SMU MBA ASSIGNMENTS

Sikkim manipal Solved MBA Assignments, SMU MBA, Solved assignments, 1st sem, 2nd sem, 3rd sem, 4th sem, SMU MBA PROJECTS

Email Us

SEM 4 -IS spring 2014

SMU MBA SPRING 2014 SOLVED ASSIGNMENTS SEM – 4 IS

Students, Get Completely solved SMU MBA Spring 2014 assignments from authorized organization www.smumbaassignment.com

Send your semester & Specialization name to our mail id : “ kvsude@gmail.com
or Call us at : +91 9995105420
These are just questions for reference . To check samples see our latest uploads in blog archive or search assignments

SEM 4 MIS
MI0033- SOFTWARE ENGINEERING
1 Process patterns are the results of applying abstraction to recurring processes and process components. Process patterns are collections of general techniques, actions, and/or tasks (activities) for developing object-oriented software. Justify the above statement. Explain with an example for each, the different types of process patterns in the ascending order of abstraction level.
A a. Justifying the above statement
b. Explaining the three types of process patterns
c. Examples
2 Software estimation is the first phase of project planning and it is the process of judging a software product and solving the problem associated with the software project. We follow some important steps to achieve reliable cost and effort estimates. Explain the different estimation models and estimation techniques.
A a. Explaining different estimation models
b. Explaining estimation techniques
3 Empirical software solutions is a small manufacture based company who have a single product in the public access and security domain. The information system which they possess gives details pertaining to the presence of individuals at specific locations and also checks and issues security badges.
The software of the system is connected to specially designed hardware peripherals along with a well-defined LAN network connection. The system handles several aspects ranging from computing from database manipulation, peripheral hardware ti image handling. This company uses both software as well as hardware, and incorporates latest technologies, like networking and device drivers.
Due to the pressure from customers and the competition, they were in need of a structured software process. There was no standardized development process. Most of their work was based on customer requests. Every time a new request from customer came in, more additions were made to the product. A new version of the software was installed at the customer’s site when requested by the customer. All the queries related to technical support, modifications made to the system were handled by the development team. There was no specific design methodology followed and each developer used his own method of working. Apart from the user manual, there was no other documentation found held.
Challenges:
Introduction of reuse framework and method into the company
Gain support from the top management for the reuse program, as introduction of reuse program can affect all parts of the software production process.
Suggestions were made to set up the reuse program along with the associated cost and risk involved in setting up the reuse program.
a. Explain the challenges faced by the empirical software solutions
b. Give some suggestions to overcome the challenges.
c. Explain the classifications and advantages of software reuse.
A a. Listing the challenges
b. Suggesting some 4 point about, planning, design, resource management, documentation
c. Classifications with diagram
Listing the advantages
4 Suppose you are assigned the task to analyse the various factors involved in your project, explain how will you gather information and analyse the task
A Explaining system analysis
5 Write short note on
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
A a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
6 Briefly describe the concept of polymorphism by using the automobile class as an example.
A a. Explaining the example of automobile class
b. Describing the concept of polymorphism
c. Explaining polymorphism using the above example
MI0034- DATABASE MANAGEMENT SYSTEMS
1 How is DBMS classified based on several criteria? Explain each one of them with few examples where ever required
A Listing the criterion
Explaining the types based on each criterion
Example
2 Differentiate between B+ tree and B- tree. Explain them with diagrams
A Diagrams
Explanation based on comparison
3 EMPLOYEE
EMP_ID NAME PROJECT SALARY DEPT_NUM
MUL1 Ramya PR1 40000 1
MUL2 Nupur PR1 45000 2
SMU1 Rajesh PR3 20000 2
SMU2 Vinay PR2 50000 3
SMU3 Anil PR2 80000 2
DEPARTMENT
DEPT_ID DNAME PLACE
1 MIS Bangalore
2 HRM Bangalore
3 Finance Chennai
4 Research Bangalore
Using these tables answer the following question
a. If we want to see all the employees with salary between 40000 and 50000, which query can be used?
b. Select employee name from EMPLOYEE table, whose name starts with R c. Explain aggregate functions and grouping in detail
A
a. Query based in BETWEEN operator
SELECT * from employee WHERE salary between 40000 to 50000
b. Query based in LIKE condition
SELECT * from employee WHERE Name LIKE ‘r%’;
c. Explaining aggregate functions on select statement, with an example, showing the output of the query, explaining having clause, with example
4 What are the problems and failures that may encounter with respect to the transactions in a database management system? Give examples.
A Explaining the three problems with code
Listing the types of failures (atleast 4)
5 Consider any database of your choice (may be simple banking database/forecasting database/project management database). Show the deduction of the tables in your database to the different types of normal forms
A Choosing a proper database
Explaining the 5 normal forms with respect to the database chosen
6 Read the following case study thoroughly and answer the following questions:
Laxmi bank is one of the largest private sector banks of India. It has an extensive network of more than 200 branches. It offers banking services to retail as well as corporate clients. The bank faced a challenge in integrating multi-pronged database management system into a centralized system. The IT department of the bank also realized that the computing capabilities of its PCs and servers were not proportionately distributed among all its branches. Each branch had its database management system stored in a traditional way on the disk. The total cost of operating and maintaining the current IT infrastructure was very high and the fundamental shortcomings added to the costs. Moreover, there were also recurrent problems due to the malfunctioning of the currently operational database management system. Therefore, the bank’s top management decided to fix the problem and operationalise a robust database management system. The bank hired an external database technology consulting firm called AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail banking vertical and the corporate banking vertical. All the individual database servers from the individual branches were removed. The entire database system was made virtual such that the managers and the staff can access only the required information (related to retail banking or corporate banking) from the respective centralised data centers. There were only two such centralised data centers (one for retail banking and another for corporate banking) that were managed centrally. Staff and managers could access the information through their PCs and laptops. Centralised database management system complemented the security system by bringing in authentication through a unified ID management server. Managers and officers of the bank were able to process half a million transactions per month in real time after the new implementation. There were significant savings in the cost and also in the consumption of power. Now there were no problems with regard to imbalances in the load across various network servers. Due to centralised data management, top management could keep an eye on the functioning of various branches. Hence the cases of fraud and cheating reduced considerably. The bank managers could also process the loan applications in reduced time since the customer’s previous records could be accessed at the click of the button and approval from the higher authorities could be obtained in real time. Moreover the new system also brought in many applications that helped local managers in the decision making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its centralised database system to a distributed database system in future?
A a. Listing the uses from the from the case study
b. Explaining about data fragmentation, replication and allocation techniques
c. Is it possible to replicate the centralised database management model of the bank in a manufacturing concern? Give reasons.
MI0035- COMPUTER NETWORKS
1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN
b. Analog and digital data transmission
c. High level data link control
2 Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. Explain the seven layer architecture of OSI model with diagram
A Explaining the OSI reference model
Diagram of OSI reference model
3 Consider yourself as the operation head in a telecommunication company. What are the different types of multiplexing techniques will you implement to get efficient data transmission process?
A Explaining various multiplexing techniques
4 Integrated Services for Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book. Explain the different types of ISDN with their features and advantages for each one of them.
A Explaining Two different types
Features of both of them
Advantages of both of them
5 ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365 storage capacity, storage management and internet service to the customers. It now needs a solution that will eliminate downtime. Downtime is nothing but the time during which a computer or computer system is down, or inoperative due to hardware or software failure. We also need the flexibility in quick response to both the development in customer base and additional capacity and service demands of the customers.
ABC company took the help of network storage infrastructure software provider to achieve their goals by providing support for end to end redundancy and bondless scalability.
By creating a scalable storage network with the ability to confidentially deliver the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract and retain customers and substantially build its business. As the same time, the solution has effectively lowered ABC company’s total cost of ownership for its entire storage solution: the IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by ABC company after reading the SLM
b. Listing the benefits
c. Listing the different classes of ISP and their applications
6 Cryptography is the science of hiding information. The traditional security system employed a different of encryption process known as symmetric cryptography, which involves the use of te same method for both encryption and decryption. Explain the different networking algorithms that are used for cryptography along with its subtypes.
A Explaining the two types of cryptography and the networking algorithms used for them
MI0036- BUSINESS INTELLIGENCE & TOOLS
1 Similarity measures determine the similarity between the two objects. The similarity between the two objects ti and tj, sim(ti, tj) in the database D is a mapping from D*D to the range [0, 1]. a. List the characteristics of a good similarity measure.
b. what are the four methods to determine the similarity characteristic between the two objects?
A a. Listing the characteristics
b. Listing the four methods
a. Four methods to determine the similarity characteristic and their formula
2 Transactions refers to business or commercial transactions. Online transaction processing refers to the category of systems that assists and manage transaction- oriented applications, typically for data entry and retrieval transaction processing.
List the differences between OLAP and OLTP
A Listing at least 10 points
3 Data extraction is the act or the process of extracting data out of data sources for added data processing or data storage or data migration. This data can be extracted from the web. Explain the different techniques for data extraction
A Listing the various techniques
Explaining the four methods
4 Business Intelligence strategy summarizes the finest combination of procedures and technologies to meet the business intelligence strategies of an organization
a. List the main aspects of BI strategy.
b. What are the steps to be followed to implement BI framework?
A a. Listing at least 6 main aspects of BI strategy
b. Steps for Implementing BI framework
5 Write short note on
a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
A a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
6 RSG is a footwear company which has its chain all over the world. This company has to keep track of all the products sold in the company and huge data is involved in it.
a. How should it plan to implement the Business intelligence solutions?
b. How to make the best use of BI?
A a. Explaining the planning to implement a BI solutions
b. Explaining best usage of BI
Students, Get Completely solved SMU MBA Spring 2014 assignments from authorized organization www.smumbaassignment.com

Send your semester & Specialization name to our mail id : “ kvsude@gmail.com ”
or Call us at : +91 9995105420
These are just questions for reference . To check samples see our latest uploads in blog archive or search assignments

Leave a Reply

You must be logged in to post a comment.