MUJ BCA 3 Sem Solved Assignments 2025

 

SESSION April 2025
PROGRAM Bachelor of CoMPUTER APPLICATIONS (BCA)
SEMESTER III
course CODE & NAME DCA2101 Computer Oriented Numerical Methods
   
   

 

 

Set-I

 

 

 

Q1. Show that

(a)  

 

(b)  

 

Ans1.

 

 (a) δμ = ½(∆ + )

 

Definitions of Finite Differences:

Let  be a function defined at equally spaced points with interval . Then:

  • Forward Difference Operator (∆):
  • Backward Difference Operator (∇):

 

 

This is only a partially solved sample!

Buy the complete assignment from us now.

 

Price: ₹150 per Assignment

NMIMS University – JUNE 2025 Session

Last Date: 19th April 2025

Get 100% solved assignments at the most affordable rates. Trusted by students across India!

WhatsApp/Call: +91 98973 11990

Email: [email protected]

Website: https://nmimsassignments.in/

 

 

 

Q2. Solve the system of equations using Gauss Jacobi’s Method:  

3x + 20y – z = –18,    2x– 3y + 20z = 25,    20x + y – 2z = 17.

 

Ans 2.

Given Equations:

3x + 20y – z = –18 2. 2x – 3y + 20z = 25 3. 20x + y – 2z = 17

 

Step 1: Rearranging equations to isolate each variable

We rewrite each equation to express x, y, z in terms of the other variables:

Equation (1):

Equation (2):

 

 

Q3. Fit straight line of the form , to the following data by method of moment

2 3 4 5
27 40 55 68

Ans 3.

To fit a straight line of the form:

using the method of moments, we’ll follow a process that matches the first and second moments of the actual data with the corresponding moments of the fitted line.

 Step 1: Given Data

x y
2 27
3 40
4 55
5 68

Let n = 4 (number of observations)

Step 2: Calculate Required Summations

 

Set-II

 

 

Q4. Apply Gauss forward formula to obtain the value of f(x) at x = 3.5 from the table:

1.5 2.5 3.5 4.5
8.963 24.364 66.340 180.034

Ans 4.

To apply the Gauss Forward Interpolation Formula, we first construct the forward difference table and then apply the formula to find .

Given Table:

x f(x)
1.5 8.963
2.5 24.364
3.5 66.340
4.5 180.034

Let’s denote:

 

 

 

Q5. Evaluate  using the

  • (i) Simpson’s 3/8 Rule
  • (ii) Simpson’s 1/3 Rule
  • (iii) Trapezoidal Rule

Ans 5.

To evaluate the integral

using Simpson’s 3/8 Rule, Simpson’s 1/3 Rule, and the Trapezoidal Rule, we need to follow numerical integration steps with a chosen number of sub-intervals n.

 

Step 1: Function and Interval

Let:

Q6. Find the solution for  taking interval length 0.1 using Euler’s method to solve:     given .

Ans 6.

To solve the differential equation

using Euler’s method with step size  and find the solution at , follow the steps below:

 

 Given:

  • Differential equation:
  • Initial condition:
  • Step size:
SESSION APRIL 2025
PROGRAM BACHELOR OF COMPUTER APPLICATIONS (BCA)
SEMESTER 3
COURSE CODE & NAME DCA2102 DATABASE MANAGEMENT SYSTEM
   
   

 

 

Set – I

 

Q1. a. Differentiate between the levels of the three-schema architecture of DBMS.

  1. What do you mean by cardinality? Explain the different types of cardinalities in RDBMS? 5+2+3

Ans 1.

  1. Levels of the Three-Schema Architecture of DBMS

Three-Schema Architecture

The three-schema architecture is a widely accepted framework in database management that separates the database system into three different layers—internal, conceptual, and external. This layered structure enhances data abstraction, provides better security, and supports data independence.

Internal Level

The internal level, also known as the physical schema, describes how the data is physically

 

Its Half solved only

Buy Complete assignment from us

Price – 190/  assignment

MUJ Manipal University Complete SolvedAssignments  MARCH 2025

buy cheap assignment help online from us easily

we are here to help you with the best and cheap help

Contact No – 8791514139 (WhatsApp)

OR

Mail us-  [email protected]

Our website – www.assignmentsupport.in

 

Q2. Define the concepts of Entity Integrity Constraint and Referential Integrity Constraint. Analyse their significance in maintaining database consistency and illustrate each with appropriate examples. 5+5           

Ans 2.

Entity Integrity and Referential Integrity Constraints

Entity Integrity Constraint

The entity integrity constraint ensures that every table in a relational database has a primary key, and that this key must not contain null values. The primary key uniquely identifies each record in the table, making it critical for distinguishing one row from another.

For instance, consider a STUDENTS table where StudentID is the primary key. Entity

 

 

Q3. Organize the SQL features of RDBMS based on their role in ensuring data consistency and transactional integrity, and analyse how each contributes to fulfilling the ACID properties.es 5+5   

Ans 3.

SQL Features of RDBMS and Their Role in Data Consistency and Transactional Integrity

SQL Features in RDBMS

Structured Query Language (SQL) is the standard language used in relational database management systems (RDBMS) for managing and manipulating data. It provides a set of powerful features that help ensure data consistency, integrity, and reliable transaction processing. These features include Data Definition Language (DDL), Data Manipulation Language (DML), Data Control Language (DCL), and Transaction Control Language (TCL).

 

Set – II

 

  1. Demonstrate the use of various relational algebra operations by applying them to sample relations and illustrating the output for each operation. 5+5

Ans 4.

Relational Algebra Operations with Sample Relations and Outputs

Relational Algebra

Relational algebra is a formal system for manipulating relations in a relational database. It provides a set of operations to retrieve, combine, and manipulate data stored in tables (relations). These operations form the foundation of query languages like SQL. The primary operations include selection, projection, union, set difference, Cartesian product, and join.

Sample Relations for Illustration

Let us consider two sample relations:

 

 

Q5. What do you mean by Normalization? Explain the different Normal Forms with the help of a suitable example. 2+8 

Ans 5.

Normalization and Different Normal Forms

Normalization

Normalization is a systematic approach used in database design to reduce redundancy and dependency by organizing fields and table relationships. Its main objective is to divide larger tables into smaller, manageable, and related ones while ensuring that data remains logically stored and consistently retrievable. It simplifies updates, deletions, and insertions while maintaining data integrity.

First Normal Form (1NF)

A relation is in First Normal Form when all its attributes contain only atomic values, meaning

 

 

Q6. Examine various query optimization techniques and heuristics and assess their influence on query execution cost and system performance in large databases. 2+6+2         

Ans 6.

Query Optimization Techniques and Their Impact on Performance

Query Optimization

Query optimization is a critical function in a database management system that focuses on improving the efficiency of SQL query execution. The objective is to reduce the response time and cost associated with accessing and manipulating data. As databases grow larger, poorly written or unoptimized queries can significantly impact performance.

Heuristic-Based Optimization

Heuristic optimization involves applying predefined rules or techniques to rewrite a query

 

SESSION APRIL  2025
PROGRAM BACHELOR OF COMPUTER APPLICATION (BCA)
SEMESTER III
COURSE CODE & NAME DCA2103 COMPUTER ORGANIZATION
   
   

 

 

Assignment SET – I

 

Q1. Explain the role of addressing modes in computer architecture. 10 

Ans 1.

Role of Addressing Modes in Computer Architecture

Addressing Modes

Addressing modes in computer architecture define how the operand of an instruction is accessed. These modes are essential because they provide flexibility and efficiency in instruction execution. In simple terms, addressing modes determine where the data resides and how it can be retrieved or manipulated.

The CPU uses addressing modes to access data located in registers, memory locations, or directly within the instruction itself. By offering different methods to refer to data, addressing

Its Half solved only

Buy Complete assignment from us

Price – 190/  assignment

MUJ Manipal University Complete SolvedAssignments  MARCH 2025

buy cheap assignment help online from us easily

we are here to help you with the best and cheap help

Contact No – 8791514139 (WhatsApp)

OR

Mail us-  [email protected]

Our website – www.assignmentsupport.in

 

Q2. How does a microprogrammed control unit differ from a hardwired control unit?

Ans 2.

Difference Between Microprogrammed and Hardwired Control Unit

Overview of Control Units

The control unit is a critical component of the CPU that directs the execution of instructions by generating control signals. Based on how these control signals are generated, control units are classified into microprogrammed and hardwired types.

These two types of control units differ in structure, design methodology, flexibility, and performance. Both serve the same purpose of guiding data flow within the CPU, but their

 

 

Q3. What is the role of RAID in disk storage? 10 

Ans  3.

Role of RAID in Disk Storage

RAID Technology

RAID stands for Redundant Array of Independent Disks, a data storage virtualization technology that combines multiple physical disk drives into one logical unit to improve performance, fault tolerance, or both. RAID is widely used in enterprise storage systems, data centers, and high-performance environments.

The core objective of RAID is to enhance data reliability and input/output (I/O) efficiency by

 

 

Assignment SET – II

 

Q4. Explain in detail RISC and CISC architectures?       5+5     

Ans 4.

RISC Architecture

RISC stands for Reduced Instruction Set Computer, an architectural design philosophy that emphasizes a small set of simple instructions. The idea behind RISC is that by simplifying the instruction set, the CPU can execute instructions faster and more efficiently. Each instruction is designed to execute in a single clock cycle, which allows for high-speed processing and improved performance.

RISC architectures rely heavily on registers for instruction operations. Instructions in RISC

 

Q5. Differentiate between multiprocessing and multiprogramming.       10       

Ans 5.

Difference Between Multiprocessing and Multiprogramming

Multiprocessing

Multiprocessing refers to a system having two or more CPUs (Central Processing Units) that work in parallel to execute multiple processes simultaneously. In a multiprocessing system, multiple processors share a common physical memory and work under the control of a single operating system.

Multiprocessing can be of two types: symmetric and asymmetric. In symmetric

 

Q6. What are hazards in pipeline processing? Discuss the hazards and suggest techniques to overcome them.            5+5     

Ans 6.

Hazards in Pipeline Processing and Solutions

Pipeline Hazards

Pipeline processing is used in modern CPUs to overlap instruction execution, thus improving overall performance. However, pipelines can face issues called hazards, which delay instruction execution and reduce efficiency. Hazards arise when the next instruction cannot execute in its designated cycle due to conflicts or dependencies.

There are mainly three types of hazards: data hazards, control hazards, and structural hazards.

 

SESSION APRIL 2025
PROGRAM BACHELOR OF COMPUTER APPLICATIONS (BCA)
SEMESTER 3
COURSE CODE & NAME DCA2104 BASIC OF DATA COMMUNICATIONS
   
   

 

 

Set – I

 

Q1. Describe various trends in data communications and network technology. Explain Communication model in brief.           5+5

Ans 1.

Trends in Data Communication and Network Technology with Communication Model Explanation

The field of data communication has evolved significantly with technological advancements. One of the most prominent trends is the increased reliance on wireless communication technologies such as Wi-Fi 6, 5G, and satellite-based internet. These technologies enable faster data transfer, reduced latency, and support for a larger number of devices, making them ideal for smart homes, IoT systems, and mobile communication.

Another trend is the convergence of voice, video, and data over a single network, enabled

Its Half solved only

Buy Complete assignment from us

Price – 190/  assignment

MUJ Manipal University Complete SolvedAssignments  MARCH 2025

buy cheap assignment help online from us easily

we are here to help you with the best and cheap help

Contact No – 8791514139 (WhatsApp)

OR

Mail us-  [email protected]

Our website – www.assignmentsupport.in

 

Q2. List some difference baseband and broadband transmission with some examples

Ans 2.

Baseband and Broadband Transmission: Differences and Examples

Baseband Transmission

Baseband transmission refers to a method of sending digital signals over a channel without modulation. In this type, the entire bandwidth of the transmission medium is used to send a single signal. It is commonly used in Local Area Networks (LANs), especially with Ethernet systems. Baseband transmission is cost-effective and efficient for short-distance digital communication.

A typical example of baseband communication is Ethernet (IEEE 802.3), which transmits

 

Q3. Differentiate between guided and unguided transmission and with some examples?

Ans 3.

Comparison Between Guided and Unguided Transmission with Examples

Guided Transmission Media

Guided transmission refers to data signals that are transmitted through a physical medium such as copper wires, coaxial cables, or fiber optic cables. These media guide the signal along a specific path, providing high reliability and protection from interference.

Common examples of guided media include:

  • Twisted Pair Cables, used in telephone lines and LANs.
  • Coaxial Cables, often used for cable television and older Ethernet networks.

 

 

Set – II

 

Q4. Explain the process in Data exchanges in transmission line and explain different types of classifications? 5+5

Ans 4.

Process of Data Exchange in Transmission Line and Classification of Data Transmission

Data Exchange in a Transmission Line

The process of data exchange in a transmission line involves the transmission and reception of digital or analog signals between two or more devices through a communication medium. It is the core function of any communication system and ensures that data flows accurately and efficiently from the sender to the receiver.

Data exchange begins with the sender converting data into signals suitable for transmission.

 

 

Q5. Write short on synchronous and asynchronous transmission.          

Ans 5.

Synchronous and Asynchronous Transmission

Data Timing in Communication

In data communication, the way in which bits are timed and synchronized during transmission is critical. Data can be transmitted using either synchronous or asynchronous methods. Both are used to coordinate data exchange between devices but differ significantly in their implementation and efficiency.

Synchronous Transmission

 

Q6. Differentiate between frequency hopping spread spectrum and direct sequence spread spectrum 10    

Ans 6.

Frequency Hopping Spread Spectrum vs. Direct Sequence Spread Spectrum

Spread Spectrum Techniques

Spread spectrum is a technique used in wireless communication to transmit signals over a wider frequency band than the original signal requires. This approach improves security, resistance to interference, and bandwidth utilization. The two main methods are Frequency

 

 

Item added to cart.
0 items - 0.00