Tuesday, December 27, 2011

CS301- Data Structures Assignment No.3 27 Dec 2011


Assignment No. 03
SEMESTER Fall 2011
CS301- Data Structures
Question:                                                                                                                                                    [20 marks]
Consider the following AVL Tree



1.    First  Insert 10
2.    Then Insert 95
3.    Then Insert 80
4.    Then Insert 77
Show the entire AVL tree after every insertion. You have to show complete steps in order to get full marks.



Solution;
Insert 10





AVL tree is balanced
Insert 95
Insert 80
Insert 77

CS601 Assignmetn No.3 solution. 27 Dec 2011


Assignment # 3
CS601 – Data Communication
Question# 1:-
Suppose data is sent from user A to  B which has been passed through several intermediate nodes. Give your recommendation based on the cases mentioned below:
a.      If there are three nodes between A & B then which layer will be responsible for node to node delivery?
b.     Which layer will be responsible for Line coding?
Answer:-
a.      Layer 3
b.     Layer 1
Question# 2:-
Calculate the baud rate and corresponding bit rate for a telephone line having QAM-16
and bandwidth 2400HZ?
Answer:-
Baud Rate = 2400
For QAM 16 signal contain 4 elements
Bit rate = 2400 * 4 = 9600b/s
Question# 3:-
Horizon Electronics Company has a small  network of 30 computers for communication with each other, which transmission medium among STP and UTP will be preferred and why? Justify your answer with solid reasons at least five points.

Answer:-
STP stands for shielded twisted pair. When you look inside a networking cable there are six different wires are “paired” and these pairs are twisted. The purpose of this is to prevent something known as cross talk. Cross talk is where the signal along the wire experiences an electromagnetic interference induced by Eddie currents by twisting the tow wires this phenomena, is cancelled out and the data can then be transmitted without interference.

Thursday, December 22, 2011

IT 430 assignment solution 20 dec 2011


IT 430-assignment no 3-20dec 2011

Question 1:      (05)

Assume that you want to buy an IPhone from an online shop. You had ordered an IPhone and made payment using Electronic check. You had forwarded the electronic check in a secure envelope to the payee. How will the payee decrypt the secure envelope to verify electronic check? Also describe the main reason which makes electronic check more secure than Virtual PIN payment system.


A payer uses the electronic check book device in his computer system to generate a blank electronic check after filling the information regarding amount, date etc., and the electronic check is digitally signed by the payer through his private key. A certificate issued by the payer bank authenticating public key of the payer is also attached with the electronic check. This information is then sent to the payee in a secure envelope through email. A secure envelop is created when a user encrypts any information with a symmetric key.
Accordingly the payee, in this case, decrypts the secure envelop by first retrieving the symmetric key and then using that symmetric key to decrypt the information contained in the electronic check. The payee endorses the check using some secure hardware device such as a smart card and forwards the check to the payee’s bank in the form of a secure envelop & this is the main reason which makes electronic check system more secure.








Question 2:        (05)

Assume that you want to buy a book named “Electronic Commerce” from an online book shop using Virtual PIN payment system. You are already registered with First Virtual and your Virtual PIN is “alpha”. How would this transaction take place? Would you need your credit card number in this transaction? Why Virtual PIN is considered an insecure method for online transactions? Justify your answer.


The transaction will take place by these steps
Select order
Merchant
Payment request
Payment
Deposit
Accepted
Receipt
Send goods
Good acknowledgement

And If you want to buy a book from online shop using virtual PIN payment system & you are already registered then u don’t have to put your credit card number in this transaction.
Virtual pin is insecure because pre-registration of the buyer and the merchant with FV is mandatory in this set up. Moreover, maintaining a bank account (in case of merchant) and having a credit card (in case of a buyer) is also essential part of this system. One can say that the merchant side is less secured in the transaction because the goods are delivered by the merchant before the payment is actually received.

Thursday, December 8, 2011

My today's Fresh baked Paper of CS601 on 8 Dec 2011


MIDTERM  EXAMINATION
FALL 2011
CS601- Data Communication (Session - 1)
    
Question No: 1    ( Marks: 1 )    - Please choose one
 

application layer
physical layer
network layer
   
Question No: 2    ( Marks: 1 )    - Please choose one
  
The
    Asynchronous transmission is ___________
       slow
       ► costly
       ► non-effective
       ► fast

Question No: 3    ( Marks: 1 )    - Please choose one
 In _____________ transmission, a start bit and a stop bit frame a character byte.
       Asynchronous serial
       Synchronous serial
       Parallel
       Asynchronous & Synchronous serial
   
Question No: 4    ( Marks: 1 )    - Please choose one
In 8QAM each signal shift or one baud represents ______.
3 bits
4 bits
2 bits
5 bits
   
Question No: 5    ( Marks: 1 )    - Please choose one
 
Question No: 6    ( Marks: 1 )    - Please choose one
 
 In ____________ transmission the timing of the signal is unimportant.
Asynchronous
Synchronous
Polar
Bi-polar
   
Question No: 7    ( Marks: 1 )    - Please choose one
   
Question No: 8    ( Marks: 1 )    - Please choose one
 
 PCM is the first process of PAM.
       True
       False
   
Question No: 9    ( Marks: 1 )    - Please choose one
Modulation of an analog signal can be accomplished through changing the
___________ of the carrier signal.
amplitude
frequency
phase
all of the given
   
Question No: 10    ( Marks: 1 )    - Please choose one
 
The amplitude of a digital signaldepends upon the________ to represent a bit.
       ► phase
       voltage
       ► wavelength
   
Question No: 11    ( Marks: 1 )    - Please choose one
  
Time domain plot show changes in signal phase with respect to time.
       ► True
       False
   
Question No: 12    ( Marks: 1 )    - Please choose one
 
OSI model was developed prior to TCP/IP model.
       ► True
       False
   
Question No: 13    ( Marks: 1 )    - Please choose one
  
The _________ layer is the layer closest to the transmission medium.

       physical
       ► data link
       ► network
       ► transport

   
Question No: 14    ( Marks: 1 )    - Please choose one
 
   
Question No: 15    ( Marks: 1 )    - Please choose one
 
In mesh topology, if there are five nodes then there will be  _______ links.
       ► 5
       10
       ► 15
       ► 20

   
Question No: 16    ( Marks: 1 )    - Please choose one
 
   
Question No: 17    ( Marks: 1 )    - Please choose one
 
 _______ is a multipoint topology.
       ► Ring
       ► Mesh
       ► Tree
       Bus
   
Question No: 18    ( Marks: 2 )    - Please choose one
 
   
Question No: 19    ( Marks: 2 )    - Please choose one
 
   
Question No: 20    ( Marks: 2 )    - Please choose one
 
   
Question No: 21    ( Marks: 2 )
 
 What is purpose of distributed processing?
   
Question No: 22    ( Marks:3 )
  
What is amplitude of a signal describe in your words.
   
Question No: 23    ( Marks: 5 )
  
   
Question No: 24    ( Marks: 5)
 
Which encoding scheme is batter among all other schemes.