MAP

Free Programming and Computer Science Books | DOWNLOAD FREE EBOOKS

Free Computer Programming Language Books

Programming Language C++
  1. An Overview Of The C++ Programming Langauge- Bjarne Stroustrup
  2. Thinking in C++ Volume 1 - Introduction to Standard C++ - Bruce Eckel
  3. Thinking in C++ Volume 2 - Practical Programming - Bruce Eckel, Chuck Allison
  4. A Beginner's C++ - Neil Gray
  5. Introduction to OOP Using C++ - Peter Müller
  6. ANSI/ISO C++ Professional Programmer's Handbook-Danny Kalev
  7. C++ Annotations -Frank B. Brokken
  8. C++ GUI Programming with Qt 3 -Jasmin Blanchette, Mark Summerfield
  9. C++ In Action: Industrial Strength Programming Techniques -Bartosz Milewski
  10. C++ Essentials -Sharam Hekmat
  11. C++: A Dialog (formerly: Who's Afraid of C++?) - Steve Heller
  12. Incompatibilities Between ISO C and ISO C++ - David R. Tribble
  13. Industrial Strength C++; Rules and Recommendations- Henricson,Nyquist and Utvecklings
  14. Style Guides for C and C++ - Lott
  15. Optimizing C++ - Steve Heller
  16. Neil's Guide to C++ - Neil C. Obremski
  17. An Introduction to C++ Programming - Ian Aitchison and Peter King
  18. An Introduction to C++ Programming - Björn Fahller
  19. C++ GUI Programming With Qt 3 -Jasmin Blanchette, Mark Summerfield
  20. C++ Programming Language Tutorials- Douglas C. Schmidt
  21. C++ In Action - Industrial Strength Programming Techniques - Bartosz Milewski
  22. Teach Yourself C++ in 21 Days
  23. Teachers' Guide to Practical C++ Programming -Steve Oualline and C. M. Oualline
  24. C++ Annotations -Frank B. Brokken
  25. C++ Reference
  26. Complete C++ Language Tutorial -Juan Soulie
  27. The C++ Course- Allen B. Downey
  28. Using C and C++ with Fortran --Beebe
  29. Applied C++: Techniques for Building Better Software -Philip Romanik, Amy Muntz
  30. Data Structures and Algorithms with Object-Oriented Design Patterns in C++ - Bruno R. Preiss
  31. Teach Yourself C++ in 21 Days
  32. The Function Pointer Tutorials for C/C++
  33. SUN C++ User's Guide
  34. C++ Programming for Scientists -Roldan Pozo, Karin Remington
  35. C++ Reference Guide - Danny Kalev
  36. C++ Coding Standard Specification
  37. C++: The Rule Of Three -Valmont
  38. C++ Programming Tutorials
  39. An Introduction to GCC: for the GNU Compilers GCC and G++ - Gough, Stallman
  40. C++ Neural Networks and Fuzzy Logic - Valluru B. Rao
  41. Wireless Game Development in C/C++ with BREW - R. Barbagallo
  42. Techniques for Scientific C++ -Todd Veldhuizen
  43. C++ Programming for Scientists - Roldan Pozo/Karin Remingto

Useful Material for MBA students - sem-III ~ GTU MATERIAL

YOUR 3rd SEMESTER MATERIAL PROVIDE YOU AS SOON AS POSSIBLE ..

THANK YOU FOR VISIT..

 - GTU

1st year GTU Colleges Paper | GTU Paper | GTU Exam Paper | BE - May-June-July 2011 | GTU

BE - SEM - 1
18-06-2011110008
21-06-2011110002
23-06-2011110003
25-06-2011110004
28-06-2011110005
30-06-2011110006
04-07-2011110007
06-07-2011110001 110011
08-07-2011110009
11-07-2011110010
13-07-2011110013
 

Entrance Exam Material Download Free

your material for the entrance exam provide you as soon as possible... 

thanks fro visit...

GTU MCA 3rd SEMESTER | SOOADM ASSIGNEMENTS

Department of MCA
Semester – III
(1) What is System? Explain the types of System in brief.
(2) List and briefly define the seven phases of the systems development life cycle.
(3) Discuss the Roles & Qualities of System Analysts.
(4) Give the Differences:
(a) OAS vs. KWS
(b) MIS vs. DSS
(c) CSCWS vs. GDSS
(5) List the reasons for adopting CASE tools.
(6) List advantages of using Code Generation tools.
(7) List the advantages of using system analysis and design techniques.
(8) Discuss integrating technologies for systems.

Databse Management System - II | Assignment - 5 Relational Algebra

M.C.A. Semester - II
620006 – Databse Management System - II
Assignment – 5 (Relational Algebra)

-----------------------------------------------------------------------------------------------------------------
Q-1. Explain the Following Questions in detail.

1). What is relational Algebra?
2). Explain SELECTION operator with Example?
3). Explain PROJECTION operator with Example?
4). Explain UNION operator with Example?
5). Explain SET DIFFERENCE operator with Example?
6). Explain CARTESIAN PRODUCT operator with Example?
7). Explain RENAME operator with Example?
8). Explain SET INTERSECTION operator with Example?
9). Explain NATURAL JOIN operator with Example?
10). Explain DIVISION operator with Example?
11). Explain ASSIGNMENT operator with Example?
12). Explain INSERT, DELETE and UPDATE operator with Example?
 ------------------------------------------------------------------------------------------------------------------
Q-2. Query Examples in Relational Algebra and SQL

Consider the relation schemas as follows and Convert Following query into SQL and Relational Algebra.

WORKS           (PERSON_NAME, COMPANY_NAME, SALARY)
LIVES              (PERSON_NAME, STREET, CITY)
LOCATED_IN   (COMPANY_NAME, CITY)
MANAGERS     (PERSON_NAME, MANAGER_NAME)
          Where manager_name referes to Person_name
A) Find the name of the persons who work for company ‘FBC’
B) List the names of the persons who work for company ’FBC’ along with the cities they live in.
C) Find the persons who work for company ’FBC’ with a salary of more than 10000. List the names of these persons along with the streets and cities where they live.
D) Find the names of the persons who live and  work in the same city.
E) Find the names of the persons who live in the same city and on the same street as their managers.
F) Find the names of the persons who do not work for company ’FBC’.
G) Find the persons whose salaries are more than the salary of everybody who work for company ’SBC’.
H) Find the names of the companies that is located in every city where company ’SBC’ is located in.
------------------------------------------------------------------------------------------------------------------

Assignment | Database Security | database management system - II



M.C.A. Semester - II
620006 – Databse Management System - II
Assignment – 4 (Database Security)
------------------------------------------------------------------------------------------------------------
 Q-1. Explain the Following Questions in detail.

1).What is Security? Explain the importance.
2).What is database security? Explain the purpose and scope of database security.
3).Explain the different threats of database security.
4).List the types of database security issues.
5).What is Access control? Define the types of access control.
6).Explain Discretionary Access Control.
7).Describe the Granting privileges using SQL with syntax and example.
8).Describe the Revoking privileges using SQL with syntax and example.
9).Explain the concept of Audit Trail?
10).Explain the Mandatory Access Control.
11).What is statistics database security?
12).What do you mean by firewall? What are firewall techniques that are used in database Security?
13).Explain data Encryption with different schemes.
14).What is meant by privileges? Discuss the types of privileges at account or system level and Table or relational level?
15).Using Polyalphabetic substitution method and encryption key, “SECURITY”, encrypt the plaintext message “SELL ALL STOCKS”
------------------------------------------------------------------------------------------------------------------------------------------------------
Q-2. Differentiate the following :

1).Security Vs integrity
2).Discretionary Access Control Vs Mandatory Access Control
3).Authorization Vs Authentication.
4).Simple Property Vs Star Property
5).Audit Trail Vs Transaction Log
6).Simple Substitution Method Vs Polyalphabetic Substitution Method

DBMS - II ASSIGNMENT | Assignment Database Backup and Recovery

M.C.A. Semester - II
620006 – Databse Management System - II
Assignment – 3 (Database Backup and Recovery)
------------------------------------------------------------------------------------------------------------ 
Q-1. Explain the Following Questions in detail.

1). What is Database Backup? Why backup is needed? Explain Types of Database Backup?
2). Discuss different types of database failures that may occur in database environment?
3). What is Recovery? Explain types of Recovery? (Forward and Backward Recovery)
4). What is Log Based Recovery? Explain all Log based Recovery technique with Example?
5). What is Checkpoint? How is checkpoint information is used in recovery operation following System crash explain with example?
6). Describe Shadow Paging Recovery Technique? Under what circumstances does it 
not require a transaction log? List advantages and disadvantage of shadow paging?
7). What is Database Buffer? Explain Buffer Management technique used in database recovery?
8). Table : Transaction T1

Time shot
Transaction Step
Actions
Time-1
Read (A,a1)
Read current employee’s load balance.
Time-2
a1:= a1 – 500
Debit the Account by INR 500
Time-3
Write(A,a1)
Write the new loan balance
Time-4
Read (B,b1)
Read the current account payable balance
Time-5
b1 := b1 + 500
Credit the account balance by INR 500
Time-6
Write(B,b1)
Write the new balance
Time-7
Commit T1
Commit entire transaction

Consider the transaction as above Table to create log entries for immediate updates. Suppose, that a failure occurs just after the transaction log record for action Write(B,b1) has been Written.
a). Show the Contents of transaction log at the time of failure.
b). What action is necessary and Why?
c). What are the Resulting value of A and B?


9). Consider the transaction as above Table to create log entries for deferred updates. Suppose, that a failure occurs just after the record is written to the transaction log?
a). Show the Contents of transaction log at the time of failure.
b). What action is necessary and Why?
c). What are the Resulting value of A and B?


10).  Consider the following Transaction Step for Immediate Update Technique. 
Initial Value of A=1000, B=2000 and C=700.
         
Transaction Step
Actions
Begin Transaction T1
Start Transaction T1
            Read (A)
Read Value A
            A:= A – 50
Deduct 50 from A
            Write(A)
Write the new value of A
            Read (B)
Read the Value of B
            B := B + 50
Add 50 to B
            Write(B)
Write the new value of B
End Transaction
Commit entire transaction T1
Begin Transaction T2
Start Transaction T2
           Read (C)
Read Value of C
           C:=C-100
Deduct 100 from C
           Write (C)
Write the new value for C
End Transaction T2
Commit Entrire transaction T2

  • Create Log entries for Above transaction steps.
  • Let us Assume that the crash occurs just after the log record for step write(B) of transaction T1 then
    • What action is necessary and why?
    • What are the resulting value of A and B
  • Let us Assume that Crash comes just after the log record for the Wrtite(C) of Transaction T2 then
    • What action is necessary and Why?
    • What are the resulting value of A and B?
  • Finally, Let us Assume that Crash occurs just after the log record for Transaction T2,Commit
    • What action is necessary and Why?
    • What are the resulting value of A and B?  
11). Consider the following log entries.
Log Entries
T1,Start
T1,A,5000,4500
T1,Commit
Checkpoint
T2,Start
T2,B,1000,1050
T2,C,4000,3900
T2,Commit
T3,Start
T3,D,2500,2000
T4,Start
T4,E,1000,1200
T4,F,1200,1400

Suppose, that system crash is occurs after the last write entry of F of transaction T4 
then What action is necessary and why?        

----------------------------------------------------------------------------------------------------------------------------------------------
 Q-2. Differentiate the following :
1). Deferred Update Vs Immediate Update
2). Rollforward Vs Rollback
3). Stable Storage Vs Disk
4). Volatile Storage Vs Non-Volatile Storage
5). System Crash Vs Media Failure
-----------------------------------------------------------------------------------------------------------------------------------------------

Q-3. Answer the following in One line?
1) If the buffer pool is large enough that uncommited data are never forced to disk, is UNDO still necessary?
2) How about REDO?
3) If updates are always forced to disk when a transaction is performed, is UNDO still necessary?
4) How about REDO?
5) After a soft crash, where in the log should Analysis start?
------------------------------------------------------------------------------------------------------------

Twitter Delicious Facebook Digg Stumbleupon Favorites More