SlideShare a Scribd company logo
1 of 16
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
These are just questions for reference . To check samples see our latest
uploads in blog archive or search assignments .
(Prefer mailing. Call in emergency )
SEM 4 MIS
MI0033- SOFTWARE ENGINEERING
1 Process patterns are the results of applying abstraction to recurring processes and
process components. Process patterns are collections of general techniques, actions,
and/or tasks (activities) for developing object-oriented software. Justify the above
statement. Explain with an example for each, the different types of process patterns
in the ascending order of abstraction level.
A a. Justifying the above statement
b. Explaining the three types of process patterns
c. Examples
2 Software estimation is the first phase of project planning and it is the process of
judging a software product and solving the problem associated with the software
project. We follow some important steps to achieve reliable cost and effort
estimates. Explain the different estimation models and estimation techniques.
A a. Explaining different estimation models
b. Explaining estimation techniques
3 Empirical software solutions is a small manufacture based company who have a
single product in the public access and security domain. The information system
which they possess gives details pertaining to the presence of individuals at specific
locations and also checks and issues security badges.
The software of the system is connected to specially designed hardware peripherals
along with a well-defined LAN network connection. The system handles several
aspects ranging from computing from database manipulation, peripheral hardware ti
image handling. This company uses both software as well as hardware, and
incorporates latest technologies, like networking and device drivers.
Due to the pressure from customers and the competition, they were in need of a
structured software process. There was no standardized development process. Most
of their work was based on customer requests. Every time a new request from
customer came in, more additions were made to the product. A new version of the
software was installed at the customer’s site when requested by the customer. All
the queries related to technical support, modifications made to the system were
handled by the development team. There was no specific design methodology
followed and each developer used his own method of working. Apart from the user
manual, there was no other documentation found held.
Challenges:
Introduction of reuse framework and method into the company
Gain support from the top management for the reuse program, as introduction of
reuse program can affect all parts of the software production process.
Suggestions were made to set up the reuse program along with the associated cost
and risk involved in setting up the reuse program.
a. Explain the challenges faced by the empirical software solutions
b. Give some suggestions to overcome the challenges.
c. Explain the classifications and advantages of software reuse.
A a. Listing the challenges
b. Suggesting some 4 point about, planning, design, resource management,
documentation
c. Classifications with diagram
Listing the advantages
4 Suppose you are assigned the task to analyse the various factors involved in your
project, explain how will you gather information and analyse the task
A Explaining system analysis
5 Write short note on
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
A a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
6 Briefly describe the concept of polymorphism by using the automobile class as an
example.
A a. Explaining the example of automobile class
b. Describing the concept of polymorphism
c. Explaining polymorphism using the above example
MI0034- DATABASE MANAGEMENT SYSTEMS
1 How is DBMS classified based on several criteria? Explain each one of them with
few examples where ever required
A Listing the criterion
Explaining the types based on each criterion
Example
2 Differentiate between B+ tree and B- tree. Explain them with diagrams
A Diagrams
Explanation based on comparison
3 EMPLOYEE
EMP_ID NAME PROJECT SALARY DEPT_NUM
MUL1 Ramya PR1 40000 1
MUL2 Nupur PR1 45000 2
SMU1 Rajesh PR3 20000 2
SMU2 Vinay PR2 50000 3
SMU3 Anil PR2 80000 2
DEPARTMENT
DEPT_ID DNAME PLACE
1 MIS Bangalore
2 HRM Bangalore
3 Finance Chennai
4 Research Bangalore
Using these tables answer the following question
a. If we want to see all the employees with salary between 40000 and 50000, which
query can be used?
b. Select employee name from EMPLOYEE table, whose name starts with R c. Explain
aggregate functions and grouping in detail
A
a. Query based in BETWEEN operator
SELECT * from employee WHERE salary between 40000 to 50000
b. Query based in LIKE condition
SELECT * from employee WHERE Name LIKE ‘r%’;
c. Explaining aggregate functions on select statement, with an example, showing the
output of the query, explaining having clause, with example
4 What are the problems and failures that may encounter with respect to the
transactions in a database management system? Give examples.
A Explaining the three problems with code
Listing the types of failures (atleast 4)
5 Consider any database of your choice (may be simple banking database/forecasting
database/project management database). Show the deduction of the tables in your
database to the different types of normal forms
A Choosing a proper database
Explaining the 5 normal forms with respect to the database chosen
6 Read the following case study thoroughly and answer the following questions:
Laxmi bank is one of the largest private sector banks of India. It has an extensive
network of more than 200 branches. It offers banking services to retail as well as
corporate clients. The bank faced a challenge in integrating multi-pronged database
management system into a centralized system. The IT department of the bank also
realized that the computing capabilities of its PCs and servers were not
proportionately distributed among all its branches. Each branch had its database
management system stored in a traditional way on the disk. The total cost of
operating and maintaining the current IT infrastructure was very high and the
fundamental shortcomings added to the costs. Moreover, there were also recurrent
problems due to the malfunctioning of the currently operational database
management system. Therefore, the bank’s top management decided to fix the
problem and operationalise a robust database management system. The bank hired
an external database technology consulting firm called AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail
banking vertical and the corporate banking vertical. All the individual database
servers from the individual branches were removed. The entire database system was
made virtual such that the managers and the staff can access only the required
information (related to retail banking or corporate banking) from the respective
centralised data centers. There were only two such centralised data centers (one for
retail banking and another for corporate banking) that were managed centrally. Staff
and managers could access the information through their PCs and laptops.
Centralised database management system complemented the security system by
bringing in authentication through a unified ID management server. Managers and
officers of the bank were able to process half a million transactions per month in real
time after the new implementation. There were significant savings in the cost and
also in the consumption of power. Now there were no problems with regard to
imbalances in the load across various network servers. Due to centralised data
management, top management could keep an eye on the functioning of various
branches. Hence the cases of fraud and cheating reduced considerably. The bank
managers could also process the loan applications in reduced time since the
customer’s previous records could be accessed at the click of the button and
approval from the higher authorities could be obtained in real time. Moreover the
new system also brought in many applications that helped local managers in the
decision making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its centralised database
system to a distributed database system in future?
A a. Listing the uses from the from the case study
b. Explaining about data fragmentation, replication and allocation techniques
c. Is it possible to replicate the centralised database management model of the bank
in a manufacturing concern? Give reasons.
MI0035- COMPUTER NETWORKS
1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN
b. Analog and digital data transmission
c. High level data link control
2 Virtually all networks in use today are based in some fashion on the Open Systems
Interconnection (OSI) standard. The core of this standard is the OSI Reference Model,
a set of seven layers that define the different stages that data must go through to
travel from one device to another over a network. Explain the seven layer
architecture of OSI model with diagram
A Explaining the OSI reference model
Diagram of OSI reference model
3 Consider yourself as the operation head in a telecommunication company. What
are the different types of multiplexing techniques will you implement to get efficient
data transmission process?
A Explaining various multiplexing techniques
4 Integrated Services for Digital Network (ISDN) is a set of communication standards
for simultaneous digital transmission of voice, video, data, and other network
services over the traditional circuits of the public switched telephone network. It was
first defined in 1988 in the CCITT red book. Explain the different types of ISDN with
their features and advantages for each one of them.
A Explaining Two different types
Features of both of them
Advantages of both of them
5 ABC company is an internet service provider. The main goal of ABC is to provide 24
X7X365 storage capacity, storage management and internet service to the
customers. It now needs a solution that will eliminate downtime. Downtime is
nothing but the time during which a computer or computer system is down, or
inoperative due to hardware or software failure. We also need the flexibility in quick
response to both the development in customer base and additional capacity and
service demands of the customers.
ABC company took the help of network storage infrastructure software provider to
achieve their goals by providing support for end to end redundancy and bondless
scalability.
By creating a scalable storage network with the ability to confidentially deliver the
24X7X365 reliability, and speed that outsourcing customers demand, it has enabled
the ISP/SSP to attract and retain customers and substantially build its business. As
the same time, the solution has effectively lowered ABC company’s total cost of
ownership for its entire storage solution: the IP Stor/CNP union has enabled a
painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT
solution has allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting
network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by ABC company after reading the SLM
b. Listing the benefits
c. Listing the different classes of ISP and their applications
6 Cryptography is the science of hiding information. The traditional security system
employed a different of encryption process known as symmetric cryptography, which
involves the use of te same method for both encryption and decryption. Explain the
different networking algorithms that are used for cryptography along with its
subtypes.
A Explaining the two types of cryptography and the networking algorithms used for
them
MI0036- BUSINESS INTELLIGENCE & TOOLS
1 Similarity measures determine the similarity between the two objects. The
similarity between the two objects ti and tj, sim(ti, tj) in the database D is a mapping
from D*D to the range [0, 1]. a. List the characteristics of a good similarity measure.
b. what are the four methods to determine the similarity characteristic between the
two objects?
A a. Listing the characteristics
b. Listing the four methods
a. Four methods to determine the similarity characteristic and their formula
2 Transactions refers to business or commercial transactions. Online transaction
processing refers to the category of systems that assists and manage transaction-
oriented applications, typically for data entry and retrieval transaction processing.
List the differences between OLAP and OLTP
A Listing at least 10 points
3 Data extraction is the act or the process of extracting data out of data sources for
added data processing or data storage or data migration. This data can be extracted
from the web. Explain the different techniques for data extraction
A Listing the various techniques
Explaining the four methods
4 Business Intelligence strategy summarizes the finest combination of procedures
and technologies to meet the business intelligence strategies of an organization
a. List the main aspects of BI strategy.
b. What are the steps to be followed to implement BI framework?
A a. Listing at least 6 main aspects of BI strategy
b. Steps for Implementing BI framework
5 Write short note on
a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
A a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
6 RSG is a footwear company which has its chain all over the world. This company
has to keep track of all the products sold in the company and huge data is involved in
it.
a. How should it plan to implement the Business intelligence solutions?
b. How to make the best use of BI?
A a. Explaining the planning to implement a BI solutions
b. Explaining best usage of BI
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
These are just questions for reference . To check samples see our latest
uploads in blog archive or search assignments .
(Prefer mailing. Call in emergency )

More Related Content

What's hot

Data Structures and Algorithms Unit 01
Data Structures and Algorithms Unit 01Data Structures and Algorithms Unit 01
Data Structures and Algorithms Unit 01Prashanth Shivakumar
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
 
Systems Analysis and Design 8th Edition Kendall Solutions Manual
Systems Analysis and Design 8th Edition Kendall Solutions ManualSystems Analysis and Design 8th Edition Kendall Solutions Manual
Systems Analysis and Design 8th Edition Kendall Solutions ManualKadenCohen
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 
Office automation system for scholl (oasfs) by vikas sharma
Office automation system for scholl (oasfs) by vikas sharmaOffice automation system for scholl (oasfs) by vikas sharma
Office automation system for scholl (oasfs) by vikas sharmaVikas Sharma
 
Software Architectural & Data Design
Software Architectural & Data DesignSoftware Architectural & Data Design
Software Architectural & Data DesignGaurav Bisht
 
SE - Software Requirements
SE - Software RequirementsSE - Software Requirements
SE - Software RequirementsJomel Penalba
 
Improving the Quality of Requirements in Middleware Requirements Specifications
Improving the Quality of Requirements in Middleware Requirements SpecificationsImproving the Quality of Requirements in Middleware Requirements Specifications
Improving the Quality of Requirements in Middleware Requirements SpecificationsManigandan AJ
 
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...Editor IJCATR
 
Mi0036 business intelligence & tools...
Mi0036  business intelligence & tools...Mi0036  business intelligence & tools...
Mi0036 business intelligence & tools...smumbahelp
 

What's hot (18)

N1803017478
N1803017478N1803017478
N1803017478
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
UML Unit 01
UML Unit 01UML Unit 01
UML Unit 01
 
Data Structures and Algorithms Unit 01
Data Structures and Algorithms Unit 01Data Structures and Algorithms Unit 01
Data Structures and Algorithms Unit 01
 
SE UNIT-3.pdf
SE UNIT-3.pdfSE UNIT-3.pdf
SE UNIT-3.pdf
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
 
Print report
Print reportPrint report
Print report
 
Systems Analysis and Design 8th Edition Kendall Solutions Manual
Systems Analysis and Design 8th Edition Kendall Solutions ManualSystems Analysis and Design 8th Edition Kendall Solutions Manual
Systems Analysis and Design 8th Edition Kendall Solutions Manual
 
Enterprise Software Architecture Project
Enterprise Software Architecture ProjectEnterprise Software Architecture Project
Enterprise Software Architecture Project
 
41319760 info-sys (1)
41319760 info-sys (1)41319760 info-sys (1)
41319760 info-sys (1)
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Office automation system for scholl (oasfs) by vikas sharma
Office automation system for scholl (oasfs) by vikas sharmaOffice automation system for scholl (oasfs) by vikas sharma
Office automation system for scholl (oasfs) by vikas sharma
 
Software Architectural & Data Design
Software Architectural & Data DesignSoftware Architectural & Data Design
Software Architectural & Data Design
 
Mobile shopping
Mobile shoppingMobile shopping
Mobile shopping
 
SE - Software Requirements
SE - Software RequirementsSE - Software Requirements
SE - Software Requirements
 
Improving the Quality of Requirements in Middleware Requirements Specifications
Improving the Quality of Requirements in Middleware Requirements SpecificationsImproving the Quality of Requirements in Middleware Requirements Specifications
Improving the Quality of Requirements in Middleware Requirements Specifications
 
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
 
Mi0036 business intelligence & tools...
Mi0036  business intelligence & tools...Mi0036  business intelligence & tools...
Mi0036 business intelligence & tools...
 

Similar to Is 4 th

Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systemssmumbahelp
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systemssmumbahelp
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systemssmumbahelp
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systemssmumbahelp
 
Mi0034 –database management systems
Mi0034 –database management systemsMi0034 –database management systems
Mi0034 –database management systemssmumbahelp
 
Bba205 – management information system
Bba205 – management information systemBba205 – management information system
Bba205 – management information systemsmumbahelp
 
Mi0036 business intelligence & tools...
Mi0036  business intelligence & tools...Mi0036  business intelligence & tools...
Mi0036 business intelligence & tools...smumbahelp
 
Mi0036 business intelligence & tools...
Mi0036  business intelligence & tools...Mi0036  business intelligence & tools...
Mi0036 business intelligence & tools...smumbahelp
 
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSSEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSsolved_assignments
 
Bba205 management information system
Bba205  management information systemBba205  management information system
Bba205 management information systemsmumbahelp
 
SMU mba sem 4 mis fall 2014 assignments
SMU mba sem 4 mis fall 2014 assignmentsSMU mba sem 4 mis fall 2014 assignments
SMU mba sem 4 mis fall 2014 assignmentssolved_assignments
 
Mi0033 software engineering...
Mi0033  software engineering...Mi0033  software engineering...
Mi0033 software engineering...smumbahelp
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systemssmumbahelp
 
Solving big data challenges for enterprise application
Solving big data challenges for enterprise applicationSolving big data challenges for enterprise application
Solving big data challenges for enterprise applicationTrieu Dao Minh
 

Similar to Is 4 th (20)

Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
Mi0034
Mi0034Mi0034
Mi0034
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
Mi0034 summer 2014
Mi0034 summer 2014Mi0034 summer 2014
Mi0034 summer 2014
 
Mi0034 –database management systems
Mi0034 –database management systemsMi0034 –database management systems
Mi0034 –database management systems
 
Bba205 – management information system
Bba205 – management information systemBba205 – management information system
Bba205 – management information system
 
Mi0036 business intelligence & tools...
Mi0036  business intelligence & tools...Mi0036  business intelligence & tools...
Mi0036 business intelligence & tools...
 
Mi0036 business intelligence & tools...
Mi0036  business intelligence & tools...Mi0036  business intelligence & tools...
Mi0036 business intelligence & tools...
 
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSSEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
 
Bba205 management information system
Bba205  management information systemBba205  management information system
Bba205 management information system
 
SMU mba sem 4 mis fall 2014 assignments
SMU mba sem 4 mis fall 2014 assignmentsSMU mba sem 4 mis fall 2014 assignments
SMU mba sem 4 mis fall 2014 assignments
 
Mi0033 software engineering...
Mi0033  software engineering...Mi0033  software engineering...
Mi0033 software engineering...
 
Mi0033
Mi0033Mi0033
Mi0033
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
Solving big data challenges for enterprise application
Solving big data challenges for enterprise applicationSolving big data challenges for enterprise application
Solving big data challenges for enterprise application
 
ASSIGNMENT
ASSIGNMENT ASSIGNMENT
ASSIGNMENT
 
Ems
EmsEms
Ems
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Is 4 th

  • 1. Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 These are just questions for reference . To check samples see our latest uploads in blog archive or search assignments . (Prefer mailing. Call in emergency ) SEM 4 MIS MI0033- SOFTWARE ENGINEERING 1 Process patterns are the results of applying abstraction to recurring processes and process components. Process patterns are collections of general techniques, actions, and/or tasks (activities) for developing object-oriented software. Justify the above statement. Explain with an example for each, the different types of process patterns in the ascending order of abstraction level. A a. Justifying the above statement b. Explaining the three types of process patterns c. Examples 2 Software estimation is the first phase of project planning and it is the process of judging a software product and solving the problem associated with the software
  • 2. project. We follow some important steps to achieve reliable cost and effort estimates. Explain the different estimation models and estimation techniques. A a. Explaining different estimation models b. Explaining estimation techniques 3 Empirical software solutions is a small manufacture based company who have a single product in the public access and security domain. The information system which they possess gives details pertaining to the presence of individuals at specific locations and also checks and issues security badges. The software of the system is connected to specially designed hardware peripherals along with a well-defined LAN network connection. The system handles several aspects ranging from computing from database manipulation, peripheral hardware ti image handling. This company uses both software as well as hardware, and incorporates latest technologies, like networking and device drivers. Due to the pressure from customers and the competition, they were in need of a structured software process. There was no standardized development process. Most of their work was based on customer requests. Every time a new request from customer came in, more additions were made to the product. A new version of the software was installed at the customer’s site when requested by the customer. All the queries related to technical support, modifications made to the system were handled by the development team. There was no specific design methodology followed and each developer used his own method of working. Apart from the user manual, there was no other documentation found held.
  • 3. Challenges: Introduction of reuse framework and method into the company Gain support from the top management for the reuse program, as introduction of reuse program can affect all parts of the software production process. Suggestions were made to set up the reuse program along with the associated cost and risk involved in setting up the reuse program. a. Explain the challenges faced by the empirical software solutions b. Give some suggestions to overcome the challenges. c. Explain the classifications and advantages of software reuse. A a. Listing the challenges b. Suggesting some 4 point about, planning, design, resource management, documentation c. Classifications with diagram Listing the advantages 4 Suppose you are assigned the task to analyse the various factors involved in your project, explain how will you gather information and analyse the task
  • 4. A Explaining system analysis 5 Write short note on a. Unit testing b. System testing c. Debugging d. Verification and validation A a. Unit testing b. System testing c. Debugging d. Verification and validation 6 Briefly describe the concept of polymorphism by using the automobile class as an example. A a. Explaining the example of automobile class b. Describing the concept of polymorphism
  • 5. c. Explaining polymorphism using the above example MI0034- DATABASE MANAGEMENT SYSTEMS 1 How is DBMS classified based on several criteria? Explain each one of them with few examples where ever required A Listing the criterion Explaining the types based on each criterion Example 2 Differentiate between B+ tree and B- tree. Explain them with diagrams A Diagrams Explanation based on comparison 3 EMPLOYEE EMP_ID NAME PROJECT SALARY DEPT_NUM
  • 6. MUL1 Ramya PR1 40000 1 MUL2 Nupur PR1 45000 2 SMU1 Rajesh PR3 20000 2 SMU2 Vinay PR2 50000 3 SMU3 Anil PR2 80000 2 DEPARTMENT DEPT_ID DNAME PLACE 1 MIS Bangalore 2 HRM Bangalore 3 Finance Chennai 4 Research Bangalore Using these tables answer the following question a. If we want to see all the employees with salary between 40000 and 50000, which query can be used? b. Select employee name from EMPLOYEE table, whose name starts with R c. Explain aggregate functions and grouping in detail
  • 7. A a. Query based in BETWEEN operator SELECT * from employee WHERE salary between 40000 to 50000 b. Query based in LIKE condition SELECT * from employee WHERE Name LIKE ‘r%’; c. Explaining aggregate functions on select statement, with an example, showing the output of the query, explaining having clause, with example 4 What are the problems and failures that may encounter with respect to the transactions in a database management system? Give examples. A Explaining the three problems with code Listing the types of failures (atleast 4) 5 Consider any database of your choice (may be simple banking database/forecasting database/project management database). Show the deduction of the tables in your database to the different types of normal forms A Choosing a proper database
  • 8. Explaining the 5 normal forms with respect to the database chosen 6 Read the following case study thoroughly and answer the following questions: Laxmi bank is one of the largest private sector banks of India. It has an extensive network of more than 200 branches. It offers banking services to retail as well as corporate clients. The bank faced a challenge in integrating multi-pronged database management system into a centralized system. The IT department of the bank also realized that the computing capabilities of its PCs and servers were not proportionately distributed among all its branches. Each branch had its database management system stored in a traditional way on the disk. The total cost of operating and maintaining the current IT infrastructure was very high and the fundamental shortcomings added to the costs. Moreover, there were also recurrent problems due to the malfunctioning of the currently operational database management system. Therefore, the bank’s top management decided to fix the problem and operationalise a robust database management system. The bank hired an external database technology consulting firm called AKPY Info systems Limited. AKPY divided the entire IT infrastructure of the bank around two verticals. The retail banking vertical and the corporate banking vertical. All the individual database servers from the individual branches were removed. The entire database system was made virtual such that the managers and the staff can access only the required information (related to retail banking or corporate banking) from the respective centralised data centers. There were only two such centralised data centers (one for retail banking and another for corporate banking) that were managed centrally. Staff and managers could access the information through their PCs and laptops. Centralised database management system complemented the security system by
  • 9. bringing in authentication through a unified ID management server. Managers and officers of the bank were able to process half a million transactions per month in real time after the new implementation. There were significant savings in the cost and also in the consumption of power. Now there were no problems with regard to imbalances in the load across various network servers. Due to centralised data management, top management could keep an eye on the functioning of various branches. Hence the cases of fraud and cheating reduced considerably. The bank managers could also process the loan applications in reduced time since the customer’s previous records could be accessed at the click of the button and approval from the higher authorities could be obtained in real time. Moreover the new system also brought in many applications that helped local managers in the decision making process. a. List the uses of centralized data management b. What steps Laxmi bank need to take if it were to change its centralised database system to a distributed database system in future? A a. Listing the uses from the from the case study b. Explaining about data fragmentation, replication and allocation techniques c. Is it possible to replicate the centralised database management model of the bank in a manufacturing concern? Give reasons. MI0035- COMPUTER NETWORKS
  • 10. 1 Write short notes on a. LAN b. Analog and digital data transmission c. High level data link control A a. LAN b. Analog and digital data transmission c. High level data link control 2 Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. Explain the seven layer architecture of OSI model with diagram A Explaining the OSI reference model Diagram of OSI reference model 3 Consider yourself as the operation head in a telecommunication company. What are the different types of multiplexing techniques will you implement to get efficient data transmission process?
  • 11. A Explaining various multiplexing techniques 4 Integrated Services for Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book. Explain the different types of ISDN with their features and advantages for each one of them. A Explaining Two different types Features of both of them Advantages of both of them 5 ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365 storage capacity, storage management and internet service to the customers. It now needs a solution that will eliminate downtime. Downtime is nothing but the time during which a computer or computer system is down, or inoperative due to hardware or software failure. We also need the flexibility in quick response to both the development in customer base and additional capacity and service demands of the customers. ABC company took the help of network storage infrastructure software provider to achieve their goals by providing support for end to end redundancy and bondless scalability.
  • 12. By creating a scalable storage network with the ability to confidentially deliver the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract and retain customers and substantially build its business. As the same time, the solution has effectively lowered ABC company’s total cost of ownership for its entire storage solution: the IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively. a. What were the problem which ABC Company was facing before consulting network storage infrastructure software provider? b. What were the benefits of implementing a scalable storage network? c. List the different classes of ISPs and their applications A a. Mentioning the problems faced by ABC company after reading the SLM b. Listing the benefits c. Listing the different classes of ISP and their applications 6 Cryptography is the science of hiding information. The traditional security system employed a different of encryption process known as symmetric cryptography, which involves the use of te same method for both encryption and decryption. Explain the different networking algorithms that are used for cryptography along with its subtypes.
  • 13. A Explaining the two types of cryptography and the networking algorithms used for them MI0036- BUSINESS INTELLIGENCE & TOOLS 1 Similarity measures determine the similarity between the two objects. The similarity between the two objects ti and tj, sim(ti, tj) in the database D is a mapping from D*D to the range [0, 1]. a. List the characteristics of a good similarity measure. b. what are the four methods to determine the similarity characteristic between the two objects? A a. Listing the characteristics b. Listing the four methods a. Four methods to determine the similarity characteristic and their formula 2 Transactions refers to business or commercial transactions. Online transaction processing refers to the category of systems that assists and manage transaction- oriented applications, typically for data entry and retrieval transaction processing. List the differences between OLAP and OLTP A Listing at least 10 points
  • 14. 3 Data extraction is the act or the process of extracting data out of data sources for added data processing or data storage or data migration. This data can be extracted from the web. Explain the different techniques for data extraction A Listing the various techniques Explaining the four methods 4 Business Intelligence strategy summarizes the finest combination of procedures and technologies to meet the business intelligence strategies of an organization a. List the main aspects of BI strategy. b. What are the steps to be followed to implement BI framework? A a. Listing at least 6 main aspects of BI strategy b. Steps for Implementing BI framework 5 Write short note on a. Content Management System b. End User Segmentation
  • 15. c. Basic Reporting and querying d. OLAP A a. Content Management System b. End User Segmentation c. Basic Reporting and querying d. OLAP 6 RSG is a footwear company which has its chain all over the world. This company has to keep track of all the products sold in the company and huge data is involved in it. a. How should it plan to implement the Business intelligence solutions? b. How to make the best use of BI? A a. Explaining the planning to implement a BI solutions b. Explaining best usage of BI Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601
  • 16. These are just questions for reference . To check samples see our latest uploads in blog archive or search assignments . (Prefer mailing. Call in emergency )