Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
1. Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
DRIVE
Winter 2015
PROGRAM
MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0036 – BUSINESS INTELLIGENCE & TOOLS
BK ID - B2043
CREDIT - 4
MARKS –60
Q1. a. List the factors responsible for the increasing importance of BI in organisations. b. What are
the obstacles in Implementing BI in Organisations 5, 5
Answer: Factors Responsible for the Increasing Importance of Business Intelligence in
Organisations: The increasing importance of BI is due to various factors, namely, technological
advancement, competitive market and need for quick reflexes. Let's
Q2. a. Discuss the contribution of business analytics in strategy management. b. How is CRM
linked to business intelligence? 5, 5
Answer: ContributionofBA in strategy Management: A good financial performance is the result of
betterbusinessoutcomes.Toachieve these outcomes, organizations need to develop and manage
multiple,interconnectedbusinessstrategies.BA solutions give an actionable business forecast that
can guide business strategies and technologies to provide
Q3. Explain the data mining process in detail. (Figure to data mining process, Explanation of the
process) 3, 7
Answer: Figure to data mining process:
Q4. 4 Briefly explain the 7 Ps of marketing mix
2. · Explaining the 7 Ps of marketing mix
Answer:
The service marketing mix is also known as an extended marketing mix and is an integral part of a
service blueprint design. The service marketing mix
Q5. What are the main features of a financial reporting system (At least 10 features) 10
Answer: Featuresofa financial reporting system:The followingare the main features of a financial
reporting system:
Drag-and-drop report builder: This feature helps in creating sophisticated reports and analyzing
themwithease.Togenerate a report,youneedtoselectthe desireditems from a menu, drag them
onto a graphical workspace and choose appropriate
Q6. Discuss the various critical challenges that need to be overcome for BI to succeed within an
organization (Listing the critical challenges) 10
Answer: Critical Challenges for Business Intelligence Success: Business success is achieved with BI
througheasilyaccessibleinformation.Thisaccesscanbe best achieved with the help of precise and
timelyinsightintothe financesandcustomersof an organization as well as the state of the market.
The true indicator of success in business is when
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
3. DRIVE
Winter 2015
PROGRAM
MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0035 – COMPUTER NETWORKS
BK ID - B1973
CREDIT – 4, MARKS – 60
Q1. Explain the working of Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Protocol. (Working of CSMA/CD in a Flowchart, Explaining the working in detail) 2, 8
Answer: working of CSMA/CD in a flowchart:
Q2. 2 Write a brief note on seven layered OSI reference model. Explain the role of each layer.
· Define seven layered OSI reference model
· Explaining the role of 7 layers
Answer: The Seven-Layered OSI Model: The OSI reference model emerged as a first step towards
international standardisation of the protocols used in the various layers by the ISO. Themodel is
called the ISO OSI reference model as it deals
Q3. Write short notes on: 3, 7
a. Subnet
b. Super netting
c. Subnet masks
d. Dynamic NAT
e. Domain Name System
Answer: Subnets: A network that exists within the Class A, B, or C network is called a subnet.
It can alsobe definedasanetworkwithinanetwork. Subnets are created to extend network IDs by
using host bits of one or more Class A, B, or C. Therefore, subnets can have a network ID of any
length. All devices that have IP addresses with same
Q4. What is DWDM? What are the pros and cons of DWDM (Definition, Four pros of DWDM, Four
cons of DWDM) 2, 4, 4
4. Answer: DWDM: Networkcapacityhasincreaseddrasticallyasthe numberof users has increased in
the telecommunicationindustry.Amongthe variousmethods used for increasing network capacity,
a few are listed as follows:
· Enhance the bit rate of existing system
· Install new fiber
· Optimize the use of
Q5. Brieflyexplainthe networkingapplicationsin governmentsector (Listingthe objectives,About
networking applications – understanding the networking for government sector and listing the
websites and portals and explaining for them) 2, 8
Answer: NetworkingApplicationsinGovernmentSector: In the governmentsector,e-governanceis
part of the networkingapplications.Electronicgovernance(e-governance) is the application of IT by
the government for providing better facilities or services to its citizens, inane efficient manner. It
helps in improving access of citizens to the government services and delivering these services on
time. In other worse-governance is a medium used by the government
Q6. Explore the different models in cloud environment and their examples (Introducing
Infrastructure as a Service, Introducing Platform as a Service, Introducing Software as a Service,
Explaining Cloud Elements) 2, 2, 2, 4
Answer: Infrastructure as a Service: Infrastructure as a Service (IaaS) allowsyoutodeliverhardware
resources, such as servers, storage space and network, as cloud service to the customers. In
addition,operatingsystemsandvirtualizationtechnology are provided to the customers to manage
the resources.Iasi deliverscomputerinfrastructure,i.e.,the virtualized infrastructural environment
as a service tithe end users. Clients or customers, instead of investing in
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
5. MI0034
Winter 2015
1 a. Explain the different components of Database Management System (DBMS)
b. With an example explain the properties of DBMS
a. Various components of DBMS
b. Listing three important properties of database
Explaining each property with an example
Answer: A) components of Database Management System
Database engine
Database engine is termed as the heart of the
2 Explain the different operations of relational algebra with suitable examples.
Explaining the various operations of relational algebra with an example
Answer: Relational Algebra
Relational algebraisa language in which one relation gets defined by another relation without the
original relation getting changed. There are many operations
3 Write short notes on
a. Cardinality ratio
b. Participation constraints
a. Defining cardinality ratio
Explaining the four types of mapping cardinalities example for each of the cardinality mapping
b. Explaining the two ways of participation roles
Answer: A) The cardinality ratio specifies the number of entities to which another entity can be
associated through a relationship set.
The different mapping cardinalities are of
4 a. Define SQL
b. Explain the different types of SQL
6. a. Defining SQL
b. Defining four different types of SQL
Answer: A) SQL is a relational database language used to communicate with a database. The
AmericanNational StandardsInstitute declared the standard language for RDBMS. Accordingly, the
commonrelational database managementsystems that SQL uses are Oracle, Sybase, Microsoft SQL
Server, Access, and so on. When the
5 a. Explain the two-phase locking protocol
b. Elaborate advantages and disadvantages of Distributed database management system
a. Explaining two phase locking protocol with various phases
b. Explainingfouradvantagesand four disadvantages of distributed database management system
Answer: A) The two-phase locking protocol
The two-phase locking protocol is a process to access the shared resources as their own without
creating deadlocks. This process consists of two phases.
1. Growing phase – In this phase, the transaction may acquire lock, but may not release any locks.
Therefore, this phase is also called as resource acquisition activity.
2. Shrinking phase – In this
6 What is client–server model ? Briefly explain the advantages of client–server model
a. Defining client-server model with different parts
b. Listing 3 advantages of client–server model
Answer: Client–server model
The client–server model is basic to distributed systems; it allows clients to make requests that are
routed to the appropriate server in the form of transactions. The client–server model consists of
three parts
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
7. DRIVE
Winter 2015
PROGRAM
MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0033 – SOFTWARE ENGINEERING
Qus:1 Explain the concept of “software project life cycle” with a suitable example.
· Explaining software project life cycle
Answer:
Explaining software project life cycle:
We can classifysoftware developmentprojectsintovarioustypesbasedontheir businessfunctional
domain.Incase a software companyisinterestedinspecialisinginonlyone productorservice,itwill
need to understand that particular function or domain thoroughly. Mere technical knowledge in
how to develop the software by
Q2. Write short notes on: 2, 2, 2, 4
a. Planning and estimation phase
b. Scheduling and tracking phase
c. Risk analysis phase
d. Scope of a software project
Answer: a. Planning and estimation phase: This is the second phase of the project management
process. Inthisprocess,a projectteamthat was appointedinthe initiation stage, plans for the next
phase and sets up the vision
Qus:3 a. Explain function oriented metrics
b. How do you calculate function points?
Ans:
a. Explaining the meaning of function-oriented metrics along with their types and the five
information domain value calculation terminology:
The function-oriented metrics are indirect software metrics. Instead of the number of LOC, the
emphasis is more on the functionality of the product. The function-oriented metrics were first
proposedby Albrecht. He suggested a productivity measurement approach known as the Function
point method. In this method,
8. Qus:4 a. Explain the system architecture specification
b. Explain System specification review
Ans:
a. Explaining the four main components of system architecture:
These components are as follows:
· Processing power – The processing power depends on the computer or the server. The correct
processormustbe selectedandinstalledon to a system. The selection of the processor is based on
the software
Qus:5 Explain the different types of integration testing
· Atleast 5 types of integration testing
Answer:
Atleast 5 types of integration testing:
1. Top-down integration:
We can state an incremental approachto develop a program as top-down integration. In top-down
integration, we first recognise
Q6. Explain Five maturity levels of Capability Maturity Model (CMM)
· Five maturity levels of CMM
Answer:
Levels of the CMM
There are five levels of the CMM:
Level 1 - Initial
Processes are usually ad hoc and the organization usually does not provide a stable environment.
Success in these organizations depends on the competence and heroics of the people in the
organization and not on the use of proven
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601