Tuesday, October 11, 2016

MCA3030 - LINUX OS

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601


ASSIGNMENT

PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
THIRD
SUBJECT CODE & NAME
MCA3030 - LINUX OS
CREDIT
2
BK ID
B1563
MAX. MARKS
30


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.




1. List any ten commonly used commands along with their functions in Linux.

Answer: #1: top

I figured it was fitting to put the top command at the top. Although top is actually responsible for listing currently running tasks, it is also the first command Linux users turn to when they need to know what is using their memory (or even how much memory a system has). I often leave the top tool running on my desktop so I can keep track of what is going on at all times. Sometimes, I will even open up a terminal (usually aterm), place the window where I want it, and then hide the border of the window. Without a border, the terminal can't be



2. Describe about Run levels. Explain different run levels.

Answer: Runlevel is a mode of operation in one of the computer operating systems that implement Unix System V-style initialization. Conventionally, seven runlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonym for one of the levels. Only one runlevel is executed on startup; run levels are not executed one after another, i.e. either the runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order.






Q. 3. Describe the following:

a) File encryption

Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily decrypted while being used and than encrypted again after we finished using them. Encrypting stored files


b) Email encryption

Answer: Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email encryption may also include authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted). By means of some available tools, persons other than the designated recipients can read the email contents. Email encryption has been used by journalists and regular users to protect privacy.Email encryption can rely on public-key

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601


MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601



SUMMER  2016,  ASSIGNMENT


PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
THIRD
SUBJECT CODE & NAME
MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM
CREDIT
4
BK ID
B1650
MAX. MARKS
60


Note: Answer all questions. Kindly note that answers for 10 marks questions


1. Differentiate between Two-Tier client/server databases and Multi-tier client/server databases.
Answer: Two-Tier Architecture:

The two-tier is based on Client Server architecture. The two-tier architecture is like client server application. The direct communication takes place between client and server. There is no intermediate between client and server. Because of tight coupling a 2 tiered application will run faster.




2. Explain the physical query plan operators. What is the significance of Iterators?

Answer: A plan represents how data flows from a child operator to a parent operator in the form of a tree structure. Query execution flow can be read from right to left and from top to bottom.
In this article we’ll discuss some common and important operators like Index seek/scan, Join (Nested, Merge, and Hash), etc., which are useful to interpret a graphical execution plan and troubleshoot any performance issue due to a




3. Differentiate between Serialisability and Recoverability.

Answer: Serializability

Serializability is the classical concurrency scheme. This helps to ensures that a schedule with regard to performing executing concurrent transactions is equivalent to one that executes the transactions serially in some order. It assumes that all accesses





4. Discuss about Parallel query processing. How parallel-execution works?
Answer: When Oracle runs SQL statements in parallel, multiple processes work together simultaneously to run a single SQL statement. By dividing the work necessary to run a statement among multiple processes, Oracle can run the statement more quickly than if only a single process ran it. This is called parallel execution or parallel processing.

Parallel execution dramatically reduces response time for data-intensive operations on large databases typically associated with decision support systems (DSS) and data warehouses. Symmetric multiprocessing (SMP), clustered systems, and



5. Differentiate between homogeneous and heterogeneous Database.

Answer: A DDBMS may be classified as homogeneous or heterogeneous. In a homogeneous system, all sites use the same DBMS product. In a heterogeneous system, sites may run different DBMS products, which need not be based on the same underlying data model, and so the system may be composed of relational, network, hierarchical and object-oriented DBMSs.



Homogeneous systems are much easier to design and





6. Write short notes on ODMG standards. What are the various components of ODMG-93?

Answer: The ODMG standard builds upon the existing OMG, SQL-92, INCITS (formerly ANSI) programming language standards, and JavaSoft’s Java specification to define a framework for application portability between compliant data storage products. The standard’s functional components include an Object Model, an Object Definition Language, an Object Query Language, and Language Bindings to Java, C++, and Smalltalk.

The two primary benefits of the ODMG

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601


MCA3010 –Financial Management and Accounting


 Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601



SUMMER 2016 , ASSIGNMENT
Masters in Computer Application (MCA) - Semester 3

MCA3010 –Financial Management and Accounting

4 Credits (Book ID: B1624)
(60 Marks)

Answer All the Questions. Each question carries equal marks. (6 x 10 = 60)

1. Explain the process involved in accounting. What are the objectives of accounting?
Answer :As implied earlier, today's electronic accounting systems tend to obscure the traditional forms of the accounting cycle. Nevertheless, the same basic process that bookkeepers and accountants used to perform by hand are present in today's accounting software.

ACCOUNTING CYCLE :

An accounting cycle is a complete sequence


2. Briefly explain the role of management accounting. Also describe the functions of management accounting.
Answer : Management accounting is an internal business function that includes the recording and reporting of a company's financial transactions. The accounting department also supports management in different business operations, providing analysis and support for different decisions and investments.
Financial Reporting
Management accountants work at the




3. What is fund flow analysis? What are the objectives of analysing flow of fund?
Answer : Funds flow statement is an important financial tool, which analyze the changes in financial position of a firm showing the sources and applications of its funds. It provides useful information about the firm's operating, financing and investing activities during a particular period. The following points highlight the importance of funds flow statement.

1. Funds flow statement helps in identifying the change in level of current assets investment and current liabilities financing.


4. What is cash flow statement and how is the cash flow statement subdivided?

Answer : Complementing the balance sheet and income statement, the cash flowstatement (CFS), a mandatory part of a company's financial reports since1987, records the amounts of cash and cash equivalents entering andleaving a company. The CFS allows investors to understand how acompany's operations are running, where its money is coming from, andhow it is being spent. Here you will learn how the CFS is structured andhow to use it as



5. What are the merits of budgets?

Answer : Define goals and objectives
Align corporate goals with regards to markets, sales levels, margins, manning, cost levels and capital investment with your budgets.
Think about and plan for the future.
Compels management to think about the future. Management should look ahead and set out plans for each business unit, anticipating change


6. Describe the essential features of budgetary control.

Answer : There are two types of control, namely budgetary and financial. This chapter concentrates on budgetary control only. This is because financial control was covered in detail in chapters one and two. Budgetary control is defined by the Institute of Cost and Management Accountants (CIMA) as:

"The establishment of budgets relating the

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601


Monday, October 10, 2016

MCA4020- PROBABILITY AND STATISTICS

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601


ASSIGNMENT


PROGRAM
MCA
SEMESTER
FOURTH
SUBJECT CODE & NAME
MCA4020- PROBABILITY AND STATISTICS
BK ID
B1779
CREDIT & MARKS
4 CREDITS & 60 MARKS


1 Three machines A, B and C produce respectively 60%, 30% and 10% of the total number of items of a factory. The percentage of defective output of these machines are respectively 2%, 3% and 4%. An item is selected at random and is found to be defective. Find the probability that the item was produced by machine C.

Answer: Multiply the respective percentage of production by the percentage of defects for each machine

A = 60% * 2% = 1.2% of the factory's total output are defects produced by Machine A
B = 30% * 3% = 0.9% of the factory's total output are defects produced by Machine B
C = 10% * 4% = 0.4% of the factory's total output are defects produced by Machine C

Therefore the total defects = 1.2% + 0.9% + 0.4% = 2.5%





2 Find the constant k so that

F(x,y) = {k(x+1)e-y, 0<x<1,y>0
                0 elsewhere
Is a joint probability density function. Are X and Y independent?

Answer: Probability density function:- In probability theory and statistics, given two jointly distributed random variables X and Y, the conditional probability distribution of Y given X is the probability distribution of Y when X is known to be a particular value; in some cases the conditional probabilities may be expressed as functions containing the unspecified value x of X as a parameter. In case that both "X" and "Y" are categorical variables, a conditional probability table is typically used to represent the conditional probability. The conditional distribution



3 The data shows the distribution of weight of students of 1st standard of a school. Find the quartiles.


Class Interval
13-18
18-20
20-21
21-22
22-23
23-25
25-30
Frequency
22
27
51
42
32
16
10

Answer: If a data set of scores is arranged in ascending order of magnitude, then:
The median is the middle value of the data set.

The lower quartile (Q1) is the median of the lower half of the data set.

The upper quartile (Q3) is the median of the upper



4 Fit a trend line to the following data by the freehand method:



Year
Production of wheat(in tonnes)
Year
Production of wheat(in tonnes)
1995
20
2000
25
1996
22
2001
23
1997
24
2002
26
1998
21
2003
25
1999
23
2004
24

Answer: Methods of Freehands: It is familiar concept, briefly described for drawing frequency curves. In case of a time series a scatter diagram of the given observations is plotted against time on the horizontal axis and a freehand smooth curve is drawn through the plotted points. The curve is so drawn that most of the points concentrate around the curve, however, smoothness should not be scarified in trying to let the points exactly fall on the curve. It would be better to draw a straight line through the plotted points instead of a curve, if possible. The curve fitted by




5 Let X be a random variable and its probability mass function is
P(x=r) = qr-1p,r=1,2,3…
Find the m.g.f. of X and hence it’s mean and variance.

Answer: Standard Deviation:-The Standard Deviation is a measure of how spread out numbers are.
Its symbol is σ (the greek letter sigma)
The formula is easy: it is the square root of the Variance. So now you ask, "What is the Variance?"

Variance



6 The diastolic blood pressures of men are distributed as shown in table. Find the standard deviation and variance.
Pressure
78-80
80-82
82-84
84-86
86-88
88-90
No. of Men
3
15
26
23
9
4

Answer: Given values are:
Pressure
78-80
80-82
82-84
84-86
86-88
88-90
No. of Men
3
15
26
23
9
4

Difference = 2



Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601