Saturday 16 June 2018

SMU MSC IT 3RD SEM SPRING 2018 SOLVED ASSIGNMENTS


To get solved assignments even Projects and their Synopsis at Nominal prices.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362

SMU MSC IT 3RD SEM SOLVED ASSIGNMENTS SPRING 2018

PROGRAM
Master of Science in Information Technology (MSc IT) Revised Fall 2011
SEMESTER - 3
SUBJECT CODE & NAME
MIT306 – Object Oriented Analysis and Design (OOAD)
SET 1
Q1. What is usability testing? Write the rule for developing usability testing.
Answer:
Usability testing, a non-functional testing technique that is a measure of how easily the system can be used by end users. It is difficult to evaluate and measure but can be evaluated based on the below parameters:
·        Level of Skill required to learn/use the software. It should maintain the balance for both novice

Q2. What is meant by unified approach? Describe the steps, methods and tools of unified approach.
Answer:   Unified approach is a better way for understanding concepts of objects oriented system development. Unified approach is a methodology for software development. The unified approach, based on

Q3. Describe the various states of activity diagram.
Answer: Activity diagrams are special cases of state chart diagrams. An activity diagram has actions as states. It can be considered as some kind of elaborate flow diagram and has therefore some graphical stru

SET 2
Q1. Discuss the strategies for designing classes.
Answer: The object oriented design process is a complex process. The following methods can help you design better classes:
1)      Analyze the role of the objects of the class in the application. An object can play any of the

Q2. Mention and describe the basic categories of program errors.
Answer: Debugging is a process of finding errors in the code which cause unexpected results and eliminating them. The process of testing and identifying bugs is a balance of science, art and luc

Q3. Explain the following:
(a) Black box testing
(b) White box testing
Answer: (a) Black box testing
This treats the system as one that cannot be seen in detail. The structure of the program is not taken into account. The tests are performed based on what the program does. This is sometimes

Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362

PROGRAM
Master of Science in Information Technology (MSc IT) Revised Fall 2011
SEMESTER - 3
SUBJECT CODE & NAME
MIT307 - WEB TECHNOLOGIES
SET 1
Q1. Name the three types of pattern in event driven programming. Explain the advantages of event driven programming.
Answer:
In computer programming, event-driven programming is a programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses), sensor outputs, or messages from other programs/threads. Event-driven programming

Q2. Explain the features of XML. Write important rules for XML declaration?
Answer: XML is popular for many features and few of them are listed here:
1.           Easy Data Exchange: In XML, data and markup are stored as text that we can configure. If we like, we can use
2.            
Q3. Write any four importance of XML Schema. Discuss the steps to create an element with the XML designer.
Answer: Importance of XML schema
Schemas not only describe the permissible content of a document, they can:
 XML schema uses XML syntax. When you look at your first XML Schema, probably the most striking

SET 2

Q1. Define AJAX. Explain AJAX frameworks components.
Answer: Full form of AJAX is “Asynchronous JavaScript and XML”. AJAX is not a new programming language, but a new way to use existing standards.
It is a technique,
Q2. Describe the five different categories of PHP Operators.
Answer: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.
Q3.  What is meant by control statements in ASP. Explain with suitable example.
Answer: We can make a decision based on user input using an If statement. The If statement tests a condition and if the result is true then it runs the code that follows the If statement but if the result is false then it runs the code after the else statement. Here is an example for when someone enters their

Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362



PROGRAM
Master of Science in Information Technology (MSc IT) Revised Fall 2011
SEMESTER - 3
SUBJECT CODE & NAME
MIT3081 – High Speed Networks
Set 1
Q1.  Explain WLAN components.
Answer: WLAN components
A local area network (LAN) connects computers, printers and other devices to allow sharing of data and resources. LANs are limited to coverage of one location, typically a building, and usually use network cables for connections.

However, needing wires to connect devices can be inconvenient, especially in older buildings. As the name

Q2. Describe Multi-server queue using suitable diagrams and equations.
Answer:- The aim of the queuing analysis is to make use of analytic models to yield the desired parameters to determine the buffer size. The following two queuing models can be used as

Q3. What is meant by congestion? List and describe different types of congestion.
Answer:- The situation wherein network resources are constantly overloaded or the overall demand of a resource exceeds its capacity is termed as congestion. Congestion in a network occurs when the

Set 2

Q1. In TCP what is timer? Explain any timers that TCP maintains for every connection.
Answer: In TCP protocol, timers are applied in various positions and these timers restrain retransmissions and restrict the hold time for lost packets. Jiffies variable is the basis for all timers. Function pointers in a timer structure take a behavior function when initialized. Once the timer ends, this

Q2. What is meant by Resource Reservation Protocol (RSVP)? Write any three salient characteristics. List RSVP traffic types and explain any two.
Answer: RSVP is a signaling protocol that offers reservation setup and control. It enables Integrated Services (IntServ) which is designed to emulate circuits on the Internet. This is the most complex QoS

Q3.  With the help of suitable diagram explain Routing Information Protocol (RIP) message format. Mention two benefits and two drawbacks of RIP.
Answer:-  RIP is based on distance vector routing. It implements vector routing using the following considerations:
 An AS has both routers and networks. While routers have routing tables, networks don’t.
 The first column of a


Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362


PROGRAM
Master of Science in Information Technology (MSc IT) Revised Fall 2011
SEMESTER - 3
SUBJECT CODE & NAME
MIT3091 – Open Source System
Set 1
Q1. Elaborate the various types of Creative Common License.
Answer:- It is very important to know that the licensable properties come from an array of sources. The definitions of various proprietary types are not always apparent. Although every licensing program is

Q2. Write a short note on the following:
(a) MIT license.
(b) Advertising clause
Answer:
(a)   MIT license.
The Massachusetts Institute of
Technology initially developed a liberal software license which is called as the MIT license, for the release of X Window System source code. You can also call it as ‘X License’ or ‘MIT/X License’ or ‘X Window System License’.
The MIT license is nearly similar to the BSD (Berkeley Source Distribution) license which was developed at

Q3. (a) List any five features of Mozilla Public License.
(b) Comparison among GPL, LGPL, and MPL.
Answer:- (a) List any five features of Mozilla Public License.
You can say that the MPL differs from the GPL in the way it regulates the distribution and licensing of works

SET 2
Q1. Open-source is a good choice for companies, Justify it.
Answer: As we have understood how we could join an existing open source project and also end an open source project, let us now learn how we can inculcate an open source culture in a company.
Running an open source project or joining an existing one can also be applied to corporate source where all the users and contributors are the employees of the company. What changes when

Q2. Explain the drawbacks of open source and free software licensing.
Answer: As we are aware of the global scenario of open source and free software licenses, let us now understand the issues related to them.
You can observe that the advantages of open source licensing sometime in some situations act as

Q3. Discuss Cross licensing.
Answer: When two or more companies sign agreement providing the rights of their intellectual property to the other, then this agreement is known as the cross licensing agreement. For example, two companies holding software patents, under cross licensing, agree to share information about the patented software between them. Instead of blocking each other’s


Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362



SMU MCA 5th Sem solved assignment SPRING 2018


To get solved assignments even Projects and their Synopsis at Nominal prices.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362

SMU MCA 5th Sem assignment SPRING 2018
PROGRAM- MCA SEMESTER-V
SUBJECT CODE & NAME - MCA5010-WEB TECHNOLOGIES
CREDIT-4
MAX. MARKS-60
Qus:1 Differentiate between TCP and UDP
Answer:
Differentiate between TCP and UDP:
TCP (Transmission Control Protocol):
The TCP corresponds to the transport layer of OSI reference model, The TCP is known as a connection-oriented protocol, which means that connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged. TCP makes sure data gets to the destination without errors. It is also responsible for disassembling and assembling

Qus: 2 describe the features of XML. What are the important rules to keep in mind about the XML declaration?
Answer:
The features of XML:
XML is popular for many features and few of them are listed here:
1.  Easy Data Exchange: In XML, data and mark-up are stored as text that we can configure. If we like, we can use XML editors to create
2.  
   
Qus: 3. List and explain the Components of XML processor.
Answer.
Components of XML processor:
a) Parser:

Every XML processor has a parser. An XML parser converts an XML document into an XML DOM object - which can then be manipulated with a JavaScript. The parser's job is to translate XML mark-up and data into a stream of bite-sized nuggets, called tokens, to be used for processing. A token may be an element start tag, a string of character content

Qus:4. Describe the procedure of fetching data from XML to HTML. Give an example.
Answer.
Procedure of fetching data from XML to HTML:
The process of fetching data from an XML files to be filled in an HTML table, using DSO (Data Source Object) and JavaScript. DSO is an object that operates like a database on the client side. It will accept information that is organized in a certain way and

Qus:5. Describe five different categories of PHP Operators.
Answer.
Categories of PHP Operators:
In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.
Ø  Assignment Operators
Ø  Arithmetic Operators
Ø  Comparison

Qus:6. Describe about ASP.
Answer.
ASP:
The page on the server called by the JavaScript is an ASP file called AJAX server page. The server file could easily be rewritten in PHP, or some other server languages. Look at the example in PHP. The source code in "getcustomer.asp"

Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362





Spring 2018 ASSIGNMENT
PROGRAM-MCA (REVISED FALL 2012)
SEMESTER-V
SUBJECT CODE & NAME - MCA5020-ADVANCED SOFTWARE ENGINEERING
Qus:1 What do you mean by product life cycle? Explain the seven stages of product life cycle
Answer:
Product life cycle:
A series of steps is required to manufacture a product..The product developed should satisfy the customer. The series of steps involved in developing the product is called the product life cycle.

The stages of product life cycle:
The seven stages in a product life cycle are:

Qus: 2 List any ten major principles of agile software.
Answer.
 Principles of agile software:
The major principles of agile software are:

·         Satisfying
·         
·         
·         



Qus: 3. List the four developer practices of XP. Explain briefly about Adopt test-driven development
Answer:
Developer practices of XP:
XP values and the significance of time and resource for an XP practitioner. As a development model, the XP empowers the developers and stakeholders, associated with the project, to successfully carry out the project and develop efficient software.


Qus:4. Briefly explain about tracker and coach in XP.
Answer.
Tracker and coach in XP:
Tracker:

A tracker is a person who keeps track of the schedule. A tracker can be a manager or a trusted developer. XP keeps track of certain metrics that include team velocity. This is the ratio of ideal time estimated for accomplishing a task to the actual time spent implementing them. The tracker also includes other data


Qus:5. Explain XP prerequisites.
Answer.
XP prerequisites:
The following are the prerequisites for adopting XP:
Ø  Team agreement
Ø  A collocated team
Ø  On-site customers
Ø  The right team size
Ø  Use all XP practices

·         Team agreement: The team’s agreement to use XP is as important as management support. If team members do not want to use XP, it’s not likely to work. XP assumes that each team member’s willingness to adopt it. It is not a good practice to force the process on somebody who is resisting it.


Qus:6. List and explain any five basic principles of DSDM
Answer:
Principles of DSDM:
DSDM consists of nine basic principles. These principles form the cornerstones of development using DSDM and direct how development progresses. Ignoring any one of them will break with the frameworks philosophy and


Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362


SEMESTER - 5
SUBJECT CODE & NAME – MCA5032- WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4

Q1. Describe wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a

2 Describe any five GSM PLMN basic services.
Answer: 5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic answering machines used in wireless telephone network needs a controlling mechanism. For this purpose the GSM PLMN uses a tone signalling service


Q3. Differentiate BSC and MSC protocols. 10
Ans: BSC protocols: Once the information is communicated from the BTS to the BSC, the Abis
interface is used to an be routed to the user by the location information contained in the user’s HLR.

Q4. What is CDMA? Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be introduced to the concept of CDMA, its channel concept and its operation. Code Division Multiple Access technology emerged as an alternative to the GSM cellular architecture. Frequency reuse is an

Q5. Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans: A5 Algorithm – An A5 encryption algorithm scrambles the user's voice and data traffic between the handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being transmitted on the Um interface. The Kc (ciphering key) and the Plain text data are inputted into the A5 algorithm and

Q6. List and explain the different path loss models. 10
Ans: Path Loss Models: Path loss models describe the signal attenuation between a transmit and a receive antenna as a function of the propagation distance and other parameters. Some models include many details of the topography profile to estimate the signal reduction, whereas others just consider carrier frequency and distance. Path loss is the reduction in power density of an electromagnetic wave as it propagates through space. It is a major component in the analysis and design of the link budget of a


Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362






SPRING 2018
PROGRAM
MCA (REVISED FALL 2012)
SEMESTER - 5
SUBJECT CODE & NAME
MCA5042 - Cryptography and Network Security

1 a) List and explain the objectives of computer security.
b) What is the difference between passive and active security threats?
Answer: a) Objectives of Computer Security
Confidentiality
The first objective of security is confidentiality: keeping information away from people who should not have it. Accomplishing this objective requires that we know what data we are protecting and who should have access to it. It requires that we provide protection mechanisms for the data while it is

2 a) What is avalanche effect?
b) Explain data encryption standard (DES).
Answer: a) In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions wherein if when an input is changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause

3 Explain the evaluation criteria for Advanced Encryption Standard (AES).
Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice for years, if not decades. In January 1997, NIST called for cryptographers to develop a new encryption system. As with the call

4 a) What is key distribution?
b) Explain symmetric key distribution using symmetric encryption.
Answer: a) In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it
5 a) Describe the four types of protocol of SSL.
b) What is Transport Layer Security (TLS)? Explain.
Answer: a) The SSL defines four protocols in two layers. They are:
Change CipherSpec Protocol
The change CipherSpec protocol is responsible for sending change CipherSpec messages. At any time, the client can request to change current cryptographic parameters such as the handshake key exchange.

6 a) Discuss intrusion detection.
b) What do you mean by malicious software? Explain in detail.
Answer: a) Intrusion detection:
Closely related to audit reduction is the ability to detect security lapses, ideally while they occur. As we have seen in the State Department example, there may well be too much information in the audit log for a human to analyze, but

Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362

Friday 15 June 2018

SMU MCA SEM-5th SPRING 2018 SOLVED ASSIGNMENTS



SPRING-2018
Get solved assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362
PROGRAM-MCA
SEMESTER-V
MCA5010 - WEB TECHNOLOGIES
CREDIT-4
MAX. MARKS-60
Qus:1 Differentiate between TCP and UDP
Answer:
Differentiate between TCP and UDP:
TCP (Transmission Control Protocol):
The TCP corresponds to the transport layer of OSI reference model, The TCP is known as a connection-oriented protocol, which means that connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged. TCP makes sure data gets to the destination without errors. It is also responsible for disassembling and assembling

Qus: 2 describe the features of XML. What are the important rules to keep in mind about the XML declaration?
Answer:
The features of XML:
XML is popular for many features and few of them are listed here:
1.      Easy Data Exchange: In XML, data and mark-up are stored as text that we can configure. If we like, we can use XML editors to create
2.       
Qus: 3. List and explain the Components of XML processor.
Answer.
Components of XML processor:
a) Parser:

Every XML processor has a parser. An XML parser converts an XML document into an XML DOM object - which can then be manipulated with a JavaScript. The parser's job is to translate XML mark-up and data into a stream of bite-sized nuggets, called tokens, to be used for processing. A token may be an element start tag, a string of character content

Qus:4. Describe the procedure of fetching data from XML to HTML. Give an example.
Answer.
Procedure of fetching data from XML to HTML:
The process of fetching data from an XML files to be filled in an HTML table, using DSO (Data Source Object) and JavaScript. DSO is an object that operates like a database on the client side. It will accept information that is organized in a certain way and


Qus:5. Describe five different categories of PHP Operators.
Answer.
Categories of PHP Operators:
In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.

Ø  Assignment Operators
Ø  Arithmetic Operators
Ø  Comparison
Ø   



Qus:6. Describe about ASP.
Answer.
ASP:
The page on the server called by the JavaScript is an ASP file called AJAX server page. The server file could easily be rewritten in PHP, or some other server languages. Look at the example in PHP. The source code in "getcustomer.asp"



SPRING-2018
Get solved assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362
Spring 2018 ASSIGNMENT
MCA (REVISED FALL 2012)
SEMESTER-V
SUBJECT CODE & NAME-MCA5020-ADVANCED SOFTWARE ENGINEERING
Qus:1 What do you mean by product life cycle? Explain the seven stages of product life cycle
Answer:
Product life cycle:
A series of steps is required to manufacture a product..The product developed should satisfy the customer. The series of steps involved in developing the product is called the product life cycle.

The stages of product life cycle:
The seven stages in a product life cycle are:

Qus: 2 List any ten major principles of agile software.
Answer.
 Principles of agile software:
The major principles of agile software are:

·         Satisfying
·          
·          
·          



Qus: 3. List the four developer practices of XP. Explain briefly about Adopt test-driven development
Answer:
Developer practices of XP:
XP values and the significance of time and resource for an XP practitioner. As a development model, the XP empowers the developers and stakeholders, associated with the project, to successfully carry out the project and develop efficient software.


Qus:4. Briefly explain about tracker and coach in XP.
Answer.
Tracker and coach in XP:
Tracker:

A tracker is a person who keeps track of the schedule. A tracker can be a manager or a trusted developer. XP keeps track of certain metrics that include team velocity. This is the ratio of ideal time estimated for accomplishing a task to the actual time spent implementing them. The tracker also includes other data


Qus:5. Explain XP prerequisites.
Answer.
XP prerequisites:
The following are the prerequisites for adopting XP:
Ø  Team agreement
Ø  A collocated team
Ø  On-site customers
Ø  The right team size
Ø  Use all XP practices

·         Team agreement: The team’s agreement to use XP is as important as management support. If team members do not want to use XP, it’s not likely to work. XP assumes that each team member’s willingness to adopt it. It is not a good practice to force the process on somebody who is resisting it.


Qus:6. List and explain any five basic principles of DSDM
Answer:
Principles of DSDM:
DSDM consists of nine basic principles. These principles form the cornerstones of development using DSDM and direct how development progresses. Ignoring any one of them will break with the frameworks philosophy and


SPRING-2018
Get solved assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362

SEMESTER - 4
MCA5032 - WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4

Q1. Describe wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a



2 Describe any five GSM PLMN basic services.

Answer: 5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic answering machines used in wireless telephone network needs a controlling mechanism. For this purpose the GSM PLMN uses a tone signalling service

Q3. Differentiate BSC and MSC protocols. 10
Ans: BSC protocols: Once the information is communicated from the BTS to the BSC, the Abis
interface is used to

an be routed to the user by the location information contained in the user’s HLR.

Q4. What is CDMA? Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be introduced to the concept of CDMA, its channel concept and its operation. Code Division Multiple Access technology emerged as an alternative to the GSM cellular architecture. Frequency reuse is an




Q5. Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans: A5 Algorithm – An A5 encryption algorithm scrambles the user's voice and data traffic between the handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being transmitted on the Um interface. The Kc (ciphering key) and the
plaintext data are inputted into the A5 algorithm and

Q6. List and explain the different path loss models. 10
Ans: Path Loss Models: Path loss models describe the signal attenuation between a transmit and a receive antenna as a function of the propagation distance and other parameters. Some models include many details of the topography profile to estimate the signal reduction, whereas others just consider carrier frequency and distance. Path loss is the reduction in power density of an electromagnetic wave as it propagates through space. It is a major component in the analysis and design of the link budget of a

SPRING-2018
Get solved assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362

MCA (REVISED FALL 2012)
SEMESTER
5
SUBJECT CODE & NAME
MCA5042 - Cryptography and Network Security


1 a) List and explain the objectives of computer security.
b) What is the difference between passive and active security threats?

Answer: a) Objectives of Computer Security
Confidentiality
The first objective of security is confidentiality: keeping information away from people who should not have it. Accomplishing this objective requires that we know what data we are protecting and who should have access to it. It requires that we provide protection mechanisms for the data while it is



2 a) What is avalanche effect?
b) Explain data encryption standard (DES).

Answer: a) In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions wherein if when an input is changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause


3 Explain the evaluation criteria for Advanced Encryption Standard (AES).

Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice for years, if not decades. In January 1997, NIST called for cryptographers to develop a new encryption system. As with the call


4 a) What is key distribution?
b) Explain symmetric key distribution using symmetric encryption.

Answer: a) In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it


5 a) Describe the four types of protocol of SSL.
b) What is Transport Layer Security (TLS)? Explain.

Answer: a) The SSL defines four protocols in two layers. They are:
Change CipherSpec Protocol
The change CipherSpec protocol is responsible for sending change CipherSpec messages. At any time, the client can request to change current cryptographic parameters such as the handshake key exchange.



6 a) Discuss intrusion detection.
b) What do you mean by malicious software? Explain in detail.

Answer: a) Intrusion detection:
Closely related to audit reduction is the ability to detect security lapses, ideally while they occur. As we have seen in the State Department example, there may well be too much information in the audit log for a human to analyze, but



SPRING-2018
Get solved assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362