Friday 21 December 2018

smu M.Sc IT 4 sem fall 2018 solved assignment jan/feb 2019 exam


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT405– Data Warehousing and Data Mining

Assignment Set - 1
Q.1 List the popular tools for Data Warehouse development. Explain data warehouse types.  2.5+7.5
Answer-
Tools for Data Warehouse Development
To maintain a leading edge in this highly competitive business world, the managers of every organization, big or small, strive to get the right information at the right time. As a result, every organization is now developing and deploying Data Marts (Data Mart is small Data Warehouse which is

Q.2 Describe metadata classification. Show the relationship between metadata classifications with suitable diagram.  7+3
Answer-
Metadata classification-

In order to have more clarity in Metadata requirements, it is often advisable to have a metadata classification strategy and share it with all the stakeholders.

metadata classifications

Q.3 Compare E-R modeling and Dimensional Modeling.     10
Answer-
E - R Modeling-

Entity - Relationship modelling is a very popular method for designing databases. E-R modelling, as it is often called, may be described as a top down approach, in that it encourages looking at the “big picture" first. We begin by describing the world in terms of entity types that are related to one another in various ways. We may then refine that picture to show the attributes of each entity type. Thus we start by looking for the major kinds of things that populate the

Assignment Set - 2
Q.1 Discuss the relation between data warehouse and data mining.    10
Answer-
Relation between Data Warehousing and Data Mining-

The connection between data warehouse and data mining is indisputable. Popular business organizations use these technologies together. The current section describes the relation between data warehouse and data mining. Data mining is concerned with finding hidden relationships present in business data to allow businesses to make predictions for future use. It is the process of data-

Q.2 Describe the following:
(a) Database Management Systems (DBMS) vs. Data Mining.      5
(b) Data mining techniques.                                                             5
Answer-
Database Management Systems (DBMS) vs. Data Mining-
Area
DBMS
DATA MINING
Task
Extraction of detailed
and summary data
Knowledge discovery of
hidden patterns and
insights

Q.3 Explain the concepts of data transformation.     10
Answer-
Data Transformation -

Data transformations are often the most complex and, in terms of processing time, the most costly part of the ETL process. They can range from simple data conversions to extremely complex data scrubbing techniques. Before moving the extracted data from the source systems into the Data Warehouse, you inevitably have to perform various kinds of data transformations. You

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT4062- Cryptography and Network Security

Assignment Set - 1
Q.1 Explain the three categories of evaluation criteria for Advanced Encryption Standard (AES).   10
Answer-
Three categories of evaluation criteria for Advanced Encryption Standard (AES) :
The three categories of criteria were:

Security: Security which was the most important category and the most difficult to assess refers to the effort required to cryptanalyze an algorithm. The emphasis in the evaluation is on the

Q.2 Write a short note on the following :
a) Asymmetric Keys                                              2.5
b) Public Key Certificate                                      2.5
c) Public Key (Asymmetric) Cryptographic Algorithm     2.5
d) Public Key Infrastructure      2.5
Answer-
Asymmetric Keys  :                                           
Asymmetric keys, also known as public/private key pairs, are used for asymmetric encryption. Asymmetric encryption is used mainly to encrypt and decrypt session keys and digital signatures. Asymmetric

Q.3 Explain how Hash functions is useful in following applications:
a) Message authentication    5
b) Digital signature               5
Answer-
Message authentication :
Message authentication is a mechanism or service used to verify the integrity of a message. It assures that data received are exactly as sent (i.e., contain no modification, insertion, deletion, or replay). When a hash function provides message authentication, the hash function value is called as a message digest. We can achieve message authentication using a message authentication code (MAC), also known as a keyed hash function. A MAC function takes as input a secret key and a data block and


Assignment Set - 2

Q.1 Describe the four types of protocol of SSL    (4x2.5)   10
Answer-
Protocol
The SSL defines four protocols in two layers. They are:
·         Change CipherSpec protocol
·         Handshake protocol


Q.2 Describe the distribution of public keys using following methods:  10
a) Public announcement   5
b) Public-key authority     5
Answer-
Public Announcement of Public Keys -

The very important point of public-key encryption is that the public key is public. In public-key algorithm, such as RSA, any participant can send his or her public key to any other participant or broadcast the

Q.3Describe security association in IP security policy. List and describe the three parameters used to identify security association.   (4+6)   10
Answer-
IP Security Policy :

A security policy is a rule that is programmed into the IPSec implementation that tells it how to process different datagram's received by the device. A security policy is applied to each IP packet that transits from

Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions

ASSIGNMENT
DRIVE
FALL 2018
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT4064– Customer Relationship Management

Assignment Set - 1

Q.1 Describe five benefits of Computer Telephony Integration.    5 x 2
Answer-
Companies in varied sectors have recognized the above fact and have realized that their success depends on how much of the unique needs and expectations of their customers they are able to satisfy. As CTI is the primary interface between the company and its customers, it is necessary to make it a

Q.2 Reason out why marketing should lead the integration with operation process for better results in a company.     10
Answer-
Integrating marketing and operational choices helps an organization to grow more profitably. It helps a company to maximize cost effectiveness by creating a robust and healthy relationship between its


Q.3 List and explain the important elements for a successful CIC.     5 x 2
Answer-
Planning a Successful CIC
A successful CIC is accomplished only if the following conditions are sustained:

·         Maintain customer loyalty – Gradually, companies realized that the best way to retain customers is through positive relationship management and outstanding customer

Assignment Set – 2

Q.1 Describe the advantages and disadvantages of Application Service Provider under the business head.      5+5
Answer-
Advantages and disadvantages of Application Service Provider under the business head-
Though going in for an ASP solution might seem attractive to a company, the company needs to do a lot of thinking before taking this step. The company needs to identify its core business strengths

Q.2 List and describe the three sub processes of CRM.      1+9
Answer-
CRM Macro Business Processes-
CRM is considered as a strategic process-oriented, cross-functional, value creating
 ystem for companies and their customers. Hence, a more holistic view of cross functions needs to be present. This macro level crossfunctional view of CRM provides a structure for Business to Business (B2B) relationships. CRM process involves the activities and strategies that companies use


Q.3 What is social relationship management? Explain Kano’s model with respect to quality assessment of a web site.       2+8
Answer-
Social Relationship Management (SRM)-
SRM is the most modern form of social networking. The strong presence of the social era has enabled consumers to turn to social media for answers, recommendations and opinions. Forrester


Complete Smu assignments available in rs 125 per assignment only
You can mail us your questions computeroperator4@gmail.com within 1 min to 1 hour will revert you. Otherwise you can call us on 08791490301, 08273413412. If your questions not match with assignment, don’t worry we will provide by mail according to your questions




No comments:

Post a Comment