Tuesday 22 March 2016

MBA - SEMESTER - 3 - IS - WINTER 2016

PROGRAM  MBA
SUBJECT CODE & NAME MI0033 – SOFTWARE ENGINEERING

1. Explain the concept of “software project life cycle” with a suitable example.
Software Project Life Cycle : One can classify software  development projects into  various types based on their business functional domain.  In case a software company is interested in specialising in only one product or service,  it will need to understand that particular function or domain thoroughly. Mere technical knowledge in how to develop the software by writing lines of codes may not be sufficient. 

For example,  Kolkata-based  “UshaComm”  that  has  gained  expertise  in telecommunications-

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



2. Write short notes on
a.  Planning and estimation phase
b.  Scheduling and tracking phase
c.  Risk analysis phase
d.  Tools used in software project planning

Ans- a. Planning and estimation phase

This is the second phase of the project management process. In this process, a project team that was appointed in the initiation stage, plans for the next phase and sets up the vision to implement and achieve the goals set for the project. The objectives and the scope of a project are considered in the planning phase. We can make estimations of a project on the basis of past experiences on a project using what we call as historical data. For this, we can compare the new and an earlier project, and if they appear similar, then we may conclude that the new project is more likely to require approximately the same time duration (often expressed in calendar months) and the same effort (often expressed in

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




3. a.  Explain function-oriented metrics
b.  How do you calculate function points?

Ans 3. a - Function-oriented metrics

After familiarizing ourselves with size-oriented metrics, we will now study about function-oriented metrics.

The  function-oriented  metrics  are  indirect  software  metrics.  Instead  of  the number of LOC, the emphasis is more on the functionality of the product. The function-oriented metrics were first proposed by Albrecht. He suggested a productivity measurement approach known as the Function point method. In this method, function points are used. A function  point is a relation that  is based  on  the  countable  measures  of  software  information  domain  and assessment of software complexity.

Below is how five information domain values are calculated:

Number  of  user inputs:  For  calculating  the  number  of  user  inputs,  each user  input  that  has  a 

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4  a.  Explain the system architecture specification
b.  Explain System specification review

Ans-a- System architecture specification

We can consider a system architecture specification as a high-level design document.  This  document  provides  details  pertaining  to  the  user’s requirements.  The  design  solutions  are  bifurcated  into  hardware  and software  modules,  and  the  interaction  between  these  modules  is  also described.  The  system  architecture  specification  acts  as  a  model  for  the development of detailed design.

We  implement  the  system  architecture  specification  in  an  organisation, during the early stages of development so that the quality of the system and the functionality  are  enhanced, thereby  leading to  increased  assurance of correctness.



CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Explain the different methods of integration testing

Integration Testing

The  integration  testing  is  the  logical  extension  of  unit testing, where we combine two tested units into a component and test the interface  between  them.  Practically,  we  combine  many  units  into components,  which  are  aggregated  into  larger  parts  of  the  program.  The combinations  of  pieces  are  tested  and  finally  the  process  is  expanded  to test  modules  with  other  groups.  Finally,  all  the  modules  making  up  a process are tested together. If the program is made up of more than one process, we should test them in pairs, instead of testing all at once.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM

6.  Explain Five maturity levels of Capability Maturity Model (CMM)

Five Maturity Levels

CMM can be defined  as a unique model of organisational development and change.  It  offers  very  effective  guidance  to  software  organisations  for creating  programs  for  process  improvement.  The  CMM  comprises  five maturity levels. We can characterise each maturity level by the execution of several  clusters  of  practices  (i.e.  process  areas)  that  add  to  the
development capability attained at that level. According to the SEI (Software

Engineering  Institute,  Carnegie-Mellon  University,  USA),  “Predictability, effectiveness,  and  control  of  an  organisation’s  software  processes  are believed to improve as the organisation

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




PROGRAM  MBA
SUBJECT CODE & NAME MI0034 – DATABASE MANAGEMENT SYSTEM

1. a.  Explain the different components of Database Management System (DBMS)
b.  With an example explain the properties of DBMS

1 (a) : Components of Database Management System

DBMS is a very important feature without which the database administrators cannot  perform  the  action  on  databases. 

Below figure shows the various components of DBMS.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. Explain the different operations of relational algebra with suitable examples.

Operations of Relational  algebra  : Relational  algebra  is  a  language  in  which  one  relation  gets  defined  by another  relation  without  the  original  relation  getting  changed.  There  are many operations  that  work with relational algebra. Some of them are given below:

·         Selection
·         Projection
·         Cartesian product
·         Union
·         No duplication
·         Join operators
·         Intersection

  Selection  (restriction)  –  When  you  select  the  rows,  it  is  Selection  of rows.  For  example,  for  those  employees  whose  salary  is  more  than Rs.1,000  in  the  salary table,  it is denoted by O condition  (R), that is,  O salary > 1,000 (Staff).


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Write short notes on
a. Cardinality ratio
b. Participation constraints

Ans (a) - cardinality ratio

The cardinality ratio specifies the number of entities to which another entity can be associated through a relationship set.
The different mapping cardinalities are of four types. They are as follows:
·         One-to-one
·         One-to-many
·         Many-to-one
·         Many-to-many
One-to-one  -  An entity in A is associated with at most one entity in B and vice versa shown in below Figure.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4 . a.  Define SQL
b.  Explain the different types of SQL

4 (a) : SQL

SQL  is  a  non-procedural  language  that  describes  the  type  of  data  to  be retrieved,  updated  or  deleted.  This  is  a  structured  language  and  has  the capability to update the database and its data.
SQL  is  a  relational  database  language  used  to  communicate  with  a database. The American National Standards Institute declared the standard language  for  RDBMS.  Accordingly,  the  common  relational  database management  systems  that  SQL  uses  are  Oracle,  Sybase,  Microsoft  SQL Server, 


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4 (b) : Types of SQL Statements

A simple SQL statement which can be used to retrieve a specific column but since relational data model is such a vast concept  and  is  not  able  to  manipulate  with  this  simple  statement,  SQL statement can be categorised into the following four types:
·         DDL (Data Definition Language)
·         DML (Data Manipulation Language)
·         DCL (Data Control Language)
·         TCL (Transaction Control Language)
DDL: Data Definition Language

The DDL statement provides commands for defining relation schema, that is,  for  creating tables, 

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




5. a.  Explain the two-phase locking protocol
b.  Elaborate  advantages  and  disadvantages  of  Distributed  database  management system

5 (a): The two-phase locking protocol

The two-phase locking protocol is a process to access the shared resources as  their  own  without  creating  deadlocks.  This  process  consists  of  two phases.

1.  Growing phase  –  In this phase, the transaction may acquire lock, but may  not  release  any  locks.  Therefore,  this  phase  is  also  called  as resource acquisition activity.

2.  Shrinking phase – In this phase, the transaction may release locks, but may not acquire any new

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MBA
SUBJECT CODE & NAME - MI0035 – COMPUTER NETWORKS


1.  Explain the working of Carrier Sense Multiple Access with  Collision Detection (CSMA/CD) Protocol.

The CSMA/CD protocol can be compared with a  typical  life scenario such as a group discussion during an interview. Suppose several candidates  are sitting around the table. Every candidate must listen to the instruction for a while  before  speaking  (Carrier  Sense).  After  listening  to  the  instruction, during a pause every candidate has an equal chance to participate in group discussion  (Multiple  Access).  In  the  case  when  two  candidates  speak simultaneously,  they  detect  the  situation  and  quit  speaking  (Collision detection).

CSMA/CD  is  a  set  of protocols used  to  resolve and  manage  collisions  of data that occur during the transfer of data.  The CSMA/CD protocol is  used in the second layer (data link layer) of the OSI model.  Below Figure  shows the working of CSMA/CD in a flowchart:


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



2.  Write a brief note on seven layered OSI reference model. Explain the role of each layer

The Seven-Layered OSI Model

The  OSI  reference  model  emerged  as  a  first  step  towards  international standardisation of the protocols used in the various layers by the ISO. The model  is  called  the  ISO  OSI  reference  model  as  it  deals  with  connecting open systems, that is, systems open for communication with other systems.

An  open  system  is  a  set  of  rules  that  is  used  for  communication  of  two different systems (the difference is in their architecture). This model defines the various stages through which data has to pass in order to travel from one system to another over a network. The ISO OSI model or simply the OSI model comprises seven layers.

Below figure shows the ISO OSI reference model:


3.  Write short notes on
a.  Subnet
b.  Super netting
c.  Subnet masks
d.  Dynamic NAT
e.  Domain Name System


a.  Subnet 

A network that exists within the Class A, B, or C network is called a subnet. It can also be defined as a network within a network. Subnets are created to extend  network  IDs  by  using 


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


b.  Super netting

Supernetting is defined as the combination of all network routing commands in a single routing table entry.  It  is commonly called Classless Inter-Domain Routing (CIDR). It is designed to solve the problems such as, wastage of many addresses in the Class addresses.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



c.  Subnet masks

A  subnet  mask  is  another  32  bit  number  defined  for  identifying  a subnetwork.  Subnet  masks  describe  the  bits  associated  with  the  network and host IDs.  If an octet in the subnet mask is equal to 1 it refers to the network ID, and if it is equal to zero it refers to the host ID.

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


d.  Dynamic NAT

DNAT, similar to SNAT, is  used in large organisations for mapping  private (internal) IP addresses to  public (registered) IP addresses. However, unlike SNAT,  DNAT  maps  private  IP  addresses  to  a  group  of  registered  IP addresses.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


e.  Domain Name System

Domain Name System (DNS) is a facility provided by the TCP/IP that allows you to remember only the name of a site instead of  a lengthy IP address. It is a client/server based architecture that functions at the Application Layer. Nowadays, the use of Internet services is widespread. The name of a site you type in the address bar is converted into an IP address. Suppose, the DNS utility was not available and you wanted to search for information on any topic from Google. In that case, you had to type 216.239.51.10 instead of typing www.google.com.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4.  What is DWDM? What are the pros and cons of DWDM

Network  capacity  has  increased  drastically  as  the  number  of  users  has increased  in  the  telecommunication  industry.  Among  the  various  methods used for increasing network capacity, a few are listed as follows:
·         Enhance the bit rate of existing system
·         Install new fiber
·         Optimise the use of existing fiber
In  the  upcoming  sections,  we  will  discuss  about  optimising  the  use  of existing  fiber  by  using WDM  and  some  background  on  the  importance of DWDM  in  optical  networks  and 


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Briefly explain the networking applications in government sector

Electronic governance  (e-governance) is the application  of IT by the government for providing better facilities or services to its citizens,  in an  efficient  manner.  It  helps  in  improving  access  of  citizens  to  the government services and delivering these services on time.  In other words, e-governance is a  medium  used by the government  for  interacting  with its citizens  electronically.  E-governance  is  preferred  because  it  provides  the government  with  a cheap,  transparent and easy way of interacting with its people.  Therefore,  e-governance  can  be  considered  as  an  application  of electronics in governance, which means:
·         Using  electronic  means  to  interact  between  the  government  and citizens, or between business and the government.
·         Application  of  electronics  in  various  facets  of  internal  government operations  in  order  to  improve  democratic  and  business  traits  of governance  by  automating  the  existing  paper-based  procedures. 


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Explore the different models in cloud environment and their examples

Different Models in Cloud Environment

1.  Introducing Infrastructure as a Service

Infrastructure as a Service  (IaaS) allows you to deliver hardware resources, such  as  servers,  storage  space  and  network,  as  cloud  service  to  the customers. In addition,  operating systems  and  virtualisation technology  are provided to the customers to manage the resources. IaaS delivers computer infrastructure, i.e.,  the virtualised infrastructural environment as a service to the  end  users.  Clients  or  customers,  instead  of  investing  in  hardware  or software resources, can simply purchase these resources as the outsourced service.  This reduces  the problems faced by customers in purchasing and installing these resources  in their  data  centre.  For such services, the  cloud service  providers  charge  the  customers  on  the  utility  computing  basis.  It implies that the customers pay for this service on the basis of the amount of resources being utilised.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MBA
SUBJECT CODE & NAME - MI0036 – BUSINESS INTELLIGENCE & TOOLS


1. a.  List the factors responsible for the increasing importance of BI in organisations.
b.  What are the obstacles in Implementing BI in Organisations

a.  Factors responsible for increasing importance of BI in organization

The  increasing  importance  of  BI  is  due  to  various  factors,  namely,
·         Technological advancement
·         Competitive market
·         Need for quick reflexes.
Let's elaborate on these factors.

Technological  advancement:  The  magnificent  increase  in  electronic connectivity  between  people 


2.  a.  Discuss the contribution of business analytics in strategy management
b.  How is CRM linked to business intelligence?

a.  Various contributions of business analytics in strategy management

A good  financial performance  is the result of better business  outcomes. To achieve  these  outcomes,  organisations  need  to  develop  and  manage multiple,  interconnected  business  strategies.  BA  solutions  give  an actionable  business  forecast  that  can  guide  business  strategies  and technologies to  provide  timely and accurate financial results.  Although, the business  user  teams  may  only  have  an  apparent  understanding  of  BA technologies,  they  are  expected  to  highlight  the  requirements 

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




3.  Explain the data mining process in detail

DM (DATA MINING)  includes  a  number  of  operations,  each  one  of  which  is  aided  by  a variety of  techniques,  such as  decision trees,  rule-based  induction, neural networks  and  conceptual  clustering.  The  derived  results  are  evaluated repeatedly  over  the  developed  models  to  minimise  the  occurrence  of potential errors. In the real world applications, knowledge extraction involves collaborative use of several data mining techniques and operations.

Data mining consists of the following six steps (refer to below figure):

•             Data is pulled from the data warehouse and sent to the ETL layer, where E stands for extract, i.e., pulled, T for transform and L for load.


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4. Briefly explain the 7 Ps of marketing mix

7 Ps of marketing/service marketing mix

Neil Borden, in his presidential address  in  American Marketing Association (AMA), used the term marketing mix for the first time.  A marketing mix can be defined as a  collection of tools that can be used in achieving marketing objectives.  It  uses  4  Ps  to  decide  the  marketing  strategy.  The  4  Ps  of
marketing mix are shown in Below Fig:


CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  What are the main features of a financial reporting system

The following are the main features of a financial reporting system:

Drag-and-drop  report  builder:  This feature helps  in  creating  sophisticated reports and  analysing  them  with ease.  To generate a report, you need  toselect  the  desired  items  from  a  menu,  drag  them  onto  a  graphical workspace and choose appropriate formatting options.

Choice of dimensions in  rows and columns:  This feature enables you to easily design your report. You just need to choose the right value of various dimensions,  such as business unit, department, region, product, customer, projects,  metrics,  assumptions  and  time  period,  and  drag  them  into  the relevant rows and columns of the report builder.



CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Discuss the various critical challenges that need to be overcome for BI to succeed within an organization.

Various critical challenges that need to be overcome for BI to succeed within an organization

Cross-organisational collaboration

Usually, business initiatives  focus on a particular area of business or on a limited set of products. As a result of this narrow focus, organisations could not analyse  the  impact of the  data generated by the  project  and  business operations.  As  soon  as  organisations  started  focusing  on  the  data generated  by  customer  information  such  as  customer  buying  preference, frequency,  type  of  items,  locality,  etc.,  these  initiatives  started  integrating product information with customer information.

Business sponsors

Strong business sponsors believe in the BI  project’s  value and remove the obstacles  to  champion  it.  A 

CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM