Dear
students get fully solved SMU MBA Spring
2014 assignments
Send
your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
These
are just questions for reference . To check samples see our latest uploads in
blog archive or search assignments .
(Prefer mailing. Call in emergency )
SEM 4
MIS
MI0033-
SOFTWARE ENGINEERING
1 Process patterns are the results of applying abstraction to recurring
processes and process components. Process patterns are collections of general
techniques, actions, and/or tasks (activities) for developing object-oriented
software. Justify the above statement. Explain with an example for each, the
different types of process patterns in the ascending order of abstraction
level.
A a. Justifying the above statement
b. Explaining the three types of process patterns
c. Examples
2 Software estimation is the first phase of project planning and it is
the process of judging a software product and solving the problem associated
with the software project. We follow some important steps to achieve reliable
cost and effort estimates. Explain the different estimation models and
estimation techniques.
A a. Explaining different estimation models
b. Explaining estimation techniques
3 Empirical software solutions is a small manufacture based company who
have a single product in the public access and security domain. The information
system which they possess gives details pertaining to the presence of
individuals at specific locations and also checks and issues security badges.
The software of the system is connected to specially designed hardware
peripherals along with a well-defined LAN network connection. The system
handles several aspects ranging from computing from database manipulation,
peripheral hardware ti image handling. This company uses both software as well
as hardware, and incorporates latest technologies, like networking and device
drivers.
Due to the pressure from customers and the competition, they were in
need of a structured software process. There was no standardized development
process. Most of their work was based on customer requests. Every time a new
request from customer came in, more additions were made to the product. A new
version of the software was installed at the customer’s site when requested by
the customer. All the queries related to technical support, modifications made
to the system were handled by the development team. There was no specific
design methodology followed and each developer used his own method of working.
Apart from the user manual, there was no other documentation found held.
Challenges:
Introduction of reuse framework and method into the company
Gain support from the top management for the reuse program, as
introduction of reuse program can affect all parts of the software production
process.
Suggestions were made to set up the reuse program along with the associated
cost and risk involved in setting up the reuse program.
a. Explain the challenges faced by the empirical software solutions
b. Give some suggestions to overcome the challenges.
c. Explain the classifications and advantages of software reuse.
A a. Listing the challenges
b. Suggesting some 4 point about, planning, design, resource management,
documentation
c. Classifications with diagram
Listing the advantages
4 Suppose you are assigned the task to analyse the various factors
involved in your project, explain how will you gather information and analyse
the task
A Explaining system analysis
5 Write short note on
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
A a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
6 Briefly describe the concept of polymorphism by using the automobile
class as an example.
A a. Explaining the example of automobile class
b. Describing the concept of polymorphism
c. Explaining polymorphism using the above example
MI0034- DATABASE MANAGEMENT SYSTEMS
1 How is DBMS classified based on several criteria? Explain each one of
them with few examples where ever required
A Listing the criterion
Explaining the types based on each criterion
Example
2 Differentiate between B+ tree and B- tree. Explain them with diagrams
A Diagrams
Explanation based on comparison
3 EMPLOYEE
EMP_ID NAME PROJECT SALARY DEPT_NUM
MUL1 Ramya PR1 40000 1
MUL2 Nupur PR1 45000 2
SMU1 Rajesh PR3 20000 2
SMU2 Vinay PR2 50000 3
SMU3 Anil PR2 80000 2
DEPARTMENT
DEPT_ID DNAME PLACE
1 MIS Bangalore
2 HRM Bangalore
3 Finance Chennai
4 Research Bangalore
Using these tables answer the following question
a. If we want to see all the employees with salary between 40000 and
50000, which query can be used?
b. Select employee name from EMPLOYEE table, whose name starts with R c.
Explain aggregate functions and grouping in detail
A
a. Query based in BETWEEN operator
SELECT * from employee WHERE salary between 40000 to 50000
b. Query based in LIKE condition
SELECT * from employee WHERE Name LIKE ‘r%’;
c. Explaining aggregate functions on select statement, with an example,
showing the output of the query, explaining having clause, with example
4 What are the problems and failures that may encounter with respect to the
transactions in a database management system? Give examples.
A Explaining the three problems with code
Listing the types of failures (atleast 4)
5 Consider any database of your choice (may be simple banking
database/forecasting database/project management database). Show the deduction
of the tables in your database to the different types of normal forms
A Choosing a proper database
Explaining the 5 normal forms with respect to the database chosen
6 Read the following case study thoroughly and answer the following
questions:
Laxmi bank is one of the largest private sector banks of India. It has
an extensive network of more than 200 branches. It offers banking services to
retail as well as corporate clients. The bank faced a challenge in integrating
multi-pronged database management system into a centralized system. The IT
department of the bank also realized that the computing capabilities of its PCs
and servers were not proportionately distributed among all its branches. Each
branch had its database management system stored in a traditional way on the
disk. The total cost of operating and maintaining the current IT infrastructure
was very high and the fundamental shortcomings added to the costs. Moreover,
there were also recurrent problems due to the malfunctioning of the currently
operational database management system. Therefore, the bank’s top management
decided to fix the problem and operationalise a robust database management
system. The bank hired an external database technology consulting firm called
AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two
verticals. The retail banking vertical and the corporate banking vertical. All
the individual database servers from the individual branches were removed. The
entire database system was made virtual such that the managers and the staff
can access only the required information (related to retail banking or
corporate banking) from the respective centralised data centers. There were
only two such centralised data centers (one for retail banking and another for
corporate banking) that were managed centrally. Staff and managers could access
the information through their PCs and laptops. Centralised database management
system complemented the security system by bringing in authentication through a
unified ID management server. Managers and officers of the bank were able to
process half a million transactions per month in real time after the new
implementation. There were significant savings in the cost and also in the
consumption of power. Now there were no problems with regard to imbalances in
the load across various network servers. Due to centralised data management,
top management could keep an eye on the functioning of various branches. Hence
the cases of fraud and cheating reduced considerably. The bank managers could
also process the loan applications in reduced time since the customer’s
previous records could be accessed at the click of the button and approval from
the higher authorities could be obtained in real time. Moreover the new system
also brought in many applications that helped local managers in the decision
making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its
centralised database system to a distributed database system in future?
A a. Listing the uses from the from the case study
b. Explaining about data fragmentation, replication and allocation techniques
c. Is it possible to replicate the centralised database management model
of the bank in a manufacturing concern? Give reasons.
MI0035- COMPUTER NETWORKS
1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN
b. Analog and digital data transmission
c. High level data link control
2 Virtually all networks in use today are based in some fashion on the
Open Systems Interconnection (OSI) standard. The core of this standard is the
OSI Reference Model, a set of seven layers that define the different stages
that data must go through to travel from one device to another over a network.
Explain the seven layer architecture of OSI model with diagram
A Explaining the OSI reference model
Diagram of OSI reference model
3 Consider yourself as the operation head in a telecommunication
company. What are the different types of multiplexing techniques will you
implement to get efficient data transmission process?
A Explaining various multiplexing techniques
4 Integrated Services for Digital Network (ISDN) is a set of
communication standards for simultaneous digital transmission of voice, video,
data, and other network services over the traditional circuits of the public
switched telephone network. It was first defined in 1988 in the CCITT red book.
Explain the different types of ISDN with their features and advantages for each
one of them.
A Explaining Two different types
Features of both of them
Advantages of both of them
5 ABC company is an internet service provider. The main goal of ABC is
to provide 24 X7X365 storage capacity, storage management and internet service
to the customers. It now needs a solution that will eliminate downtime.
Downtime is nothing but the time during which a computer or computer system is
down, or inoperative due to hardware or software failure. We also need the
flexibility in quick response to both the development in customer base and
additional capacity and service demands of the customers.
ABC company took the help of network storage infrastructure software
provider to achieve their goals by providing support for end to end redundancy
and bondless scalability.
By creating a scalable storage network with the ability to
confidentially deliver the 24X7X365 reliability, and speed that outsourcing
customers demand, it has enabled the ISP/SSP to attract and retain customers
and substantially build its business. As the same time, the solution has
effectively lowered ABC company’s total cost of ownership for its entire
storage solution: the IP Stor/CNP union has enabled a painless, flexible cost
effective, scalable solution. The complementary IP Stor/CNT solution has
allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting
network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by ABC company after reading the SLM
b. Listing the benefits
c. Listing the different classes of ISP and their applications
6 Cryptography is the science of hiding information. The traditional
security system employed a different of encryption process known as symmetric
cryptography, which involves the use of te same method for both encryption and
decryption. Explain the different networking algorithms that are used for
cryptography along with its subtypes.
A Explaining the two types of cryptography and the networking algorithms
used for them
MI0036- BUSINESS INTELLIGENCE & TOOLS
1 Similarity measures determine the similarity between the two objects.
The similarity between the two objects ti and tj, sim(ti, tj) in the database D
is a mapping from D*D to the range [0, 1]. a. List the characteristics of a
good similarity measure.
b. what are the four methods to determine the similarity characteristic
between the two objects?
A a. Listing the characteristics
b. Listing the four methods
a. Four methods to determine the similarity characteristic and their
formula
2 Transactions refers to business or commercial transactions. Online
transaction processing refers to the category of systems that assists and
manage transaction- oriented applications, typically for data entry and
retrieval transaction processing.
List the differences between OLAP and OLTP
A Listing at least 10 points
3 Data extraction is the act or the process of extracting data out of
data sources for added data processing or data storage or data migration. This
data can be extracted from the web. Explain the different techniques for data
extraction
A Listing the various techniques
Explaining the four methods
4 Business Intelligence strategy summarizes the finest combination of
procedures and technologies to meet the business intelligence strategies of an
organization
a. List the main aspects of BI strategy.
b. What are the steps to be followed to implement BI framework?
A a. Listing at least 6 main aspects of BI strategy
b. Steps for Implementing BI framework
5 Write short note on
a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
A a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
6 RSG is a footwear company which has its chain all over the world. This
company has to keep track of all the products sold in the company and huge data
is involved in it.
a. How should it plan to implement the Business intelligence solutions?
b. How to make the best use of BI?
A a. Explaining the planning to implement a BI solutions
b. Explaining best usage of BI
Dear
students get fully solved SMU MBA Spring
2014 assignments
Send
your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
These
are just questions for reference . To check samples see our latest uploads in
blog archive or search assignments .
(Prefer mailing. Call in emergency )
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.