You are on page 1of 22

List of Experiments

INDEX

Explain the Installation process of Operating system and its


1
Memory Management.
Design of a Web Page which describe your Biodata.
2
3 Explain the installation and Uses of Following application
software.
(i) Microsoft Office Package
(ii) Raptor

4 Draw a flowchart and write algorithm for


(i) Addition of first 100 natural numbers.
(ii) Sum of square of first 50 numbers.

5 Draw and explain the 2-tier and 3-tier architecture of DBMS.

What is database Schema? Describe with suitable example.


6
7 What is SQL? How does SQL engine work? Describe with suitable
architecture.
8 What is Rj45 Connector? What is the process to crimp using
crimping tool.

9 Describe ISO-OSI reference model and TCP/IP Model for network


architecture.

10 Describe Software development life cycle (SDLC) with all


components

►- -
QI. Explain the Installation process of Operating system and its Memory
Management.
Ans. The following is an over view of the producers that are needed to
install a new operating system (OS) —►
1. Set up the display environment:
If you are not using the optional DVD drive for preparing the system
for OS installation.
2. Erase the primary boot disk:
If you are have an operating system preinstalled on the server, you
will need to remove it before installing a new operating system.
3. Set up the BIOS:
You need to make sure that the BIOS is setup for the operating
system that you plan to install.
4. Install the operating system:

5. Configure your server for RAID:


If you plan to configure your server for RAID operating, you will
need to perform some setup task before installing the operating
system.
6. Install the operating system: update the drivers, And run operating
system as memory.

Memory management in OS:


Memory management in operating system helps to allocate space to
different application routines this technique allows you to check
how much memory need to allocated to processes that decide
which processor should get memory at what time. It keeps the track
of each memory location whether it is free or allocated.

Q2. Design of a Web Page which describe your Biodata.


Ans. <html>
<head>
<title> Bio data </title>
</head>
<body>
<form name ="bio data" method="post">
<table align="centre" cell spacing="10" cell pading="15" bg
color="#ffffff">
<tr>
<th align="centre" colspan="12" bgcolor="red"> <hlxfont
color="white">Bio data </fontx/hl> </th>
</tr>
<tr>
<td align="right"> <strong>Name</strong> </td>
<td>
<input type="beat">
</td>
</tr>
<tr>
<td align="right"xstrong>Age:</strong>
</tr>
<tr>
<td align="right"xstrong>Educational
Qualification:</strong>
</td>
<td>
<select name="qualification" type=Select-multiple"> <option
name="Select Qualification">Select

Qualification</option>
<option name="B.tech">Bechlore of technology </option
name>
<option name="Eng"> Engineer</option>
</selectx/td>
</tr>
<tr>

<td align="right"xstrong>Work Experience:</strongx/td>


<td> <texture name-'work experience"

placeholder="10years"</texturex/td>
</tr>
<tr>
<bd align="right"xstrong>phone:</strong>
</bd>
<bdxinput type="phone"</inputx/tdx/tr>
<tr bg color="yellow">
<td align="center"x/td>
<tdxinput type="submit" value="submit"x/td>
</br>
</table>
</form>
</body>
</html>
Bio data

---------------

►- -
Q3. Explain the installation and Uses of Following application software.
(i) Microsoft Office Package
(ii) Raptor
Ans. (i)Microsoft Office Package —►
Installation steps —►

1. Before you do anything else, make sure that no program is


running. Otherwise, it might cause some malfunctions and cause damage to
your computer. Insert the DVD in the DVD-ROM. Wait for a new window to
appear. You can even click on the executable file for Office by browsing to CD
in My Computer and run the program.

2. Wait for the installation window to appear. When the next


windows appears, click on Install after selecting Microsoft Office 2010
3.Select the features you want to install from the Installation Options tab.
Then select the drive.
4. Enter the Product Key. This consists of 25 characters. You may have to
click Continue.
5. Then a window will appear with agreement terms. Please read and
accept the agreement terms.
6.0n the window that appears next choose Upgrade to Install or Custom (if
you want modified settings).If you already have Office installed you may
want to upgrade or customize, otherwise click install.
7. Your program will automatically install once you click on Upgrade.
This may take a few minutes.
8.If you chose Custom, modify your settings by clicking on Configure
Preferences.
9. The installation will start and a bar will appear. Wait for it to go up to
lOOthen proceed.
10. Click on close and run Microsoft Office from the Programs in the Start
Menu.
USES:-
Microsoft Office is a suite of applications designed to help with productivity
and completing common tasks on a computer. You can create and edit
documents containing text and images, work with data in spreadsheets and
databases, and create presentations and posters.
(ii)Raptor:-
RAPTOR is a flowchart interpreter that is used to draw flowcharts and help
students visualize their algorithms. It was designed in 2015 by Martin C.
Carlisle, and is only supported in Windows OS.
Installation steps:
1. Locate and double click the downloaded . Msi installer file. It's
recommended to pick the new and latest installer on Windows 10 Operating
System.
2. Double click on the installer file to run it. The installer wizard will guide
you through the steps required to install RAPTOR on the computer. Click on
the Next> button to proceed with the installation.
3. Choose the folder to install and click on the Next> button. 4. To go to the
previous install screen, we can click on the <Back button.
5.click on the Next> button and confirm the installation. 6.Raptor installation
would start and complete.
7. Click on the Yes for the User Access Control elevation prompt.
8. After the install click on the Close button to close the installation wizard
screen.
USES:
RAPTOR allows users to write and execute programs using flowcharts. The
simple language and graphical components of RAPTOR are designed to teach
the major ideas of computer programming to students. It is typically used in
academics to teach introductory programming concepts as well.

Q4. Draw a flowchart and write algorithm for


(i) Addition of first 100 natural numbers.
(ii) Sum of square of first 50 numbers.
Ans. (i)Flotchart:
START

Algorithm:
• So in the first iteration i=l and sum =0+1 as sum is initialized 0 at the
beginning.
• In the second iteration i=2 and sum=l+2 as aum was previously stored
as 1st iterating.
• In the third iteration i=3 and sum=3+3 as sum was previously stored as
3 in the 2nd iterating.
• In the last iterating i=100 and sum=x+100 as sum was previously
stored as x in the second last iteration.

(ii)Flowchart:

START

ACC = 0
X= 1

X=X+1
Algorithm:
• Read 100 steps
• Let Ctr = 0, sum = 0
• Read number
• Ctr = Ctr+ 1
• Compute the square of the number
• Sum = Sum + Square
• If Ctr is less than 50 then steps 3 to 6
• Print Sum
• End
• --------------O-----------------------------------
---------------

Q5. Draw and explain the 2-tier and 3-tier architecture of DBMS. Ans. Two-
tier architecture:-
The two-tier architecture is similar to a basic client-server model. The
application at the client end directly communicates with the database at the
server-side. APIS like ODBC, JDBC are used for this interaction. The server
side is responsible for providing query processing and transaction
management functionalities. On the client-side, the user interfaces and
application programs are run. The application on the client-side establishes a
connection with the server-side in order to communicate with the DBMS. An
advantage of this type is that maintenance and understanding are easier,
compatible with existing systems. However, this model gives poor
performance when there are a large number of users.
Three- tier architecture:-
In this type, there is another layer between the client and the server. The
client does not directly communicate with the server. Instead, it interacts
with an application server which further communicates with the database
system and then the query processing and transaction management takes
place. This intermediate layer acts as a medium for the exchange of partially
processed data between server and client. This type of architecture is used in
the case of large web applications.
Advantages:
Enhanced scalability due to distributed deployment of application servers.
Now, individual connections need not be made between client and server.
Data Integrity is maintained. Since there is a middle layer between client and
server, data corruption can be avoided/removed. Security is improved. This
type of model prevents direct interaction of the client with the server
thereby reducing access to unauthorized data.

Two-tier architecture:-

Three- tier architecture:-


Externol level

User 2 User 3

Q6. What is database Schema? Describe with suitable example.


Ans. Data base schema is an abstract design that represents the storage of
your data in a database. It describes both the organization of data and the
relationships between tables in a given database. Developers plan a
database schema in advance so they know what components are necessary
and how they will connect to each other. A database schema is a blueprint or
architecture of how our data will look. It doesn't hold data itself, but instead
describes the shape of the data and how it might relate to other tables or
models. An entry in our database will be an instance of the database
schema. It will contain all of the properties described in the schema.
NOSQL example
NOSQL databases are primarily referred to as Non-relational or Distributed
Database. Designing a schema for NOSQL is a topic of some debate since
they have a dynamic schema. Some argue that the appeal of NOSQL is that
you don't need to create a schema, but others say that design is very
important for this type of database since it doesn't provide one solution.
This snippet is an example of what a physical database schema will look like
when using Mongoose (MongoDB) to create a database that represents the
entity-relationship diagram above. Click through the code tabs to see the
different parts.
The important thing to remember here is that in NOSQL databases like
MongoDB, there are no foreign keys. In other words, there are no relations
between the schemas. The Object id just represents an id (the id that Mongo
automatically assigns when created) of a document in another collection. It
doesn't actually create a join.

Q7. What is SQL? How does SQL engine work? Describe with suitable
architecture.
Ans. SQL engine is defined as software that recognizes and interprets SQL
commands to access a relational database and interrogate data. SQL engine
is also commonly referred to as a SQL database engine or a SQL query
engine.
Most SQL engines support standard SQL, and many database management
systems (DBMS) also offer application programming interfaces (APIS) to
access database tools beyond the actual database user interface. For
example, OmniSci supports a visualization API called OpenGL as part of the
OmniSci Immerse platform to process visual analytics from big data.
SQL engines are often proprietary architecture designs that offer unique
capabilities for storing and querying data within a relational database
system. Each database instance supports various APIS, programming
languages, partitioning methods, capabilities and more.
SQL Engine
SQL Engine Definition
SQL engine is defined as software that recognizes and interprets SQL
commands to access a relational database and interrogate data. SQL engine
is also commonly referred to as a SQL database engine or a SQL query
engine.
Omni Sci SQL Engine diagram shows the integration of big data through the
Omni Sci DB open source SQL Engine.
FAQS
What is a SQL Engine?
A typical SQL server database engine configuration includes a storage engine
and the query processor. Different SQL engine types support different SQL
server database engine architectures, but in general the SQL engine is a
component of the system that is used to create, read, update and delete
(CRUD) data from a database. Enterprises use SQL server database engines
to create relational databases for online transaction processing (OLTP) and
online analytical processing (OLAP).
Most SQL engines support standard SQL, and many database management
systems (DBMS) also offer application programming interfaces (APIS) to
access database tools beyond the actual database user interface. For
example, Omni Sci supports a visualization API called OpenGL as part of the
Omni Sci Immerse platform to process visual analytics from big data.
SQL engines are often proprietary architecture designs that offer unique
capabilities for storing and querying data within a relational database
system. Each database instance supports various APIS, programming
languages, partitioning methods, capabilities and more.
In order for users to interact with a relational DBMS, their request in a valid
query/database language must be translated into a SQL request before the
SQL engine can process it. The SQL storage engine writes to and retrieves
data from a data warehouse server, often done by converting the data to a
compatible format such as a JSON file.
To retrieve the data, the query processor accepts, parses, and executes SQL
commands for the data warehouse to forward to an application server. The
application server processes the SSQL request and sends it to a web server
where the client can access the information via SQL data tables.
The SQL engine processes data in stages. The stages of processing vary based
on the client but in general, the first stage of SQL processing begins with the
RDBMS parsing a SQL statement via a parse call, to get ready for execution.
The statement is separated into a data structure that other routines can
process, then there are three checks completed - syntax check, semantic
check, and shared pool check.
The second step is query optimization. The RDBMS optimizes the query and
chooses the best algorithms for searching and sifting through data. Finally,
the RDBMS executes the SQL statement by running the query plan.
Microsoft SQL Server is one of the market leaders for database technology.
It's a relational database management system that supports a number of
applications, including business intelligence, transaction processing and
analytics. Microsoft SQL Server is built on SQL, which is a programming
language used to manage databases and query data. SQL Server follows a
table structure based on rows, allowing connection of data and functions
while maintaining the data's security and consistency. Checks in the
relational model of the server work to ensure that database transactions are
processed consistently. Microsoft SQL Server also allows for simple
installation and automatic updates, customization to meet your business
needs and simple.

Q8. What is Rj45 Connector? What is the process to crimp using crimping
tool.
Ans. The eight-pin RJ45 connector is a standardised interface which often
connects a computer to a local area network (LAN). The term RJ45 has also
come to refer to a range of connectors for Ethernet jacks. An 8 Position/8
Contact connector, called an 8P8C, is a modular connector for
telecommunication cables.
Process to crimp using crimping tool:-
1.Strip the cable back 1 inch (25 mm) from the end. Insert the cable into the
stripper section of the tool and squeeze it tight. Then, rotate the crimping
tool around the cable in a smooth and even motion to create a clean cut.
Keep the tool clamped and pull away towards the end of the wire to remove
the sheathing.

2. Untwist and straighten the wires inside of the cable. Inside of the cable
you'll see a bunch of smaller wires twisted together. Separate the twisted
wires and straighten them out so they're easier to sort into the right order.
3. Arrange the wires into the right order. Use your fingers to put the wires
in the correct order so they can be properly crimped. The proper sequence is
as follows from left to right: Orange/White, Orange, Green/White, Blue,
Blue/White, Green, Brown/White, Brown.
4. Cut the wires into an even line a inch (13 mm) from sheathing. Hold the
wires with your thumb and index finger to keep them in order. Then, use the
cutting section of the crimping tool to cut them into an even line.
5.Insert the wires into the RJ-45 connector. Hold the RJ-45 connector so the
clip is on the underside and the small metal pins are facing up. Insert the
cable into the connector so that each of the small wires fits into the small
grooves in the connector.
6.Stick the connector into the crimping part of the tool and squeeze twice,
Insert the connector in the crimping section of the tool until it can't fit any
further. Squeeze the handles to crimp the connector and secure the wires.
Release the handles, then squeeze the tool again to make sure all of the pins
are pushed down.
7.Remove the cable from the tool and check that all of the pins are down.
Take the connector out of the tool and look at the pins to see that they're all
pushed down even line. Lightly tug at the connector to make sure it's
attached to the cable.
Q9. Describe ISO-OsI reference model and TCP/IP Model for network
architecture.
Ans. The OSI Model is a logical and conceptual model that defines network
communication used by systems open to interconnection and
communication with other systems. The Open System Interconnection (OSI
Model) also defines a logical network and effectively describes computer
packet transfer by using various layers of protocols.
TCP/IP helps you to determine haw a specific computer should be connected
to the internet and how you can transmit data between them. It helps you to
create a virtual network when multiple computer networks are connected
together.
TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is
specifically designed as a model to offer highly reliable and end-to- end byte
stream over an unreliable internetwork.
TCP/IP Reference Model is a four-layered suite of communication protocols.
It was developed by the DoD (Department of Defence) in the 1960s, It is
named after the two main protocols that are used in the model, namely, TCP
and IP. TCP stands for Transmission Control Protocol and IP stands for
Internet Protocol.
The four layers in the TCP/IP protocol suite are -
Network Layer- It is the lowest layer that is concerned with the physical
transmission of data. TCP/IP does not specifically define any protocol here
but supports all the standard protocols.
Internet Layer- It defines the protocols for logical transmission of data over
the network. The main protocol in this layer is Internet Protocol (IP) and it is
supported by the protocols ICMP, IGMP, RARP, and ARP.
Transport Layer- It is responsible for error-free end-to-end delivery of data.
The protocols defined here are Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP).
Application Layer- This is the topmost layer and defines the interface of host
programs with the transport layer services. This layer includes all high-level
protocols like Telnet, DNS, HTTP, FTP, SMTP, etc.

Q10. Describe Software development life cycle (SDLC) with all components.
Ans.
Software Development Life Cycle is the application of standard business
practices to building software applications. It's typically divided into six to
eight steps: Planning, Requirements, Design, Build, Document, Test, Deploy,
Maintain. Some project managers will combine, split, or omit steps,
depending on the project's scope. These are the core components
recommended for all software development projects.
SDLC is a way to measure and improve the development process. It allows a
fine-grain analysis of each step of the process. This, in turn, helps companies
maximize efficiency at each stage. As computing power increases, it places a
higher demand on software and developers. Companies must reduce costs,
deliver software faster, and meet or exceed their customers' needs. SDLC
helps achieve these goals by identifying inefficiencies and higher costs and
fixing them to run smoothly
The Seven components of the SDLC:-
1. Planning
In the Planning phase, project leaders evaluate the terms of the project. This
includes calculating labor and material costs, creating a timetable with target
goals, and creating the project's teams and leadership structure.
Planning can also include feedback from stakeholders. Stakeholders are
anyone who stands to benefit from the application. Try to get feedback from
potential customers, developers, subject matter experts, and sales reps.
Planning should clearly define the scope and purpose of the application. It
plots the course and provisions the team to effectively create the software. It
also sets boundaries to help keep the project from expanding or shifting
from its original purpose.
2. Define Requirements
Defining requirements is considered part of planning to determine what the
application is supposed to do and its requirements. For example, a social
media application would require the ability to connect with a friend. An
inventory program might require a search feature.
Requirements also include defining the resources needed to build the
project. For example, a team might develop software to control custom
manufacturing machine. The machine is a requirement in the process.
3. Design and prototyping
The Design phase models the way a software application will work. Some
aspects of the design include:
Architecture- Specifies programming language, industry practices, overall
design, and use of any templates or boilerplate User
Interface - Defines the ways customers interact with the software, and how
the software responds to input
Platform- Defines the platforms on which the software will run, such as
Apple, Android, Windows version, Linux, or even gaming consoles
Programming- Not just the programming language, but including methods of
solving problems and performing tasks in the application Communications-
Defines the methods that the application can communicate with other
assets, such as a central server or other instances of the application
Security- Defines the measures taken application, and may include SSL traffic
encryption, password protection, and secure storage of user credentials
Prototyping can be a part of the Design phase. A prototype is like one of the
early versions of software in the Iterative software development model. It
demonstrates a basic idea of how the application looks and works. This
"hands-on" design can be shown to stakeholders. Use feedback o improve
the application. It's less expensive to change the Prototype phase than to
rewrite code to make a change in the Development phase.
4. Software development
This is the actual writing of the program. A small project might be written by
a single developer, while a large project might be broken up and worked by
several teams. Use an Access Control or Source Code Management
application in this phase. These systems help developers track changes to
the code. They also help ensure compatibility between different team
projects and to make sure target goals are being met.
The coding process includes many other tasks. Many developers need to
brush up on skills or work as a team. Finding and fixing errors and glitches is
critical. Tasks often hold up the development process, such as waiting for
test results or compiling code so an application can run. SDLC can anticipate
these delays so that developers can be tasked with other duties.
Software developers appreciate instructions and explanations.
Documentation can be a formal process, including wiring a user guide for the
application. It can also be informal, like comments in the source code that
explain why a developer used a certain procedure. Even companies that
strive to create software that's easy and intuitive benefit from the
documentation.
Documentation can be a quick guided tour of the application's basic features
that display on the first launch. It can be video tutorials for complex tasks.
Written documentation like user guides, troubleshooting guides, and FAQ's
help users solve problems or technical questions.
5. Testing
It's critical to test an application before making it available to users. Much of
the testing can be automated, like security testing. Other testing can only be
done in a specific environment - consider creating a simulated production
environment for complex deployments. Testing should ensure that each
function works correctly. Different parts of the application should also be
tested to work seamlessly together-performance test, to reduce any hangs
or lags in processing. The testing phase helps reduce the number of bugs and
glitches that users encounter. This leads to a higher user satisfaction and a
better usage rate.
6. Deployment
In the deployment phase, the application is made available to users. Many
companies prefer to automate the deployment phase. This can be as simple
as a payment portal and download link on the company website, on a
smartphone, could also be downloading an application Deployment can also
be complex. Upgrading a companywide database to a newly- developed
application is one example. Because there are several other systems used by
the database, integrating the upgrade can take more time and effort.
7. Operations and maintainance
At this point, the development cycle is almost finished. The application is
done and being used in the field. The Operation and Maintenance phase is
still important, though. In this phase, users discover bugs that weren't found
during testing. These errors need to be resolved, which can spawn new
development cycles.
In addition to bug fixes, models like iterative development plan additional
features future releases. For each new release, new Development Cycle can
be launched.

THANKYOU

You might also like