Friday 26 September 2014

mi0041 smu mba summer 2014 sem IV assignment

Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412

DRIVE WINTER DRIVE 2013
PROGRAM/SEMESTER MBADS (SEM 4/SEM 6)-MBAFLEX/ MBAN2 (SEM 4) PGDISMN (SEM 2)
SUBJECT CODE & NAME-MI0041- JAVA AND WEB DESIGNAssignment



Q.No
Questions
Marks
Total Marks
1
Write down what the following tags will perform
a. <table>
b. <td width>
c. <embed>
d. <a>
e. <object>
A
a. <table>
b. <td width>
c. <embed>
d. <a>
e. <object>
2 * 5 = 10
10
2
Write short notes on
a. Web browsers
b. Web development tools
A
a. Explaining web browsers with an example
5
10
b. Explaining web development tools with an example
5
3
Write a programme to create a webpage that prints the name of the STUDENT database in Wide Latin font and set the subtitle with description of the STUDENT to the screen. Set the page layout to the webpage. Insert one image after the database with a Thank you note.
A
Programme
7
10
Writing the output for the programme written
3
b. Reason for using JSP
5
10
5
For the above case study answer the following questions
a. State the reason for using database connection in the application.
b. Explain the purpose of creating a java application for the ABC institute.
A
a. Reasons for using database connection
5
10
b. Explaining the purpose of creating a java application
5
6
How do you handle exception in java? Give with an example
A
Explaining handling exception and the ways of exception can occur
2
10
Exception types
4
Explaining different types of exception handling like, using throw, using finally, etc
4

Question 1.

a. <TABLE> – Allows you to align text in tables. You can see an example of this on our Support page. How you do this is start with <Table> and if you want borders, just use the below commands.
b.  <tdwidth>- The width attribute of <td> is deprecated in HTML 4.01.The width attribute specifies the width of a table cell. Normally, a cell takes up the space it needs to display the content. The width attribute is used to set a predefined width of a cell.
C. <embed> The
Question 2(A)
(a ) : A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI/URL) and may be a web page, image, video or other piece of content. Hyperlinks present in resources enable users easily to navigate their browsers to related resources. Although browsers are primarily intended to use the World Wide Web, they can also be used to access information provided by web servers in private networks or files in file systems. The major web browsers are Google Chrome
Example of web browsers


Question 3.A
There are basically two ways to make a web page. The first way is to create the page(s) offline and then upload them to your Internet Service Provider (ISP) via FTP. The second way is to create your web page(s) online using a Telnet program by accessing your UNIX account, if you have one. If you are creating your web page(s) offline, do so in any text editing or word processing document. Make sure that when you save your document, you save it as a “text”, “plain text” or “text only” document. Otherwise it will not be read properly by a web browser. Once you have created

Question 4 (A)


a.      Reason
ABC institute decided to choose XYZ for the development of Java application because the institute understood the importance of e-records. As it had already faced the problem in keeping hard copy of records. XYZ organization was well efficient in developing java based software so it was chosen. Other important reason was maintenance of records . It is very essential to keep records safe. Each school has a responsibility to maintain its records and record keeping systems. Although schools will have their own methods of creating and keeping records and sharing information with staff,
Question 6 (A)
(a) A Java exception is nothing but an object that defines an exceptional condition, or an error that has occurred in a piece of code. In Java, we can handle this exception by creating an object that represents the exception, and throwing that object into the method that triggered the error.
There are two ways by which exceptions can occur. They are as follows:
 Java run-time system: These exceptions relate to the fundamental errors that violate the rules of the Java programming language or the constraints of the Java execution environment.
Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412




mi0039 smu mba summer 2014 sem IV assignment

Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412

DRIVE-Summer DRIVE 2014
PROGRAM/SEMESTER-MBADS (SEM 4/SEM 6) MBAFLEX/ MBAN2 (SEM 4) PGDISMN (SEM 2)
SUBJECT CODE & NAME-MI0039- E-COMMERCE


Q1. Warigon is a retail company and they want to automate the payment system. Assume that you are the design engineer of that company. What are the factors that you would consider while designing the electronic payment system? (Analyzing- 5 marks, Factors- 5 marks) 10 marks)
Answer.
Analyzing Factors:
These factors are as follows ease of access, use and integration, acceptability and client base. 

Ease of use and access: The best payment processing system should be easy to use and support all levels of users. 



Q2. For many years companies have been using computers to send business documents instead of mailing paper documents (i.e. most of our pay checks are directly deposited into our bank accounts). This transfer of funds is accomplished by the use of an electronic file being sent from your company to your bank). The problem was that the all employed proprietary used unique formats to pursue this task. The absence of a standard format led to the condition where computers could no longer "talk" to one another without a great deal of effort by programmers. For example, Supplier X could recognize an electronic Purchase Order from Retailer A but not from Retailer B. To avoid the above conditi. What is the name of the standard? Discuss the working concepts of that standard. (Recognizing the standard – 1 mark, defining the standard- 2 marks, listing the various components – 3 marks, explaining the working – 4 marks) 10 marks
Answer.
Name of the standard and its definition: EDI ANSI X12 stands for Electronic Data Interchange, American National Standards Institute X12.  The EDI ANSI X12 standard was developed to govern the use of EDI to exchange information electronically between businesses.
ANSI X12 was originally conceived to support companies across different industry sectors in North America however today there are more than 300,000 companies worldwide using X12 EDI standards in daily business transactions. ASC

Q3 Suppose you are the network admin of WXZ Software Company and you are given the responsibility of managing all the servers. What are the steps you would follow to avoid hacking of the company’s information?
(Explaining the threat and to avoid threats) 10
Answer.
Explanation of threats
Unethical hackers (in bad sense of this word) are always looking for weaker points in a network system to hack the security system of your company and get hold of confidential and new information. Various threats may occur which may be in the following forms:
Sabotage by former employees
Employees who lose their job due to some bad circumstances like disappointment or fired due to their misbehavior may collect the internal information from their previous contacts and ex-colleagues. Sabotage by ex- employees may


Q4. Assume that you are the project manager of VSG Company. Due to some reason the company’s server got shut down and the company is not able to access the company’s confidential data. What steps would have been taken by you to avoid this?
(Explaining the backup alternatives) 10
Answer.
The steps followed in backup alternatives

Setting up, running and performing a backup can become very time consuming (especially if you are creating a FULL backup for the very first time and more on this later). You can take some steps to make the task of securing and storing your information, first, by getting rid of some rubbish. Rarely, have I noticed in other articles, blogs, posts, forums, any mention of getting rid of unwanted data on the computer FIRST.


Q5. Write short note on
a. Target Audience
b. Preparing the budget
(a. Target Audience, b. Preparing the budget) 5,5
Answer.

a) Target audience
With the advent of the World Wide Web, more and more companies are competing with each other to make their presence felt in the web world. Advertising through the web is easier and effective. However, it is very important to analyze and target a particular set of audience for specific products and services.
Strategic determination of the audience for whom the products are targeted is very essential for the success of any business. Websites should be designed after considering the requirements of the visitors and the benefits derived there after by the particular website. Website designed for information, entertainment or business should be capable of grasping the visitor’s attention and retaining it for a longer period of time. More traffic can be attracted by a good website design which is rich in contents. Websites can be broadly classified into two -- personal websites and business


Q6. Guest look is an Indian based cosmetic manufacturing company which manufactures a wide range of cosmetics for men. Although its product was used by men all over the world, a number of new cosmetic manufacturing companies arose in the market challenging Guest look. Now Guest look has to find innovative ways of advertising its products. So far, Guest look’s advertising aids were mostly printed and television media. Now, Eguest look realized the importance and benefits of e-Marketing and has started concentrating on e- Marketing. As the company is known for its integrity and will not compromise on that with spam and unsolicited mails. Therefore, company identified three techniques such as search engine optimization, improving existing website and banner ads.
a. What are the benefits of offline advertising? Are Guest look following offline advertisement? Justify your
b. If you are working with the development team of Guest Look, how would you go about improvising the existing website?
c. What banner ads?
(a. Listing the benefits of offline advertising, Justification of the answer for using offline advertisement, b. Explaining how to improvise the existing website, Explaining banner ads and its drawbacks) 2,2,3,3
Answer.

a)      Benefits of offline advertising
Despite the growth of the Internet, it is important to realize that only 78.1% of users in the US have access to the Internet that leaves 21.9% of users whom you cannot reach online. For that 21.9%, here are some offline marketing methods to consider reaching everyone in your overall marketing strategy.

Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412


mi0038 smu mba summer 2014 sem IV assignment

Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412

DRIVE: SUMMER 2014

PROGRAM: MBADS (SEM 3/SEM 5) MBAFLEX/ MBA (SEM 3) PGDOMN (SEM 1)

SUBJECT CODE & NAME: MI0038 ENTERPRISES RESOURCE PLANNING

BK ID: B1964

CREDITS AND MARKS: 4 CREDITS AND 60 MARKS

Q.1: Write short notes on:
Type of information required at various levels of the enterprise
Service-Oriented Architecture (SOA) factor for developing ERP systems
Role of ERP in Sales and Distribution
Trans-shipment
ANS:
Type of information required at various levels of the enterprise:
Decision making takes place at all the levels of an enterprise (top level, middle level, and bottom level). So, managers at different levels require different types of information to make business decisions. Based on these levels, information is categorised in the following three types:

Q.2: Write short notes on :
Distribution Requirements Planning (DRP)
Role of ERP Consultants
Product Lifecycle Management (PLM)
Collaborative CRM
ANS:

Distribution Requirements Planning (DRP):
DRP extends the technique of MRP into the physical distribution system of an organisation. This system enables an organisation to plan orders within its supply chain. DRP helps an organisation in establishing certain inventory control parameters such as safety stock.


Q.3: What are the benefits and features of ERP purchase module.
Listing of benefits of purchase module
Description of features of purchase module

ANS:
Listing of benefits of purchase module:
The following are the benefits of the purchase module of an ERP system:
Minimises manual operations and paperwork.
Helps in reducing inventory levels through efficient inventory management, thereby reducing overall inventory cost.

Q.4: What are the benefits and features of ERP financial module?
Listing of benefits of financial module
Description of features of financial module

ANS:

Listing of benefits of financial module:
Some of the main benefits of the financial module of an ERP system are:
Provides authorised access to financial data to multiple users at the same time.
Converts financial values in multiple currencies.


Q.5: Case Study: Implementation of ERP HRM System at ABC
ABC is a US-based organisation that operates several museums, research centres, and zoological parks. A few years back, the organisation faced a number of issues in managing its human resource functions. This was due to the obsolescence of the existing human resource management system. The old system of the organisation was not able to provide accurate information related to employees.
Considering the on-going issues, ABC decided to implement the latest version of ERP HRM system called PeopleSoft HRMS V8.8 from Software Performance Systems, Inc. The implementation of this system was divided into four phases.
First Phase: Focused on implementing personnel management, benefits administration, and payroll administration functions.
Second Phase: Focused on implementing job requisition, labour relations, and workflow management features.
Third Phase: Concerned with the development of an organisation-wide learning source to facilitate information and knowledge sharing.
Fourth Phase: Focussed on competency mapping and personnel development.

The implementation of the ERP HRM system not only improved human resource functions but also increased the overall operational efficiency of the organisation.
Questions:
a) Why was ABC facing problems related to HRM? How did they solve it?
b) What are the advantages obtained by ABC after implementing the ERP HRM system?


[a. List the HR problems ABC was facing. List the four phases of implementation
b. List the advantages obtained by ABC after implementing the ERP HRM(mentioned in the case as well as what you think are the advantages) ] 4, 6

Answer:
a. The ABC organization facing following problem
·         The organisation faced a number of issues in managing its human resource functions.
·         The old system of the organisation was not able to provide accurate information related to employees.


Q.6: Discuss the ERP selection criteria
Explain the importance of selecting the right ERP system
Explain the three major criteria for selecting an ERP system

ANS:

Explain the importance of selecting the right ERP system:
An organisation needs to spend a large amount of money and time for the implementation of an ERP system. Therefore, any wrong decision related to the selection of an ERP system may lead to heavy losses
Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412



mca5031 smu mca summer 2014 V sem assignment

Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412
Summer 2014 ASSIGNMENT
PROGRAM-MCA(REVISED FALL 2012)
SEMESTER-V
SUBJECT CODE & NAME-MCA5031-PRINCIPLES OF MULTIMEDIA
CREDIT-4
BK ID-B1505
MAX. MARKS-60
1. List and explain the main multimedia building blocks. 5*2
Answer.
Main multimedia building blocks
Multimedia is a combination of various elements such as text, images, video, sound, and animation. So the main multimedia building blocks are:
Text: Text is an essential aspect of presenting the information. The effective use of text can either direct users/readers attention or divert it.

2. Differentiate between continuous signal and Discrete signal. 5+5
Answer.
Continuous signal and Discrete signal
Natural phenomenon like light, heat, sound and electricity appear to be continuous and hence can be called analog. If these are to be represented in a digital computer then they have to be converted into discrete (noncontinuous) form. Discrete signals are discrete time continuous valued whereas digital signals are discrete


3. Differentiate between Bitmap graphics and Vector graphics 5+5
Answer.
Bitmap graphics and Vector graphics
Bitmap Graphics
Bitmap graphics, also known as "raster graphics," are composed of very small dots (pixels) of the same or different color that are placed so closely to each other that the human eye perceives them not as dots, but as a picture(for example, a photograph). So bitmap image is a matrix (grid) of digital picture elements (pixels). Pixels

4. Differentiate between filed mode and frame mode. 5+5
Answer.
Filed mode and frame mode
The application for which MP@ML is purposed is for digital television broadcasting. Hence interlaced scanning is used with a frame refresh rate of 30Hz for NTSC and 25Hz for PAL. The 4:2:0 digitization format is used and the bit rate ranges from 4Mbps to 15 Mbps. The coding scheme is similar to MPEG-1 with only difference in scanning method. It uses interlaced scanning instead of progressive scanning which results in each macroblock

5. Explain the various hardware components required for Multimedia Applications. 4*2.5
Answer.
Hardware Components required for Multimedia Applications
To develop the system of multimedia the various hardware components required are:-
CPU: The CPU (Central Processing Unit) of a computer performs the main processing of data. The CPU is responsible for everything the computer does. For example, the CPU runs the operating system, the software programs installed on the computer, and device peripherals such as printers and scanners. For multimedia

6. What are the different types of multimedia servers? Explain. 5+5
Answer.
Types of multimedia servers
The multimedia server is where all the multimedia information or content is stored. That is why they are also called information provider. The multimedia server is responsible for managing multimedia databases and also composing general multimedia objects for the user. The composition of the object is a complex process of integrating and synchronizing multimedia data for transport, display and manipulation. The distributed
Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412



mca5020 smu mca summer 2014 V sem assignment

Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412

Summer 2014 ASSIGNMENT
PROGRAM-MCA(REVISED FALL 2012)
SEMESTER-V
SUBJECT CODE & NAME-MCA5020-ADVANCED SOFTWARE ENGINEERING
CREDIT-4
BK ID-B1636
MAX. MARKS-60
1. Describe in detail the spiral life cycle model. Explain its advantages and dis advantages. 4+6
Answer.
Spiral life cycle model
The spiral model is applicable to projects where new technologies are used. The spiral model mainly focuses on risk analysis. The spiral life cycle model has four phases. They are - planning, risk analysis, engineering and evaluation. Software projects repeatedly pass through all these phases in iterations. The project life cycle moves in a spiral in this model. The baseline spiral starts in the planning phase and ends at the evaluation phase. Figure 1


2. Differentiate between Predictive SDLC and Adaptive SDLC 5+5
Answer.
Predictive SDLC and Adaptive SDLC
Predictive approaches are traditional in nature and were used extensively during the 1980s and 1990s. Predictive approaches assume that a project can be planned in advance. Many newer adaptive approaches have been adopted since the 1990s. These approaches assume that a project cannot be planned in advance and must be flexible. These approaches have more transparency and customer involvement. Figure 2 depicts the comparison of the


3. List the four developer practices of XP. explain briefly about Adopt test-driven development 4+6
Answer.
Developer practices of XP
XP values and the significance of time and resource for an XP practitioner. As a development model, the XP empowers the developers and stakeholders, associated with the project, to successfully carry out the project and develop efficient software. However, just like any other programming model, even in the XP, you must follow certain practices to utilize the model to its fullest capacity. The 12 practices of XP are classified into three groups namely, coding, developer, and business practices. These practices will help you to achieve higher productivity and quality.

4. Briefly explain about tracker and coach in XP. 5+5
Answer.
Tracker and coach in XP
Tracker
A tracker is a person who keeps track of the schedule. A tracker can be a manager or a trusted developer. XP keeps track of certain metrics that include team velocity. This is the ratio of ideal time estimated for accomplishing a task to the actual time spent implementing them. The tracker also includes other data such as change in velocity, overtime worked, and the ratio of passing tests to failing tests. It is the responsibility of the tracker to prepare good estimates of the tasks. Preparing good estimates is a matter of practice and feedback. The


5. Explain XP prerequisites. 5*2
Answer.
XP prerequisites
The following are the prerequisites for adopting XP:
·         Team agreement
·         A collocated team
·         On-site customers
·         The right team size
·         Use all XP practices


6. List and explain any five basic principles of DSDM 5*2
Answer.
Principles of DSDM
DSDM consists of nine basic principles. These principles form the cornerstones of development using DSDM and direct how development progresses. Ignoring any one of them will break with the frameworks philosophy and significantly increases project risks. The principles are as follows:
Get fully solved assignment, plz drop a mail with your sub code
computeroperator4@gmail.com
Charges rs 125/subject and rs 700/semester only.
our website is www.smuassignment.in
if urgent then call us on 08791490301, 08273413412