SMU MBA - IS- SPRING 2016 - SOLVED ASSIGNMENTS

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601


DRIVE
Winter 2015
PROGRAM
MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0036 – BUSINESS INTELLIGENCE & TOOLS
BK ID - B2043
CREDIT - 4
MARKS –60

Q1. a. List the factors responsible for the increasing importance of BI in organisations. b. What are the obstacles in Implementing BI in Organisations 5, 5
Answer: Factors Responsible for the Increasing Importance of Business Intelligence in Organisations: The increasing importance of BI is due to various factors, namely, technological advancement, competitive market and need for quick reflexes. Let's


Q2. a. Discuss the contribution of business analytics in strategy management. b. How is CRM linked to business intelligence? 5, 5
Answer: Contribution of BA in strategy Management: A good financial performance is the result of better business outcomes. To achieve these outcomes, organizations need to develop and manage multiple, interconnected business strategies. BA solutions give an actionable business forecast that can guide business strategies and technologies to provide


Q3. Explain the data mining process in detail. (Figure to data mining process, Explanation of the process) 3, 7
Answer: Figure to data mining process:


Q4. 4 Briefly explain the 7 Ps of marketing mix
·         Explaining the 7 Ps of marketing mix
Answer:
The service marketing mix is also known as an extended marketing mix and is an integral part of a service blueprint design. The service marketing mix

Q5. What are the main features of a financial reporting system (At least 10 features) 10
Answer: Features of a financial reporting system: The following are the main features of a financial reporting system:

Drag-and-drop report builder: This feature helps in creating sophisticated reports and analyzing them with ease. To generate a report, you need to select the desired items from a menu, drag them onto a graphical workspace and choose appropriate

Q6. Discuss the various critical challenges that need to be overcome for BI to succeed within an organization (Listing the critical challenges) 10
Answer: Critical Challenges for Business Intelligence Success: Business success is achieved with BI through easily accessible information. This access can be best achieved with the help of precise and timely insight into the finances and customers of an organization as well as the state of the market. The true indicator of success in business is when















Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601



DRIVE
Winter 2015
PROGRAM
MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0035 – COMPUTER NETWORKS
BK ID - B1973
CREDIT – 4, MARKS – 60

Q1. Explain the working of Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Protocol. (Working of CSMA/CD in a Flowchart, Explaining the working in detail) 2, 8
Answer: working of CSMA/CD in a flowchart:


Q2. 2 Write a brief note on seven layered OSI reference model. Explain the role of each layer.
·         Define seven layered OSI reference model
·         Explaining the role of 7 layers
Answer: The Seven-Layered OSI Model: The OSI reference model emerged as a first step towards international standardisation of the protocols used in the various layers by the ISO. Themodel is called the ISO OSI reference model as it deals


Q3. Write short notes on: 3, 7
a. Subnet
b. Super netting
c. Subnet masks
d. Dynamic NAT
e. Domain Name System
Answer: Subnets: A network that exists within the Class A, B, or C network is called a subnet.
It can also be defined as a network within a network. Subnets are created to extend network IDs by using host bits of one or more Class A, B, or C. Therefore, subnets can have a network ID of any length. All devices that have IP addresses with same


Q4. What is DWDM? What are the pros and cons of DWDM (Definition, Four pros of DWDM, Four cons of DWDM) 2, 4, 4
Answer: DWDM: Network capacity has increased drastically as the number of users has increased in the telecommunication industry. Among the various methods used for increasing network capacity, a few are listed as follows:

·         Enhance the bit rate of existing system
·         Install new fiber
·         Optimize the use of


Q5. Briefly explain the networking applications in government sector (Listing the objectives, About networking applications – understanding the networking for government sector and listing the websites and portals and explaining for them) 2, 8
Answer: Networking Applications in Government Sector: In the government sector, e-governance is part of the networking applications. Electronic governance (e-governance) is the application of IT by the government for providing better facilities or services to its citizens, inane efficient manner. It helps in improving access of citizens to the government services and delivering these services on time. In other worse-governance is a medium used by the government


Q6. Explore the different models in cloud environment and their examples (Introducing Infrastructure as a Service, Introducing Platform as a Service, Introducing Software as a Service, Explaining Cloud Elements) 2, 2, 2, 4
Answer: Infrastructure as a Service: Infrastructure as a Service (IaaS) allows you to deliver hardware resources, such as servers, storage space and network, as cloud service to the customers. In addition, operating systems and virtualization technology are provided to the customers to manage the resources. Iasi delivers computer infrastructure, i.e., the virtualized infrastructural environment as a service tithe end users. Clients or customers, instead of investing in







Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601





MI0034
Winter 2015

1 a. Explain the different components of Database Management System (DBMS)
b. With an example explain the properties of DBMS
a. Various components of DBMS
b. Listing three important properties of database
Explaining each property with an example

Answer: A) components of Database Management System
Database engine
Database engine is termed as the heart of the


2 Explain the different operations of relational algebra with suitable examples.
Explaining the various operations of relational algebra with an example

AnswerRelational Algebra
Relational algebra is a language in which one relation gets defined by another relation without the original relation getting changed. There are many operations


3 Write short notes on
a. Cardinality ratio
b. Participation constraints
a. Defining cardinality ratio
Explaining the four types of mapping cardinalities example for each of the cardinality mapping
b. Explaining the two ways of participation roles

Answer: A) The cardinality ratio specifies the number of entities to which another entity can be associated through a relationship set.

The different mapping cardinalities are of


4 a. Define SQL
b. Explain the different types of SQL
a. Defining SQL
b. Defining four different types of SQL

Answer: A) SQL is a relational database language used to communicate with a database. The American National Standards Institute declared the standard language for RDBMS. Accordingly, the common relational database management systems that SQL uses are Oracle, Sybase, Microsoft SQL Server, Access, and so on. When the


5 a. Explain the two-phase locking protocol
b. Elaborate advantages and disadvantages of Distributed database management system
a. Explaining two phase locking protocol with various phases
b. Explaining four advantages and four disadvantages of distributed database management system

Answer: A) The two-phase locking protocol
The two-phase locking protocol is a process to access the shared resources as their own without creating deadlocks. This process consists of two phases.
1. Growing phase – In this phase, the transaction may acquire lock, but may not release any locks. Therefore, this phase is also called as resource acquisition activity.
2. Shrinking phase – In this


6 What is client–server model ? Briefly explain the advantages of client–server model
a. Defining client-server model with different parts
b. Listing 3 advantages of client–server model

AnswerClient–server model
The client–server model is basic to distributed systems; it allows clients to make requests that are routed to the appropriate server in the form of transactions. The client–server model consists of three parts



Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601




DRIVE
Winter 2015
PROGRAM
MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0033 – SOFTWARE ENGINEERING


Qus:1 Explain the concept of “software project life cycle” with a suitable example.
·         Explaining software project life cycle
Answer:
Explaining software project life cycle:
We can classify software development projects into various types based on their business functional domain. In case a software company is interested in specialising in only one product or service, it will need to understand that particular function or domain thoroughly. Mere technical knowledge in how to develop the software by


Q2. Write short notes on: 2, 2, 2, 4 
a. Planning and estimation phase
b. Scheduling and tracking phase
c. Risk analysis phase
d. Scope of a software project
Answer: a. Planning and estimation phase: This is the second phase of the project management process. In this process, a project team that was appointed in the initiation stage, plans for the next phase and sets up the vision


Qus:3 a. Explain function oriented metrics
b. How do you calculate function points?
Ans:
a. Explaining the meaning of function-oriented metrics along with their types and the five information domain value calculation terminology:
The function-oriented metrics are indirect software metrics. Instead of the number of LOC, the emphasis is more on the functionality of the product. The function-oriented metrics were first proposed by Albrecht. He suggested a productivity measurement approach known as the Function point method. In this method,


Qus:4 a. Explain the system architecture specification
b. Explain System specification review
Ans:
a. Explaining the four main components of system architecture:
These components are as follows:
·         Processing power – The processing power depends on the computer or the server. The correct processor must be selected and installed on to a system. The selection of the processor is based on the software

Qus:5 Explain the different types of integration testing
·         Atleast 5 types of integration testing
Answer:
Atleast 5 types of integration testing:
1.      Top-down integration:
We can state an incremental approach to develop a program as top-down integration. In top-down integration, we first recognise


Q6. Explain Five maturity levels of Capability Maturity Model (CMM)
·         Five maturity levels of CMM
Answer:
Levels of the CMM
There are five levels of the CMM:

Level 1 - Initial
Processes are usually ad hoc and the organization usually does not provide a stable environment. Success in these organizations depends on the competence and heroics of the people in the organization and not on the use of proven
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.