08448380779 Call Girls In Friends Colony Women Seeking Men
Is 4 th
1. Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
These are just questions for reference . To check samples see our latest
uploads in blog archive or search assignments .
(Prefer mailing. Call in emergency )
SEM 4 MIS
MI0033- SOFTWARE ENGINEERING
1 Process patterns are the results of applying abstraction to recurring processes and
process components. Process patterns are collections of general techniques, actions,
and/or tasks (activities) for developing object-oriented software. Justify the above
statement. Explain with an example for each, the different types of process patterns
in the ascending order of abstraction level.
A a. Justifying the above statement
b. Explaining the three types of process patterns
c. Examples
2 Software estimation is the first phase of project planning and it is the process of
judging a software product and solving the problem associated with the software
2. project. We follow some important steps to achieve reliable cost and effort
estimates. Explain the different estimation models and estimation techniques.
A a. Explaining different estimation models
b. Explaining estimation techniques
3 Empirical software solutions is a small manufacture based company who have a
single product in the public access and security domain. The information system
which they possess gives details pertaining to the presence of individuals at specific
locations and also checks and issues security badges.
The software of the system is connected to specially designed hardware peripherals
along with a well-defined LAN network connection. The system handles several
aspects ranging from computing from database manipulation, peripheral hardware ti
image handling. This company uses both software as well as hardware, and
incorporates latest technologies, like networking and device drivers.
Due to the pressure from customers and the competition, they were in need of a
structured software process. There was no standardized development process. Most
of their work was based on customer requests. Every time a new request from
customer came in, more additions were made to the product. A new version of the
software was installed at the customer’s site when requested by the customer. All
the queries related to technical support, modifications made to the system were
handled by the development team. There was no specific design methodology
followed and each developer used his own method of working. Apart from the user
manual, there was no other documentation found held.
3. Challenges:
Introduction of reuse framework and method into the company
Gain support from the top management for the reuse program, as introduction of
reuse program can affect all parts of the software production process.
Suggestions were made to set up the reuse program along with the associated cost
and risk involved in setting up the reuse program.
a. Explain the challenges faced by the empirical software solutions
b. Give some suggestions to overcome the challenges.
c. Explain the classifications and advantages of software reuse.
A a. Listing the challenges
b. Suggesting some 4 point about, planning, design, resource management,
documentation
c. Classifications with diagram
Listing the advantages
4 Suppose you are assigned the task to analyse the various factors involved in your
project, explain how will you gather information and analyse the task
4. A Explaining system analysis
5 Write short note on
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
A a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
6 Briefly describe the concept of polymorphism by using the automobile class as an
example.
A a. Explaining the example of automobile class
b. Describing the concept of polymorphism
5. c. Explaining polymorphism using the above example
MI0034- DATABASE MANAGEMENT SYSTEMS
1 How is DBMS classified based on several criteria? Explain each one of them with
few examples where ever required
A Listing the criterion
Explaining the types based on each criterion
Example
2 Differentiate between B+ tree and B- tree. Explain them with diagrams
A Diagrams
Explanation based on comparison
3 EMPLOYEE
EMP_ID NAME PROJECT SALARY DEPT_NUM
6. MUL1 Ramya PR1 40000 1
MUL2 Nupur PR1 45000 2
SMU1 Rajesh PR3 20000 2
SMU2 Vinay PR2 50000 3
SMU3 Anil PR2 80000 2
DEPARTMENT
DEPT_ID DNAME PLACE
1 MIS Bangalore
2 HRM Bangalore
3 Finance Chennai
4 Research Bangalore
Using these tables answer the following question
a. If we want to see all the employees with salary between 40000 and 50000, which
query can be used?
b. Select employee name from EMPLOYEE table, whose name starts with R c. Explain
aggregate functions and grouping in detail
7. A
a. Query based in BETWEEN operator
SELECT * from employee WHERE salary between 40000 to 50000
b. Query based in LIKE condition
SELECT * from employee WHERE Name LIKE ‘r%’;
c. Explaining aggregate functions on select statement, with an example, showing the
output of the query, explaining having clause, with example
4 What are the problems and failures that may encounter with respect to the
transactions in a database management system? Give examples.
A Explaining the three problems with code
Listing the types of failures (atleast 4)
5 Consider any database of your choice (may be simple banking database/forecasting
database/project management database). Show the deduction of the tables in your
database to the different types of normal forms
A Choosing a proper database
8. Explaining the 5 normal forms with respect to the database chosen
6 Read the following case study thoroughly and answer the following questions:
Laxmi bank is one of the largest private sector banks of India. It has an extensive
network of more than 200 branches. It offers banking services to retail as well as
corporate clients. The bank faced a challenge in integrating multi-pronged database
management system into a centralized system. The IT department of the bank also
realized that the computing capabilities of its PCs and servers were not
proportionately distributed among all its branches. Each branch had its database
management system stored in a traditional way on the disk. The total cost of
operating and maintaining the current IT infrastructure was very high and the
fundamental shortcomings added to the costs. Moreover, there were also recurrent
problems due to the malfunctioning of the currently operational database
management system. Therefore, the bank’s top management decided to fix the
problem and operationalise a robust database management system. The bank hired
an external database technology consulting firm called AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail
banking vertical and the corporate banking vertical. All the individual database
servers from the individual branches were removed. The entire database system was
made virtual such that the managers and the staff can access only the required
information (related to retail banking or corporate banking) from the respective
centralised data centers. There were only two such centralised data centers (one for
retail banking and another for corporate banking) that were managed centrally. Staff
and managers could access the information through their PCs and laptops.
Centralised database management system complemented the security system by
9. bringing in authentication through a unified ID management server. Managers and
officers of the bank were able to process half a million transactions per month in real
time after the new implementation. There were significant savings in the cost and
also in the consumption of power. Now there were no problems with regard to
imbalances in the load across various network servers. Due to centralised data
management, top management could keep an eye on the functioning of various
branches. Hence the cases of fraud and cheating reduced considerably. The bank
managers could also process the loan applications in reduced time since the
customer’s previous records could be accessed at the click of the button and
approval from the higher authorities could be obtained in real time. Moreover the
new system also brought in many applications that helped local managers in the
decision making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its centralised database
system to a distributed database system in future?
A a. Listing the uses from the from the case study
b. Explaining about data fragmentation, replication and allocation techniques
c. Is it possible to replicate the centralised database management model of the bank
in a manufacturing concern? Give reasons.
MI0035- COMPUTER NETWORKS
10. 1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN
b. Analog and digital data transmission
c. High level data link control
2 Virtually all networks in use today are based in some fashion on the Open Systems
Interconnection (OSI) standard. The core of this standard is the OSI Reference Model,
a set of seven layers that define the different stages that data must go through to
travel from one device to another over a network. Explain the seven layer
architecture of OSI model with diagram
A Explaining the OSI reference model
Diagram of OSI reference model
3 Consider yourself as the operation head in a telecommunication company. What
are the different types of multiplexing techniques will you implement to get efficient
data transmission process?
11. A Explaining various multiplexing techniques
4 Integrated Services for Digital Network (ISDN) is a set of communication standards
for simultaneous digital transmission of voice, video, data, and other network
services over the traditional circuits of the public switched telephone network. It was
first defined in 1988 in the CCITT red book. Explain the different types of ISDN with
their features and advantages for each one of them.
A Explaining Two different types
Features of both of them
Advantages of both of them
5 ABC company is an internet service provider. The main goal of ABC is to provide 24
X7X365 storage capacity, storage management and internet service to the
customers. It now needs a solution that will eliminate downtime. Downtime is
nothing but the time during which a computer or computer system is down, or
inoperative due to hardware or software failure. We also need the flexibility in quick
response to both the development in customer base and additional capacity and
service demands of the customers.
ABC company took the help of network storage infrastructure software provider to
achieve their goals by providing support for end to end redundancy and bondless
scalability.
12. By creating a scalable storage network with the ability to confidentially deliver the
24X7X365 reliability, and speed that outsourcing customers demand, it has enabled
the ISP/SSP to attract and retain customers and substantially build its business. As
the same time, the solution has effectively lowered ABC company’s total cost of
ownership for its entire storage solution: the IP Stor/CNP union has enabled a
painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT
solution has allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting
network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by ABC company after reading the SLM
b. Listing the benefits
c. Listing the different classes of ISP and their applications
6 Cryptography is the science of hiding information. The traditional security system
employed a different of encryption process known as symmetric cryptography, which
involves the use of te same method for both encryption and decryption. Explain the
different networking algorithms that are used for cryptography along with its
subtypes.
13. A Explaining the two types of cryptography and the networking algorithms used for
them
MI0036- BUSINESS INTELLIGENCE & TOOLS
1 Similarity measures determine the similarity between the two objects. The
similarity between the two objects ti and tj, sim(ti, tj) in the database D is a mapping
from D*D to the range [0, 1]. a. List the characteristics of a good similarity measure.
b. what are the four methods to determine the similarity characteristic between the
two objects?
A a. Listing the characteristics
b. Listing the four methods
a. Four methods to determine the similarity characteristic and their formula
2 Transactions refers to business or commercial transactions. Online transaction
processing refers to the category of systems that assists and manage transaction-
oriented applications, typically for data entry and retrieval transaction processing.
List the differences between OLAP and OLTP
A Listing at least 10 points
14. 3 Data extraction is the act or the process of extracting data out of data sources for
added data processing or data storage or data migration. This data can be extracted
from the web. Explain the different techniques for data extraction
A Listing the various techniques
Explaining the four methods
4 Business Intelligence strategy summarizes the finest combination of procedures
and technologies to meet the business intelligence strategies of an organization
a. List the main aspects of BI strategy.
b. What are the steps to be followed to implement BI framework?
A a. Listing at least 6 main aspects of BI strategy
b. Steps for Implementing BI framework
5 Write short note on
a. Content Management System
b. End User Segmentation
15. c. Basic Reporting and querying
d. OLAP
A a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
6 RSG is a footwear company which has its chain all over the world. This company
has to keep track of all the products sold in the company and huge data is involved in
it.
a. How should it plan to implement the Business intelligence solutions?
b. How to make the best use of BI?
A a. Explaining the planning to implement a BI solutions
b. Explaining best usage of BI
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
16. These are just questions for reference . To check samples see our latest
uploads in blog archive or search assignments .
(Prefer mailing. Call in emergency )