Sikkim manipal Solved MBA Assignments, SMU MBA, Solved assignments, 1st sem, 2nd sem, 3rd sem, 4th sem, SMU MBA PROJECTS

Email Us




Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :



call us at : + 91 9995105420




1. Waterfall Model, V-Model and Spiral Model are of the software development processes. Companies are using these models to have a systematic and defined approach in software development. Which of the four phases are involved in the software development process?

[listing the 4 types

explaining the types


2. Software estimation is the first phase of project planning and it is the process of judging a software product and solving the problem associated with the software project. We follow some important steps to achieve reliable cost and effort estimates. Explain the different estimation models and estimation techniques.

[a. Explaining different estimation models

b. Explaining estimation techniques]

3. a. You are a SCM manager in a software company. How will you establish a software configuration management process in a company?

b. You are appointed as a software developer in a software company and you have been asked by your project manager to check details of the bugs from the previous version. How will you gather details associated with the various bugs in the previous version?

[a. Definition and explaining 4 procedures in software configuration management process

b. definition and explaining typical work cycle]

4. a. If you are a software engineer you must be expert in the field of software, hardware and also database. It has been listed by the industry professionals that time and effort are the most important factors in the system analysis stage. Briefly explain the steps used in in system analysis.

b. If you are a software developer in small company, how will you conduct a specification review?

[a. Listing the steps and its Explanation

b. Explanation of specification review]

5. Write short note on

a. Unit testing

b. System testing

c. Debugging

d. Verification and validation

[a. Unit testing

b. System testing

c. Debugging

d. Verification and validation]

6. What are the different methods of software prototypes and tools?

[definition of software prototype

3 types of techniques

Explaining tools

Benefits of software prototype]



1. Suppose the employee name, employee id, designation, salary, attendance and address of any employee has to be stored in a database. You can store these data in a sequential address book or it can be stored on a hard disk, using a computer and software like Microsoft Excel. Using this example define a database. List and explain the various procedures carried on in a DBMS with a detailed example of the database.

[defining a database

Listing the 3 procedures


One examples for each of them]

2. Level 2 cache has got higher latency than Level 1 by 2 times to 10 times in 512 KiB or more. Its value is nearer to kilobyte. This is one of the levels of memory hierarchy. Define memory hierarchy. What are the other levels in memory hierarchy? Explain in one life each for each of them.

[defining memory hierarchy

listing the 6 levels




MUL1 Raashi PR2 30000 1

MUL2 Taashi PR1 43000 2

SMU1 Raksha PR3 25000 3

SMU2 Vidhesh PR2 50000 2

SMU3 Akhilesh PR1 83000 2



1 HRM Bangalore

2 MIS Bangalore

3 Research Chennai

4 Finance Bangalore

Using these tables answer the following question

a. If we want to see all the employees with salary between 40000 and 50000, which query can be used?

b. Select employee name from EMPLOYEE table, whose name starts with R

c. Explain aggregate functions and grouping in detail

[a. Query based in BETWEEN operator

b. Query based in LIKE condition]

c. Explaining aggregate functions on select statement, with an example, showing the output of the query, explaining having clause, with example]

4. Consider a book is written by a particular author. And you have to explain to someone about the relationship that exists between the author and the book. Normally you can draw a diagram and show the relation. These diagrams are called entity-relationship diagram in which book is one entity, author is one entity, and the relationship that exists between the two entities is written. Likewise explain the various notations used to represent the ER diagram.

[listing the notations with diagrams

explaining each one of them in one line with example each

5. Consider any database of your choice (may be simple banking database/forecasting database/project management database). Show the deduction of the tables in your database to the different types of normal forms

[Choosing a proper database

Explaining the 5 normal forms with respect to the database chosen]

6. Read the following case study thoroughly and answer the following questions:

Laxmi bank is one of the largest private sector banks of India. It has an extensive network of more than 200 branches. It offers banking services to retail as well as corporate clients. The bank faced a challenge in integrating multi-pronged database management system into a centralized system. The IT department of the bank also realized that the computing capabilities of its PCs and servers were not proportionately distributed among all its branches. Each branch had its database management system stored in a traditional way on the disk. The total cost of operating and maintaining the current IT infrastructure was very high and the fundamental shortcomings added to the costs. Moreover, there were also recurrent problems due to the malfunctioning of the currently operational database management system. Therefore, the bank’s top management decided to fix the problem and operationalise a robust database management system. The bank hired an external database technology consulting firm called AKPY Info systems Limited.

AKPY divided the entire IT infrastructure of the bank around two verticals. The retail banking vertical and the corporate banking vertical. All the individual database servers from the individual branches were removed. The entire database system was made virtual such that the managers and the staff can access only the required information (related to retail banking or corporate banking) from the respective centralised data centers. There were only two such centralised data centers (one for retail banking and another for corporate banking) that were managed centrally. Staff and managers could access the information through their PCs and laptops. Centralised database management system complemented the security system by bringing in authentication through a unified ID management server. Managers and officers of the bank were able to process half a million transactions per month in real time after the new implementation. There were significant savings in the cost and also in the consumption of power. Now there were no problems with regard to imbalances in the load across various network servers. Due to centralised data management, top management could keep an eye on the functioning of various branches. Hence the cases of fraud and cheating reduced considerably. The bank managers could also process the loan applications in reduced time since the customer’s previous records could be accessed at the click of the button and approval from the higher authorities could be obtained in real time. Moreover the new system also brought in many applications that helped local managers in the decision making process.

a. List the uses of centralized data management

b. What steps Laxmi bank need to take if it were to change its centralised database system to a distributed database system in future?

[a. Listing the uses from the from the case study

b. Explaining about data fragmentation, replication and allocation techniques

Is it possible to replicate the centralised database management model of the bank in a manufacturing concern? Give reasons.]



1. Write short notes on

a. LAN

b. Analog and digital data transmission

c. High level data link control

[a. LAN

b. Analog and digital data transmission

c. High level data link control]

2. Videoconferencing is used to conduct meetings with the people who are located in far distance. Videoconferencing is an example of which type of computer networks? Explain in detail the different types of networks with example.

[identifying the correct type

list the different types of networks

explaining the types]

3. A protocol helps in establishing the communication between two systems. Protocols are mainly divided into asynchronous and synchronous protocols. List and describe in detail the different types of protocols that are classified under the two main protocols.

[list and correct differentiating of protocols under the two main types


4. Integrated Services for Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book. Explain the different types of ISDN with their features and advantages for each one of them.

[Explaining Two different types

Features of both of them

Advantages of both of them]

5. ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365 storage capacity, storage management and internet service to the customers. It now needs a solution that will eliminate downtime. Downtime is nothing but the time during which a computer or computer system is down, or inoperative due to hardware or software failure. We also need the flexibility in quick response to both the development in customer base and additional capacity and service demands of the customers.

ABC company took the help of network storage infrastructure software provider to achieve their goals by providing support for end to end redundancy and bondless scalability.

By creating a scalable storage network with the ability to confidentially deliver the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract and retain customers and substantially build its business. As the same time, the solution has effectively lowered ABC company’s total cost of ownership for its entire storage solution: the IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively.

a. What were the problem which ABC Company was facing before consulting network storage infrastructure software provider?

b. What were the benefits of implementing a scalable storage network?

c. List the different classes of ISPs and their applications

[a. Mentioning the problems faced by ABC company after reading the SLM

b. Listing the benefits

c. Listing the different classes of ISP and their applications]

6. How are the different topologies of computer networks arranged? Explain the working of each of them.

[listing the different topologies with examples





1. a. Emergency Medical Association (EMA) is a group of 250 board- certified emergency physicians. They are responsible for effectively managing the emergency departments. List out what BI values and applications they should be implementing

b. Most of the credit card companies permit a consumer to get approval for specified amounts via mobile to ensure that the purchase is covered. This type of consumer support which retains a customer to the bank for a longer time is real time business intelligence. Define real time Business intelligence and the various steps involved in the process.

[a. Listing and explaining the reason behind it

b. Defining

List and explain the process

2. Today businesses largely rely on the information available and can be communicated through various sources, both internally and externally with the help of internet. Explain the role of Business Intelligence in modern business. What are the three different types of decision that most business organisations take.


Different types of decision]

3. Data extraction is the act or the process of extracting data out of data sources for added data processing or data storage or data migration. This data can be extracted from the web. Explain the different techniques for data extraction

[Listing the various techniques

Explaining the four methods]

4. Business Intelligence strategy summarizes the finest combination of procedures and technologies to meet the business intelligence strategies of an organization.

a. List the main aspects of BI strategy.

b. What are the steps to be followed to implement BI framework?

[a. Listing atleast 6 main aspects of BI strategy

b. Steps for Implementing BI framework]

5. Write short note on

a. Content Management System

b. End User Segmentation

c. Basic Reporting and querying


[a. Content Management System

b. End User Segmentation

c. Basic Reporting and querying

d. OLAP]

6. According to a recent IDC report, knowledge management is in a state of high growth, especially among the business and legal services industries. As the performance metrics of early adopters are documenting the substantial benefits of knowledge management, more organizations are recognizing the value of leveraging organizational knowledge. Define Knowledge Management. Explain the various characteristics of Knowledge management. What are knowledge assets?



Definition of knowledge assets



Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :



call us at : + 91 9995105420


Leave a Reply

You must be logged in to post a comment.