BT0076, TCP/IP

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

PROGRAM BSc IT
SEMESTER THIRD
SUBJECT CODE & NAME BT0076, TCP/IP
CREDIT 4
BK ID B0965
MAX. MARKS 60

 

  1. 1. Draw the diagram of TCP/IP protocol suit. Explain networkinterface layer and Internet layer.

 

Answer:Understanding the intricacies of how computers interact is an important part of networking and is of equal interest to a sysadmin as well as to a developer. In this article, we will make an attempt to discuss the concept of communication from the very basic fundamental level that needs to be understood by everybody.

TCP/IP PROTOCOL SUITE

Communications between computers on a network is done through protocol suits. The most widely used and most widely available protocol suite is TCP/IP protocol suite. A protocol suit consists of a layered architecture where each layer depicts some func

 

  1. 2. What do you mean by frame relay? Describe the frame relayframe format with diagram.

 

Answer: Frame relay began as a stripped-down version of the X.25 protocol, releasing itself from the error-correcting burden most commonly associated with X.25. When frame relay detects an error, it simply drops the offending packet. Frame relay uses the concept of shared access and relies on a technique referred to as “best-effort”, whereby error-correction practically does not exist and practically no guarantee of reliable data delivery occurs. Frame relay provides an industry-standard encapsulation, utilizing the strengths of high-speed, packet-switched technology able to service multiple virtual circuits and protocols between connected devices, such as two router

 

  1. 3. Define ports and explain the two types of ports.

Answer:A parallel port is an interface allowing a personal computer (PC) to transmit or receive data down multiple bundled cables to a peripheral device such as a printer. The most common parallel port is a printer port known as the Centronics port. A parallel port has multiple connectors and in theory allows data to be sent simultaneously down several cables at once. Later versions allow bi-directional communications. This technology is still used today for low-data-rate communications such as dot-matrix printing.

The standard for the bi-directional version of a para

 

 

  1. 4. What do you mean by Telnet? Describe Telnet operation.

Answer:Telnet’s overall function is to define a means by which a user or process on one machine can access and use another machine as if it were locally connected. This makes Telnet inherently client/server in operation, like so many other application protocols in TCP/IP. Usually, the Telnet client is a piece of software that acts as an interface to the user, processing keystrokes and user commands and presenting output from the remote machine. The Telnet server is a program running on a remote computer that has been set up to allow remote sessions.

  1. 5. Define and explain Internet Message Access Protocol (IMAP4).

Describe Fundamental IMAP4 Electronic Mail Models.

 

Answer: IMAP (Internet Message Access Protocol) is a standard protocol for accessing e-mail from your local server. IMAP (the latest version is IMAP Version 4) is a client/server protocol in which e-mail is received and held for you by your Internet server. You (or your e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail. You can also create and manipulate multiple folders or mailboxes on the server

  1. 6. Draw and explain SNMP message format.

Answer: The communication of management information is accomplished through the exchange of SNMP messages that contain protocol data units (PDUs). Like the messages of most TCP/IP protocols, these PDUs are designed to use a particular field format, and are created, addressed and transported according to specific protocol rules. SNMP messages include fields that control the operation of the protocol, and carry a “payload” of management information in the form of Management Information Base (MIB) objects.  In this section I describe

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0075, RDBMS and MySQL

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

PROGRAM BSc IT
SEMESTER THIRD
SUBJECT CODE & NAME BT0075, RDBMS and MySQL
CREDIT 4
BK ID B1003
MAX. MARKS 60

 

 

 

 

  1. 1. What are the new features in MySQL 5.1?

Answer: Since the big leap forward to MySQL 5.0, it’s taken the MySQL development team three years, during which there have been a whole string of pre-release versions, to release the new version 5.1 of the popular database. MySQL 5.1.30 (General Availability) is available to download from various mirrors.  The most significant new features in MySQL 5.1 are the partitioning functions. These allow large tables to be distributed across multiple physical files and hard drives. MySQL supports what is known as horizontal partitioning, in which records are selected on the basis of a set criterion and saved in different locations. DATE columns are

  1. 2. How to alter databases and tables in MySQL? Explain with thehelp of examples.

Answer: ALTER TABLE changes the structure of a table. For example, you can add or delete columns, create or destroy indexes, change the type of existing columns, or rename columns or the table itself. You can also change characteristics such as the storage engine used for the table or the table comment.

Following the table name, specify the alterations to be made. If none are given, ALTER TABLE does nothing.

  1. 3. Explain MySQL update and replace statements with example

 

Answer:There may be a requirement where existing data in a MySQL table needs to be modified. You can do so by using SQL UPDATE command. This will modify any field value of any MySQL table.

Syntax:

Here is generic SQL syntax of UPDATE command to modify data into MySQL table:

UPDATE table_name SET field1=new-value1, field2=

  1. 4. Explain all the date and time functions in MySQL.

 

Answer: There is exclusive fields type to store Date and Date –Time in mysql or in other databases. As we know in any script date plays important role and we need to do many calculation and formatting to handle the date issues. It can be a simple Library book issue management to a customer compliant handling, these date fields are important for handling related data in a table.

MySQL have several date & time related functions to use in different situations and requirements. We will discuss some of the important functions here and use them for developing some sample codes.

  • date_add to add date & time to field data:We can use date_add function to calculate date & time values and store them in MySql table. Future

 

  1. 5. Describe the cursors in MySQL in detail.

 

Answer: Cursor is one of very useful option if you are doing database programming. In mysql cursor is a kind of loop facility given to traverse in the result of sql one by one. By using cursor in mysql we can operate on every result of the record. Cursor are supported in stored procedure and function only. By using MySql cursor we can loop through every

  1. 6. Briefly describe the error log and general query log in MySQL.

Answer: If you are a web developer, you need to refer to various log files, in order to debug your application or improve its performance. Logs is the best place to start troubleshooting. Concerning the famous MySQL database server (or MariaDB server), you need to refer to the following log files:

  • The Error Log. It contains information about errors that occur while the server is running (also server start and stop)

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0074, OOPS with JAVA

PROGRAM BSc IT
SEMESTER THIRD
SUBJECT CODE & NAME BT0074, OOPS with JAVA
CREDIT 4
BK ID B1002
MAX. MARKS 60

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

  1. 1. What are the keywords that java supports? Describe the datatypes available in java programming language?

 

Answer:In the Java programming language, a keyword is one of 50 reserved words that have a predefined meaning in the language; because of this, programmers cannot use keywords as names for variables, methods, classes, or as any other identifier. Due to their special functions in the language, most integrated development environments for Java use syntax highlighting to display keywords in a different color for easy identification.The Java programming language is a statically typed language, which means that every variable and every expression has a type that is known at compile time.The Java programming language is also a strongly typed

 

 

 

  1. 2. Describe StringBuffer class in java. List all the functionsrelevant to it and explain any five of them.

 

Answer:StringBuffer class is a mutable class unlike the String class which is immutable. Both the capacity and character string of a StringBuffer Class. StringBuffer can be changed dynamically. String buffers are preferred when heavy modification of character strings is involved (appending, inserting, deleting, modifying etc).

Strings can be obtained from string buffers. Since the StringBuffer class does not override the equals() method from the Object class, contents of string buffers should be converted to String objects for string comparison.
A StringIndexOutOfBoundsException is thrown if an

  1. 3. Describe with the help of an example the implementation ofinheritance in java.

 

Answer: Inheritance in Java is an Object oriented or  OOPS concepts, which allows to emulate real world Inheritance behavior, Inheritance allows code reuse in Object oriented programming language e.g. Java. Along with Abstraction, Polymorphism and Encapsulation, Inheritance forms basis of Object oriented programming. Inheritance is implemented using extends keyword in Java and When one Class extends another Class it inherit all non private members including fields and methods. Inheritance in Java can be best understand in terms of Parent and Child

 

 

  1. 4. Describe the catch and finally block statement in java withexamples.

 

Answer: Java’s finally block is useful in exception handling and always used in conjunction with try block. There should at least be one try block that finally block can be associated to. The try encloses a block of code in which exception may occur. When a piece of code throws an exception, it stops processing the remaining code in try block and transfers the control to an appropriate catch block if a catch block exists (catch block is optional), else control gets

 

  1. 5. Draw and Explain the Life cycle of a java applet with anexample.

 

Answer:Various states, an applet, undergoes between its object creation and object removal (when the job is over) is known as life cycle. Each state is represented by a method. There exists 5 states represented by 5 methods. That is, in its life of execution, the applet exists (lives) in one of these 5 states.

These methods are known as “callback

 

 

  1. 6. Explain all the steps of running the beanbox.

Answer: JavaBeans are reusable software components written in Java. These components may be built into an application using an appropriate building environment. The Bean Development Kit (BDK) from Sun includes a simple example of a building environment which uses beans, called the beanbox, and some sample beans.  This note will tell you how to set up and use the BDK on the Computer Science & Informatics Ubuntu Linux workstations and how to add your own beans to the BeanBox environment.

The BDK

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

MIT302-WEB TECHNOLOGIES

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 3
SUBJECT CODE & NAME MIT302-WEB TECHNOLOGIES
CREDIT 4
BK ID B1547
MAX. MARKS 60

 

  1. 1. Differentiate between TCP and UDP

Answer:TCP and UDP are two transport layer protocols, which are extensively used in internet for transmitting data between one host to another. Good knowledge of how TCP and UDP works is essential for any programmer. That’s why difference between TCP and UDP is one of the most popular programming interview question. I have seen this question many times on various Java interviews , especially for server side Java developer positions. Since FIX (Financial Information Exchange) protocol is also a TCP based protocol, several investment banks, hedge funds, and exchange solution provider looks for Java developer with good knowledge of TCP

 

  1. 2. Describe briefly about Event Handling and Data binding

 

Answer:Event Handling:Most programs, to be useful, must respond to commands from the user. To do so, Java programs rely on events that describe user actions. The event-handling techniques we’ve seen so far in this chapter are part of the Level 0 DOM: the de facto standard API that is supported by every JavaScript-enabled browser. The DOM Level 2 standard defines an advanced event-handling API that is significantly different (and quite a bit

 

  1. 3. Write short notes on:
  2. a) XPointer: XPointer is a language for locating data within an Extensible Markup Language (XML) document based on properties such as location within the document, character content, and attribute values. XPointer

 

  1. b) XML Scripting

Answer: XML Script and XML-Script are two unrelated XML technologies. The former (XML Script) is an XML transformation language, while the latter (XML-Script) is a Microsoft technology preview for scripting web browsers – think of it as an XML version of ECMA JavaScript. Microsoft is expected to rename their XML-Script as Atlas Script

 

 

  1. 4. Write short notes on:
  2. a) DOM: The Document Object Model (DOM) is a programming API for HTML and XML documents. It defines the logical structure of documents and the way a document is accessed and manipulated. In the DOM specification, the term “document” is used in the broad sense – increasingly, XML is being used as a way of representing many different

 

  1. b) SAX: SAX (Simple API for XML) is an application program interface (API) that allows a programmer to interpret a Web file that uses the Extensible Markup Language (XML) – that is, a Web file that describes a collection of data. SAX is an alternative to using the Document Object Model (DOM) to interpret the XML file. As its name suggests, it’s a simpler interface than DOM and is appropriate where many or very large files are to be processed, but it contains

 

 

  1. 5. Describe about Numeric and Associative PHP Arrays.

Answer: Array is one of the most vital part in every programming languages. It is also important to know what facilities and built-in functionality a programming language provides. PHP provides a very strong set of such efficient ways to deal with array data type. Time to time, I have discovered several usage of PHP arrays which not only saved my time but also made writing efficient code. I still often need to revisit these functions to memorize and use again. In this article,

 

 

  1. 6. Describe about ASP.

Answer: ASP.NET is a unified Web development model that includes the services necessary for you to build enterprise-class Web applications with a minimum of coding. ASP.NET is part of the .NET Framework, and when coding ASP.NET applications you have access to classes in the .NET Framework. You can code your applications in any language compatible with the common language runtime (CLR), including Microsoft Visual Basic and C#. These

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

MIT301– Object Oriented Analysis and Design

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

(FALL 2014) ASSIGNMENT

 

PROGRAM MCA (Revised Fall 2012)
SEMESTER 2
SUBJECT CODE & NAME MIT301– Object Oriented Analysis and Design
CREDIT 2
BK ID B1405
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

1.List the advantages of object oriented software development and Explain.

Answer : Object-orientation is a method of structuring the data and logic in a computer program in a way that makes it easier for a programmer to accurately model real business entities and processes. For example in an accounts receivable program we might define a “Customer” object that has an “UpdateAccounts” method that automatically updates all the accounts linked to the customer. Then in the program’s source code wherever we wish to ensure a customer’s accounts are updated we can simply write a line of code that looks like this:

 

 

 

 

2 What are the different methods that we can follow to develop efficient software using object oriented software development?

Answer : Fusion

 

The Fusion method is a combination of different sections of different methods. It was discounted almost immediately due to its failure to describe an organised methodology for developing applications. A large amount of documentation is produced during the Fusion methodology, however the processes by which that documentation is produced, the manner in which that documentation links – or its overall cohesiveness, and the actual worth of the documentation produced is sadly lacking.

 

 

 

3 What are the four phases of the object modeling technique? Explain.

Answer : Object Modeling Technique (OMT)

 

OMT (Rumbaugh et al., 1991) was developed as an approach to software development. A fundamental assumption of OMT is that object-oriented thinking represents a more natural and intuitive way for people to reason about reality (ibid.:21), although this claim has been severely questioned, e.g. by Høydalsvik and Sindre, 1993; and Hanseth and Monteiro, 1994.

OMT is included here because Rumbaugh (1993:18) discusses enterprise modeling explicitly using OMT. OMT is also a widely popular and comprehensive approach that exemplifies the vast number of object-oriented approaches to modeling.

 

 

 

4 Explain the different states of activity diagram.

Answer : Activity diagrams are often used to model business processes. They simply and quite plainly show how things work, and so function as a good aid to discussions of aspects of the workflow with the domain experts. These are less abstract than the often used object-oriented state machine diagrams.  Activity diagrams are an essential part of the modeling process. They are used to clarify complicated use cases, illustrate control among objects, or to show the logic of an algorithm. The UML 2.0 metamodel substantially refined and improved Activity diagrams; whereas the UML 1.4 Activity diagram was a subclass of State

 

 

5 Write a note on Object Constraint Language (OCL)

Answer : The Object Constraint Language (OCL) is an expression language that describes constraints on object-oriented languages and other modelling artifacts. A constraint can be seen as a restriction on a model or a system. OCL is part of Unified Modeling Language (UML) and it plays an important role in the analysis phase of the software lifecycle.

 

Object Constraint Language (OCL), is a formal language

to express side effect-free constraints. Users of the Unified Modeling Language and other

languages can use OCL to specify constraints and other expressions attached to their models.

 

 

 

 

6 What are the rules for developing usability testing?

Answer : Usability testing is a technique used in user-centered interaction design to evaluate a product by testing it on users. This can be seen as an irreplaceable usability practice, since it gives direct input on how real users use the system. This is in contrast with usability inspection methods where experts use different methods to evaluate a user interface without involving users.  Usability testing focuses on measuring a human-made product’s capacity to meet its intended purpose.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

MIT202– Data Base Management System(DBMS)

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 2
SUBJECT CODE & NAME MIT202– Data Base Management System(DBMS)
CREDIT 4
BK ID B1479
MAX. MARKS 60

 

 

 

 

  1. 1. Explain the functions of the following

(a) Entities

(b) Attributes

(c) Relationships

 

Answer:(a) Entities

Answer: Functions, variables, named constants, special forms, and macros are described using a distinctive typographical format. Table 1-1 illustrates the manner in which Common Lisp functions are documented. The first line specifies the name of the function, the manner in which it accepts arguments, and the fact that it is a

 

(b) Attributes

Answer: The keyword __attribute__ allows you to specify special attributes when making a declaration. This keyword is followed by an attribute specification inside double parentheses. The following attributes are currently defined for functions on all targets: noreturn, noinline, always_inline, pure, const, format, format_arg, no_instrument_function, section, constructor, destructor, used, unused, deprecated, weak, malloc, and alias. Several other attributes are defined for functions on particular target systems. Other attributes,

 

 

(c) Relationships

Answer: A function is a set of rules to wich you input a value and get an output. So, the set of rules could be a human body and its complex Chemistry or the program inside a hard drive. An equation is simply two things being equal in at least one aspect. For example 3x=9 whether is 9 apples in one side and 3 groups of pears in the other side or if they’re all apples. This could occur with two variables as well, for instance y=x+3 if on one side

 

  1. 2. List and explain the important responsibilities of database manager.

 

Answer: A data administration (also known as a database administration manager, data architect, or information center manager) is a high level function responsible for the overall management of data resources in an organization.  In order to perform its duties, the DA must know a good deal of system analysis and programming.

These are the functions of a data

 

 

  1. 3. Explain the Sequential File Organization with the help of diagrams.

 

Answer: A process-data diagram is a diagram that describes processes and data that act as output of these processes. On the left side the meta-process model can be viewed and on the right side the meta concept model can be viewed. A process-

 

 

  1. 4. Explain the LIKE Predicate

 

Answer: The LIKE predicate searches for strings that have a certain pattern. The pattern is specified by a string in which the underscore and percent sign may have special meanings. Trailing blanks in a pattern are part of the pattern.If the value of any of the arguments is null, the result of the LIKE predicate is unknown.The values for match-expression, pattern

 

 

  1. 5. Explain basic operations of Relational algebra?

 

Answer: Relational database systems are expected to be equipped by a query language that can assist its user to query the database instances. This way its user empowers itself and can populate the results as required. There are two kinds of query languages, relational algebra and relational calculus. Relational algebra is a procedural query language, which takes

 

  1. 6. Explain any two features of Features of Object Oriented System.

 

Answer:For you new programmers or programmers new to OOP, this article will briefly explain the 4 major principles that make a language object-oriented: Encapsulation, Data Abstraction, Polymorphism and Inheritence. All examples will be in VB.Net, because in my opinion its easier for a new OOP programmer to read and understand at first. Certainly don’t think I’m saying you should use one .Net based language over another, as they all are based on

 

  1. 7. Write a note on the following

a)SUBSET Mapping

Answer: SUBSET Mapping.A set is a well defined collection of objects. Well-defined means, that there exists a mechanism by which one is able to determine whether a given object belongs to a particular set or not. Objects that belong to a set are called elements or members of the set. Sets are usually denoted by capital letters and lower case letters are used to represent elements. A set A is said to be a subset of a set B; if and only if, every element of set A is also an element of set B. Such a relation between sets is denoted by A ⊆ B. It can also be read as ‘A is co

 

  1. b) SUPERSET Mapping

Answer: SUPERSET Mapping. A persistent class with a superset mapping contains attributes derived from columns of multiple tables. This type of mapping is also known as table spanning. Superset mappings are used to create “view classes” that hide the underlying data model, or to map a class inheritance tree to the database using a

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

MCA2010 – OPERATING SYSTEM

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

(FALL 2014) ASSIGNMENT

 

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 2
SUBJECT CODE & NAME MCA2010 – OPERATING SYSTEM
CREDIT 2
BK ID B1405
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

1 Differentiate between Distributed Systems and Real-time Systems.

Answer : A distributed real-time system composes two challenging sets of properties which are imposed by the problem domain or the solution domain (or both.)

 

Distributed

 

A distributed system links a number of independent computing entities with local properties by way of a communication mechanism. As a consequence, algorithms and other design components must take into consideration the synchrony and the failure model. A useful summary (not entirely objective) of distributed computing concerns is included in Deutsch’s Eight Fallacies of Distributed Computing. (See this useful exposition.) All of

 

 

 

 

2 Explain the different process states.

 

Answer : A process is a program in execution. The execution of a process must progress in a sequential fashion. Definition of process is following.

A process which is Executed by the Process have various States, the State of the Process is also called as the Status of the process, The Status includes whether the Process has Executed or Whether the process is Waiting for Some input and output from the user and whether the Process is Waiting for the CPU to Run the Program after the Completion of

 

 

3 Define Deadlock. Explain necessary conditions for deadlock.

 

Answer : A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. The earliest computer operating systems ran only one program at a time. Eventually some operating systems offered dynamic allocation of resources. Programs could request further allocations of resources after they had begun

 

 

 

4 Differentiate between Sequential access and direct access methods.

Answer : The hypertext and hyperlink exemplify the direct-access paradigm and are a significant improvement over the more traditional, book-based model of sequential access.

 

(Direct access can also be called random access, because it allows equally easy and fast access to any randomly selected destination. Somewhat like traveling by a Star Trek transporter instead of driving along the freeway and passing the exits one at a time, which is what you get with sequential access.)

 

In a normal, physical book, the reader is supposed

 

 

5 Differentiate between Daisy chain bus arbitration and Priority encoded bus arbitration.

 

Answer : In most mini- and mainframe computer systems, a great deal of input and output occurs between the disk system and the processor. It would be very inefficient to perform these operations directly through the processor; it is much more efficient if such devices, which can transfer data at a very high rate, place the data directly into the memory, or take the data directly from the processor without direct intervention from the processor. I/O performed in this way is usually called direct memory access, or DMA. The controller for a device

 

 

6 Differentiate between encryption and decryption. What are the two basic methods for encryption?

Answer : Encryption and decryption are both methods used to ensure the secure passing of messages and other sensitive documents and information.

 

Encryption basically means to convert the message into code or scrambled form, so that anybody who does not have the ‘key’ to unscramble the code, cannot view it. This is usually done by using a ‘cipher’. A cipher is a type of algorithm used in encryption that uses a certain described method to scramble the data. The cipher can only be ‘deciphered’ with a ‘key’. A key is the actual ‘described method’ that was used to scramble the data, and

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601