SPRING-2018
Get solved
assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362
PROGRAM-MCA
SEMESTER-V
MCA5010 - WEB TECHNOLOGIES
CREDIT-4
MAX. MARKS-60
Qus:1
Differentiate between TCP and UDP
Answer:
Differentiate
between TCP and UDP:
TCP
(Transmission Control Protocol):
The TCP corresponds to the transport layer of
OSI reference model, The TCP is known as a connection-oriented protocol, which
means that connection is established and maintained until such time as the
message or messages to be exchanged by the application programs at each end
have been exchanged. TCP makes sure data gets to the destination without
errors. It is also responsible for disassembling and assembling
Qus:
2 describe the features of XML. What are the important rules to keep in mind
about the XML declaration?
Answer:
The
features of XML:
XML is popular for many features and few of
them are listed here:
1.
Easy Data Exchange: In XML, data and mark-up are stored as text
that we can configure. If we like, we can use XML editors to create
2.
Qus: 3. List
and explain the Components of XML processor.
Answer.
Components
of XML processor:
a) Parser:
Every XML processor has a parser. An
XML parser converts an XML document into an XML DOM object - which can then be
manipulated with a JavaScript. The parser's job is to translate XML mark-up and
data into a stream of bite-sized nuggets, called tokens, to be used for
processing. A token may be an element start tag, a string of character content
Qus:4.
Describe the procedure of fetching data from XML to HTML. Give an example.
Answer.
Procedure
of fetching data from XML to HTML:
The process of fetching data from an
XML files to be filled in an HTML table, using DSO (Data Source Object) and
JavaScript. DSO is an object that operates like a database on the client side.
It will accept information that is organized in a certain way and
Qus:5.
Describe five different categories of PHP Operators.
Answer.
Categories
of PHP Operators:
In all programming languages,
operators are used to manipulate or perform operations on variables and values.
There are many operators used in PHP, so we have separated them into the
following categories to make it easier to learn them all.
Ø
Assignment
Operators
Ø Arithmetic Operators
Ø Comparison
Ø
Qus:6.
Describe about ASP.
Answer.
ASP:
The page on the server called by the
JavaScript is an ASP file called AJAX server page. The server file could easily
be rewritten in PHP, or some other server languages. Look at the example in
PHP. The source code in "getcustomer.asp"
SPRING-2018
Get solved
assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362
Spring 2018 ASSIGNMENT
MCA (REVISED FALL 2012)
SEMESTER-V
SUBJECT CODE &
NAME-MCA5020-ADVANCED SOFTWARE ENGINEERING
Qus:1
What do you mean by product life cycle? Explain the seven stages of product
life cycle
Answer:
Product
life cycle:
A series of steps is required to
manufacture a product..The product developed should satisfy the customer. The
series of steps involved in developing the product is called the product life
cycle.
The
stages of product life cycle:
The seven stages in a product life
cycle are:
Qus:
2 List any ten major principles of agile software.
Answer.
Principles of agile software:
The major principles of agile software
are:
·
Satisfying
·
·
·
Qus:
3. List the four developer practices of XP. Explain briefly about Adopt
test-driven development
Answer:
Developer
practices of XP:
XP values and the significance of time
and resource for an XP practitioner. As a development model, the XP empowers
the developers and stakeholders, associated with the project, to successfully
carry out the project and develop efficient software.
Qus:4.
Briefly explain about tracker and coach in XP.
Answer.
Tracker
and coach in XP:
Tracker:
A tracker is a person who keeps track
of the schedule. A tracker can be a manager or a trusted developer. XP keeps
track of certain metrics that include team velocity. This is the ratio of ideal
time estimated for accomplishing a task to the actual time spent implementing
them. The tracker also includes other data
Qus:5.
Explain XP prerequisites.
Answer.
XP
prerequisites:
The following are the prerequisites
for adopting XP:
Ø Team agreement
Ø A collocated team
Ø On-site customers
Ø The right team size
Ø Use all XP practices
·
Team agreement: The team’s agreement to use XP is as important as management
support. If team members do not want to use XP, it’s not likely to work. XP
assumes that each team member’s willingness to adopt it. It is not a good
practice to force the process on somebody who is resisting it.
Qus:6. List
and explain any five basic principles of DSDM
Answer:
Principles
of DSDM:
DSDM consists of nine basic
principles. These principles form the cornerstones of development using DSDM
and direct how development progresses. Ignoring any one of them will break with
the frameworks philosophy and
SPRING-2018
Get solved
assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362
SEMESTER - 4
MCA5032 - WIRELESS AND MOBILE
COMMUNICATION
CREDIT - 4
Q1. Describe
wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to mankind. Wireless
communication involves the transmission of information over a distance without
help of wires, cables or any other forms of electrical conductors. The
transmitted distance can be anywhere between a few meters (for example, a
2 Describe any five GSM PLMN basic services.
Answer:
5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The
automatic answering machines used in wireless telephone network needs a
controlling mechanism. For this purpose the GSM PLMN uses a tone signalling
service
Q3.
Differentiate BSC and MSC protocols. 10
Ans:
BSC protocols: Once
the information is communicated from the BTS to the BSC, the Abis
interface is used to
an be routed to the user by the
location information contained in the user’s HLR.
Q4. What is
CDMA? Explain the history of CDMA. 4+6 = 10
Ans:
CDMA : we will be introduced to the concept of CDMA, its channel concept
and its operation. Code Division Multiple Access technology emerged as an
alternative to the GSM cellular architecture. Frequency reuse is an
Q5. Explain
the following: a) A5 algorithm for encryption b) A8 algorithm for key
generation 10
Ans:
A5 Algorithm – An
A5 encryption algorithm scrambles the user's voice and data traffic between the
handset and the base station to provide privacy. An A5 algorithm is implemented
in both the handset and the base station subsystem (BSS). This algorithm is
used to encipher and decipher the data that is being transmitted on the Um
interface. The Kc (ciphering key) and the
plaintext data are inputted into the
A5 algorithm and
Q6. List and
explain the different path loss models. 10
Ans:
Path Loss Models: Path
loss models describe the signal attenuation between a transmit and a receive
antenna as a function of the propagation distance and other parameters.
Some models include many details of the topography profile to estimate
the signal reduction, whereas others just consider carrier frequency and
distance. Path loss is the reduction in power density of an electromagnetic
wave as it propagates through space. It is a major component in the
analysis and design of the link budget of a
SPRING-2018
Get solved
assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362
MCA (REVISED FALL 2012)
SEMESTER
5
SUBJECT CODE & NAME
MCA5042 - Cryptography and Network
Security
1 a) List and
explain the objectives of computer security.
b) What is the
difference between passive and active security threats?
Answer:
a) Objectives of Computer Security
Confidentiality
The first objective of security is confidentiality: keeping
information away from people who should not have it. Accomplishing this
objective requires that we know what data we are protecting and who should have
access to it. It requires that we provide protection mechanisms for the data
while it is
2 a) What is
avalanche effect?
b) Explain data
encryption standard (DES).
Answer:
a) In cryptography, the avalanche effect is the desirable property of
cryptographic algorithms, typically block ciphers and cryptographic hash
functions wherein if when an input is changed slightly (for example, flipping a
single bit) the output changes significantly (e.g., half the output bits flip).
In the case of high-quality block ciphers, such a small change in either the key
or the plaintext should cause
3 Explain the
evaluation criteria for Advanced Encryption Standard (AES).
Answer:
The AES is likely to be the commercial-grade symmetric algorithm of choice for
years, if not decades. In January 1997, NIST called for cryptographers to
develop a new encryption system. As with the call
4 a) What is key
distribution?
b) Explain
symmetric key distribution using symmetric encryption.
Answer:
a) In symmetric key cryptography, both parties must possess a secret key which
they must exchange prior to using any encryption. Distribution of secret keys
has been problematic until recently, because it
5 a) Describe the
four types of protocol of SSL.
b) What is
Transport Layer Security (TLS)? Explain.
Answer:
a) The SSL defines four protocols in two layers. They are:
Change CipherSpec
Protocol
The change CipherSpec protocol is responsible for sending change
CipherSpec messages. At any time, the client can request to change current
cryptographic parameters such as the handshake key exchange.
6 a) Discuss
intrusion detection.
b) What do you
mean by malicious software? Explain in detail.
Answer:
a) Intrusion detection:
Closely related to audit reduction is the ability to detect
security lapses, ideally while they occur. As we have seen in the State
Department example, there may well be too much information in the audit log for
a human to analyze, but
SPRING-2018
Get solved
assignments at nominal price.
Mail us at: subjects4u@gmail.com or contact at
08894344452, 8219081362
No comments:
Post a Comment