Quantcast
Channel: SMU MBA SOLVED ASSIGNMENTS
Viewing all 1256 articles
Browse latest View live

MB0050 – RESEARCH METHODOLOGY

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

DRIVE SUMMER 2016
PROGRAM MBADS/ MBAFLEX/ MBAHCSN3/ MBA – SEM 3

PGDBMN/ PGDENMN/ PGDFMN/ PGDHRMN/ PGDHSMN/ PGDIB/ PGDISMN/ PGDMMN/ PGDOMN/ PGDPMN/ PGDROMN/ PGDSCMN/ PGDTQMN

SEMESTER Semester 1
SUBJECT CODE & NAME MB0050 – RESEARCH METHODOLOGY
BK ID B1700
CREDITS 4
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

Question. 1. Explain the four types of experimental designs.

 

Answer:Pre-experimental designs:Randomly assigning participants to different design treatments and/or a control in a research study is an experimental design. For example, we recently wanted to know which of three designs on an ecommerce checkout page users would understand the most when deciding how to ship or pick up their products in a store. We created three shipping scenarios to test the three designs (two independent variables) and used the dependent variables of accuracy, perceived difficulty, confidence and time.

 

 

 

Question. 2. Briefly explain the concepts of reliability, validity and sensitivity.

 

Answer:Performance testing is one of the most common and important measures used in sports science and physiology. Performance tests allow for a controlled simulation of sports and exercise performance for research or applied science purposes. There are three factors that contribute to a good performance test: (i) validity; (ii) reliability; and (iii) sensitivity. A valid protocol is one that resembles the performance that is being simulated as closely as

 

Question. 3. What are the advantages and disadvantages of the questionnaire method? Illustrate with suitable examples.

 

Answer:A questionnaire is a research instrument consisting of a series of questions and other prompts for the purpose of gathering information from respondents. Although they are often designed for statistical analysis of the responses, this is not always the case. The questionnaire was invented by the Statistical Society of London in 1838. A copy of the instrument is published in the Journal of the Statistical Society, Volume 1, Issue 1,

 

 

 

Question. 4. What is data editing? Mention its significance.

 

Answer:Data editing is defined as the process involving the review and adjustment of collected survey data. The purpose is to control the quality of the collected data. Data editing can be performed manually, with the assistance of a computer or a combination of both.

 

  • Editing methods
  • Interactive editing

 

The term interactive editing is commonly used

 

 

 

Question. 5. Differentiate between descriptive and inferential analysis of data.

 

Answer:When analysing data, such as the marks achieved by 100 students for a piece of coursework, it is possible to use both descriptive and inferential statistics in your analysis of their marks. Typically, in most research conducted on groups of people, you will use both descriptive and inferential statistics to analyse your results and draw conclusions. So what are descriptive and inferential statistics? And what are their differences?

 

Descriptive Statistics: Descriptive statistics

 

 

 

 

Question. 6. Explain the Structure of the Research Report. What are the guidelines for effective report writing?

 

Answer:The reporting requires a structured format and by and large, the process is standardized. As stated above, the major difference amongst the types of reports is that all the elements that make a research report would be present only in a detailed technical report. Usage of theoretical and technical jargon would be higher in the technical report and visual presentation of data would be higher in the management report.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 



MB0051-Legal Aspects of Business

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

DRIVE SPRING 2015
PROGRAM MBADS/ MBAFLEX/ MBAHCSN3/ MBA – SEM 3

PGDBMN/ PGDENMN/ PGDFMN/ PGDHRMN/ PGDHSMN/ PGDIB/ PGDISMN/ PGDMMN/ PGDOMN/ PGDPMN/ PGDROMN/ PGDSCMN/ PGDTQMN – SEM 1

SUBJECT CODE & NAME MB0051-Legal Aspects of Business
CREDIT 4
BK ID B1725
MAX.MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

Question. 1. What are the rights of a surety?

 

 

Answer:Rights of Surety can be classified into three groups, as follows;

  • Rights against Principal debtor.
  • Rights against Creditor.

 

 

 

Question.2. Explain duties of a Bailor and a Bailee.

 

Answer:Rights of Bailer

 

  • If bailee does not take care and destruction of goods takes place, bailer can claim compensation.
  • If bailee uses the goods for un-authorized purposes, bailer has the right to claim compensation.
  • Bailer has the right to claim return of goods.
  • Bailer has right to claim not only delivered goods but also accruals on goods if any.
  • In case where bailee has mixed the goods and they are of sufferable nature, bailer can claim cost of separation from bailee.

 

 

 

Question.3. “Power of Attorney is considered as an important concept in Business Law”. Explain

 

Answer: A power of attorney (POA) or letter of attorney is a written authorization to represent or act on another’s behalf in private affairs, business, or some other legal matter, sometimes against the wishes of the other. The person authorizing the other to act is the principal, grantor, or donor (of the power). The one authorized to act is the agent or, in some common law jurisdictions, the attorney-in-fact (attorney for short). Formerly, a power referred to an instrument under seal while a letter was an instrument under hand, but today both are signed by the grantor, and

 

 

 

Question.4. “The Banking Regulation Act, 1949, provides various methods of regulation of the banking business”. Describe the key areas of regulation.

 

Answer:The Banking Regulation Act, 1949 is a legislation in India that regulates all banking firms in India. Initially, the law was applicable only to banking companies. But, 1965 it was amended to make it applicable to cooperative banks and to introduce other changes.

 

The Act provides a framework using which commercial

 

 

 

 

Question.5. Explain the nature and scope of complaints under the Consumer Protection Act?

 

Answer:When the Consumer Protection Act was initially enacted in 1986, goods purchased for commercial purpose (excluding those purchase for earning one’s livelihood) were excluded from the purview of the Act. Yet, surprisingly services availed or hired

 

 

 

Question.6. Explain the need and types of meetings.

 

Answer:Need for meeting: Meetings are the most misused tool in a leader’s communications toolkit. In most instances, meetings are used by executive leadership as a first response to most situations unnecessarily. X has just happened so we need to call a meeting, or we need to meet to talk about Y. If leaders took the time to peruse their communications toolkits they would discover they have a number of tools that would be much more effective than having a meeting. A meeting is called to assemble a number of people for a defined singular purpose. The meeting

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 


MF0015 – INTERNATIONAL FINANCIAL MANAGEMENT

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

 

DRIVE SUMMER 2016
PROGRAM MBADS – (SEM 4/SEM 6) / MBAN2 / MBAFLEX – (SEM 4) /

PGDFMN – (SEM 2)

SUBJECT CODE & NAME MF0015 – INTERNATIONAL FINANCIAL MANAGEMENT
SEMESTER 4
BK ID B1759
CREDITS 4
MARKS 60

 

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme

 

Q1 Explain Globalization, Advantages of Globalization and Disadvantages of Globalization.

Answer: By the term globalisation we mean opening up of the economy for world market by attaining international competitiveness. Thus the globalisation of the economy simply indicates interaction of the country relating to production, trading and financial transactions with the developed industrialized countries of the world.

 

 

 

 

 

 

Q2 In foreign exchange market many types of transactions take place. Discuss the meaning and role of forward, future and options market.

Answer: : In finance, a forward contract or simply a forward is a non-standardized contract between two parties to buy or to sell an asset at a specified future time at a price agreed upon today, making it a type of derivative instrument. This is in contrast to a spot contract, which is an agreement to buy or sell an asset on its Spot Date, which may vary depending on the instrument, for example most of the FX contracts have Spot Date two business

 

 

Q3 Explain Swap, its features and types of Swap.

 

Answer: A swap is an agreement between two parties to exchange sequences of cash flows for a set period of time. Usually, at the time the contract is initiated, at least one of these series of cash flows is determined by a random or uncertain variable, such as an interest rate, foreign exchange rate, equity price or commodity price. Conceptually, one may

 

 

 

 

Q4 Explain in detail the types of exposure and measuring economic exposure

 

Answer: Types of Exposure

 

Translation Exposure

 

Translation exposure is also referred to as accounting exposure or balance sheet exposure. The restatement of foreign currency financial statements in terms of a reporting currency is termed translation. The exposure arises from the periodic need to report consolidated worldwide operations of a group in one reporting currency and to give some indication of the financial position of that group at those times in that currency.

 

 

 

 

 

Q5 Elaborate on the tools of foreign exchange risk management and techniques of exposure management.

 

Answer: Foreign exchange risk (also known as FX risk, exchange rate risk or currency risk) is a financial risk that exists when a financial transaction is denominated in a currency other than that of the base currency of the company. Foreign exchange risk also exists when the foreign subsidiary of a firm maintains financial statements in a currency other than the reporting currency of the consolidated entity. The risk is that there may be an adverse movement in the exchange rate of the denomination currency in relation to the base currency before the date when the transaction is completed.[1][2] Investors and businesses

 

 

 

 

Q6 Write short note on:

 

  1. Adjusted present value model (APV model)

 

Answer: Adjusted Present Value Definition

 

Adjusted present value (APV), defined as the net present value of a project if financed solely by equity plus the present value of financing benefits, is another method for evaluating investments. It is similar to NPV. The difference is that is uses the cost of equity as the discount rate rather than WACC. And APV includes tax shields

 

 

 

 

 

 

 

 

  1. Economic and political risk

 

Answer: Meaning and definition of economic risk

 

Generally speaking, economic risk can be described as the likelihood that an investment will be affected by macroeconomic conditions such as government regulation, exchange rates, or political stability, most commonly one in a foreign country. In other words, while financing a project, the risk that the output of the project will not

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 


MF0016 & TREASURY MANAGEMENT

$
0
0

 

                Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

 

 

DRIVE SUMMER 2016
PROGRAM MBADS (SEM 4/SEM 6) MBAFLEX/ MBA (SEM 4) PGDFMN (SEM 2)
SUBJECT CODE &

NAME

MF0016 & TREASURY MANAGEMENT
BK ID B1814
CREDITS 4
MARKS 60

 

 

1 Give the meaning of treasury management. Explain the need for specialized handling of treasury and benefits of treasury.

Answer : Treasury management is the administration of a company’s cash flow as well as the creation and governance of policies and procedures that ensure the company manages risk successfully.

 

Treasury management is the creation and governance of policies and procedures that ensure the company manages financial risk successfully.

 

Because a primary function of treasury management is to establish levels for cash or cash equivalents so that a company can meet its financial obligations on time, treasury management is sometimes simply referred to as cash management.

 

 

 

2 Explain foreign exchange market. Write about all the types of foreign exchange markets. Explain the participants in foreign exchange markets.

 

Answer : The foreign exchange currency markets allow buying and selling of various currencies all over the world. Business houses and banks can purchase currency in another country in order to do business in that particular company. The forex market also known as FX market has a worldwide presence and a network of different currency traders who work around the clock to complete these forex transactions, and their work drives the exchange rate for currencies around the world. Since the foreign exchange currency market is one of the biggest markets of the world, the market is sub divided into different kinds of foreign exchange market. There are different features and characteristics associated with the different foreign exchange markets have different trading characteristics. The main three types of

 

 

 

  1. Write an overview of risk mitigation. Explain the processes of risk containment. Write about the tools available for managing risks.

Answer : Risk mitigation planning is the process of developing options and actions to enhance opportunities and reduce threats to project objectives. Risk mitigation implementation is the process of executing risk mitigation actions. Risk mitigation progress monitoring includes tracking identified risks, identifying new risks, and evaluating risk process effectiveness throughout the project.

 

Process of risk containment:

 

Risk Assessment

The goal of risk assessment is to identify the risk factors that are a part of the activity being undertaken. Basically, it’s about working out what could go wrong. For example, the task could be attending a client meeting. The possible risk factors would include

 

 

 

4 What is Interest Rate Risk Management (IRRM)? Write the components and features of IRRM. Explain the macro and micro factors affecting interest rate.

Answer : Interest rate risk (IRR) is defined as the potential for changing market interest rates to adversely affect a bank’s earnings or capital protection. Two previous issues of Community Banking Connections included articles on IRR management for community banks.1 The first article provided an overview of key elements of an IRR management program and common pitfalls faced at community banks. The second article focused more attention on directors’ and senior managers’ specific responsibilities, including development of sound policies and IRR exposure limits. In this article, the discussion proceeds to IRR measurement issues, including the appropriateness of certain measures and some of the challenges faced in modeling risk exposures.

 

 

5 Explain the contents of working capital. Write down the need for working capital.

 

Answer : Working capital is the life blood and nerve center of business. Working capital is very essential to maintain smooth running of a business. No business can run successfully without an adequate amount of working capital.

 

Contents of working capital:

 

  • Needs that are Short Term: Working capital is being utilized in acquiring current assets which will be converted to cash for a short period only.
  • Circular Movement: Working capital is being converted to cash constantly which will just be turned as a working capital all over again.
  • Permanency: Although it is just a kind of short term capital, working capital is needed by a business forever and always.

 

 

6 Explain the concepts and benefits of integrated treasury. Explain the advantages and disadvantages of operating treasury.

 

Answer : Integrated Treasury basically does the same thing as the traditional Treasury i.e. effective management of the funds. The difference is that the Integrated Treasury paints on a wider canvas. It is necessary that the Treasury has an eye on every market of the world, and every type of financial market in the country. Funds have to be moved from one sector to another to achieve maximum returns. With the full current account convertibility and financial sector reforms, the Indian corporates are also able to achieve this. Integrated

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 


MF0017 – MERCHANT BANKING AND FINANCIAL SERVICES

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

MF0017 & MERCHANT BANKING AND FINANCIAL

 

 

ASSIGNMENT

 

DRIVE SUMMER 2016
PROGRAM MBADS – (SEM 4/SEM 6) / MBAN2 / MBAFLEX – (SEM 4) /

PGDFMN – (SEM 2)

SUBJECT CODE & NAME MF0017 – MERCHANT BANKING AND FINANCIAL SERVICES
SEMESTER 4
BK ID B1815
CREDITS 4
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

1 Rating methodology is used by the major Indian credit rating agencies. Explain the main factors of that are analyzed in detail by the credit rating agencies.

Answer : A Credit Rating issued by a credit rating agency is an assessment of the credit worthiness of individual financial securities (For example, a bond) and debt issued by corporations, government issued securities or even a country’s ability to repay debt.

Credit Ratings are assigned by rating agencies to companies and debt instruments, are designed to gauge the likelihood that a company will default on its obligations to creditors. Thus, they give investors a rough idea of the risk associated with loaning money to the entity being rated.

Credit ratings are forward-looking opinions about credit risk. It express the agency’s opinion about the ability and willingness of an issuer, such as

 

 

2 Give the meaning of the concept of venture capital funds. Explain the features of venture capital fund.

 

Answer : Venture Capital Funding can be of different kinds. Early stage funding could be at the stage of ideation, initial production and marketing. Expansion funding is done during commercial production, marketing and growth (For more information refer to the article – Stages of Venture Capital Funding). Different funds focus on different types of funding and sectors. There are however some unifying characteristics of venture capital funds.

Features of venture capital funds

 

 

3 Hire purchase is one of the important concept. There are certain features of hire purchase agreement so explain the points of it. Differentiate between hire purchase and leasing.

 

Answer : Meaning and characteristics of hire purchase finance :

A method of buying goods through making installment payments over time. The term hire purchase originated in the U.K., and is similar to what are called “rent-to-own” arrangements in the United States. Under a hire purchase contract, the buyer is leasing the goods and does not obtain ownership until the full amount of the contract is paid. The characteristics of hire-purchase system are as under

  • Hire-purchase is a credit purchase.
  • The price under hire-purchase system

 

 

4 Explain the concept of Depository receipts. Write down the difference between American Depository Receipts (ADR) and Global Depository Receipts (GDR) also mention the issues involved in ADR/GDR.

Answer : A DR is a type of negotiable (transferable) financial security traded on a local stock exchange but represents a security, usually in the form of equity, issued by a foreign, publicly-listed company. The DR, which is a physical certificate, allows investors to hold shares in equity of other countries. One of the most common types of DRs is the American depository receipt (ADR), which has been offering companies, investors and traders global investment opportunities since the 1920s.

Since then, DRs have spread to other parts of the globe in the form of global depository receipts (GDRs). The other most common type of DRs are European DRs and International DRs. ADRs are typically traded on a US national stock exchange

 

 

  1. What is Online Trading? Explain the process of online trading.

Answer : The trade in stocks and other instruments has been there for many years. It used to be done physically with stock traders shouting their orders in a crowded hall. With technological advancement, online trading has become common. Now you can make a fortune buying and selling stock from the comfort of your home using a computer.

 

Open a Broker Account

Choose a suitable online broker. A brokerage firm will be trading stock on your behalf. It normally charges a fee in form of a percentage of the traded stock. You should choose a brokerage firm wisely. If you plan to be an active trader, you should look for a broker with low fees. If you plan to buy only one stock and keep it, you should bear in mind that some brokerage firms charge a fee for inactivity over a certain period of time. It will be

 

 

6Write short notes on:

a.Depository Participants

 

Answer : A Depository refers to “An organization that facilitates holding of securities in the electronic form and enables DPs to provide services to investors relating to transaction in securities”.

A Depository Participant (DP) can be a financial organization like banks, brokers, financial institutions, custodians, etc., acting as an agent of the Depository to make its services available to the investors.

There are two depositories in India, namely NSDL and CDSL.

 

 

 

b.Benefits of Depository Systems

 

Answer : In the depository system, share certificates belonging to the investors are dematerialized and their names are entered in the records of depositary as beneficial owners. Investors’ names in the companies register are replaced by the name of depository as the registered owner of the securities. The beneficial owner continues to enjoy all the rights and benefits and be subject to all the liabilities in respect of the securities held by the depository. The ownership changes in, the depositary are done automatically on the basis of delivery vs. payment.

 

The investors opting to join depository mode are required to enter into agreement with depository through a participant who acts as an agent of

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 


MF0018 – INSURANCE AND RISK MANAGEMENT

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

DRIVE SUMMER 2016
PROGRAM MBADS – (SEM 4/SEM 6) / MBAN2 / MBAFLEX – (SEM 4) /

PGDFMN – (SEM 2)

SUBJECT CODE & NAME MF0018 – INSURANCE AND RISK MANAGEMENT
SEMESTER 4
BK ID B1816
CREDITS 4
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

Q1 Explain price risk and its types. Explain Risk management methods

 

Answer : Price risk is the risk of a decline in the value of a security or a portfolio. Price risk is the biggest risk faced by all investors. Although price risk specific to a stock can be minimized through diversification, market risk cannot be diversified away. Price risk, while unavoidable, can be mitigated through the use of hedging

 

 

 

 

Q2 An organization is a legal entity which is created to do some activity of some purpose. There are elements of a life insurance organization. Explain the elements of life insurance organization.

 

Answer : Elements of a Life Insurance Organization An ‘organization’ is a legal entity which is created to do some activity or to achieve some purpose. It is created under some law, which gives it a status and identity. Because of the identity, the organization is considered to be a person in law. Therefore, it can enter into contracts, be sued in courts, accumulate property and wealth, and do business, in the same manner as any individual can do.

 

Important activities

 

 

 

Q3 Explain the doctrine of indemnity, doctrine of subrogation and warranties and its types and classification.

 

Answer : Principle of indemnity:

 

Indemnity means security or compensation against loss or damage. The principle of indemnity is such principle of insurance stating that an insured may not be compensated by the insurance company in an amount exceeding the insured’s economic loss.

 

In type of insurance the insured would be

 

 

 

Q4 Give short notes on :

 

  1. a) Evidence and claim notice.

 

Answer : Claim: This is the central argument or thesis to your paper. You will have one major claim in your introductory

 

 

 

 

  1. b) Subrogation

 

Answer : Subrogation is defined as a legal right that allows one party (e.g., your insurance company) to make a payment that is actually owed by another party (e.g., the other driver’s insurance company) and then

 

 

 

 

  1. c) Salvage

Answer : The amount for which an asset can be sold at the end of its useful life. In insurance circles, this term commonly refers to the scrap value of damaged property. In property insurance, salvage value (e.g., scrap value) will be subtracted from any loss settlement if the insured retains the damaged property

 

 

 

 

Q5 Explain the marketing mix (7 P’s) for insurance companies

 

Answer : The service marketing mix is also known as an extended marketing mix and is an integral part of a service blueprint design. The service marketing mix consists of 7 P’s as compared to the 4 P’s of a product marketing mix. Simply said, the service marketing mix assumes the service as a product itself. However it adds 3 more P’s which are

 

 

 

Q6 Explain the benefits of reinsurance. Elaborate on the application of reinsurance.

 

Answer : Benefits of Reinsurance

 

Reinsurance is an essential tool used for managing risk. Different from the common insurance that protects people from monetary loss, reinsurance offers protection to the main insurance company against financial loss. Find benefits of reinsurance discussed below.

 

  1. Protects insurance companies

Just like other people who seek the protection of an

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 


MK0012 –Retail Marketing

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

 

ASSIGNMENT

 

 

DRIVE SPRING 2016
PROGRAM Master of Business Administration- MBA
SEMESTER Semester 3
SUBJECT CODE & NAME MK0012 –Retail Marketing
BK ID B1723
CREDIT & MARKS 4 Credits, 60 marks

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

Question. 1. How Retail formats can be classified? Elucidate your answer with example.

 

Answer:Retailers are the last link in the distribution channel and they perform various important functions, which are as follows:

 

(a)  Uninterrupted Supply – A retailer ensures continuous supply of products to consumers. He purchase goods in large quantity, breaks the bulk and sell in small segments to final users.

(b)  Large Variety – Retailers buy merchandise from different sources and provide a wide variety to consumers.

(c)  Financing – Some retailers provide credit facility to consumers.

(d)  Transportation – Retailers carry goods from

 

 

 

 

 

Question. 2. Define target marketing & what can be different types of target markets for retailers?

 

Answer:A target market is a group of customers a business has decided to aim its marketing efforts and ultimately its merchandise towards. A well-defined target market is the first element of a marketing strategy. Product, price, promotion, and place are the four elements of a marketing mix strategy that determine the success of a product or

 

 

 

 

 

Question. 3. Briefly discuss different types of retail store locations? What are their advantages & disadvantages?

 

Answer:A multiple shop system is a network of branch shops, situated at different localities in the city or in different parts of the country, under a centralised management and dealing in similar lines of goods. Such multiple shops are very common and popular in the West and are known as CHAIN STORES. According to J.L. Fri, “Chain stores are a group of stores handling similar lines of merchandise with single ownership and centralised location.”

 

The Federal Trade Commission defines a chain store as “an organisation owing a controlling interest in two or more establishments which sell

 

 

 

Question. 4. Explain the concept of merchandise management?

 

Answer: In the fierce competition of retail, it is very crucial to attract new customers and to keep the existing customers happy by offering them excellent service. Merchandising helps in achieving far more than just sales can achieve.

 

Merchandising is critical for a retail business. The retail managers must employ their skills and tools to streamline the merchandising process as smooth as possible.

 

What is Merchandising?

 

 

 

 

Question. 5. Describe Integrated Marketing Communication (IMC).Discuss the reasons for implementing IMC.

 

Answer:Integrated Marketing Communications (IMC) is an expansion of modern and traditional marketing strategies, to optimise the communication of a consistent message conveying the company’s brands to stakeholders. Coupling various methods together is added value in creating successful communication as it harnesses the individual benefits of each channel, which when combined together builds a clearer and vaster impact than if used individually. Achieving synergy and clarity amongst the elements is then able to

 

 

 

 

Question. 6. Write short notes on:

 

  1. a) Market entry method

 

Answer:A market entry strategy is the planned method of delivering goods or services to a new target market and distributing them there. When importing or exporting services, it refers to establishing and managing contracts in a foreign country.

 

Many companies successfully operate

 

 

 

  1. b) E-tailing

 

Answer:E-tailing began to work for some major corporations and smaller entrepreneurs as early as 1997 when Dell Computer reported multimillion dollar orders taken at its Web site. The success of Amazon.com hastened the arrival of Barnes and Noble’s e-tail site. Concerns about secure order-taking receded. 1997 was also the year in which Auto-by-Tel reported that they had sold their millionth car over the Web, and CommerceNet/Nielsen Media reported that 10 million people had made purchases on the Web. Jupiter research predicted that e-tailing would grow to $37 billion by 2002.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 


MK0013-Marketing Research

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

DRIVE SUMMER  2016
PROGRAM MBADS (SEM 3/SEM 5),MBAFLEX/ MBA (SEM 3)
SUBJECT CODE & NAME MK0013-Marketing Research
BK ID B 1711
CREDIT & MARKS 4 Credits, 60 marks

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

Question.1. What do you mean by research? State some of its characteristics.

 

Answer:Research comprises “creative work undertaken on a systematic basis in order to increase the stock of knowledge, including knowledge of humans, culture and society, and the use of this stock of knowledge to devise new applications.” It is used to establish or confirm facts, reaffirm the results of previous work, solve new or existing problems, support theorems, or develop new theories. A research project may also be an expansion on past work in the field. To test the validity of instruments, procedures, or experiments, research may

 

 

 

 

Question. 2.Why you must plan before you start researching on a topic?

 

Answer:A dissertation is a particular kind of academic task. You will usually be asked to generate a topic for yourself; to plan and execute a project investigating that topic; and to write-up what you did and what your findings were. Important stages in the dissertation process include:

 

  • Choosing a topic;
  • Developing a research question;
  • Effective planning of the research;
  • Being organised and methodical while conducting

 

 

Question. 3.Write short notes on:

 

  1. a) Exploratory research design

 

Answer:Exploratory research is research conducted for a problem that has not been clearly defined. It often occurs before we know enough to make conceptual distinctions or posit an explanatory relationship. Exploratory research helps determine the best research design, data collection method and selection of subjects. It should draw definitive conclusions only with extreme caution. Given its fundamental nature, exploratory research often concludes that a perceived problem does not actually exist.

 

 

 

 

  1. b) Conclusive research design

 

Answer:Conclusive research design, as the name implies, is applied to generate findings that are practically useful in reaching conclusions or decision-making. Conclusive research design usually involves the application of quantitative methods of data collection and data analysis. Moreover, conclusive studies tend to be deductive in nature and research objectives in these types of studies are achieved via testing hypotheses.

 

 

 

Question.4.Define the term ‘sampling’ and explain the importance of sampling in marketing research.

 

Answer:Brooke is a psychologist who is interested in studying how much stress college students face during finals. She works at a university, so she is planning to send out a survey around finals time and ask some students to rank on a scale of 1 to 5 how stressed out they are.

 

But which students should she survey? All of the students at the university?Only the students in the psychology department?Only freshmen? There are a

 

 

 

 

Question.5. Analyse the steps involved in hypothesis testing.

 

 

Answer:A hypothesis test is a statistical test that is used to determine whether there is enough evidence in a sample of data to infer that a certain condition is true for the entire population.

 

A hypothesis test examines two opposing hypotheses about a population: the null hypothesis and the alternative hypothesis. The null hypothesis is the

 

 

 

 

Question.6.What are the characteristics of a report?

 

Answer:When you write a business report, focus on the subject at hand. Information included in the document should be accurate, relevant and informative to its readers. When reading a report to gain a deeper understanding of an issue, a businessperson shouldn’t have to sift through paragraphs of filler content. A good report speaks to the reader in terms she can understand.

 

Clearly Defined Purpose: The purpose of a report should be clear to the reader from the beginning. The purpose should be stated in the title of the report if possible and included in the introduction. Identify whether the intent is to persuade the reader to do

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 



MCA 4030 – PROGRAMMING IN JAVA

$
0
0

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

 

FALL 2016, ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER 1
SUBJECT CODE & NAME MCA 4030 – PROGRAMMING IN JAVA
CREDIT 4
BK ID B1477
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

1 Describe the following:

 

  1. a) Multi-threading.

Answer : Multithreading in java is a process of executing multiple threads simultaneously.

 

Thread is basically a lightweight sub-process, a smallest unit of processing. Multiprocessing and multithreading, both are used to achieve multitasking.

 

But we use multithreading than multiprocessing because threads share a common memory area. They don’t allocate

 

 

  1. b) Significance of Java Bytecode

 

Answer : Java is build on WODA (Write Once Deploy Anywhere) principle. This means you don’t have to tweak a Java source code if you want to deploy it in another OS. But at the end of the day, java programs need a JVM to run on and JVM being machine language specific cannot be platform-neutral. So, we

 

 

2 Differentiate Break and Continue statements in Java with example program.

 

Answer : A break statement when applied to a loop ends the statement. A continue statement ends the iteration of the current loop and returns the control to the loop statement. If the break keyword is followed by an identifier that is the label of a random enclosing statement, execution transfers out of that enclosing statement. If the continue keyword is followed by an identifier that is the label of an enclosing loop, execution skips to the end of that loop instead.

 

break: breaks the current loop and moves the cursor to next line after the loop

e.g.

 

 

 

3 Differentiate between packages and Interfaces.

 

Answer : Packages

Definition:  A package is a grouping of related types providing access protection and name space management. Note that types refers to classes, interfaces, enumerations, and annotation types. Enumerations and annotation types are special kinds of classes and interfaces, respectively, so types are often referred to in this lesson simply as classes and interfaces.

 

Creating a Package:

 

 

 

4 What are Applets? What are the restrictions of Applets? Describe about applet class.

 

Answer : What is an Applet in Java ?

An Applet is a small java program that runs in a Java enabled web browser. Java Applet is a small piece of java code that is embedded into HTML page, which gets executed when the HTML page loads into the browser.Applets provide powerful client-side functionality. As applets are loaded from remote machines and executed on client-side, there are various security restrictions on applets. –

 

Applets Restrictions

Applets have many restrictions over the

 

 

 

5 Compare JDBC and ODBC

 

Answer : Typically, software applications are written in a specific programming language (such as Java, C#, etc.), while databases accept queries in some other database specific language (such as SQL). Therefore, when a software application needs to access data in a database, an interface that can translate languages to each other (application and database) is required. Otherwise, application programmers need to learn and

 

 

 

6 Describe about Java Beans and BeanBox.

 

Answer : A Java Bean is a reusable software component that can be manipulated visually in an application builder tool.  The idea is that one can start with a collection of such components, and quickly wire them together to form complex programs without actually writing any new code.

Software components must, in general, adopt standard techniques for interacting with the rest of the world.  For example, all GUI components inherit the java.awt.Component class, which means that one can rely on them to have certain standard methods like paint(), setSize(), etc.  Java Beans are not actually required to inherit a

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 


MCA4040- ANALYSIS AND DESIGN OF ALGORITHM

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

[ SUMMER 2015 ] ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER 4
SUBJECT CODE & NAME MCA4040- ANALYSIS AND DESIGN OF ALGORITHM
CREDIT 4
BK ID B1480
MARKS 60

 

 

Answer all questions

  1. 1. Write the steps involved in analyzing the efficiency of non-recursive algorithms.

 

Answer:The study of algorithms is called algorithmics. It is more than a branch of computer science. It is the core of computer science and is said to be relevant to most of science, business and technology. An algorithm is a sequence of unambiguous instructions for solving a problem, i.e., for obtaining a required output for any legitimate input in finite amount of time.

 

The three algorithms used to find the gcd of two numbers are

 

  • Euclid’s algorithm
  • Consecutive integer

 

 

 

 

  1. 2. Define selection sort and explain how to implement the selection sort?

 

Answer:In computer science, selection sort is a sorting algorithm, specifically an in-place comparison sort. It has O(n2) time complexity, making it inefficient on large lists, and generally performs worse than the similar insertion sort. Selection sort is noted for its simplicity, and it has performance advantages over more complicated algorithms in certain situations, particularly where auxiliary memory is limited.

 

The algorithm divides the input list into two parts: the sublist of items already sorted, which is built up from left to right at the front (left) of the list, and

 

 

 

 

 

 

 

  1. 3. Define Topological sort. And explain with example.

 

Answer:In computer science, a topological sort (sometimes abbreviated topsort or toposort) or topological ordering of a directed graph is a linear ordering of its vertices such that for every directed edge uv from vertex u to vertex v, u comes before v in the ordering. For instance, the vertices of the graph may represent tasks to be performed, and the edges may represent constraints that one task must be performed before another; in this application, a topological ordering is just a valid sequence for the tasks. A topological ordering is possible if and only if the graph has no directed cycles, that is, if it is a directed acyclic

 

 

 

 

  1. 4. Explain good-suffix and bad-character shift in Boyer-Moore algorithm.

 

Answer:In computer science, the Boyer–Moore string search algorithm is an efficient string searching algorithm that is the standard benchmark for practical string search literature. It was developed by Robert S. Boyer and J Strother Moore in 1977. The algorithm preprocesses the string being searched for (the pattern), but not the string being searched in (the text). It is thus well-suited for applications in which the pattern is much shorter than the text or where it persists across multiple searches. The Boyer-Moore algorithm uses information gathered during the preprocess step to skip sections of the text, resulting in a lower constant factor than many other string algorithms. In general, the algorithm runs faster

 

 

 

 

  1. 5. Solve the Knapsack problem using memory functions.

Item 1 2 3 4

Weight 2 6 4 8

Value (in Rs.) 12 16 30 40

Knapsack capacity is given as W=12. Analyze the Knapsack problem using memory functions with the help of the values given above.

 

Answer:The classical Knapsack Problem (KP) can be described as follows. We are given a set N={1,…,n} of items, each of them with positive profit pj and positive weight wj, and a knapsack capacity c. The problem asks for a subset of items whose total weight does not exceed the knapsack capacity, and whose profit is a maximum. It can be formulated as the following Integer Linear Program (ILP):

(KP)max∑j∈Npjxj(1)

 

 

 

 

  1. 6. Describe Variable Length Encoding and Huffman Encoding.

 

Answer:Variable Length Encoding:In coding theory a variable-length code is a code which maps source symbols to a variable number of bits.Variable-length codes can allow sources to be compressed and decompressed with zero error (lossless data compression) and still be read back symbol by symbol. With the right coding strategy an independent and identically-distributed source may be compressed almost arbitrarily close to its entropy. This is in contrast to fixed length coding methods, for which data compression is only possible for large blocks of data, and any compression beyond the logarithm of the total number of possibilities comes with a finite (though perhaps arbitrarily small) probability of failure.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 


MCA4010- MICROPROCESSOR

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER FOURTH
SUBJECT CODE & NAME MCA4010- MICROPROCESSOR
CREDITS 4
BK ID B1778
MAX. MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

  1. 1. Write short notes on:

 

  1. a) Central Processing Unit

 

Answer:The central processing unit (CPU) of a computer is a piece of hardware that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system. The

 

 

  1. b) Memory Unit

 

Answer:In computing, memory refers to the computer hardware devices used to store information for immediate use in a computer; it is synonymous with the term “primary storage”. Computer memory operates at a high speed, for example random-access memory (RAM), as a distinction from storage that provides slow-to-access program and data storage but offers higher capacities. If needed, contents of the computer memory can be transferred to secondary storage, through a memory management technique called “virtual

 

 

Most semiconductor memory is organized into memory cells or bistable flip-flops, each storing one bit (0 or 1). Flash memory organization includes both one bit per memory cell and multiple bits per cell (called MLC,

 

 

 

 

  1. 2. Write short notes on:

 

  1. a) Bus Interface Unit (BIU)

 

Answer:In computer architecture, a bus (related to the Latin “omnibus”, meaning “for all”) is a communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.) and software, including

 

  1. b) Execution Unit (EU)

 

Answer:In computer engineering, an execution unit (also called a functional unit) is a part of the central processing unit (CPU) that performs the operations and calculations as instructed by the computer program. It may have its own internal control sequence unit, which is not to be confused with the CPU’s main control unit, some registers, and other internal units such as a sub–arithmetic logic unit (sub-ALU) or a floating point unit (FPU), or some smaller and more specific components.  It is common for modern

 

 

 

 

  1. 3. Write short notes on:

 

  1. a) REP Prefix

 

Answer:If the direction flag is clear, the CPU increments ESI and EDI after operating upon each string element. For example, if the direction flag is clear, then executing MOVS will move the byte, word, or double word at ESI to EDI and will increment ESI and EDI by one, two, or four. When specifying the REP prefix before this instruction, the CPU increments ESI and EDI for each element in the string. At completion, the ESI and EDI registers will be pointing at the first item beyond the strings.

 

 

 

  1. b) Table Translation

 

Answer:A translation lookaside buffer (TLB) is a cache that memory management hardware uses to improve virtual address translation speed. The majority of desktop, laptop, and server processors includes one or more TLBs in the memory management hardware, and it is nearly always present in any hardware that utilizes paged or segmented virtual memory.

 

The TLB is sometimes implemented as content-addressable memory (CAM). The CAM search key is the virtual address and the search

 

 

 

 

 

  1. 4. Describe about Key-code Data Formats and FIFO Status Word formats.

 

Answer:Key Code Qualifier is an error-code returned by a SCSI device.

 

When a SCSI target device returns a check condition in response to a command, the initiator usually then issues a SCSI Request Sense command. This process is part of a SCSI protocol called Contingent Allegiance Condition. The target will respond to the Request Sense command with a set of SCSI sense data which includes three fields giving increasing levels of detail about the error:

 

K – sense key – 4 bits, (byte 2 of Fixed sense

 

 

  1. 5. Write a note on

 

(a) RS 232 standard

 

Answer:In telecommunications, RS-232 is a standard for serial communication transmission of data. It formally defines the signals connecting between a DTE (data terminal equipment) such as a computer terminal, and a DCE (data circuit-terminating equipment, originally defined as data communication equipment), such as a modem. The RS-232 standard is commonly used in computer serial ports. The standard defines the electrical characteristics and timing of signals, the meaning of signals, and the physical size

 

 

 

(b) IEEE 488 standard

 

Answer:IEEE-488 is a short-range digital communications 8-bit parallel multi-master interface bus specification. It was created in the late 1960s for use with automated test equipment and is still in use for that purpose. IEEE-488 was created as HP-IB (Hewlett-Packard Interface Bus) and is commonly called GPIB (General Purpose Interface Bus). It has been the subject of several standards.

 

IEEE-488 specifies a 24-pin Amphenol

 

 

 

 

 

  1. 6. Write short note on:

 

  1. a) Parallel Printer Interface (LPT)

 

Answer:Short for Line Printer Terminal, LPT is used by IBM compatible computers as an identification for the parallel port such as LPT1, LPT2, or LPT3. This is commonly required when installing a printer on an IBM compatible computer. The majority of all computers utilize LPT1 and do not have an option for another LPT port unless additional ports are added to the computer.

 

 

 

 

 

  1. b) Universal Serial Bus (USB)

 

Answer:USB, short for Universal Serial Bus, is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices. It is currently developed by the USB Implementers Forum.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 


MCA4020- PROBABILITY AND STATISTICS

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

 

PROGRAM MCA
SEMESTER FOURTH
SUBJECT CODE & NAME MCA4020- PROBABILITY AND STATISTICS
BK ID B1779
CREDIT & MARKS 4 CREDITS & 60 MARKS

 

 

1 Three machines A, B and C produce respectively 60%, 30% and 10% of the total number of items of a factory. The percentage of defective output of these machines are respectively 2%, 3% and 4%. An item is selected at random and is found to be defective. Find the probability that the item was produced by machine C.

 

Answer: Multiply the respective percentage of production by the percentage of defects for each machine

 

A = 60% * 2% = 1.2% of the factory’s total output are defects produced by Machine A

B = 30% * 3% = 0.9% of the factory’s total output are defects produced by Machine B

C = 10% * 4% = 0.4% of the factory’s total output are defects produced by Machine C

 

Therefore the total defects = 1.2% + 0.9% + 0.4% = 2.5%

 

 

 

 

 

2 Find the constant k so that

 

F(x,y) = {k(x+1)e-y, 0<x<1,y>0

                0 elsewhere

Is a joint probability density function. Are X and Y independent?

 

Answer: Probability density function:- In probability theory and statistics, given two jointly distributed random variables X and Y, the conditional probability distribution of Y given X is the probability distribution of Y when X is known to be a particular value; in some cases the conditional probabilities may be expressed as functions containing the unspecified value x of X as a parameter. In case that both “X” and “Y” are categorical variables, a conditional probability table is typically used to represent the conditional probability. The conditional distribution

 

 

 

3 The data shows the distribution of weight of students of 1st standard of a school. Find the quartiles.

 

 

Class Interval 13-18 18-20 20-21 21-22 22-23 23-25 25-30
Frequency 22 27 51 42 32 16 10

 

Answer: If a data set of scores is arranged in ascending order of magnitude, then:

The median is the middle value of the data set.

 

The lower quartile (Q1) is the median of the lower half of the data set.

 

The upper quartile (Q3) is the median of the upper

 

 

 

4 Fit a trend line to the following data by the freehand method:

 

 

 

Year Production of wheat(in tonnes) Year Production of wheat(in tonnes)
1995 20 2000 25
1996 22 2001 23
1997 24 2002 26
1998 21 2003 25
1999 23 2004 24

 

Answer: Methods of Freehands: It is familiar concept, briefly described for drawing frequency curves. In case of a time series a scatter diagram of the given observations is plotted against time on the horizontal axis and a freehand smooth curve is drawn through the plotted points. The curve is so drawn that most of the points concentrate around the curve, however, smoothness should not be scarified in trying to let the points exactly fall on the curve. It would be better to draw a straight line through the plotted points instead of a curve, if possible. The curve fitted by

 

 

 

 

5 Let X be a random variable and its probability mass function is

P(x=r) = qr-1p,r=1,2,3…

Find the m.g.f. of X and hence it’s mean and variance.

 

Answer: Standard Deviation:-The Standard Deviation is a measure of how spread out numbers are.

Its symbol is σ (the greek letter sigma)

The formula is easy: it is the square root of the Variance. So now you ask, “What is the Variance?”

 

Variance

 

 

 

6 The diastolic blood pressures of men are distributed as shown in table. Find the standard deviation and variance.

Pressure 78-80 80-82 82-84 84-86 86-88 88-90
No. of Men 3 15 26 23 9 4

 

Answer: Given values are:

Pressure 78-80 80-82 82-84 84-86 86-88 88-90
No. of Men 3 15 26 23 9 4

 

Difference = 2

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 


MCA3010 –Financial Management and Accounting

$
0
0

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

SUMMER 2016 , ASSIGNMENT

Masters in Computer Application (MCA) – Semester 3

 

MCA3010 –Financial Management and Accounting

 

4 Credits (Book ID: B1624)

(60 Marks)

 

Answer All the Questions. Each question carries equal marks. (6 x 10 = 60)

 

  1. Explain the process involved in accounting. What are the objectives of accounting?

Answer :As implied earlier, today’s electronic accounting systems tend to obscure the traditional forms of the accounting cycle. Nevertheless, the same basic process that bookkeepers and accountants used to perform by hand are present in today’s accounting software.

 

ACCOUNTING CYCLE :

 

An accounting cycle is a complete sequence

 

 

  1. Briefly explain the role of management accounting. Also describe the functions of management accounting.

Answer : Management accounting is an internal business function that includes the recording and reporting of a company’s financial transactions. The accounting department also supports management in different business operations, providing analysis and support for different decisions and investments.

Financial Reporting

Management accountants work at the

 

 

 

 

  1. What is fund flow analysis? What are the objectives of analysing flow of fund?

Answer : Funds flow statement is an important financial tool, which analyze the changes in financial position of a firm showing the sources and applications of its funds. It provides useful information about the firm’s operating, financing and investing activities during a particular period. The following points highlight the importance of funds flow statement.

 

  1. Funds flow statement helps in identifying the change in level of current assets investment and current liabilities financing.

 

 

  1. What is cash flow statement and how is the cash flow statement subdivided?

 

Answer : Complementing the balance sheet and income statement, the cash flowstatement (CFS), a mandatory part of a company’s financial reports since1987, records the amounts of cash and cash equivalents entering andleaving a company. The CFS allows investors to understand how acompany’s operations are running, where its money is coming from, andhow it is being spent. Here you will learn how the CFS is structured andhow to use it as

 

 

 

  1. What are the merits of budgets?

 

Answer : Define goals and objectives

Align corporate goals with regards to markets, sales levels, margins, manning, cost levels and capital investment with your budgets.

Think about and plan for the future.

Compels management to think about the future. Management should look ahead and set out plans for each business unit, anticipating change

 

 

  1. Describe the essential features of budgetary control.

 

Answer : There are two types of control, namely budgetary and financial. This chapter concentrates on budgetary control only. This is because financial control was covered in detail in chapters one and two. Budgetary control is defined by the Institute of Cost and Management Accountants (CIMA) as:

 

“The establishment of budgets relating the

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 


MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

SUMMER  2016,  ASSIGNMENT

 

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM
CREDIT 4
BK ID B1650
MAX. MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions

 

 

  1. Differentiate between Two-Tier client/server databases and Multi-tier client/server databases.

Answer: Two-Tier Architecture:

 

The two-tier is based on Client Server architecture. The two-tier architecture is like client server application. The direct communication takes place between client and server. There is no intermediate between client and server. Because of tight coupling a 2 tiered application will run faster.

 

 

 

 

  1. Explain the physical query plan operators. What is the significance of Iterators?

 

Answer: A plan represents how data flows from a child operator to a parent operator in the form of a tree structure. Query execution flow can be read from right to left and from top to bottom.

In this article we’ll discuss some common and important operators like Index seek/scan, Join (Nested, Merge, and Hash), etc., which are useful to interpret a graphical execution plan and troubleshoot any performance issue due to a

 

 

 

 

  1. Differentiate between Serialisability and Recoverability.

 

Answer: Serializability

 

Serializability is the classical concurrency scheme. This helps to ensures that a schedule with regard to performing executing concurrent transactions is equivalent to one that executes the transactions serially in some order. It assumes that all accesses

 

 

 

 

 

  1. Discuss about Parallel query processing. How parallel-execution works?

Answer: When Oracle runs SQL statements in parallel, multiple processes work together simultaneously to run a single SQL statement. By dividing the work necessary to run a statement among multiple processes, Oracle can run the statement more quickly than if only a single process ran it. This is called parallel execution or parallel processing.

 

Parallel execution dramatically reduces response time for data-intensive operations on large databases typically associated with decision support systems (DSS) and data warehouses. Symmetric multiprocessing (SMP), clustered systems, and

 

 

 

  1. Differentiate between homogeneous and heterogeneous Database.

 

Answer: A DDBMS may be classified as homogeneous or heterogeneous. In a homogeneous system, all sites use the same DBMS product. In a heterogeneous system, sites may run different DBMS products, which need not be based on the same underlying data model, and so the system may be composed of relational, network, hierarchical and object-oriented DBMSs.

 

 

 

Homogeneous systems are much easier to design and

 

 

 

 

 

  1. Write short notes on ODMG standards. What are the various components of ODMG-93?

 

Answer: The ODMG standard builds upon the existing OMG, SQL-92, INCITS (formerly ANSI) programming language standards, and JavaSoft’s Java specification to define a framework for application portability between compliant data storage products. The standard’s functional components include an Object Model, an Object Definition Language, an Object Query Language, and Language Bindings to Java, C++, and Smalltalk.

 

The two primary benefits of the ODMG

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 


MCA3030 – LINUX OS

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3030 – LINUX OS
CREDIT 2
BK ID B1563
MAX. MARKS 30

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

 

  1. List any ten commonly used commands along with their functions in Linux.

Answer: #1: top

I figured it was fitting to put the top command at the top. Although top is actually responsible for listing currently running tasks, it is also the first command Linux users turn to when they need to know what is using their memory (or even how much memory a system has). I often leave the top tool running on my desktop so I can keep track of what is going on at all times. Sometimes, I will even open up a terminal (usually aterm), place the window where I want it, and then hide the border of the window. Without a border, the terminal can’t be

 

 

 

  1. Describe about Run levels. Explain different run levels.

 

Answer: Runlevel is a mode of operation in one of the computer operating systems that implement Unix System V-style initialization. Conventionally, seven runlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonym for one of the levels. Only one runlevel is executed on startup; run levels are not executed one after another, i.e. either the runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order.

 

 

 

 

 

 

  1. 3. Describe the following:

 

  1. a) File encryption

 

Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily decrypted while being used and than encrypted again after we finished using them. Encrypting stored files

 

 

  1. b) Email encryption

 

Answer: Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email encryption may also include authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted). By means of some available tools, persons other than the designated recipients can read the email contents. Email encryption has been used by journalists and regular users to protect privacy.Email encryption can rely on public-key

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 



MCA3040- TECHNICAL WRITING

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

PROGRAM MCA
SEMESTER 3RD
SUBJECT CODE & NAME MCA3040- TECHNICAL WRITING
CREDIT 4
BK ID B0954
MAX.MARKS 60

 

1 What’s Audience Analysis? Explain its significance in Technical Communication

Answer : In few words, audience analysis is to know more about your end-users.

 

Audience Analysis is the task to identify your target audience to make sure that the information provided in the end-user documentation is suitable for satisfying their information requirements.

 

Why should you conduct Audience Analysis?

 

 

 

 

2 Explain the role of a technical editor. Differentiate between Micro and Macro editing.

 

Answer : To understand the role of a technical editor, a person must first understand technical editing. The term, simplified and in the context of technical communication, is the process of reviewing, revising, reorganizing, and many other gerunds that begin with “re.” The goal of editing is to take an author’s work and improve it—for whatever goal that author has. The goals of each author (and of each industry) are different—

 

 

 

3 Explain the various phases involved in System Development Life Cycle (SDLC).

 

Answer : System Study

Preliminary system study is the first stage of system development life cycle. This is a brief investigation of the system under consideration and gives a clear picture of what actually the physical system is? In practice, the initial system study involves the preparation of a System proposal which lists the Problem Definition,

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 


MIT4033- Wireless and Mobile Communication

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

PROGRAM

Master of Science in Information Technology (MSc IT)

SEMESTER

FOURTH

SUBJECT CODE & NAME

MIT4033- Wireless and Mobile Communication

Qus:1 Write a short note on different generations of wireless network.

Answer: The wireless communication network has undergone lot of evolution from the day of its introduction. To study these history and evolution it is categories as different generations. Every generation carries the features that are available and supported by electronic devices of

Qus:2 Describe the concepts of followings:

(a) cell splitting

(b) frequency reuse in cellular networks

Answer: (a)cell splitting

This method to increase the capacity of users is used in a network when the size of each cell is same and the density of users on different. If the size of the cell is large, then the transmitted radio wave must be of higher energy (called strength of the signal) to reach the border of the cell

Qus:3 Describe BSC and MSC protocols.

Answer: BSC protocols Once the information is communicated from the BTS to the BSC, the Abisinterface is used to communicate further the information between the BT Sand BSC. At this level, the radio resources at the lower portion of Layer 3are handled by the Base Transceiver Station Management (BTSM) protocol rather than the RR protocol. The BTSM layer acts as a

Qus:4 List and explain the different methods of speech coding.

Answer: There are three different speech coding methods. They are:

  1. a) Waveform coding
  2. b) Source coding and
  3. c) Hybrid coding
  4. a) Waveform coding

This approximates the speech signal as waveform. In this class of coding, the objective is to minimize a criterion which measures the dissimilarity between the original and the reconstructed

Qus:5 Explain the following with context to GSM security:

  1. a) A5 algorithm for encryption
  2. b) A8 algorithm for key generation

Answer: GSM encryption is the means by which phone conversations on networks using GSM are scrambled, such that they cannot be descrambled and intercepted by others.

Basically 3

Qus:6What is Wimax? Discuss it’s architecture with suitable diagram.

Answer: WiMAX, which stands for worldwide Interoperability for Microwave Access, was designed by the WiMAX forum and standardized as IEEE 802.16.

WiMAX are being classified as a metropolitan area network (MAN). WiMAX is a telecommunications protocol that provides fixed and mobile Internet access. Two version of WiMAX are as


MIT4024– Customer Relationship Management

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

PROGRAM

Master of Science in Information Technology(MSc IT)

SEMESTER

FOURTH

SUBJECT CODE & NAME

MIT4024– Customer Relationship Management

Qus:1 What is CRM? Describe its different types.

Answer: Defining CRM is a bit ironic because it is not very difficult to define but at the same time there is no single universal definition for this term. Actually, there are many definitions due to the presence of many CRM software vendors and system integrators in the IT industry. However,

Qus:2a) Write the benefits of CRM technology for front office.

  1. b) State the CRM technology components and explain any one.

Answer: a) Write the benefits of CRM technology for front office.

The front office functioning group has direct contact with customers. The function of this group includes marketing, sales, and after-sales services. It deals with textual data, that is, the information about the relationship between customers and companies.

The

Qus:3 List and explain the different ways to synchronize data.

Answer: Portable devices synchronize data in three different ways. Figure 4.1 depicts the various types of data

Qus:4 List and briefly describe the elements that are essential for a successful CIC.

Answer: A successful CIC is accomplished only if the following conditions are sustained:

 Maintain customer loyalty – Gradually, companies realized that the best way to retain customers is through positive relationship management and outstanding customer service. An important element

Qus:5 What are the basic steps in project planning?

Answer: This phase involves planning for the project which is done after analyzing all the requirements and specifications thoroughly. It involves creating a suite of planning documents to help guide the team throughout the project.

The following steps are followed in project planning:

  1. Breaking up of the requirement specifications into smaller subtasks or activities
  2. Sequencing of activities and identifying activities that can be implemented at the same time

Qus:6 What are the three sub processes of CRM? Explain.

Answer: CRM consists of three sub processes. They are:

 Marketing process

 Sales process


MIT4023– Real Time Operating Systems

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

PROGRAM

Master of Science in Information Technology(MSc IT)

SEMESTER

4

SUBJECT CODE & NAME

MIT4023– Real Time Operating Systems

Qus:1 What is RTOS? What are its requirements?

Answer: A real-time system is one whose correctness involves both the logical correctness of outputs and their timeliness. An embedded system is a specific real-time computer system. Earlier embedded systems were designed for specialized applications but now reconfigurable and programmable embedded systems are used. Some examples of embedded systems are: the microprocessor

Qus:2 a) State RISC characteristics.

  1. b) Why memory protection is necessary?

Answer: a) State RISC characteristics.

A real time system is often implemented on custom hardware that isspecifically designed and developed for the purpose. For example a cell phone does not use traditional microprocessors. Cell phones use processors which are tiny, supporting only those processing capabilities that are really for cell phone operation and specifically designed to be power

Qus:3 Briefly describe the followings:

(a) DROL

(b) RTC++

(c) FLEX

Answer:

(a) DROL

DROL is an object-oriented language which extends the general purpose Language C++ for distributed real-time applications. DROL is based on the idea of distributed real-time objects which have asynchronous message passing. A distributed real-time object has the properties of best effort and least suffering. Best effort is defined as a scheduling policy in which two

Qus:4 Describe the basic design principles in ROTS environment.

Answer: An embedded system with a single CPU can run only one process at an instance. The process may be either an ISR, kernel function or a task. An RTOS use in embedded system provides the following.

  1. The user threads to run in kernel space(to execute fast).
  2. Effective handling of ISRs, device drivers, tasks or threads and enabling and disabling of

Qus:5 Describe the following disk scheduling algorithms:

(a) Elevator algorithm

(b) D-SCAN and FD-SCAN algorithm

Answer: (a) Elevator algorithm

Classical disk scheduling schemes attempt to minimize the average seek distance. For example, in the elevator algorithm, the disk head is in either an inward-seeking phase or an outward-seeking phase. While seeking inward, it services any requests it passes until there are no

Qus:6 Explain Cryptography. Describe the components of Cryptography with a neat labeled diagram.

Answer: Cryptography, a word with Greek origins, means “Secret Writing”. However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks.

The original


BCA 5041 – COMPILER DESIGN

$
0
0

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

DRIVE

FALL 2016

PROGRAM

BACHELOR OF COMPUTER APPLICATION

SEMESTER

5

SUBJECT CODE & NAME

BCA 5041 – COMPILER DESIGN

1 Explain various tasks performed by a compiler.

Answer: Compilers are an essential part of a computer programmer’s toolkit. A compiler turns a plain text file containing code into a program that can be run.

A common misconception is that computers understand code. This is not true. Computers only

2 What is finite automata? What is deterministic and nondeterministic finite automata?

Answer: A finite automaton (FA) is a simple idealized machine used to recognize patterns within input taken from some character set (or alphabet) C. The job of an FA is to accept or reject an input depending on whether the pattern defined by the FA occurs in the input. A finite automaton consists of: a finite

3 What do you mean by context free grammar? Explain with an example.

Answer: A context-free grammar basically consists of a finite set of grammar rules. In order to define grammar rules, we assume that we have two kinds of symbols: the terminals, which are thesymbols of the alphabet underlying the languages under consideration, and the nonterminals, which behave like variables ranging over strings of terminals. A rule is of the form A → α, where A is a single nonterminal, and the

4 Explain Storage Allocation Strategies based on the division of run time storage with their limitations.

Answer: Different ways to allocate objects

Static allocation – allocates storage at compile time

Stack allocation – manages run time storage as stack

Heap

5 Explain how Direct Acyclic Graph (DAG) is represented for Basic Blocks with example.

Answer: Acyclic graph is defined as a graph with no path and starts and ends at the same vertex. An acyclic undirected graphic is like a tree. Directed Acyclic graph (DAG) is a directed graph with no path that startsand

6Explain the following optimization techniques

  1. a) Loop invariant code motion
  2. b) Partial redundancy elimination

Answer: a) Loop invariant code motion

Loop-Invariant code motion is one interesting form of partial redundancyelimination (PRE) whose purpose it is to find code in a loop body that producesthe same value in every iteration of the loop. An expression is loopinvariant if its value does not change while running the loop. This code canbe moved out of the loop so that it is not computed over and over again,which would be a waste of


Viewing all 1256 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>