Skip to main content

BCA 501 INTERNET TECHNOLOGIES

Internet Technologies Theory Assignment


1.      Explain the OOP Concepts with example
2.      Explain the Features of the JAVA
3.      Explain various types of JAVA Programs
4.      Explain JAVA Architecture
5.      Explain JVM
6.      Explain Various Data Types available in JAVA
7.      Explain Structure of JAVA Programs
8.      Explain Operators with Example
9.      What is Type Conversion? Explain with example.
10.  Explain Control Statements with example.
11.  What is inheritance and method overloading explain with example.
12.  Explain final keyword when it is used with class methods and variables.
13.  What is garbage collection? How it works with JAVA.
14.  What are static methods explain with example?
15.  What are static variables explain with example?
16.  Explain packages and uses of packages and how we can implements package?
17.  What is import statement how it works?
18.  Explain multiple inheritances with JAVA.
19.  What is the type conversion describe the difference between type conversion and type casting
20.  What is the use of new keyword explain in detail that how it works?
21.  Explain Break and continue
22.  Method Overloading and Method Overriding
23.  Instance variable hiding

Internet Technologies Practical Assignment

1.      Write a program that find the average of three byte type numbers
2.      Write Java program to find the sum of five short type numbers.
3.      Write Java Program to perform the Addition and Subtraction of two numbers
4.      Write Java Program to perform the bitwise operation on the value of a.
5.      Write Java Program to calculate the area of the circle
6.      Write Java Program to calculate the area of triangle
7.      Write a Java Program to print the factorial of number
8.      Write a Java Program to print the multiplication table
9.      Write a Java Program to find the simple interest
10.  Write a java program to calculate the salary of employee.
a.      insert a Name, Basic Pay, loan amount
b.      Calculate HRA= 10%, DA= 45%, of basic pay.
c.       Add the HRA and DA to basic pay.
d.      Subtract the loan amount form basic pay and   print    it
11.  A shop during festival season offers a discount 10% for purchases made up to Rs.1000, 12% for purchase value of Rs.1000 or more up to 1500 and 15% for purchase value of Rs 1500 or more. Write a program to implement the above scheme for a given sales and print  out the sales value, discount and net amount payable by a customer.

12.  An array of 20 integers is given. Write a java program to arrange them in descending order and print out them.

13.  Write a java program to find the product of two matrices A(3,4) and B(4,2)

14.  Write a java program to find the largest value from a set of given integers


15.  A mark list containing reg no. and marks of three subjects sub1, sub2, sub3. Write a java program to define mark list. Write a constructor to initialize all variables. Write a method called result (int min) where, min indicates the minimum marks for a “Pass” for each subject. This method will declare a candidate “Pass”, if the candidate secures marks in each subject greater than or equal to min. write another overloading method result(int min, int merit), where merit indicates that a candidate who gets a “pass” and average of the three subject equal to or greater than merit eligible for getting a scholarship. Write another class with a main method and try the method for 5 different candidate to determine whether they get “pass” and also determines whether they are eligible for scholarship

Comments

Popular posts from this blog

New software continuously scrambles code to foil cyber attacks: Technique sets a deadline on hackers to severely limit chances of success

New software continuously scrambles code to foil cyber attacks: Technique sets a deadline on hackers to severely limit chances of success : As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief. A new program called Shuffler tries to preempt such attacks by allowing programs to continuously scramble their code as they run, effectively closing the window of opportunity for an attack.