Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL
2018
PROGRAM
Master
of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT
CODE & NAME
MIT405–
Data Warehousing and Data Mining
Assignment
Set - 1
Q.1 List the popular tools for Data
Warehouse development. Explain data warehouse types. 2.5+7.5
Answer-
Tools
for Data Warehouse Development
To
maintain a leading edge in this highly competitive business world, the managers
of every organization, big or small, strive to get the right information at the
right time. As a result, every organization is now developing and deploying
Data Marts (Data Mart is small Data Warehouse which is
Q.2 Describe metadata classification.
Show the relationship between metadata classifications with suitable
diagram. 7+3
Answer-
Metadata
classification-
In
order to have more clarity in Metadata requirements, it is often advisable to
have a metadata classification strategy and share it with all the stakeholders.
metadata
classifications
Q.3 Compare E-R modeling and
Dimensional Modeling. 10
Answer-
E
- R Modeling-
Entity
- Relationship modelling is a very popular method for designing databases. E-R
modelling, as it is often called, may be described as a top down approach, in
that it encourages looking at the “big picture" first. We begin by
describing the world in terms of entity types that are related to one another
in various ways. We may then refine that picture to show the attributes of each
entity type. Thus we start by looking for the major kinds of things that
populate the
Assignment
Set - 2
Q.1 Discuss the relation between
data warehouse and data mining. 10
Answer-
Relation
between Data Warehousing and Data Mining-
The
connection between data warehouse and data mining is indisputable. Popular
business organizations use these technologies together. The current section
describes the relation between data warehouse and data mining. Data mining is
concerned with finding hidden relationships present in business data to allow
businesses to make predictions for future use. It is the process of data-
Q.2 Describe the following:
(a) Database Management Systems
(DBMS) vs. Data Mining. 5
(b) Data mining techniques.
5
Answer-
Database Management
Systems (DBMS) vs. Data Mining-
Area
|
DBMS
|
DATA
MINING
|
Task
|
Extraction of
detailed
and
summary data
|
Knowledge
discovery of
hidden patterns
and
insights
|
Q.3 Explain the concepts of data
transformation. 10
Answer-
Data
Transformation -
Data
transformations are often the most complex and, in terms of processing time,
the most costly part of the ETL process. They can range from simple data
conversions to extremely complex data scrubbing techniques. Before moving the
extracted data from the source systems into the Data Warehouse, you inevitably
have to perform various kinds of data transformations. You
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL
2018
PROGRAM
Master
of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT
CODE & NAME
MIT4062-
Cryptography and Network Security
Assignment
Set - 1
Q.1 Explain the three categories of
evaluation criteria for Advanced Encryption Standard (AES). 10
Answer-
Three categories
of evaluation criteria for Advanced Encryption Standard (AES) :
The three categories of
criteria were:
• Security: Security
which was the most important category and the most difficult to assess refers
to the effort required to cryptanalyze an algorithm. The emphasis in the
evaluation is on the
Q.2 Write a short note on the
following :
a) Asymmetric Keys
2.5
b) Public Key Certificate 2.5
c) Public Key (Asymmetric)
Cryptographic Algorithm 2.5
d) Public Key Infrastructure 2.5
Answer-
Asymmetric Keys :
Asymmetric
keys, also known as public/private key pairs, are used for asymmetric
encryption. Asymmetric encryption is used mainly to encrypt and decrypt session
keys and digital signatures. Asymmetric
Q.3 Explain how Hash functions is
useful in following applications:
a) Message authentication 5
b) Digital signature 5
Answer-
Message
authentication :
Message authentication is a
mechanism or service used to verify the integrity of a message. It assures that
data received are exactly as sent (i.e., contain no modification, insertion,
deletion, or replay). When a hash function provides message authentication, the
hash function value is called as a message digest. We can achieve message
authentication using a message authentication code (MAC), also known as a keyed
hash function. A MAC function takes as input a secret key and a data block and
Assignment
Set - 2
Q.1 Describe the four types of
protocol of SSL (4x2.5) 10
Answer-
Protocol
The SSL defines four
protocols in two layers. They are:
·
Change
CipherSpec protocol
·
Handshake
protocol
Q.2 Describe the distribution of
public keys using following methods: 10
a) Public announcement 5
b) Public-key authority 5
Answer-
Public
Announcement of Public Keys -
The very important point of public-key encryption is
that the public key is public. In public-key algorithm, such as RSA, any
participant can send his or her public key to any other participant or
broadcast the
Q.3Describe security association in
IP security policy. List and describe the three parameters used to identify
security association. (4+6) 10
Answer-
IP Security
Policy :
A security policy is a rule that is programmed into
the IPSec implementation that tells it how to process different datagram's
received by the device. A security policy is applied to each IP packet that
transits from
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL
2018
PROGRAM
Master
of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT
CODE & NAME
MIT4064–
Customer Relationship Management
Assignment
Set - 1
Q.1 Describe five benefits of
Computer Telephony Integration. 5 x 2
Answer-
Companies
in varied sectors have recognized the above fact and have realized that their
success depends on how much of the unique needs and expectations of their
customers they are able to satisfy. As CTI is the primary interface between the
company and its customers, it is necessary to make it a
Q.2
Reason out why marketing should lead the integration with operation process for
better results in a company. 10
Answer-
Integrating
marketing and operational choices helps an organization to grow more profitably.
It helps a company to maximize cost effectiveness by creating a robust and
healthy relationship between its
Q.3 List and explain the important
elements for a successful CIC. 5 x 2
Answer-
Planning
a Successful CIC
A
successful CIC is accomplished only if the following conditions are sustained:
·
Maintain customer loyalty
– Gradually,
companies realized that the best way to retain customers is through positive
relationship management and outstanding customer
Assignment Set – 2
Q.1 Describe the advantages and
disadvantages of Application Service Provider under the business head. 5+5
Answer-
Advantages and
disadvantages of Application Service Provider under the business head-
Though
going in for an ASP solution might seem attractive to a company, the company
needs to do a lot of thinking before taking this step. The company needs to
identify its core business strengths
Q.2 List and describe the three sub
processes of CRM. 1+9
Answer-
CRM
Macro Business Processes-
CRM
is considered as a strategic process-oriented, cross-functional, value creating
ystem for companies and their customers.
Hence, a more holistic view of cross functions needs to be present. This macro
level crossfunctional view of CRM provides a structure for Business to Business
(B2B) relationships. CRM process involves the activities and strategies that
companies use
Q.3 What is social relationship
management? Explain Kano’s model with respect to quality assessment of a web
site. 2+8
Answer-
Social
Relationship Management (SRM)-
SRM
is the most modern form of social networking. The strong presence of the social
era has enabled consumers to turn to social media for answers, recommendations
and opinions. Forrester
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412. If
your questions not match with assignment, don’t worry we will provide by mail
according to your questions