Q
ALL SAINTS’ COLLEGE OF TECHNOLOGY
M.TECH II SEMESTER
ASSIGNMENT
WEB TECHNOLOGY AND COMMERCE MCSE (201)
1. Write an HTML page to display information of three products. The name of three products should be displayed at the top. The hyperlink should be provided to move to
the details of the product like its features, size, price etc. along with its image. The
link should be internal link.
2. Explain the HTML tags for the following text formatting with example.
a) Superscript b) Subscript c) Strike through
d) Super bold e) Underline (other than )
3 What are the different types of CSS how they can be implemented?
4. How the validation of Digital signature is done?
5. Design a form in HTML for user registration for your college? Form should contain text area, checkbox, radio button, drop down box etc?
6. Differentiate between HTML, SGML, and XML?
7. Write a function for validation of Email-id and password in java script?
And make an internal call for that function for HTML?
ALL SAINTS’ COLLEGE OF TECHNOLOGY
M.TECH II SEMESTER
ASSIGNMENT
INFORMATION AND CODING THEORY ASSIGNMENT MCSE (202)
1. Prove the following properties of mutual information –
i) The mutual information of a channel is symmetric
ii) The mutual information is always non negative
iii) The mutual information of a channel is related to the joint entropy of the channel input and channel output by-
I(x;y) = H (x) +H(y)- H(x,y)
2. What is mutual information? The joint probability matrix for a channel is given as:
Determine the mutual information for the channel. [pic]
3. What is cryptography? Give application of cryptography. Draw the block diagram of secret ket cryptography system and explain it .Distinguish between block and stream ciphers. Discuss the requirement of secrecy. Explain. Describe the Rivest-Shamir-Adelman (RSA) system of public key cryptography.
4. The generator polynomial of a (6, 3) cyclic code is g(x) =1+x2 .find all the code words of the code.
5. A (7, 4) Hamming code is generated by the polynomial.
g(x) = 1+x+ x3
Code words are sent over a noisy channel. Is received word 1101100 a codeword? If not, determine the syndrome vector.
6. Draw the block diagram of a secret key cryptographic system and explain its principle. State the important services given by a cryptographic system.
7. (a)What is Entropy? for a binary system , prove that is maximum when P1=P2=0.5
(b) Apply a suitable source coding technique for the following message ensemble:
[x] = [x1 x2 x3 x4 x5 x6]
[p] = [0.35 0.1 0.15 0.2 0.05 0.15]
ALL SAINTS’ COLLEGE OF TECHNOLOGY
M.TECH II SEMESTER
ASSIGNMENT
ADVANCE CONCEPT IN DATABASES MCSE (203)
Q.1 Write the steps for converting an E_R diagram to actual database?
Q.2 Write the application of DBMS in the field of data mining and dataware housing?
Q.3 Draw an E-R diagram for a bank account?
Q.4. A database is being constructed for storing sales information system. A Product an be described with a unique product number, product name, selling Price, manufacturer name. The product can sale to a particular client and each client have it own unique client number, client name, client addresses, city, pin code, state and total balance to be equired to paid. Each client order to buy product from the salesman. In the order, it has unique sales order number, sales order date, client number, salesman number (unique), billed whole payment by the party or not and its delivery date. The salesman have the name, addresses, city, pin code, state, salary of the sales man, delivery date, total quantity ordered, product rate.
Q.4.1. Write the SQL queries for the following –
(a) Retrieve the list of names and the cities of all the clients.
(b) List the various products available.
(c) Find the names of all clients having ‘a’ as the second letter in their names.
(d) List all the clients who are located in BHOPAL
(e) Find the products whose selling price is greater than 2000 and less than or
equal to 5000.
(f) Add a new column NEW_PRICE into the product_master table.
(g) Rename the column product_rate of Sales_Order_Details to
new_product_rate.
(h) List the products in sorted order of their description.
Q.5. An information system for faculty members of ASCT. The system stores the personal information like, name, address, date of birth, date of joining etc; academic information like - qualifications,publications,area of specialization, conferrences/workshops attended, courses taught by him/her, other responsibilities/duties etc.
Q.6. Explain the following in terms of FD?
• Inference Rules for FDs
• Equivalence of Sets of FDs
• Minimal Sets of FDs
Q.7. What do you understand by normalization and denormalization?
ALL SAINTS’ COLLEGE OF TECHNOLOGY
M.TECH II SEMESTER
ASSIGNMENT
SYSTEM PROGRAMMING MCSE (204)
1. Briefly explain deadlock detection and recovery in distributed operating system.
2. Explain centralized algorithms of clock synchronization. What are their major drawbacks? How these are overcome?
3. How might the clock in two computers that are linked by a local network be synchronized without reference to an external time source? What factors limit the accuracy of the procedure you describe? How could the clocks in a large number of computers connected by the internet be synchronized? Discuss the accuracy of that procedure.
4. Test whether the grammar is LL (1) or not, and construct a predictive parsing table for it.
S→ AaAb | BbBa
A→ ε
B→ ε
5. Consider the source code:
X= y + z
P= z + q +y
Explain how commutativity and associativity can be used to generate more efficient code from DAG of this source code.
6. Write an algorithm for detecting and eliminating Induction variables?
7. Wirte short note on:
(a) Code generator generators
(b) Register allocation techniques
(c) Code generation for pipelined machines
(d) Compilation for distributed machines
ALL SAINTS’ COLLEGE OF TECHNOLOGY
M.TECH II SEMESTER
ASSIGNMENT
SOFTCOMPUTING MCSE (205)
1. What is AI technique? What are the problems when A.I. problems are solved by using non A.I. technique?
2. Differentiate between ADALINE and MADALINE.
3. What is neuron? Explain the structure and function of biological neuron and an artificial neuron?
4. Explain Expert system? Explain components of expert system?
5. Explain the working and application of Kohonen,s self organizing feature map?
6. Differentiate Fuzzy set and crisp set?
7. Explain genetic algorithm?
ALL SAINTS’ COLLEGE OF TECHNOLOGY
M.TECH II SEMESTER
ASSIGNMENT
INFORMATION AND CODING THEORY ASSIGNMENT MCSE (202)
8. Prove the following properties of mutual information –
i) The mutual information of a channel is symmetric
ii) The mutual information is always non negative
iii) The mutual information of a channel is related to the joint entropy of the channel input and channel output by-
I(x;y) = H (x) +H(y)- H(x,y)
9. What is mutual information? The joint probability matrix for a channel is given as:
Determine the mutual information for the channel. [pic]
10. What is cryptography? Give application of cryptography. Draw the block diagram of secret ket cryptography system and explain it .Distinguish between block and stream ciphers. Discuss the requirement of secrecy. Explain. Describe the Rivest-Shamir-Adelman (RSA) system of public key cryptography.
11. The generator polynomial of a (6, 3) cyclic code is g(x) =1+x2 .find all the code words of the code.
12. A (7, 4) Hamming code is generated by the polynomial.
g(x) = 1+x+ x3
Code words are sent over a noisy channel. Is received word 1101100 a codeword? If not, determine the syndrome vector.
13. Draw the block diagram of a secret key cryptographic system and explain its principle. State the important services given by a cryptographic system.
14. (a)What is Entropy? for a binary system , prove that is maximum when P1=P2=0.5
(b) Apply a suitable source coding technique for the following message ensemble:
[x] = [x1 x2 x3 x4 x5 x6]
[p] = [0.35 0.1 0.15 0.2 0.05 0.15]
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.