MCA3040- TECHNICAL WRITING

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

PROGRAM MCA
SEMESTER 3RD
SUBJECT CODE & NAME MCA3040- TECHNICAL WRITING
CREDIT 4
BK ID B0954
MAX.MARKS 60

 

1 What’s Audience Analysis? Explain its significance in Technical Communication

Answer : In few words, audience analysis is to know more about your end-users.

 

Audience Analysis is the task to identify your target audience to make sure that the information provided in the end-user documentation is suitable for satisfying their information requirements.

 

Why should you conduct Audience Analysis?

 

 

 

 

2 Explain the role of a technical editor. Differentiate between Micro and Macro editing.

 

Answer : To understand the role of a technical editor, a person must first understand technical editing. The term, simplified and in the context of technical communication, is the process of reviewing, revising, reorganizing, and many other gerunds that begin with “re.” The goal of editing is to take an author’s work and improve it—for whatever goal that author has. The goals of each author (and of each industry) are different—

 

 

 

3 Explain the various phases involved in System Development Life Cycle (SDLC).

 

Answer : System Study

Preliminary system study is the first stage of system development life cycle. This is a brief investigation of the system under consideration and gives a clear picture of what actually the physical system is? In practice, the initial system study involves the preparation of a System proposal which lists the Problem Definition,

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

MCA3030 – LINUX OS

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3030 – LINUX OS
CREDIT 2
BK ID B1563
MAX. MARKS 30

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

 

  1. List any ten commonly used commands along with their functions in Linux.

Answer: #1: top

I figured it was fitting to put the top command at the top. Although top is actually responsible for listing currently running tasks, it is also the first command Linux users turn to when they need to know what is using their memory (or even how much memory a system has). I often leave the top tool running on my desktop so I can keep track of what is going on at all times. Sometimes, I will even open up a terminal (usually aterm), place the window where I want it, and then hide the border of the window. Without a border, the terminal can’t be

 

 

 

  1. Describe about Run levels. Explain different run levels.

 

Answer: Runlevel is a mode of operation in one of the computer operating systems that implement Unix System V-style initialization. Conventionally, seven runlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonym for one of the levels. Only one runlevel is executed on startup; run levels are not executed one after another, i.e. either the runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order.

 

 

 

 

 

 

  1. 3. Describe the following:

 

  1. a) File encryption

 

Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily decrypted while being used and than encrypted again after we finished using them. Encrypting stored files

 

 

  1. b) Email encryption

 

Answer: Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email encryption may also include authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted). By means of some available tools, persons other than the designated recipients can read the email contents. Email encryption has been used by journalists and regular users to protect privacy.Email encryption can rely on public-key

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

SUMMER  2016,  ASSIGNMENT

 

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM
CREDIT 4
BK ID B1650
MAX. MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions

 

 

  1. Differentiate between Two-Tier client/server databases and Multi-tier client/server databases.

Answer: Two-Tier Architecture:

 

The two-tier is based on Client Server architecture. The two-tier architecture is like client server application. The direct communication takes place between client and server. There is no intermediate between client and server. Because of tight coupling a 2 tiered application will run faster.

 

 

 

 

  1. Explain the physical query plan operators. What is the significance of Iterators?

 

Answer: A plan represents how data flows from a child operator to a parent operator in the form of a tree structure. Query execution flow can be read from right to left and from top to bottom.

In this article we’ll discuss some common and important operators like Index seek/scan, Join (Nested, Merge, and Hash), etc., which are useful to interpret a graphical execution plan and troubleshoot any performance issue due to a

 

 

 

 

  1. Differentiate between Serialisability and Recoverability.

 

Answer: Serializability

 

Serializability is the classical concurrency scheme. This helps to ensures that a schedule with regard to performing executing concurrent transactions is equivalent to one that executes the transactions serially in some order. It assumes that all accesses

 

 

 

 

 

  1. Discuss about Parallel query processing. How parallel-execution works?

Answer: When Oracle runs SQL statements in parallel, multiple processes work together simultaneously to run a single SQL statement. By dividing the work necessary to run a statement among multiple processes, Oracle can run the statement more quickly than if only a single process ran it. This is called parallel execution or parallel processing.

 

Parallel execution dramatically reduces response time for data-intensive operations on large databases typically associated with decision support systems (DSS) and data warehouses. Symmetric multiprocessing (SMP), clustered systems, and

 

 

 

  1. Differentiate between homogeneous and heterogeneous Database.

 

Answer: A DDBMS may be classified as homogeneous or heterogeneous. In a homogeneous system, all sites use the same DBMS product. In a heterogeneous system, sites may run different DBMS products, which need not be based on the same underlying data model, and so the system may be composed of relational, network, hierarchical and object-oriented DBMSs.

 

 

 

Homogeneous systems are much easier to design and

 

 

 

 

 

  1. Write short notes on ODMG standards. What are the various components of ODMG-93?

 

Answer: The ODMG standard builds upon the existing OMG, SQL-92, INCITS (formerly ANSI) programming language standards, and JavaSoft’s Java specification to define a framework for application portability between compliant data storage products. The standard’s functional components include an Object Model, an Object Definition Language, an Object Query Language, and Language Bindings to Java, C++, and Smalltalk.

 

The two primary benefits of the ODMG

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA3010 –Financial Management and Accounting

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

SUMMER 2016 , ASSIGNMENT

Masters in Computer Application (MCA) – Semester 3

 

MCA3010 –Financial Management and Accounting

 

4 Credits (Book ID: B1624)

(60 Marks)

 

Answer All the Questions. Each question carries equal marks. (6 x 10 = 60)

 

  1. Explain the process involved in accounting. What are the objectives of accounting?

Answer :As implied earlier, today’s electronic accounting systems tend to obscure the traditional forms of the accounting cycle. Nevertheless, the same basic process that bookkeepers and accountants used to perform by hand are present in today’s accounting software.

 

ACCOUNTING CYCLE :

 

An accounting cycle is a complete sequence

 

 

  1. Briefly explain the role of management accounting. Also describe the functions of management accounting.

Answer : Management accounting is an internal business function that includes the recording and reporting of a company’s financial transactions. The accounting department also supports management in different business operations, providing analysis and support for different decisions and investments.

Financial Reporting

Management accountants work at the

 

 

 

 

  1. What is fund flow analysis? What are the objectives of analysing flow of fund?

Answer : Funds flow statement is an important financial tool, which analyze the changes in financial position of a firm showing the sources and applications of its funds. It provides useful information about the firm’s operating, financing and investing activities during a particular period. The following points highlight the importance of funds flow statement.

 

  1. Funds flow statement helps in identifying the change in level of current assets investment and current liabilities financing.

 

 

  1. What is cash flow statement and how is the cash flow statement subdivided?

 

Answer : Complementing the balance sheet and income statement, the cash flowstatement (CFS), a mandatory part of a company’s financial reports since1987, records the amounts of cash and cash equivalents entering andleaving a company. The CFS allows investors to understand how acompany’s operations are running, where its money is coming from, andhow it is being spent. Here you will learn how the CFS is structured andhow to use it as

 

 

 

  1. What are the merits of budgets?

 

Answer : Define goals and objectives

Align corporate goals with regards to markets, sales levels, margins, manning, cost levels and capital investment with your budgets.

Think about and plan for the future.

Compels management to think about the future. Management should look ahead and set out plans for each business unit, anticipating change

 

 

  1. Describe the essential features of budgetary control.

 

Answer : There are two types of control, namely budgetary and financial. This chapter concentrates on budgetary control only. This is because financial control was covered in detail in chapters one and two. Budgetary control is defined by the Institute of Cost and Management Accountants (CIMA) as:

 

“The establishment of budgets relating the

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA4020- PROBABILITY AND STATISTICS

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

 

PROGRAM MCA
SEMESTER FOURTH
SUBJECT CODE & NAME MCA4020- PROBABILITY AND STATISTICS
BK ID B1779
CREDIT & MARKS 4 CREDITS & 60 MARKS

 

 

1 Three machines A, B and C produce respectively 60%, 30% and 10% of the total number of items of a factory. The percentage of defective output of these machines are respectively 2%, 3% and 4%. An item is selected at random and is found to be defective. Find the probability that the item was produced by machine C.

 

Answer: Multiply the respective percentage of production by the percentage of defects for each machine

 

A = 60% * 2% = 1.2% of the factory’s total output are defects produced by Machine A

B = 30% * 3% = 0.9% of the factory’s total output are defects produced by Machine B

C = 10% * 4% = 0.4% of the factory’s total output are defects produced by Machine C

 

Therefore the total defects = 1.2% + 0.9% + 0.4% = 2.5%

 

 

 

 

 

2 Find the constant k so that

 

F(x,y) = {k(x+1)e-y, 0<x<1,y>0

                0 elsewhere

Is a joint probability density function. Are X and Y independent?

 

Answer: Probability density function:- In probability theory and statistics, given two jointly distributed random variables X and Y, the conditional probability distribution of Y given X is the probability distribution of Y when X is known to be a particular value; in some cases the conditional probabilities may be expressed as functions containing the unspecified value x of X as a parameter. In case that both “X” and “Y” are categorical variables, a conditional probability table is typically used to represent the conditional probability. The conditional distribution

 

 

 

3 The data shows the distribution of weight of students of 1st standard of a school. Find the quartiles.

 

 

Class Interval 13-18 18-20 20-21 21-22 22-23 23-25 25-30
Frequency 22 27 51 42 32 16 10

 

Answer: If a data set of scores is arranged in ascending order of magnitude, then:

The median is the middle value of the data set.

 

The lower quartile (Q1) is the median of the lower half of the data set.

 

The upper quartile (Q3) is the median of the upper

 

 

 

4 Fit a trend line to the following data by the freehand method:

 

 

 

Year Production of wheat(in tonnes) Year Production of wheat(in tonnes)
1995 20 2000 25
1996 22 2001 23
1997 24 2002 26
1998 21 2003 25
1999 23 2004 24

 

Answer: Methods of Freehands: It is familiar concept, briefly described for drawing frequency curves. In case of a time series a scatter diagram of the given observations is plotted against time on the horizontal axis and a freehand smooth curve is drawn through the plotted points. The curve is so drawn that most of the points concentrate around the curve, however, smoothness should not be scarified in trying to let the points exactly fall on the curve. It would be better to draw a straight line through the plotted points instead of a curve, if possible. The curve fitted by

 

 

 

 

5 Let X be a random variable and its probability mass function is

P(x=r) = qr-1p,r=1,2,3…

Find the m.g.f. of X and hence it’s mean and variance.

 

Answer: Standard Deviation:-The Standard Deviation is a measure of how spread out numbers are.

Its symbol is σ (the greek letter sigma)

The formula is easy: it is the square root of the Variance. So now you ask, “What is the Variance?”

 

Variance

 

 

 

6 The diastolic blood pressures of men are distributed as shown in table. Find the standard deviation and variance.

Pressure 78-80 80-82 82-84 84-86 86-88 88-90
No. of Men 3 15 26 23 9 4

 

Answer: Given values are:

Pressure 78-80 80-82 82-84 84-86 86-88 88-90
No. of Men 3 15 26 23 9 4

 

Difference = 2

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA4010- MICROPROCESSOR

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER FOURTH
SUBJECT CODE & NAME MCA4010- MICROPROCESSOR
CREDITS 4
BK ID B1778
MAX. MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

  1. 1. Write short notes on:

 

  1. a) Central Processing Unit

 

Answer:The central processing unit (CPU) of a computer is a piece of hardware that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system. The

 

 

  1. b) Memory Unit

 

Answer:In computing, memory refers to the computer hardware devices used to store information for immediate use in a computer; it is synonymous with the term “primary storage”. Computer memory operates at a high speed, for example random-access memory (RAM), as a distinction from storage that provides slow-to-access program and data storage but offers higher capacities. If needed, contents of the computer memory can be transferred to secondary storage, through a memory management technique called “virtual

 

 

Most semiconductor memory is organized into memory cells or bistable flip-flops, each storing one bit (0 or 1). Flash memory organization includes both one bit per memory cell and multiple bits per cell (called MLC,

 

 

 

 

  1. 2. Write short notes on:

 

  1. a) Bus Interface Unit (BIU)

 

Answer:In computer architecture, a bus (related to the Latin “omnibus”, meaning “for all”) is a communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.) and software, including

 

  1. b) Execution Unit (EU)

 

Answer:In computer engineering, an execution unit (also called a functional unit) is a part of the central processing unit (CPU) that performs the operations and calculations as instructed by the computer program. It may have its own internal control sequence unit, which is not to be confused with the CPU’s main control unit, some registers, and other internal units such as a sub–arithmetic logic unit (sub-ALU) or a floating point unit (FPU), or some smaller and more specific components.  It is common for modern

 

 

 

 

  1. 3. Write short notes on:

 

  1. a) REP Prefix

 

Answer:If the direction flag is clear, the CPU increments ESI and EDI after operating upon each string element. For example, if the direction flag is clear, then executing MOVS will move the byte, word, or double word at ESI to EDI and will increment ESI and EDI by one, two, or four. When specifying the REP prefix before this instruction, the CPU increments ESI and EDI for each element in the string. At completion, the ESI and EDI registers will be pointing at the first item beyond the strings.

 

 

 

  1. b) Table Translation

 

Answer:A translation lookaside buffer (TLB) is a cache that memory management hardware uses to improve virtual address translation speed. The majority of desktop, laptop, and server processors includes one or more TLBs in the memory management hardware, and it is nearly always present in any hardware that utilizes paged or segmented virtual memory.

 

The TLB is sometimes implemented as content-addressable memory (CAM). The CAM search key is the virtual address and the search

 

 

 

 

 

  1. 4. Describe about Key-code Data Formats and FIFO Status Word formats.

 

Answer:Key Code Qualifier is an error-code returned by a SCSI device.

 

When a SCSI target device returns a check condition in response to a command, the initiator usually then issues a SCSI Request Sense command. This process is part of a SCSI protocol called Contingent Allegiance Condition. The target will respond to the Request Sense command with a set of SCSI sense data which includes three fields giving increasing levels of detail about the error:

 

K – sense key – 4 bits, (byte 2 of Fixed sense

 

 

  1. 5. Write a note on

 

(a) RS 232 standard

 

Answer:In telecommunications, RS-232 is a standard for serial communication transmission of data. It formally defines the signals connecting between a DTE (data terminal equipment) such as a computer terminal, and a DCE (data circuit-terminating equipment, originally defined as data communication equipment), such as a modem. The RS-232 standard is commonly used in computer serial ports. The standard defines the electrical characteristics and timing of signals, the meaning of signals, and the physical size

 

 

 

(b) IEEE 488 standard

 

Answer:IEEE-488 is a short-range digital communications 8-bit parallel multi-master interface bus specification. It was created in the late 1960s for use with automated test equipment and is still in use for that purpose. IEEE-488 was created as HP-IB (Hewlett-Packard Interface Bus) and is commonly called GPIB (General Purpose Interface Bus). It has been the subject of several standards.

 

IEEE-488 specifies a 24-pin Amphenol

 

 

 

 

 

  1. 6. Write short note on:

 

  1. a) Parallel Printer Interface (LPT)

 

Answer:Short for Line Printer Terminal, LPT is used by IBM compatible computers as an identification for the parallel port such as LPT1, LPT2, or LPT3. This is commonly required when installing a printer on an IBM compatible computer. The majority of all computers utilize LPT1 and do not have an option for another LPT port unless additional ports are added to the computer.

 

 

 

 

 

  1. b) Universal Serial Bus (USB)

 

Answer:USB, short for Universal Serial Bus, is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices. It is currently developed by the USB Implementers Forum.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA4040- ANALYSIS AND DESIGN OF ALGORITHM

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

[ SUMMER 2015 ] ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER 4
SUBJECT CODE & NAME MCA4040- ANALYSIS AND DESIGN OF ALGORITHM
CREDIT 4
BK ID B1480
MARKS 60

 

 

Answer all questions

  1. 1. Write the steps involved in analyzing the efficiency of non-recursive algorithms.

 

Answer:The study of algorithms is called algorithmics. It is more than a branch of computer science. It is the core of computer science and is said to be relevant to most of science, business and technology. An algorithm is a sequence of unambiguous instructions for solving a problem, i.e., for obtaining a required output for any legitimate input in finite amount of time.

 

The three algorithms used to find the gcd of two numbers are

 

  • Euclid’s algorithm
  • Consecutive integer

 

 

 

 

  1. 2. Define selection sort and explain how to implement the selection sort?

 

Answer:In computer science, selection sort is a sorting algorithm, specifically an in-place comparison sort. It has O(n2) time complexity, making it inefficient on large lists, and generally performs worse than the similar insertion sort. Selection sort is noted for its simplicity, and it has performance advantages over more complicated algorithms in certain situations, particularly where auxiliary memory is limited.

 

The algorithm divides the input list into two parts: the sublist of items already sorted, which is built up from left to right at the front (left) of the list, and

 

 

 

 

 

 

 

  1. 3. Define Topological sort. And explain with example.

 

Answer:In computer science, a topological sort (sometimes abbreviated topsort or toposort) or topological ordering of a directed graph is a linear ordering of its vertices such that for every directed edge uv from vertex u to vertex v, u comes before v in the ordering. For instance, the vertices of the graph may represent tasks to be performed, and the edges may represent constraints that one task must be performed before another; in this application, a topological ordering is just a valid sequence for the tasks. A topological ordering is possible if and only if the graph has no directed cycles, that is, if it is a directed acyclic

 

 

 

 

  1. 4. Explain good-suffix and bad-character shift in Boyer-Moore algorithm.

 

Answer:In computer science, the Boyer–Moore string search algorithm is an efficient string searching algorithm that is the standard benchmark for practical string search literature. It was developed by Robert S. Boyer and J Strother Moore in 1977. The algorithm preprocesses the string being searched for (the pattern), but not the string being searched in (the text). It is thus well-suited for applications in which the pattern is much shorter than the text or where it persists across multiple searches. The Boyer-Moore algorithm uses information gathered during the preprocess step to skip sections of the text, resulting in a lower constant factor than many other string algorithms. In general, the algorithm runs faster

 

 

 

 

  1. 5. Solve the Knapsack problem using memory functions.

Item 1 2 3 4

Weight 2 6 4 8

Value (in Rs.) 12 16 30 40

Knapsack capacity is given as W=12. Analyze the Knapsack problem using memory functions with the help of the values given above.

 

Answer:The classical Knapsack Problem (KP) can be described as follows. We are given a set N={1,…,n} of items, each of them with positive profit pj and positive weight wj, and a knapsack capacity c. The problem asks for a subset of items whose total weight does not exceed the knapsack capacity, and whose profit is a maximum. It can be formulated as the following Integer Linear Program (ILP):

(KP)max∑j∈Npjxj(1)

 

 

 

 

  1. 6. Describe Variable Length Encoding and Huffman Encoding.

 

Answer:Variable Length Encoding:In coding theory a variable-length code is a code which maps source symbols to a variable number of bits.Variable-length codes can allow sources to be compressed and decompressed with zero error (lossless data compression) and still be read back symbol by symbol. With the right coding strategy an independent and identically-distributed source may be compressed almost arbitrarily close to its entropy. This is in contrast to fixed length coding methods, for which data compression is only possible for large blocks of data, and any compression beyond the logarithm of the total number of possibilities comes with a finite (though perhaps arbitrarily small) probability of failure.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA 4030 – PROGRAMMING IN JAVA

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

 

FALL 2016, ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER 1
SUBJECT CODE & NAME MCA 4030 – PROGRAMMING IN JAVA
CREDIT 4
BK ID B1477
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

1 Describe the following:

 

  1. a) Multi-threading.

Answer : Multithreading in java is a process of executing multiple threads simultaneously.

 

Thread is basically a lightweight sub-process, a smallest unit of processing. Multiprocessing and multithreading, both are used to achieve multitasking.

 

But we use multithreading than multiprocessing because threads share a common memory area. They don’t allocate

 

 

  1. b) Significance of Java Bytecode

 

Answer : Java is build on WODA (Write Once Deploy Anywhere) principle. This means you don’t have to tweak a Java source code if you want to deploy it in another OS. But at the end of the day, java programs need a JVM to run on and JVM being machine language specific cannot be platform-neutral. So, we

 

 

2 Differentiate Break and Continue statements in Java with example program.

 

Answer : A break statement when applied to a loop ends the statement. A continue statement ends the iteration of the current loop and returns the control to the loop statement. If the break keyword is followed by an identifier that is the label of a random enclosing statement, execution transfers out of that enclosing statement. If the continue keyword is followed by an identifier that is the label of an enclosing loop, execution skips to the end of that loop instead.

 

break: breaks the current loop and moves the cursor to next line after the loop

e.g.

 

 

 

3 Differentiate between packages and Interfaces.

 

Answer : Packages

Definition:  A package is a grouping of related types providing access protection and name space management. Note that types refers to classes, interfaces, enumerations, and annotation types. Enumerations and annotation types are special kinds of classes and interfaces, respectively, so types are often referred to in this lesson simply as classes and interfaces.

 

Creating a Package:

 

 

 

4 What are Applets? What are the restrictions of Applets? Describe about applet class.

 

Answer : What is an Applet in Java ?

An Applet is a small java program that runs in a Java enabled web browser. Java Applet is a small piece of java code that is embedded into HTML page, which gets executed when the HTML page loads into the browser.Applets provide powerful client-side functionality. As applets are loaded from remote machines and executed on client-side, there are various security restrictions on applets. –

 

Applets Restrictions

Applets have many restrictions over the

 

 

 

5 Compare JDBC and ODBC

 

Answer : Typically, software applications are written in a specific programming language (such as Java, C#, etc.), while databases accept queries in some other database specific language (such as SQL). Therefore, when a software application needs to access data in a database, an interface that can translate languages to each other (application and database) is required. Otherwise, application programmers need to learn and

 

 

 

6 Describe about Java Beans and BeanBox.

 

Answer : A Java Bean is a reusable software component that can be manipulated visually in an application builder tool.  The idea is that one can start with a collection of such components, and quickly wire them together to form complex programs without actually writing any new code.

Software components must, in general, adopt standard techniques for interacting with the rest of the world.  For example, all GUI components inherit the java.awt.Component class, which means that one can rely on them to have certain standard methods like paint(), setSize(), etc.  Java Beans are not actually required to inherit a

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MK0013-Marketing Research

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

DRIVE SUMMER  2016
PROGRAM MBADS (SEM 3/SEM 5),MBAFLEX/ MBA (SEM 3)
SUBJECT CODE & NAME MK0013-Marketing Research
BK ID B 1711
CREDIT & MARKS 4 Credits, 60 marks

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

Question.1. What do you mean by research? State some of its characteristics.

 

Answer:Research comprises “creative work undertaken on a systematic basis in order to increase the stock of knowledge, including knowledge of humans, culture and society, and the use of this stock of knowledge to devise new applications.” It is used to establish or confirm facts, reaffirm the results of previous work, solve new or existing problems, support theorems, or develop new theories. A research project may also be an expansion on past work in the field. To test the validity of instruments, procedures, or experiments, research may

 

 

 

 

Question. 2.Why you must plan before you start researching on a topic?

 

Answer:A dissertation is a particular kind of academic task. You will usually be asked to generate a topic for yourself; to plan and execute a project investigating that topic; and to write-up what you did and what your findings were. Important stages in the dissertation process include:

 

  • Choosing a topic;
  • Developing a research question;
  • Effective planning of the research;
  • Being organised and methodical while conducting

 

 

Question. 3.Write short notes on:

 

  1. a) Exploratory research design

 

Answer:Exploratory research is research conducted for a problem that has not been clearly defined. It often occurs before we know enough to make conceptual distinctions or posit an explanatory relationship. Exploratory research helps determine the best research design, data collection method and selection of subjects. It should draw definitive conclusions only with extreme caution. Given its fundamental nature, exploratory research often concludes that a perceived problem does not actually exist.

 

 

 

 

  1. b) Conclusive research design

 

Answer:Conclusive research design, as the name implies, is applied to generate findings that are practically useful in reaching conclusions or decision-making. Conclusive research design usually involves the application of quantitative methods of data collection and data analysis. Moreover, conclusive studies tend to be deductive in nature and research objectives in these types of studies are achieved via testing hypotheses.

 

 

 

Question.4.Define the term ‘sampling’ and explain the importance of sampling in marketing research.

 

Answer:Brooke is a psychologist who is interested in studying how much stress college students face during finals. She works at a university, so she is planning to send out a survey around finals time and ask some students to rank on a scale of 1 to 5 how stressed out they are.

 

But which students should she survey? All of the students at the university?Only the students in the psychology department?Only freshmen? There are a

 

 

 

 

Question.5. Analyse the steps involved in hypothesis testing.

 

 

Answer:A hypothesis test is a statistical test that is used to determine whether there is enough evidence in a sample of data to infer that a certain condition is true for the entire population.

 

A hypothesis test examines two opposing hypotheses about a population: the null hypothesis and the alternative hypothesis. The null hypothesis is the

 

 

 

 

Question.6.What are the characteristics of a report?

 

Answer:When you write a business report, focus on the subject at hand. Information included in the document should be accurate, relevant and informative to its readers. When reading a report to gain a deeper understanding of an issue, a businessperson shouldn’t have to sift through paragraphs of filler content. A good report speaks to the reader in terms she can understand.

 

Clearly Defined Purpose: The purpose of a report should be clear to the reader from the beginning. The purpose should be stated in the title of the report if possible and included in the introduction. Identify whether the intent is to persuade the reader to do

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MK0012 –Retail Marketing

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

 

ASSIGNMENT

 

 

DRIVE SPRING 2016
PROGRAM Master of Business Administration- MBA
SEMESTER Semester 3
SUBJECT CODE & NAME MK0012 –Retail Marketing
BK ID B1723
CREDIT & MARKS 4 Credits, 60 marks

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

Question. 1. How Retail formats can be classified? Elucidate your answer with example.

 

Answer:Retailers are the last link in the distribution channel and they perform various important functions, which are as follows:

 

(a)  Uninterrupted Supply – A retailer ensures continuous supply of products to consumers. He purchase goods in large quantity, breaks the bulk and sell in small segments to final users.

(b)  Large Variety – Retailers buy merchandise from different sources and provide a wide variety to consumers.

(c)  Financing – Some retailers provide credit facility to consumers.

(d)  Transportation – Retailers carry goods from

 

 

 

 

 

Question. 2. Define target marketing & what can be different types of target markets for retailers?

 

Answer:A target market is a group of customers a business has decided to aim its marketing efforts and ultimately its merchandise towards. A well-defined target market is the first element of a marketing strategy. Product, price, promotion, and place are the four elements of a marketing mix strategy that determine the success of a product or

 

 

 

 

 

Question. 3. Briefly discuss different types of retail store locations? What are their advantages & disadvantages?

 

Answer:A multiple shop system is a network of branch shops, situated at different localities in the city or in different parts of the country, under a centralised management and dealing in similar lines of goods. Such multiple shops are very common and popular in the West and are known as CHAIN STORES. According to J.L. Fri, “Chain stores are a group of stores handling similar lines of merchandise with single ownership and centralised location.”

 

The Federal Trade Commission defines a chain store as “an organisation owing a controlling interest in two or more establishments which sell

 

 

 

Question. 4. Explain the concept of merchandise management?

 

Answer: In the fierce competition of retail, it is very crucial to attract new customers and to keep the existing customers happy by offering them excellent service. Merchandising helps in achieving far more than just sales can achieve.

 

Merchandising is critical for a retail business. The retail managers must employ their skills and tools to streamline the merchandising process as smooth as possible.

 

What is Merchandising?

 

 

 

 

Question. 5. Describe Integrated Marketing Communication (IMC).Discuss the reasons for implementing IMC.

 

Answer:Integrated Marketing Communications (IMC) is an expansion of modern and traditional marketing strategies, to optimise the communication of a consistent message conveying the company’s brands to stakeholders. Coupling various methods together is added value in creating successful communication as it harnesses the individual benefits of each channel, which when combined together builds a clearer and vaster impact than if used individually. Achieving synergy and clarity amongst the elements is then able to

 

 

 

 

Question. 6. Write short notes on:

 

  1. a) Market entry method

 

Answer:A market entry strategy is the planned method of delivering goods or services to a new target market and distributing them there. When importing or exporting services, it refers to establishing and managing contracts in a foreign country.

 

Many companies successfully operate

 

 

 

  1. b) E-tailing

 

Answer:E-tailing began to work for some major corporations and smaller entrepreneurs as early as 1997 when Dell Computer reported multimillion dollar orders taken at its Web site. The success of Amazon.com hastened the arrival of Barnes and Noble’s e-tail site. Concerns about secure order-taking receded. 1997 was also the year in which Auto-by-Tel reported that they had sold their millionth car over the Web, and CommerceNet/Nielsen Media reported that 10 million people had made purchases on the Web. Jupiter research predicted that e-tailing would grow to $37 billion by 2002.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601