MK0017-E-Marketing

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

DRIVE SUMMER 2015
PROGRAM MBADS – (SEM 4/SEM 6) MBAN2 / MBAFLEX – (SEM 4)

PGDROMN – (SEM 2)

SUBJECT CODE & NAME MK0017-E-Marketing
SEMESTER 4
BK ID B1810
CREDITS 4
MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

  1. Define E-Customers with some examples. Also explain the Online buying process.

Answer : E-Customers

One who buys product and services on internet or online are known as E-Customers. Online customers must have access to the Internet and a valid method of payment in order to complete a transaction.

Generally, higher levels of education and personal income correspond to more favorable perceptions of shopping online. Increased exposure to technology also increases the probability of developing favorable attitudes towards new shopping

 

 

 

 

2 An electronic marketplace (e-marketplace) refers to a website created for common interest. It integrates the online and physical component of a company. Discuss the five kinds of partners in an e-marketplace.

 

Answer : an Internet-based environment that brings together business-to-business buyers and sellers so that they can trade more efficiently online.

 

The key benefits for users of an e-marketplace are reduced purchasing costs, greater flexibility, saved time, better information, and better collaboration.

 

 

 

 

  1. Discuss about web analytics. List and explain the visitor statistics can be gained by using metrics.

Answer :  web analytics

Web analytics is a generic term meaning the study of the impact of a website on its users. Ecommerce companies and other website publishers often use Web analytics software to measure such concrete details as how many people visited their site, how many of those visitors were unique visitors, how they came to the site (i.e., if they followed a link to get to the site or came there directly), what keywords they searched with on the site’s search engine, how long they stayed on a given page or on the entire site and what links they

 

 

 

  1. Write a short notes on :

 

  1. Any five points on e-marketing as competitive advantage.

Answer : Some of the benefits associated with E-marketing include the availability of information. Consumers can access the Internet and learn about products, as well as purchase them, at any hour, any day. Companies that use Internet marketing can also save money because of a reduced need for a sales force. Overall, E-marketing can help

 

 

 

 

 

 

  1. Virtuous cycle of e-marketing

 

Answer : A virtuous circle is one where a good event feeds on itself to improve business further. It is a positive feedback loop. A virtuous circle can be small operating over days or it can drive a whole company’s strategy for decades.

 

Economic growth can be seen as a virtuous

 

 

 

 

 

5 Functions of E-marketing are represented by 2P+2C+3S formula (Personalisation, privacy, customer service, community, site, security, and sales promotion). These functions form the framework of an e-marketing strategy. Discuss this formula with a diagrammatic representation.

Explanation of 2P+2C+3S formula in detail

Diagram

 

Answer : e-Marketing is still quite a controversial subject to talk about, since no one succeeded to unify the various theories around it; however there is one thing upon which there is no doubt – that e-Marketing first appeared under the form of various techniques deployed by pioneer companies selling their products via the internet in the early 90’s.

 

e-Marketing Strategy

 

 

 

 

 

6 Discuss the selling methods and sales promotion of E-marketing

 

Answer : Online sales promotions are meant to turn site visitors into consumers. The objective is to get the visitor to take action by contacting a sales representative and ultimately buying the offered product. The methods to accomplish this goal are diverse and include:

 

  • Advertising
  • Loyalty and rewards programs
  • Contests
  • Search engine usage and optimization
  • Social media

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MK0015 Services Marketing and Customer Relationship Management

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT QUESTION PAPER

 

DRIVE SUMMER 2015
PROGRAM MBADS (SEM 4/SEM 6) MBAFLEX/ MBA (SEM 4)

PGDMMN (SEM 2)

SUBJECT CODE & NAME MK0015

Services Marketing and Customer Relationship Management

BK ID B 1808
CREDITS&MARKS 4 Credits, 60 marks

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

  1. 1. Define Customer Relationship Management (CRM). Explain the basic requirements for CRM implementation process.

 

Answer: Customer relationship management (CRM) is an approach to managing a company’s interaction with current and future customers. It often involves using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support.Over the years, we have heard a wide variety of terms that

 

 

 

 

  1. 2. What do you mean by Service quality? Briefly describe the steps involved in Gap analysis.

 

Answer:“Service quality is a focused evaluation that reflects the customer’s perception of specific dimensions of service: reliability, responsiveness, assurance, Empathy, tangibles. Satisfaction, on other hand, is more inclusive: it is influenced by perceptions of service quality, product quality, and price as well as situational factors and personal factors

 

Service quality affects customer satisfaction by providing performance (real benefits). For example, if consumers believe they have entered the McDonald’s restaurant, they will get food, service, high quality everywhere the same, no matter the location of the restaurant, put forward by Millend M Lele.

 

Steps involved in Gap analysis.

 

 

 

  1. 3. What do you mean by Service marketing? Describe the services marketing triangle in detail with figure.

 

Definition of Service marketing

services marketing triangle

 

Answer:Services marketing is a sub-field of marketing, which can be split into the two main areas of goods marketing (which includes the marketing of fast moving consumer goods (FMCG) and durables) and services marketing. Services marketing typically refers to both business to consumer (B2C) and business to business (B2B) services, and includes marketing of services such as telecommunications services, financial services, all types of hospitality services, car rental services, air travel, health care services and professional services.

 

Services are (usually) intangible economic activities

 

 

 

 

  1. 4. What do you mean by Customer acquisition in service marketing? What are all the essential requisites for an Organisation to be effective in its acquisition efforts?

 

Answer:Customer acquisition management is the set of methodologies and systems to manage customer prospects and inquiries generated by a variety of marketing techniques. Various marketing techniques that are believed to be effective at Customer Acquisition include customer referrals, customer loyalty programs, and participating in charitable events. Customer Acquisition Management can be considered the connectivity between advertising and customer relationship management. This critical connectivity facilitates the acquisition of targeted customers in an effective fashion.

 

Customer acquisition management has many similarities to

 

 

 

  1. 5. Write a short notes on:
  2. Branding of services

 

Answer:The basics of branding products and services are similar. Branding your service-based small business, though, poses challenges greater than those faced by product-driven companies. Services are intangible and each customer experience is unique. Even a small number of bad customer experiences can severely damage your brand and service reputation. This is especially true for smaller businesses in smaller communities where word of mouth spreads more easily.

 

 

 

 

 

  1. Differentiate between branding services and branding products.

 

Answer: Product brands are about products. Mars, a classic Product brand, doesn’t answer back, doesn’t get tired, isn’t anxious, is always ready to perform and always tastes the same. Every experience with a Product brand is/should be identical. Service brands aren’t like that. Service brands are about people. People who represent the organization lose their tempers, get tired and anxious, and sometimes have just had enough that day.

 

 

 

 

  1. 6. Write a short notes on :

 

  1. Self-service Technologies with examples

 

Answer:Self-Service Technologies (SSTs) are technological interfaces allowing customers to produce services independent of involvement of direct service employee. Self-Service technologies are replacing many face-to-face service interactions with the intention to make service transactions more accurate, convenient and faster.

 

Self-service success stories speak for themselves. Take this case study: The internal help desk at Microsoft supports more than 105,000 clients — employees, vendors and contractors — with five international call centers. Two years ago, in an attempt to reduce call volumes, the company deployed a number of self-service tools, including

 

 

 

 

  1. Customer Interaction Management(CIM)

 

Answer: Customer Interaction Management (CIM) refers to a type of Enterprise Software Application which is responsible for managing the interaction between an organisation and its customers. Normally, a CIM application will be deployed in a contact centre and used by the agents while communicating with clients customers of the organisation. Customer Interaction Management systems handle communication across multiple different channels, such as (but not exclusive to) e-mail, SMS, telephone, Instant Messaging, whitemail (scanned documents) and social media.

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MB0053 –International Business Management

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

DRIVE SUMMER 2015
PROGRAM MBADS / MBAN2 / MBAHCSN3 / MBAFLEX – (SEM 4)

PGDENMN /PGDFMN/ PGDHRMN / PGDHSMN / PGDIB /

PGDISMN / PGDMMN / PGDOMN / PGDPMN / PGDROMN / PGDSCMN / PGDTQMN – (SEM 2)

SUBJECT CODE & NAME MB0053 –International Business Management
BK ID B1724
Credit and Max. Marks 4 credits; 60 marks

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

1 “The world economy is globalizing at an accelerating pace”. Discuss this statement and list the benefits of globalization.

 

Answer: Globalization is the tendency of investment funds and businesses to move beyond domestic and national markets to other markets around the globe, thereby increasing the interconnectedness of different markets. Globalization has had the effect of markedly increasing not only international trade, but also cultural exchange. The advantages and

 

 

  1. Hofstede said “Culture is more often a source of conflict than of synergy”. Discuss this statement and explain the five cultural dimensions.

 

Answer: Hofstede’s cultural dimensions theory is a framework for cross-cultural communication, developed by Geert Hofstede. It describes the effects of a society’s culture on the values of its members, and how these values relate to behavior, using a structure derived from factor analysis. The theory has been widely used in several fields as a paradigm for research,[citation needed] particularly in cross-cultural psychology, international management, and cross-cultural communication.

 

 

 

 

 

 

3 Regional integration is helping the countries in growing their trade. Discuss this statement. Describe in brief the various types of regional integrations.

 

Answer: Regional integration is a process in which neighboring states enter into an agreement in order to upgrade cooperation through common institutions and rules. The objectives of the agreement could range from economic to political to environmental, although it has typically taken the form of a political economy initiative where commercial interests are the focus for achieving broader socio-political and security objectives,

 

 

 

 

  1. Write short note on:

 

  1. a) Foreign currency derivatives

 

Answer:A foreign exchange derivative is a financial derivative whose payoff depends on the foreign exchange rate(s) of two (or more) currencies. These instruments are commonly used for currency speculation and arbitrage or for hedging foreign exchange risk.With a foreign exchange (forex) derivative, the owner has the right but not the obligation to exchange money denominated in one currency for another currency at a pre-determined

 

 

 

 

  1. b) bases of international tax systems

 

Answer:International taxation is the study or determination of tax on a person or business subject to the tax laws of different countries or the international aspects of an individual country’s tax laws as the case may be. Governments usually limit the scope of their income taxation in some manner territorially or provide for offsets to taxation relating to extraterritorial income. The manner of limitation generally takes the form of a territorial, residency, or exclusionary system. Some governments have attempted to mitigate the differing limitations of each of these three broad systems by enacting a hybrid

 

 

 

 

 

  1. Strategic planning involves allocation of resources to firms to fulfil their long term goals. What are the types of strategic planning? Compare Top-down Vs Bottom-upplanning.

 

Answer:Strategic planning is an organization’s process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy. It may also extend to control mechanisms for guiding the implementation of the strategy.Following the generation of a vision and mission statement, and the subsequent operations that will allow these to be achieved, smaller facets of the planning process begin to come into play. These include five general planning frames, which can be applied to different aspects of the

 

 

 

 

 

6 Discuss the various payment terms in international trade. Which is the safest method and why?

 

 

Answer:International trade is the exchange of capital, goods, and services across international borders or territories. In most countries, such trade represents a significant share of gross domestic product (GDP). International trade is the exchange of goods and services between countries. This type of trade gives rise to a world economy, in which prices, or supply and demand, affect and are affected by global events.There is no predefined definition of personal import. In general a personal import is a direct purchase of foreign goods from

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA3050- ADVANCED COMPUTER NETWORKS

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3050- ADVANCED COMPUTER NETWORKS
CREDIT 4
BK ID B1650
MAX. MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

  1. Describe OSI Model. List and explain its seven layers.

 

Answer : The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

 

There’s really nothing to the OSI model. In fact, it’s not even tangible. The OSI model doesn’t do any functions in the networking process, It is a conceptual framework so we can better understand complex interactions that are happening. The OSI model takes the task of internetworking and divides that up into what is referred to as a vertical stack

 

 

 

 

  1. 2. Describe about DWDM. Explain the components of a basic DWDM system

 

Answer:Short for Dense Wavelength Division Multiplexing, an optical technology used to increase bandwidth over existing fiber optic backbones.

 

DWDM works by combining and transmitting multiple signals simultaneously at different wavelengths on the same fiber. In effect, one fiber is transformed into multiple virtual fibers. So, if you were to multiplex eight OC-48 signals into one fiber, you would increase the carrying capacity of that fiber from 2.5 Gb/s to 20 Gb/s. Currently, because of DWDM, single fibers have been able to transmit data at speeds up to 400Gb/s.

 

 

 

 

 

 

  1. 3. Describe about Peak cell rate (PCR) and Sustained cell rate (SCR).

 

Answer: If a service (or application) wishes to use a broadband network (an ATM network in particular) to transport a particular kind of traffic, it must first inform the network about what kind of traffic is to be transported, and the performance requirements of that traffic. The application presents this information to the network in the form a traffic contract.

 

An example of traffic that requires this type of service category are variable rate, compressed video streams. Sources that use rt-VBR connections are expected to transmit at a rate that varies with time (for example, traffic that can be considered bursty). Real-time VBR connections can be characterized by a Peak Cell Rate (PCR), Sustained Cell Rate (SCR), and

 

 

 

 

 

  1. 4. Describe the following:

 

  1. a) Open Shortest Path First (OSPF) protocol

 

Answer:Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 (2008).

 

OSPF is perhaps the most widely used interior

 

 

 

  1. b) Broader Gateway Routing Protocol (BGP)

 

Answer: Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet. The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol. The Border Gateway Protocol makes routing decisions based on paths, network policies, or rule-sets configured by a network administrator and is involved in making core routing decisions.

 

 

 

 

 

  1. 5. Write short notes on:

 

  1. a) Cryptography: Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients,

 

 

 

 

  1. b) Encryption:In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor.:374 In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext

 

 

 

  1. c) Decryption:Decryption is the reverse process to Encryption. Frequently, the same Cipher is used for both Encryption and Decryption. While Encryption creates a Ciphertext from a Plaintext, Decryption creates a Plaintext from a Ciphertext. The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password. Decryption is the process of converting

 

 

 

 

  1. d) Cryptanalysis: Cryptanalysis refers to the study of ciphers, ciphertext, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plaintext from the ciphertext, without necessarily knowing the key or the algorithm. This is known as breaking the cipher, ciphertext, or cryptosystem.

 

Cryptanalysis is the study of

 

 

 

 

  1. e) Cryptology:Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis. Since the cryptanalysis concepts are highly specialized and complex, we concentrate here only on some of the key mathematical concepts behind

 

 

 

 

 

  1. 6. Differentiate between Single server queue and Multi-server queue

 

Answer: Queueing theory is the mathematical study of waiting lines, or queues. In queueing theory a model is constructed so that queue lengths and waiting time can be predicted.Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service. Queueing theory has its origins in research by Agner Krarup Erlang when

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA3040- TECHNICAL WRITING

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

ASSIGNMENT

PROGRAM MCA
SEMESTER 3RD
SUBJECT CODE & NAME MCA3040- TECHNICAL WRITING
CREDIT 4
BK ID B0954
MAX.MARKS 60

 

1 What’s Audience Analysis? Explain its significance in Technical Communication

Answer : In few words, audience analysis is to know more about your end-users.

 

Audience Analysis is the task to identify your target audience to make sure that the information provided in the end-user documentation is suitable for satisfying their information requirements.

 

Why should you conduct Audience Analysis?

 

 

 

 

2 Explain the role of a technical editor. Differentiate between Micro and Macro editing.

 

Answer : To understand the role of a technical editor, a person must first understand technical editing. The term, simplified and in the context of technical communication, is the process of reviewing, revising, reorganizing, and many other gerunds that begin with “re.” The goal of editing is to take an author’s work and improve it—for whatever goal that author has. The goals of each author (and of each industry) are different—

 

 

 

3 Explain the various phases involved in System Development Life Cycle (SDLC).

 

Answer : System Study

Preliminary system study is the first stage of system development life cycle. This is a brief investigation of the system under consideration and gives a clear picture of what actually the physical system is? In practice, the initial system study involves the preparation of a System proposal which lists the Problem Definition,

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

MCA3030 – LINUX OS

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

ASSIGNMENT

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3030 – LINUX OS
CREDIT 2
BK ID B1563
MAX. MARKS 30

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

 

 

  1. List any ten commonly used commands along with their functions in Linux.

Answer: #1: top

I figured it was fitting to put the top command at the top. Although top is actually responsible for listing currently running tasks, it is also the first command Linux users turn to when they need to know what is using their memory (or even how much memory a system has). I often leave the top tool running on my desktop so I can keep track of what is going on at all times. Sometimes, I will even open up a terminal (usually aterm), place the window where I want it, and then hide the border of the window. Without a border, the terminal can’t be

 

 

 

  1. Describe about Run levels. Explain different run levels.

 

Answer: Runlevel is a mode of operation in one of the computer operating systems that implement Unix System V-style initialization. Conventionally, seven runlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonym for one of the levels. Only one runlevel is executed on startup; run levels are not executed one after another, i.e. either the runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order.

 

 

 

 

 

 

  1. 3. Describe the following:

 

  1. a) File encryption

 

Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily decrypted while being used and than encrypted again after we finished using them. Encrypting stored files

 

 

  1. b) Email encryption

 

Answer: Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email encryption may also include authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted). By means of some available tools, persons other than the designated recipients can read the email contents. Email encryption has been used by journalists and regular users to protect privacy.Email encryption can rely on public-key

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601

 

 

 

SUMMER  2015 ASSIGNMENT

 

 

PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM
CREDIT 4
BK ID B1650
MAX. MARKS 60

 

 

Note: Answer all questions. Kindly note that answers for 10 marks questions

 

 

  1. Differentiate between Two-Tier client/server databases and Multi-tier client/server databases.

Answer: Two-Tier Architecture:

 

The two-tier is based on Client Server architecture. The two-tier architecture is like client server application. The direct communication takes place between client and server. There is no intermediate between client and server. Because of tight coupling a 2 tiered application will run faster.

 

 

 

 

  1. Explain the physical query plan operators. What is the significance of Iterators?

 

Answer: A plan represents how data flows from a child operator to a parent operator in the form of a tree structure. Query execution flow can be read from right to left and from top to bottom.

In this article we’ll discuss some common and important operators like Index seek/scan, Join (Nested, Merge, and Hash), etc., which are useful to interpret a graphical execution plan and troubleshoot any performance issue due to a

 

 

 

 

  1. Differentiate between Serialisability and Recoverability.

 

Answer: Serializability

 

Serializability is the classical concurrency scheme. This helps to ensures that a schedule with regard to performing executing concurrent transactions is equivalent to one that executes the transactions serially in some order. It assumes that all accesses

 

 

 

 

 

  1. Discuss about Parallel query processing. How parallel-execution works?

Answer: When Oracle runs SQL statements in parallel, multiple processes work together simultaneously to run a single SQL statement. By dividing the work necessary to run a statement among multiple processes, Oracle can run the statement more quickly than if only a single process ran it. This is called parallel execution or parallel processing.

 

Parallel execution dramatically reduces response time for data-intensive operations on large databases typically associated with decision support systems (DSS) and data warehouses. Symmetric multiprocessing (SMP), clustered systems, and

 

 

 

  1. Differentiate between homogeneous and heterogeneous Database.

 

Answer: A DDBMS may be classified as homogeneous or heterogeneous. In a homogeneous system, all sites use the same DBMS product. In a heterogeneous system, sites may run different DBMS products, which need not be based on the same underlying data model, and so the system may be composed of relational, network, hierarchical and object-oriented DBMSs.

 

 

 

Homogeneous systems are much easier to design and

 

 

 

 

 

  1. Write short notes on ODMG standards. What are the various components of ODMG-93?

 

Answer: The ODMG standard builds upon the existing OMG, SQL-92, INCITS (formerly ANSI) programming language standards, and JavaSoft’s Java specification to define a framework for application portability between compliant data storage products. The standard’s functional components include an Object Model, an Object Definition Language, an Object Query Language, and Language Bindings to Java, C++, and Smalltalk.

 

The two primary benefits of the ODMG

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

  help.mbaassignments@gmail.com

or

call us at : 08263069601