Sunday 24 September 2017

bba109 smu bba summer 2017 (oct/nov 2017 exam) Ist sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301

DRIVE Summer 2017
PROGRAM BBA109
SEMESTER I
SUBJECT CODE & NAME BBA109 QUANTITATIVE TECHNIQUES IN BUSINESS



1 What is a questionnaire? Discuss the main points that you will take into account while drafting a questionnaire.
Explanation of questionnaire.
Explanation of main points, which are taken into consideration while drafting a questionnaire.
Answer:
The „questionnaire‟ is a proforma containing a sequence of questions
relevant to a statistical enquiry. Since the questionnaire is the only medium
of

2 Write short notes on

·          Range
·          Quartile deviation
·          Average deviation
·          Standard deviation

Answer:

Range
It is the simplest method of studying dispersion. Range is the difference between the smallest value and the largest value of a series. While computing range, we do not take into account frequencies of different groups.
Formula:


3 a. Explain the meaning of Weighted Index Numbers.
b. Information of sales price per unit of different commodities for two different years is given in following table-
Commodities
2010
2016
Price
Quantity
Price
Quantity
A
15
4
20
5
B
24
6
28
8
C
16
4
25
4
D
32
8
30
12
E
35
3
32
4
F
8
2
15
3
Construct the Price Index taking 2010 as the base year and 2016 as the current year by following methods.
i. Laspeyre’s Price Index
ii. Paasche’s Method
iii. Dorbish and Bowley’s method
iv. Fisher’s Ideal Index Method

Answer: a) Weighted Index Number
In this method weights are assigned to various commodities according to their significance and consequently weighted index improves the accuracy of the index number as compared to the unweighted one. Usually the quantity consumed during the base year or the current year is taken as the

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301


mca5043 smu mca summer 2017 (oct/nov 2017 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject

PROGRAM-MCA(Revised Fall 2012)
SEMESTER-V
SUBJECT CODE & NAME-MCA5043– Data Warehousing and Data Mining
CREDIT-4
BK ID-B1633
MAX. MARKS-60
1. Explain the Functionalities and advantages of Data Warehouses. 5+5
Answer.
Functionalities and advantages of Data Warehouses
Functionalities
A data warehouse functions as a repository for all the data held by an organisation. The main functions are to reduce cost of data storage, facilitate data mining, and facilitate ability to back up data at an organisational level. A data warehouse is the main repository of an organization's historical data, its corporate memory.  A data warehouse is a


2 Explain the Top-Down and Bottom-up Data Warehouse development Methodologies.

Answer: Despite the fact that Data Warehouses can be designed in a number of different ways, they all share a number of important characteristics. Most Data Warehouses are Subject Oriented. This means that the information that is in the Data Warehouse is stored in a way that allows it to be connected to objects or event, which occur in reality. Another characteristic that is frequently seen in Data Warehouses is called Time Variant. A time variant Data Warehouse will allow changes in the information to be monitored and recorded over time. All the programs that are used by a



3. Describe about Hyper Cube and Multicube 5+5
Answer.
Hyper Cube and Multicube
Multidimensional databases can present their data to an application using two types of cubes: hypercubes and multicubes.
4. List and explain the Strategies for data reduction. 5*2
Answer.
Strategies for data reduction
Data reduction: Obtain a reduced representation of the data set that is much smaller in volume but yet produces the same (or almost the same) analytical results.
Why data reduction? —

5. Describe K-means method for clustering. List its advantages and drawbacks. 5+5
Answer.
K-means method for clustering
k-means clustering is a method of vector quantization, originally from signal processing, that is popular for cluster analysis in data mining. k-means clustering aims to partition n observations into k clusters in which each observation belongs to

6. Describe about Multilevel Databases and Web Query Systems 5+5
Answer.
Multilevel Databases and Web Query Systems
Multilevel Databases
A multilevel database system (MDBMS) supports the application of a multilevel policy for regulating access to the database objects. In
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject


mca5041 smu mca summer 2017 (oct/nov 2017 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

Mca5041
summer 2017
1 What is reflective middleware? Write its advantages.

Answer: Reflective middleware is also known as component-based middleware. A component is termed as a program that performs a particular function and is designed in such a manner that it can easily be


2 Define Client/server computing. In Client/server computing, list the responsibilities of client and server.

Answer: Client/server computing is technology that facilitates an organisation to effectively manage its

3 Describe about 3G. What are the typical 3G standards? List few applications used on a 3G network.

Answer: 3G, also called Tri-Band 3G, is a set of standards which is used for mobile telecommunication services and mobile devices related to the IMT-2000 specifications formulated by ITU. This standard is used to offer various services on cell phones, such as video calls, internet

4 Describe briefly:
a) HTTP
b) CGI
c) Servlet
d) RMI
e) Socket

Answer: a) HTTP
The Hypertext Transfer Protocol (HTTP) is a protocol for distributed, collaborative, information systems. In


5 Differentiate between Stateful and Stateless session bean

Answer: Stateful session beans are used where the state of the bean requires to be retained so that the same client can use it for further method invocations. A good example of a Stateful session bean is the shopping cart

6 Explain the different components of the Android operating system. What are native Android applications?

Answer: Some of the components used to develop an Android application are as follows:
·         Activities: It is implemented when an application has a visible user interface (UI).
·         Services: It


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


·          

mca5032 smu mca summer 2017 (oct/nov 2017 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject

PROGRAM - Master of Science in Information Technology(MSc IT)Revised Fall 2011
                                                                 SEMESTER - 4
SUBJECT CODE & NAME – Mca5032- WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4
BK ID - B1485
MARKS – 60

1 Describe any five GSM PLMN basic services.

Answer: 5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic answering machines used in wireless telephone network needs a controlling mechanism. For this purpose the GSM PLMN uses a tone signalling service called Dual-Tone Multifrequency. It facilitates subscribers with


Q2. Describe wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of


Q3. Differentiate BSC and MSC protocols. 10
Ans: BSC protocols: Once the information is communicated from the BTS to the BSC, the Abis
interface is used to communicate further the information between the BTS and BSC. At this level, the radio resources at the lower portion of Layer 3 are handled by the Base Transceiver Station Management (BTSM) protocol rather than the RR protocol. The BTSM layer acts as a relay function at the BTS to communicate to the BSC in the GSM architecture. The major

Q4. What is CDMA? Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be introduced to the concept of CDMA, its channel concept and its operation. Code Division Multiple Access technology emerged as an alternative to the GSM cellular architecture. Frequency reuse is an important concept in wireless systems, particularly cellular systems. Propagation losses allow frequency bands to be reused in geographically separated locations. Code Division Multiple Access (CDMA) is a cellular technology and it acts an important driving force for wireless networks around the globe. CDMA is the development hotspot in many countries around the world and is an advanced multi-access mode, with a broad application perspective. It competes with GSM technology for dominance in the cellular world. CDMA belongs to third generation of cellular networks there are now different variations, but


Q5. Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans: A5 Algorithm – An A5 encryption algorithm scrambles the user's voice and data traffic between the handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being transmitted on the Um interface. The Kc (ciphering key) and the
plaintext data are inputted

Q6. List and explain the different path loss models. 10
Ans: Path Loss Models: Path loss models describe the signal attenuation between a transmit and a receive antenna as a function of the propagation distance and other parameters. Some models include many details of the topography profile to estimate the signal reduction, whereas others just consider carrier frequency and distance. Path loss is the reduction in power density of an electromagnetic wave as it propagates through space. It is a major component in the analysis and design of the link budget of a telecommunication

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject