Management Information System
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
It is a well established fact that the Web-Applications require frequent maintenance because of cutting– edge business competitions. The authors have worked on quality evaluation of web-site of Indian ecommerce domain. As a result of that work they have made a quality-wise ranking of these sites. According to their work and also the survey done by various other groups Futurebazaar web-site is considered to be one of the best Indian e-shopping sites. In this research paper the authors are assessing the maintenance of the same site by incorporating the problems incurred during this evaluation. This exercise gives a real world maintainability problem of web-sites. This work will give a clear picture of all the quality metrics which are directly or indirectly related with the maintainability of the web-site.
Management Information System
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
It is a well established fact that the Web-Applications require frequent maintenance because of cutting– edge business competitions. The authors have worked on quality evaluation of web-site of Indian ecommerce domain. As a result of that work they have made a quality-wise ranking of these sites. According to their work and also the survey done by various other groups Futurebazaar web-site is considered to be one of the best Indian e-shopping sites. In this research paper the authors are assessing the maintenance of the same site by incorporating the problems incurred during this evaluation. This exercise gives a real world maintainability problem of web-sites. This work will give a clear picture of all the quality metrics which are directly or indirectly related with the maintainability of the web-site.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This UML (Unified Markup Language) contains 6 Units and each Unit contains 35 slides in it.
Contents…
• Object-oriented modeling
• Origin and evolution of UML
• Architecture of UML
• User View
o Actor
o Use Cases
• Identify the behavior of a class
• Identify the attributes of a class
• Create a Class diagram
• Create an Object diagram
• Identify the dynamic and static aspects of a system
• Draw collaboration diagrams
• Draw sequence diagrams
• Draw statechart diagrams
• Understand activity diagrams
• Identify software components of a system
• Draw component diagrams
• Identify nodes in a system
• Draw deployment diagrams
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Data Structures and Algorithms contain 15 Units and each Unit contains 60 to 80 slides in it.
Contents…
• Introduction
• Algorithm Analysis
• Asymptotic Notation
• Foundational Data Structures
• Data Types and Abstraction
• Stacks, Queues and Deques
• Ordered Lists and Sorted Lists
• Hashing, Hash Tables and Scatter Tables
• Trees and Search Trees
• Heaps and Priority Queues
• Sets, Multi-sets and Partitions
• Dynamic Storage Allocation: The Other Kind of Heap
• Algorithmic Patterns and Problem Solvers
• Sorting Algorithms and Sorters
• Graphs and Graph Algorithms
• Class Hierarchy Diagrams
• Character Codes
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
The process of choosing and integrating a network management system (NMS) to an existing computer
network became a big question due to the complexity of used technologies and the variety of NMS options.
Most of computer networks are being developed according to their internal rules in cloud environments.
The use of NMS requires not only infrastructural changes, consequently increasing the cost of integration
and maintenance, but also increases the risk of potential failures. In this paper, conception and method of
express choice to implement and integrate a network management system are presented. Review of basic
methods of cost analysis for IT systems is presented. The simplified conception of cost benefits analysis
(CBA) is utilized as a basis of the offered method. A final estimation is based on three groups of
parameters: parameters of expected integration risk evaluation, expected effect and level of completed
management tasks. The explanation of the method is provided via example.
Systems Analysis and Design 8th Edition Kendall Solutions ManualKadenCohen
Full download : http://alibabadownload.com/product/systems-analysis-and-design-8th-edition-kendall-solutions-manual/ Systems Analysis and Design 8th Edition Kendall Solutions Manual
-Developed Enterprise software architecture model for startup company as consultants
-Identified and developed all part of enterprise software middleware such as business motivation model, business capability model, Information architecture model, application architecture and much more.
- Developed the project planning, roadmap and governance for the enterprise.
Office automation system for scholl (oasfs) by vikas sharmaVikas Sharma
This project on “OFFICE AUTOMATION SYSTEM FOR SCHOOL” is used to computerize the work of an office. This project is a part for adding new employee, viewing record of employee, transfer details of employee, generating pay slip, modify employee record and display the report. This project was developed with Visual Basic .NET as Front End and M.S-Access as Back End.
This is fully click driven Windows based package. It consists of forms and buttons for adding, deleting, modifying, viewing the record, generation of pay slip and creates the final report related to an employee
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...Editor IJCATR
Upon increasing application of unified modeling language diagrams for description of enterprise architecture and
importance of evaluating the non-functional requirements in the enterprise architecture, establishing an executable model of these
diagrams is necessary. On the other side, unified modeling language diagrams have not the capability of evaluating the non-functional
requirements of system directly. The simplicity and characteristics of these diagrams must be reserved and the capability of evaluating
these requirements to be incorporated thereto. To achieve this goal, an executable model of these diagrams to be Created.
In this paper, it is assumed that architecture of a system has been described by two use case and collaboration diagrams of unified
modeling language. The role of these diagrams in evaluation of reliability and annotations related thereto has been examined and
extended by a algorithm to an executable model means colored Petri net. In this study, the procedure of establishing an executable
model that can analyze the reliability of artifacts in C4ISR framework. According to the results obtained from simulation of this model
and their analysis, we could identify the problems in planning phase and improve out artifacts in order to avoid the extreme time and
economic costs of implementation.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This UML (Unified Markup Language) contains 6 Units and each Unit contains 35 slides in it.
Contents…
• Object-oriented modeling
• Origin and evolution of UML
• Architecture of UML
• User View
o Actor
o Use Cases
• Identify the behavior of a class
• Identify the attributes of a class
• Create a Class diagram
• Create an Object diagram
• Identify the dynamic and static aspects of a system
• Draw collaboration diagrams
• Draw sequence diagrams
• Draw statechart diagrams
• Understand activity diagrams
• Identify software components of a system
• Draw component diagrams
• Identify nodes in a system
• Draw deployment diagrams
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Data Structures and Algorithms contain 15 Units and each Unit contains 60 to 80 slides in it.
Contents…
• Introduction
• Algorithm Analysis
• Asymptotic Notation
• Foundational Data Structures
• Data Types and Abstraction
• Stacks, Queues and Deques
• Ordered Lists and Sorted Lists
• Hashing, Hash Tables and Scatter Tables
• Trees and Search Trees
• Heaps and Priority Queues
• Sets, Multi-sets and Partitions
• Dynamic Storage Allocation: The Other Kind of Heap
• Algorithmic Patterns and Problem Solvers
• Sorting Algorithms and Sorters
• Graphs and Graph Algorithms
• Class Hierarchy Diagrams
• Character Codes
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
The process of choosing and integrating a network management system (NMS) to an existing computer
network became a big question due to the complexity of used technologies and the variety of NMS options.
Most of computer networks are being developed according to their internal rules in cloud environments.
The use of NMS requires not only infrastructural changes, consequently increasing the cost of integration
and maintenance, but also increases the risk of potential failures. In this paper, conception and method of
express choice to implement and integrate a network management system are presented. Review of basic
methods of cost analysis for IT systems is presented. The simplified conception of cost benefits analysis
(CBA) is utilized as a basis of the offered method. A final estimation is based on three groups of
parameters: parameters of expected integration risk evaluation, expected effect and level of completed
management tasks. The explanation of the method is provided via example.
Systems Analysis and Design 8th Edition Kendall Solutions ManualKadenCohen
Full download : http://alibabadownload.com/product/systems-analysis-and-design-8th-edition-kendall-solutions-manual/ Systems Analysis and Design 8th Edition Kendall Solutions Manual
-Developed Enterprise software architecture model for startup company as consultants
-Identified and developed all part of enterprise software middleware such as business motivation model, business capability model, Information architecture model, application architecture and much more.
- Developed the project planning, roadmap and governance for the enterprise.
Office automation system for scholl (oasfs) by vikas sharmaVikas Sharma
This project on “OFFICE AUTOMATION SYSTEM FOR SCHOOL” is used to computerize the work of an office. This project is a part for adding new employee, viewing record of employee, transfer details of employee, generating pay slip, modify employee record and display the report. This project was developed with Visual Basic .NET as Front End and M.S-Access as Back End.
This is fully click driven Windows based package. It consists of forms and buttons for adding, deleting, modifying, viewing the record, generation of pay slip and creates the final report related to an employee
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...Editor IJCATR
Upon increasing application of unified modeling language diagrams for description of enterprise architecture and
importance of evaluating the non-functional requirements in the enterprise architecture, establishing an executable model of these
diagrams is necessary. On the other side, unified modeling language diagrams have not the capability of evaluating the non-functional
requirements of system directly. The simplicity and characteristics of these diagrams must be reserved and the capability of evaluating
these requirements to be incorporated thereto. To achieve this goal, an executable model of these diagrams to be Created.
In this paper, it is assumed that architecture of a system has been described by two use case and collaboration diagrams of unified
modeling language. The role of these diagrams in evaluation of reliability and annotations related thereto has been examined and
extended by a algorithm to an executable model means colored Petri net. In this study, the procedure of establishing an executable
model that can analyze the reliability of artifacts in C4ISR framework. According to the results obtained from simulation of this model
and their analysis, we could identify the problems in planning phase and improve out artifacts in order to avoid the extreme time and
economic costs of implementation.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Is 4 th
1. Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
These are just questions for reference . To check samples see our latest
uploads in blog archive or search assignments .
(Prefer mailing. Call in emergency )
SEM 4 MIS
MI0033- SOFTWARE ENGINEERING
1 Process patterns are the results of applying abstraction to recurring processes and
process components. Process patterns are collections of general techniques, actions,
and/or tasks (activities) for developing object-oriented software. Justify the above
statement. Explain with an example for each, the different types of process patterns
in the ascending order of abstraction level.
A a. Justifying the above statement
b. Explaining the three types of process patterns
c. Examples
2 Software estimation is the first phase of project planning and it is the process of
judging a software product and solving the problem associated with the software
2. project. We follow some important steps to achieve reliable cost and effort
estimates. Explain the different estimation models and estimation techniques.
A a. Explaining different estimation models
b. Explaining estimation techniques
3 Empirical software solutions is a small manufacture based company who have a
single product in the public access and security domain. The information system
which they possess gives details pertaining to the presence of individuals at specific
locations and also checks and issues security badges.
The software of the system is connected to specially designed hardware peripherals
along with a well-defined LAN network connection. The system handles several
aspects ranging from computing from database manipulation, peripheral hardware ti
image handling. This company uses both software as well as hardware, and
incorporates latest technologies, like networking and device drivers.
Due to the pressure from customers and the competition, they were in need of a
structured software process. There was no standardized development process. Most
of their work was based on customer requests. Every time a new request from
customer came in, more additions were made to the product. A new version of the
software was installed at the customer’s site when requested by the customer. All
the queries related to technical support, modifications made to the system were
handled by the development team. There was no specific design methodology
followed and each developer used his own method of working. Apart from the user
manual, there was no other documentation found held.
3. Challenges:
Introduction of reuse framework and method into the company
Gain support from the top management for the reuse program, as introduction of
reuse program can affect all parts of the software production process.
Suggestions were made to set up the reuse program along with the associated cost
and risk involved in setting up the reuse program.
a. Explain the challenges faced by the empirical software solutions
b. Give some suggestions to overcome the challenges.
c. Explain the classifications and advantages of software reuse.
A a. Listing the challenges
b. Suggesting some 4 point about, planning, design, resource management,
documentation
c. Classifications with diagram
Listing the advantages
4 Suppose you are assigned the task to analyse the various factors involved in your
project, explain how will you gather information and analyse the task
4. A Explaining system analysis
5 Write short note on
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
A a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
6 Briefly describe the concept of polymorphism by using the automobile class as an
example.
A a. Explaining the example of automobile class
b. Describing the concept of polymorphism
5. c. Explaining polymorphism using the above example
MI0034- DATABASE MANAGEMENT SYSTEMS
1 How is DBMS classified based on several criteria? Explain each one of them with
few examples where ever required
A Listing the criterion
Explaining the types based on each criterion
Example
2 Differentiate between B+ tree and B- tree. Explain them with diagrams
A Diagrams
Explanation based on comparison
3 EMPLOYEE
EMP_ID NAME PROJECT SALARY DEPT_NUM
6. MUL1 Ramya PR1 40000 1
MUL2 Nupur PR1 45000 2
SMU1 Rajesh PR3 20000 2
SMU2 Vinay PR2 50000 3
SMU3 Anil PR2 80000 2
DEPARTMENT
DEPT_ID DNAME PLACE
1 MIS Bangalore
2 HRM Bangalore
3 Finance Chennai
4 Research Bangalore
Using these tables answer the following question
a. If we want to see all the employees with salary between 40000 and 50000, which
query can be used?
b. Select employee name from EMPLOYEE table, whose name starts with R c. Explain
aggregate functions and grouping in detail
7. A
a. Query based in BETWEEN operator
SELECT * from employee WHERE salary between 40000 to 50000
b. Query based in LIKE condition
SELECT * from employee WHERE Name LIKE ‘r%’;
c. Explaining aggregate functions on select statement, with an example, showing the
output of the query, explaining having clause, with example
4 What are the problems and failures that may encounter with respect to the
transactions in a database management system? Give examples.
A Explaining the three problems with code
Listing the types of failures (atleast 4)
5 Consider any database of your choice (may be simple banking database/forecasting
database/project management database). Show the deduction of the tables in your
database to the different types of normal forms
A Choosing a proper database
8. Explaining the 5 normal forms with respect to the database chosen
6 Read the following case study thoroughly and answer the following questions:
Laxmi bank is one of the largest private sector banks of India. It has an extensive
network of more than 200 branches. It offers banking services to retail as well as
corporate clients. The bank faced a challenge in integrating multi-pronged database
management system into a centralized system. The IT department of the bank also
realized that the computing capabilities of its PCs and servers were not
proportionately distributed among all its branches. Each branch had its database
management system stored in a traditional way on the disk. The total cost of
operating and maintaining the current IT infrastructure was very high and the
fundamental shortcomings added to the costs. Moreover, there were also recurrent
problems due to the malfunctioning of the currently operational database
management system. Therefore, the bank’s top management decided to fix the
problem and operationalise a robust database management system. The bank hired
an external database technology consulting firm called AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail
banking vertical and the corporate banking vertical. All the individual database
servers from the individual branches were removed. The entire database system was
made virtual such that the managers and the staff can access only the required
information (related to retail banking or corporate banking) from the respective
centralised data centers. There were only two such centralised data centers (one for
retail banking and another for corporate banking) that were managed centrally. Staff
and managers could access the information through their PCs and laptops.
Centralised database management system complemented the security system by
9. bringing in authentication through a unified ID management server. Managers and
officers of the bank were able to process half a million transactions per month in real
time after the new implementation. There were significant savings in the cost and
also in the consumption of power. Now there were no problems with regard to
imbalances in the load across various network servers. Due to centralised data
management, top management could keep an eye on the functioning of various
branches. Hence the cases of fraud and cheating reduced considerably. The bank
managers could also process the loan applications in reduced time since the
customer’s previous records could be accessed at the click of the button and
approval from the higher authorities could be obtained in real time. Moreover the
new system also brought in many applications that helped local managers in the
decision making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its centralised database
system to a distributed database system in future?
A a. Listing the uses from the from the case study
b. Explaining about data fragmentation, replication and allocation techniques
c. Is it possible to replicate the centralised database management model of the bank
in a manufacturing concern? Give reasons.
MI0035- COMPUTER NETWORKS
10. 1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN
b. Analog and digital data transmission
c. High level data link control
2 Virtually all networks in use today are based in some fashion on the Open Systems
Interconnection (OSI) standard. The core of this standard is the OSI Reference Model,
a set of seven layers that define the different stages that data must go through to
travel from one device to another over a network. Explain the seven layer
architecture of OSI model with diagram
A Explaining the OSI reference model
Diagram of OSI reference model
3 Consider yourself as the operation head in a telecommunication company. What
are the different types of multiplexing techniques will you implement to get efficient
data transmission process?
11. A Explaining various multiplexing techniques
4 Integrated Services for Digital Network (ISDN) is a set of communication standards
for simultaneous digital transmission of voice, video, data, and other network
services over the traditional circuits of the public switched telephone network. It was
first defined in 1988 in the CCITT red book. Explain the different types of ISDN with
their features and advantages for each one of them.
A Explaining Two different types
Features of both of them
Advantages of both of them
5 ABC company is an internet service provider. The main goal of ABC is to provide 24
X7X365 storage capacity, storage management and internet service to the
customers. It now needs a solution that will eliminate downtime. Downtime is
nothing but the time during which a computer or computer system is down, or
inoperative due to hardware or software failure. We also need the flexibility in quick
response to both the development in customer base and additional capacity and
service demands of the customers.
ABC company took the help of network storage infrastructure software provider to
achieve their goals by providing support for end to end redundancy and bondless
scalability.
12. By creating a scalable storage network with the ability to confidentially deliver the
24X7X365 reliability, and speed that outsourcing customers demand, it has enabled
the ISP/SSP to attract and retain customers and substantially build its business. As
the same time, the solution has effectively lowered ABC company’s total cost of
ownership for its entire storage solution: the IP Stor/CNP union has enabled a
painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT
solution has allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting
network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by ABC company after reading the SLM
b. Listing the benefits
c. Listing the different classes of ISP and their applications
6 Cryptography is the science of hiding information. The traditional security system
employed a different of encryption process known as symmetric cryptography, which
involves the use of te same method for both encryption and decryption. Explain the
different networking algorithms that are used for cryptography along with its
subtypes.
13. A Explaining the two types of cryptography and the networking algorithms used for
them
MI0036- BUSINESS INTELLIGENCE & TOOLS
1 Similarity measures determine the similarity between the two objects. The
similarity between the two objects ti and tj, sim(ti, tj) in the database D is a mapping
from D*D to the range [0, 1]. a. List the characteristics of a good similarity measure.
b. what are the four methods to determine the similarity characteristic between the
two objects?
A a. Listing the characteristics
b. Listing the four methods
a. Four methods to determine the similarity characteristic and their formula
2 Transactions refers to business or commercial transactions. Online transaction
processing refers to the category of systems that assists and manage transaction-
oriented applications, typically for data entry and retrieval transaction processing.
List the differences between OLAP and OLTP
A Listing at least 10 points
14. 3 Data extraction is the act or the process of extracting data out of data sources for
added data processing or data storage or data migration. This data can be extracted
from the web. Explain the different techniques for data extraction
A Listing the various techniques
Explaining the four methods
4 Business Intelligence strategy summarizes the finest combination of procedures
and technologies to meet the business intelligence strategies of an organization
a. List the main aspects of BI strategy.
b. What are the steps to be followed to implement BI framework?
A a. Listing at least 6 main aspects of BI strategy
b. Steps for Implementing BI framework
5 Write short note on
a. Content Management System
b. End User Segmentation
15. c. Basic Reporting and querying
d. OLAP
A a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
6 RSG is a footwear company which has its chain all over the world. This company
has to keep track of all the products sold in the company and huge data is involved in
it.
a. How should it plan to implement the Business intelligence solutions?
b. How to make the best use of BI?
A a. Explaining the planning to implement a BI solutions
b. Explaining best usage of BI
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
16. These are just questions for reference . To check samples see our latest
uploads in blog archive or search assignments .
(Prefer mailing. Call in emergency )