0% found this document useful (0 votes)
97 views51 pages

Assignment Mca

The document outlines a list of assignments for various subjects in the Master of Computer Application program at NRI Institute of Information Science & Technology, Bhopal. Each subject includes multiple assignments with specific questions related to topics such as DBMS, Computer Networks, Software Engineering, and Algorithm Design. The assignments are structured to assess students' understanding of core concepts and practical applications in computer science.

Uploaded by

Dev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views51 pages

Assignment Mca

The document outlines a list of assignments for various subjects in the Master of Computer Application program at NRI Institute of Information Science & Technology, Bhopal. Each subject includes multiple assignments with specific questions related to topics such as DBMS, Computer Networks, Software Engineering, and Algorithm Design. The assignments are structured to assess students' understanding of core concepts and practical applications in computer science.

Uploaded by

Dev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 51

NRI INSTITUTE OF INFORMATION

SCIENCE & TECHNOLOGY BHOPAL


FORM NO

NIIST BHOPAL
DEPT NAME : MASTER OF COMPUTER
APPLICATION
BRANCH MCA REV. NO
LIST OF ASSIGNMENTS
SESSION REV. DT
NAME OF FACULTY :
SUBJECT: SUBJECT CODE: MCA-101
ASSIGNMENT - 1
Q.1
Q.2
Q.3
Q.4
Q.5
ASSIGNMENT - 2
Q.1
Q.2
Q.3
Q.4
Q.5

ASSIGNMENT - 3
Q.1
Q.2
Q.3
Q.4
Q.5
ASSIGNMENT - 4
Q.1
Q.2
Q.3
Q.4
Q.5
ASSIGNMENT - 5
Q.1
Q.2
Q.3
Q.4
Q.5
NIRT/A/16

30/06/2011
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY BHOPAL
FORM NO

NIIST BHOPAL
DEPT NAME : MASTER OF COMPUTER
APPLICATION
BRANCH MCA LIST OF ASSIGNMENTS REV. NO
SESSION REV. DT
NAME OF FACULTY :
SUBJECT: SUBJECT CODE: MCA-102

ASSIGNMENT - 1
Q.1 Solution of the matrix solution Ax = B
Q.2 Explain Row - Reduced echelon form .
Q.3 Explain Consistently of a system of linear equations.
Q.4 introduction to Matrices ?
Q.5 Explain Eigen values and eigen vectors.

ASSIGNMENT - 2
Q.1 Explain Properties - Cayley Hemilton Theorem .
Q.2 What is the Inverse of a matrix ?
Q.3 Explain Functions definition and introduction .
Q.4 Difine the Functions of a single variable ?
Q.5 Explain Limit, Continuity, Differentiability and examples .

ASSIGNMENT - 3
Q.1 Explain Indeterminate forms, L'hospital rule .
Q.2 What is the Maxima minima, product and chain rule ?
Q.3 Explain Beta and gamma functions .
Q.4 What is the functions of multiple variable .
Q.5 Explain Limit, continuity, partial derivatives .

ASSIGNMENT - 4
Q.1 Explain Noramal student's t, chi- square .
Q.2 Explain distribution for testing of mean .
Q.3 Difference of means variance and prop.
Q.4 Explain Probability - axioms of probability .
Q.5 Exampls of Probability mass function .

ASSIGNMENT - 5
Q.1 what is the Counting functions, countability basic proof techniques ?
Q.2 Explain Logic data structure, queues, arrays, graphs , hash tables, trees .
Q.3 Drfine the Graph properties, connected, components, degrees ?
Q.4 Explain Maximum flows\ minimum cut concepts, graphs coloring .
Q.5 What is the Probability density functions ? Explain Normal distribution .
NIRT/A/16

0
30/06/2011
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY FORM NO
BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION
BRANCH MCA LIST OF ASSIGNMENTS REV. NO
SESSION REV. DT
NAME OF FACULTY :
SUBJECT: SUBJECT CODE: MCA-103
ASSIGNMENT - 1
Q.1
Q.2
Q.3
Q.4
Q.5
ASSIGNMENT - 2
Q.1
Q.2
Q.3
Q.4
Q.5
ASSIGNMENT - 3
Q.1
Q.2
Q.3
Q.4
Q.5
ASSIGNMENT - 4
Q.1
Q.2
Q.3
Q.4
Q.5
ASSIGNMENT - 5
Q.1
Q.2
Q.3
Q.4
Q.5
NIRT/A/16

0
30/06/2011
NRI INSTITUTE OF INFORMATION FORM NO
SCIENCE & TECHNOLOGY BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION

BRANCH MCA LIST OF ASSIGNMENTS REV. NO


SESSION REV. DT
NAME OF FACULTY :
SUBJECT: SUBJECT CODE: MCA-104

ASSIGNMENT - 1
Q.1
Q.2
Q.3
Q.4
Q.5

ASSIGNMENT - 2
Q.1
Q.2
Q.3
Q.4
Q.5

ASSIGNMENT - 3
Q.1
Q.2
Q.3
Q.4
Q.5

ASSIGNMENT - 4
Q.1
Q.2
Q.3
Q.4
Q.5

ASSIGNMENT - 5
Q.1
Q.2
Q.3
Q.4
Q.5
NIRT/A/16

0
30/06/2011
NRI INSTITUTE OF INFORMATION FORM NO
SCIENCE & TECHNOLOGY BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION

BRANCH MCA LIST OF ASSIGNMENTS REV. NO

SESSION REV. DT
NAME OF FACULTY :
SUBJECT: SUBJECT CODE: MCA-105

ASSIGNMENT - 1
Q.1 Introduction to Listening ?
Q.2 What is the Barriers of listening ?
Q.3 How to improve listening .
Q.4 Explain Speaking skills .
Q.5 Explain para language .

ASSIGNMENT - 2
Q.1 Explain Art of conversation .
Q.2 Explain Presentation skills .
Q.3 Explain Public speaking .
Q.4 Explain Expression techniques .
Q.5 Explain Reading .

ASSIGNMENT - 3
Q.1 Explain Kinds of reading .
Q.2 Explain Causes of reading difficulties.
Q.3 Explain Reading strategies .
Q.4 Explain Effective writing .
Q.5 Explain Paragraph ,Essay .

ASSIGNMENT - 4
Q.1 Explain Letters .
Q.2 Explain Articles, Notices, Agenda & Minutes.
Q.3 What is the communication ?Explain modes of communication.
Q.4 Explain Barriers of communication .
Q.5 Explain Interpersonal skills .

ASSIGNMENT - 5
Q.1 Explain Group discussion .
Q.2 Explain Team Building and team work .
Q.3 Explain Decision making .
Q.4 Explain Time and stress management .
Q.5 What is the Interview skills ?Explain Types of interview .
NIRT/A/16

30/06/2011
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY BHOPAL
FORM NO NIRT/A/16

NIIST BHOPAL
DEPT NAME : MASTER OF COMPUTER
APPLICATION
BRANCH MCA REV. NO 0
LIST OF ASSIGNMENTS
SESSION REV. DT 30/06/2011
NAME OF FACULTY :
SUBJECT: DBMS SUBJECT CODE: MCA-201
ASSIGNMENT - 1
Q.1 Discuss the advantages and disadvantages of the DBMS.
Q.2 Differentiate between Specialization and generalization ?
Q.3 Discuss the overall system architecture of DBMS.
Q.4 What is the primary goal of a DBMS?
Q.5 What are keys? Explain various types of keys

ASSIGNMENT - 2
Q.1 Define the terms: Relation, Domain, Primary Domain, Schema, Intensions and extensions.
Q.2 Create a table named STAFF with attributes and constraints indicated below
Q.3 Find the names of all employees in this database who do not work for ABC corporation
Q.4 Explain the use of DELETE and DROP TABLE commands by giving examples.
Q.5 Explain the following Functional Dependency .

ASSIGNMENT - 3
Q.1 How does BCNF differ from 3NF?
Q.2 Explain the following Redundant Functional Dependency .
Q.3 Define first, second and third normal forms.
Q.4 What undesirable dependencies are avoided when a relation is in 2NF and 3NF.
Q.5 Why BCNF is considered a stronger from of 3 NF

ASSIGNMENT - 4
Q.1 What is the purpose of the checkpoint mechanism? How often should checkpoints be performed?
Q.2 Discuss the relative advantages of centralized and distributed databases.
Q.3 Following the Multivalued dependency .
Q.4 List all possible sequences of states through which a transaction may pass.
Q.5 Explain deadlock prevention schemes.

ASSIGNMENT - 5
Q.1 Explain Transaction. Discuss ACID properties
Q.2 Explain advantages of horizontal, vertical and mixed data fragmentation.
Q.3 Explain the concept of indexing. What are ordered indices?
Q.4 Differentiate between B-tree and B+tree
Q.5 Write a short note on RAID
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY BHOPAL
FORM NO NIRT/A/16

NIIST BHOPAL
DEPT NAME : MASTER OF COMPUTER
APPLICATION
BRANCH MCA LIST OF ASSIGNMENTS REV. NO 0
SESSION REV. DT 30/06/2011
NAME OF FACULTY :
SUBJECT: COMPUTER NETWORK SUBJECT CODE: MCA-202

ASSIGNMENT - 1
Q.1 Give a brief introduction on computer networks.

Q.2 What is the Transmission Fundamental ?

Q.3 Explain some of the differences between the connections less and connection oriented network.

Q.4 Draw and explain the layered structure of TCP/IP and OSI model.
Q.5 Explain with the help of suitable applications.

ASSIGNMENT - 2

Q.1
Explain the parity checking code and cyclic redundancy check with the help of suitable example.
Q.2 Also discuss about protocol concepts of coding theory.
Q.3 Discuss the basic principle of coding Techniques.
Q.4 Discuss about their performance analysis.
Q.5 What is FDDI Protocol ?

ASSIGNMENT - 3
Q.1 An alternative to a LAN is simply a big time sharing system with terminal for all users.
Q.2 Give two advantages of client server system using a LAN.
Q.3 Write and explain various IEEE standards for LAN.
Q.4 Discuss that IEEE standard which explain the MAC schemes.

Q.5 Give a brief classification of various topologies which can be use in the local area network. Explain
each one of them

ASSIGNMENT - 4

Q.1 What are the significances of different algorithms used in communication network? Explain the
Dijkstra’s algorithm showing network properties with communication systems.

Q.2 Define Bridges, Switches. Routers and Gateways. Discuss the applications of these appliances in any
of the networking approach.

Q.3
Discuss about the deadlock condition in communication network and its avoidance procedure ?
Q.4 Write down some of the basic differences between the 802.3 and 802.5 IEEE standards ?
Q.5 Discuss about the ARQ techniques for error control and their comparison.

ASSIGNMENT - 5
Q.1 Discuss the importance of network security in our day today life ?
Q.2 How we can achieve and maintain network security ?
Q.3 Explain ISDN and CSMA/CD .
Q.4 Explain the Overview of DNS. Also explain its utility in multimedia communications .
Q.5 What is the network technology ?
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY FORM NO NIRT/A/16
BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION
BRANCH MCA LIST OF ASSIGNMENTS REV. NO 0
SESSION REV. DT 30/06/2011
NAME OF FACULTY :
SUBJECT: SE & UML SUBJECT CODE: MCA-203
ASSIGNMENT - 1
Q.1 Explain about software Engineering paradigm in detail.
Q.2 Explain the concepts of system. Also write the elements and characteristics of system.
Q.3 Explain the role of system analyst to design a software.
Q.4 Process-Based Estimation Vs Tool-Based Estimation. Explain.
Q.5 Requirements Elicitation Techniques
ASSIGNMENT - 2
Q.1 Explain the following Evolutionary software process model .
Q.2 Explain the following RAID model .
Q.3 Explain the various activities covered by software project management.
Q.4 What are different steps of RAD software development process model 'I
Q.5 Give an outline of step wise planning activities for a project with neat diagram.

ASSIGNMENT - 3
Q.1 Demonstrate SQA activities in software development and software maintenance.
Q.2 Explain the term cohesion and coupling with appropriate examples:
Q.3 What are main project planning objectives?
Q.4 Explain in detail about five views of software quality and objectives of SQA.
Q.5 Explain the components and features of DSS.
ASSIGNMENT - 4
Q.1 Explain with suitable examples. Do we need both these tests ?
Q.2 What is meant by software testing ?
Q.3 Wbat is verification and what is validation?
Q.4 What is unit testing and unit testing procedures ? Describe.
Q.5 What arc formal app roaches to SQL ? Describe each in short.

ASSIGNMENT - 5
Q.1 Differentiate between MIS and DSS.
Q.2 Discuss about various information gathering tools.
Q.3 Explain the following Validation testing .
Q.4 Brief about Structured Analysis Vs Object Oriented Analysis.
Q.5 Explain the following System testing .
NRI INSTITUTE OF INFORMATION FORM NO NIRT/A/16
SCIENCE & TECHNOLOGY BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION

BRANCH MCA LIST OF ASSIGNMENTS REV. NO 0


SESSION REV. DT 30/06/2011
NAME OF FACULTY :
SUBJECT: ALGORITHM DESIGN SUBJECT CODE: MCA-204

ASSIGNMENT - 1
Q.1 Applications of linked list – Polynomial Manipulation.
Q.2 Introduction - Abstract Data Types (ADT)
Explain Stack – Queue – Circular Queue - Double Ended .
Q.3
Queue - Applications of stack
Q.4 Define Evaluating Arithmetic Expressions .
Explain Circularly Linked List - Doubly
Q.5 Linked lists .

ASSIGNMENT - 2
Explain Bubble
Q.1 sort, selection sort, insertion sort .
Q.2 Hashing-basics, methods, collision, resolution of collision, chaining.
Q.3 Searching, Hashing and Sorting.
Q.4 Define Binary Tree – expression trees – Binary tree traversals ?
Q.5 Explain Internal sorting .

ASSIGNMENT - 3
Q.1 Basic idea of AVL tree- definition
Diffrence between Dijkstra’s algorithm &
Q.2 Bellman-Ford algorithm
Q.3 B+-Tree- definitions ?
Q.4 Definitionby Basic idea of Btree ?
Q.5 Applications of graphs - Topological sort – shortest-path algorithms

ASSIGNMENT - 4
Explain Optimal
Q.1 Binary Search Tree .
Q.2 Explain Binary Search .
Q.3 Deffrence between Algorithm Analysis & Asymptotic Notations .
Warshall’s Algorithm for Finding Transitive Closure.
Q.4
Q.5 Explain Greedy Algorithm .

ASSIGNMENT - 5
Q.1 Explain Traveling salesman problem-Amortized Analysis .
Q.2 Diffrence between Branch and Bound ?
Q.3 Backtracking – N-Queen's Problem -
Assignment Problem - P & NP
Q.4 problems –.
Q.5 Explain NP-complete problems .
NRI INSTITUTE OF INFORMATION FORM NO NIRT/A/16
SCIENCE & TECHNOLOGY BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION

BRANCH MCA LIST OF ASSIGNMENTS REV. NO 0


SESSION REV. DT 30/06/2011
NAME OF FACULTY :
SUBJECT: JAVA PROGRAMMING AND TECHNOLOGIES SUBJECT CODE: MCA-205

ASSIGNMENT - 1
Q.1 Explain All OOP concepts .
Q.2 What is theThe Java Environment ? Exampls Data types ?
Q.3 What is the Control and Iterative statements? Explin Modular programming methods .
Q.4 What is the Access Modifiers ? Define Constructors And Copy constructor ?
Q.5 Defination by Method overriding And dynamics method dispatch ?

ASSIGNMENT - 2
Q.1 Write the difference between break and continue statements in Java.
Q.2 Write a Java program to implement multiple inheritance using interface.
Q.3 What is method overriding and how does one prevent a method from being overridden?
Q.4 What is built in exception? How to create own exceptions?
Q.5 HTML Tags for applet .

ASSIGNMENT - 3
Q.1 What is the The collections framework, collection interfaces, collection classes ?
Q.2 List out four methods of a applet and write a program to pass parameters to an applet.
Q.3 What is The Byte stream ?
Q.4 Write a Java program to implement multiple inheritance using interface.
Q.5 Define buffered writer, print writer ?

ASSIGNMENT - 4
Q.1 Write a java program for mouse events handling.
Q.2 Explain detail about java streams and I/O.
Q.3 Write a java program to display the details of a given Employee using JDBC
Q.4 What is The basic user interface components ?
Q.5 What is the The Java Event Handling Model ?

ASSIGNMENT - 5
Q.1 Write a RMI program to communicate a client to remotely available server.
Q.2 Write the steps for creating RMI applications with example.
Q.3 Data Sharing among servlets & JSP ?
Q.4 Explain RMI Registry services.
Q.5 What is multithreading? Explain with an example.
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY BHOPAL
FORM NO

NIIST BHOPAL
DEPT NAME : MASTER OF COMPUTER
APPLICATION
BRANCH MCA REV. NO
LIST OF ASSIGNMENTS
SESSION REV. DT
NAME OF FACULTY :
SUBJECT: DATA MINING SUBJECT CODE: MCA-301
ASSIGNMENT - 1
Q.1 Explain Motivation, importance And Define Data type for Data Mining ?
Q.2 Difference Between Data Mining , Relation Databases.?
Q.3 Explain Data Warehouse,Transactional databases.
Q.4 Explain Data mining Functionalities: Concept/Class description.
Q.5 Difference Between Association Analysis classification &
Prediction ?
ASSIGNMENT - 2
Q.1 Explain Cluster Analysis, Outlier Analysis, Evolution Analysis.
Explain Classification of Data Mining.
Q.2 Systems, Major Issues in Data Mining.
Q.3 Explain Data Warehouse and OLAP Technology.
Q.4 Explain Data Mining: Differences between Operational Database Systems and Data Warehouses.
Q.5 Explain A multidimensional Data Model.

ASSIGNMENT - 3
Q.1 Explain Data Warehouse Architecture.
Q.2 Explain Data Warehouse Implementation.
Q.3 What is the Data Cube Technology ? With Example ?
Q.4 Explain Data Preprocessing . With Examle ?
Q.5 Explain Data Cleaning, Data Integration and Transformation.

ASSIGNMENT - 4
Q.1 Explain Data Reduction, Discretization and Concept Hierarchy Generation.
Q.2 Explain Data Mining Primitives,Languages.
Q.3 Define System Architectures, Concept Description ?
Explain Characterization and Comparison.
Q.4
Q.5 what is the Analytical Characterization?

ASSIGNMENT - 5
Explain Association Rule Mining: Market
Q.1 Basket
ExplainAnalysis.
Basic Concepts, Mining Single-Dimensional Boolean Association Rules from.
Q.2
Q.3 what is Transactional Databases: the Apriori algorithm?
Q.4 Define Cluster Analysis, Major Clustering
Methods ?
Q.5 what is the Applications & Trends in Data Mining ?
Q.6 Explain Multidimensional Association Rules.
NIRT/A/16

30/06/2011

DE: MCA-301

ata Warehouses.

om.
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY BHOPAL
FORM NO

NIIST BHOPAL
DEPT NAME : MASTER OF COMPUTER
APPLICATION
BRANCH MCA LIST OF ASSIGNMENTS REV. NO
SESSION REV. DT
NAME OF FACULTY :
SUBJECT: ARTIFICIAL INTELLIGENCE SUBJECT CODE: MCA-302

ASSIGNMENT - 1
Q.1 What is the General Issues and Overview of AI ?
Q.2 Explain The AI problems. what is an AI technique ?
Q.3 what is Characteristics of AI applications. And Introduction to LISP programming ?
Q.4 Explain Syntax and numeric functions, Basic list manipulation functions .
Q.5 Define predicates and conditionals, input output and local variables ?

ASSIGNMENT - 2
Q.1 Explain Problem Solving, Search and Control Strategies .
Difference General problem solving, production
Q.2
systems ?
Q.3 Explain Control strategies forward and backward chaining . With Example ?
Q.4 Define Exhausive searches depth first breadth first search .
Q.5 Explain Heuristic Search Techniques Hill climbing .
ASSIGNMENT - 3
Q.1 Explain Problem reduction & AO* algorithm .
Q.2 Classification of Constraint satisfaction problems ?
Q.3 Explain Knowledge Representations First order predicate calculus .
Q.4 Explain Skolemization, resolution principle & unification
Q.5 Define Interface mechanisms, horn's clauses ?
Difference Semantic networks, frame systems .
Q.6
and value inheritance ?
ASSIGNMENT - 4
Q.1 Explain Scripts, conceptual dependency .
Q.2 Explain Natural Language processing Parsing techniques .
Define Context free grammer, recursive & ANT .
Q.3
transitions
Explain Casenetsand
(RNT)
logic?grammers, symantic .
Q.4
analysis
Q.5 Game playing Minimax search procedure, alpha-beta cutoffs with Example ?

ASSIGNMENT - 5
Q.1 Define Additional refinments. Planning Overview an example domain the block word ?
Q.2 What is the
Who are Component
Goal of planning
stack planning, systems
non linear ?
planning ?
Q.3
Q.4 What is the Probabilistic Reasoning and Uncertainty Probability theory ?
Q.5 Define Bayes theorem and bayesian networks,Certainty factor,Application of expert systems ?
Q.6 Example Best first search & A* algorithm, AND / OR graphs ?
NIRT/A/16

0
30/06/2011

E: MCA-302

programming ?

ample ?

n the block word ?


ation of expert systems ?
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY FORM NO
BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION
BRANCH MCA LIST OF ASSIGNMENTS REV. NO
SESSION REV. DT
NAME OF FACULTY :
SUBJECT: PYTHON SUBJECT CODE: MCA-303
ASSIGNMENT - 1
Q.1 Explain Python interpreter and interactive mode.
Q.2 What is the Values and types: int, float, boolean, string, and list ?
Q.3 Define Variables, expressions, statements ?
Q.4 Define Tuple assignment, precedence of operators, comments ?
Q.5 Explain Modules and functions. Function definition and use, flow of execution.
ASSIGNMENT - 2
Q.1 what is the Parameters and
Q.2 arguments; Illustrative
Explain Exchange programs
the values of two variables
Q.3 Circulate the values of n
variables
Distance between two points .Conditional (if), alternative (if-else), chained
Q.4 conditional (if-elif-else
Q.5 Define Conditionals: Boolean values and operators ?
ASSIGNMENT - 3
Q.1 Define Iteration: state, while, for, break with exampale ?
Q.2 What is Continue, pass; Fruitful functions with Example ?
Q.3 Explain Return values, parameters.
Q.4 Examples Local and global scope, function composition ?
Q.5 Expalin Recursion; Strings: string slices .
Q.6 Explain Immutability, string functions and methods, string module .
ASSIGNMENT - 4
Q.1 What is Lists as arrays. Illustrative programs: square root, gcd, exponentiation with Example ?
Expalin Sum an array of numbers, linear search, binary .
Q.2
search
Q.3 What is Lists: list operations, list slices, list methods ?
Define List loop, mutability, aliasing, cloning lists, list,parameters with example ?
Q.4
Q.5 What is Tuples: tuple assignment, tuple as return value ?
ASSIGNMENT - 5
Q.1 Explain List comprehension; Illustrative programs: Sorting and Searching .
Q.2 Define Classes and Inheritance: Object Oriented Programming ?
Q.3 Define Classes and Inheritance: Object Oriented Programming ?
Q.4 Why OOP, Hierarchies, Your Own Types
Q.5 Explain Handling exceptions.
Q.6 Explain Modules, package .
NIRT/A/16

0
30/06/2011

E: MCA-303

of execution.

), chained

ponentiation with Example ?

s with example ?
NRI INSTITUTE OF INFORMATION FORM NO
SCIENCE & TECHNOLOGY BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION

BRANCH MCA LIST OF ASSIGNMENTS REV. NO


SESSION REV. DT
NAME OF FACULTY :
SUBJECT: SOFT COMPUTING SUBJECT CODE: MCA-304

ASSIGNMENT - 1
Explain Overview of Soft Computing, Difference between Soft and Hard computing
Q.1
Artificial neural networks Vs Biological.
Q.2
neuralbuilding
Basic networks, ANN
block ofarchitecture
an artificial neuron, Activation
Q.3
functions
Q.4 Introduction
McCulloch &toPitts
Early ANN architectures (basics only)
model,
Q.5 Perceptron, ADALINE, MADALINE

ASSIGNMENT - 2
Q.1 ExplainI Artificial Neural Networks: Supervised Learning: Introduction and how brain works
Q.2 ExplainNeuron as a simple computing element, The perceptron
ExplainBackpropagation networks:
Q.3 architecture, multilayer perceptron
Explain backpropagation learning-input layer, accelerated learning
Q.4
in multilayer perceptron
Q.5 ExplainThe Hopfield network, Bidirectional associative memories (BAM

ASSIGNMENT - 3
Q.1 Explain Artificial Neural Networks: Unsupervised Learning: Hebbian Learning
Explain Generalized. Competitive learning
Q.2
ExplainHebbian learning algorithm
Q.3 Explain Self- Organizing Computational Maps
Q.4 Explain Kohonen Network
Q.5 Explain Fuzzy Logic Crisp .Fuzzy relations Fuzzy sets

ASSIGNMENT - 4
Q.1 Genetic algorithms basic concepts
Q.2 Encoding, fitness function
Q.3 Reproduction-Roulette wheel
Q.4 Boltzmann, tournament, rank, and steady state selections
Q.5 Genetic algorithms basic concepts

ASSIGNMENT - 5
Q.1 Explain Boltzmann, tournament, rank, and steady state selections .
Q.2 What is the Convergence of GA ?
Q.3 Introduction to genetic programming- basic concepts
Q.4 Explain Fuzzy conditional statements .
Q.5 Applications of GA case studies ?
NIRT/A/16

0
30/06/2011

A-304

Hard computing

ction and how brain works

(BAM

an Learning
NRI INSTITUTE OF INFORMATION FORM NO
SCIENCE & TECHNOLOGY BHOPAL

NIIST BHOPAL
DEPT NAME : MASTER OF
COMPUTER APPLICATION

BRANCH MCA LIST OF ASSIGNMENTS REV. NO


SESSION REV. DT
NAME OF FACULTY :
SUBJECT: Distributed Systems SUBJECT CODE: MCA-305

ASSIGNMENT - 1
Q.1 Introduction to Distributed Systems, Goals of Distributed Systems.?
Q.2 Explain Hardware and Software concepts, Client server model .
Q.3 Discribe Remote procedure call, Remote object invocation?
Q.4 What is the Message and stream oriented communications ?
Q.5 Explain Process and synchronization, Threads.

ASSIGNMENT - 2
Q.1 Explain Clock synchronization, mutual exclusion.
Q.2 Define Bully and Ring Algorithm, Distributed transactions?
Q.3 What is the Fault tolerance and security, Object replication ?
Q.4 Explain Data centric consistency model. With Example ?
Q.5 Explain Client-centric consistency models, Introduction to fault tolerence.

ASSIGNMENT - 3
Q.1 Define Distributed security architecture, Security management ?
Q.2 Explain KERBEROS, Secure socket layer, cryptography.
Q.3 What is the Distributed Object Based and File Systems .
Q.4 Diffrent CORBA, Distributed COM, Goals ?
Q.5 What is the Design Issues of Distributed file system?
Q.6 Explain Types of distributed file system, sun network file system.

ASSIGNMENT - 4
Q.1 What is the Distributed shared memory ? Explain DSM servers.
Q.2 Difine Shared memory consistency model, distributed document based systems .
Q.3 What is The world wide web, distributed co-ordination based systems.
Q.4 Explain JINI Implementation: JAVA RMI, OLE, ActiveX, Orbix.
Q.5 Explain Visbrokes, Object oriented programming with SOM.

ASSIGNMENT - 5
Q.1 Explain Fault tolerance and security, Object replication.
Q.2 Explain Clients, servers, code migration. With Example ?
NIRT/A/16

0
30/06/2011

-305

sed systems .
NRI INSTITUTE OF INFORMATION SCIENCE
& TECHNOLOGY BHOPAL
FORM NO NIRT/A/16

NIIST BHOPAL
DEPT NAME : MASTER OF COMPUTER
APPLICATION
BRANCH MCA LIST OF ASSIGNMENTS REV. NO 0
SESSION REV. DT 30/06/2011
NAME OF FACULTY : Dev Nagar
SUBJECT: Information Security SUBJECT CODE: MCA-403

ASSIGNMENT - 1
Q.1 What is Information Security?
Q.2 Explain Critical Characteristics of Information ?
Q.3 Components of an Information System . And Explain the NSTISSC Security Model .
Q.4 Defreance between The SDLC and The Security SDLC.
Q.5 Define Securing the Components and Balancing Security and Access ?

ASSIGNMENT - 2
Q.1 Briefly Explain the Various group of threats faced by an organization.
Q.2 Discuss the ethical concepts in information security .
Q.3 Define the prevention to illegal and unethical behaviour.
Q.4 Explain the Different types of information security policies.
Q.5 Overview of Computer Security ?

ASSIGNMENT - 3
Q.1 What is the Risk Management ?
Q.2 Discuss the Risk control strategies thet guide an organization .
Q.3 Explain the State the methods in identifying and assessing risk management .
Q.4 Discuss in detials the processing of assessing and controlling risk management ?
Q.5 Define Information Flow and Confinement Problem?

ASSIGNMENT - 4
Q.1 Compare and contrast the ISO 17799 with BS 7799 NIST security models.
Q.2 Explain the Different types of information security policies.
Q.3 Discuss the Feature of VISA International security models.
Q.4 What is Blueprint for Security ?
Q.5 Define the Planning for Continuity?

ASSIGNMENT - 5
Q.1 Differentiate Symmetric encryption and Asymmetric encryption .
Q.2 Explain the follwing :
1. Access Control Devices.
2. Security and Personnel.
3. Physical Security.
4. Security Technology.
5. IDS.

You might also like