BT0078, Website Design

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

ASSIGNMENT

 

PROGRAM BSc IT
SEMESTER THIRD
SUBJECT CODE & NAME BT0078, Website Design
CREDIT 2
BK ID B1005
MAX. MARKS 30

 

 

 

  1. Draw and explain the diagram of website development life cycle.

 

Answer: Just like the field of software development, the website development process can be separated into different life-cycle phases. The purpose of a development life-cycle is help align the developers with tasks that need to be done at certain stages, and to work to a set of standards and procedures to help ensure that maximum quality can be achieved. This article looks into each phase of the development life-cycle, however it should be noted that some of these phases can be rearranged to better suit a project, and by no means is this a strict framework that must be followed at all times.

 

The following life-cycle is

 

 

 

  1. 2. Describe the following in context of validating XML documentswith DTDs

 

  1. Concept of data validation

 

Answer: A valid document includes a document type declaration that identifies the DTD the document satisfies. The DTD lists all the elements, attributes, and entities the document uses and the contexts in which it uses them. The DTD may list items the document does not use as well. Validity operates on the principle that everything not permitted is forbidden. Everything in the document must match a declaration in the DTD. If a document has a document type declaration and the document satisfies the DTD that the document type declaration indicates, then the document is said to be valid. If it does not, it is said to be invalid.

 

 

 

  1. Writing document type definition (DTD) files:

 

Answer : While XML is extremely flexible, not all the programs that read particular XML documents are so flexible. Many programs can work with only some XML applications but not others. For example, Adobe Illustrator 10 can read and write Scalable Vector Graphics (SVG) files, but you wouldn’t expect it to understand a Platform for Privacy Preferences (P3P) document. And within a particular XML application, it’s often

 

 

  1. Internal and external DTDs:

 

Answer : When you’re first developing a DTD, it’s often useful to keep the DTD and the canonical example document in the same file so you can modify and check them simultaneously. Therefore, the document type declaration may actually contain the DTD between square brackets rather than referencing it at an external URI. Example 3-4 demonstrates. Some document type declarations contain some declarations directly but link in others using a SYSTEM or PUBLIC identifier. The part of the DTD between the brackets is called the

 

 

  1. Validating parsers:

 

Answer : The declarations in the internal subset form part of the DOCTYPE in the document itself. The declarations in the external subset are located in a separate text file. The external subset may be referenced via a public identifier and/or a system identifier. Programs for reading documents may not be required to read the external subset.Note that any valid SGML or XML document that references an external subset in its DTD, or whose body contains references to parsed external entities declared in its DTD (including

 

 

 

  1. The NMTOKEN and NMTOKENS Type:

Answer : The effective value of the attribute can only be a valid name token (or a spaced-separated list of such name tokens), but it is not restricted to a unique identifier within the document; this name may carry supplementary and application-dependent semantics and may require additional naming constraints, but this is out

 

 

 

  1. 3. Define XSL-FO.

Explain the following:

 

  1. Purpose of XSL Formatting Objects (XSL-FO)

 

Answer: Purpose of XSL Formatting Objects (XSL-FO):

 

Answer : XSL Formatting Objects, or XSL-FO, is a markup language for XML document formatting which is most often used to generate PDFs. XSL-FO is part of XSL (Extensible Stylesheet Language), a set of W3C technologies designed for the transformation and formatting of XML data. The other parts of XSL are XSLT and XPath. Version 1.1 of XSL-FO was published in 2006.  XSL-FO was discontinued: the last update for the Working Draft was in January 2012, and its Working Group closed in November 2013.

XSL Formatting Objects (XSL-FO) are the second half of the Extensible Stylesheet Language (XSL). XSL-FO is an XML application that describes how pages will look when presented to a reader. A style sheet uses the XSL

 

 

 

  1. XSL-FO Documents and XSL-FO Processors:

 

Answer : XML was designed as a portable means to exchange data between different applications; data presentation is often left to the applications themselves. An XML document typically describes data in an orderly manner, with indentation being the only formatting. In this section I take a look at the use of XSL-FO as a specialized XML

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

BT0077, Multimedia Systems

 

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

ASSIGNMENT

PROGRAM BSc IT
SEMESTER THIRD
SUBJECT CODE & NAME BT0077, Multimedia Systems
CREDIT 2
BK ID B1004
MAX. MARKS 30

 

 

 

  1. 1 Explain the following color models

 

  1. HSB model

Answer: Based on the human perception of color, the HSB model describes three fundamental characteristics of color:

  • Hue is the color reflected from or transmitted through an object. It is measured as a location on the standard color wheel, expressed as a degree between 0 and 360. In common use, hue is identified by the name of the color such as red, orange, or green.
  • Saturation, sometimes called chroma, is the strength or purity of the color. Saturation

 

  1. RGB model

Answer : RGB and its subset CMY form the most basic and well-known color model. This model bears closest

 

  1. CMYK model

Answer : Cyan, magenta, and yellow correspond roughly to the primary colors in art production: red, blue,

 

 

  1. L*a*b model

Answer : The L*a*b color model is based on the model proposed by the Commission Internationaled’Eclairage (CIE

 

 

  1. Describe in brief the following

 

  1. Calligraphy

 

ANSWER : Calligraphy is a visual art related to writing. It is the design and execution of lettering with a broad tip instrument or brush (as opposed to built up lettering, in which the letters are drawn). A contemporary calligraphic practice can be defined as, “the art of giving form to signs in an expressive, harmonious, and skillful manner”.

Modern calligraphy ranges from functional inscriptions and designs to fine-art pieces where the letters may or may not be legible. Classical calligraphy differs from typography and non-classical hand-lettering, though a

 

 

 

  1. Text in multimedia application

 

Answer : text is an important component used in many multimedia applications.they are characters that are used to create words, sentences and paragraphs. text alone provide just one source of information. yet, text is good at providing basic information. it is the simplest, and often the most effective way to get one’s

 

 

 

  1. 3. Describe the following file formats:

 

  1. Photoshop Format

 

Answer::Adobe Photoshop is a raster graphics editor developed and published by Adobe Systems for Windows and OS X.  Photoshop was created in 1988 by Thomas and John Knoll. Since then, it has become the de facto industry standard in raster graphics editing, such that the terms “photoshopping” and “photoshop contest” were born. It can edit and compose raster images in multiple layers and supports

 

 

 

 

 

 

 

 

2) Photoshop EPS:

 

Answer : The EPS file type is primarily associated with ‘Encapsulated PostScript’. There are two distinct types of .EPs files, one of which is a vector based graphics file and can be opened and easily edited for type, color, etc. in Adobe Illustrator or PC vector based programs like Corel Draw. They can be CMYK color, or flat pantone color based. These files could be “placed’ or “imported” into Pagemaker (or Word, Quark, etc.), but not opened by it. They can be almost infinitely scaled in size without degrading the output

 

 

 

3) EPS TIFF or EPS PICT Preview:

 

Answer : Encapsulated PostScript (EPS) language file format can contain both vector and bitmap graphics and is supported by virtually all graphics, illustration, and page-layout programs. EPS format is used to transfer PostScript artwork between applications. When you open an EPS file containing vector graphics, Photoshop rasterizes the image, converting the vector graphics to pixels.

EPS format supports Lab, CMYK, RGB, Indexed Color, Duotone, Grayscale, and Bitmap color modes, and does not support alpha channels. EPS does support clipping paths. Desktop Color Separations (DCS)

 

 

 

4) PCX:

 

Answer : PCX, standing for Personal Computer Exchange, is an image file format developed by the now-defunct ZSoft Corporation of Marietta, Georgia. It was the native file format for PC Paintbrush and became one of the first widely accepted DOS imaging standards, although it has since been succeeded by more sophisticated image formats, such as BMP, JPEG, and PNG. PCX files commonly stored palette-indexed images ranging from 2 or 4 colors to 16 and 256 colors, although the format has been extended to

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

BT0076, TCP/IP

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

 

ASSIGNMENT

 

PROGRAM BSc IT
SEMESTER 3
SUBJECT CODE & NAME BT0076, TCP/IP
CREDIT 4
BK ID B0965
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

1 Define frame relay. Describe its format with diagram.

Answer: Frame relay is a packet-switching technology that provides dynamic bandwidth assignments. Frame relay systems are a simple bearer (transport only) technology and do not offer advanced error protection or retransmission. Frame relay were developed in the 1980s as a result of improved digital network transmission quality that reduced the need for error protection. Frame relay systems offer dynamic data transmission rates through the use of varying frame sizes.

 

This figure shows a frame relay system. This diagram shows a local area network (LAN) in San Francisco is connected to a LAN in New York. A virtual path

 

 

 

 

2 Define ports and explain the two types of ports.

 

Answer: An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally, there are several ports for connecting disk drives, display screens, and keyboards. Externally, personal computers have ports for connecting modems, printers, mice, and other peripheral devices.

Almost all personal computers come with a serial RS

 

 

 

3Write note on:

 

(a)The Hierarchical Namespace

Answer: The DNS hierarchical namespace is a map of how DNS servers determine what IP address to connect to given a URL.

Registrars: Registrars, such as VeriSign, the operator of the .com and .net top-level domains, let any company, organization, or private individual register a TLD for any number of years. The domain name is then added to the Whois directory, and may point to a specific DNS server, which translates the domain name into an IP address.

Map: Domain names are read from right

 

 

 

(b) Fully Qualified Domain Names (FQDNs)

 

Answer: A fully qualified domain name (FQDN) is the complete domain name for a specific computer, or host, on the Internet. The FQDN consists of two parts: the hostname and the domain name. For example, an FQDN for a hypothetical mail server might be mymail.somecollege.edu. The hostname is mymail, and the host is located within the domain somecollege.edu.

In this example, .edu is the top-level domain (TLD). This is similar to the root directory on a typical workstation, where all other directories (or folders) originate. (Within the .edu TLD, Indiana University Bloomington has been

 

 

 

 

4 Define Telnet and explain its operation.

Answer: Telnet is an application protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).

Telnet was developed in

 

 

 

5 Define and explain Internet Message Access Protocol (IMAP4). Describe Fundamental IMAP4 Electronic Mail Models.

 

Answer: IMAP (Internet Message Access Protocol) is a standard protocol for accessing e-mail from your local server. IMAP (the latest version is IMAP Version 4) is a client/server protocol in which e-mail is received and held for you by your Internet server. You (or your e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail. You can also create and manipulate multiple folders or mailboxes on the server, delete messages, or search for certain parts or an entire note. IMAP requires continual access

 

 

 

 

6 Give an overview of HTTP operation.

 

Answer: The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.

Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext.

The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defined HTTP/1.1, the version of HTTP most commonly used today. In June 2014, RFC 2616 was retired and HTTP/1.1 was redefined by RFCs 7230, 7231, 7232, 7233, 7234, and 7235.[2] HTTP/2 is currently in draft form.

Technical overview: HTTP functions as a request

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

BT0075, RDBMS and MySQL

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

SUMMER 2015 , ASSIGNMENT

 

PROGRAM BSc IT
SEMESTER 3
SUBJECT CODE & NAME BT0075, RDBMS and MySQL
CREDIT 4
BK ID B1003
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

1 Explain the blob, text and enum data types.

Answer: Properly defining the fields in a table is important to the overall optimization of your database. You should use only the type and size of field you really need to use; don’t define a field as 10 characters wide if you know you’re only going to use 2 characters. These types of fields (or columns) are also referred to as data types, after the type of data you will be storing in those fields.

 

MySQL uses many different data types broken into three categories: numeric, date and time, and string types.

Date and Time Types:

The MySQL date and time datatypes are:

 

 

 

2 How to alter databases and tables? Explain with the help of examples.

Answer: MySQL ALTER command is very useful when you want to change a name of your table, any table field or if you want to add or delete an existing column in a table.

Let’s begin with creation of a table called testalter_tbl.

root@host# mysql -u root -p password;

Enter password:*******

mysql> use TUTORIALS;

Database changed

mysql> create table testalter_tbl

-> (

-> i INT,

-> c CHAR(1)

-> );

Query OK, 0 rows affected (0.05 sec)

mysql> SHOW COLUMNS FROM testalter_tbl;

+——-+———+——+—–+———+——-+

| Field | Type    | Null | Key | Default | Extra |

+——-+———+——+—–+———+——-+

| i     | int(11) | YES  |     | NULL    |       |

| c     | char(1) | YES  |     | NULL    |       |

+——-+———+——+—–+———+——-+

2 rows in set (0.00 sec)

 

Dropping, Adding or Repositioning a Column:

Suppose we want to drop an existing column i from above MySQL table then you will use DROP clause along with ALTER command as follows:

 

 

 

3 Explain update and replace statements with examples.

Answer: In SQL, a view is a virtual table based on the result-set of an SQL statement.

A view contains rows and columns, just like a real table. The fields in a view are fields from one or more real tables in the database.

We cab add SQL functions, WHERE, and JOIN statements to a view and present the data as if the data were coming from one single table.

SQL CREATE VIEW Syntax:

CREATE VIEW view_name AS

SELECT column_name(s)

FROM table_name

 

 

 

 

4 Explain the date and time functions in detail.

Answer: Defines a time of a day without time zone awareness and is based on a 24-hour clock. Click here to read more from msdn.

Syntax: – time [ (fractional second precision) ]

 

Where ‘fractional seconds precision’ specifies the number of digits for the fractional part of the seconds. its default by 7 and can be from 0 to 7.

 

 

5 Define grant tables. Describe the steps to set up MySQL user accounts. Also explain the method to assign passwords to the anonymous accounts.

 

Answer: One of the most powerful aspects of the MySQL server is the amazing amount of control the administrator has over each user’s intended behavior. This control can restrict user privileges over a general part of the server, such as limited access to an entire database, but can also be as specific as limiting privileges for a specific table or even column.

 

One of the most powerful aspects of the

 

 

 

 

 

6 Briefly describe the error log and general query log.

 

Answer: If you are a web developer, you need to refer to various log files, in order to debug your application or improve its performance. Logs is the best place to start troubleshooting. Concerning the famous MySQL database server (or MariaDB server), you need to refer to the following log files:

  • The Error Log. It contains information about errors that occur while the server is running (also server start and stop)
  • The General Query Log. This is a general record of what mysqld is doing (connect, disconnect, queries)

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

BT0074, OOPS with JAVA

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

ASSIGNMENT

 

PROGRAM BSc IT
SEMESTER 3
SUBJECT CODE & NAME BT0074, OOPS with JAVA
CREDIT 4
BK ID B1002
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

1 What are the keywords that java supports? Describe the data types available in java programming language.

Answer: In the Java programming language, a keyword is one of 50 reserved words that have a predefined meaning in the language; because of this, programmers cannot use keywords as names for variables, methods, classes, or as any other identifier. Due to their special functions in the language, most integrated development environments for Java use syntax highlighting to display keywords in a different color for easy identification.

 

 

2 Describe the syntax and working of if-else with an example. Also write a program in java that assigns a grade based on the value of a test score: an A for a score of 90% or above, a B for a score of 80% or above, and so on.

Answer: General if..else syntax is as follows:

 

 

 

3 Describe with the help of an example the implementation of inheritance in java.

Answer: Inheritance in Java is an Object oriented or OOPS concepts, which allows to emulate real world Inheritance behavior, Inheritance allows code reuse in Object oriented programming language e.g. Java. Along with Abstraction, Polymorphism and Encapsulation, Inheritance forms basis of Object oriented programming. Inheritance is implemented using extends keyword in Java and When one Class extends another Class it inherit all non private members including fields and methods. Inheritance in Java can be best understand in terms of Parent and Child class, also known as Super class and Sub class in Java programming language. The class which extends another class becomes Child of the class it extends and inherit all its functionality which is not private

 

 

4 Describe the catch and finally block statement in java with examples.

Answer:

  • A finally statement must be associated with a try statement. It identifies a block of statements that needs to be executed regardless of whether or not an exception occurs within the try block.
  • After all other try-catch processing is complete, the code inside the finally block executes. It is not mandatory to include a finally block at all, but if you do, it will run regardless of whether an exception was thrown and handled by the try and catch parts of the block.
  • In normal execution the finally

 

5 Draw and Explain the Life cycle of a java applet with an example.

Answer:

/*

Applet Life Cycle Example

This java example explains the life cycle of Java applet.

*/

 

import java.applet.Applet;

import java.awt.Graphics;

 

 

 

6 Define java beans and beanbox. Describe the advantages of java beanbox.

Answer: In computing based on the Java Platform, JavaBeans are classes that encapsulate many objects into a single object (the bean). They are serializable, have a zero-argument constructor, and allow access to properties using getter and setter methods. The name “Bean” was given to encompass this standard, which aims to create reusable software components for Java.

Advantages:

  • The properties, events, and methods of a

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

MB0049 – PROJECT MANAGEMENT

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

DRIVE SUMMER 2015
PROGRAM MBA/ MBADS/ MBAFLEX/ MBAHCSN3/ PGDBAN2
SEMESTER II
SUBJECT CODE & NAME MB 0049 – PROJECT MANAGEMENT
BK ID B1632
CREDITS&MARKS 4 CREDITS , 60 MARKS

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

  1. 1. Explain the various phases of the project management life cycle.

 

Answer:You could be a manager fresh out of the box or one that has been in the trenches for years. No matter. Understanding the project management life cycle is invaluable for successfully guiding your project from its initial stages to completion.

 

The Five Steps in the PM Life Cycle

 

 

 

 

  1. 2. List the steps involved in each process of project planning.

 

Answer:Seven steps to successful project planning:

 

  1. Every project needs a roadmap with clearly defined goals that should not change after the first phase of the project has been completed. All stakeholders benefiting from the outcome of the project should be named and their needs stated.

 

  1. Develop a list of all deliverables,

 

 

 

  1. 3. Write short notes on the following cost estimating tools and techniques:

 

  1. Analogous estimating:

 

Analogous estimating uses a similar past project to estimate the duration or cost of your current project, thus the root of the word: analogy.

 

 

 

 

  1. Bottom-up estimating:

 

Bottom-up estimating is a project management technique in which the people who are going to do the work participate in the estimating process. That’s typically the project team members and they work with you, the project manager, to develop estimating data at the lowest level in the work breakdown structure (WBS).

 

 

 

 

  1. Parametric estimating:

 

Parametric estimating, a more accurate technique for estimating cost and duration, uses the relationship between variables to calculate the cost or duration.

 

  • Essentially, a

 

 

 

 

  1. Reserve analysis:

 

Reserve Analysis is a technique involving review of the project management plan to ascertain the risks which mandate a reserve for mitigation and accordingly estimate the reserve.

 

In terms of the project management scope of work and work flow, the concept of reserve analysis actually refers

 

 

 

 

 

 

  1. 4. Summarize quality control for project quality management.

 

Answer: Quality control (QC) is a procedure or set of procedures intended to ensure that a manufactured product or performed service adheres to a defined set of quality criteria or meets the requirements of the client or customer. QC is similar to, but not identical with, quality assurance (QA).

 

 

  1. 5. What is purchase cycle? Explain the key steps involved in the purchase cycle of a project.

 

Answer:Management in any company must understand the art of obtaining products and services. The procurement cycle follows specific steps for identifying a requirement or need of the company through the final step of the award of the

 

 

 

 

  1. 6. Explain the various elements of project control.

 

 

Answer:A key feature of good project management is achieving a balance between too much and too little project control. At one extreme an “over-control” of projects can result in too much bureaucracy and a lack of delegation, and at the other extreme an “under-control” can result in  misunderstandings and lack of delivery. Its a matter of achieving an appropriate balance.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MB0048 – OPERATIONS RESEARCH

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

 

DRIVE SUMMER 2015
PROGRAM MBA/ MBADS/ MBAFLEX/ MBAHCSN3/ PGDBAN2
SEMESTER II
SUBJECT CODE & NAME MB0048 – OPERATIONS RESEARCH
BK ID B1631
CREDITS 4
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

  1. 1. What are the features of operations research? What are the limitations of operations research?

 

Answer:Operations research OR means to apply scientific and mathematical methods for decision making and problem solving.

 

OR does not provide decisions else it provides quantitative data to the managers. The managers use this data for making decisions.

 

OR tries to find better solutions to different problems. Hence, it is used to solve complex management problems.

 

 

 

  1. 2. a. Explain the graphical method of solving Linear Programming Problem.

 

Answer:Linear programming (LP; also called linear optimization) is a method to achieve the best outcome (such as maximum profit or lowest cost) in a mathematical model whose requirements are represented by linear relationships. Linear programming is a special case of mathematical programming (mathematical optimization).

 

More formally, linear programming is a technique for the optimization of a linear objective function, subject to linear equality and linear inequality

 

 

  1. A furniture manufacturing company plans to make two products: chairs and tables- from its available resources, which consists of 400 board feet of mahogany timber and 450 man-hours of labour. It knows that to make a chair requires 5 board feet and 10 man-hours and yields a profit of Rs.45 while each table uses 20 board feet and 15 man-hours and has a profit of Rs.80.

Formulate the LPP to maximise the profit.

 

Answer:  Linear programming models consist of an objective function and the constraints on that function. A linear programming model takes the following form:

 

Objective function:

 

Z  =  a1X1  +  a2X2  +  a3X3  +  . . . +  anXn

 

 

 

 

 

  1. 3. a. List the steps of the Vogel’s Approximation Method(VAM) to find the initial feasible solution.

 

Answer:The Vogel approximation method (Unit cost penalty method) is an iterative procedure for computing a basic feasible solution of a transportation problem. This method is preferred over the two methods discussed in the previous sections, because the initial basic feasible solution obtained by this method is either optimal or very close to the optimal solution.

 

Steps in Vogel Approximation Method (VAM)

 

The standard instructions are paraphrased below:

 

 

 

 

 

  1. The XYZ manufacturing company has a current transportation schedule which is being questioned by the top management as to whether or not it is optimal. The firm has 3 factories and 5 warehouses. The unit transportation costs (in Rs.), factory capacities, and ware house requirements are given below. Find the initial feasible solution using Vogel’s Approximation Method (VAM).

 

Answer:The task is to use VAM to allocate contractors to tasks. It scales to large problems, so ideally keep sorts out of the iterative cycle. It works as follows:

 

  • Step 1: Balance the given transportation problem if either (total supply>total demand) or (total supply<total demand)
  • Step 2: Determine the penalty cost for each row and column by subtracting the lowest cell cost in the row or column from the next

 

 

  1. 4. a. What is Integer Programming Problem (IPP) ?

 

 

Answer: An integer programming problem is a mathematical optimization or feasibility program in which some or all of the variables are restricted to be integers. In many settings the term refers to integer linear programming (ILP), in which the objective function and the constraints (other than the integer constraints) are linear.  Integer programming is NP-hard. A special case, 0-1 integer linear programming, in which unknowns are binary, and

 

 

 

 

  1. Explain Gomory’s all integer algorithm of an IPP.

 

Answer:A Gomory’s Cut is a linear constraint with the property that it is strictly stronger than its Parent, but it does not exclude any feasible integer solution of the LP problem under consideration. It is used, in conjunction with the Simplex Method, to generate optimal solutions to linear integer programming problems (LIP). Formally the LP and LIP problems under consideration are as follows:

LP:          opt ctx subject to Ax = b, x >= 0

LIP:         opt ctx subject to Ax = b, x >= 0 and integer

 

 

 

 

  1. 5. a. Explain Monte Carlo Simulation.

 

 

Answer: Monte Carlo simulation is a computerized mathematical technique that allows people to account for risk in quantitative analysis and decision making. The technique is used by professionals in such widely disparate fields as finance, project management, energy, manufacturing, engineering, research and development, insurance, oil & gas, transportation, and the environment.

 

Monte Carlo simulation

 

 

 

  1. A Company produces 150 cars. But the production rate varies with the distribution.

At present the track will hold 150 cars. Using the following random numbers determine the average number of cars waiting for shipment in the company and average number of empty space in the truck. Random Numbers 82, 54, 50, 96, 85, 34, 30, 02, 64, 47.

 

Answer:

 

Production Rate Probability Cumulative probability RN Range
147 0.05 0.05 00 –04
148 0.10 0.15 05 – 14
149 0.15 0.30 15-29
150 0.20 0.50 30 – 49
151 0.30 0.80 50 – 79
152 0.15 0.95 80 – 94
153 0.05 1.00 95 – 99

Simulation for 10 days using the given random numbers

 

 

 

 

 

 

  1. 6. a. Explain the dominance principle in game theory

 

Answer: In game theory, strategic dominance (commonly called simply dominance) occurs when one strategy is better than another strategy for one player, no matter how that player’s opponents may play. Many simple games can be solved using dominance. The opposite, intransitivity, occurs in games where one strategy may be better or worse than another strategy for one player, depending on how the player’s opponents may play.

 

 

 

 

 

  1. Differentiate between PERT and CPM

 

Answer:CPM and PERT (Program Evaluation and Review Technique) are most commonly used methods for project management. There are some similarities and differences between PERT and CPM. PERT can be applied to any field requiring planned, controlled and integrated work efforts to accomplish defined objectives.CPM/

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MB0047 – MANAGEMENT INFORMATION SYSTEMS

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

 

DRIVE SUMMER 2015
PROGRAM MBA/ MBADS/ MBAFLEX/ MBAHCSN3/ PGDBAN2
SEMESTER II
SUBJECT CODE & NAME MB0047 – MANAGEMENT INFORMATION SYSTEMS
BK ID B1968
CREDITS 4
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

  1. 1. In today’s life, Individuals rely on information systems, generally Internet-based, for conducting much of their personal lives: for socializing, study, shopping, banking, and entertainment. Information technology refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies. How do you differentiate between information system and information technology? Explain using an example.

 

Answer:It is often observed that term information system and information technology are used interchangeably. In a literal sense, information technology is a subset of information systems. Information systems consist of people, processes, machines and information technology. The great advancement in information systems is due to development in information technology and introduction of computers.

Information System

 

 

 

 

 

  1. 2. Explain decision making with MIS using Travelling salesman problem

 

Answer:Decision-making is a cognitive process that results in the selection of a course of action among several alternative scenarios.  Decision-making is a daily activity for any human being. There is no exception about that. When it comes to business organizations, decision-making is a habit and a process as well.  Effective and successful decisions result in profits, while unsuccessful ones cause losses. Therefore, corporate decision-making is the most critical process in any organization.  In a decision-making process, we choose one course of

 

 

 

 

 

  1. 3. How to use information system to support competitive strategy? Explain with an example for each strategy

 

Answer:Strategic information systems (SIS) are information systems that are developed in response to corporate business initiative. They are intended to give competitive advantage to the organization. They may deliver a product or service that is at a lower cost, that is differentiated, that focuses on a particular market segment, or is innovative.  Strategic information management (SIM) is a salient feature in the world of information technology (IT). In a nutshell, SIM helps businesses and organizations categorize, store, process and transfer the information they create and receive. It also offers tools for helping companies apply

 

 

 

 

 

  1. 4. Decision making is a daily activity for any human being. In the decision making process, we choose one course of action from a few possible alternatives. In the process of decision making, we may use many tools, techniques and perceptions. Describe Herbert Simon model on Decision making.

 

Answer:Herbert Simon made key contributions to enhance our understanding of the decision-making process. In fact, he pioneered the field of decision support systems. According to (Simon 1960) and his later work with (Newell 1972), decision-making is a process with distinct stages. He suggested for the first time the decision-making model of human beings. His model of decision-making has three stages:

 

  • Intelligence which deals with the

 

 

 

 

  1. 5. Write short notes on

 

 

  1. Data administration:

 

Data administration or data resource management is an organizational function working in the areas of information systems and computer science that plans, organizes, describes and controls data resources. Data resources are usually as stored in databases under a database management system or other software

 

 

 

  1. Managing concurrency:Leases are incredibly useful for managing all sorts of concurrency challenges. These mechanisms generally work transparently around your access to storage. As an example, if you read a table entity and then update it, the update will fail if someone else changed the entity in the

 

 

 

  1. Reduced data redundancy: In computer main memory, auxiliary storage and computer buses, data redundancy is the existence of data that is additional to the actual data and permits correction of errors in stored or

 

 

 

  1. Recovery from crashes:Periodically, your unsaved edits are saved in a temporary recovery file. This saving process is very fast and you will usually not notice that anything is being done. You will not be interrupted. The

 

 

 

 

  1. Data access: Data access typically refers to software and activities related to storing, retrieving, or acting on data housed in a database or other repository. Two fundamental types of data access exist:

 

  • sequential access (as in magnetic tape, for example)
  • random access (as in indexed media)

 

 

 

 

 

 

  1. 6. Write short notes on

 

  1. Role of workplace monitoring:Employee monitoring is the act of monitoring employee activity. Organizations engage in employee monitoring to track performance, avoid legal liability, protect trade secrets, and

 

 

 

  1. Power over users:A power user is a personal computer user who uses advanced features of computer hardware, operating systems, programs, or web sites which are not used by the average user. A power user may not have extensive technical knowledge of the systems they use and is not necessarily capable of computer programming and system administration, but is rather characterised by the

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

MB0046 – Marketing Management

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

 

DRIVE SUMMER 2015
PROGRAM MBA/ MBADS/ MBAFLEX/ MBAHCSN3/ PGDBAN2
SEMESTER 2
SUBJECT CODE & NAME MB0046- Marketing Management
BK ID B1629
CREDITS&MARKS 4 Credits, 60 marks

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

  1. 1. Do you think the argument of some theorists that the traditional Ps are not enough for services marketing? Give suitable examples to prove your point.

 

Answer:Services marketing is a sub-field of marketing, which can be split into the two main areas of goods marketing (which includes the marketing of fast moving consumer goods (FMCG) and durables) and services marketing. Services marketing typically refers to both business to consumer (B2C) and business to business (B2B) services, and includes marketing of services such as telecommunications services, financial services, all types of hospitality services, car rental services, air travel, health care services and professional services.

 

 

 

 

  1. 2. What is sales promotion? Explain any eight tools of sales promotion directed at consumers.

 

 

Answer:Sales promotion is one level or type of marketing aimed either at the consumer or at the distribution channel (in the form of sales-incentives). It is used to introduce new product, clear out inventories, attract traffic, and to lift sales temporarily. It is more closely associated with the marketing of products than of services. The American Marketing Association (AMA), in its Web-based “Dictionary of Marketing Terms,” defines sales promotion as “media and nonmedia marketing pressure applied for a predetermined, limited period of time in order to stimulate trial, increase consumer demand, or improve product availability.”

 

 

 

 

  1. 3. Define Environmental scanning. Explain Delphi technique and Scenario Building technique of Environmental Scanning.

 

 

Answer:Environmental scanning can be defined as ‘the study and interpretation of the political, economic, social and technological events and trends which influence a business, an industry or even a total market’. The factors which need to be considered for environmental scanning are events, trends, issues and expectations of the different interest groups. Issues are often forerunners of trend breaks. A trend break could be a value shift in society, a technological innovation that might be permanent or a paradigm change. Issues are less deep-seated and can be ‘a temporary short-lived reaction to a social phenomenon’. A trend can be defined as an ‘environmental phenomenon that has adopted a structural character’.

 

By bringing the tool of scenario building into the realm of a PR practitioner’s world, Grunig is equipping professionals with an important perspective to bring into the executive level meeting to help guide decision-making. “Management scholars

 

 

 

 

  1. 4. Personal selling focuses in on ‘personal’ or ‘one to one’ selling. It involves an individual salesman or a sales team establishing and building a profitable relationship with customers over a period of time through a series of steps. What is personal selling? Explain the steps in the personal selling process which helps in successful sales.

 

Answer: Personal selling is when a company uses salespersons to build a relationship and engage customers to determine their needs and attain a sales order that may not otherwise have been placed. The personal selling process is a seven step approach: prospecting, pre-approach, approach, presentation, meeting objections, closing the sale, and follow-up.

 

The sales cycle, more generally speaking, turns leads into prospects, suspects into prospects and prospects into customers.

 

 

 

  1. 5. What is Buying centre? Explain the seven roles of Buying centre and also specify the role of functional departments in the purchase process.

 

Answer:The Purchasing department is influential in straight rebuy and modified rebuy situations. Engineering personnel usually have a major influence in selecting product components and purchasing managers dominate in selecting suppliers.

 

Thus in new buy situations, the industrial marketer must first direct his product information to the engineering personnel. In rebuy situations and at supplier-selection time, communication must be directed at the purchasing department personnel

 

 

 

 

  1. 6. Describe some of the strategies for effective marketing and advertising in rural market. Also explain the innovative use of media in rural market.

 

Answer:Farmers and rural artisans are paid in cash as well in kind, and their misrepresent their purchasing power. For their reason, a marketer must therefore, make an attempt to understand the rural consumer better before meaning any marketing plans.

 

Rural markets in India have untapped potential. There are several difficulties confronting the effort to fully explore the rural markets. The concept of rural markets in India is still in evolving shape, and the sector pages a variety of challenges. Distribution costs and non-availability of retail output are major problems faced by marketers.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

MB0045 – FINANCIAL MANAGEMENT

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

 

DRIVE SUMMER 2015
PROGRAM MBA/ MBADS/ MBAFLEX/ MBAHCSN3/ PGDBAN2
SEMESTER II
SUBJECT CODE & NAME MB0045 – FINANCIAL MANAGEMENT
BK ID B1628
CREDITS 4
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

  1. 1. Critically analyze the four broad areas of strategic financing decision.

 

Answer:Any person, corporation, or nation should know who or where they are, where they want to be, and how to get there. The strategic-planning process utilizes analytical models that provide a realistic picture of the individual, corporation, or nation at its “consciously incompetent” level, creating the necessary motivation for the development of a strategic plan. The process requires five distinct steps outlined below and the selected strategy must be sufficiently robust to enable the firm to perform activities differently from its rivals or to perform similar activities in a more efficient manner.

 

 

 

 

 

 

  1. 2. What is FVIFA ? Is it different from Sinking fund factor ?

A finance company offers to pay Rs. 44,650 after five years to investors who deposit annually Rs. 6,000 for five years. Calculate the rate of interest implicit in this offer.

 

Answer:FVIFA:The expression  is called the Future Value Interest Factor for Annuity (FVIFA). This represents the accumulation of Re.1 invested at the end of every year for n number of years at “i” rate.

 

FVIFA is a factor which can be used to calculate the future value of a series of annuities.

 

 

 

 

  1. 3. A firm owns a machine furnishes the following information :

Rs.

Book value of the machine

1,10,000

Current market value

80,000

Expected salvage value after the end of five years of remaining useful life

NIL

Annual cash operating costs

36,000

The firm’s cost of capital

15 %

Corporate tax rate

35 %

The firm follows straight line method of depreciation (permitted by the Income-tax authorities).

The management of the company is now considering selling of the machine. If it does so, the total operating costs to perform the work, now done by the machine, will increase by Rs. 40,000 p.a.

Advise the management.

 

Answer:Cash Inflows(if machine is sold)

 

Selling price of the old machine                                                                 Rs. 80,000

Add Tax service (0.35xRs 30,000, short-term capital loss)               10500

——————-

90,500

Present value of cash outflows saved if machine is not sold(PV of keeping machine)

 

 

 

 

 

 

  1. 4. How will you compute the cost of equity capital using CAPM ?

The Xavier Corporation, a dynamic growth firm which pays no dividends, anticipates a long-run level of future earnings of Rs. 7 per share. The current market price of Xavier’s share is Rs. 55.45. Floatation costs for the sale of new equity shares would average about 10 % of the price of the shares. What is the cost of new equity capital to Xavier Corporation ?

 

Answer:Capital Asset Pricing Model – CAPM:

This model establishes a relationship between the required rate of return of a security and its

systematic risks expressed as “β”. According to this model, it determine a theoretically appropriate required rate of return of an asset, if that asset is to be added to an already well-diversified portfolio, given that asset’s non-diversifiable risk. The model takes into account the asset’s sensitivity to non-diversifiable risk (also known as systematic risk or market risk), often represented by the quantity beta (β) in the financial industry, as

 

 

 

 

  1. 5. Jharkhand Mining ltd. has to select one of the two alternative projects whose particulars are furnished below :

 

Project E Project F    
Rajrappa, Hazaribagh Tatisilwai,

Ranchi

   
Rs. Rs.    
Initial Outlay 11,87,200 10,06,700    
Net Cash Inflow :  
End of year 1 10,00,000 1,00,000    
2 2,00,000 1,00,000    
3 1,00,000 2,00,000    
4 1,00,000 10,00,000    

 

The company can arrange necessary funds @ 8 %. Compute the NPV and IRR of each project and comment on the results.

Is there any contradiction in the results ? If so, state the reason for such contradictions. How would you propose to resolve the contradictions ?

 

 

Answer:The PV of Re. 1, to be received at the end of each year, at different cost of capital, is the following:

 

YEAR      8%          10%        12%        14%

1              0.926     0.909     0.893     0.877

 

 

 

 

 

  1. 6. Premier Steel Ltd. has a present annual sales turnover of Rs. 40,00,000. The unit sale price is Rs. 20. The variable costs are Rs. 12 per unit and fixed costs amount to Rs. 5,00,000 per annum. The present credit period of 1 month is proposed to be extended to either 2 or 3 months whichever is profitable. The following additional information is available :
Credit period  1 month  2 months  3 months  
 Increase in sales by  —  10 %  30 %  
 Bad debts on sales  1 %  2 %  5 %  

Fixed costs will increase by Rs. 75,000 when sales increase by 30 %. The company requires a pre-tax return on investment of 20 %.

Evaluate the profitability of the proposals and recommend the best credit period for the company.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

Follow

Get every new post delivered to your Inbox.

Join 66 other followers