Monday 9 January 2017

mit4033 smu msc it fall 2016 (jan/feb 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology (MSc IT)
SEMESTER
FOURTH
SUBJECT CODE & NAME
MIT4033- Wireless and Mobile Communication
Qus:1 Write a short note on different generations of wireless network.
Answer: The wireless communication network has undergone lot of evolution from the day of its introduction. To study these history and evolution it is categories as different generations. Every generation carries the features that are available and supported by electronic devices of

Qus:2 Describe the concepts of followings:
(a) cell splitting
(b) frequency reuse in cellular networks
Answer: (a)cell splitting
This method to increase the capacity of users is used in a network when the size of each cell is same and the density of users on different. If the size of the cell is large, then the transmitted radio wave must be of higher energy (called strength of the signal) to reach the border of the cell


Qus:3 Describe BSC and MSC protocols.
Answer: BSC protocols Once the information is communicated from the BTS to the BSC, the Abisinterface is used to communicate further the information between the BT Sand BSC. At this level, the radio resources at the lower portion of Layer 3are handled by the Base Transceiver Station Management (BTSM) protocol rather than the RR protocol. The BTSM layer acts as a

Qus:4 List and explain the different methods of speech coding.
Answer: There are three different speech coding methods. They are:
a) Waveform coding
b) Source coding and
c) Hybrid coding
a) Waveform coding
This approximates the speech signal as waveform. In this class of coding, the objective is to minimize a criterion which measures the dissimilarity between the original and the reconstructed

Qus:5 Explain the following with context to GSM security:
a) A5 algorithm for encryption
b) A8 algorithm for key generation
Answer: GSM encryption is the means by which phone conversations on networks using GSM are scrambled, such that they cannot be descrambled and intercepted by others.
Basically 3

Qus:6What is Wimax? Discuss it’s architecture with suitable diagram.
Answer: WiMAX, which stands for worldwide Interoperability for Microwave Access, was designed by the WiMAX forum and standardized as IEEE 802.16.
WiMAX are being classified as a metropolitan area network (MAN). WiMAX is a telecommunications protocol that provides fixed and mobile Internet access. Two version of WiMAX are as

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mit4024 smu msc it fall 2016 (jan/feb 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
FOURTH
SUBJECT CODE & NAME
MIT4024– Customer Relationship Management
Qus:1 What is CRM? Describe its different types.
Answer: Defining CRM is a bit ironic because it is not very difficult to define but at the same time there is no single universal definition for this term. Actually, there are many definitions due to the presence of many CRM software vendors and system integrators in the IT industry. However,

Qus:2a) Write the benefits of CRM technology for front office.
b) State the CRM technology components and explain any one.
Answer: a) Write the benefits of CRM technology for front office.
The front office functioning group has direct contact with customers. The function of this group includes marketing, sales, and after-sales services. It deals with textual data, that is, the information about the relationship between customers and companies.
The


Qus:3 List and explain the different ways to synchronize data.
Answer: Portable devices synchronize data in three different ways. Figure 4.1 depicts the various types of data


Qus:4 List and briefly describe the elements that are essential for a successful CIC.
Answer: A successful CIC is accomplished only if the following conditions are sustained:
 Maintain customer loyalty – Gradually, companies realized that the best way to retain customers is through positive relationship management and outstanding customer service. An important element



Qus:5 What are the basic steps in project planning?
Answer: This phase involves planning for the project which is done after analyzing all the requirements and specifications thoroughly. It involves creating a suite of planning documents to help guide the team throughout the project.
The following steps are followed in project planning:
1. Breaking up of the requirement specifications into smaller subtasks or activities
2. Sequencing of activities and identifying activities that can be implemented at the same time

Qus:6 What are the three sub processes of CRM? Explain.
Answer: CRM consists of three sub processes. They are:
 Marketing process
 Sales process
 Customer service process
These

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mit4023 smu msc it fall 2016 (jan/feb 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT4023– Real Time Operating Systems
Qus:1 What is RTOS? What are its requirements?
Answer: A real-time system is one whose correctness involves both the logical correctness of outputs and their timeliness. An embedded system is a specific real-time computer system. Earlier embedded systems were designed for specialized applications but now reconfigurable and programmable embedded systems are used. Some examples of embedded systems are: the microprocessor

Qus:2 a) State RISC characteristics.
b) Why memory protection is necessary?
Answer: a) State RISC characteristics.
A real time system is often implemented on custom hardware that isspecifically designed and developed for the purpose. For example a cell phone does not use traditional microprocessors. Cell phones use processors which are tiny, supporting only those processing capabilities that are really for cell phone operation and specifically designed to be power

Qus:3 Briefly describe the followings:
(a) DROL
(b) RTC++
(c) FLEX
Answer:
(a) DROL
DROL is an object-oriented language which extends the general purpose Language C++ for distributed real-time applications. DROL is based on the idea of distributed real-time objects which have asynchronous message passing. A distributed real-time object has the properties of best effort and least suffering. Best effort is defined as a scheduling policy in which two


Qus:4 Describe the basic design principles in ROTS environment.
Answer: An embedded system with a single CPU can run only one process at an instance. The process may be either an ISR, kernel function or a task. An RTOS use in embedded system provides the following.
1. The user threads to run in kernel space(to execute fast).
2. Effective handling of ISRs, device drivers, tasks or threads and enabling and disabling of

Qus:5 Describe the following disk scheduling algorithms:
(a) Elevator algorithm
(b) D-SCAN and FD-SCAN algorithm
Answer: (a) Elevator algorithm
Classical disk scheduling schemes attempt to minimize the average seek distance. For example, in the elevator algorithm, the disk head is in either an inward-seeking phase or an outward-seeking phase. While seeking inward, it services any requests it passes until there are no


Qus:6 Explain Cryptography. Describe the components of Cryptography with a neat labeled diagram.
Answer: Cryptography, a word with Greek origins, means “Secret Writing”. However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks.
The original

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mi0036 smu mba fall 2016 (jan/feb 2017 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
fall 2016
PROGRAM
MASTER OF BUSINESS ADMINISTRATION (MBA)
SEMESTER
III
SUBJECT CODE & NAME
MI0036 – BUSINESS INTELLIGENCE TOOLS

1. Explain Data, Information & Knowledge. Define the meaning of Business Intelligence (BI). Write a short note on Data Governance (DG)
a) Explanation of Data, Information & Knowledge
b) Meaning of Business Intelligence (BI)
c) Write a short note on Data Governance (DG)

Answer: a) Data is a collection of discrete objects, facts, figures, symbols, images or sound. Data is of little or no meaning if it is out of context. Let’s consider the following examples.

2. Explain the various components of Data Warehouses and its goals.
a) Explanation of the various components of Data Warehouses
b) Goals of Data Warehouses

Answer: a) The various components of a data warehouse are as follows:
Data sources: It refers to any electronic source from where data is collected, such as point of sales (POS). Data collection can be real-time, transaction-by-transaction, or on the basis of a regular cycle (weekly, monthly, quarterly, yearly, etc.).
Data

3. List and elaborate the Phases of the Business Intelligence (BI) Lifecycle
Phases of the Business Intelligence (BI) Lifecycle

Answer: Phases of the Business Intelligence (BI) Lifecycle
1.      Discover: As a first step, it is imperative to identify a business need before starting any project. The organisation then evaluates the significance of the business need and ensures that it aligns with the
2.       
4. Write short note on the types of approaches for Development of Business Intelligence Solutions and Differentiate between Waterfall & Agile Approach
a) Short note on the types of approaches for Development of Business Intelligence Solutions
b) Difference between Waterfall & Agile Approach

Answer: a) Approaches for Development of Business Intelligence
The waterfall approach
In the waterfall approach, software development is viewed as a sequential process, in which the development process tasks are performed in a particular order. Moreover, every single task is


5. Elaborate on the Business Intelligence (BI) applications in Finance
Business Intelligence (BI) applications in Finance

Answer: BI Applications in Finance
Understanding how BI can be harnessed and applied to the finance sector is beneficial for both investors and financial institutions. A recent report of financial institutions states that many


6. Write Short notes on
a) Business Sponsors
b) Business Intelligence (BI) Project Planning
c) Silver Bullet Syndrome

Answer: a) Business sponsors
Strong business sponsors believe in the BI project’s value and remove the obstacles to champion it. A BI project requires support from a committed business sponsor within an organisation. It generally fails to find that support. Business sponsors create suitable objectives for BI

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



mi0035 smu mba fall 2016 (jan/feb 2017 exam) IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
fall 2016
PROGRAM
MASTER OF BUSINESS ADMINISTRATION (MBA)
SEMESTER
III
SUBJECT CODE & NAME
MI0035 – COMPUTER NETWORKS

1 Explain the concept of computer networks. Briefly explain the different types of networks.
Concept of computer networks
Types of computer networks

Answer: In a general sense “network” refers to a group of objects, individuals connected to each other. Similarly a cluster of interconnected computers that communicate with one another through a


2 Write Short notes on:
a) Connectors
b) PC Cards
c) Hubs
d) Bridges

Answer: a) Connectors are devices that join two network hardware components together and are used for varied purposes such as audio/video, internetworking, power transfer, etc. In computer networking, a connector may be used to connect an NIC (Network Interface Card) to a cable, connect various fragments of a cable together, or terminate the end of a cable. Generally, connectors


3 Explain the Elements of Communication System. Elaborate on Modulation/Demodulation (Modem)
a) Explanation of the Elements of Communication System
b) Elaborate on Modulation/Demodulation (Modem)

Answer: a) Elements of Communication System
The data exchange between computer and its components by means of protocols and hardware equipments makes a well-defined communication system. The five main elements of a

4 Identify and explain the five types of classes of IP Address. Also write few points on Private and Public IP Addresses.
a) Explanation to the five types of classes of IP Address.
b) Private and Public IP Addresses.

Answer: a) Types of classes of IP address
Class A
Class A addresses are used when there are several hosts communicating on a large network. It uses the first octet, in which the first bit is set to zero and the other seven bits are all set to one. These networks use the first 8 bits of the IP address to identify the network address and the remaining

5 Briefly discuss concept of Network Management Tools and Applications.
a) Network Management Tools.
b) Network Management Applications.

Answer: a) Tools
The tools that are used to test and debug the network can vary from simple to complex devices. The most common tools that are used in network testing are as follows:
Electrical testers: These testers are used to measure both AC and DC voltages, resistance and continuity. This tester displays the value of the voltage if available on the cable. It shows zero


6 Explain the Working, benefits and limitations of Cloud Computing.
a) Explanation to the Working of Cloud Computing.
b) Explanation to the benefits of Cloud Computing.
c) Explanation to the limitations of Cloud Computing

Answer: a) Working of Cloud Computing
It is a common notion that the term cloud computing and the Internet are synonymous. In the following section let us discuss cloud computing in detail, explore its` working and implementation.

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412