Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL
2018
PROGRAM
Master
of Business Administration- MBA
SEMESTER
Semester
3
SUBJECT
CODE & NAME
ISM301
– Software Engineering
SET-I
Q.1 Provide three examples of
projects that can be developed on the “prototyping model approach.”
Provide three example. 2
Elaborate about the examples 8
Answer-
There are several steps in the Prototyping Model:
1.
The new system requirements are defined in as much
detail as possible. This usually involves interviewing a number of
Q.2 Explain how
the philosophy of the “agile software development method” is different from
that of the “traditional software development methods.”
Discuss about “agile software
development method. 3
Discuss about traditional software
development methods. 3
Point out the differences between
them. 4
Answer:
Agile software development method:
What is Agile?
The ability to create and respond to change in
order to succeed in an uncertain and turbulent environment.
What is Agile Software Development?
Agile
Q.3 What is an SRS? Explain the
need and importance for having such a document
What is SRS? 3
Explain the need and importance for
having such a document 7
Answer-
SRS-
A
software requirements specification (SRS) is a document that captures complete
description about how the system is expected to perform. It is usually signed
off at the end of requirements engineering
SET-II
Q.1 What is a software requirements
specification? Explain with an example.
What is a software requirements
specification 6
Explain
with an example. 4
Answer-
Software
Requirements Specification (SRS)-
Specification is a document
that describes the requirements of a system from the user point of view. SRS is
a complete description of the function, performance and environment for the
software under development. SRS is provided at the end of analysis task. SRS
specifies functional
Q.2 What is a modular design? What
is a data design?
What is a modular design? 5
What is a data design? 5
Answer-
Modular Design-
Modular design define as the design of any
system made up of separate modules that can be linked together. Modular design
facilitates the replacement or addition of any module without affecting the
remaining
Q.3 Explain the common features
included in KPA. Explain the procedures involved in ISO 9000 series.
Explain
the common features included in KPA 4
Explain the procedures involved in
ISO 9000 series. 6
Answer-
Common features
included in KPA-
Common features can be
defined as aspects that determine whether the execution and
institutionalisation of a KPA is capable, and whether it can be done
repetitively while being sustainable. We organise every KPA into five sections.
These sections are called “common features” of CMM
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL
2018
PROGRAM
Master
of Business Administration- MBA
SEMESTER
Semester
3
SUBJECT
CODE & NAME
ISM302
– Database Management System (DBMS)
Q.1 What are the properties of
DBMS? What are the components of DBMS? Describe with its use.
Properties of DBMS 4
Explain the use of different
components of DBMS 6
Answer-
Properties of
Database Management System-
The following are the
important properties of database:
·
A database is a
logical collection of data having some implicit meaning. If the data are not
related then it
Q.2
Differentiate between files on unordered records and files on ordered records. What
is hashing technique?
Difference between files on
unordered records and files on ordered records. 7
What is hashing technique?
3
Answer-
Difference between files on
unordered records and files on ordered records-
In the simplest and most basic type of organisation,
records are placed in the file in the order in which they
Q.3 Differentiate between tuple
relational calculus and domain relational calculus. 5
Explain the different types of SQL
statements. 5
Answer-
Tuple relational
calculus-
The tuple calculus is based
on specifying a number of tuple variables. A tuple variable is a variable that
ranges over some named relation that is a variable whose permitted values are
only tuples of that relation. This means that in a relation R, if the tuple
variable t ranges over R, then at any
SET-II
Q.1 Explain the steps involved in
database access operations. Describe the ACID properties with examples 5X2
10
Explain the steps involved in
database access operations. Describe the ACID properties with examples
Answer-
The basic
database access operations are as follows:
1. Read-item (x) It reads a
database item named “x” into a program variable.
2. Write-item (x) It
Q.2 List various
functions of Distributed databases. Explain three different types of data
fragmentation.
List various functions of
Distributed databases. 5
Explain three different types of
data fragmentation. 5
Answer-
Functions of
distributed databases-
Basic functions performed by
DDBMS in addition to those of centralised
DBMS are as follows:
·
Distributed query processing – Distributed query processing means the ability to access remote sites
and transmit queries and data among the various sites via the communication
Q.3 How is public key encryption
different from bit-pattern method? List the role of DBA in database security.
Explanation of public key
encryption different from bit-pattern method.
5
List the role of DBA in database
security. 5
Answer-
Public key
encryption-
Public key encryption is a
method of cryptosystem which was proposed by Diffie and Hellman in 1976. Public
key encryption was based on mathematical functions. They used two keys instead
of one key as in bit-pattern method. This increases the strength of confidentiality.
The two keys are private key and public key in which private key is a secret
key. These keys allow anyone to send a message in a coded form. However,
decryption key is secret and only the rightful
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL
2018
PROGRAM
MASTER
OF BUSINESS ADMINISTRATION (MBA)
SEMESTER
III
SUBJECT
CODE & NAME
ISM303
– COMPUTER NETWORKS
Q.1 List and explain the advantage
of Computer Network.
Advantage of Computer Network. 10
Answer-
Advantage of Computer
Network-
Some of the advantages a
computer network allows are shown in Fig.
Q.2 Explain the main elements of
Communication System.
Elements of Communication
System. 10
Answer-
Elements of
Communication System-
The data exchange between
computer and its components by means of protocols and hardware equipments makes
a well-defined communication system. The five main elements of a communication
system are
Q.3 Explain the process of
Compressing an image.
Process of Compressing an
image. 10
Answer-
The JPEG is a technique of compressing an image. It is
the Joint Photographic Expert Group (JPEG) who designed the JPEG algorithm for
compressing the digital images. The compression of an image gets completed in
three phases. Each phase uses the image in the 8x8 block. The first
Q.1 List and briefly explain the
Seven Layered OSI Model
Explanation of OSI Model. 10
Answer-
The
Seven-Layered OSI Model
The OSI reference model
emerged as a first step towards international standardisation of the protocols
used in the various layers by the ISO. The model is called the ISO OSI
reference model as it deals with connecting open systems, that is, systems open
for communication with other systems. An
Q.2 Explain the evolution of
Network Management. What are Network sniffers?
a) Evolution of Network
Management. 5
b)What are Network sniffers
Answer-
a)Evolution of Network
Management-
In the early 1980s, the application of TCP/IP suite
started deploying networks commercially. Day-by-day, new network technologies
and products were evolved and added to the existing network.
Q.3 What are the objectives of
E-Governance? Explain Networking Application in Social Networking.
a) Objectives of E-Governance. 5
b) Networking Application in Social
Networking. 5
Answer-
Objectives of
E-Governance-
E-governance is a facility
by which various government bodies strive to inform and educate the people
about their
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
ASSIGNMENT
DRIVE
FALL
2018
PROGRAM
MASTER
OF BUSINESS ADMINISTRATION (MBA)
SEMESTER
III
SUBJECT
CODE & NAME
ISM304
– BUSINESS INTELLIGENCE TOOLS
SET
– I
Q.1 What is Business Analytics?
Explain the importance of Business Analytics in Organizations.
a)
Explanation of Business Analytics
5
b)
Importance of Business Analytics 5
Answer-
Business
Analytics-
Business Analytics (BA)
refers to the skills, applications, technologies and practices used to improve
business performance by gaining insight through continuous exploration of the
past data. BI is not possible
Q.2 What is Data Mining? Explain
the types of relationships in Data Mining.
a) Definition of Data Mining 5
b) Types of relationships in Data
Mining 5
Answer-
Definition of
Data Mining-
Data mining (DM) is a
practice of analysing data from different perspectives based on some defined
criterion. Data mining is also known as knowledge discovery. Databases can
accommodate vast quantities of data that aids in decision making. It is almost
impossible to extract useful business information by manual methods, mainly due
to the huge volume of data involved. Data mining
Q.3 List and explain the phases of
Business Intelligence Lifecycle
Phases
of Business Intelligence Lifecycle
10
Answer-
BI Lifecycle-
BI comprises a broad
category of applications and techniques that are used for collecting, storing,
analysing and providing easy access to data in order to help business users in
making better business decisions. BI may be defined as the process of analysing
a vast amount of corporate data, usually stored in large databases such as a
data warehouse; tracking business performance; detecting
Set – II
Q.1 What is Promotion? Explain the
types of Promotional Tools. Define USP (Unique Selling Proposition.)
a)
Definition of Promotion 3
b)
Types of Promotional Tools 4
c)
Definition of USP 3
Answer-
Definition of
Promotion-
Promotion: Promotion refers to a part of the total effort an
organisation applies to communicate with consumers about its offerings.
Therefore, promotion represents all communication methods that a marketer can
Q.2 List and
explain the rules for successful implementation of the Optimization solution
for Logistics Planning.
Rules for successful implementation
of the Optimization solution for Logistics Planning. 10
Answer-
Optimisation modelling is
done to improve the existing processes or structures in an organisation. An
Q.3 What is Cloud Computing 4 ?
Explain its Salient features. 6
a) Definition of Cloud Computing.
b) Salient features of Cloud Computing.
Answer-
Cloud Computing-
Cloud can be defined as a combination of hardware,
networks, storage, services, and interfaces which helps in delivering computing
services. It acts as a common centre for its users to fulfil their computing
needs. Broadly, there are three types of cloud users: end user, business
management
Complete Smu assignments available in rs
125 per assignment only
You can mail us your questions computeroperator4@gmail.com
within 1 min to 1 hour will revert you. Otherwise
you can call us on 08791490301, 08273413412.
If your questions not match with assignment, don’t worry we will provide by
mail according to your questions
No comments:
Post a Comment