Home
ICT A/L Seminar - 2014 57, Ramakrishna Road, Colombo 06.
Contents
1. INSTITUTE OF TECHNOLOGY E ICT A L Seminar 2014 57 Ramakrishna Road Colombo 06 www iit ac Ik 01125238983 01125238984 INFORMATICS INSTITUTE OF TECHNOLOGY Bou Bag Informatics Part B Essay Questions 1 2 3 4 INFORMATICS Bog INSTITUTE OF RH TECHNOLOGY Informatics 1 a i Repeater Network device used to regenerate or replicate a signal Repeaters are used in transmission systems to regenerate analog or digital signals distorted by transmission loss INFORMATICS BOB INSTITUTE OF RH TECHNOLOGY Informatics 1 a i Bridges In telecommunication networks a bridge is a product that connects a local area network LAN to another local area network that uses the same protocol for example Ethernet or token ring INFORMATICS B28 INSTITUTE OF Collision Domain CollisionDomain TECHNOLOGY Informatics u 1 a i n packet switched networks such as the Internet a router is a device or in some cases software in a computer that determines the next network point to which a packet should be forwarded toward its destination The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to Arouter is often included as part of a network switch Arouter may create or maintain a table of the available routes and their condi
2. Q4 b iv pi color 000099 font family Arial Helvetica sans serif text align justify INFORMATICS ERE INSTITUTE OF 57 E TECHNOLOGY Informatics QA c Name Contact Number form id form1 name form1 method post action gt Name lt input type text name name id name gt lt br gt Contact Number lt input type text name address id address gt lt br gt lt input type submit name submit id submit value Submit onclick update php gt lt form gt INFORMATICS A A INSTITUTE OF 88 TECHNOLOGY Informatics Even total 0 Odd total 0 05 a i iz1 increase increse Increase i by 1 INFORMATICS INSTITUTE OF 59 TECHNOLOGY odd total by 1 even total by 1 Q5 a ii even total O odd total lt 0 for i in range 1 11 x int input Enter Number if x 2 0 even_total even_total x else odd_total odd_total x Print Total of Odd Numbers odd total print Total of Even Numbers even total INFORMATICS ERE INSTITUTE OF 60 E TECHNOLOGY Informatics Q6 b i Given Code y int input for x in range 1 y prime True for 1 in range 2 x if x 1 0 prime True if prime print x INFORMATICS INSTITUTE OF 61 TECHNOLOGY Informatics Q6 b i Correct Code y input Enter Number for x in range 1 y 1 primezTrue for i in range 2 x if x i 0 prime False
3. at those outputs The tester does not ever examine the programming code and does not need any further knowledge of the program other than its specifications Theinput is tested against the intended output BLACK BOX TESTING INFORMATICS Executable INSTITUTE OF Program TECHNOLOGY 2 d iii White box testing Also known as glass box structural clear box and open box testing A software testing technique which the tester has to know about the internal workings of the programme and how the test data functions t uses specific knowledge of programming code to examine outputs The test is accurate only if the tester knows what the program is supposed to do When a certain input is given until the output is obtained all the operations need to be recognized and if there are errors they must be detected Known Outputs INFORM Hog 9g inspection aga TECHNO WhiteBox Informatics 2 d iv Identify a function Taking a photo in in night mode Plan the test take the camera and set it to night mode Decide the output You can download a picture or check the user manual to get an idea of the picture quality Execute Take a photograph in outside when it is dark Compare the result with expected output INFORMATICS INSTITUTE OF TECHNOLOGY Informatics 3 a Heat B gt Temperature is less than or equal to 24 C 0 otherwise 1 Humidity C gt Low humid
4. char 20 dob date Age int primary key Admin INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics 6 c ii select s Name f completiondate from student s follow f where s AdmissionNo f AdmissionNo and f Completiondate gt 01 07 2012 and f Completiondate lt 20 07 2012 INFORMATICS INSTITUTE OF E TECHNOLOGY Informatics 6 c iii select distinct l LecturerName from Lecturer Course c where l Lecturerld c Lecturerld and c Lecturerld NOT NULL INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics
5. if prime print x INFORMATICS INSTITUTE OF 62 E TECHNOLOGY Informatics Q6 b ii Code Corrections student name saman 1425 55 12 print student name print student print student keys print student values student name saman no 1425 class 12B print student name print student print student keys print student values INFORMATICS ERE INSTITUTE OF TECHNOLOGY Informatics 06 c i Output of Code Qs Output Values of x 1 Values of x 2 for x in range 1 11 1 print Values of x x if x 3 0 Values of x 3 continue TRUE print TRUE Values of x 4 Values of x 5 Values of x 6 TRUE Values of x 7 Values of x 8 Values of x 9 TRUE INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Values of X 10 Informatics Q6 c i f1 open text txt r line f1 readline data line strip split datacount len data for k in range i 1 datacount if int data i int data k data i data k 2data k data i f1 close 10 print data INFORMATICS INSTITUTE OF E TECHNOLOGY Informatics 1 2 3 4 5 foriin range datacount 1 6 8 9 Q6 c i Opens the text txt file for read only and assigns it to variable F1 Reads the first line and assigns to the variable line Remove unwanted spaces in the selected section and separate the data items from commas and assigns it to the variable data the selected s
6. 11000110001 If page size is 512bytes Bits 512 8 2 23 212 bits If 12 bits are for a page size No of bits are 216 212 24 16 pages INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics b iii Page size 12 bits 0101 111000110001 V Page number Offset 12 bits 4 bits INFORMATI CS BOB INSTITUTE OF RH TECHNOLOGY Informatics Q4 a i ii iii input Allows input controls to be added to a form Attribute name e ol Starts a Ordered list Attribute type frame Allows browser window to be divided in to different sections called frames Attribute Src INFORMATICS ERE INSTITUTE OF 53 E TECHNOLOGY Informatics Q4 b i lt center gt lt a href scenaries html target _blank gt img src Sigiriya jpg alt Sigiriya alt sigiriya gt lt a gt lt center gt INFORMATICS BOB INSTITUTE OF 54 RH TECHNOLOGY Informatics Q4 b ii dl dt Importance dt dd Famous because of the ancient frescoes dd dt Nick name dt dd The Lion s Rock dd lt dl gt INFORMATICS INSTITUTE OF 55 E TECHNOLOGY Informatics 04 b iii link href file1 css rel stylesheet type text css gt This will add the CSS code in the file file1 css to the web page The web page contents will be displayed according to the code in the file1 css INFORMATICS ERE INSTITUTE OF 56 E TECHNOLOGY Informatics
7. An online feature to view the new arrivals for a member INFORMATICS INSTITUTE OF TECHNOLOGY Bou Bag Informatics 2 b ii Non Functional requirements The interfaces in the system should be user friendly The library staff should be able to learn the system quickly The system interfaces should be loaded quickly Library staff has to access the system as administrators while members has to log to the system as systems INFORMATICS INSTITUTE OF TECHNOLOGY Bou Bag Informatics DFD symbols Process data store source sink o ME DeMarco amp Yourdon symbols INSTITUTE OF TECHNOLOGY data flow Gane amp Sarson symbols uuu Informatics Importance of DFD t helps to organize the data flow properly Programmers use DFDs to plan exactly how their new program is going to accomplish its intended purpose Decision building DFDs help the programmer figure out what options the programs will need in order to handle the data it is given Presentation It helps to present the software plan to a group of stake holders despite of their IT literacy Adaptability If the programmer requires to INFORMATICS INST Har h EIE JEMO nge T e p an Informatics 2 c i Output C System Name INFORMATICS 9g Source System analysis and design by Kenda
8. HNOLOGY 1nformatics That s in my cache Domain points to the IP 173 245 61 120 www gohacking com Oo sz response Let me cache that as well if I get more requests for the same domain INT vni uou INSTITUTE OF TECHNOLOGY Informatics Proxy Server Internet Wireless Connection INFORMATICS BOB INSTITUTE OF Bag TECHNOLOGY Informatics Difference between IP address and mac address MAC address is supposedly unique to each network interface card while an IP address is usually replaced An address reveals which element on which network it is while the same cannot be extracted from a MAC address An address is usually assigned by the network administrator or internet service provider you are either provided a static one at the beginning or given a dynamic one every time you connect to the network This is not true with MAC addresses as it is already embedded on the device or the network card during manufacturing It is supposed to be permanent and could not be changed by anyone as it was meant to identify a specific network g card no matter where it is in the world INSTITUTE OF E TECHNOLOGY Informatics Useful networking commands IPCONFIG is a MS DOS utility that can be used from MS DOS and a MS DOS shell to display the network settings currently assigned and given by a network This command can be utilized to verify a network connection
9. as well as to verify your network settings PING Ping is one of the most commonly used and known commands Ping allows a user to ping another network IP address This can help determine if the network is able to communicate with the network NSLOOKUP The nslookup MS DOS utility that enables a user to do a reverse lookup on an IP address of a domain or host on a network INFORMATICS INSTITUTE OF E TECHNOLOGY Informatics HOSTNAME The hostname command displays the host name of the Windows XP computer currently logged into NETSTAT The netstat command is used to display the TCP IP network protocol statistics and information WINIPCFG The winipcfg command available in Windows allows a user to display network and network adapter information Here a user can find such information as an IP address Subnet Mask Gateway etc e PATHPING Pathping is a MS DOS utility available for Microsoft Windows 2000 and Windows XP users This utility enables a user to find network latency and network loss INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics 2 a Maintenance Waterfall model is simple to implement and also the amount of resources required for it are minimal therefore it suits for simple systems which the requirements are clearly understood INFORMATICS INSTITUTE OF TECHNOLOGY Informatics nagod 4 a i Identifying Identifying the problem and doing an init
10. asses through the network from one device to the next without regard to the physical interconnection of the devices A network s logical topology is not necessarily the same as its physical E FE topology B TECHNOLOGY Informatics 1 b Range Leading bits of first San in address octet End address General allocation address binary decima l 0 127 0 0 0 0 127 255 255 Very large international 255 organization 191 0 255 192 192 0 0 223 255 255 Small and mid sized 223 0 255 businesses 22000 129925558 INSTITUTE OF 53 b 200 168 80 8 27 Subnet mask 255 255 255 224 Number of direct hosts 30 network address 200 168 80 0 First usable host 200 168 80 1 Last usable host 200 168 80 30 Broadcast address 200 168 80 31 INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics 1 c i INFORMATICS INSTITUTE OF TECHNOLOGY 10 0 0 1 Ethernet Switch 10 0 0 2 iE 10 0 0 3 IH 10 0 0 254 gt gt gt lt im 24 Router 192 168 0 254 Ethernet Switc E 192 168 0 1 192 168 0 2 192 168 0 3 192 168 0 4 mJ 192 168 0 5 1 T Your Computer SMTP C Sending Mail Receiving Mail Internet gt x Your ISP s Fusix Mail Server Mail Server INFORMATICS INSTITUTE OF TEC
11. ection becomes a list 4 Find the length value of the data and assigns it to datacount 5 Perform the sorting and arrange the number set in to descending order 6 Close the file 7 print the list Output 15 12 9 8 7 6 4 3 2 1 0 INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics 6 a i i DOB age y i pe conducted 1 L rer ecture LecturerName MaxOualification INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics Building Better Solutions Through Integratic Entities Relationships Student and Course Lecturer and Course INFORMATICS s INSTITUTE OF Illi TECHNOLOGY 6 a ii Cardinality Reason Many to many One student can do many courses In a course there are many students One to many One lecturer can conduct many courses A course can be conducted by one lecturer Informatics 6 a ili No INFORMATICS INSTITUTE OF TECHNOLOGY Informatics Building Better Solutions Through Integration 6 b Student AdmissionNo Name dob Age Course Cousreld CourseName CourseDetails Lecturerld ContactNo ContactID AdmissionNo ContactNo Follow AdmissionNo Cousreld completiondate Lecturer Lecturerld LecturerName MaxQualifications INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics 6 c i create table student AdmissionNo char 10 Name
12. es and deadlines INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics m Business Modeling ll Requremerts e P Analysis Design Tes a nite ma Deployment um Implamentation Time INFORMATICS B28 INSTITUTE OF TECHNOLOGY Informatics RUP is not a single concrete prescriptive process but rather an adaptable process framework intended to be tailored by the development organizations and software project teams that will select the elements of the process that are appropriate for their needs RUP is a specific implementation of the Unified Process t is suitable for large and complex systems INFORMATICS INSTITUTE OF 555 TECHNOLOGY Informatics 2 b Requirement analysis Requirement elicitation gather information about the current system using fact finding method Analyzing the gathered requirements Verifying the requirements Identify functional and non functional requirements Create System requirements specification doc INFORMATICS INSTITUTE OF TECHNOLOGY Bou Bag Informatics 2 b ii Functional requirements Members who registered newly should be displayed as a table List of members who didn t pay the membership fee should be displayed Librarian should be able to make reports about the book categories from the system
13. ial investigation about it Feasibility Checking whether the project is economically technically and operationally feasible Analyzing Conducting a detailed requirement identification and make requirement specification Planning the new system and create the design specification Convert the design spec into working programmes Checking the system to identify all types of bugs Transferring the system to user s enviornment Fixing new equipment Training Users ane Changing according to the new requirements let TECHNOLOGY Evaluate aBarnativas Operational 1 l Partition Requirements plan lifecycle benchmarks plan Detailed Pian the next design iteration a Code Integration Wa u deliverables forthe test 5 iteration and verify Rel ace that they are correct ormatics Building Better Solutions Through Integration The spiral model is intended for large expensive and complicated projects which risks can be also there INFORMATICS INSTITUTE OF E TECHNOLOGY Informatics Rapid Application Development RAD TRADITIONAL RAD PROTOTYPE vemo em QUICK D o CYCLES INFORMATICS ii INSTITUTE OF Bag TECHNOLOGY Informatics The lack of extensive pre planning generally allows software to be written much faster and makes it easier to change requirements therefore it is suitable for projects which has tight schedul
14. ity 0 High humidity 1 Presence D If no one in the room 0 If any one in the room 1 Based on the following conditions the A C will be switched off Any time user can manually switch off the A C 0 At least two of the sensors should get negative 0 input Consider switching off process of the A C as Boolean 1 and switching on process as Boolean 0 and answer adis f tt wing conditions TECHNOLOGY ABCD 0 00 0 0 0 011 2 24 1 3 a 1 1 1 1 0 0 110 0 10 0 0 1 1 1 0 0 010 0 LOV IET 150 1 0 13 0519 1 1 1 Informatics noona lu 1 1 INFORMATICS INSTITUTE OF TECHNOLOGY INFORMATICS INSTITUTE OF TECHNOLOGY Informatics Standard SOP Y 0 1 2 3 4 5 6 7 8 9 10 13 14 15 nag Informatics INFORMATICS INSTITUTE OF TECHNOLOGY INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics INFORMATICS INSTITUTE OF TECHNOLOGY Informatics b i e 0000000000000000 1111111111111111 e 10210 1 INFORMATI CS INSTITUTE OF E TECHNOLOGY Informatics b ii e 0101111000110001 Virtual memory address space in bits 219 Virtual memory address space in kilobytes 23 8KB INFORMATICS INSTITUTE OF E TECHNOLOGY Informatics b iii e 01011
15. l and Kendal TECHNOLOGY Informatics pbi ee tT 6 sep MINAS T Thani Tan OIN ru LM z gt mam ay Y Jt General Entity 5 Process m 1 BBB 291 gt j uM 1 J l 1 ji he I sa v pom URB Entity General General 2 t Process Process mie CCC DDD 151 i endal 50 urce Sys 1 icunNULUUI rmatics Building Better Solutions Through Integration 2 c ii Levels of testing Unit testing Integration testing System testing Acceptance testing INFORMATICS INSTITUTE OF E TECHNOLOGY Informatics Unit testing Unit testing also known as component testing refers to tests that checks the accurate functionality of a specific section of code The programme codes units modules are individually tested INFORMATICS ERE INSTITUTE OF E TECHNOLOGY Informatics Integration testing Integration testing works to expose defects in the interfaces and interaction between integrated components modules The individual components are integrated to see whether the functionality of the software Interdependency of the modules will be tested INFORMATICS BOB INSTITUTE OF RH TECHNOLOGY Informatics Systems testing The complete system is tested after integrating the all the components It evaluates the system s compliance with its specified requirements Most of
16. the this falls into the category of black box testing It includes many types of testing methods such as Graphical user interface testing Usability testing Performance testing Compatibility testing Error handling testing Load testing Volume testing Stress testing Security testing Scalability testing Sanity testing Smoke testing Regression testing Reliability INSTITUTE OF testing Installation testing Maintenance testing lefeematies Acceptance testing Acceptance Testing is a level of the software testing process where a system is tested for acceptability The purpose of this test is to evaluate the system s compliance with the business requirements and assess whether it is acceptable for delivery Acceptance testing can mean one of two things A smoke test is used as an acceptance test prior to introducing a new build to the main testing process i e before integration or regression Acceptance testing performed by the customer often in their lab environment on their own hardware is go as user acceptance testing UAT TECHNOLOGY Informatics 2 d iii Black box testing Also known as functional testing Software testing technique whereby the internal workings of the item being tested are not known by the tester For example in a black box test on a software design the tester only knows the inputs and what the expected outcomes should be and not how the program arrives
17. tions and use this information along with distance and cost algorithms to determine the best route for a given packet RESET 297 Bnooou INFORMATICS INSTITUTE OF TECHNOLOGY Informatics 1 a ii OSI Model x Application x Presentation Application x Transport Transport x Network internet Data nk Physical INFORMATIC m INSTITUTE O 388 TECHNOLOG TCP IP and the model Informatics Network Interface ayer Name Mnemonic 7 Application All 6 Presentation People 5 Session Seem 4 Transport To 3 Network Need 2 Data Link Data 1 Physical Processing INFORMATICS INSTITUTE OF TECHNOLOGY Encapsulation Devices or Units Components Keywords Description Network services for application processes such as file print messaging database services Standard interface to data for the application layer MIME encoding data encryption conversion formatting compression Interhost communication Establishes manages and terminates connection between applications End to end connections and reliability Segmentation desegmentation of data in proper sequence Flow control Logical addressing and path determination Routing Reporting delivery errors Physical addressing and access to media Two sublayers Logical Link Control LLC and Media Access Control MAC Binary transmission signals and encoding Layout of pins
18. voltages cable specifications modulation BS data PC data data segments packets router bridge frames switch NIC repeater hub transciever bits Informatics ei v az i I Layer Presentation Layer Session Layer Tana Network Layer 5 Lin Liner Physics Layer Ave icat on Layer Transport E Building Better Solutions Through tS 1 a Hi Connection orientated Before data is transferred a connection needs to be opened and acknowledged Once established data is transferred and acknowledged to ensure reliable transfer Connectionless Data is simply transmitted when ready no connection establishment phase However data is unacknowledged and therefore unreliable An example of connection oriented protocol is TCP and a connectionless protocol is UDP TCP makes a connection and checks whether the data is received and resends if it is not UDP is a connectionless protocol it does not guarantee delivery by first connecting and checking whether data is received INFORMATICS ES INSTITUTE OF E TECHNOLOGY Informatics 1 iv The physical topology of a network is determined by the capabilities of the network access devices and media and the cost associated with cabling or telecommunications circuits The logical topology in contrast is the way that the signals act on the network media or the way that the data p
Download Pdf Manuals
Related Search
Related Contents
Carnets de voyage : Mode d`emploi - Saint-Amand Brinly-Hardy PA-40 User's Manual CREATING RELIABLE PARTNERSHIPS FOR SOCIAL HOUSING. Origin Storage 250GB 7200RPM Enigma FIPS Notebook Drive 取扱説 - ご利用の条件|取扱説明書|ケンウッド Tecumseh AEA1410YXA Drawing Data IOM 30RB100-300 FeliCa対応 ICカード社員食堂システム Halstead - Jetstreme Copyright © All rights reserved.
Failed to retrieve file