Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
DRIVE
|
Winter
2015
|
PROGRAM
|
MBADS
(SEM 3/SEM 5)
|
MBAFLEX/
MBA (SEM 3)
|
PGDISMN
(SEM 1)
|
SUBJECT
CODE & NAME
|
MI0036
– BUSINESS INTELLIGENCE & TOOLS
|
CREDIT
- 4
|
MARKS
–60
|
Q1.
a. List the factors responsible for the increasing importance of BI in
organisations. b. What are the obstacles in Implementing BI in Organisations 5,
5
Answer:
Factors Responsible for the Increasing Importance of Business Intelligence in
Organisations: The increasing importance of BI is due to various
factors, namely, technological advancement, competitive market and need for
quick reflexes. Let's
Q2.
a. Discuss the contribution of business analytics in strategy management. b.
How is CRM linked to business intelligence? 5, 5
Answer:
Contribution of BA in strategy Management: A good
financial performance is the result of better business outcomes. To achieve
these outcomes, organizations need to develop and manage multiple,
interconnected business strategies. BA solutions give an actionable business
forecast that can guide business strategies and technologies to provide
Q3.
Explain the data mining process in detail. (Figure to data mining process,
Explanation of the process) 3, 7
Answer:
Figure to data mining process:
Q4.
4 Briefly explain the 7 Ps of marketing mix
· Explaining
the 7 Ps of marketing mix
Answer:
The
service marketing mix is also known as an extended marketing mix and is an
integral part of a service blueprint design. The service marketing mix
Q5.
What are the main features of a financial reporting system (At least 10
features) 10
Answer:
Features of a financial reporting system: The
following are the main features of a financial reporting system:
Drag-and-drop
report builder: This feature helps in creating sophisticated
reports and analyzing them with ease. To generate a report, you need to select
the desired items from a menu, drag them onto a graphical workspace and choose
appropriate
Q6.
Discuss the various critical challenges that need to be overcome for BI to
succeed within an organization (Listing the critical challenges) 10
Answer:
Critical Challenges for Business Intelligence Success: Business
success is achieved with BI through easily accessible information. This access
can be best achieved with the help of precise and timely insight into the
finances and customers of an organization as well as the state of the market.
The true indicator of success in business is when
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
DRIVE
|
Winter
2015
|
PROGRAM
|
MBADS
(SEM 3/SEM 5)
|
MBAFLEX/
MBA (SEM 3)
|
PGDISMN
(SEM 1)
|
SUBJECT
CODE & NAME
|
MI0035
– COMPUTER NETWORKS
|
BK ID
- B1973
|
CREDIT
– 4, MARKS – 60
|
Q1.
Explain the working of Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) Protocol. (Working of CSMA/CD in a Flowchart, Explaining the working
in detail) 2, 8
Answer:
working of CSMA/CD in a flowchart:
Q2.
2 Write a brief note on seven layered OSI reference model. Explain the role of
each layer.
· Define
seven layered OSI reference model
· Explaining
the role of 7 layers
Answer:
The Seven-Layered OSI Model: The OSI reference model emerged as a
first step towards international standardisation of the protocols used in the
various layers by the ISO. Themodel is called the ISO OSI reference model as it
deals
Q3.
Write short notes on: 3, 7
a.
Subnet
b.
Super netting
c.
Subnet masks
d.
Dynamic NAT
e.
Domain Name System
Answer:
Subnets: A network that exists within the Class A, B, or C
network is called a subnet.
It
can also be defined as a network within a network. Subnets are created to
extend network IDs by using host bits of one or more Class A, B, or C.
Therefore, subnets can have a network ID of any length. All devices that have
IP addresses with same
Q4.
What is DWDM? What are the pros and cons of DWDM (Definition, Four pros of
DWDM, Four cons of DWDM) 2, 4, 4
Answer:
DWDM: Network capacity has increased drastically as the
number of users has increased in the telecommunication industry. Among the
various methods used for increasing network capacity, a few are listed as
follows:
· Enhance
the bit rate of existing system
· Install
new fiber
· Optimize
the use of
Q5.
Briefly explain the networking applications in government sector (Listing the
objectives, About networking applications – understanding the networking for
government sector and listing the websites and portals and explaining for them)
2, 8
Answer:
Networking Applications in Government Sector: In the
government sector, e-governance is part of the networking applications.
Electronic governance (e-governance) is the application of IT by the government
for providing better facilities or services to its citizens, inane efficient
manner. It helps in improving access of citizens to the government services and
delivering these services on time. In other worse-governance is a medium used
by the government
Q6.
Explore the different models in cloud environment and their examples
(Introducing Infrastructure as a Service, Introducing Platform as a Service,
Introducing Software as a Service, Explaining Cloud Elements) 2, 2, 2, 4
Answer:
Infrastructure as a Service: Infrastructure as a Service (IaaS)
allows you to deliver hardware resources, such as servers, storage space and
network, as cloud service to the customers. In addition, operating systems and
virtualization technology are provided to the customers to manage the
resources. Iasi delivers computer infrastructure, i.e., the virtualized
infrastructural environment as a service tithe end users. Clients or customers,
instead of investing in
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
MI0034
|
Winter
2015
|
1
a. Explain the different components of Database Management System (DBMS)
b.
With an example explain the properties of DBMS
a.
Various components of DBMS
b.
Listing three important properties of database
Explaining
each property with an example
Answer:
A) components of Database Management System
Database
engine
Database
engine is termed as the heart of the
2
Explain the different operations of relational algebra with suitable examples.
Explaining
the various operations of relational algebra with an example
Answer: Relational
Algebra
Relational
algebra is a language in which one relation gets defined by another relation
without the original relation getting changed. There are many operations
3
Write short notes on
a.
Cardinality ratio
b.
Participation constraints
a.
Defining cardinality ratio
Explaining
the four types of mapping cardinalities example for each of the cardinality
mapping
b.
Explaining the two ways of participation roles
Answer:
A) The cardinality ratio specifies the number of entities to which another
entity can be associated through a relationship set.
The
different mapping cardinalities are of
4
a. Define SQL
b.
Explain the different types of SQL
a.
Defining SQL
b.
Defining four different types of SQL
Answer:
A) SQL is a relational database language used to communicate with a
database. The American National Standards Institute declared the standard
language for RDBMS. Accordingly, the common relational database management
systems that SQL uses are Oracle, Sybase, Microsoft SQL Server, Access, and so
on. When the
5
a. Explain the two-phase locking protocol
b.
Elaborate advantages and disadvantages of Distributed database management
system
a.
Explaining two phase locking protocol with various phases
b.
Explaining four advantages and four disadvantages of distributed database
management system
Answer:
A) The two-phase locking protocol
The
two-phase locking protocol is a process to access the shared resources as their
own without creating deadlocks. This process consists of two phases.
1. Growing
phase – In this phase, the transaction may acquire lock, but may
not release any locks. Therefore, this phase is also called as resource
acquisition activity.
2. Shrinking
phase – In this
6
What is client–server model ? Briefly explain the advantages of client–server
model
a.
Defining client-server model with different parts
b.
Listing 3 advantages of client–server model
Answer: Client–server
model
The
client–server model is basic to distributed systems; it allows clients to make
requests that are routed to the appropriate server in the form of transactions.
The client–server model consists of three parts
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
DRIVE
|
Winter
2015
|
PROGRAM
|
MBADS
(SEM 3/SEM 5)
|
MBAFLEX/
MBA (SEM 3)
|
PGDISMN
(SEM 1)
|
SUBJECT
CODE & NAME
|
MI0033
– SOFTWARE ENGINEERING
|
Qus:1
Explain the concept of “software project life cycle” with a suitable example.
· Explaining
software project life cycle
Answer:
Explaining
software project life cycle:
We
can classify software development projects into various types based on their business
functional domain. In case a software company is interested in specialising in
only one product or service, it will need to understand that particular
function or domain thoroughly. Mere technical knowledge in how to develop the
software by
Q2.
Write short notes on: 2, 2, 2, 4
a.
Planning and estimation phase
b.
Scheduling and tracking phase
c.
Risk analysis phase
d.
Scope of a software project
Answer:
a. Planning and estimation phase: This is the second phase of the project
management process. In this process, a project team that was
appointed in the initiation stage, plans for the next phase and
sets up the vision
Qus:3
a. Explain function oriented metrics
b.
How do you calculate function points?
Ans:
a.
Explaining the meaning of function-oriented metrics along with their types and
the five information domain value calculation terminology:
The
function-oriented metrics are indirect software metrics. Instead of the number
of LOC, the emphasis is more on the functionality of the product. The function-oriented
metrics were first proposed by Albrecht. He suggested a productivity
measurement approach known as the Function point method. In this method,
Qus:4
a. Explain the system architecture specification
b.
Explain System specification review
Ans:
a.
Explaining the four main components of system architecture:
These
components are as follows:
· Processing
power – The processing power depends on the computer or the server.
The correct processor must be selected and installed on to a system. The
selection of the processor is based on the software
Qus:5
Explain the different types of integration testing
· Atleast
5 types of integration testing
Answer:
Atleast
5 types of integration testing:
1. Top-down
integration:
We
can state an incremental approach to develop a program as top-down integration.
In top-down integration, we first recognise
Q6.
Explain Five maturity levels of Capability Maturity Model (CMM)
· Five
maturity levels of CMM
Answer:
Levels
of the CMM
There
are five levels of the CMM:
Level
1 - Initial
Processes
are usually ad hoc and the organization usually does not provide a stable
environment. Success in these organizations depends on the competence and
heroics of the people in the organization and not on the use of proven
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.