BCA 5 SEM

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Basics of OS (UNIX LINUX and Shell Programming)

Assignment A

  1. No. Questions Marks – 10

1 Brief about the initial process sequence while the system boots up.

2 How does the inode map to data block of a file?

3 Discuss in brief the mount and unmount system calls.

4 How do you create special files like named pipes and device files?

5 What are links and symbolic links in UNIX file system?

6 What are the Unix system calls for I/O?

7 Brief about the directory representation in UNIX.

8 How are devices represented in UNIX?

 

Assinment B

  1. Explain how the buffer cache is used by the file system.
  2. What is the difference between Swapping and Paging
  3. What is IPC? What are the various schemes available?

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

 

Data Communication and Computer Networks

1

2             When a network performs poorly, its users often complain to the administrators running it and demanding improvements. To improve the performance, the operators must first determine exactly what is going on? To find out what is really happening, the operators must make some measurements. What are these measurements?

3         What is Routing, Explain Shortest Path Routing algorithm with example?

4             Explain ISO – OSI , seven layer network architecture giving the functions of each layer.

5             With the help of neat sequence diagrams, explain–

(i)         Stop and wait protocol

(ii)         Go – back – N   ARQ sliding window protocol.

6             What is the difference between asynchronous and synchronous transmission?

7             Explain the various classifications of Computer Networks based on size, topology etc. Compare and contrast the advantages and disadvantages in each classification.

8             a ) Explain Ethernet MAC sub layer protocol with frame formats and also analyze its performance.

b) Given an IP address 192.168.0.5

  1. i) What is the binary equivalent of second octet?

ii) What is the class of this address?

iii) What is the network address of the given IP address?

 

Assingment B

 

Case Study:                                                                                         

 

            Congestion control refers to the techniques and mechanism that can either prevent congestion, before it happens, or remove congestion, after it has happened. In general, we can divide congestion control mechanism into two broad categories: Open loop congestion control (Prevention) and Closed-loop Congestion Control (Removal).

 

1. In how many way congestion control techniques can be applied? Explain.

 

 
2. In the given TCP network, R1 and R2 are two routers and network 1 and network 2 are the part of this TCP network. The input data rate of router R1 is 7 mb/s and output data rate of same router is 6.53 mb/s. Will there be congestion? If yes then how you will control the congestion in this TCP network

 

 

Assignment A Java Progamming

 

Explain the event delegation models in AWT.What are the components of an event?

 

2

 

Explain the concept of interface. What is scope and nature of variables and methods defined in an interface?

 

3

 

a) How does exception-handling work in Java?

 

b) Why Java doesn’t support multiple inheritances?

 

4

 

a) State the significance of public, private, protected, default modifiers

 

b) What are different types of inner classes?

 

5

 

What is a static method? Why can’t a static method use ‘this’ and ‘super’? Explain with example

 

 

6

 

Explain the concept of method overriding. Can we over-ride method within the same class? Explain.

 

7

 

a) What are native methods? How do you use them?

 

 

 

b)   What are wrapper classes? Why are they used?

 

8

 

What are the most important features of Java? How does Java achieve platform independence?

 

Assignment b

Read the following and create appropriate java applets.

Create a try block that is likely to generate two types of exception and then incorporate necessary catch block to handle them appropriately

b) Create a java applet with a button “Display”. On click of button it should display Rectangle, Oval and Circle within the Applet.

c) Create the following form in Java:-

  1. Subject should display name of subjects :-c++, VB, Java
  1. Foreign language should display choice of foreign languages French, German and Japanese.
  1. Submit button should submit the result.

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Assingment A

Wan Technologies

1             What protocol enables dynamic Frame Relay mapping? .When LMI Auto sense is in effect, what message type(s) does the DTE send to the DCE?

2             Is there a way to direct FC3 to use MS-CHAP V2 authentication across a PPP dialup connection? If so, how?

3             Compare MPLS and IPSec-VPNs as WAN technologies?

What are the advantages and disadvantages each technology?

4             What are the three types of VPNs? What type of VPNs link outside customers, suppliers, partners, or communities of interest to an enterprise customer’s network over a shared infrastructure using dedicated connections?

5             How many data-link connection identifier (DLCI)s can an interface support? Can Frame Relay Inverse Address Resolution Protocol (IARP) work without Local Management Interface (LMI)?

6             What is the Frame Relay broadcast queue?

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Assignment B

You need to troubleshoot a Cisco router at the Toronto office of How2Pass Inc. The

router loses its configuration each time it is rebooted. You study the output displayed

in the exhibit. What is the cause of the problem?

Exhibit:

—– output omitted —-

Cisco 2620 (MPC860) processor (revision 0x200) with

16384/2048K bytes of memory.

Processor board ID JAD05076EF6 (3878188963)

M860 processor: part number 0, mask 49

Bridging software.

X.25 software, Version 3.0.0.

2 Ethernet/IEEE 802.3 interface(s)

2 Serial(sync/async) network interface(s)

2 Low speed serial(sync/async) network interface(s)

32K bytes of non-volatile configuration memory.

16384K bytes of processor board System flash (Read/Write)

Configuration register is 0x2142

Please give your answer in at least 25 words and press save and continue button.

Which is the most secure encryption algorithm: DES, 3DES, or Diffie-Hellman?

How do cryptography-based keys ensure the validity of data transferred across

the network?

In a sub netted environment, how does the DHCP server discover what subnet a request has come from? If a physical LAN has more than one logical subnet, how can different groups of clients be allocated addresses on different subnets?

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Assingment A Software Engineering

Discuss the differences in the following:

 

 

 

(a) Top-down and bottom-up

 

(b) Black box and white box testing

 

 

 

2

 

What do you mean by software maintenance? Explain the maintenance tools in details in details.

 

 

 

3

 

Explain why a design with low coupling helps maintainability

 

4

 

What is software design? Discuss the design principles in detail.

 

 

 

 

 

5

 

Explain on the following:

 

(a)    Problem partitioning

 

(b)   Abstraction

 

 

 

 

 

6

 

What do you understand by software project scheduling? Write down the software project scheduling techniques.

 

 

 

7

 

Write short note

 

(a)    Software Cost Estimation

 

(b)   Team Structure

 

 

8

 

Answer any five of the questions below.

 

What do you understand by the term Software Development Life Cycle? Why is it important to adhere to a life cycle model while developing a large software system?

 

Assingment B

Case Study

Consider a program for determining the previous date. Its input is a triple of day, month and year with the values in the range

 

1 ≤ month ≤ 12

 

1 ≤ day ≤ 31

 

1900 ≤ year ≤ 2025

Q1. The possible outputs would be previous date or invalid input date. Design the boundary value test cases.

 

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

 

Leave a Reply

Your email address will not be published. Required fields are marked *