Suresh Gyan Vihar University Assignments

Q1. Write answers for any two questions from below. (5 marks each – Word limit – 500)

B. What is User Control? How it is created? Explain its events & limitations briefly.

Ans.

User Control:

A UserControl is a separate, reusable part of a page. You can put a piece of a page in a UserControl, and then reuse it from a different location. The name, UserControl, might seem a bit fancy, but actually, it’s just like a regular page, with an optional CodeBehind file. A notable difference is that UserControls can be included on multiple pages, while a page can’t. UserControls are used  much like regular server controls, and they can be added to a page declaratively, just like server controls can.

How User Control is created

Creating ASP. Its Half solved only

SURESH GYAN VIHAR University Fully solved assignment available

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is [email protected]

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

C. What do you mean by literal control? Explain how it is useful in table server control with example.

Ans.

Literal control

The Literal control is used to display text; that is, it renders static text on a Web page without adding additional HTML tags. It passes content directly to the client browser unless you use the Mode property to encode the co

Q2. Write short notes on all of the following topics (1 mark each – Word limit – 100)

  1. Why HTTP is Stateless Protocol?
  2. Menu Bar
  3. In Try..Catch block, Finally block is mandatory.
  4. Hidden
  5. UDDI
  1. Why HTTP is Stateless Protocol?

HTTP is called a stateless protocol because in this each command is executed independently, without any knowledge of the commands that came before it. It is the protocol used for the web. It is Hyper Text Transfer Protocol. It is based on a request paradigm. In this protocol the communication generally takes place over a TCP/IP protocol. In other words, ‘HTTP is stateless – this means that when using

SET 2

Write answers for any two questions from below. (5 marks each – Word limit – 500)

a. What is SiteMapPath control? List out HTML Control that supports ServerClick event.

Answer:

b. What is ASP.Net? Explain feature of ASP.Net over ASP. Also Explain page-processing sequence of ASP.Net web page. any two HTML Controls. Also Compare with Server Controls

Answer:

c. Describe the four primary infrastructure pieces of Web Services in detail.

Answer:

Write short notes on all of the following topics (1 mark each – Word limit – 100)

  1. AreaOfRectangle

Answer:

  • Tool Bar

Answer:

  • What is theme?

Answer

  • InitComplete

Answer:

  • What is PostBack? Which property is used to identify it?

Answer:

           INTERNAL ASSIGNMENT – 1
CourseMCA  Advanced Internet Technologies
Semester5
Total Marks:15

Q.1.     Write answers for any two questions from below. (5 marks each – Word limit – 500)

A. Demonstrate about javax.sql package in detail. Briefly write on Sharing Data between JSP

pages and Requests.

B. Write the java servlet program that retrieves the date and time of the previous session and explain.

C. Write a client server jsp program to find simple interest and display the result in the client.

Ans A:

javax.sql package: This package provides the APIs for accessing and processing data which is stored in the database especially relational database by using the java programming language. It includes a framework where we different drivers can be installed dynamically to access different databases especially relational databases.

This java.sql

Ans c.

Server jsp program to find simple interest:

<%–

    Document   : interest

    Created on :

    Author     :

–%>

<%@page Its Half solved only

SURESH GYAN VIHAR University Fully solved assignment available

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is [email protected]

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

Q.2. Write short notes on all of the following topics (1 mark each – Word limit – 100)

A. Bin Directory

B. What is the purpose of php.ini file?

C. math function

D. For what purpose destroy

E. What are the different web servers you know?

Ans 1.

A. Bin Directory: bin is a standard subdirectory of the root directory in Unix-like operating systems that contains the executable (i.e., ready to run) programs that must be available in order to attain minimal functionality for the purposes of booting (i.e., starting) and repairing a system.

The root directory,

           INTERNAL ASSIGNMENT – 2
CourseMCA  Advanced Internet Technologies
Semester5
Total Marks:15

Q.1. Write answers for any two questions from below. (5 marks each – Word limit – 500)

A. Describe in detail the lifecycle of a servlet.

A servlet life cycle can be defined as the entire process from its creation till the destruction. The following are the paths followed by a servlet.

  • The servlet is

B. Write a short note on: a. Thread safe servlets b. ServletContext and ServeletConfig c. GenericServlet and HTTPServlet

a. Thread safe servlets:

Each servlet request is served by one instance of servlet (Generally speaking) so separate thread is created by container for entertaining each request and servlet container may send concurrent requests through the service method of the servlet. So in order to handle the requests concurrently, if the Servlet Developer make adequate provisions for concurrent processing with multiple threads in the service method then

C. Write short notes on: a. HTTP request and HTTP response b. GET and POST c. Pattern matching in Perl

Q.2. Write short notes on all of the following topics (1 mark each – Word limit – 100)

A. How does a servlet communicate with a JSP page?

B. WebApplicationContext

C. Config object

D. Write HTTPS vs HTTP.

E. Conf Directory

Ans:

A. How does a servlet communicate with a JSP page:

Servlet JSP Communication:

getServletConfig().getServletContext().getRequestDispatcher(“jspfilepathtoforward”).forward(request, response);

The above line is essence of the answer for “How does a servlet communicate with a JSP page?”

When a servlet

Advanced Internet Technology

1. Program to print table of a number in PHP.

Logic:

  • Define the number.
  • Run for loop.

Its Half solved only

SURESH GYAN VIHAR University Fully solved assignment available

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is [email protected]

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

2. Program to find armstrong number using form in PHP.

An Armstrong number is the one whose value is equal to the sum of the cubes of its digits.

0, 1, 153, 371, 407, 471, etc are Armstrong numbers.

For example,

407 = (4*4*4) + (0*0*0) + (7*7*7)  

        = 64 + 0 + 343  

407 = 407 

3. Program to print the Fibonacci series in PHP.

Fibonacci Series

Fibonacci series is the one in which you will get your next term by adding previous two numbers.

4. Program to print reverse of a number in PHP.

Reverse number

A number can be written in reverse order.

For example

12345

5. Program for reversing a string with strrev() function in PHP.

Reverse String

A string can be reversed either using strrev() function or simple PHP code.

For

6. Program to do swapping using third variable in PHP.

Swapping two numbers

Two numbers can be swapped or interchanged. It means first number will become second and second number will become first.

For example

a = 20

7. Program for adding two numbers in PHP.

Adding Two Numbers

Adding in Simple Code

Addition of two numbers 15 and 30 is shown here.

<?php  

$x

8. Program to add two numbers by passing input value in the form butwithout using (+) operator.

Two numbers can be added by passing input value in the form but without using (+) operator.

<body>  

<form>  

Enter First Number:  

<input 

9. Program to print alphabet triangle using range() function in PHP.

AAAAA

BBBB

CCC

DD

E

Alphabet

10.Program to print alphabet triangle using chr() function in PHP.

AAAAA

BBBB

CCC

DD

E

Using chr() function

Here the chr()

INTERNAL ASSIGNMENT – 1

Current/Emerging Trends In IT

Write answers for any two questions from below. (5 marks each – Word limit – 500)

a. “Social networking is the most popular online activity worldwide”. Comment.

Answer:

Social networking is the most popular online activity worldwide Social networking behavior both transcends and reflects regional differences around the world The importance of Facebook cannot be overstated Short Content and Microblogging has emerged as a disruptive new force in social networking Local social networks are making inroads globally It’s not just young people using social networking Its Half solved only

SURESH GYAN VIHAR University Fully solved assignment available

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is [email protected]

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

Que.2  “Social Media is addictive”. Comment your view.

 Social Media Addiction

Ans. Social media addiction is a term that is often used to refer to someone who spends too much time on social media like Facebook and Twitter or other forms of social media. As a result, it affects the person’s daily life.Although there is no official medical recognition on social media addiction as a

Write short notes on all of the following topics (1 mark each – Word limit – 100)

(A) Collaboration

Ans Collaboration Meaning – The best way to define collaboration would be to outline it as the process of two or more people or organizations working together to complete a task or achieve a goal. It is

INTERNAL ASSIGNMENT – 2

Current/Emerging Trends In IT

Write answers for any two questions from below. (5 marks each – Word limit – 500)

a. What are the major security issues related with social networking sites?

Answer:

Major security issues related with social networking sites:

Despite these justifiable security concerns about the Web, some of the reasons a person’s social media account is compromised are self-induced. Five common mistakes that can expose an account include:

1.

 

b. Discuss architecture of cloud in detail.

Answer:

Cloud Computing , which is one of the demanding technology of the current time and which is giving a new shape to every organization by providing on demand virtualized services/resources. Starting from small to medium and medium to large, every organization use cloud computing services in storing information and accessing that from anywhere and any time only

Write short notes on all of the following topics (1 mark each – Word limit – 100)

A. Change Management

Change management is defined as the methods and manners in which a company describes and implements change within both its internal and external processes. … Developing a structured approach to change is critical to help ensure a beneficial transition while mitigating

(B)Networking

 Networking is the exchange of information and ideas among people with a common profession or special interest, usually in an informal social setting. Networking often begins with a single point of

C. Cloud Storage

Cloud storage is a cloud computing model that stores data on the Internet through a cloud

D. Stalking

A pattern of behavior  directed at a specific person that would cause a reasonable person to fear for the person’s safety or the safety of others; or suffer substantial emotional distress.

E.What is following w.r.t EDM?

Electrical discharge machining (EDM) is a popular nonconventional machining approach that is often.

Software Project Management

Q. 1 A. Explain different approaches for completion of Project?

Traditional project management approaches

Some of the most well-known project management approaches were developed for industries like manufacturing or engineering, which produce physical products such as buildings, cars, or computers.

B. How configuration plan is organized into different sections? Which stages are followed by change management process?

The organization and administration element ensures that the other configuration management elements are implemented effectively in a consistent, cost effective, and timely manner. To accomplish Its Half solved only

SURESH GYAN VIHAR University Fully solved assignment available

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is [email protected]

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

 

Q. 2 A. Delphi cost estimation

Delphi cost estimation approach tries to overcome some of the limitations of the expert judgment

B. What is meant by project costing?

Project

C. Rework and Adaptability

This metric measures the average rework per change over time. Rework is defined as the

D. Explain Documentation Standard in detail.

Documentation standards in a software project are important because documents are the only

E.Explain COCOMO model. Describe a software application area in which software safety and hazard analysis would be a major concern.

SET 2

Q.1 B. Explain in detail PERT and CPM. Explain the advantages and disadvantages of PERT and CPM.

PERT:

PERT is a Program Evaluation and Review Technique that is used in the construction and project

Q.1 C What is SCM? Explain SCM process in detail.

It uses the tools which keep that the necessary change has been implemented adequately to the appropriate component. The SCM process defines a number of tasks:

Q2. A.What are the sources of architectural risks?

Architectural risks are exposed to at least three major sources of uncertainties throughout the system

B. What are the types of risk?

  • Project risks: Project risks concern differ forms of budgetary, schedule, personnel,

C. Is quality and reliability related concepts but are fundamentally different? Justify your answer with an example.

Reliability is the likelihood that a product will not fail within a specific time period

  • Example: A

D. Version Control

Version control, also known as source control, is the practice of tracking and managing changes to software code. Version control systems are software tools that help software teams manage changes to source code over time. As,

.

E. Write a short note on test automation? Write the typical release description outline.

Software Test automation makes use of specialized tools to control the execution of tests and compares the

Software Testing & Quality Assurance

Q. 1 A.Explore on verification of requirements.

Verification testing

Verification testing is used to confirm that a product meets specifications or requirements as defined in Phase Zero of the product development process. Verification testing should be conducted iteratively throughout a product design process, ensuring that the designs perform as required Its Half solved only

SURESH GYAN VIHAR University Fully solved assignment available

Lowest price guarantee with quality.

Charges INR 300 only per assignment. For more information you can get via mail or Whats app also


Mail id is [email protected]

Our website www.aapkieducation.com

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

Contact no is +91 87-55555-879

B. Illustrate on Boundary Value Analysis and Equivalence class Testing techniques.

Boundary Testing?

Boundary testing is the process of testing between extreme ends or boundaries between partitions of

Q.2 A. Mutation testing

Mutation testing, also known as code mutation testing, is a form of white box testing in which testers

B. Data flow Anomalies

Data Flow Anomalies are identified while performing while box testing or Static Testing. Data flow

C. Who can be the members of inspection team?

Life cycle of software with inspections improves quality of product, saves money and resources,

D. What is cleanroom strategy?

The cleanroom approach makes use of a specialized version of the incremental software model. A “pipeline of software increments”  is developed by small independent software engineering teams. As each increment is certified, it is integrated in the whole. Hence,

E. What is the significance of testing?

It assures the quality of the product and satisfies the customers as well as users. Also, it promises better business optimization, reliability, and superior user experience. Substantially, the