
each process. As the operating system supports multi-programming, it needs to keep track of the
all the processes. For this task, the process control block (PCB) is used to track the process’s
execution status.
Q2 Explain the priority CPU scheduling algorithm with example. Write the
disadvantages associated with this algorithm
Answer:
PriorityBasedScheduling
 Priority

Q3 Discuss Interprocess Communication. 10
Answer:-
Communication of co-operating processes’ shared-memory environment requires that these processes
share a common buffer pool, and that the code for implementing the buffer be explicitly written by the
application programmer. Another way to achieve the same effect is for the operating system to provide the
means for co-operating
Assignment Set - 2 Questions
Q1 Explain the following page replacement algorithm:
(a) Optimal
(b) LRU 5+5 10
Answer:-
a)
 Optimal Page replacement –
In this algorithm, pages are replaced which are not used for the longest duration of time in the
future.
Let us consider page reference string 7 0 1 2 0 3 0 4 2 3 0 3 2 and 4 page slots.
Initially all
Q2 Compare Daisy chain bus arbitration and Priority encoded bus arbitration. 5+5 10
Answer:-
Daisy chain arbitration:
Here, the requesting device or devices assert the signal bus_request. The bus arbiter returns the bus_grant
signal, which passes through each of the devices which can have access to the bus, as shown in figure below.
Here, the
Q3 List and explain different types of multiprocessor operating systems. 1+9 10
Answer:-
Three basic types of multiprocessor operating systems are:
 Separate supervisors
 Master / slave
 Symmetric
Separate supervisors
In separate
Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
DRIVE
SPRING 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT207– Data Base Management System(DBMS)
Assignment Set - 1
1 Describevarioustypesofattributewithreferenceto E-Rmodel withsuitableexample.
Answer: The entity-relationship (E-R) data model based on a perception of real world that consists of a set of
basic objects called entities, and of relationships among these objects. It was developed to facilitate database
design by allowing the specification of an enterprise schema, which represents the
2 What is databasemanager?Mentionanddescribetheimportant responsibilitiesofdatabasemanager
Answer: A database manager is a program module which provides the interface between the low level data
stored in the database and the application programs and queries submitted to the system. It is responsible for
interfacing with file system. One of the functionsof database manager is to convertuser's
3 Definecatalog.What informationisstoredinthe system catalogs?
Answer: A fundamental property of a database system is that it maintains a description of all the data that it
contains. A relational DBMS maintains information about every relation and index that it contains. The DBMS
also maintains information about views, for which no tuples are stored explicitly; rather, a definition of the
view is stored and used to compute the tuples that belong in the view when the
Assignment Set - 2
1 Explainthefollowingnormalforms:
(a) 2 NF
(b) 3 NF
Answer:
Normalization is a database design technique which organizes tables in a manner that reduces
redundancy and dependency of data.
It divides
2 List and explainthebasicoperationsofRelational algebra.
Answer:
Thesearebasicoperatorofrelational algebra:
 Union ()
 Difference( - )
 Intersection ()
 Cartesian Product(x)
Union()
If we assume that P and Q are two union-compatible relations, then the union of P and Q is set-theoretic union
of P and Q.
The resultant relation, R = P U Q, has tuples drawn fromP and Qsuch that
R = { t | P v t  Q }
3 Describedatadistributiononthebasisofbenefitsand drawbacks.
Answer:BenefitsofDataDistribution
Data sharing and Distributed Control: If a number of different sites are connected to each other, then a user
at one site may be able to access data that is available at another site. For example, in the distributed banking
system, it is possible fora user in one branch to access data in another branch. Withoutthis
Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
DRIVE
SPRING 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT208- ANALYSIS AND DESIGN OF ALGORITHMS
Assignment Set - 1
1 Defineandexplainrecursivealgorithmwithsuitableexample.
Answer:
A recursive algorithm is an algorithm which calls itself with "smaller (or simpler)" input values, and
which obtains the result for the current input by applying simple operations to the returned value for
the smaller (or simpler) input. More generally if a problem can be solved utilizing solutions to smaller
versions of the same problem, and the smaller versions reduce to easily solvable cases, then one can
use a recursive algorithm to solve that problem
2 Explainthevarioustypesofbasicefficiencyclasseswithsuitableexamples.
Answer: Even though the efficiency analysis framework puts together all the functions whose orders of growth
differ by a constant multiple, there are still infinitely many such classes. (For example, the exponential
functions an have different orders of growth for different values of base a.)
3 Describetheprocedureto performMergesortusingsuitableexample.
Answer: Merge sort is a sorting technique based on divide and conquers technique. With worst-case time
complexity being Ο(n log n), it is one of the most respected algorithms. While comparing two sublists for
merging, the first element of both lists is taken into consideration. While sorting in ascending order, the
Assignment Set - 2
1 What is meant by AVLtree?Discussthe fourrotationsinan AVLtree.
Answer: AVL tree is a self balanced binary search tree. That means, an AVL tree is also a binary search tree but
it is a balanced tree. A binary tree is said to be balanced, if the difference between the hieghts of left and right
subtrees of every node in the tree is either -1, 0 or +1. In other words, a binary tree is said to be balanced
2 DescribePrincipleofOptimality.ExplaintheKnapsackproblemwith example.
Answer: The principle of optimality states that an optimal sequence of decisions has the property that
whatever the initial state and decision are, the remaining decisions must constitute an optimal decision
sequence with regard to the state resulting from the first decision.
3 ForNP – Hardproblemsexplainanapproximationalgorithm.
Answer: Combinatorial optimization problems lie within a finite but huge feasible region. In this section, we
focuson finding approximation algorithms for optimization problems that are NP-Hard.
Underlyingprinciples
An NP-Hard
Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
DRIVE
SPRING 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
2
SUBJECT CODE & NAME
MIT209– Data Communication and Networking
Assignment Set - 1
1 What is meant by securityininternet? Describethefourcategoriesofnetwork securityproblems.
Answer:
Network security consists of the policies and practices adopted to prevent and
monitor unauthorized access, misuse, modification, or denial of a computer network and network-
accessible resources. Network security involves the authorization of access to data in a network
2 Explainthefollowing:
a) Characterstuffing
b) bit stuffing
Answer:a) Characterstuffing
This method gets around the problem of synchronization after an error by having each frame start and end
with special bytes. This method operates on bytes. The special bytes are reserved characters to
3 ExplaintheCSMA/CDprotocol withsuitablediagrams.
Answer:CSMA/CD Protocol
In computer networking, Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network
control protocol in which a carrier sensing scheme is used. A transmitting data station that detects another
signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for
Assignment Set - 2
1 Explainthefollowingroutingalgorithm:
(a) Multidestination
(b) Flooding
Answer: a. Routing is the process of selecting a path for traffic in a network, or between or across multiple
networks. Routing is performed for many types of networks, including circuit-switched networks, such as the
public switched telephone network (PSTN), computer networks, such as the Internet, as well as in networks
used in public and private transportation, such as the system of streets, roads, and
2 With the helpof suitablediagramdescribeTCPprotocol.
Answer: The TCP IP protocol suit can be considered as a major step stone for communication network.
Standards supported, flexibility and application supported, services provided for various application from user
end .The Transmission Control Protocol/InternetProtocol(TCP/IP) suiteUses standard
3 Mentionandexplainthe differentoperationsandresponseswithreferenceto Telnetprotocol.
Answer:TherearefourmodesofoperationformostTelnetclientsand servers.
1. Half-duplex: This is the default mode, but rarely used today . The default NVT is a half duplex device that
requires a GO AHEAD (GA) from the server before accepting user input. The user input is echoed locally from
the Get fully solved assignment. Buy online from website
www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Contenu connexe

Tendances

It110 assignment-1 answer key
It110 assignment-1 answer keyIt110 assignment-1 answer key
It110 assignment-1 answer keyJVM_
 
Lecture 4 duality and sensitivity in lp
Lecture 4 duality and sensitivity in lpLecture 4 duality and sensitivity in lp
Lecture 4 duality and sensitivity in lpkongara
 
Satisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai PlanningSatisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai Planningahmad bassiouny
 
SMU BSCIT fall 2014 assignments
SMU BSCIT fall 2014 assignmentsSMU BSCIT fall 2014 assignments
SMU BSCIT fall 2014 assignmentssolved_assignments
 
PR-134 How Does Batch Normalization Help Optimization?
PR-134 How Does Batch Normalization Help Optimization?PR-134 How Does Batch Normalization Help Optimization?
PR-134 How Does Batch Normalization Help Optimization?jaewon lee
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
From_seq2seq_to_BERT
From_seq2seq_to_BERTFrom_seq2seq_to_BERT
From_seq2seq_to_BERTHuali Zhao
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionIJTET Journal
 
Fundamentals of algorithms
Fundamentals of algorithmsFundamentals of algorithms
Fundamentals of algorithmsAmit Kumar Rathi
 

Tendances (14)

It110 assignment-1 answer key
It110 assignment-1 answer keyIt110 assignment-1 answer key
It110 assignment-1 answer key
 
Lecture 4 duality and sensitivity in lp
Lecture 4 duality and sensitivity in lpLecture 4 duality and sensitivity in lp
Lecture 4 duality and sensitivity in lp
 
Satisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai PlanningSatisfaction And Its Application To Ai Planning
Satisfaction And Its Application To Ai Planning
 
025 chapter iv
025 chapter iv025 chapter iv
025 chapter iv
 
SMU BSCIT fall 2014 assignments
SMU BSCIT fall 2014 assignmentsSMU BSCIT fall 2014 assignments
SMU BSCIT fall 2014 assignments
 
PR-134 How Does Batch Normalization Help Optimization?
PR-134 How Does Batch Normalization Help Optimization?PR-134 How Does Batch Normalization Help Optimization?
PR-134 How Does Batch Normalization Help Optimization?
 
Dynamic Programming | Economics
Dynamic Programming | EconomicsDynamic Programming | Economics
Dynamic Programming | Economics
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Analysis and Performance Prediction of Students Using Fuzzy Relations and Int...
Analysis and Performance Prediction of Students Using Fuzzy Relations and Int...Analysis and Performance Prediction of Students Using Fuzzy Relations and Int...
Analysis and Performance Prediction of Students Using Fuzzy Relations and Int...
 
From_seq2seq_to_BERT
From_seq2seq_to_BERTFrom_seq2seq_to_BERT
From_seq2seq_to_BERT
 
FractalTreeIndex
FractalTreeIndexFractalTreeIndex
FractalTreeIndex
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
 
Fundamentals of algorithms
Fundamentals of algorithmsFundamentals of algorithms
Fundamentals of algorithms
 
Lesson 28
Lesson 28Lesson 28
Lesson 28
 

Similaire à smu msc it 2 sem spring 2018 july/aug 2018 exam solved assignment

Mb0048 operations research
Mb0048 operations researchMb0048 operations research
Mb0048 operations researchsmumbahelp
 
Om0010 operations management
Om0010 operations managementOm0010 operations management
Om0010 operations managementsmumbahelp
 
Analysis of Algorithm II Unit version .pptx
Analysis of Algorithm  II Unit version .pptxAnalysis of Algorithm  II Unit version .pptx
Analysis of Algorithm II Unit version .pptxrajesshs31r
 
Algorithm Using Divide And Conquer
Algorithm Using Divide And ConquerAlgorithm Using Divide And Conquer
Algorithm Using Divide And ConquerUrviBhalani2
 
Mca5033 open source db systems
Mca5033 open source db systemsMca5033 open source db systems
Mca5033 open source db systemssmumbahelp
 
2.03.Asymptotic_analysis.pptx
2.03.Asymptotic_analysis.pptx2.03.Asymptotic_analysis.pptx
2.03.Asymptotic_analysis.pptxssuser1fb3df
 
Heuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient searchHeuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient searchGreg Makowski
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd semsmumbahelp
 
17 2 expert systems
17 2 expert systems17 2 expert systems
17 2 expert systemsTianlu Wang
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management systemStudy Stuff
 
complexity analysis.pdf
complexity analysis.pdfcomplexity analysis.pdf
complexity analysis.pdfpasinduneshan
 
Bca2020 data structure and algorithm
Bca2020   data structure and algorithmBca2020   data structure and algorithm
Bca2020 data structure and algorithmsmumbahelp
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systemssmumbahelp
 
ITB Term Paper - 10BM60066
ITB Term Paper - 10BM60066ITB Term Paper - 10BM60066
ITB Term Paper - 10BM60066rahulsm27
 
Final Project Report
Final Project ReportFinal Project Report
Final Project ReportRiddhi Shah
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating systemsmumbahelp
 

Similaire à smu msc it 2 sem spring 2018 july/aug 2018 exam solved assignment (20)

Mb0048 operations research
Mb0048 operations researchMb0048 operations research
Mb0048 operations research
 
Om0010 operations management
Om0010 operations managementOm0010 operations management
Om0010 operations management
 
Analysis of Algorithm II Unit version .pptx
Analysis of Algorithm  II Unit version .pptxAnalysis of Algorithm  II Unit version .pptx
Analysis of Algorithm II Unit version .pptx
 
Algorithm Using Divide And Conquer
Algorithm Using Divide And ConquerAlgorithm Using Divide And Conquer
Algorithm Using Divide And Conquer
 
Daa unit 2
Daa unit 2Daa unit 2
Daa unit 2
 
Daa unit 2
Daa unit 2Daa unit 2
Daa unit 2
 
Telecom Churn Analysis
Telecom Churn AnalysisTelecom Churn Analysis
Telecom Churn Analysis
 
Mca5033 open source db systems
Mca5033 open source db systemsMca5033 open source db systems
Mca5033 open source db systems
 
2.03.Asymptotic_analysis.pptx
2.03.Asymptotic_analysis.pptx2.03.Asymptotic_analysis.pptx
2.03.Asymptotic_analysis.pptx
 
Heuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient searchHeuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient search
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd sem
 
17 2 expert systems
17 2 expert systems17 2 expert systems
17 2 expert systems
 
Ms 51 & 55
Ms 51 & 55Ms 51 & 55
Ms 51 & 55
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management system
 
complexity analysis.pdf
complexity analysis.pdfcomplexity analysis.pdf
complexity analysis.pdf
 
Bca2020 data structure and algorithm
Bca2020   data structure and algorithmBca2020   data structure and algorithm
Bca2020 data structure and algorithm
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
ITB Term Paper - 10BM60066
ITB Term Paper - 10BM60066ITB Term Paper - 10BM60066
ITB Term Paper - 10BM60066
 
Final Project Report
Final Project ReportFinal Project Report
Final Project Report
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating system
 

Dernier

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Dernier (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

smu msc it 2 sem spring 2018 july/aug 2018 exam solved assignment

  • 1. Get fully solved assignment. Buy online from website www.smuassignment.in online store or plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate Charges rs 125/subject if urgent then call us on 08791490301, 08273413412 ASSIGNMENT DRIVE - SPRING 2018 PROGRAM - Master of Science in Information Technology (MSc IT) SEMESTER - 2 SUBJECT CODE & NAME - MIT206 – OPERATING SYSTEM Assignment Set - 1 Questions Q1 Discuss in detail the process control block. Answer: While creating a process the operating system performs several operations. To identify these process, it must identify each process, hence it assigns a process identification number (PID) to each process. As the operating system supports multi-programming, it needs to keep track of the all the processes. For this task, the process control block (PCB) is used to track the process’s execution status. Q2 Explain the priority CPU scheduling algorithm with example. Write the disadvantages associated with this algorithm Answer: PriorityBasedScheduling  Priority
  • 2.  Q3 Discuss Interprocess Communication. 10 Answer:- Communication of co-operating processes’ shared-memory environment requires that these processes share a common buffer pool, and that the code for implementing the buffer be explicitly written by the application programmer. Another way to achieve the same effect is for the operating system to provide the means for co-operating Assignment Set - 2 Questions Q1 Explain the following page replacement algorithm: (a) Optimal (b) LRU 5+5 10 Answer:- a)  Optimal Page replacement – In this algorithm, pages are replaced which are not used for the longest duration of time in the future. Let us consider page reference string 7 0 1 2 0 3 0 4 2 3 0 3 2 and 4 page slots. Initially all Q2 Compare Daisy chain bus arbitration and Priority encoded bus arbitration. 5+5 10 Answer:- Daisy chain arbitration: Here, the requesting device or devices assert the signal bus_request. The bus arbiter returns the bus_grant signal, which passes through each of the devices which can have access to the bus, as shown in figure below. Here, the Q3 List and explain different types of multiprocessor operating systems. 1+9 10
  • 3. Answer:- Three basic types of multiprocessor operating systems are:  Separate supervisors  Master / slave  Symmetric Separate supervisors In separate Get fully solved assignment. Buy online from website www.smuassignment.in online store or plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate Charges rs 125/subject if urgent then call us on 08791490301, 08273413412 Get fully solved assignment. Buy online from website www.smuassignment.in online store or plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate
  • 4. Charges rs 125/subject if urgent then call us on 08791490301, 08273413412 DRIVE SPRING 2018 PROGRAM Master of Science in Information Technology(MSc IT) SEMESTER 2 SUBJECT CODE & NAME MIT207– Data Base Management System(DBMS) Assignment Set - 1 1 Describevarioustypesofattributewithreferenceto E-Rmodel withsuitableexample. Answer: The entity-relationship (E-R) data model based on a perception of real world that consists of a set of basic objects called entities, and of relationships among these objects. It was developed to facilitate database design by allowing the specification of an enterprise schema, which represents the 2 What is databasemanager?Mentionanddescribetheimportant responsibilitiesofdatabasemanager Answer: A database manager is a program module which provides the interface between the low level data stored in the database and the application programs and queries submitted to the system. It is responsible for interfacing with file system. One of the functionsof database manager is to convertuser's 3 Definecatalog.What informationisstoredinthe system catalogs? Answer: A fundamental property of a database system is that it maintains a description of all the data that it contains. A relational DBMS maintains information about every relation and index that it contains. The DBMS also maintains information about views, for which no tuples are stored explicitly; rather, a definition of the view is stored and used to compute the tuples that belong in the view when the Assignment Set - 2 1 Explainthefollowingnormalforms: (a) 2 NF (b) 3 NF Answer: Normalization is a database design technique which organizes tables in a manner that reduces redundancy and dependency of data. It divides 2 List and explainthebasicoperationsofRelational algebra. Answer: Thesearebasicoperatorofrelational algebra:
  • 5.  Union ()  Difference( - )  Intersection ()  Cartesian Product(x) Union() If we assume that P and Q are two union-compatible relations, then the union of P and Q is set-theoretic union of P and Q. The resultant relation, R = P U Q, has tuples drawn fromP and Qsuch that R = { t | P v t  Q } 3 Describedatadistributiononthebasisofbenefitsand drawbacks. Answer:BenefitsofDataDistribution Data sharing and Distributed Control: If a number of different sites are connected to each other, then a user at one site may be able to access data that is available at another site. For example, in the distributed banking system, it is possible fora user in one branch to access data in another branch. Withoutthis Get fully solved assignment. Buy online from website www.smuassignment.in online store or plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate Charges rs 125/subject if urgent then call us on 08791490301, 08273413412 Get fully solved assignment. Buy online from website www.smuassignment.in online store or plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate Charges rs 125/subject if urgent then call us on 08791490301, 08273413412
  • 6. DRIVE SPRING 2018 PROGRAM Master of Science in Information Technology(MSc IT) SEMESTER 2 SUBJECT CODE & NAME MIT208- ANALYSIS AND DESIGN OF ALGORITHMS Assignment Set - 1 1 Defineandexplainrecursivealgorithmwithsuitableexample. Answer: A recursive algorithm is an algorithm which calls itself with "smaller (or simpler)" input values, and which obtains the result for the current input by applying simple operations to the returned value for the smaller (or simpler) input. More generally if a problem can be solved utilizing solutions to smaller versions of the same problem, and the smaller versions reduce to easily solvable cases, then one can use a recursive algorithm to solve that problem 2 Explainthevarioustypesofbasicefficiencyclasseswithsuitableexamples. Answer: Even though the efficiency analysis framework puts together all the functions whose orders of growth differ by a constant multiple, there are still infinitely many such classes. (For example, the exponential functions an have different orders of growth for different values of base a.) 3 Describetheprocedureto performMergesortusingsuitableexample. Answer: Merge sort is a sorting technique based on divide and conquers technique. With worst-case time complexity being Ο(n log n), it is one of the most respected algorithms. While comparing two sublists for merging, the first element of both lists is taken into consideration. While sorting in ascending order, the Assignment Set - 2 1 What is meant by AVLtree?Discussthe fourrotationsinan AVLtree. Answer: AVL tree is a self balanced binary search tree. That means, an AVL tree is also a binary search tree but it is a balanced tree. A binary tree is said to be balanced, if the difference between the hieghts of left and right subtrees of every node in the tree is either -1, 0 or +1. In other words, a binary tree is said to be balanced 2 DescribePrincipleofOptimality.ExplaintheKnapsackproblemwith example. Answer: The principle of optimality states that an optimal sequence of decisions has the property that whatever the initial state and decision are, the remaining decisions must constitute an optimal decision sequence with regard to the state resulting from the first decision. 3 ForNP – Hardproblemsexplainanapproximationalgorithm. Answer: Combinatorial optimization problems lie within a finite but huge feasible region. In this section, we focuson finding approximation algorithms for optimization problems that are NP-Hard.
  • 7. Underlyingprinciples An NP-Hard Get fully solved assignment. Buy online from website www.smuassignment.in online store or plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate Charges rs 125/subject if urgent then call us on 08791490301, 08273413412 Get fully solved assignment. Buy online from website www.smuassignment.in online store or plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate Charges rs 125/subject if urgent then call us on 08791490301, 08273413412 DRIVE SPRING 2018 PROGRAM Master of Science in Information Technology(MSc IT) SEMESTER 2 SUBJECT CODE & NAME MIT209– Data Communication and Networking Assignment Set - 1
  • 8. 1 What is meant by securityininternet? Describethefourcategoriesofnetwork securityproblems. Answer: Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. Network security involves the authorization of access to data in a network 2 Explainthefollowing: a) Characterstuffing b) bit stuffing Answer:a) Characterstuffing This method gets around the problem of synchronization after an error by having each frame start and end with special bytes. This method operates on bytes. The special bytes are reserved characters to 3 ExplaintheCSMA/CDprotocol withsuitablediagrams. Answer:CSMA/CD Protocol In computer networking, Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network control protocol in which a carrier sensing scheme is used. A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for Assignment Set - 2 1 Explainthefollowingroutingalgorithm: (a) Multidestination (b) Flooding Answer: a. Routing is the process of selecting a path for traffic in a network, or between or across multiple networks. Routing is performed for many types of networks, including circuit-switched networks, such as the public switched telephone network (PSTN), computer networks, such as the Internet, as well as in networks used in public and private transportation, such as the system of streets, roads, and 2 With the helpof suitablediagramdescribeTCPprotocol. Answer: The TCP IP protocol suit can be considered as a major step stone for communication network. Standards supported, flexibility and application supported, services provided for various application from user end .The Transmission Control Protocol/InternetProtocol(TCP/IP) suiteUses standard 3 Mentionandexplainthe differentoperationsandresponseswithreferenceto Telnetprotocol. Answer:TherearefourmodesofoperationformostTelnetclientsand servers. 1. Half-duplex: This is the default mode, but rarely used today . The default NVT is a half duplex device that requires a GO AHEAD (GA) from the server before accepting user input. The user input is echoed locally from the Get fully solved assignment. Buy online from website www.smuassignment.in online store or
  • 9. plz drop a mail with your sub code computeroperator4@gmail.com we will revert you within 2-3 hour or immediate Charges rs 125/subject if urgent then call us on 08791490301, 08273413412