BT9003, Data Storage management

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT9003, Data Storage management
CREDIT 4
BK ID B1190
MAX.MARKS 60

 

 

Question.1.Explain the practices and techniques to consider when developing a data protection strategy.

 

Answer:The size of an enterprise determines which practices, processes or technologies are used for data protection. It is not reasonable to assume that a small business can deploy expensive, high-end solutions to protect important data. On the other hand, backing up data to tape or disk is certainly something that any enterprise can do. A large enterprise will have both the resources and the motivation to use more advanced technology.

 

The goal is the same no matter what the size or makeup of the company. Data protection strives to minimize business losses due to the lack of verifiable data

 

 

Question. 2.Explain RAID 0, RAID1 and RAID 0+1.

 

Answer:On most situations you will be using one of the following four levels of RAIDs.

  • RAID 0
  • RAID 1
  • RAID 10 (also known as RAID 1+0)

In all the diagrams mentioned below:

  • A, B, C, D, E and F – represents blocks

 

 

 

Question.3 How ILM supports implementation of regulatory concerns? Explain with an example.

 

Answer:Informatica ILM Nearline is highly scalable, high-performance software that empowers IT organizations to cost-effectively manage the explosion of data growth in their SAP BW systems. The software enables IT teams to easily and safely move infrequently-accessed data from SAP BW into an integrated nearline data store. Nearlined data can

 

 

Question.4. Describe the two majorproduct classes in storage networking.

 

Answer: Storage networking is the practice of linking together storage devices and connecting them to other IT networks. Storage networks provide a centralized repository for digital data that can be accessed by many users, and they use high-speed connections to provide fast performance. It’s most common to find storage networks in enterprise settings, although some vendors do sell networked storage products for consumers and small businesses.

 

 

 

 

Question.5Briefly explain redundant I/O path elements.

 

Answer:Multipath I/O (MPIO) is a Microsoft framework designed to mitigate the effects of a host bus adapter (HBA) failure by providing an alternate data path between storage devices and a Windows operating system. MPIO enables up to 32 alternate paths to add redundancy and load balancing for Windows storage environments.

Pathing is a networking approach used to address the specific needs of storage networks by changing the way that communication paths are managed and

 

 

 

Question.6 Describe file system hierarchy and parsing the file system.

 

Answer:The Filesystem Hierarchy Standard (FHS) defined the directory structure and directory contents in Unixand Unix-like operating systems. It is maintained by the Linux Foundation. The latest version is 3.0, released on 3 June 2015.  Currently it is only used by Linux distributions.A File System defines a logical way to read and write information. In this way, it can be considered a specification. Most PC file systems are based off of the desktop concept of files and folders.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT8902, E-COMMERCE

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT8902, E-COMMERCE
CREDITS 4
BK ID B1186
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

Question.1. Explain the different operation modes associated to e–commerce.

 

Answer:E-Commerce or Electronics Commerce business models can generally categorized in following categories.

 

Business – to – Business (B2B): Website following B2B business model sells its product to an intermediate buyer who then sells the product to the final customer. As an example, a wholesaler places an order from a company’s website and after receiving the consignment, sells the end product to final customer who comes to buy the product at wholesaler’s retail outlet.

 

Business – to – Consumer(B2C): Website following B2C business model sells its product directly to a customer. A customer can view products shown

 

 

 

 

Question.2. What is a protocol? List the common properties of a protocol.

 

Answer:In computing, a protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software, or a combination of the two. At the lowest level, a protocol defines the

 

 

 

 

Question.3. What is the difference between direct and indirect metrics?

 

Answer:Direct metrics are the software metrics that can be measured directly without using any functionality, complexity. line of code , execution speed, defect rate reported over a certain period of time interval are some of the direct metrics. Indirect metrics are the metrics that are measured indirectly. When compared to direct metrics, indirect metrics are more difficult to collect. These metrics are usually associated with an object feature that is to be measured. Function – oriented metrics can be considered as indirect software metrics. To measure out the plant.To forecast the relationship between models product and process. Product quality and process performance can be improved by developing the inefficiencies, root causes of a product. The languages which are used in programming gives the difference between the

 

 

 

Question.4. Explain the architectural components of CRM.

 

Answer:When company communicates its customers the process can involve many different people within both organizations using a variety of different methods. CRM is the acronym for the term “Customer Relationship Management”. The main tool that is used is an order that is communicated by company’s customer to its sales department. However this is only one of many communications that should be managed. To ensure that company

 

 

 

Question.5. List and explain the key components of electronic supply chain management.

 

Answer:Supply chain management (SCM) is the management of the flow of goods and services. It includes the movement and storage of raw materials, work-in-process inventory, and finished goods from point of origin to point of consumption. Interconnected or interlinked networks, channels and node businesses are involved in the provision of products and services required by end customers in a supply chain. Supply chain management has been defined as the “design, planning, execution, control, and monitoring of supply chain activities with

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0088- Cryptography and Network Security

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

SPRING 2016 ASSIGNMENT

 

PROGRAM BSC IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT0088- Cryptography and Network Security
CREDITS 4
BK ID B2069
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

Question. 1. Explain Caesar’s Cipher encryption technique.

                                                                 

Answer:In cryptography, a Caesar cipher, also known as Caesar’s cipher, the shift cipher, Caesar’s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

 

 

 

 

Question. 2. Explain data encryption standard (DES).

 

Answer:DES works by using the same key to encrypt and decrypt a message, so both the sender and the receiver must know and use the same private key. Once the go-to, symmetric-key algorithm for the encryption of electronic data, DES has been superseded by the more secure Advanced Encryption Standard (AES) algorithm.

 

Originally designed by researchers at IBM in the early 1970s, DES was adopted by the U.S. government as an official Federal Information

 

 

 

 

Question. 3. Describe the principles of Public-Key Cryptosystems.

 

Answer:Public-key cryptography refers to a set of cryptographic algorithms that are based on mathematical problems that currently admit no efficient solution — particularly those inherent in certain integer factorization, discrete logarithm, and elliptic curve relationships. It is computationally easy for a user to generate a public and private key-pair and to use it for encryption and decryption. The strength lies in the “impossibility” (computational impracticality) for a properly generated private key to be determined from its corresponding public key. Thus the public key may be published without compromising security. Security depends

 

 

 

Question. 4.Write short notes on

 

  1. a) Digital signature

 

Answer:A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message (authentication and non-repudiation), and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.

 

 

 

 

Question. 5. Describe Kerberos.

 

Answer:Kerberos /ˈkərbərəs/ is a computer network authentication protocol which works on the basis of ‘tickets’ to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades (hellhound). Its designers aimed it primarily at a client–server model and it provides mutual authentication—both the user and the server verify each other’s identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.  Kerberos

 

 

 

Question. 6. Explain Security Socket Layer (SSL).

 

 

Answer:The Secure Sockets Layer (SSL) is a computer networking protocol that manages server authentication, client authentication and encrypted communication between servers and clients.SSL uses a combination of public-key and symmetric-key encryption to secure a connection between two machines, typically a Web or mail server and a client machine, communicating over the Internet or an internal network.

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

BT0087, WML and WAP Programming Theory

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

 

ASSIGNMENT

PROGRAM BSc
SEMESTER V
SUBJECT CODE & NAME BT0087, WML and WAP Programming Theory
CREDIT 4
BK ID BT0087
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

Q.1 Explain doctype declaration and line breaking in WML with examples.

Answer:- All WML documents must have the DOCTYPE declaration. It should be placed between the XML declaration and the <wml> element. Below is the DOCTYPE declaration for WML 1.3. You can simply copy and paste it into your WML files

The DOCTYPE declaration specifies the name of the DTD (

 

  1. 2. Describe the various data types available in WML script.

 

Answer:Like JavaScript, WMLScript is weakly typed. WMLScript has only one type of variable, which is var. However, WMLScript variables are actually handled as five primitive data types internally. A variable can be used to store a value of any of the five primitive data types. The data types supported in WMLScript are:

 

 

 

  1. 3. Briefly explain the WML external functions with an example.

 

Answer:In WMLScript, all code must be encapsulated in functions. This is different from JavaScript in which a web developer can choose whether to place the code in functions or directly in the markup. A function in WMLScript is defined using the following format. The parts enclosed inside brackets [] are optional.

 

 

[extern] function function_name([argument1,

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

BT0086, Mobile Computing

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

 

PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT0086, Mobile Computing
CREDITS 4
BK ID B2067
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

Question. 1. How “wireless and mobile are two different concepts”. Explain any two applications that use wireless networks and mobile communications.

 

Answer:The term wireless communication was introduced in the 19th century and wireless communication technology has developed over the subsequent years. It is one of the most important mediums of transmission of information from one device to other devices. In this technology, the information can be transmitted

 

 

Question. 2. What is modulation? Briefly explain Amplitude Modulation (AM), Frequency Modulation (FM) & Phase modulation (PM).

 

Answer:The process of impressing low-frequency information to be transmitted on to a high-frequency wave, called the carrier wave, by changing the characteristics of either its amplitude, frequency, or phase angle is called modulation.

 

Functions of the Carrier Wave: The main function of the

 

 

Question. 3. Explain the GSM TDMA frame with the help of frame structure.

 

Answer:In GSM frequency band of 25 MHz is divided into 200 KHz of smaller bands, each carry one RF carrier, this gives 125 carriers.As one carrier is used as guard channel between GSM and other frequency bands 124 carriers are useful RF channels.This division of frequency pool is called FDMA. Now each RF carrier will have eight time slots. This division time wise is called TDMA. Here each RF carrier frequency is shared between 8 users hence in GSM system, the basic radio resource is a time slot with duration of about 577 microsec. As

 

 

 

Question. 4. Explain Hard handover and Soft handover in UMTS.

 

Answer:There are following categories of handover (also referred to as handoff):

 

Hard Handover: Hard handover means that all the old radio links in the UE are removed before the new radio links are established. Hard handover can be seamless or non-seamless. Seamless hard handover means that the handover is not perceptible to the user. In practice a handover that requires a change of the carrier frequency (inter-

 

 

 

 

Question. 5. What are the advantages and disadvantages of Infra-red technology?

 

Answer:Electromagnetic frequencies currently have little legal status for protection and as such, can be freely intercepted by motivated individuals. This doesn’t mean wireless transmission is easily breached, as security varies by the type of wireless transmission method. As presented earlier in the advantages and disadvantages of infrared versus radio frequency transmission, what might be considered an advantage to one method for transmission

 

 

 

Question. 6. Write short notes on the following:

 

(a) HiCoMo: High Commit Mobile Transaction Model

 

Answer:The model allows the aggregate data to be updated in disconnection mode, while guaranteeing a very high rate of commitment on reconnection. We name such transactions High Commit Mobile Transactions, or HiCoMo. At reconnectiontime, HiCoMo’s are analyzed and several base (fixed network) transactions are generated in

 

 

 

(b) Kangaroo mobile transaction model

 

Answer:The rapid growth in the use of wireless communication and mobile devices has created a potential for variety of mobile transaction support. The variety of mobile transaction models have already been developed for dealing with different challenging requirements in this environment. However, a transaction management in mobile computing environment faces several challenges such as scarce bandwidth, limited energy resources, asymmetry in wired and wireless connectivity, asymmetry in mobile and fixed hosts, and mobility

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

MIT4034– Enterprise Resource Planning (ERP)

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

[ SPRING 2016 ] ASSIGNMENT

 

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 4
SUBJECT CODE & NAME MIT4034– Enterprise Resource Planning (ERP)
CREDITS 4
BK ID B1638
MARKS 60

 

 

Note: Answer all the questions.

 

 

Question. 1. Define ERP. What are the benefits of ERP?

 

Answer:Enterprise resource planning (ERP) is a category of business-management software—typically a suite of integrated applications—that an organization can use to collect, store, manage and interpret data from many business activities, including:

 

  • product planning, cost
  • manufacturing or service delivery
  • marketing and sales

 

 

 

Question 2. List the main parts of the Accounting and Finance module. Explain any two.

 

Answer : Enterprise Resource Planning System(ERP), just by considering name we can simply define ERP as  System or software that used to manage all the resources of whole enterprise. Right from employee payments to single screw coming into the enterprise , everything  can be managed & tracked by using ERP Systems. ERP is a cross functional software that supports all the business processes within the organization.

 

 

 

Question. 3. What are the limitations of integrated management information system?

 

Answer:A Management Information System (MIS) focuses on the management of information systems to provide efficiency and effectiveness of strategic decision making. The concept may include systems termed transaction processing system, decision support system, expert system, or executive information system. The term is often used in the academic study of businesses and has connections with other areas, such as information systems, information technology, informatics, e-commerce and computer science; as a result, the term is used

 

 

 

 

 

Question. 4. What are the general characteristics of management information systems?

 

Answer:For information to be useful to the decision maker, it must have certain characteristics and meet certain criteria.

 

Some of the characteristics of good information are

 

 

 

Question. 5. Explain why quality management is vital for companies?

 

Answer:Managing quality is crucial for small businesses. Quality products help to maintain customer satisfaction and loyalty and

 

 

Question. 6. List and Explain the different ways to manage the testing of ERP systems

Answer : One of the most critical factors in any Enterprise Resource Planning (ERP) implementation is testing. Research points out that in line with the volume and criticality of ERP implementations, testing occupies nearly 50% of the total ERP budget.

Given the strong growth experienced in the ERP

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

MIT4021– C# and .Net

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

 

 

[ SPRING, 2016 ] ASSIGNMENT

 

 

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 4
SUBJECT CODE & NAME MIT4021– C# and .Net
CREDITS 4
BK ID B1187
MARKS 60

 

 

Note: Answer all the questions.

 

Question.1. Explain the steps to execute C# programs using visual studio IDE.

 

Answer:There are different ways for this:

 

1.Building C# Applications Using csc.exe

 

While it is true that you might never decide to build a large-scale application using nothing but the C# command-line compiler, it is important to understand the basics of how to compile your code files by hand.

 

 

Question.2. Explain the following in context of methods in C# with the help of examples:

  1. Invoking methods
  2. Nesting of methods

 

Answer:For writing a nested function in C#, we would make use of delegates and anonymous functions. A delegate is nothing but a “function pointer”. And an anonymous function is a function/method without a name. Below, we are declaring a delegate which will point to an anonymous function.

 

 

 

  1. A) Invoking methods

 

The keyword static implies that only one instance of the member exists for a class. Static variables are used for defining constants because their values can be retrieved by invoking the class without creating an instance of it. Static variables can be initialized outside the member function or class definition. You can also

 

 

  1. B) Nesting of methods

 

Nesting of Methods

 

  • If a method in java calls a method in the same class it is called Nesting of methods. When a method calls the method in the same class dot(.) operator is not needed.
  • A method can call more than

 

 

 

Question.3. What do you mean by members in C#? Explain constant members and read only members also explain properties in C#.

 

Answer: Classes and structs have members that represent their data and behavior. A class’s members include all the members declared in the class, along with all members (except constructors and destructors) declared in all classes in its inheritance hierarchy. Private members in base classes are inherited but are not accessible from derived classes.

 

The following table lists the kinds of members a class or struct may contain:

 

Member

Description

 

 

 

 

Question.4. How to handle exception in C#. Explain the syntax with an example.

 

Answer:Exceptions are unforeseen errors that happen in your programs. Most of the time, you can, and should, detect and handle program errors in your code. For example, validating user input, checking for null objects, and verifying the values returned from methods are what you expect, are all examples of good standard error handling that you should be doing all the time.

 

 

 

 

Question.6. Elaborate the steps for the following:

  • Creating the show.aspx page

Answer : To add a page with code separation to the Web site

  1. Close the Default.aspx page. To do this, right-click the tab with the file name in it and then clickClose.
  2. InSolution Explorer, right-click the Web site (for example, C:\BasicWebSite) and then click Add New Item.
  3. UnderInstalled Templates, click Visual Basic or Visual C# and then select Web Form from the list.

 

 

 

  • Adding code to the show.aspx page

Answer :  An embedded code block is server code that executes during the page’s render phase. The code in the block can execute programming statements and call functions in the current page class.

The following code example shows an ASP.NET Web Forms page with an embedded code block that displays the results of a loop.

C#

VB

<%@ Page Language=”C#” %><html>

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

  “ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )