BBA204 MARKETING MANAGEMENT



Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

SEMESTER 2
BBA204 MARKETING MANAGEMENT

Question 1- Define Green Marketing. What are the reasons for which companies adopt Green marketing ?

Answer1- According to the American Marketing Association, green marketing is the marketing of products that are presumed to be environmentally safe. Thus green marketing incorporates a broad range of activities, including product modification, changes to the production process, packaging changes, as well as modifying advertising. Yet defining green marketing is not a simple task where several meanings intersect and contradict each other; an example of this will be the existence of varying social, environmental and retail definitions attached to this term. Other similar terms used areEnv



Question 2- Explain the difference between Public relations and Publicity.  Also discuss the public  relation Techniques in brief.

Answer - The goal of public relations is to mould opinion. The saying "perception is reality" speaks to the need for public relations. Public relations work to protect an organization's or individual's reputation. Effective PR strengthens credibility, enhances image, develops goodwill and influences behaviour. Speeches, special events, newsletters, annual reports and news releases are examples of PR tactics.

The terms public relations and publicity are often misused. They are not interchangeable. Publicity is one aspect of public relations. Often referred to as free media, the goal of publicity is to get attention in online and traditional media. News coverage, feature articles, talk show interviews, blog postings and letters-to-the-editor are examples of publicity tactics.


Question 3-Define Marketing Planning. Explain about  the two different Competitive

marketing strategies.

Answer - Planning is a systematic process of mapping the future course of action. It is important in deciding what is the action to be performed, how, when and where should the action be performed as well as who should perform the action. Planning aids in providing direction to the end-result or goal. Planning can be undertaken at the corporate level, strategic business unit level or at the functional level. Strategic planning aids in setting the Marketing Management agenda for the organization as a whole, while the market plan is undertaken by the concerned business unit.



Question 4- Define Service Marketing. Explain the strategies for Services Marketing.

Answer -Service marketing refers to the concept of creation and delivery of value for the satisfaction of the customer, which provides a profit to the seller or service provider.

The marketing of services relates to the marketing of an experience, as there may or may not be tangible products which are marketed to the customer. As services marketing relates to the customer’s experience, it is important to provide the right surroundings and support for the customer experience. A good customer provides word of mouth publicity and helps in garnering new customers. So, it is important for service providers to build a good rapport with their existing custome



Question 5- Explain the various stages of Consumer Buying process.

Answer - Research in the field of consumer behavior has established that the consumer under goes eight stages before arriving at a buying decision. Let us now understand the various stages in the decision making process –

1) Problem or need recognition – The buying process starts at the stage of need recognition by the consumer. When the consumer perceives that there is a need to buy a product, he starts obtaining information on the product, so as to arrive at a conclusion about buying the product.



Question 6- Describe the three additional components of Marketing mix in brief ?

Answer - marketing mix is a combination of various elements which contribute to the company’s marketing planning and strategy. It becomes necessary for marketing managers to adopt the right marketing mix for designing the marketing process of the organization. In the previous unit, we learnt about marketing environment and how it influences marketing decisions. In this


Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

BBA205 - MANAGEMENT INFORMATION SYSTEM



Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

SEMESTER 2

BBA205 MANAGEMENT INFORMATION SYSTEM

Question 1- Explain the characteristics and the functions of Management Information systems?

Answer 1- MIS Characteristics are,

- It supports transaction handling and record keeping.

- It is also called integrated Database Management System which supports in major functional areas.

- It provides operational, tactical, and strategic level managers with easy access to timely and for the most part, structured information.




Question 2- Briefly explain the organizational structure of management information System?
Answer - Different kinds of information systems serve different levels in an organization. Each level of system and its sub system, depending upon the following levels of classification.

Operational-level Systems help you in keeping track of the daily routine activities.

For example, recording daily sales and placing orders.

Knowledge-level Systems form the workstations and office systems in your organization which help you in including the latest technology in the working of the organization.

For example, preparing displays for advertisements.








Question 3- List the different types of information systems and give the one important point for each of the type of which they differ from the other type of information systems?

Answer - Some of the types of management systems which are information based are –

a) Transaction processing systems (TPS)

b) Knowledge based systems (KBS)

c) On line analytical processing systems (OLAPS)




Question 4-

 Write short notes on

1. DFD

2. Data Dictionary



Answer 4-

1-      DFD(Data flow diagrams) represent the logical flow of data within the system. DFD does not explain how the processes convert the input data into output. It does not explain how the processing takes place.

DFD uses a few symbols like circles and rectangles connected by arrows to represent data flows. DFD can easily illustrate relationships among data flows, external entities and stores. DFD can also be drawn in increasing levels of detail, starting with a summary high level view and proceeding o more detailed lower level views.





Question 5- Explain object and its behavior with the example of your own?



Answer 5- Objects are the important parts of our daily life. Objects are natural and manmade, in business, and in products. Objects can be categorized, described, organized, combined, manipulated and created. The object oriented methodology uses the object oriented techniques to study the objects of the system. This methodology helps us to know the behavior of the objects, and response time to different events. It is also used to study the relationships existing between the two objects of same organization or an inert organization.

Object oriented methodology is defined as the system that supports and facilitates the software component. It enables the effective use of existing resources an


Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

MCA3010 –Financial Management and Accounting





Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

Spring 2013
Masters in Computer Application (MCA) - Semester 3
MCA3010 –Financial Management and Accounting– 4 Credits (Book ID: B1624)
(60 Marks)

Answer All the Questions. Each question carries equal marks. (6 x 10 = 60)

1. Explain the process involved in accounting. What are the objectives of accounting?
Answer :As implied earlier, today's electronic accounting systems tend to obscure the traditional forms of the accounting cycle. Nevertheless, the same basic process that bookkeepers and accountants used to perform by hand are present in today's accounting software.




2. Briefly explain the role of management accounting. Also describe the functions of management accounting.
Answer : Management accounting is an internal business function that includes the recording and reporting of a company's financial transactions. The accounting department also supports management in different business operations, providing analysis and support for different decisions and investments.
Financial Reporting
Management accountants work at the beginning of the accounting cycle, recording the financial transactions of a company as they occur. This




3. What is fund flow analysis? What are the objectives of analysing flow of fund?
Answer : Funds flow statement is an important financial tool, which analyze the changes in financial position of a firm showing the sources and applications of its funds. It provides useful information about the firm's operating, financing and investing activities during a particular period. The following points highlight the importance of funds flow statement.



4. What is cash flow statement and how is the cash flow statement subdivided?
Answer : Complementing the balance sheet and income statement, the cash flowstatement (CFS), a mandatory part of a company's financial reports since1987, records the amounts of cash and cash equivalents entering andleaving a company. The CFS allows investors to understand how acompany's operations are running, where its money is coming from, andhow it is being spent. Here you will learn how the CFS is structured

5. What are the merits of budgets?
Answer : Define goals and objectives
Align corporate goals with regards to markets, sales levels, margins, manning, cost levels and capital investment with your budgets.
Think about and plan for the future.
Compels management to think about the future. Management should look ahead and set out plans for each business unit, anticipating change and giving the organisation clear direction. It encourages management to be forward-looking and working within the framework of a budget encourages good decision-making.



6. Describe the essential features of budgetary control.

Answer : There are two types of control, namely budgetary and financial. This chapter concentrates on budgetary control only. This is because financial control was covered in detail in chapters one and two. Budgetary control is defined by the Institute of Cost and Management Accountants (CIMA) as:

"The establishment of budgets





Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

MCA3020 – Advanced Database Management System





Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com


July 2012
Masters in Computer Application (MCA) - Semester 3
MCA3020 – Advanced Database Management System – 4 Credits
(Book ID: B1649)
Assignment Set – 1 (60 Marks)

Answer All the Questions. Each question carries equal marks. (6 x 10 = 60)

1. What are the various types of database management system? Briefly explain.
Answer : Types of Database Management Systems

DBMSs come in many shapes and sizes. For a few hundred dollars, you can purchase a DBMS for your desktop computer. For larger computer systems, much more expensive DBMSs are required. Many mainframe-based DBMSs are leased by organizations. DBMSs of this scale are highly sophisticated and would be extremely



2. Explain with examples different SQL commands used for creating and deleting relations. Write a short note on ACID properties of transaction model.
Answer : SQL Commands:

SQL commands are instructions used to communicate with the database to perform specific task that work with data. SQL commands can be used not only for searching the database but also to perform various other functions like, for


3. Define functional dependency. Give examples. Also Explain 2nd and 3rd normal Forms.
Answer : In relational database theory, a functional dependency is a constraint between two sets of attributes in a relation from a database.
Given a relation R, a set of attributes X in R is said to functionally determine another set of attributes Y, also in R, (written X  Y) if, and only if, each X value is associated with precisely one Y value; R is then said



4. Explain the various heuristics involved in query optimization. Also explain the various algorithms for executing query operations.
Answer : A query expressed in a high-level query language such as SQL must first be scanned, parsed, and validated. The scanner identifies the language tokens—such as SQL keywords, attribute names, and relation names—in the text of the query, whereas the parser checks the query syntax to determine whether it is formulated according to the



5. Discuss the One-Pass algorithm for database. Also Explain the eddy architecture and how it allows for extreme flexibility
Answer : In computing, a one-pass algorithm is one which reads its input exactly once, in order, without unbounded buffering. A one-pass algorithm generally requires O(n) (see 'big O' notation) time and less than O(n) storage (typically O(1)), where n is the size of the input.
Basically one-pass algorithm operates as follows: (1) the object descriptions are processed serially; (2) the first object becomes the cluster representative of the first cluster; (3) each subsequent object is matched against all cluster


6. How is two phase locking method used to ensure serializability? Illustrate.

Answer : In databases and transaction processing, two-phase locking (2PL) is a concurrency control method that guarantees serializability. It is also the name of the resulting set of database transaction schedules (histories). The protocol utilizes locks, applied by a transaction to data, which may block (interpreted as signals to stop) other transactions from accessing the same data during the transaction's life.

By the 2PL protocol locks are applied and removed in two phases:



July 2012
Masters in Computer Application (MCA) - Semester 3
MCA3020 – Advanced Database Management System – 4 Credits
(Book ID: B1649)
Assignment Set – 2 (60 Marks)

Answer All the Questions. Each question carries equal marks. (6 x 10 = 60)

1. Explain the concept of serialisability and Recoverability. Illustrate how to manage rollbacks by locking.
Answer : Serializability And Recoverability

Serializability
Serializability is the classical concurrency scheme. This helps to ensures that a schedule with regard to performing executing concurrent

2. What are the different types of partitioning techniques? Describe in detail.
Answer : Data partitioning and collecting in Data stage
Partitioning mechanism divides a portion of data into smaller segments, which is then processed independently by each node in parallel. It helps make a benefit of parallel architectures like SMP, MPP, Grid computing and Clusters.

Collecting is the opposite of partitioning and can be defined as a process of bringing back data partitions into a single sequential stream (one data partition).

Data partitioning methods


3. Discuss the concept of Type Hierarchies and Inheritance with example. Also illustrate multiple inheritances.
Answer : As the third topic in my article series Introduction to Object-Oriented Programming in Lab VIEW I’ll talk about inheritance and conceptual hierarchies in object oriented programming.

Hierarchies of real-world objects

Object of the real world often form


4. Explain the functions and components of DDBMS.
Answer : There are many functions a Database Management System (DBMS) serves that are key components to the operation of database management. When deciding to implement a DBMS in your business, first you must decide what type of DBMS you want. Common types of DBMS are the relational, network, hierarchy and object oriented models. Each kind of database structure has its own pros and cons.


5. Differentiate between RDBMS, OODBMS and ORDBMS.

Answer : The presentation of the similarities and differences between relational modelling of data and the object oriented modelling of data is of great importance both for data base designers and for users. By being well acquainted with the relational model and by noting the similarities and differences between the two approaches to data modelling, designers will be able to turn into account and to make use of the already acquired experience as an important basis for understanding and learning the methodology of designing object oriented databases. At the time if designers know the similarities and differences between these two approaches they have the possibility to convert a relational model into an object orie


6. What are the advantages and disadvantages of Loral query language? Discuss. What is active database? Explain what are the active rules for oracle?
Answer : Modelling and Querying XML Repositories as Object Databases

The DTD is a natural candidate to represent the type of a document. However, XML DTDs do mix together both a description of the logical features of the document, with rather ''physical'' ones (such as, for example, entities, which can be more appropriately considered as storage units or macros rather than structural




Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

MCA3020 – Advanced Database Management System





Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

Spring 2013
Masters in Computer Application (MCA) - Semester 3
MCA3020 – Advanced Database Management System – 4 Credits (Book ID: B1649)
(60 Marks)
Answer All the Questions. Each question carries equal marks. (12 x 5 = 60)

1. Discuss the classification of DBMS based on location of database.
Answer : DBMSs come in many shapes and sizes. For a few hundred dollars, you can purchase a DBMS for your desktop computer. For larger computer systems, much more expensive DBMSs are required. Many mainframe-based DBMSs are leased by organizations. DBMSs of this scale are highly sophisticated and would be extremely expensive to develop from scratch. Therefore, it is cheaper for an organization to lease such a DBMS program than to develop it.
Classification of DBMS :



2. Explain with examples different SQL commands used for creating and deleting relations. Write a short note on ACID properties of transaction model.
Answer : SQL Commands:
SQL commands are instructions used to communicate with the database to perform specific task that work with data. SQL commands can be used not only for searching the database but also to perform various other functions like, for example, you can create tables, add data to tables, or modify data, drop the table, set permissions for user. various commands are :
Data Definition Language (DDL) - These SQL commands are used for creating, modifying, and dropping the structure of database


3. Define functional dependency. Give examples. Also Explain 1st, 2nd and 3rd normal Forms.
Answer : In relational database theory, a functional dependency is a constraint between two sets of attributes in a relation from a database.
Given a relation R, a set of attributes X in R is said to functionally determine another set of attributes Y, also in R, (written X → Y) if, and only if, each X value is associated with precisely one Y value; R is then said to satisfy the functional dependency X → Y. Equivalently, the projection  is a function, i.e. Y is a function of X.[1][2] In simple words,

4. Explain the various heuristics involved in query optimization. Also explain the various algorithms for executing query operations.
Answer : : A query expressed in a high-level query language such as SQL must first be scanned, parsed, and validated. The scanner identifies the language tokens—such as SQL keywords, attribute names, and relation names—in the text of the query, whereas the parser checks the query syntax to determine whether it is formulated according to the syntax rules (rules of grammar) of the query language. The query must also be validated, by checking that all attribute and relation names are valid and semantically meaningful names in the schema of the particular database being queried. An internal representation of the query is then created, usually as a tree data structure called a query tree. It is also possible to represent the



5. Describe the most important classes of parallel machines.
Answer : Important classes of parallel machines:
The Multicomputer:
A parallel machine model called the multicomputer fits these   requirements. As illustrated in Figure   multicomputer comprises a number of von Neumann computers, or nodes, linked by an interconnection network. Each computer   executes its own program. This program may access local memory and may send and receive messages over the network. Messages are used to communicate with other computers or, equivalently, to



6. How is two phase locking method used to ensure serializability? Illustrate.
Answer : The two-phase locking method is a protocol that enforces all the locking operations in a transaction to occur before the first unlock operation of the transaction occurs. According to the two-phase locking protocol a transaction handles its locks in two distinct, consecutive phases during the transaction's execution:
Expanding phase (Growing


7. Explain the concept of database recovery management. Discuss the different levels of backup used for recovering data.
Answer : Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives (SSD), USB flash drive, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system.
The most common "data recovery"


               
8. What are the different types of partitioning techniques? Describe in detail.
Answer :  Data partitioning and collecting in Data stage:
Partitioning mechanism divides a portion of data into smaller segments, which is then processed independently by each node in parallel. It helps make a benefit of parallel architectures like SMP, MPP, Grid computing and Clusters.
Collecting is the opposite of partitioning and can be defined as a process of bringing back data partitions into a single sequential stream (one data partition).
Data partitioning methods :


9. Discuss the concept of Type Hierarchies and Inheritance with example. Also illustrate multiple inheritances.
Answer : hierarchy  is an arrangement of items (objects, names, values, categories, etc.) in which the items are represented as being "above," "below," or "at the same level as" one another. Abstractly, a hierarchy can be modelled mathematically as a rooted tree: the root of the tree forms the top level, and the children of a given vertex are at the same level, below their common parent.
A hierarchy (sometimes abbreviated HR) can link entities either directly or indirectly, and either vertically or horizontally. The only direct links


                                                          
10. Explain the functions and components of DDBMS.
Answer : Functions of DDBMS :
We expect a DDBMS to have at least the functionality for a centralized DBMS. In addition, we expect a DDBMS to have the following functionality:
  • Extended communication services to provide access to remote sites and allow the transfer of queries and data among the sites using a network.
  • Extended system catalogue to store data distribution details.
  • Distributed query processing, including query optimization and remote data access.
  • Extended security control to maintain appropriate authorization/access privileges to the distributed data.


11. Differentiate between RDBMS, OODBMS and ORDBMS.
Answer : The presentation of the similarities and differences between relational modelling of data and the object oriented modelling of data is of great importance both for data base designers and for users. By being well acquainted with the relational model and by noting the similarities and differences between the two approaches to data modelling, designers will be able to turn into account and to make use of the already acquired experience as an important basis for understanding and learning the methodology of designing


12. What is active database? Explain what are the active rules for oracle?
Answer : An active database is a database that includes an event-driven architecture (often in the form of ECA rules) which can respond to conditions both inside and outside the database. Possible uses include security monitoring, alerting, statistics gathering and authorization.
Most modern relational databases include active database features in the form of database triggers.
 ACTIVE DATABASES COMMANDS:
Displays a subset of the information listed by




Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

MCA3030 – Linux Operating System





Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

July 2012
Masters in Computer Application (MCA) - Semester 3
MCA3030 – Linux Operating System – 2 Credits
(Book ID: B1563)
Assignment Set – 1 (30 Marks)
Answer All the Questions. Each question carries equal marks. (6 x 5 = 30)

1. Brief about the shells of Linux operating system.
Answer : A Unix shell is a command-line interpreter or shell that provides a traditional user interface for the Unix operating system and for Unix-like systems. Users direct the operation of the computer by entering commands as text for a command line interpreter to execute or by creating text scripts of one or more such commands.

The most influential Unix shells have been the Bourne shell and the C shell. The Bourne shell, sh, was written by Stephen Bourne at AT&T as the original Unix command line interpreter; it introduced the basic features common to all the Unix



2. Write about Bash shell commands with their purpose.
Answer : Bash has several commands that comes with the shell (i.e built inside the bash shell).

When you execute a built-in command, bash shell executes it immediately, without invoking any other program.

Bash shell built-in


3. Write about three types of Linux File Permissions.
Answer : There are three types of Linux File Permissions:
Read :
The entity (Owner, Group or World) is allowed to read a file.
Write : The entity is allowed to write a file, or to create files in the directory for which these permissions are set.


4. Write note on vi Editor.
Answer : Introduction :
vi is a powerful editor with many features. It can handle very large files much easier than a program like Microsoft Word. Unlike Word, vi is only a TEXT EDITOR and you cannot include graphics or fancy fonts in your file.
Although there are lots of different commands in vi, it is possible to get started using vi knowing only a small subset of them. As you feel more comfortable with vi, you can learn the more advanced features.
vi has 3 modes:
  • write mode( used for entering text)

5. Explain briefly about GNOME desktop.
Answer : GNOME desktop components:
GNOME core components include:

·         Control Center: This collection of applications customizes the GNOME environment.
·         gnome-panel : This application provides the tool bar and menu system to launch applications and host panel applets. Panel also interfaces with session manager (gnome-session) when exiting the desktop. Panel also interfaces with session-manager when exiting the desktop and managing "


6. Write note on the following:
a) Encryption
Answer : :  In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can.[1]:374 In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret



b) Signatures
Answer : A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
Digital signatures are often used



July 2012
Masters in Computer Application (MCA) - Semester 3
MCA3030 – Linux Operating System – 2 Credits
(Book ID: B1563)
Assignment Set – 2 (30 Marks)

Answer All the Questions. Each question carries equal marks. (6 x 5 = 30)

1. What is directory? Discuss different directories of Linux Filesystem.
Answer : Linux file system and directory structure
Several major directories are associated with all modern Unix/Linux operating systems. These directories organize user files, drivers, kernels, logs, programs, utilities, and more into different categories. The standardization of the FHS makes it easier for users of other Unix-based operating systems to understand the basics of Linux. Every FHS starts with the root directory, also known by its label, the single forward slash (/). All of the


2. Write down the steps to write simple shell script.
Answer : To successfully write a shell script, you have to do three things:

Write a script
·         Give the shell permission to execute it
·         Put it somewhere the shell can find it
·         Writing a script
·          
3. Explain the run levels in a Linux system.
Answer : If you are moving to higher run levels, you may make additional services available to users, while moving to a lower run level will causes to services (daemons) to become unavailable. On the production server run level 3 is the normally used and rarely changed. However, some administrative tasks require the administrator to move system to run level 1 i.e single user mode.





4. Explain the basic structure of an awk command with an example.
Answer : "AWK is a language for processing text files. A file is treated as a sequence of records, and by default each line is a record. Each line is broken up into a sequence of fields, so we can think of the first word in a line as the first field, the second word as the second field, and so on. An AWK program is of a sequence of pattern-action statements. AWK reads the input a line at a time. A line is scanned for each pattern in the program, and for each pattern that matches, the associated action is executed."
  AWK commands:


5. Write note on the following:
a) Window Manager
Answer : Window managers (WMs) are X clients that provide the border around a window. The window manager controls the appearance of an application and how it is managed: the border, title bar, size, and ability to resize a window are handled by window managers. Many window managers provide other functionality such as places to stick dockapps like Window Maker, a menu to start programs, menus to

6. Explain the various database applications used in Linux.

Answer : Open Source Databases

Even as Linux has garnered support by all of the major commercial database vendors, the freely available open source databases have grown in sophistication and features. Below follows a partial list of some of the more popular of these.
Please Note, in addition to the listings below, many of the commercial database vendors have free "personal edition" or "single user"



Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com