After going through this Unit, you should be able to:
Indira Gandhi open university | School of Computer and Information Sciences Provide Useful Study material and crack to The Ignou and top.
From Twitter
SOME PRE-REQUISITES AND Asymptotic Bounds ASYMPTOTIC BOUNDS INTRODUCTION
We have already mentioned that there may be more than one algorithms, that solve a
given problem. In Section 3.3, we shall discuss eight algorithms to sort a given list of
numbers, each algorithm having its own merits and demerits. Analysis of algorithms,
the basics of which we study in Unit 3, is an essential tool for making well-informed
decision in order to choose the most suitable algorithm, out of the available ones if
any, for the problem or application under consideration.
given problem. In Section 3.3, we shall discuss eight algorithms to sort a given list of
numbers, each algorithm having its own merits and demerits. Analysis of algorithms,
the basics of which we study in Unit 3, is an essential tool for making well-informed
decision in order to choose the most suitable algorithm, out of the available ones if
any, for the problem or application under consideration.
ELEMEMTARY ALGORITHMICS SUMMARY
1. In this unit the following concepts have been formally or informally defined and discussed:
Problem, Solution of a Problem, Algorithm, Program, Process (all section 1.1) . Instance of a problem (Section 1.2)
Problem, Solution of a Problem, Algorithm, Program, Process (all section 1.1) . Instance of a problem (Section 1.2)
Posted by
Unknown
No comments:
Labels:
AVAILABLE TOOLS & ALGORITHMS,
ELEMEMTARY ALGORITHMICS,
MCA 3rd Semester,
SUMMARY

OUTLINE OF ALGORITHMICS
We have already mentioned that not every problem has an algorithmic solution. The problem, which has at least one algorithmic solution, is called algorithmic or computable problem. Also, we should note that there is no systematic method (i.e., algorithm) for designing algorithms even for algorithmic problems.
BUILDING BLOCKS OF ALGORITHMS
Next, we enumerate the basic actions and corresponding instructions used in a
computer system based on a Von Neuman architecture. We may recall that an
instruction is a notation for an action and a sequence of instructions defines a
program whereas a sequence of actions constitutes a process. An instruction is also
called a statement.
computer system based on a Von Neuman architecture. We may recall that an
instruction is a notation for an action and a sequence of instructions defines a
program whereas a sequence of actions constitutes a process. An instruction is also
called a statement.
PROBLEMS, AVAILABLE TOOLS & ALGORITHMS
In order to explain an important point in respect of the available tools, of which one must take care while designing an algorithm for a given problem, we consider some alternative algorithms for finding the product m*n of two natural numbers m and n.
CHARACTERISTICS OF AN ALGORITHM
Next, we consider the concept of algorithm in more detail. While designing an algorithm as a solution to a given problem, we must take care of the following five important characteristics of an algorithm:
EXAMPLE OF AN ALGORITHM
Before going into the details of problem-solving with algorithms, just to have an idea of what an algorithm is, we consider a well-known algorithm for finding Greatest Common Divisor (G.C.D) of two natural numbers and also mention some related historical facts. First, the algorithm is expressed in English. Then, we express the algorithm in a notation resembling a programming language.
ELEMEMTARY ALGORITHMICS INTRODUCTION
We are constantly involved in solving problem. The problems may concern our survival in a competitive and hostile environment, may concern our curiosity to know more and more of various facets of nature or may be about any other issues of interest to us. Problem may be a state of mind of a living being, of not being satisfied with some situation. However, for our purpose, we may take the unsatisfactory/ unacceptable/ undesirable situation itself, as a problem.
SOFTWARE DEVELOPMENT MODELS (Iterative Enhancement Model)
This model was developed to remove the shortcomings of waterfall model. In this model, the phases of software development remain the same, but the construction and delivery is done in the iterative mode. In the first iteration, a less capable product is developed and delivered for use.
Posted by
Unknown
2 comments:
Labels:
Iterative Enhancement Model,
SOFTWARE DEVELOPMENT MODELS,
SOFTWARE ENGINEERING

SOFTWARE DEVELOPMENT MODELS (Waterfall Model)
It is the simplest, oldest and most widely used process model. In this model, each phase of the life cycle is completed before the start of a new phase. It is actually the first engineering approach of software development.
SOFTWARE DEVELOPMENT MODELS
Software Engineering deals with the development of software. Hence, understanding the basic characteristics of software is essential. Software is different from other engineering products in the following ways:
EVOLUTION OF SOFTWARE ENGINEERING
Any application on computer runs through software. As computer technologies have changed tremendously in the last five decades, accordingly, the software development has undergone significant changes in the last few decades of 20th century. In the early years, the software size used to be small and those were developed either by a single programmer or by a small programming team.
Posted by
Unknown
No comments:
Labels:
EVOLUTION,
MCA 3rd Semester,
Question Papers,
Related Topic,
SOFTWARE ENGINEERING

SOFTWARE ENGINEERING AND ITS MODELS
The field of software engineering is related to the development of software. Large software needs systematic development unlike simple programs which can be developed in isolation and there may not be any systematic approach being followed. In the last few decades, the computer industry has undergone revolutionary changes in hardware. That is, processor technology, memory technology, and integration of devices have changed very rapidly.
Subscribe to:
Posts (Atom)
Labels
(MCS-031
(6)
2011
(5)
4nf
(1)
5nf
(1)
ACCESS CONTROL In Relational Database
(1)
ALGORITHMICS
(5)
assignment 2014 2015
(1)
AVAILABLE TOOLS & ALGORITHMS
(5)
BCA
(1)
BINARY SEARCH
(1)
Block Nested Loop Join
(1)
Build and Fix Model
(1)
BUILDING BLOCKS OF ALGORITHMS
(1)
CHARACTERISTICS OF AN ALGORITHM
(2)
Core Java
(1)
Data Communication Network Security
(1)
DATABASE SECURITY
(1)
EER tool
(1)
ELEMEMTARY ALGORITHMICS
(2)
ENHANCED ER TOOLS
(1)
EVOLUTION
(1)
EXAMPLE OF AN ALGORITHM
(2)
Indexed Nested-Loop Join
(1)
install servelet engine
(1)
INTRODUCTION
(1)
Iterative Enhancement Model
(1)
Java Server Pages
(1)
JDBC
(1)
JSP
(2)
LEVELS OF DATABASE SECURITY
(1)
MCA
(9)
MCA 051
(1)
MCA 3rd Semester
(8)
MCA 4th Semester
(1)
MCA 5 sem
(1)
MCS-031
(7)
MCS-031 : DESIGN AND ANALYSIS OF ALGORITHM
(14)
MCS-032
(1)
MCS-033
(1)
MCS-034
(2)
MCS-035
(1)
mcs-041
(2)
MCS-042
(1)
mcs-043
(2)
mcs-052 solved assignment
(1)
MCSL-036
(2)
Nested loop join
(1)
OBJECTIVES
(1)
Operating System
(2)
OUTLINE OF ALGORITHMICS
(1)
Principles of Management and Information Systems
(1)
PROBLEMS
(1)
QUERY PROCESSING AND EVALUATION
(1)
Query processing Optimisation
(1)
Question Papers
(8)
Related Topic
(9)
relational Database
(1)
SELECT OPERATION Query Processing
(1)
Servlet
(1)
Servlet Programme
(1)
Servlet Programming
(1)
SOFTWARE DEVELOPMENT MODELS
(4)
SOFTWARE ENGINEERING
(4)
Solution
(7)
Solved Assignment 2013 2014
(6)
SOME PRE-REQUISITES AND Asymptotic Bounds ASYMPTOTIC BOUNDS INTRODUCTION
(1)
STATISTICAL DATABASE SECURITY
(1)
structure
(1)
SUMMARY
(1)
Waterfall Model
(1)
Write a C program to print the following triangle
(1)