Friday 4 July 2014

MBA - SEM - 3 - INFORMATION SYSTEM MANAGEMENT - SPRING 2014


For getting solved assignments contact us at
smudoc@gmail.com or contact on +91-9540358147
Service charges as Rs. 150 per assignment.

ASSIGNMENT
DRIVE  SPRING  2014
PROGRAM  MBADS/ MBAFLEX/ MBAHCSN3/ MBAN2 – SEM 3
PGDBMN/ PGDENMN/ PGDFMN/ PGDHRMN/ PGDHSMN/ 
PGDIB/ PGDISMN/ PGDMMN/ PGDOMN/ PGDPMN/ 
PGDROMN/ PGDSCMN/ PGDTQMN – SEM 1
SUBJECT CODE & 
NAME
MB0051-Legal Aspects of Business


1  What are the rights of a surety?    10
Rights against creditors  2 
Rights against Principal Debtor  4 
Right against Co-Sureties    4 
2  Explain duties of a Bailor and a Bailee.    10
Duties of Bailor  5
Duties of Bailee      5 
3  “Power of Attorney is considered as an important concept in Business Law”. 
Explain    10
Meaning  3
Types  2
Registration      5 
4  “The Banking Regulation Act, 1949, provides various methods of regulation of the 
banking business”. Describe the key areas of regulation.
Methods of regulation     10  10
5  Explain the nature and scope of complaints under the Consumer Protection Act?
Persons competent to make complaints  3
Place of complaint  1
Procedure for filing a complaint  2
Admission of complaint  2
Power of the District Forum    2  10
6  Explain the need and types of meetings.
Need for meeting  2
Statutory meetings  2
Annual General Meetings  2   
Extraordinary meetings  2
Class meetings      2  10


For getting solved assignments contact us at
smudoc@gmail.com or contact on +91-9540358147
Service charges as Rs. 150 per assignment.

ASSIGNMENT
DRIVE  SPRING 2014
PROGRAM  MBADS/ MBAFLEX/ MBAHCSN3/ MBAN2 – SEM 3
PGDBMN/ PGDENMN/ PGDFMN/ PGDHRMN/ PGDHSMN/ 
PGDIB/ PGDISMN/ PGDMMN/ PGDOMN/ PGDPMN/ 
PGDROMN/ PGDSCMN/ PGDTQMN – SEM 1
SUBJECT CODE & 
NAME
MB0050
RESEARCH METHODOLOGY

1  Briefly describe the different steps involved in a research process. Distinguish between 
descriptive and causal research studies.
Meaning of research
Steps
Differences
2
5
3
10
2  Distinguish  between  primary  and  secondary  methods  of  data  collection.  Explain  the 
Interview method of data collection
Differences
Explanation of Interview method of data collection
5
5
10
3  a.  Discuss four types of measurement scales with examples. 
b.  Briefly explain the concepts of reliability, validity and sensitivity.
a.  Meaning of Measurement scales and types of Measurement 
scales with examples
b.  Explanation of the concepts of reliability, validity and 
sensitivity
5
5
10 
4  a.  Distinguish between:
i.  Schedules and Questionnaires
ii.  Open ended and closed ended questions
b.  What are the different modes of administering a questionnaire? What are the 
conditions that merit the use of one over the other? Discuss by using suitable 
examples.
a.  Differences
b.  Modes of administering a questionnaire
4
6
10
5  a.  What is the analysis of variance? What are the assumptions of the technique? 
Give a few examples where the techniques could be used.
b.  The following data represents the number of units produced by four operators 
during three different shifts:
Shifts  Operator
A  B  C  D
I  10  8  12  13
II  10  12  14  15
III  12  10  11  14
Perform a two-way analysis of variance and interpret the result.
a.  Meaning, Assumptions and examples
b.  Formulas, Calculation, Solution and Interpretation to the 
problem
4
6
10
6  Explain the three basic principles of professional ethics that any research must follow.
How  do  you  follow  an  ethical  practice  while  collecting  information  from  the 
respondents?
Basic principles of professional ethics
Ethical codes related to respondents
6
4
10

  
For getting solved assignments contact us at
smudoc@gmail.com or contact on +91-9540358147
Service charges as Rs. 150 per assignment.

ASSIGNMENT
DRIVE  SPRING 2014
PROGRAM  MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & 
NAME
MI0033- SOFTWARE ENGINEERING

1  Process  patterns  are  the  results  of  applying  abstraction  to  recurring  processes  and  process 
components.  Process  patterns  are  collections  of  general  techniques,  actions,  and/or  tasks 
(activities) for  developing object-oriented software. Justify the above statement. Explain with 
an  example  for  each,  the  different  types  of  process  patterns  in  the  ascending  order  of 
abstraction level. 
A  a.  Justifying the above statement  1
10
b.  Explaining the three types of process 
patterns
6
c.  Examples   3
2  Software estimation is the first phase of project planning and it is the process of judging a 
software product and solving the problem associated with the software project. We follow 
some important steps to achieve reliable cost and effort estimates. Explain the different 
estimation models and estimation techniques.
A  a.  Explaining different estimation models  6 
10    b.  Explaining estimation techniques  4
3  Empirical software solutions is a small manufacture based company who have a single product 
in the public access and security domain. The information system which they possess gives 
details pertaining to the presence of individuals at specific locations and also checks and issues 
security badges.
The software of the system is connected to specially designed hardware peripherals along with 
a well-defined LAN network connection. The system handles several aspects ranging from 
computing from database manipulation, peripheral hardware ti image handling. This company 
uses both software as well as hardware, and incorporates latest technologies, like networking 
and device drivers. 
Due to the pressure from customers and the competition, they were in need of a structured 
software process. There was no standardized development process. Most of their work was 
based on customer requests. Every time a new request from customer came in, more additions 
were made to the product. A new version of the software was installed at the customer’s site 
when requested by the customer. All the queries related to technical support, modifications 
made to the system were handled by the development team. There was no specific design 
methodology followed and each developer used his own method of working. Apart from the 
user manual, there was no other documentation found held. 
Challenges:
Introduction of reuse framework and method into the company
Gain support from the top management for the reuse program, as introduction of reuse 
program can affect all parts of the software production process. 
Suggestions were made to set up the reuse program along with the associated cost and risk 
involved in setting up the reuse program. 
a.  Explain the challenges faced by the empirical software solutions 
b.  Give some suggestions to overcome the challenges.
c.  Explain the classifications and advantages of software reuse.
A  a.  Listing the challenges  1
10
b.  Suggesting some 4 point about, planning, 
design, resource management, 
documentation
4
c.  Classifications with diagram  3
Listing the advantages  2
4  Suppose you are assigned the task to analyse the various factors involved in your project, 
explain how will you gather information and analyse the task
A  Explaining system analysis  10  10
5  Write short note on 
a.  Unit testing
b.  System testing
c.  Debugging
d.  Verification and validation
A  a.  Unit testing  3  10
b.  System testing  3
c.  Debugging  2
d.  Verification and validation  2
6    Briefly describe the concept of polymorphism by using the automobile class as an example.
A  a.  Explaining the example of automobile 
class
3
10
b.  Describing the concept of polymorphism   2
c.  Explaining polymorphism using the above 
example
5


For getting solved assignments contact us at
smudoc@gmail.com or contact on +91-9540358147
Service charges as Rs. 150 per assignment.


ASSIGNMENT
DRIVE  SPRING DRIVE 2014
PROGRAM  MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3)
PGDISMN (SEM 1)
SUBJECT  CODE  & 
NAME
MI0034- DATABASE MANAGEMENT SYSTEMS

1  How  is  DBMS  classified  based  on  several  criteria?  Explain  each  one  of  them  with  few 
examples where ever required
A  Listing the criterion  3
10
Explaining the types based on each criterion   6
Example  1
2  Differentiate between B+ tree and B- tree. Explain them with diagrams
A  2 Diagrams  4 
10    Explanation based on comparison  6
3  EMPLOYEE
EMP_ID   NAME     PROJECT   SALARY DEPT_NUM
MUL1     Ramya     PR1     40000    1
MUL2     Nupur    PR1     45000    2
SMU1     Rajesh     PR3     20000    2
SMU2 Vinay    PR2     50000    3
SMU3     Anil     PR2     80000    2
DEPARTMENT
DEPT_ID   DNAME   PLACE
1     MIS     Bangalore
2     HRM     Bangalore
3     Finance   Chennai
4     Research   Bangalore
Using these tables answer the following question
a.  If  we  want  to  see  all  the  employees  with  salary  between  40000  and  50000,  which 
query can be used?
b.  Select employee name from EMPLOYEE table, whose name starts with R 
c.  Explain aggregate functions and grouping in detail
A  a.  Query based in BETWEEN operator
SELECT  *  from  employee  WHERE  salary 
between 40000 to 50000
10
b.  Query based in LIKE condition
SELECT  *  from  employee  WHERE  Name  LIKE 
‘r%’;
3
c.  Explaining  aggregate  functions  on  select 
statement,  with  an  example,  showing  the 
output  of  the  query,  explaining  having 
clause, with example
5
4  What are the problems and failures that may encounter with respect to the transactions in a 
database management system? Give examples. 
A  Explaining the three problems with code  6 
10    Listing the types of failures (atleast 4)  4
5  Consider  any  database  of  your  choice  (may  be  simple  banking  database/forecasting 
database/project management database). Show the deduction of the tables in your database to 
the different types of normal forms
A  Choosing a proper database   2  10
Explaining the 5 normal forms with respect to the 
database chosen
8
6  Read the following case study thoroughly and answer the following questions:
Laxmi  bank is one of the largest private sector banks of India. It has an extensive network of 
more than 200 branches. It offers banking services to retail as well as corporate clients. The 
bank  faced  a  challenge  in  integrating  multi-pronged  database  management  system  into  a 
centralized system. The IT department of the bank also realized that the computing capabilities 
of its PCs and servers were not proportionately distributed among all its branches. Each branch 
had its database management system stored in a traditional way on the disk. The total cost of 
operating  and  maintaining  the  current  IT  infrastructure  was  very  high  and  the  fundamental 
shortcomings  added  to  the  costs.  Moreover,  there  were  also  recurrent  problems  due  to  the 
malfunctioning  of  the  currently  operational  database  management  system.  Therefore,  the 
bank’s  top  management  decided  to  fix  the  problem  and  operationalise  a  robust  database 
management system. The bank hired an external database technology consulting firm called 
AKPY Info systems Limited. 
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail banking 
vertical  and  the  corporate  banking  vertical.  All  the  individual  database  servers  from  the 
individual branches were removed. The entire database system was made virtual such that the 
managers and the staff can access only the required information (related to retail banking or 
corporate  banking)  from  the  respective  centralised  data  centers.  There  were  only  two  such 
centralised data centers (one for retail banking and another for corporate banking) that were 
managed  centrally.  Staff  and  managers  could  access  the  information  through  their  PCs  and 
laptops.  Centralised  database  management  system  complemented  the  security  system  by 
bringing in authentication through a unified ID management server. Managers and officers of 
the bank were able to process half a million transactions per month in real time after the new 
implementation.  There  were  significant  savings  in  the  cost  and  also  in  the  consumption  of 
power.  Now  there  were  no  problems  with  regard  to  imbalances  in  the  load  across  various 
network servers. Due to centralised data management, top management could keep an eye on 
the  functioning  of  various  branches.  Hence  the  cases  of  fraud  and  cheating  reduced 
considerably.  The  bank  managers  could  also  process  the  loan  applications  in  reduced  time 
since the customer’s previous records could be accessed at the click of the button and approval 
from  the  higher  authorities  could  be  obtained  in  real  time.  Moreover  the  new  system  als o 
brought in many applications that helped local managers in the decision making process.
a.  List the uses of centralized data management
b.  What  steps  Laxmi  bank  need  to  take  if  it  were  to  change  its  centralised  database 
system to a distributed database system in future?
A  a.  Listing  the  uses  from  the  from  the  case 
study
2
10
b.  Explaining  about  data  fragmentation, 
replication and allocation techniques
6
c.  Is  it  possible  to  replicate  the  centralised
database  management  model  of  the  bank 
in a manufacturing concern? Give reasons.
2


For getting solved assignments contact us at
smudoc@gmail.com or contact on +91-9540358147
Service charges as Rs. 150 per assignment.


ASSIGNMENT
DRIVE  SPRING DRIVE 2014
PROGRAM  MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & 
NAME
MI0035- COMPUTER NETWORKS

1  Write short notes on 
a.  LAN
b.  Analog and digital data transmission
c.  High level data link control
A  a.  LAN  2 
10  b.  Analog and digital data transmission  3
c.  High level data link control  5
2  Virtually all networks in use today are based in some fashion on the Open Systems 
Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of 
seven layers that define the different stages that data must go through to travel from one device 
to another over a network. Explain the seven layer architecture of OSI model with diagram
A  Explaining the OSI reference model  8 
10    Diagram of OSI reference model  2
3  Consider yourself as the operation head in a telecommunication company. What are the 
different types of multiplexing techniques will you implement to get efficient data 
transmission process?
A  Explaining various multiplexing techniques  10  10
4  Integrated Services for Digital Network (ISDN) is a set of communication standards for 
simultaneous digital transmission of voice, video, data, and other network services over the 
traditional circuits of the public switched telephone network. It was first defined in 1988 in the 
CCITT red book. Explain the different types of ISDN with their features and advantages for 
each one of them. 
A  Explaining Two different types   2 
10    Features of both of them  4
Advantages of both of them  4
5  ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365 
storage capacity, storage management and internet service to the customers. It now needs a 
solution that will eliminate downtime. Downtime is nothing but the time during which a 
computer or computer system is down, or inoperative due to hardware or software failure. We 
also need the flexibility in quick response to both the development in customer base and 
additional capacity and service demands of the customers.
ABC company took the help of network storage infrastructure software provider to achieve 
their goals by providing support for end to end redundancy and bondless scalability. 
By creating a scalable storage network with the ability to confidentially deliver the 24X7X365 
reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract 
and retain customers and substantially build its business. As the same time, the solution has 
effectively lowered ABC company’s total cost of ownership for its entire storage solution: the 
IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The 
complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively. 
a.  What were the problem which ABC Company was facing before consulting network 
storage infrastructure software provider? 
b.  What were the benefits of implementing a scalable storage network?
c.  List the different classes of ISPs and their applications
A  a.  Mentioning the problems faced by 
ABC company after reading the SLM
10
b.  Listing the benefits   3
c.  Listing the different classes of ISP and 
their applications
5
6  Cryptography is the science of hiding information. The traditional security system employed a 
different of encryption process known as symmetric cryptography, which involves the use of te 
same method for both encryption and decryption. Explain the different networking algorithms 
that are used for cryptography along with its subtypes. 
A  Explaining the two types of cryptography and the 
networking algorithms used for them
10 
10

For getting solved assignments contact us at
smudoc@gmail.com or contact on +91-9540358147
Service charges as Rs. 150 per assignment.


ASSIGNMENT
DRIVE  SPRING DRIVE 2014
PROGRAM  MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & 
NAME
MI0036- BUSINESS INTELLIGENCE & TOOLS

1  Similarity measures determine the similarity between the two objects. The similarity between 
the two objects ti and tj, sim(ti, tj) in the database D is a mapping from D*D to the range [0, 1]. 
a. List the characteristics of a good similarity measure. 
b.  what  are  the  four  methods  to  determine  the  similarity  characteristic  between  the  two 
objects?
A  a.  Listing the characteristics  3
10
b.  Listing the four methods  1
a.  Four methods to determine the similarity 
characteristic and their formula
6
2  Transactions refers to business or commercial transactions. Online transaction processing 
refers to the category of systems that assists and manage transaction- oriented applications, 
typically for data entry and retrieval transaction processing. 
List the differences between OLAP and OLTP
A  Listing at least 10 points   10  10
3  Data extraction is the act or the process of extracting data out of data sources for added data 
processing or data storage or data migration. This data can be extracted from the web. Explain 
the different techniques for data extraction
A  Listing the various techniques  2  10
Explaining the four methods  8
4  Business Intelligence strategy summarizes the finest combination of procedures and 
technologies to meet the business intelligence strategies of an organization.  
a.  List the main aspects of BI strategy.
b.  What are the steps to be followed to implement BI framework?
A  a.  Listing at least 6 main aspects of BI 
strategy
10
b.  Steps for Implementing BI framework   7
5  Write short note on 
a.  Content Management System
b.  End User Segmentation
c.  Basic Reporting and querying
d.  OLAP
A  a.  Content Management System  2
10
b.  End User Segmentation  3
c.  Basic Reporting and querying  2
d.  OLAP  3
6  RSG is a footwear company which has its chain all over the world. This company has to keep 
track of all the products sold in the company and huge data is involved in it. 
a.  How should it plan to implement the Business intelligence solutions?
b.  How to make the best use of BI?
A  a.  Explaining the planning to implement a BI 
solutions
5
10
b.  Explaining best usage of BI  5


For getting solved assignments contact us at
smudoc@gmail.com or contact on +91-9540358147
Service charges as Rs. 150 per assignment.

No comments:

Post a Comment