Wednesday, October 30, 2019

Class: BE(IT) Subject: DMDW Assignment II Semester I (2019-20)


MGM’s College of Engineering, Nanded.
Department of IT
Semester I (2019-20)

Class: BE(IT)       Subject: DMDW         Assignment II

1. Define Data Mining. What types of attributes are used for data mining?
2. Suppose that the data for analysis includes the attribute Marks. The Marks values for the data
    tuples are (in increasing order) 23, 25, 26, 26, 29, 30, 30, 31, 32, 32, 35, 35, 35, 35, 40,
    43, 43, 45, 45, 45, 45, 46, 50, 55, 56, 62, 80. Calculate Mean, Median, Mode and Midrange of     
    the data.
3. Suppose we have the following values for sales (in thousands of rupees), shown in   
    increasing order: 40, 46, 57, 60, 62, 62, 66, 70, 73, 80, 80, 120. Calculate Variance and
    Standard Deviation.
4. Given two objects represented by the tuples (12, 5) and (25, 20):
     (a) Compute the Euclidean distance between the two objects.
     (b) Compute the Manhattan distance between the two objects.
5. Compare      (i) Discrete and continuous attributes.
                        (ii) Interval-scaled and ratio-scaled attributes.
6. Describe the major steps involved in data preprocessing.
7. Define Noise in data. For the following data : 23, 25, 26, 26, 29, 30, 30, 31, 32, 32, 35, 35, 
    35, 35, 40, 43, 43, 45, 45, 45, 45, 46, 50, 55, 56, 62, 80. Use smoothing by bin means to
    smooth these data, using a bin depth of 3.
8. Compare min-max and z-score normalization.
9. Use these methods to normalize the following group of data:
                        100, 200, 300, 500,900
(a) min-max normalization by setting min= 0 and max = 1
(b) z-score normalization
10. Define: (i) Support (ii) Confidence (iii) closed frequent itemset (iv) maximal frequent   
      itemset.
11. Discuss the steps of the Apriori algorithm.
12. Apply the Apriori Algorithm to the following transaction database and find the frequent itemsets   using minimum support count as 2.
                                     
                      
TIDList of Items
101Lux, Tide, Colgate
102Tide,Ponds
103Tide, Vim
104Lux, Tide, Ponds
105Lux, Vim
106Tide, Vim
107Lux, Vim
108Lux, Tide, Vim, Ponds
109Lux, Tide, Vim

13. Identify the drawbacks of Apriori algorithm.
14. Evaluate the Bayesian classifier with an appropriate example.
15. Evaluate k-means clustering algorithm with an appropriate example.
16. Classify web mining techniques.



Faculty Incharge: Hashmi S A

Wednesday, September 4, 2019

Class: BE(IT) Subject: DMDW Assignment-I Semester-I (2019-20)


MGM’s College of Engineering, Nanded.
Department of IT
Semester I (2019-20)

Class: BE(IT)       Subject: DMDW         Assignment I


1. Differentiate between DBMS and Datawarehouse.
2. What are the properties of data in a datawarehouse? Explain.
3. Draw the block diagram of DW architecture. Explain various components of DW architecture.
4. Define data cube. Explain OLAP operations that can be performed on data cube.
5. A data cube is having aggregate Sales of Maharashtra State. Identify an OLAP operation to find Sales of Mumbai, Pune and Nagpur?
6. A data cube is having data of IPD and OPD patients. Identify an OLAP operation to find the data of all patients.
7. Classify the schema used in datawarehouse design.
8. Design star schema for a Pathological Laboratory. Consider Test, Doctor, Time, and Hospital as Dimensions and Count as a measure.
9. Compose SQL statements to create above star schema (Q No 8).
10. Explain fact constellation schema with an example.
11. Suppose a DW consists of four dimensions Date, Region, Product, Manager and two measures Quantity_sold and Amount. Draw snowflake schema.
12. Categorize the Measures used in Data Cube.
13. Create a bitmap index for the following table.

TID
Branch
  Product
Quantity
T10
Pune
SamsungS10
100
T20
Mumbai
iPhone10
75
T30
Nagpur
iPhone10
75
T50
Pune
Samsung S10
100
T60
Mumbai
VivoS25
50
14. Define data mining. Discuss the characteristics of DM output.
15. What are the steps of KDD process? Explain briefly.
16. Compare ROLAP, MOLAP and HOLAP.

******Best of Luck******



Faculty Incharge: Hashmi S A


Monday, July 29, 2019

Class: T Y I T Assignment I Subject: ITSM Academic Year 2019-2020 Semester I


MGM’s College of Engineering, Nanded
Department of Information Technology
Academic Year 2019-2020 Semester I
Class: T Y I T                               Assignment I                                 Subject: ITSM
______________________________________________________________________

1. List and explain briefly applications of internet.
2. Compare grid computing with cluster computing.
3. Define cloud computing. What are the categories  of cloud computing? Discuss briefly.
4. Discuss client-server computing model.
5. What are the categories of IT infrastructure? Enlist and explain.
6. List the objectives of IT infrastructure management.
7. What is the difference between FTP and HTTP? Give some examples of FTP and HTTP websites.
8. Define: (i) Load balancing clusters (ii) High performance clusters
9. What are the important challenges in IT Infrastructure management?
10. How to  design an effective IT organization?
11. List the various items that a design document contains in case of designing IT infrastructure.
12. What are the common tasks of IT system management?
13. Discuss the organizational development approaches:
     (i)   People-Process-Technology Approach
     (ii)  Strategy-Tactics-Operations Approach
14. What are the goals of IT service management process?
15. What is firewall? What is its role in the internet?
16. What are the sub-processes involved in IT service management? Explain them.
17. Define: Total Cost of Ownership (TCO) and Rteurn of Investment (ROI).
18. List various sub-processes involved in service delivery process and service support process.



Wednesday, April 10, 2019

Class: BE(IT) Subject: MC Assignment II Semester II (2018-19)


MGM’s College of Engineering, Nanded.
Department of IT
Semester II (2018-19)
Class: BE(IT)       Subject: MC         Assignment II
__________________________________________________________________________

1.      If a total of 33MHz of bandwidth is allocated to a particular FDD cellular telephone system which uses two 25 kHz simplex channels to provide full duplex voice and control channels, compute the number of channels available per cell if a system uses (a) four-cell reuse, (b) seven-cell reuse and (c) 12-cell reuse. If 1 MHz of the allocated spectrum is dedicated to control channels, determine an equitable distribution of control channels and voice channels in each cell for the three systems.
2.      Compare fixed and dynamic channel assignment strategies in mobile wireless cellular systems.
3.      Explain the system-generated cellular interference in cellular systems.
4.      Define handover. What are the types of handover in cellular networks.
5.      How bluetooth piconet and scatternets are formed?
6.      Elaborate similarities and differences between wifi and bluetooth.
7.      Draw and explain the layers in Bluetooth protocol.
8.      What are the different baseband states of a Bluetooth device?
9.      List the components of GSM architecture. What is the role of BSC and BTS?
10.   A mobile phone user has travelled from Chennai to Nanded for 3 days, which handover will take place and how? How mobile user gets authenticated in Nanded?
11.  Give the comparison between 2G, 3G and 4G systems.
12.  Define MIMO. What are the advantages of MIMO in wireless networks?
13.  Enlist the components and their functions of LTE.
14.  Which are the additional components in LTE architecture not present in 3G? Why
15.  Compare UMTS and HSDPA.
16.  Write short notes on : (a) SON (b) CoMP

****
Faculty Incharge: Hashmi S A

Class: TE(IT) Subject: C N Assignment II Semester II (2018-19)


MGM’s College of Engineering, Nanded.
Department of IT
Semester II (2018-19)
Class: TE(IT)       Subject:  C N       Assignment II
______________________________________________________________________________
1.      An ICMP message has arrived with the header (in hexadecimal):
05 00 11 12 11 0B 03 02
What is the type of the message? What is the code? What is the purpose of the
message? What is the value of the last 4 bytes? What do the last bytes signify?                       
2 (a) What is the minimum size of an IP packet that carries an ICMP packet? What is the maximum size? 
  1. (b) What is the minimum size of an Ethernet frame that carries an IP packet which in turn carries an ICMP packet? What is the maximum size?
3.      One of the addresses in a block is 17.63.110.114/24. Find the number of addresses, the first address, and the last address in the block.
4.      One of the addresses in a block is 110.23.120.14/20. Find the number of addresses, the first address, and the last address in the block
5.      Discuss Subnetting and Supernetting with example.                                                                                   
6.      Give the comparison between  TCP with IP.
7.      What are properties of transport layer services? Explain in brief.
8.      Draw and explain the fields of TCP segment format. What is the maximum size of the TCP header? What is the minimum size of the TCP header?
9.      What are the different control fields in TCP segment? What can you say about the TCP segment in which the value of the control field is one of the following:
a. 000000
b. 000001
c. 010001
d. 000100
e. 000010
f. 010010
10.  What are the different options in TCP segment? If the value of HLEN is 0111, how many bytes of option are included in the segment?
11.  The following is a dump of a TCP header in hexadecimal format.

                  (05320017 00000001 00000000 500207FF 00000000)

a. What is the source port number?
b. What is the destination port number?
c. What the sequence number?
d. What is the acknowledgment number?
e. What is the length of the header?
      12.    What is Silly Window Syndrome? How it is solved in TCP?
      13.  Draw and explain the format of UDP packet. The following is a dump of a UDP header
             in hexadecimal format.
                             CB84000D001C001C
a. What is the source port number?
b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
      14. Compare TCP and UDP protocols.
      15. You want to upload your photograph on MGMSERVER, how the connection is
            established by TCP protocol for this file upload process.

      16. Elaborate congestion control techniques of TCP protocol.


                                                                        ****  
     
     Faculty Incharge: Hashmi S A
           



Tuesday, March 5, 2019

Class: BE(IT) Subject: MC Assignment I

 
MGM’s College of Engineering, Nanded.
Department of IT
Semester II (2018-19)
Class: BE(IT)       Subject: MC         Assignment I
________________________________________________________

1.     Discuss the applications of mobile and wireless communication.
2.     Classify the multiplexing techniques in wireless communication systems.
3.     Compare FDMA, TDMA and SDMA.
4.     Distinguish between 802.3 and 802.11.
5.     How the hidden terminal problem is solved in 802.11 protocol?
6.     What are the design goals of wireless LAN? Why?
7.     Why IR signals are not generally used and radio signals are used for wireless communications such as wifi and cellular networks?
8.     Classify the architectures used in 802.11 networks.
9.     Draw and explain layers of 802.11 protocol.
10.    Which access method will be used by five mobile stations sharing a single channel for transmission? Explain in detail.
11.       What are the different fields present in 802.11 MAC frame format? A smartphone receives a MAC packet on wifi network with the following bits in MAC frame:
0001110010000101.........
12.  A smartphone downloads a jpeg file of 4MB using FHSS physical interface of wifi having 4Mbps data rate. Calculate the frame size and time required for downloading. Also list the functions of different fields of FHSS packet format.
13.   A headphone is designed using Bluetooth. Analyze the properties of its interface.
14. What are the different IFS used in 802.11 MAC layer? A mobile station is ready with an ACK packet, how long should it wait before transmission using FHSS and DSSS?
15.  What is a beacon frame? A laptop and 2 Smartphone’s are present in wifi infrastructure-based network. How synchronization is done using beacon transmission?
16.  How power management is done using DTIM and ATIM in 802.11 networks?



Additional Questions for practice
17.  What are the drawbacks of mobile and wireless communication? Explain.
18.   Give comparison between wireless networks and fixed networks.
19.Calculate the 802.11 MAC frame size for Q. No. 12.
20.   What additional functions are required for wireless MAC protocol? Why?
21.Draw and explain IEEE 802.11 FHSS frame format.
22. Draw and explain IEEE 802.11 DSSS frame format.
23.  What are the different digital modulation techniques? Discuss in brief
24.What are the three access methods used by 802.11 standard? Explain in detail.
25.Give comparison between infrared and radio transmission.
26.What are the applications of mobile and wireless communication? Explain in detail.
27.  Enlist and explain the components of infrastructure networks of 802.11.
28. State and explain the 3 versions of 802.11 physical layers.
29.What functions are performed by MAC management of 802.11? Discuss in detail.
30.  How power management is done in 802.11 infrastructure and ad-hoc networks?
31. Write short note on: (i)Wifi Dual Band (ii) Wifi Direct
32.What are the different spread spectrum techniques in wireless networks? Explain briefly.
33.  Define Hidden terminal, exposed terminal and far and near terminal in wireless lan.
34.   Enlist characteristics of wireless LANs.
35.Define TIM and ATIM.
36. A laptop uploads mp3 file of 4MB using DSSS physical interface of wifi having 6Mbps data rate. Calculate the frame size and time required for uploading. Also list the functions of different fields of DSSS packet format.



Faculty Incharge: Hashmi S A