You are on page 1of 15

MBA, BBA, BCA, MCA, BSC-IT, MSC -IT Assignments for SMU (Sikkim Manipal

University)
Call +91- 9727035877 to enquire. Whatsapp: 9830110214.
Mail: projecthelpforyou@gmail.com

FOR FULL ASSIGNMENTS, PLEASE CALL ON 09712985389.WHATSAPP: 9830110214

How much time is required for delivery of the support after the payment?
You will receive the support in just 15 minutes by email after the payment.
However, in some unavoidable circumstances it may take maximum of 8 hours
after the actual payment credit.
Price: we make different answer to each student, so need 1 day time to make
some changes after payment.
You will get solved assignments after 1 Day of payment, in word doc as per SMU
new guidelines.

Charges are :
Semester 1 : Rs 1200/-
Semester 2 : Rs 1200/-
Semester 3 : Rs 1200/-
Semester 4 : Rs 1500/-

We also provides MBA project synopsis ans projects reports as per SMU
guidelines.
We have lots of ready project to save your time. .

Project Charges: Rs.1500/-

Mode of delivery: All our services will be delivered by email only.

SAMPLE:---

FOR FULL ASSIGNMENTS, PLEASE CALL ON 09712985389.WHATSAPP: 9830110214

BEST QUALITY ASSIGNMENTS. PROVIDING FOR LAST 3 YEARS SUCCESSFULLY.


Master of Business Administration- MBA Semester 3 MI0033 Software Engineering-4 Credits
(Book ID: B1483)
Assignment (60 marks)
Note: Answer all questions. Kindly note that answers for 10 marks questions should not exceed 400
words. Each question is followed by evaluation scheme.

Q1. Waterfall Model, V-Model and Spiral Model are of the software development processes.
Companies are using these models to have a systematic and defined approach in software
development. Which of the four phases are involved in the software development process?
(Listing the 4 types- 4 marks, explaining the types- 4 marks, examples-2 marks) (7 10 marks)
Answer.
Listing the phases of SDLC
Software life cycle models describe phases of the software cycle and the order in which those phases are
executed. Each phase produces deliverables required by the next phase in the life cycle. Requirements are
translated into design. Code is produced according to the design which is called development phase. After
coding and development the testing verifies the deliverable of the implementation phase against
requirements. There are following six phases in every Software
Q.2. Software estimation is the first phase of project planning and it is the process of judging a
software product and solving the problem associated with the software project. We follow some
important steps to achieve reliable cost and effort estimates. Explain the different estimation
models and estimation techniques. ( a. Explaining different estimation models, b. Explaining
estimation techniques) 6,4
ANS:

a) Estimation models

As, software has become very expensive, large cost estimation errors will make a huge difference
between profit and loss and hence software estimation plays an important role in a software project
management activity. The different estimation models involved in a software project are:

Q3. a. You are a SCM manager in a software company. How will you establish a software
configuration management process in a company?
(Definition- 1 marks, 4 procedures in software configuration management process-4 marks)
Answer.
Definition: SCM identifies, controls, audits, and reports modifications that invariably occur while
software is being developed, and after it has been released to a customer.
Software Configuration Management Process
Software configuration management is an important element of software quality assurance. Its primary
responsibility is the control of change. However, SCM is also responsible for the identification of
individual SCIs and various versions of the software, the auditing of the software configuration to ensure
that it has been properly developed, and the reporting of all

b. You are appointed as a software developer in a software company and you have been asked by
your project manager to check details of the bugs from the previous version. How will you gather
details associated with the various bugs in the previous version? (Definition 1 mark, typical work
cycle-4 marks) 5+5 marks
Answer.
Definition
If i am appointed as a software developer in a software company then i give these detail: A bug tracking
system or defect tracking system is a software application that is designed to help keep track of reported
software bugs in software develop

Q4. a. If you are a software engineer you must be expert in the field of software, hardware and also
database. It has been listed by the industry professionals that time and effort are the most
important factors in the system analysis stage. Briefly explain the steps used in in system analysis.
(Listing the steps- 1 marks, explanation-4 marks)
Answer.
Steps used in system analysis :
1.Identify system users

b. If you are a software developer in small company, how will you conduct a specification review?
(Explanation-5 marks)
Answer.
Conduction of specification review :
Writing software specifications is more complicated than one would initially suspect. The specification
needs to be completely clear so that it can not be misinterpreted by an implementation or application
developer in order to achieve full interoperabili

Q.5. Write short note on 3,3,2,2
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
ANS:

a) Unit Testing

To understand unit testing, let us first understand what is a unit? The smallest building blocks of
software are called as units. Units are made up of individual functions in a language like C. We can
define unit testing as the method of validating small basic blocks of a complicated system, prior to
testing of an integrated big module or the whole system.

Q6. What are the different methods of software prototypes and tools? (definition of software
prototype-1 mark, 3 types of techniques- 3 marks, explaining tools- 4 marks, benefits of software
prototype- 2 marks) 10 marks
Answer.
Software prototype:
Software prototyping, refers to the activity of creating prototypes of software applications, i.e.,
incomplete versions of the software program being developed. It is an activity that can occur insoftware
development and is comparable to prototyping as known from other fields, such as mechanical
engineering or manufacturing.
DRIVE- Fall 2014
PROGRAM/SEMESTER- MBADS (SEM 3/SEM 5) / MBAN2 / MBAFLEX (SEM 3) /
PGDISMN (SEM 1)
SUBJECT CODE & NAME- MI0034- DATABASE MANAGEMENT SYSTEMS

Q1. Suppose the employee name, employee id, designation, salary, attendance and address of any
employee has to be stored in a database. You can store these data in a sequential address book or it
can be stored on a hard disk, using a computer and software like Microsoft Excel. Using this
example define a database. List and explain the various procedures carried on in a DBMS with a
detailed example of the database.
(Defining a database- 1 mark, listing the 3 procedures 3 marks, explanation- 3 marks, one
examples for each of them - 3 marks)

Answer.

DBMS

A DBMS is a complex set of software programs that controls the organization, storage and retrieval of data in a database.

Procedures

Q2. Level 2 cache has got higher latency than Level 1 by 2 times to 10 times in 512 KiB or more. Its
value is nearer to kilobyte. This is one of the levels of memory hierarchy. Define memory
hierarchy. What are the other levels in memory hierarchy? Explain in one life each for each of
them. (defining memory hierarchy- 1 mark, listing the 6 levels -3 marks, explanation- 6 marks) 10
marks
Answer.
Memory hierarchy: It is used in the theory of computation when discussing performance issues in
computer architectural design, algorithm predictions, and the lower level programming constructs such as
involving locality of reference. A 'memory hierarchy' in computer storage distinguishes each level in the
'hierarchy' by response time. Since response time, comp

Q3.

EMPLOYEE
EMP_I D NAME PROJ ECT SALARY DEPT_NUM
MUL1 Raashi PR2 30000 1
MUL2 Taashi PR1 43000 2
SMU1 Raksha PR3 25000 3
SMU2 Vidhesh PR2 50000 2
SMU3 Akhilesh PR1 83000 2

DEPARTMENT
DEPT_I D DNAME PLACE
1 HRM Bangalore
2 MI S Bangalore
3 Research Chennai
4 Finance Bangalore
Using these tables answer the following question
a. I f we want to see all the employees with salary between 40000 and 50000, which query can be
used?
b. Select employee name from EMPLOYEE table, whose name starts with R
c. Explain aggregate functions and grouping in detail

a. Query based in BETWEEN OPERATOR

b. Query based in LIKE condition

c. Explaining aggregate functions on select statement, with an example, showing the output of
the query, explaining having clause, with example
Solution.

Access provides many different types of queries to meet many different needs for data.
We'll briefly describe most of the query types, although in this course we'll focus on the most commonly
used query type, the s

Q4. Consider a book is written by a particular author. And you have to explain to some one the
relationship that exists between the author and the book. Normally you can draw a diagram and
show the relation. These diagrams are called entity-relationship diagram in which book is one
entity, author is one entity, and the relationship that exists between the two entities is written.
Likewise explain the various notations used to represent the ER diagram. (Listing the notations
with diagrams 5 marks, explaining each one of them in one line with example each-5 marks )
Answer:
The symbols used to design an ER diagram are shown.

Q5. Consider any database of your choice (may be simple banking database/forecasting
database/project management database). Show the deduction of the tables in your database to the
different types of normal forms
(Choosing a proper database-2 marks, Explaining the 5 normal forms with respect to the database
chosen-8 marks) 10 marks
Answer.
Normal forms Based on Primary Keys
A relation schema R is in first normal form if every attribute of R takes only single atomic values. We can
also define it as intersection of each row and column containing one and only one value. To transform the
un-normalized table (a table that contains one or mo

Q6. Read the following case study thoroughly and answer the following questions:
Laxmi bank is one of the largest private sector banks of India. It has an extensive network of more
than 200 branches. It offers banking services to retail as well as corporate clients. The bank faced a
challenge in integrating multi-pronged database management system into a centralized system. The
IT department of the bank also realized that the computing capabilities of its PCs and servers were
not proportionately distributed among all its branches. Each branch had its database management
system stored in a traditional way on the disk. The total cost of operating and maintaining the
current IT infrastructure was very high and the fundamental shortcomings added to the costs.
Moreover, there were also recurrent problems due to the malfunctioning of the currently
operational database management system. Therefore, the banks top management decided to fix the
problem and operationalise a robust database management system. The bank hired an external
database technology consulting firm called AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail banking
vertical and the corporate banking vertical. All the individual database servers from the individual
branches were removed. The entire database system was made virtual such that the managers and
the staff can access only the required information (related to retail banking or corporate banking)
from the respective centralized data centers. There were only two such centralized data centers
(one for retail banking and another for corporate banking) that were managed centrally. Staff and
managers could access the information through their PCs and laptops. Centralized database
management system complemented the security system by bringing in authentication through a
unified ID management server. Managers and officers of the bank were able to process half a
million transactions per month in real time after the new implementation. There were significant
savings in the cost and also in the consumption of power. Now there were no problems with regard
to imbalances in the load across various network servers. Due to centralized data management, top
management could keep an eye on the functioning of various branches. Hence the cases of fraud
and cheating reduced considerably. The bank managers could also process the loan applications in
reduced time since the customers previous records could be accessed at the click of the button and
approval from the higher authorities could be obtained in real time. Moreover the new system also
brought in many applications that helped local managers in the decision making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its centralised database system to a
distributed database system in future?
(a. Listing the uses from the from the case study-2 marks, b. Explaining about data fragmentation,
replication and allocation techniques-6 marks, c. Is it possible to replicate the centralised database
management model of the bank-2 marks) 10 marks
Answer.
a) Uses of centralized data management
A centralized database is a database located and maintained in one location, unlike a distributed database.
One main advantage is that all data is located in one place. A centralized data management system can be
use as:
1. The Two such centralized data centers (one for retail banking and another for corporate banking)
that were managed centrally. Staff and managers could access the information through their PCs
and laptops.

Master of Business Administration- MBA Semester 3
MI0035 Computer Networks -4 Credits
(Book ID: B1481)
Assignment (60 marks)
Note: Answer all questions. Kindly note that answers for 10 marks questions should not exceed
400 word. Each question is followed by evaluation scheme.
Q.1. Write short notes on: 2, 3, 5
a. LAN
b. Analog and digital data transmission
c. High level data link control
ANS:

a) Local Area Network (LAN)

Local Area Network (LAN) is a small computer network, in which two or more computers are directly
connected within a single building or office. It is a small privately owned network, covering a distance of
up to 10km that helps to connect personal computers or workstations to share information and resources.
LANs use

Q2. Videoconferencing is used to conduct meetings with the people who are located in far distance.
Videoconferencing is an example of which type of computer networks? Explain in detail the
different types of networks with example. (Identifying the correct type 2 marks, list the different
types of networks 2 mark, explaining the types- 6 marks)
Ans:

Computer network provides powerful medium of communication for employees. Nowadays, Companies
are using electronic mail for its daily communication. Apart from email, companies are using
videoconferencing as a computer-assisted communication medium. This videoconferencing helps
companies to conduct meetings with people, who are located at a far distance


Q3. A protocol helps in establishing the communication between two systems. Protocols are mainly
divided into asynchronous and synchronous protocols. List and describe in detail the different types
of protocols that are classified under the two main protocols. (list and correct differentiating of
protocols under the two main types 5 marks, explanation- 5 marks) 10 marks
Ans:
Asynchronous protocols Asynchronous transmission is a data transfer method in which a collection of
data is sent together, spaced by varying time intervals. Each data character is preceded by a start-bit and is
followed by an end-bit to inform the receiver where the character begins and ends. Asynchronous
protocols are the communication protocols which are used in asynchronous transmission. An
asynchronous protocol sends data to

Q.4. Integrated Services for Digital Network (ISDN) is a set of communication standards for
Simultaneous digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network. It was first defined in 1988 in the
CCITT red book. Explain the different types of ISDN with their features and advantages for each
one of them. (Explaining Two different types , Features of both of them , Advantages of both of
them) 2,4,4

ANS:

ISDN channels

The term ISDN channel means the passage or transmission of signalling and user information in a single
direction. The three basic ISDN channels are Data channel (D channel), Bearer channel (B channel), and
Hybrid channel (H channel).

Q.5. ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365
storage capacity, storage management and internet service to the customers. It now needs a solution
that will eliminate downtime. Downtime is nothing but the time during which a computer or
computer system is down, or inoperative due to hardware or software failure. We also need the
flexibility in quick response to both the development in customer base and additional capacity and
service demands of the customers. ABC company took the help of network storage infrastructure
software provider to achieve their goals by providing support for end to end redundancy and
bondless scalability. By creating a scalable storage network with the ability to confidentially deliver
the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP
to attract and retain customers and substantially build its business. As the same time, the solution
has effectively lowered ABC companys total cost of ownership for its entire storage solution: the IP
Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The complementary
IP Stor/CNT solution has allowed to its customers easily and cost- effectively. a. What were the
problem which ABC Company was facing before consulting network storage infrastructure
software provider? b. What were the benefits of implementing a scalable storage network? c. List
the different classes of ISPs and their applications. ( Mentioning the problems faced by ABC
company after reading the SLM, Listing the benefits, Listing the different classes of ISP and their
applications) 2,3,5

ANS:

The problems faced by ABC Company after reading the SLM

The important issue to address while choosing connectivity solutions is, whether application servers are
being connected to storage or disparate networks are being interconnected. The key factors to be
considered are elimination of single points of failure, high scalability, and ease of set up. The FalcoStors
IP Stor software

Q6. How are the different topologies of computer networks arranged? Explain the working of each
of them (listing the different topologies with examples 2 marks, explanation- 4 marks, diagrams- 4
marks) 10 marks
Ans:
Types of topology :
1) Bus topology
2) Ring topology
3) Star topology
4) Tree topology
Master of Business Administration- MBA Semester 3
MI0036 Business Intelligence Tools -4 Credits
(Book ID: B1219)
Assignment (60 marks)
Note: Answer all questions. Kindly note that answers for 10 marks questions should not exceed 400
words. Each question is followed by evaluation scheme.

Q1.a. Emergency Medical Association (EMA) is a group of 250 board- certified emergency
physicians. They are responsible for effectively managing the emergency departments. List out
what BI values and applications they should be implementing (listing and explaining the reason
behind it- 5 marks)
Ans:

Business Intelligence(BI):. Business intelligence (BI) is a wide category of applications and technologies
which gathers, stores, analysis, and provides access to data. It helps enterprise users to make better
business decisions. BI applications involve the activities of decision support systems, query and reporting,
online analytical processing (OLAP), statistical analysis, forecasting, and data mining. Business
intelligence applications include:

b. Most of the credit card companies permit a consumer to get approval for specified amounts via
mobile to ensure that the purchase is covered. This type of consumer support which retains a
customer to the bank for a longer time is real time business intelligence. Define real time Business
intelligence and the various steps involved in the process.(defining- 2 marks, list and explain the
process- 3 marks)5marks
Ans:

Real Time Business Intelligence In this competitive world, with high consumer expectation, the
decisions that are based on the most current data available will improve the customer relationships,
increase income and maximise the operational efficiencies. Example: Finance departments data is moved
from transaction systems to a staging

Q2.Today businesses largely rely on the information available and can be communicated through
various sources, both internally and externally with the help of internet. Explain the role of
Business Intelligence in modern business. What are the three different types of decision that most
business organisations take?(explanation-5 marks, different types of decision-5 marks)10 marks
Ans:
Role of Business Intelligence in Modern Business Having discussed the dynamic roles of BI we will
move on to the roles of BI in modern business. The business intelligence solutions should be
contemplated carefully, and the system opted for it should prove to be consistent. Even if you add new
data or new systems, or bring about major changes, business intelligence systems have to steer the
company to success. Steering to accomplishment is done

Q.3. Data extraction is the act or the process of extracting data out of data sources for added data
processing or data storage or data migration. This data can be extracted from the web. Explain the
different techniques for data extraction. (Listing the various techniques, Explaining the four
methods) 2,8
ANS:
Listing the various techniques
The Logical Extraction Methods
Physical Extraction Methods
Change Data Capture
Extracting data from the operational systems
Explaining the four methods

Th

Q.4. Business Intelligence strategy summarizes the finest combination of procedures and
technologies to meet the business intelligence strategies of an organization. a. List the main aspects
of BI strategy. b. What are the steps to be followed to implement BI framework? (a. Listing at least
6 main aspects of BI strategy, b. Steps for Implementing BI framework) 3,7
ANS:

a) BI Strategy and its main aspects

A BI strategy summarises the finest combination of procedures and technologies to meet the business
intelligence strategies of an organisation. BI strategy has the capability to distribute reliable and
appropriate information. BI strategy has been developed in such a way that it supports business
performance administration using a co

Q.5. Write short note on: 2,3,2,3
a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
ANS:

a) Content Management System (CMS)

Management System is a set of procedures which can be used to manage work flow in a shared
environment. The procedures can be manual or can be computer-based. These procedures are designed to:

Q6.According to a recent IDC report, knowledge management is in a state of high growth,
especially among the business and legal services industries. As the performance metrics of early
adopters are documenting the substantial benefits of knowledge management, more organizations
are recognizing the value of leveraging organizational knowledge. Define Knowledge Management.
Explain the various characteristics of Knowledge management. What are knowledge
assets?(definition- 2 marks, characteristics6 marks, definition-1 mark, example-1 mark)10 marks
Ans:

Knowledge Management :The management of the knowledge is performing an audit of the various
assets of the intellect that is responsible for performing critical functions. It performs audit of the potential
bottlenecks that is responsible for hindering the flow of knowledge to the point of use.
Thus, the management discipline that enhances the processing knowledge of the organisation is called as

You might also like