Wednesday, 2 September 2015

MCA - SEMESTER - 3 - SUMMER - 2015

Masters in Computer Application (MCA) - Semester 3
MCA3010 –Financial Management and Accounting



1.  Explain the process involved in accounting. What are the objectives of accounting?

The following are the processes involved in accounting: -

1.  Identifying the transactions and events – This is the first step in the accounting process. It recognises the transactions of financial character that are essential to be recorded in the books of accounts. When money, goods, or services are transferred from one person or account to another person or account, it is known as a transaction. 

2.  Measuring  –  This means expressing the value of events and transactions in terms of money (Rupees in India).Measuring has become an important challenge for the accountants and the                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Briefly explain the role of management accounting. Also describe the functions of management accounting.

Roles of Management Accounting

Management accounting helps the management in the following:
·         It guides the management to fix most appropriate objectives for the company and also ensures that the objectives set at different levels are aligned.
·         It helps in developing alternative courses of action.
·         It provides data or information about the alternative courses of action.
·         It provides tools to evaluate the alternative courses of action.
·         It guides the management in implementing the best course of action.
·         It provides tools for performance measurement.
·         It provides information and tools for taking corrective action.
                                                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  What is fund flow analysis? What are the objectives of analysing flow of fund?

Analysing changes in working capital

The changes in working capital  can be ascertained from  the balance sheet, profit and loss account, and from other information.
There will be a flow of funds if a transaction involves the following:
·         Current assets and fixed assets, e.g., purchase of building for cash
·         Current assets and capital, e.g., issue of shares for cash
·         Current assets and fixed liabilities, e.g., redemption of debentures in cash
·         Current liabilities and fixed liabilities, e.g., creditors paid off in debentures
·         Current liabilities and capital, e.g., creditors paid off in shares
Current liabilities and fixed assets, e.g., building transferred to creditors in satisfaction of                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4.  What is cash flow statement and how is the cash flow statement subdivided?

Cash flow analysis is presented in the form of a statement. Such a statement is called a cash flow statement.

Meaning of Cash Flow Analysis

Cash flow analysis is an important tool of financial analysis. It is the process of understanding the change in position  with respect to cash  in the current year and  the reasons responsible for such  a  change. Incidentally, the analysis also helps us to understand whether the investing and financing decision taken by the company during the year are appropriate are not.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  What are the merits of budgets?

Merits of Budgetary Control

The merits of budgetary control are as follows:
1.  It aims at the maximisation of profits.

2.  Budgets fix the goals and targets without which operations lack direction.

3.  It reduces the cost and eliminates inefficiencies.

4.  It  facilitates to make ordered effort and brings about overall efficiency in the results.

5.  It  ensures that  the capital employed at a particular level is kept at a minimum level.

                                                         
                                                         
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



6.  Describe the essential features of budgetary control.

Essential Features of Budgetary Control

An effective budgeting system should have essential features to get the best results. In this direction, the following may be considered as essential features of an effective budgeting.
·         Business  policies defined  –  The top management of an organisation should  have an action plan for every activity and  department. Every budget should reflect the business policies formulated from time to time. The policies should be precise, clearly defined,  and the same must be communicated to the persons involved in the execution. 

Forecasting  –  Business forecasts are the foundation of budgets. Time and again,  discussions should be arranged to derive the most profitable combinations of forecasts.                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



·          PROGRAM  - MCA
SUBJECT CODE & NAME - MCA3020- ADVANCED DATABASE MANAGEMENT SYSTEM

1.  Differentiate between Two-Tier client/server databases and Multi-tier client/server databases.

Two-Tier client/server databases

Personal  database  is  restricted  to  a  single  user  only.  However  there  are numerous circumstances when the clients or workgroup want the data to be distributed  or  shared  between  them.  For  this,  the  most  frequent  method used  for  sharing  data  is  the  creation  of  two-tier  client/server  databases which we have shown in below figure  as below. 

All  the  links  in  a  workgroup  are  the  computer  workstations.  These computers  are  linked  to  each  other  through  network  which  can  be  either wired  LAN  or  wireless  LAN.  Mostly,  all  computers  uses  a  particular application  (client)  providing  the  user  an  interface  and                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Explain  the  physical  query  plan  operators.  What  is  the significance of Iterators?

Physical-Query-Plan Operators

Physical  query  strategy  is  made  from  operators.  Each  of  these  operators implements one step of the plan. The physical operators are often specific implementations for one of the operators of the relational algebra, although we  also  require  physical  operators  for  other  tasks  that  do  not  involve  an operator of the relational algebra.

For instance, we often need to "scan" a table. In other words, we need to bring into the main memory, each tuple of some relation that is an operand of a relational-algebra expression.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Differentiate between Serialisability and Recoverability. 

In transaction processing, serialisability is considered as the property of a serialisable schedule. Serialisability is the main criterion for the accuracy of simultaneous transactions executions and a main objective for concurrency control. In the  context of data storage and communication, serialisability is the process of converting a data structure into a format that can be stored.If  every  transaction  is  accurate  by  itself,  then  any  sequential  execution  of these transactions is accurate.

Notable  examples  are  banking transactions that  debit  and  credit  accounts with money. If the associated schedules are not serialisable, then the total sum of money may not be maintained. Money could vanish, or be produced from nowhere. This does not take place if serialisability is                                                       
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4. Discuss  about  Parallel  query  processing.  How  parallel-execution works?

Parallel query processing

In parallel query processing, multiple processes together at the same time to handle one individual SQL statement. The Database server can handle the statement more swiftly in comparison to a single server by segregating the work necessary to process a statement among various multiple servers. The  feature  helps  to  dramatically  enhance  functioning  for  data  intensive operations  related  with  decision-support  applications  and  even  extremely big  database  environments.  Parallel  query feature  is  most  useful for  SMP (Symmetric multiprocessing), clustered or MPP (massively parallel systems) because of the fact that in such                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. Differentiate  between  homogeneous  and  heterogeneous Database.

Homogeneous and Heterogeneous Database

When the database technology is the same at each of the locations and the data  at  the  several  locations  are  also  compatible,  that  data  is  known  as homogenous  database.  The  following  conditions  should  exist  for homogeneous database:
•             The  operating  system  used  at  each  of the  locations  is  the  same  or  at least they should be extremely compatible.
•             The data models used at every location should be the same.
•                                                                      The  database  management  systems  used  at  every  location  should  be the same or                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6. Write short notes on ODMG standards. What are the various components of ODMG-93?

Object  Data  Management  Group  (ODMG) 

Object  Data  Management  Group  (ODMG)  represents  an  association  of ODBMS  vendors.  It  was  formulated  to  provide  a  standard  for  various ODBMS products.

The objectives of ODMG association are as follows:
·         To persist to develop the ODMG standard,
·         To train the developer community regarding the standard,
·         To advance its use, and
·         To offer official recognition of conformity to the standard.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SEMESTER  - THIRD
SUBJECT CODE & NAME - MCA3030 - LINUX OS


1.  List any ten commonly used commands along with their functions in Linux.

Commonly Used Commands

In normal Linux installation, we can find hundreds of commands and utilities along with thousands of support files. In spite of their overpowering number and often cryptic names and more cryptic options, several commands are very  useful.  There  are  many  scripts  present  throughout  the  system  that
contain most of these commands. Some of the commonly used  commands are as below:                                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. Describe about Run levels. Explain different run levels.

Runlevels




Runlevels come into  picture  when a user wants  to run some or all  installed services.  Runlevels  are  used  to  define  different  configurations  of  running services.

A runlevel is a state of init and the whole system that specifies what system services  are  running.  Runlevels  are  represented  using  numbers.  Linux supports  seven  different  runlevels.  Below table  lists  all  these  seven runlevels.                                                

                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Describe the following:
a)  File encryption
b)  Email encryption

a)  File encryption

File  encryption  –Files  can  be  encrypted  using  the  following  two approaches:

o  EncFS – ncFS is an encrypted pass-through filesystem implemented in  user-space.  It  performs  encryption  on  a  file-by-file  basis  and  is modeled  after  CFS  -  the  original  Cryptographic  Filesystem
introduced by Matt Blaze, published in 1993. No special permissions are required to run EncFS. It uses the FUSE library and Linux kernel module  to  create  the  filesystem  interface.  It  is  an  open  source
service  licensed  by  the  GPL.  The  website  http://arg0.net/wiki/encfs provides more information on this.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




b)  Email encryption

E-mail  encryption  –  E-mails  can  be  protected  from  hacking  by encrypting them. This allows only the recipient to view them.  On Linux, the most commonly used public key encryption tool is the GnuPG. It was introduced as the open source descendant of Open Pretty Good Privacy (OpenPGP). GnuPG is now a popular encryption tool entirely compatible with PGP. Basically, GnuPG is a text-only command-line application, but various  frontends  like  kGpg  can  also  be  used  for  it.  Once  GPG  is installed, you                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SUBJECT CODE & NAME - MCA3040- TECHNICAL WRITING

1. What’s Audience Analysis? Explain its significance in Technical Communication

Audience Analysis

It's important to determine which of the four categories just discussed the potential readers of your document belong to, but that's not the end of it. Audiences, regardless of category, must also be analyzed in terms of characteristics such as the following:

Background-knowledge, experience, training:  One of your most important concerns is just how much knowledge, experience, or training you can expect in your readers. If you expect some of your readers to lack certain background, do you automatically supply it in your document?

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2  Explain the role of a technical editor. Differentiate between Micro and Macro editing.

Role of a Technical Editor

A technical document, to be effective, requires not only a good writer, but also a good editor. The chief duties of a technical editor are realized when the sections of  a technical document are submitted to him. The main duties that he performs include:

Improving text material: The editor determines  how appropriate the content and  organization  are  for  the  purpose  and  audience.  He  is  instrumental  in making the verbose material into concise and clear. In doing this he should be  cautious  because  he  needs  to  retain  the  tone  and  words  used  by  the
writer.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3. Explain the various phases involved in System Development Life Cycle (SDLC).

The Systems Development Life Cycle (SDLC) is a conceptual model used in project  management  that  describes  the  stages  involved  in  an  information system  development  project  from  an  initial  feasibility  study  through maintenance  of  the  completed  application.  Various  SDLC  methodologies
have been developed to guide the processes involved including the waterfall model  (the  original  SDLC  method),  rapid  application  development  (RAD), joint  application  development  (JAD),  the  fountain  model  and  the  spiral model.  Mostly,  several  models  are  combined  into  some  sort  of  hybrid methodology.  Documentation  is  crucial  regardless  of  the  type  of  model chosen or devised for any                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  - MCA
SUBJECT CODE & NAME - MCA3050- ADVANCED COMPUTER NETWORKS


1.  Describe OSI Model. List and explain its seven layers

Open Systems Interconnection (OSI)

The  Open Systems Interconnection (OSI) reference model  was defined by the  International  Standards  Organization  (ISO)  as  a  first  step  towards international standardization. In 1995, it was revised and known as ISO OSI (Open System Interconnection) because it deals with systems that are openfor  communication  with  other  system.  The  model  has  seven  layers.  They are:  physical  layer,  data  link  layer,  network  layer,  transport  layer,  session layer,  presentation                                                                                       
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Describe about DWDM. Explain the components of a basic DWDM system.

DWDM  refers  to  the  wavelength  spacing  proposed  in  the  ITU-T  G.692 standard.  The term DWDM implies the use of more channels, more closely spaced, than ordinary WDM. In general, a channel spacing of 200 GHz or less could be considered dense.

Dense  wavelength-division  multiplexing  revolutionized  data  transmission technology  by  increasing  the  signal  capacity  of  embedded  fibre.  This increase  means  that  the  incoming  optical  signals  are  assigned  to  specific wavelengths within a designated frequency band, and                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3. Describe about Peak cell rate (PCR) and Sustained cell rate (SCR).

Peak cell rate (PCR)

This is the maximum amount of traffic that can be submitted by a source to an ATM network, and is expressed as ATM cells per second. Due to the fact the  transmission  speeds  are  expressed  in  bits  per  second.  It  is  more convenient  to  talk  about  the  peak  bit  rate  of  a  source,  i.e.,  the  maximum number of bits per second submitted to an  ATM connection, rather than its peak cell rate. The peak bit rate can be translated to the peak cell rate, and vice versa, if we know which ATM adaptation layer is used. The peak cell rate was standardized by both the                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4. Describe the following:
a)  Open Shortest Path First (OSPF) protocol
b)  Broader Gateway Routing Protocol (BGP)


a)  Open Shortest Path First (OSPF) protocol

OSPF  is  a  commonly  deployed  link-state  routing  protocol.  It  views  the Internet as a star configuration. OSPF incorporates the following concepts to manage the complexity of large internets.
•             Area  –  This  is  a  collection  of  contiguous  networks  and  hosts,  and incorporates  routers  that  have  interfaces  to  any  of  the  included networks.
•             Backbone  –  This is a contiguous collection of networks not included in any  area,  their  attached  routers  and  the  routers  belonging  to  many areas.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


b)  Broader Gateway Routing Protocol (BGP)

Routing  involves  identification  of  optimal  routing  paths  and  the transportation  of  information  groups  (packets)  through  an  internetwork. Although  the  transportation  of  packets  through  an  internetwork  is  not complex, identification of optimal  paths is very complex. A protocol that we can use for path determination in networks is the Border Gateway Protocol (BGP). The current version of BGP is BGP-4.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. Write short notes on:
a)  Cryptography
b)  Encryption
c)  Decryption
d)  Cryptanalysis
e)  Cryptology

a)  Cryptography

Most initial computer applications had no or at best, very little security. This continued  for  a  number  of  years  and  until  the  importance  of  data  is  truly realized.  Until  then,  computer  data  was  considered  to  be  useful,  but  not something to be protected. When computer applications  were developed to handle  financial  and  personal  data,  the  real  need  for  security  was  felt. People realized that data on computers was an extremely important aspect
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


b)  Encryption

Encryption  is  the  process  of  encoding  a message  (plain text) to cipher text so that an unauthorized person cannot access  it. 

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




c)  Decryption

The  reverse  process  of  transforming  cipher  text  (encrypted message) messages back to plain text (original text) messages is called asdecryption. 
The  original  form  of  a  message  is  known  as  plaintext,  and  the  encrypted form  is  called  cipher  text.  This  relationship  is  shown  in  below figure .  For convenience  in  explanation,  we                                                       
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



d)  Cryptanalysis

This  is  the  technique  of  decoding  messages  from  a  nonreadable  format  back  to  readable  format  without  knowing  how  they  were initially converted from readable format to non-readable format.  This is the responsibility  of  a  cryptanalyst.  A  cryptanalyst  can  do  any  or  all  of  six different things:
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


e)  Cryptology

It is a combination of cryptography and cryptanalysis. Here  two  main  aspects  of  encryption  and  decryption  process  are  the algorithm  and  the  key  used  for  encryption  and  decryption.  To  understand this better, let us take the example of a combination lock, which we                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



6. Differentiate  between  Single  server  queue  and  Multi-server queue.

Single server queue

The important element in a single server queue is the server, which provides services to packets. Different packets arrive at the system to be served. If the  server  is  idle  at  the  time  of  packet  arrival,  the  packet  is  served immediately. Otherwise  arriving packets enter into a waiting queue. When the server completes serving a packet, the served packets depart from the server.  If  there  are  packets  waiting  in  the  queue,  one  packet  immediately enters into the server. Below figure depicts the single server queue. The following assumptions are made in single                                                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



No comments:

Post a Comment