0% found this document useful (0 votes)
554 views6 pages

TNOU BCA Spot Assignment CY-2015

This document contains the spot assignment for the second year Bachelor of Computer Applications program at the Tamil Nadu Open University for the 2015 academic cycle. It includes 12 course assignments related to various computer application topics like Windows Programming, Multimedia, Relational Database Management Systems, Computer Networks, Software Engineering, and Computer Oriented Numerical Methods. Each assignment is divided into a part A with 3 short answer questions worth 5 marks each, and a part B with 1 long answer question worth 10 marks. Students are instructed to write no more than 150 words for part A questions and 300 words for the part B question.

Uploaded by

sujathalavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • risk management,
  • software quality assurance,
  • Lagrange interpolation,
  • data independence,
  • short answer questions,
  • dialog box,
  • network layer design,
  • relational database,
  • mouse events,
  • sorting records
0% found this document useful (0 votes)
554 views6 pages

TNOU BCA Spot Assignment CY-2015

This document contains the spot assignment for the second year Bachelor of Computer Applications program at the Tamil Nadu Open University for the 2015 academic cycle. It includes 12 course assignments related to various computer application topics like Windows Programming, Multimedia, Relational Database Management Systems, Computer Networks, Software Engineering, and Computer Oriented Numerical Methods. Each assignment is divided into a part A with 3 short answer questions worth 5 marks each, and a part B with 1 long answer question worth 10 marks. Students are instructed to write no more than 150 words for part A questions and 300 words for the part B question.

Uploaded by

sujathalavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • risk management,
  • software quality assurance,
  • Lagrange interpolation,
  • data independence,
  • short answer questions,
  • dialog box,
  • network layer design,
  • relational database,
  • mouse events,
  • sorting records

TAMIL NADU OPEN UNIVERSITY

School Of Computer Science


SPOT ASSIGNMENT CY-2015

NOTE : Part A Contains 3 Questions and will carry 5 Marks each, Part B
Contains 1 Question and will carry 10 Marks. Students are requested to write 150
words and should not exceed 2 pages each in Part A, 300 words and should not
exceed 4 pages in Part B.
Bachelor of Computer Applications
Second Year
Course Code : BCA-07
Course Title : Windows Programming
(Total Marks=25)
Part- A- Short Answer Questions
Answer all questions

(3 X 5 = 15 Marks)

1) Explain about dialog box.


2) Explain the mouse and key board events in VB.
3) Explain about OLE?

Part- B- Long Answer Question

Answer the following question


1.

(a) Describe all the tool box controls in detail.


(b) What are kernel objects?

(1 X 10 = 10 Marks)

TAMIL NADU OPEN UNIVERSITY


School Of Computer Science
SPOT ASSIGNMENT CY-2015

NOTE : Part A Contains 3 Questions and will carry 5 Marks each, Part B
Contains 1 Question and will carry 10 Marks. Students are requested to write 150
words and should not exceed 2 pages each in Part A, 300 words and should not
exceed 4 pages in Part B
Bachelor of Computer Applications
Second Year
Course Code : BCA-08
Course Title : Multimedia
(Total Marks=25)

Part- A- Short Answer Questions


Answer all questions

(3 X 5 = 15 Marks)

1. Explain about Authoring tools?


2. Explain about Macromedia Director?
3. Explain the MIDI Fundamentals in Multimedia.

Part- B- Long Answer Question


Answer the following question
1) Describe the multimedia design in Web.

(1 X 10 = 10 Marks)

TAMIL NADU OPEN UNIVERSITY


School Of Computer Science
SPOT ASSIGNMENT CY-2015
NOTE : Part A Contains 3 Questions and will carry 5 Marks each, Part B
Contains 1 Question and will carry 10 Marks. Students are requested to write 150
words and should not exceed 2 pages each in Part A, 300 words and should not
exceed 4 pages in Part B
Bachelor of Computer Applications
Second Year
Course Code : BCA-09
Course Title : Relational Data Base Management System
(Total Marks=25)

Part- A- Short Answer Questions


Answer all questions
1.

(3 X 5 = 15 Marks)

Explain the steps of database design?

2.

What is a view? How it is related to data independence?

3.

What is 3NF? Give an example.

Part- B- Long Answer Question


Answer the following question

(1 X 10 = 10 Marks)

1. 1 Write short notes on


i. Modify Fields

ii. Creating a Query

iv. Sorting Records.

iii. Creating Reports

TAMIL NADU OPEN UNIVERSITY


School Of Computer Science
SPOT ASSIGNMENT CY-2015

NOTE: Part A Contains 3 Questions and will carry 5 Marks each, Part B Contains
1 Question and will carry 10 Marks. Students are requested to write 150 words
and should not exceed 2 pages each in Part A, 300 words and should not exceed
4 pages in Part B.
Bachelor of Computer Applications
Second Year
Course Code : BCA-10
Course Title : Computer Network
(Total Marks=25)
Part- A- Short Answer Questions
Answer all questions

(3 X 5 = 15 Marks)

1 . State network layer design issues.


1. 2. Differentiate between i. Datagram and Virtual Circuit.
ii.

Analog signal and Digital signal

3. What is Error Detection? What are its methods?

Part- B- Long Answer Question


Answer the following question
1. Explain the OSI reference model.

(1 X 10 = 10 Marks)

TAMIL NADU OPEN UNIVERSITY


School Of Computer Science
SPOT ASSIGNMENT CY-2015

NOTE : Part A Contains 3 Questions and will carry 5 Marks each, Part B
Contains 1 Question and will carry 10 Marks. Students are requested to write 150
words and should not exceed 2 pages each in Part A, 300 words and should not
exceed 4 pages in Part B.
Bachelor of Computer Applications
Second Year
Course Code : BCA-11
Course Title : Introduction to Software Engineering
(Total Marks=25)
Part- A- Short Answer Questions
Answer all questions

(3 X 5 = 15 Marks)

1. Explain about risk management


2. Distinguish between coupling and cohesion.
3. Write notes on i. Architectural Design
ii. User Interface design.

Part- B- Long Answer Question


Answer the following question
1. Explain the Software Quality Assurance.

(1 X 10 = 10 Marks)

TAMIL NADU OPEN UNIVERSITY


School Of Computer Science
SPOT ASSIGNMENT CY-2015
NOTE : Part A Contains 3 Questions and will carry 5 Marks each, Part B Contain
1 Question and will carry 10 Marks. Students are requested to write 150 words
and should not exceed 2 pages each in Part A, 300 words and should not exceed
4 pages in Part B.
Bachelor of Computer Applications
Second Year
Course Code : BCA-12
Course Title : Computer Oriented Numerical Methods
(Total Marks=25)
Part- A- Short Answer Questions
Answer all questions

(3 X 5 = 15 Marks)

1. Explain the secant method with an example


2. What is header file?
3. If f(1) = 3, f(2) = 6, f(4) = 12 and f(6) = 16, Find the Lagranges interpolation
polynomial of f(x). Also find the value of f when x=7

Part- B- Long Answer Question


Answer the following question

(1 X 10 = 10 Marks)

1) Solve the following system by Gauss Seidal Method.


2X 5Y + 3Z = 0
4X 10Y+ 3Z= -3
X + 3Y + 10Z=-14

Common questions

Powered by AI

The Third Normal Form (3NF) in database normalization aims to reduce the duplication of data and ensure referential integrity by eliminating transitive dependencies. A table is in 3NF if it is in 2NF and all of its attributes are functionally dependent solely on the primary key. This reduces redundancy and data anomalies, facilitating easier updates and management of the database. The practical implications include reducing storage space requirements and improving query performance, as the data is more logically organized and less fragmented. It is crucial for maintaining data consistency without sacrificing access speed .

A datagram is a self-contained packet that contains all the information necessary for it to be delivered independently through a network. Each datagram is routed individually, and there is no pre-established path for the datagram, which can lead to out-of-order delivery. In contrast, a virtual circuit establishes a predefined path before the actual data transfer occurs. It provides a dedicated path between source and destination, ensuring packets arrive in sequence and are easily managed, akin to making a call on a telephone network .

Dialog boxes play an essential role in graphical user interface (GUI) design by facilitating interaction between the user and the application. They are pop-up windows that prompt users to enter data, make choices, or provide information necessary for the application's operation. Dialog boxes help to guide users through tasks, enforce workflows by requiring users to address them before proceeding, and simplify complex interactions by compartmentalizing options and outputs. Enhanced user experience and context-sensitive help provided by dialog boxes can significantly improve the usability of an application .

The OSI (Open Systems Interconnection) reference model facilitates network interoperability by providing a universal set of guidelines for network communication across diverse systems. It standardizes the functions of a telecommunication or computing system into seven abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. This allows various network components, developed by different manufacturers, to communicate with each other seamlessly. Each layer in the OSI model serves a specific function and relies on the underlying layer's service, enabling interoperability, modularity, and troubleshooting across different networks and devices .

Designing multimedia content for the web presents several challenges, including ensuring compatibility across different browsers and devices, optimizing content for quick loading times without sacrificing quality, and managing varying internet speeds among users. Additionally, designers must consider accessibility to ensure content is usable by individuals with disabilities. Creating engaging and interactive content while maintaining usability and navigational ease is also challenging. Lastly, developers must ensure multimedia does not compromise website security or violate intellectual property rights .

Risk management in software engineering enhances project success by identifying potential risks early in the project lifecycle, analyzing their impact and probability, and implementing strategies to mitigate these risks. This proactive approach helps in minimizing possible losses, ensuring that the project remains on schedule and within budget, and maintaining the quality of deliverables. Effective risk management allows teams to allocate resources more efficiently and prepare for unforeseen events, thereby increasing the chances of project success .

Effective error detection in network communication can employ several methodologies, including parity checks, checksums, and cyclic redundancy checks (CRC). Parity checks involve adding a parity bit to data to ensure an even or odd count of 1s, facilitating single-bit error detection. Checksums use algorithms to create a value based on the sum of data bits, allowing verification by the recipient. CRC provides robust error detection by generating a short, fixed-length binary sequence representing a larger data packet, calculated using polynomial division. Each method caters to different needs based on error rates, types, and data volumes, balancing between computational overhead and error-detecting capabilities .

Kernel objects facilitate resource management in operating systems by acting as fundamental resource management tools at the kernel level. They represent system resources like processes, threads, and synchronization tools (e.g., mutexes, semaphores). Kernel objects provide a consistent way for user-mode applications to interact with these resources securely and efficiently. Through this abstraction, kernel objects handle low-level resource allocation, deallocation, and state tracking, ensuring resource sharing, prioritization, and protection in a multi-tasking environment. This mechanism helps maintain system stability, prevents resource leaks, and facilitates efficient process scheduling and synchronization .

Authoring tools support multimedia development by providing environments where multimedia content such as text, images, audio, and video can be integrated into a cohesive product. These tools offer templates, drag-and-drop interfaces, and pre-built components, which simplify the development process and allow non-programmers to create sophisticated presentations. They also enable the testing and deployment of content across various platforms and often include version control and collaboration features to support team-based projects. Authoring tools streamline the creative process and reduce the complexity involved in developing multimedia applications .

Lagrange's interpolation contributes to polynomial approximation in numerical analysis by providing a method to construct a polynomial that exactly fits a given set of data points. It creates a polynomial of degree n-1, where n is the number of data points, by forming a linear combination of basis polynomials. Each basis polynomial is zero at all data points except one. This technique is particularly useful for estimating unknown values within a range of known data points, offering a simple yet powerful tool for function approximation in numerous fields like physics and engineering .

You might also like