BT0066-Database Management Systems

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

 

Assignment

 

PROGRAM B.Sc IT
SEMESTER FIRST
SUBJECT CODE & NAME BT0066-Database Management Systems
CREDIT 3
BK ID B0950
MAX.MARKS 60

 

Note – Answer all questions. Each question is followed by evaluation scheme.

Q.1 what do you mean by entity and attributes in E-R diagram? Explain the importance of E-R diagram.

Answer: - Entity in E-R diagram:- An entity is something that exists in itself, actually or hypothetically. It need not be of material existence. In particular, abstractions and legal fictions are usually regarded as entities. In general, there is also no presumption that an entity is animate.

Sometimes, the word entity is used in a general sense of a being, whether or not the referent has material existence, e.g., is often referred to as an entity with no corporeal form (non-physical entity), such as a language. It is also often used to refer to ghosts and other spirits.

The word entitative is the adject

 

 

Q.2 Explain the following terms:

  • Relational database schema
  • Entity Integrity
  • Referential Integrity
  • Referential Integrity Constraints

Answer: - Relational database schema:- A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data as a blueprint of how a database is constructed (divided into database tables in case of Relational Databases). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints ensure compatibility between parts of the schema. All

 

Entity Integrity: - In the relational data model, entity integrity is one of the three inherent integrity rules. Entity integrity is an integrity rule which states that every table must have a primary key and that the column or columns chosen to be the primary key should be unique and not NULL.[1]

Within relational databases using SQL,

 

Referential Integrity:- Referential integrity is a property of data which, when satisfied, requires every value of one attribute (column) of a relation (table) to exist as a value of another attribute in a different (or the same) relation (table).

For referential integrity to hold in a relational database, any field in a table that is declared a foreign key can contain either a null value, or only

 

Referential Integrity Constraints:- It refers to the integrity between master and detail table. If the information from the master table is deleted then the corresponding record from the detail table should also get deleted as this information has no meaning without master table.  Referantial integrity deals in parent-child relationship between tables.

 

 

Q.3 What do you mean by indexed sequential file organization? Explain with the help of an example.

Answer: - Indexed sequential file organization:-

  • An indexed file contains records ordered by a record key. Each record contains a field that contains the record key. The record key uniquely identifies the record and determines the sequence in which it is accessed with respect to other records. A record key for a record might be, for example, an employee number or an invoice number.
  • An indexed file can also use alternate indexes, that is, record keys that let you access the file using a different logical arrangement of

Q.4 What is the system catalog in RDBMS? Also explain what information is stored in the system catalog.

Answer:- system catalog in RDBMS: The database catalog of a database instance consists of metadata in which definitions of database objects such as base tables, views (virtual tables), synonyms, value ranges, indexes, users, and user groups are stored.[1][2]

The SQL standard specifies a uniform means to access the catalog, called the INFORMATION_SCHEMA, but not all databases follow this, even if they implement other aspects of the SQL standard. For an example of database-specific metadata access methods, see Oracle metadata. -

What is stored in the catalog — an overview

  • Metadata

 

Q.5 What do you mean by semantics of TRC queries? Give an example of TRC queries.

Answer:- semantics of TRC queries:- Tuple calculus is a calculus that was introduced by Edgar F. Codd as part of the relational model, in order to provide a declarative database-query language for this data model. It formed the inspiration for the database-query languages QUEL and SQL, of which the latter, although far less faithful to the original relational model and calculus, is now the de-facto-standard database-query language; a dialect of SQL is used by nearly every relational-database-management system. Lacroix and Pirotte proposed domain calculus, which is closer to first-order logic and which showed that both of these calculi (as well as

 

Q.6 Explain vertical framentation with the help of an example.

Answer: - Fragmentation:-Fragmentation involves breaking a relation (table) into two or more pieces either horizontally (Horizontal Fragmentation) or vertically (Vertical Fragmentation) or both (Hybrid), mainly to improve the availability of data to the end user and end user programs.

Let us start this section with an example. Consider XYZ bank, which is currently having around 1000 branches all over the country. Assume that it maintains its database at single location, say New Delhi (Head office – Central Site). Now the problem is that, all the requests generated from any part of the country can only be handled at the central site (Ne

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0064-LOGIC DESIGN

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

Assignment

 

PROGRAM B.Sc IT
SEMESTER FIRST
SUBJECT CODE & NAME BT0064-LOGIC DESIGN
CREDIT 4
BK ID B0948
MAX.MARKS 60

 

Note – Answer all questions. Each question is followed by evaluation scheme.

Q.1 Add the following 4-bit binary numbers.

  1. (0110)2 + (0101)2 = (1011)2
  2. (0101)2 + (0101)2= (1010)2

Add the following 8-bit binary numbers

iii. (01001110)2 + (00111100)2 = (10001010)2

  1. (10011101)2 + (10001111)2= (100101100)2

Answer:-  Binary Arithmetic:-The arithmetic operations – addition, subtraction, multiplication and division, performed on the binary numbers is called binary arithmetic . In computer systems, the basic arithmetic operations performed on the binary numbers is -

  • Binary Addition, and
  • Binary Subtraction,

In the following subsections, we discuss the binary

 

Q.2 Draw the symbol for XNOR & X-OR and explain the truth table?

Answer:- - XNOR:- The XNOR gate (sometimes spelled “exnor” or “enor” and rarely written NXOR) is a digital logic gate whose function is the inverse of the exclusive OR (XOR) gate. The two-input version implements logical equality, behaving according to the truth table to the right. A HIGH output (1) results if both of the inputs to the gate are the same. If one but not both inputs are HIGH (1), a LOW output (0) results.

Alternatives:-

 

Q.3 What are adders? Explain half adders and full adders with circuit diagrams.

Answer: Adders:-

In electronics, an adder or summer is a digital circuit that performs addition of numbers. In many computers and other kinds of processors, adders are used not only in the arithmetic logic unit(s), but also in other parts of the processor, where they are used to calculate addresses, table indices, and similar operations.

Although adders can be constructed for many numerical representations, such as binary-coded decimal or excess-3, the most common adders operate on binary

 

Q.4 what is ring counter? Explain it working with the help of diagram.

Answer: - ring counter:- A ring counter is a type of counter composed of a type circular shift register. The output of the last shift register is fed to the input of the first register. The hamming distance of a Johnson counter is 1, the hamming distance of an Overbeck counter is 2.

There are two types of ring counters:

  • A straight ring counter or Overbeck counter connects the output of the last shift register to the first shift register input and circulates a single one (or zero) bit around the ring. For example, in a 4-register one-hot counter, with initial register values of 1000, the repeating pattern is: 1000, 0100, 0010, 0001, 1000… . Note that one of the

Q.5 Explain the concept of resolution in digital and analog multi meters.

Answer: - concept of resolution in digital meters

  1. Accuracy

Accuracy essentially represents the uncertainty of a given measurement because a reading from a digital multimeter (DMM) can differ from the actual input. Accuracy is often expressed as:

(% Reading) + Offset

or

(% Reading) + (% Range)

 

Q.6 What are shift registers? Explain serial in serial out shift register.

Answer: - shift registers:- In digital circuits, a shift register is a cascade of flip flops, sharing the same clock, in which the output of each flip-flop is connected to the “data” input of the next flip-flop in the chain, resulting in a circuit that shifts by one position the “bit array” stored in it, shifting in the data present at its input and shifting out the last bit in the array, at each transition of the clock input.

More generally, a shift register may be multidimensional, such that its “data in” and stage outputs are themselves bit arrays: this is implemented simply by running several shift registers of the same bit-length in parallel.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0065-C Programming and Data Structures

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

 

Assignment

 

PROGRAM B.Sc IT
SEMESTER FIRST
SUBJECT CODE & NAME BT0065-C Programming and Data Structures
CREDIT 3
BK ID B0949
MAX.MARKS 60

 

Note – Answer all questions. Each question is followed by evaluation scheme.

Q.1 Why data types are required in any programming language? Explain in detail the primary data types of C language.

Answer: - Data types are required in any programming language:- a data type or simply type is a classification identifying one of various types of data, such as real, integer or Boolean, that determines the possible values for that type; the operations that can be done on values of that type; the meaning of the data; and the way values of that type can be stored.

Data types are used within type systems, which offer various ways of defining, implementing and using them. Different type systems ensure varying degrees of type safety.

Almost all programming languages explicitly include the notion of data type, though different languages may use different terminology. Common data types

 

Q.2 Explain the structure of the C program.

Answer: - Structure of the C program:- Structure is the collection of variables of different types under a single name for better handling. For example: You want to store the information about person about his/her name, citizenship number and salary. You can create these information separately but, better approach will be collection of these information under single name because all these information are related to person.

 

Structure Definition in C

 

Q.3 i. What is recursion?

  1. Differentiate between recursion and iteration.

iii. Write a program to generate Fibonacci series using recursion.

Answer:- Recursion:-

Recursion is the process of repeating items in a self-similar way. For instance, when the surfaces of two mirrors are exactly parallel with each other, the nested images that occur are a form of infinite recursion. The term has a variety of meanings specific to a variety of disciplines ranging from linguistics to logic.

The most common application of recursion is in mathematics and computer science, in which it refers to a method of defining functions in which the function being defined is applied within its own definition.

 

Q.4 What do you mean by dynamic memory allocation? Explain the three functions for dynamic memory allocation in C language.

Answer: - Dynamic memory allocation:- Dynamic memory allocation is when an executing program requests that the operating system give it a block of main memory. The program then uses this memory for some purpose. Usually the purpose is to add a node to a data structure. In object oriented languages, dynamic memory allocation is used to get the memory for a new object.

The memory comes from above the static part of the data segment. Programs may request memory and may also return previously dynamically allocated memory

 

Q.5 Write C program to implement stack using arrays.

Answer:- C program to implement stack using arrays:-

 

 

 

Q.6 What do you mean by binary tree? Explain the storage representations of binary tree.

Answer: - Binary tree:- a binary tree is a tree data structure in which each node has at most two children, which are referred to as the left child and the right child. A recursive definition using just set theory notions is that a (non-empty) binary tree is a triple (L, S, R), where L and R are binary trees or the empty set and S is a singleton set.[1] Some authors allow the binary tree to be the empty set as well.[2]

From a graph theory perspective, binary (and K-ary) trees as defined here are actually arborescences.[3] A binary tree may thus be also called a bifurcating arborescence[3]—a term which actually appears in some very old programming books,[4] before the

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0062-Fundaments of IT

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

Assignment

PROGRAM B.Sc IT
SEMESTER FIRST
SUBJECT CODE & NAME BT0062-Fundaments of IT
CREDIT 4
BK ID B0946
MAX.MARKS 60

 

Note – Answer all questions. Each question is followed by evaluation scheme.

Q.1 Write a short notes on fourth and fifth generation computers

Answer: - fourth generation computers:- In this generation, there were developments of large-scale integration or LSI (1000 devices per chip) and very large-scale integration or VLSI (10000 devices per chip). These developments enabled the entire processor to fit into a single chip and in fact, for simple systems, the entire computer with processor; main memory and I/O controllers could fit on a single chip.

Core memories now were replaced by semiconductor memories and high-speed vectors dominated the scenario. Names of few such vectors were Cray1, Cray X-MP and Cyber205. A variety of parallel architectures developed too, but they were mostly in the experimental stage.

As far as programming languages are concerned, there were development of high-level languages like FP or functional programming and PROLOG (programming in logic). Declarative programming style was the basis of these languages where a programmer could leave many details to the compiler or runtime system. Alternatively languages like

 

 

  Q.2 Differentiate between primary memory and secondary memory.

-

 Primary memory:-

  • Primary storage, also known as main storage or memory, is the area in a computer in which data is stored for quick access by the computer’s processor. The terms random access memory (RAM) and memory are often as synonyms for primary or main storage. Primary storage is volatile and can be contrasted with non-volatile secondary storage, also known as auxiliary storage. The terms main storage and auxiliary storage originated in the days of the mainframe computer to distinguish the more immediately accessible data storage

 

Q.3 what is cache memory? Explain the importance of cache computer memory.

Answer: - cache memory:- A CPU cache is a cache used by the central processing unit (CPU) of a computer to reduce the average time to access data from the main memory. The cache is a smaller, faster memory which stores copies of the data from frequently used main memory locations. Most CPUs have different independent caches, including instruction and data caches, where the data cache is usually organized as a hierarchy of more cache levels.

Overview:- When the processor needs to read from or write to a location in main memory, it first checks whether a copy of that data is in the cache. If so, the processor immediately reads from or writes to the cache, which is much faster than reading from or writing to main memory.

Most modern desktop and server CPUs have at least

 

Q.4 Write the steps to insert one or more columns and one or more cells in MS Excel.

Answer: - steps to insert one or more columns and one or more cells in MS Excel:-

Step 1:-

Insert Cells into an Excel Worksheet

Having to insert extra cells to an Excel worksheet from time to time is a common practice: data gets forgotten and must be added, space must be made for new data, or existing data gets moved about when the sheet is reorganized.

 

Q.5 What is sound multimedia? Explain common sound file formats?

Answer: - sound multimedia:- Sound is perhaps the most sensuous element of multimedia. It is meaningful “Speech” in any language from a whisper to a scream. It can provide the listening pleasure of music, the startling accent of special effects, or the ambience of a mood-setting background. How you use the power of sound can make the difference between an ordinary multimedia presentation and a professionally spectacular one

Common sound file formats:- An audio file format is a file format for storing digital audio data on a computer system. The bit layout of the audio

 

Q.6 What is Internet? What is the use of it Internet in the modern world.

Answer: - Internet:- The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is an international network of networks that consists of millions of private, public, academic, business, and government packet switched networks, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks for file sharing and

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

PM0011 – PROJECT PLANNING AND SCHEDULING

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

DRIVE SUMMER 2014
PROGRAM MBADS (SEM 3/SEM 5) MBAFLEX/ MBA (SEM 3) PGDPMN (SEM 1)
SUBJECT CODE & NAME PM0011 – PROJECT PLANNING AND SCHEDULING
BK ID B1937
CREDITS 4
MARKS 60

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

Q1. Write short note on:

  • Controlling PMO (Project Management Office )
  • Bottom-up approach for estimating project planning
  • Consequences of project delays
  • Partnering

 

Answer:a) Controlling PMO (Project Management Office )

A controlling PMO focuses on the four controlling services: governance, assessments, reviews, and audits. The primary goals of the controlling PMO are:

  • To ensure that the methodology, standards, processes, and tools are being used correctly
  • To define and direct corrective action to create ongoing improvement in project management

If the PMO then performs

 

 

  1. b) Bottom-up approach for estimating project planning

Bottom-up estimating is a process of estimating individual schedule activities or costs and then aggregating these together to come up with a total estimate for the work package. Every schedule activity is estimated individually and all individual estimates are added together, to come up with a total. The

 

 

  1. c) Consequences of project delays

Exponent performs schedule delay analyses in both contemporaneous and “after-the-fact” situations for clients who need to determine what delayed their project and for how long. Exponent’s Construction Consulting staff has expertise in either preparing or responding to delay analyses addressing the question of what critically extended the project’s completion. Exponent uses industry recognized and

 

 

 

  1. d) Partnering

Partnering provides an important means for communication between the project stakeholders. It provides a means to measure and monitor the satisfaction of the Project requirements; therefore, partnering also plays a key role in the continuous improvement cycle.

 

 

Q2. Explain various stages of project scope management.

(Briefly describe each stage of scope management) 10 ( 2 marks each)

 

Answer: Before a project starts the project manager must make sure the project goals, objectives, scope, risks, issues, budget, timescale and approach have been defined. This must be communicated to all the stakeholders to get their agreement. Any differences of opinion must be resolved before work starts.

Scope management project stages

Inception Stage – Definition Phase:Conduct a preliminary assessment and document a business need or opportunity in the form of a

 

 

Q3.  Write short notes on:

 

  • Scope change
  • Porter model used by organisations to identify investment opportunities
  • Tools for Project Scheduling
  • Operating Feasibility

 

Answer: a) Scope change

 

“Change in scope” easily ranks among the top issues that keep project managers awake at night. At the project’s launch, the scope, schedule and budget are determined. Then, somewhere during the course of the project, someone changes the scope.

 

 

 

 

  1. b) Porter model used by organisations to identify investment opportunities

Michael Porter’s five forces is a model used to explore the environment in which a product or company operates to generate competitive advantage.

 

Porter’s Five forces analysis looks at five key areas mainly the threat of entry, the power of buyers, the power of

 

 

  1. c) Tools for Project Scheduling

Here are some tools and techniques for combining these inputs to develop the schedule:

 

  • Schedule Network Analysis – This is a graphic representation of the project’s activities, the time it takes to complete them, and the sequence in which they must be done. Project management software is typically used to create these analyses – Gantt charts and PERT Charts   are

 

  1. d) Operating Feasibility

 

The feasibility study is an evaluation and analysis of the potential of a proposed project which is based on extensive investigation and research to support the process of decision making.

Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of an existing business or proposed venture, opportunities and threats present in the environment, the resources required to

 

 

Q4. Explain the various tools of project planning.

 

(Briefly mention the role of project planning tools in an organisation, Explain various tools that are used in project Planning) 2, 8( 2 marks for each tool)

 

Answer:Project management in the modern sense began in the early 1950s, driven by businesses that realised the benefits of organising work around projects, and the critical need to communicate and co-ordinate work across departments and professions.

 

Project management is one of the high-responsibility tasks in modern organizations. Project management is used in many types

 

Q5. Explain the meaning of CPM. Mention various steps involved in CPM.

(Write the meaning of CPM, Explain various steps associated with CPM)2, 8( 2 marks for each step)

 

Answer:CPM is Network analysis technique used in complex project plans with a large number of activities. CPM diagrams

(1)all activities,

(2)time required for their completion,

(3)and how each activity is related to the

 

 

 

 

Q6. What do you understand by cost of quality? Elaborate on various types of quality costs associated with a project.

(Write the meaning of cost of quality, Explain various types of quality costs associated with a project, Write a note on Total quality costs) 2, 6, 2

Answer: There are many different definitions of the Cost of Quality available, and many are lacking in scope or precision. Often these definitions have not kept up with the times and don’t account for software costs, supply chain interactions, or more. To remedy these shortcomings, we thought building on one of our favorite definitions (provided by ASQ, an organization we respect and support at LNS

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

SMU BSC IT SOLVED ASSIGNMENTS 2104 -SEM -6th

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

Summer 2014 ] ASSIGNMENT

PROGRAM – BSc IT

SEMESTER – SIXTH

SUBJECT CODE & NAME – BT9302, Human Computer Interface

 

1 List the types of Human computer interface and explain any two.

Answer :

 

2 Briefly explain the accessibility & disability issue and browser customization issue in website designing.

Answer :

 

3 Explain the uses of toolbars and message boxes in designing windows.

Answer :

 

4 Explain Goal-Operation-Methods-Selections (GOMS) user interface design approach. List advantages and disadvantages of it.

Answer :

5 Write a note on joystick and graphic tablet device based controls.

Also explain advantages and disadvantages of both.

Answer :

 

6 What do you mean by direct manipulation? How is it applicable to human computer interface?

Answer :

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

[ Summer 2014 ] ASSIGNMENT

PROGRAM – BSc IT

SEMESTER – SIXTH

SUBJECT CODE & NAME – BT9402, Artificial Intelligence

 

1 Explain the first and second principle of AI.

Answer :

 

2 Explain knowledge representation? Explain with the help of an example.

Answer :

 

3 Explain the Inheritance and Reification in semantic networks.

Answer :

 

4 Briefly explain any five features of expert systems.

Answer :

 

5 Describe the factors affecting learning performance.

Answer :

 

6 Briefly explain the hardware requirements for robots

 

Answer :

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

SMU BSC IT SOLVED ASSIGNMENTS 2104 -SEM -5th

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

Summer 2014, ASSIGNMENT

PROGRAM- BSC IT

SEMESTER- V

SUBJECT CODE & NAME – BT8902, E-COMMERCE

 

1 Explain the modes of operation associated with E – Commerce.

Answer :

 

2 Explain the purpose of Network layer of the OSI model.

Answer :

 

3 Differentiate between direct and indirect metrics.

Answer :

 

4 Explain the architectural components of CRM.

Answer :

 

5 Explain how a WAP transaction works.

Answer :

 

6 What is the purpose of Security and Resolution Centre of eBay?

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

[ Summer 2014 ] ASSIGNMENT

PROGRAM – BSc IT

SEMESTER – FIFTH

SUBJECT CODE & NAME – BT9003, Data Storage management

 

1  State the reasons for data loss.

Answer :

 

2 Describe in brief the different types of attacks.

Answer :

 

3 Briefly explain the requirements of storage I/O.

Answer :

 

4 Briefly explain redundant I/O path elements.

Answer :

 

5 Describe file system hierarchy and parsing the file system.

Answer :

 

6 Explain In-Band Virtualization Appliances.

Answer :

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ML0013-Retail IT Management

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

DRIVE SUMMER 2014
PROGRAM MBADS (SEM 3/SEM5)/ MBAFLEXMBA(SEM3) PGDBAN(SEM1)
SUBJECT CODE & NAME ML0013-Retail IT Management
BK ID B1764
Credit and Max. Marks 4 credits; 60 marks

 

Note – Answer all questions. Each question is followed by evaluation scheme.

Q.1 Explain the factors affecting the use of IT applications in Retail industry.

Answer: - While every retailer may want harness the power of technology and use it to its optimum advantages many factors affect its use. The chief among them are:

The scale and scope of operations

As stated earlier, the size or the scale of operations is the key factor influencing the decision on the type of systems required. In case of a small retailer; the significance is much lower as compared to that for a large chain retailer, who operates at a national or an

 

 

Q.2 Explain the advantages and disadvantages of online retailing.

Answer: - Advantages of Online retailing:-

Online Retailing:-Businesses with an interest in online retailing can go any one of several routes. Some businesses, such as Amazon and Netflix, dispense with the cost and staffing requirements of a brick-and-mortar store and exist only on the Internet. Other companies, such as Barnes & Noble, use their store and their website as two separate sales channels. In addition to conventional retail, online sales also include business-to-business transactions and consumer to consumer sales, such as eBay offers.

Online Advantages

Using the Internet as your primary sales

 

 

Q.3 Explain Porter’s Model of Competitive Forces in detail.

Answer: – Porter five forces analysis is a framework to analyse level of competition within an industry and business strategy development. It draws upon industrial organization (IO) economics to derive five forces that determine the competitive intensity and therefore attractiveness of a market. Attractiveness in this context refers to the overall industry profitability. An “unattractive” industry is one in which the combination of these five forces acts to drive down overall profitability. A very unattractive industry would be one approaching “pure competition”, in

 

Q.4 There is certain threats which disturbs the internet system of working. Explain the threats to information security encountered by businesses.

Answer:- Explanation of security threats:- Pacific time: The Web site for the Motion Pictures Association of America (MPAA) is suffering intermittent outages, and the organization suspects computer vandals are to blame. A source inside the organization, who asked not to be identified, said that the MPAA is currently “experiencing problems with their public Web site, and they suspect a denial-of-service attack.” The attack was first rumored on http://www.hackernews.com/ , a Web site for news on computer hacking.

 

Q.5 “A workflow management system is an automated application that administers and defines an array of functions leading to a result”. Comment

Answer:-Explanation of retail workflow management:-

Purchasing:-Retail store managers often handle purchasing duties for their specific outlets. In larger organizations, purchasing may be centralized, with front-line managers only responsible for reporting inventory levels to the main office. It is more likely in smaller retail businesses, however, that store managers will handle all purchasing activities

 

Q.6 Write short notes on:

  1. a) Barcode Technology
  2. b) Challenges for online retailers

Answer: - a) Barcode Technology

Barcode Technology:- Barcode technology works of off a principle called symbology. Symbology at its basic form is what defines the barcode; it determines the mapping and interpretation of the encoded information or data. This encoding allows the scanning device to know when a digit or character starts and when it stops, similar to a binary representation. We recognize barcodes as an array of parallel lines alternating between white and

 

 

  1. b) Challenges for online retailers

Answer: Challenges for online retailers:-

The continued growth of online shopping is placing further pressure on the capabilities of retailers as they scramble to scale their operations to meet record levels of demand. Many retailers are now offering click-and-collect services in an attempt to reduce fulfilment costs, improve service and offer greater convenience, but the challenge is ensuring they can scale for future growth and deliver a truly joined-up experience between their online and in-store operations, otherwise known as omni-channel retailing.

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

ML0012-Store Operations

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

 

ASSIGNMENT

 

DRIVE SUMMER 2014
PROGRAM MBADS (SEM 3/SEM 5)

MBAFLEX/ MBAN2 (SEM 3)

PGDROMN (SEM 1)

SUBJECT CODE & NAME ML0012-Store Operations
BOOK ID B1763
CREDIT 4
MARKS 60

 

 

1 “Store security relates to the security and safety of store staff and merchandise Kept in the store”. Comment

Answer: Maintain the Content Store

You can find and fix inconsistencies within the content store or between the content store and external namespaces.

You can create content maintenance tasks and run them on demand. You can run content maintenance tasks at a scheduled time or based on a trigger, such as a database refresh or an email Trigger-based Entry Scheduling. You can schedule content maintenance tasks as part of a job Use Jobs to Schedule Multiple Entries, or as part of an agent Agents. You can also view the run history of content maintenance tasks View the Run History for Entries.

Content maintenance tasks can check for inconsistencies within the content store due to missing data or obsolete data or between the content store and external namespaces.

Internal Content Store Maintenance

Missing data within the content store may cause updates to fail. Obsolete data may prevent you from creating new objects. When a content store maintenance task fixes the content store, it adds default values for the missing data, which you can update later. It also permanently deletes any obsolete data. To ensure that you do not lose any data that you wanted to keep, we recommend that you choose the find mode first and check the results before fixing the content store.

When you find and fix the data, the content store is not fixed while the content maintenance task is running. Instead, Content Manager fixes the inconsistencies in the content store the next time it starts up.

Important: After you run a content maintenance task to find and fix the content store, back up your content store before you restart Content Manager.

We recommend that you perform internal maintenance checks regularly, but it is particularly important to do so before you upgrade, to ensure the consistency of the content stores.

Content Store Maintenance on External Namespaces

When you delete users in your authentication provider, the user account information remains in the content store. You can use the IBM® Cognos® Administration to find user information that still exists in the content store and fix the content store by deleting any users that do not exist in your external namespaces. You can also delete individual user profiles from the content stores Managing User Profiles.

If you want to run a content maintenance task on more than one namespace, do one of the following:

If you want to run the content maintenance task now, simply log on to the namespaces and create the content maintenance task.

If you want to schedule a content maintenance task to run in the future or on a recurring basis, keep in mind that a scheduled content maintenance task runs against the namespaces that you select when you create the content maintenance task. Before you schedule a content maintenance task, ensure that your credentials contain logon information for each namespace by renewing the credentials after you log on to every namespace that you select to run the content maintenance task against.

 

2 “Layout for a store must be decided keeping in mind some factors”. Explain

Answer: When planning to put up a business in-store or online business store, one of the things that should be given careful thinking is your store layout. It should be attractive and impressive enough to win customers or buyers. This is done by arranging the goods inside the store or on your webpage or website attractively. The focus of this document will be more a physical store establishment rather than of an online store.

If you have Retail Store, Factory Outlet, or any store establishment you need to think of your inside arrangement which will refers to the display area

 

 

3 What are the different classification of retail merchandise? on the basis of nature on the basis of usability and condition of merchandise

Answer: Classification on basis of Nature of Merchandise:

Merchandise Inventory is the largest asset for most merchandising business. Keeping the right amount of inventory in stock can be challenging. If you have too much inventory, you are spending your cash for items that are not selling. If you do not keep enough inventory in stock and you run out of items, you may lose customers to the competition. It is important for a merchandising business to maintain an inventory system that will help keep the right amount of inventory on hand. With good records, managers can determine what is selling well and what is not. By comparing one period to the next, it will be easier to predict when to order additional items. To make this easier, many

 

  1. “The HRM objectives in a retail organization serve as the standards against which performance is evaluated”. Comment

Answer: Objectives of Human Resource Management can be classified under four major categories.

  • Societal
  • Organizational
  • Functional
  • Personal

 

Societal

 

 

  1. Explain the principles of merchandise handling.

Answer: 1.To examine nonfinancial merchandise planning and management

Developing and instituting a merchandise plan is a key element in a successful retail strategy. Merchandising consists of the activities involved in a retailer’s buying goods and services and making them available for sale.

2.To outline the merchandise buying and handling process

This is an integrated, systematic way of acquiring and processing merchandise. It consists of ten steps:

  • setting up a buying organization;
  • outlining merchandise plans;

 

  1. Write short notes on:

a)Assortment Strategy

Answer: Assortment refers to the number of SKUs within a merchandise category, group or department(depending on the retailers reference).

Assortment planning is the process to determine what and how much should be carried in a merchandise category. Assortment plan is a

 

 

  1. b) Rejection

Answer: Brand managers spend considerable time and resources attempting to understand the factors that influence consumer purchase decisions. The primary objective of such efforts is to increase the perceived value of a product offering and thereby increase brand preference among target consumers. However, while it is important to know the reasons

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

ML0011-Buying and Merchandising

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

ASSIGNMENT

DRIVE SUMMER 2014
PROGRAM MBADS (SEM 3/SEM 5)

MBAFLEX/ MBAN2 (SEM 3)

PGDROMN (SEM 1)

SUBJECT CODE & NAME ML0011-Buying and Merchandising
BOOK ID B1761
CREDIT 4
MARKS 60

 

Note – Answer all questions. Each question is followed by evaluation scheme.

 

Q.1 Explain the components of Merchandise budget plan.

Answer: - Budget plan:-

 Components of Merchandise budget plan: -

  • Review
  • Merchandise planning
  • Range planning
  • Space planning
  • Review

The review process consists of two separate activities. Firstly we carry out a Pre-Season Review of performance history to identify opportunities and problems. Secondly we “normalise” it. Normalisation is the process of looking at history and ironing out the “bumps” to make it useful as a basis for planning.

Merchandise Planning:-

 

Q.2 “Merchandise buying and handling is a vital part of implementing merchandise Plans”. Explain this statement.

Answer: – Merchandising is any practice which contributes to the sale of products to a retail consumer. At a retail in-store level, merchandising refers to the variety of products available for sale and the display of those products in such a way that it stimulates interest and entices customers to make a purchase.

 

In retail commerce, visual display merchandising means merchandise sales using product design, selection, packaging, pricing, and display that stimulates consumers to spend more. This includes disciplines and discounting, physical presentation of products and displays, and the decisions about which products should be presented to which

 

Q.3 Explain the different phases for selection of vendors.

Answer: - The first step towards selecting an Indian vendor is to analyze your business requirements. After the task of searching and selecting a prospective Indian vendor, you must develop a contract negotiation strategy to avoid contract negotiation mistakes. Here are five steps to help you choose the right offshore vendor from India.

  1. Analyze your business requirements

It is important to first analyze your business needs before you even begin to search for a vendor in India. Assemble a vendor selection and evaluation team who would be given the responsibility of finding a suitable vendor from India. Discuss with your

 

Q.4 Explain inventory turnover ratio and its importance.

Answer: - In accounting, the Inventory turnover is a measure of the number of times inventory is sold or used in a time period such as a year. The equation for inventory turnover equals the Cost of goods sold divided by the average inventory. Inventory turnover is also known as inventory turns, stock turn, stock turns, turns, and stock turnover.

 

Q.5 “Price is a highly sensitive and visible part of retail marketing mix and has bearing on the retailer’s overall profitability”. Explain the three pricing strategies in this context.

Answer:- Price is a highly sensitive and visible part of retail marketing mix and has a bearing on the retailer’s overall profitability. Further, pricing itself is an essential part of marketing mix and has its own place in the strategic decision-making process. In subsequent sub-sections, you will learn the various pricing strategies.

Explain the three pricing strategies in this context:- A business can use a variety of pricing strategies when selling a product or service. The Price can be set to maximize profitability for each unit sold or from the market overall. It can be used to defend an existing market from new entrants, to increase market share within a market or to enter a new

 

Q.6 Explain the following terms

(i) Retail Planograms

(ii) Signage

Answer: - Retail Planograms:- Planograms, also known as plano-grams, plan-o-grams, schematics and POGs, are visual representations of a store’s products or services. They are considered a tool for visual merchandising. According to the Oxford Dictionary, “It is a diagram or model that indicates the placement of retail products on shelves in order to maximize

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

Follow

Get every new post delivered to your Inbox.

Join 47 other followers