Tuesday 4 December 2018

smu mba 3 sem IT fall 2018 solved assignment jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Business Administration- MBA
SEMESTER
Semester 3
SUBJECT CODE & NAME
ISM301 – Software Engineering

SET-I
Q.1 Provide three examples of projects that can be developed on the “prototyping model approach.”
Provide three example.                      2
Elaborate about the examples          8
Answer-
There are several steps in the Prototyping Model:
1.      The new system requirements are defined in as much detail as possible. This usually involves interviewing a number of
Q.2 Explain how the philosophy of the “agile software development method” is different from that of the “traditional software development methods.”
Discuss about “agile software development method.             3
Discuss about traditional software development methods.      3
Point out the differences between them.                                  4
Answer:
Agile software development method:
What is Agile?
 The ability to create and respond to change in order to succeed in an uncertain and turbulent environment.
 What is Agile Software Development?
Agile

Q.3 What is an SRS? Explain the need and importance for having such a document
What is SRS?                                                           3
Explain the need and importance for having such a document                  7
Answer-
SRS-
A software requirements specification (SRS) is a document that captures complete description about how the system is expected to perform. It is usually signed off at the end of requirements engineering

SET-II
Q.1 What is a software requirements specification? Explain with an example.
What is a software requirements specification                    6
Explain with an example.                                               4
Answer-
Software Requirements Specification (SRS)-
Specification is a document that describes the requirements of a system from the user point of view. SRS is a complete description of the function, performance and environment for the software under development. SRS is provided at the end of analysis task. SRS specifies functional

Q.2 What is a modular design? What is a data design?
What is a modular design?                  5
What is a data design?                         5
Answer-
Modular Design-
 Modular design define as the design of any system made up of separate modules that can be linked together. Modular design facilitates the replacement or addition of any module without affecting the remaining

Q.3 Explain the common features included in KPA. Explain the procedures involved in ISO 9000 series.
Explain the common features included in KPA                      4
Explain the procedures involved in ISO 9000 series.                      6
Answer-
Common features included in KPA-
Common features can be defined as aspects that determine whether the execution and institutionalisation of a KPA is capable, and whether it can be done repetitively while being sustainable. We organise every KPA into five sections. These sections are called “common features” of CMM


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Business Administration- MBA
SEMESTER
Semester 3
SUBJECT CODE & NAME
ISM302 – Database Management System (DBMS)
Q.1 What are the properties of DBMS? What are the components of DBMS? Describe with its use.
Properties of DBMS                                                        4
Explain the use of different components of DBMS      6
Answer-
Properties of Database Management System-

The following are the important properties of database:
·         A database is a logical collection of data having some implicit meaning. If the data are not related then it


Q.2 Differentiate between files on unordered records and files on ordered records. What is hashing technique?
Difference between files on unordered records and files on ordered records.     7
What is hashing technique?                                                                                       3
Answer-
Difference between files on unordered records and files on ordered records-
In the simplest and most basic type of organisation, records are placed in the file in the order in which they
Q.3 Differentiate between tuple relational calculus and domain relational calculus.    5
Explain the different types of SQL statements.                      5
Answer-
Tuple relational calculus-
The tuple calculus is based on specifying a number of tuple variables. A tuple variable is a variable that ranges over some named relation that is a variable whose permitted values are only tuples of that relation. This means that in a relation R, if the tuple variable t ranges over R, then at any

SET-II

Q.1 Explain the steps involved in database access operations. Describe the ACID properties with examples        5X2      10
Explain the steps involved in database access operations. Describe the ACID properties with examples  
Answer-
The basic database access operations are as follows:
1. Read-item (x)  It reads a database item named “x” into a program variable.
2. Write-item (x)  It


Q.2 List various functions of Distributed databases. Explain three different types of data fragmentation.
List various functions of Distributed databases.    5
Explain three different types of data fragmentation.    5
Answer-
Functions of distributed databases-
Basic functions performed by DDBMS in addition to those of centralised
DBMS are as follows:
·         Distributed query processing – Distributed query processing means the ability to access remote sites and transmit queries and data among the various sites via the communication


Q.3 How is public key encryption different from bit-pattern method? List the role of DBA in database security.
Explanation of public key encryption different from bit-pattern method.    5
List the role of DBA in database security.                            5
Answer-
Public key encryption-
Public key encryption is a method of cryptosystem which was proposed by Diffie and Hellman in 1976. Public key encryption was based on mathematical functions. They used two keys instead of one key as in bit-pattern method. This increases the strength of confidentiality. The two keys are private key and public key in which private key is a secret key. These keys allow anyone to send a message in a coded form. However, decryption key is secret and only the rightful


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
MASTER OF BUSINESS ADMINISTRATION (MBA)
SEMESTER
III
SUBJECT CODE & NAME
ISM303 – COMPUTER NETWORKS
Q.1 List and explain the advantage of Computer Network.
Advantage of Computer Network.    10
Answer-
Advantage of Computer Network- 
Some of the advantages a computer network allows are shown in Fig.




Q.2 Explain the main elements of Communication System.
Elements of Communication System.      10
Answer-
Elements of Communication System-
The data exchange between computer and its components by means of protocols and hardware equipments makes a well-defined communication system. The five main elements of a communication system are

Q.3 Explain the process of Compressing an image.
Process of Compressing an image.    10
Answer-
The JPEG is a technique of compressing an image. It is the Joint Photographic Expert Group (JPEG) who designed the JPEG algorithm for compressing the digital images. The compression of an image gets completed in three phases. Each phase uses the image in the 8x8 block. The first

Q.1 List and briefly explain the Seven Layered OSI Model
Explanation of OSI Model.    10
Answer-
The Seven-Layered OSI Model
The OSI reference model emerged as a first step towards international standardisation of the protocols used in the various layers by the ISO. The model is called the ISO OSI reference model as it deals with connecting open systems, that is, systems open for communication with other systems. An

Q.2 Explain the evolution of Network Management. What are Network sniffers?
a) Evolution of Network Management.   5
b)What are Network sniffers
Answer-
a)Evolution of Network Management-
In the early 1980s, the application of TCP/IP suite started deploying networks commercially. Day-by-day, new network technologies and products were evolved and added to the existing network.

Q.3 What are the objectives of E-Governance? Explain Networking Application in Social Networking.
a) Objectives of E-Governance.         5
b) Networking Application in Social Networking.     5
Answer-
Objectives of E-Governance-
E-governance is a facility by which various government bodies strive to inform and educate the people about their

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions
ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
MASTER OF BUSINESS ADMINISTRATION (MBA)
SEMESTER
III
SUBJECT CODE & NAME
ISM304 – BUSINESS INTELLIGENCE TOOLS
SET – I
Q.1 What is Business Analytics? Explain the importance of Business Analytics in Organizations.
a) Explanation of Business Analytics        5
b) Importance of Business Analytics           5
Answer-
Business Analytics-
Business Analytics (BA) refers to the skills, applications, technologies and practices used to improve business performance by gaining insight through continuous exploration of the past data. BI is not possible



Q.2 What is Data Mining? Explain the types of relationships in Data Mining.
a) Definition of Data Mining                             5
b) Types of relationships in Data Mining       5
Answer-
Definition of Data Mining-
Data mining (DM) is a practice of analysing data from different perspectives based on some defined criterion. Data mining is also known as knowledge discovery. Databases can accommodate vast quantities of data that aids in decision making. It is almost impossible to extract useful business information by manual methods, mainly due to the huge volume of data involved. Data mining

Q.3 List and explain the phases of Business Intelligence Lifecycle
Phases of Business Intelligence Lifecycle       10    
Answer-
BI Lifecycle-
BI comprises a broad category of applications and techniques that are used for collecting, storing, analysing and providing easy access to data in order to help business users in making better business decisions. BI may be defined as the process of analysing a vast amount of corporate data, usually stored in large databases such as a data warehouse; tracking business performance; detecting


Set – II

Q.1 What is Promotion? Explain the types of Promotional Tools. Define USP (Unique Selling Proposition.)
a) Definition of Promotion                                   3
b) Types of Promotional Tools                          4
c) Definition of USP                                           3
Answer-
Definition of Promotion-
Promotion: Promotion refers to a part of the total effort an organisation applies to communicate with consumers about its offerings. Therefore, promotion represents all communication methods that a marketer can

Q.2 List and explain the rules for successful implementation of the Optimization solution for Logistics Planning.
Rules for successful implementation of the Optimization solution for Logistics Planning.       10
Answer-
Optimisation modelling is done to improve the existing processes or structures in an organisation. An


Q.3 What is Cloud Computing    4  ? Explain its Salient features.     6
a) Definition of Cloud Computing. b) Salient features of Cloud Computing.
Answer-
Cloud Computing-   
Cloud can be defined as a combination of hardware, networks, storage, services, and interfaces which helps in delivering computing services. It acts as a common centre for its users to fulfil their computing needs. Broadly, there are three types of cloud users: end user, business management

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions




No comments:

Post a Comment