Está en la página 1de 12

MBA, BBA, BCA, MCA, BSC-IT, MSC -IT Assignments for SMU (Sikkim Manipal

University)

Call +91- 9727035877 to enquire. Whatsapp: 9830110214.


Mail: projecthelpforyou@gmail.com
FOR FULL ASSIGNMENTS, PLEASE CALL ON 09712985389.WHATSAPP: 9830110214

How much time is required for delivery of the support after the payment?
You will receive the support in just 15 minutes by email after the payment.
However, in some unavoidable circumstances it may take maximum of 8 hours
after the actual payment credit.
Price: we make different answer to each student, so need 1 day time to make
some changes after payment.
You will get solved assignments after 1 Day of payment, in word doc as per SMU
new guidelines.

Charges are :
Semester 1 : Rs 1200/Semester 2 : Rs 1200/Semester 3 : Rs 1200/Semester 4 : Rs 1500/-

We also provides MBA project synopsis ans projects reports as per SMU
guidelines.
We have lots of ready project to save your time.

Project Charges: Rs.1500/-

Mode of delivery: All our services will be delivered by email only.

SAMPLE:---

FOR FULL ASSIGNMENTS, PLEASE CALL ON 09712985389.WHATSAPP: 9830110214

BEST QUALITY ASSIGNMENTS. PROVIDING FOR LAST 3 YEARS SUCCESSFULLY.

DRIVE
FALL DRIVE 2014
PROGRAM
MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDOMN (SEM 1)
SUBJECT CODE & NAME
MI0038- ENTERPRISES RESOURCE PLANNING
Qus:1 Explain the relationship between business functions and business processes in the insurance
sector

Explaining the terminologies business function and business processes

Explaining the relationship with insurance example

Drawing the relationship with a diagram

Ans:
Business function and business processes
Business function

A business function refers to an activity that an enterprise performs to realise its pre-determined goals
and objectives. You can also define a business function as a series of rationally interrelated activities or
tasks performed by an enterprise in order to obtain the desired results. Generally,an enterprise classifies
similar activities into groups to simplify work, increase efficiency, and allocate resources effectively. For
example,activities, such as recruitment, performance appraisal, and compensation management, come
under the human resource function of an enterprise. Business functions are broadly categorised into two
types:

Qus:2 Explain ERP selection process


Ans:

ERP selection process

Every organisation has different requirements, the process of selecting an ERP system varies across
different organisations. However, there are some common steps that are adopted by all organisations
while selecting an ERP system. These steps are:

Qus:3 Earlier payroll systems used the systems which were more than process time sheets, print
payroll checks and keep total so f annual wages and deductions. Present day systems used
computer-based system that optimises the collection, collation, transfer and presentation of
information throughout an organisation. Explain the various Roles of MIS. Explain decision
support system and its advantages and disadvantages

4 roles of MIS

Defining decision Support system

Advantages and disadvantages of DSS

Ans.

Various Roles of MIS

The main aim of MIS is to help managers in making complex business decisions easily and efficiently.
Besides, MIS helps an organisation in the following ways:

Deal with business complexities: The business environment is changing constantly with continuous
advancement in technology. These changes have increased the complexity of different business functions.

Ques4. Evaluate the role of vendor evaluation sub-module of the materials management module

Explaining vendor evaluation

Explaining the role of vendor evaluation sub module

Ans.

Vendor evaluation

Vendor evaluation is a process in which an organisation appraises the potential suppliers of materials by
performing measurable assessments. It is one of the most important steps of the purchasing process. This
is because,the quality of final output depends on the quality of materials provided by vendors. Therefore,
it is essential for an organisation to

Que5. Write short notes on


a. Sub-modules of CRM
b. Features of human resource management module

Ans.

3 sub-modules of CRM

These sub-modules are shown in Figure:

Ques6.
a. Explain some of the technologies provided by PeopleSoft Inc.
b. Explain the different modules under MFG/PRO application

Ans.

Technologies provided by PeopleSoft Inc

PeopleSoft Inc. uses new and advanced technologies in its products. Some of these technologies are:
PeopleSoft Self-Service Applications: These Java-based, cross-platform applications help employees,
customers, suppliers, and other occasional users of an or anisation to perform self-service administrative
tasks easily and effectively. These applications work in coordination with PeopleSofts core product lines,
such as human resource
DRIVE-Fall DRIVE 2014
PROGRAM/SEMESTER-MBADS (SEM 4/SEM 6) MBAFLEX/ MBAN2 (SEM 4)

PGDISMN (SEM 2)
SUBJECT CODE & NAME-MI0039- E-COMMERCE

Q1. Warigon is a retail company and they want to automate the payment system. Assume that you
are the design engineer of that company. What are the factors that you would consider while
designing the electronic payment system? (Analyzing- 5 marks, Factors- 5 marks) 10 marks)
Answer.
Analyzing Factors:
These factors are as follows ease of access, use and integration, acceptability and client base.
Ease of use and access: The best payment processing system should be easy to use and support all levels
of users.
Customer base: The solution should justify the setup costs by being able to supporting a good number of
users.

Q2. For many years companies have been using computers to send business documents instead of
mailing paper documents (i.e. most of our pay checks are directly deposited into our bank
accounts). This transfer of funds is accomplished by the use of an electronic file being sent from
your company to your bank). The problem was that the all employed proprietary used unique

formats to pursue this task. The absence of a standard format led to the condition where computers
could no longer "talk" to one another without a great deal of effort by programmers. For example,
Supplier X could recognize an electronic Purchase Order from Retailer A but not from Retailer B.
To avoid the above conditi. What is the name of the standard? Discuss the working concepts of that
standard. (Recognizing the standard 1 mark, defining the standard- 2 marks, listing the various
components 3 marks, explaining the working 4 marks) 10 marks
Answer.
Name of the standard and its definition: EDI ANSI X12 stands for Electronic Data Interchange,
American National Standards Institute X12. The EDI ANSI X12 standard was developed to govern the
use of EDI to exchange information electronically between businesses.
Q3 Suppose you are the network admin of WXZ Software Company and you are given the
responsibility of managing all the servers. What are the steps you would follow to avoid hacking of
the companys information?
(Explaining the threat and to avoid threats) 10
Answer.
Explanation of threats
Unethical hackers (in bad sense of this word) are always looking for weaker points in a network system to
hack the security system of your company and get hold of confidential and new information. Various
threats may occur which may be in the following forms:
Sabotage by former employees
Q4. Assume that you are the project manager of VSG Company. Due to some reason the companys
server got shut down and the company is not able to access the companys confidential data. What
steps would have been taken by you to avoid this?
(Explaining the backup alternatives) 10
Answer.
The steps followed in backup alternatives
Setting up, running and performing a backup can become very time consuming (especially if you are
creating a FULL backup for the very first time and more on this later). You can take some steps to make
the task of securing and storing your information, first, by getting rid of some rubbish. Rarely, have I
noticed in other articles, blogs, posts, forums, any mention of getting rid of unwanted data on the
computer FIRST.

Q5. Write short note on


a. Target Audience
b. Preparing the budget
(a. Target Audience, b. Preparing the budget) 5,5
Answer.
a) Target audience
With the advent of the World Wide Web, more and more companies are competing with each other to
make their presence felt in the web world. Advertising through the web is easier and effective. However,
it is very important to analyze and target a particular set of audience for specific products and services.

Q6. Guest look is an Indian based cosmetic manufacturing company which manufactures a wide
range of cosmetics for men. Although its product was used by men all over the world, a number of
new cosmetic manufacturing companies arose in the market challenging Guest look. Now Guest
look has to find innovative ways of advertising its products. So far, Guest looks advertising aids
were mostly printed and television media. Now, Eguest look realized the importance and benefits of
e-Marketing and has started concentrating on e- Marketing. As the company is known for its
integrity and will not compromise on that with spam and unsolicited mails. Therefore, company
identified three techniques such as search engine optimization, improving existing website and
banner ads.
a. What are the benefits of offline advertising? Are Guest look following offline advertisement?
Justify your
b. If you are working with the development team of Guest Look, how would you go about
improvising the existing website?
c. What banner ads?
(a. Listing the benefits of offline advertising, Justification of the answer for using offline
advertisement, b. Explaining how to improvise the existing website, Explaining banner ads and its
drawbacks) 2,2,3,3
Answer.
a) Benefits of offline advertising
Despite the growth of the Internet, it is important to realize that only 78.1% of users in the US have access
to the Internet that leaves 21.9% of users whom you cannot reach online. For that 21.9%, here are some
offline marketing methods to consider reaching everyone in your overall marketing strategy.
Print Advertising
DRIVE- Fall DRIVE 2014
PROGRAM/SEMESTER- MBADS (SEM 4/SEM 6) MBAFLEX/ MBAN2 (SEM 4)PGDOMN
(SEM 2)
SUBJECT CODE & NAME-MI0040- TECHNOLOGY MANAGEMENT
Q.1. Consider that you are a manager in a company and you want to manage a technology that is
newly incorporated.
a. Describe the effects of technologies on business.
b. Prepare a list of the factors that are considered in managing technology. (a. Explaining the
effects of technologies I business , b. Collect from the key issues in managing technological
innovation) 5 , 5
ANS:
a) Effects of technologies on business
Here briefly describe the effects of technologies on business:

Reduced costs of operations: Different companies use different technologies for reducing
manufacturing and administrative costs.
New product and new market creation: This involves the introduction of technology for the
miniaturisation of the product. This involves the technology to reduce the size, become easily

portable and useful for many applications. For example, the Sony Corporation has introduced the
miniaturisation technology that aimed at developing the product with high portability.

Q.2.The purpose of forecast is to improve the quality of the decisions related to selection of an
alternative from available alternatives and not to force to accept a particular decision.
Explain various techniques for forecasting with a neat diagram.
A ) Diagram
B) Describing the techniques (3, 7)
ANS:
A)Diagram :

Q.3.Write short notes on


a. Technology adoption
b. Technology diffusion
c. Technology absorption
( a. Technology adoption b. Technology diffusion c. Technology absorption) ,3,3, 4
ANS:
a) Technology Adoption
The adoption of technology or technology adoption as the successful implementation of technology,
and deriving the full potential of the technology. Adoption is relatively easy in a new enterprise as
compared to an ongoing firm. Adoption of technology requires gearing up of all the resources such as
internal and external infrastructure, human resources, raw materials, and even mar
Q.4.When you choose a new technology, you may have to face some of the question like what are its
functional requirements , non-functional requirements and does the technology fit the organization
culture?
a. How do you answer for these questions?
b. What is memristor?
(a. Explaining eight tips related to the selection of a new technology
b. Explaining memristor ) 8, 2
ANS:
a) Explaining eight tips related to the selection of a new technology
In a very short span, exercise of latest technologies such as instant messaging, Voice over Internet
Protocol (VoIP) phone service, W iFi Internet access, video conferencing and smart cell phones, have
come up. As a result of these new technologies, small businesses are getting a lot of opportunities to
advance their processes and connect with customers. But, if youre likely to adopt too many technologies,
then you will be spending most the time in integrating new technology without having enough hours for
getting the real work done. Let us have a look at some questions that are likely to arise, when you choose
a new technology.

Q.5. Write short notes on


a. Bridging agencies
b. Problem solver model
c. Bar-Zakay model
d. Schlie, Radnor and Wad model ) 2,2,3,3
ANS:
a) Bridging agencies
There are some agencies because of whom the transfers of technology take place, comprises of
government departments, industries, financial institutions, consultants, venture capital companies,
research companies, and R&D organisations, and so on.

Q.6. Explain the basic scheme for knowledge based applications. (Diagram of basic scheme for
knowledge based Applications , Explaining the knowledge based technology process,) 3,7
ANS:
Knowledge based technology process with Basic Scheme for Knowledge-Based Applications
Management requires a precise understanding of the process which KBT applications demand. Let us
have a brief discussion on a model of the development and use of KBT as it is typically practised, as
given in figure.
DRIVE Fall 2014
PROGRAM/SEMESTER MBADS (SEM 4/SEM 6)-MBAFLEX/ MBAN2 (SEM 4)

PGDISMN (SEM 2)
SUBJECT CODE & NAME-MI0041- JAVA AND WEB DESIGNAssignment

Q.No
Questions
Marks
Total Marks
1
Write down what the following tags will perform
a. <table>
b. <td width>
c. <embed>
d. <a>
e. <object>
A
a. <table>
b. <td width>
c. <embed>
d. <a>
e. <object>
2 * 5 = 10
10

2
Write short notes on
a. Web browsers
b. Web development tools
A
a. Explaining web browsers with an example
5
10
b. Explaining web development tools with an example
5
3
Write a programme to create a webpage that prints the name of the STUDENT database in Wide
Latin font and set the subtitle with description of the STUDENT to the screen. Set the page layout
to the webpage. Insert one image after the database with a Thank you note.
A
Programme
7
10
Writing the output for the programme written
3
b. Reason for using JSP
5
10
5
For the above case study answer the following questions
a. State the reason for using database connection in the application.
b. Explain the purpose of creating a java application for the ABC institute.
A
a. Reasons for using database connection
5
10
b. Explaining the purpose of creating a java application
5
6
How do you handle exception in java? Give with an example
A
Explaining handling exception and the ways of exception can occur
2
10
Exception types
4
Explaining different types of exception handling like, using throw, using finally, etc
4
Question 1.
a. <TABLE> Allows you to align text in tables. You can see an example of this on our Support page. How you do
this is start with <Table> and if you want borders, just use the below commands.
b. <tdwidth>- The width attribute of <td> is deprecated in HTML 4.01.The width attribute specifies the width of a
table cell. Normally, a cell takes up the space it needs to display the content. The width attribute is used to set a

predefined width of a cell.


C. <embed> The
Question 2(A)
(a ) : A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and
traversing information resources on the World Wide Web. An information resource is identified by a Uniform
Resource Identifier (URI/URL) and may be a web page, image, video or other piece of content. Hyperlinks present in
resources enable users easily to navigate their browsers to related resources. Although browsers are primarily
intended to use the World Wide Web, they can also be used to access information provided by web servers in private
networks or files in file systems. The major web browsers are Google Chrome
Example of web browsers

Question 3.A
There are basically two ways to make a web page. The first way is to create the page(s) offline and then upload them
to your Internet Service Provider (ISP) via FTP. The second way is to create your web page(s) online using a Telnet
program by accessing your UNIX account, if you have one. If you are creating your web page(s) offline, do so in any
text editing or word processing document. Make sure that when you save your document, you save it as a text,
plain text or text only document. Otherwise it will not be read properly by a web browser. Once you have created

Question 4 (A)

a. Reason
ABC institute decided to choose XYZ for the development of Java application because the institute understood the
importance of e-records. As it had already faced the problem in keeping hard copy of records. XYZ organization was
well efficient in developing java based software so it was chosen. Other important reason was maintenance of records
. It is very essential to keep records safe. Each school has a responsibility to maintain its records and record keeping
systems. Although schools will have their own methods of creating and keeping records and sharing information with
staff,
Question 6 (A)
(a) A Java exception is nothing but an object that defines an exceptional condition, or an error that has occurred in a
piece of code. In Java, we can handle this exception by creating an object that represents the exception, and throwing
that object into the method that triggered the error.
There are two ways by which exceptions can occur. They are as follows:
Java run-time system: These exceptions relate to the fundamental errors that violate the rules of the Java

programming language or the constraints of the Java execution environment.

También podría gustarte