PROGRAM MBA
SUBJECT
CODE & NAME MI0033 – SOFTWARE ENGINEERING
1. Explain
the concept of “software project life cycle” with a suitable example.
Software
Project Life Cycle : One
can classify software development
projects into various types based on
their business functional domain. In
case a software company is interested in specialising in only one product or
service, it will need to understand that
particular function or domain thoroughly. Mere technical knowledge in how to
develop the software by writing lines of codes may not be sufficient.
For example,
Kolkata-based “UshaComm” that
has gained expertise
in telecommunications-
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Write
short notes on
a. Planning and estimation phase
b. Scheduling and tracking phase
c. Risk analysis phase
d. Tools used in software project planning
Ans- a. Planning and estimation
phase
This is the second phase
of the project management process. In this process, a project team that was
appointed in the initiation stage, plans for the next phase and sets up the
vision to implement and achieve the goals set for the project. The objectives
and the scope of a project are considered in the planning phase. We can make
estimations of a project on the basis of past experiences on a project using
what we call as historical data. For this, we can compare the new and an
earlier project, and if they appear similar, then we may conclude that the new
project is more likely to require approximately the same time duration (often
expressed in calendar months) and the same effort (often expressed in
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. a. Explain function-oriented metrics
b. How do you calculate function points?
Ans 3. a -
Function-oriented metrics
After familiarizing ourselves with
size-oriented metrics, we will now study about function-oriented metrics.
The
function-oriented metrics are
indirect software metrics.
Instead of the number of LOC, the emphasis is more on
the functionality of the product. The function-oriented metrics were first
proposed by Albrecht. He suggested a productivity measurement approach known as
the Function point method. In this method, function points are used. A
function point is a relation that is based
on the countable
measures of software
information domain and assessment of software complexity.
Below is how five information domain
values are calculated:
Number
of user inputs: For
calculating the number
of user inputs,
each user input that
has a
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4 a.
Explain the system architecture specification
b. Explain System specification review
Ans-a-
System architecture specification
We can consider a system architecture
specification as a high-level design document.
This document provides
details pertaining to
the user’s requirements. The
design solutions are
bifurcated into hardware
and software modules, and
the interaction between
these modules is
also described. The system
architecture specification acts
as a model
for the development of detailed
design.
We
implement the system
architecture specification in
an organisation, during the early
stages of development so that the quality of the system and the functionality are
enhanced, thereby leading to increased
assurance of correctness.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Explain the different methods of integration
testing
Integration Testing
The
integration testing is
the logical extension
of unit testing, where we combine
two tested units into a component and test the interface between
them. Practically, we
combine many units
into components, which are
aggregated into larger
parts of the
program. The combinations of
pieces are tested
and finally the
process is expanded
to test modules with
other groups. Finally,
all the modules
making up a process are tested together. If the program
is made up of more than one process, we should test them in pairs, instead of
testing all at once.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Explain Five maturity levels of Capability
Maturity Model (CMM)
Five
Maturity Levels
CMM can be defined as a unique model of organisational
development and change. It offers
very effective guidance
to software organisations
for creating programs for process
improvement. The CMM
comprises five maturity levels.
We can characterise each maturity level by the execution of several clusters
of practices (i.e.
process areas) that
add to the
development capability attained at that level.
According to the SEI (Software
Engineering
Institute, Carnegie-Mellon University,
USA), “Predictability,
effectiveness, and control
of an organisation’s software
processes are believed to improve
as the organisation
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM MBA
SUBJECT CODE & NAME MI0034 – DATABASE MANAGEMENT
SYSTEM
1. a. Explain the different components of Database
Management System (DBMS)
b. With an example explain the
properties of DBMS
1 (a) : Components of Database Management System
DBMS is a very
important feature without which the database administrators cannot perform
the action on
databases.
Below figure shows the
various components of DBMS.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Explain the
different operations of relational algebra with suitable examples.
Operations of Relational
algebra : Relational algebra
is a language
in which one
relation gets defined
by another relation without
the original relation
getting changed. There
are many operations that work with relational algebra. Some of them
are given below:
·
Selection
·
Projection
·
Cartesian product
·
Union
·
No duplication
·
Join operators
·
Intersection
• Selection
(restriction)
– When you
select the rows,
it is Selection
of rows. For example,
for those employees
whose salary is
more than Rs.1,000 in the salary table,
it is denoted by O condition (R),
that is, O salary > 1,000 (Staff).
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Write short notes on
a. Cardinality ratio
b. Participation constraints
Ans (a) - cardinality ratio
The cardinality ratio
specifies the number of entities to which another entity can be associated
through a relationship set.
The different mapping cardinalities
are of four types. They are as follows:
·
One-to-one
·
One-to-many
·
Many-to-one
·
Many-to-many
One-to-one - An
entity in A is associated with at most one entity in B and vice versa shown in
below Figure.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4 . a. Define SQL
b. Explain the different types of
SQL
4 (a) : SQL
SQL is
a non-procedural language
that describes the
type of data
to be retrieved, updated
or deleted. This
is a structured
language and has
the capability to update the database and its data.
SQL is
a relational database
language used to
communicate with a database. The American National Standards
Institute declared the standard language
for RDBMS. Accordingly,
the common relational
database management systems that
SQL uses are
Oracle, Sybase, Microsoft
SQL Server,
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4 (b) : Types of SQL Statements
A simple SQL statement
which can be used to retrieve a specific column but since relational data model
is such a vast concept and is
not able to
manipulate with this
simple statement, SQL statement can be categorised into the
following four types:
·
DDL (Data
Definition Language)
·
DML (Data
Manipulation Language)
·
DCL (Data Control
Language)
·
TCL (Transaction
Control Language)
DDL: Data Definition Language
The DDL statement
provides commands for defining relation schema, that is, for
creating tables,
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. a. Explain the two-phase locking protocol
b. Elaborate advantages
and disadvantages of
Distributed database management system
5 (a): The two-phase locking protocol
The two-phase locking
protocol is a process to access the shared resources as their
own without creating
deadlocks. This process
consists of two phases.
1. Growing phase – In
this phase, the transaction may acquire lock, but may not
release any locks.
Therefore, this phase
is also called
as resource acquisition activity.
2. Shrinking phase – In this phase, the
transaction may release locks, but may not acquire any new
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
SUBJECT CODE & NAME - MI0035 – COMPUTER NETWORKS
1. Explain the working of Carrier
Sense Multiple Access with Collision
Detection (CSMA/CD) Protocol.
The CSMA/CD protocol can be
compared with a typical life scenario such as a group discussion
during an interview. Suppose several candidates
are sitting around the table. Every candidate must listen to the
instruction for a while before speaking
(Carrier Sense). After
listening to the
instruction, during a pause every candidate has an equal chance to
participate in group discussion
(Multiple Access). In
the case when
two candidates speak simultaneously, they
detect the situation
and quit speaking
(Collision detection).
CSMA/CD is
a set of protocols used to
resolve and manage collisions
of data that occur during the transfer of data. The CSMA/CD protocol is used in the second layer (data link layer) of
the OSI model. Below Figure shows the working of CSMA/CD in a flowchart:
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Write a brief note on seven
layered OSI reference model. Explain the role of each layer
The Seven-Layered OSI Model
The OSI
reference model emerged
as a first
step towards international standardisation of the protocols
used in the various layers by the ISO. The model is
called the ISO
OSI reference model
as it deals
with connecting open systems,
that is, systems open for communication with other systems.
An open
system is a
set of rules
that is used
for communication of two
different systems (the difference is in their architecture). This model defines
the various stages through which data has to pass in order to travel from one
system to another over a network. The ISO OSI model or simply the OSI model
comprises seven layers.
Below figure shows the ISO
OSI reference model:
3. Write short notes on
a. Subnet
b. Super netting
c. Subnet masks
d. Dynamic NAT
e. Domain Name System
a. Subnet
A network that exists within
the Class A, B, or C network is called a subnet. It can also be defined as a
network within a network. Subnets are created to extend network
IDs by using
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
b. Super netting
Supernetting is defined as
the combination of all network routing commands in a single routing table
entry. It is commonly called Classless Inter-Domain
Routing (CIDR). It is designed to solve the problems such as, wastage of many
addresses in the Class addresses.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
c. Subnet masks
A subnet
mask is another
32 bit number
defined for identifying
a subnetwork. Subnet masks
describe the bits
associated with the
network and host IDs. If an octet
in the subnet mask is equal to 1 it refers to the network ID, and if it is
equal to zero it refers to the host ID.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
d. Dynamic NAT
DNAT, similar to SNAT,
is used in large organisations for
mapping private (internal) IP addresses
to public (registered) IP addresses.
However, unlike SNAT, DNAT maps
private IP addresses
to a group
of registered IP addresses.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
e. Domain Name System
Domain Name System (DNS) is
a facility provided by the TCP/IP that allows you to remember only the name of
a site instead of a lengthy IP address.
It is a client/server based architecture that functions at the Application
Layer. Nowadays, the use of Internet services is widespread. The name of a site
you type in the address bar is converted into an IP address. Suppose, the DNS
utility was not available and you wanted to search for information on any topic
from Google. In that case, you had to type 216.239.51.10 instead of typing
www.google.com.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. What is DWDM? What are the pros
and cons of DWDM
Network capacity
has increased drastically
as the number
of users has increased
in the telecommunication industry.
Among the various
methods used for increasing network capacity, a few are listed as
follows:
·
Enhance the bit rate of existing
system
·
Install new fiber
·
Optimise the use of existing fiber
In the
upcoming sections, we
will discuss about
optimising the use of
existing fiber by
using WDM and some
background on the
importance of DWDM in optical
networks and
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Briefly explain the networking
applications in government sector
Electronic governance (e-governance) is the
application of IT by the government for
providing better facilities or services to its citizens, in an
efficient manner. It helps in
improving access of
citizens to the government services and delivering these
services on time. In other words,
e-governance is a medium used by the government for
interacting with its citizens electronically. E-governance
is preferred because
it provides the government with a
cheap, transparent and easy way of
interacting with its people.
Therefore, e-governance can
be considered as
an application of electronics in governance, which means:
·
Using
electronic means to
interact between the
government and citizens,
or between business and the government.
·
Application of
electronics in various
facets of internal
government operations in order
to improve democratic
and business traits
of governance by automating
the existing paper-based
procedures.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Explore the different models in
cloud environment and their examples
Different Models in Cloud Environment
1.
Introducing Infrastructure as a Service
Infrastructure as a
Service (IaaS) allows you to deliver
hardware resources, such as servers,
storage space and
network, as cloud service to the
customers. In addition, operating
systems and virtualisation technology are provided to the customers to manage the
resources. IaaS delivers computer infrastructure, i.e., the virtualised infrastructural environment
as a service to the end users.
Clients or customers,
instead of investing
in hardware or software resources, can simply purchase
these resources as the outsourced service.
This reduces the problems faced
by customers in purchasing and installing these resources in their
data centre. For such services, the cloud service
providers charge the
customers on the
utility computing basis.
It implies that the customers pay for this service on the basis of the
amount of resources being utilised.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
PROGRAM - MBA
SUBJECT CODE & NAME - MI0036 – BUSINESS
INTELLIGENCE & TOOLS
1. a. List the factors responsible
for the increasing importance of BI in organisations.
b. What are the obstacles in
Implementing BI in Organisations
a. Factors responsible for
increasing importance of BI in organization
The increasing
importance of BI is due
to various factors,
namely,
·
Technological advancement
·
Competitive market
·
Need for quick reflexes.
Let's elaborate on these
factors.
Technological advancement: The
magnificent increase in
electronic connectivity
between people
2. a. Discuss the contribution of business
analytics in strategy management
b. How is CRM linked to business
intelligence?
a. Various contributions of
business analytics in strategy management
A good financial performance is the result of better business outcomes. To achieve these
outcomes, organisations need
to develop and
manage multiple,
interconnected business strategies.
BA solutions give an
actionable business forecast
that can guide
business strategies and technologies to provide
timely and accurate financial results.
Although, the business user teams
may only have
an apparent understanding
of BA technologies, they are expected
to highlight the
requirements
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain the data mining process
in detail
DM (DATA MINING)
includes a number
of operations, each
one of which
is aided by a
variety of techniques, such as
decision trees, rule-based induction, neural networks and
conceptual clustering. The
derived results are
evaluated repeatedly over the
developed models to
minimise the occurrence
of potential errors. In the real world applications, knowledge
extraction involves collaborative use of several data mining techniques and
operations.
Data mining consists of
the following six steps (refer to below figure):
• Data is pulled from the data
warehouse and sent to the ETL layer, where E stands for extract, i.e.,
pulled, T for transform and L for load.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Briefly explain the 7 Ps of marketing mix
7 Ps of marketing/service marketing mix
Neil Borden, in his
presidential address in American Marketing Association (AMA), used
the term marketing mix for the first time.
A marketing mix can be defined as a
collection of tools that can be used in achieving marketing
objectives. It uses
4 Ps to
decide the marketing
strategy. The 4
Ps of
marketing mix are shown
in Below Fig:
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. What are the main features of a
financial reporting system
The following are the main
features of a financial reporting system:
Drag-and-drop report
builder: This feature helps in
creating sophisticated reports
and analysing them
with ease. To generate a report,
you need toselect the
desired items from
a menu, drag
them onto a
graphical workspace and choose appropriate formatting options.
Choice of dimensions
in rows and columns: This feature enables you to easily design
your report. You just need to choose the right value of various
dimensions, such as business unit,
department, region, product, customer, projects, metrics,
assumptions and time
period, and drag
them into the relevant rows and columns of the report
builder.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Discuss the various critical
challenges that need to be overcome for BI to succeed within an organization.
Various critical challenges that need to be overcome for BI to
succeed within an organization
Cross-organisational
collaboration
Usually, business
initiatives focus on a particular area
of business or on a limited set of products. As a result of this narrow focus,
organisations could not analyse the impact of the
data generated by the
project and business operations. As
soon as organisations
started focusing on the data generated by
customer information such
as customer buying
preference, frequency, type of
items, locality, etc.,
these initiatives started
integrating product information with customer information.
Business sponsors
Strong business
sponsors believe in the BI
project’s value and remove the
obstacles to champion
it. A
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522