Masters in Computer Application (MCA) - Semester 3
MCA3010 –Financial Management and Accounting
1. Explain the process involved
in accounting. What are the objectives of accounting?
The following are the
processes involved in accounting: -
1. Identifying the transactions and events –
This is the first step in the accounting process. It recognises the
transactions of financial character that are essential to be recorded in the
books of accounts. When money, goods, or services are transferred from one
person or account to another person or account, it is known as a
transaction.
2. Measuring
– This means expressing the value
of events and transactions in terms of money (Rupees in India).Measuring has
become an important challenge for the accountants and the
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Briefly explain the role of
management accounting. Also describe the functions of management accounting.
Roles of Management Accounting
Management accounting helps
the management in the following:
·
It guides the management to fix most appropriate objectives for the company and also ensures
that the objectives set at different levels are aligned.
·
It helps in developing alternative courses of action.
·
It provides data or information about the alternative courses of action.
·
It provides tools to evaluate the alternative courses of action.
·
It guides the management in implementing the best course of action.
·
It provides tools for performance measurement.
·
It provides information and tools for taking corrective action.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. What is fund flow analysis?
What are the objectives of analysing flow of fund?
Analysing changes in working capital
The changes in working
capital can be ascertained from the balance sheet, profit and loss account,
and from other information.
There will be a flow of
funds if a transaction involves the following:
·
Current assets and fixed assets, e.g., purchase of building for cash
·
Current assets and capital, e.g., issue of shares for cash
·
Current assets and fixed liabilities, e.g., redemption of debentures
in cash
·
Current liabilities and fixed liabilities, e.g., creditors paid off in
debentures
·
Current liabilities and capital, e.g., creditors paid off in shares
Current
liabilities and fixed assets, e.g., building transferred to creditors in
satisfaction of
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. What is cash flow statement
and how is the cash flow statement subdivided?
Cash flow analysis is
presented in the form of a statement. Such a statement is called a cash flow
statement.
Meaning of Cash Flow Analysis
Cash flow analysis is an
important tool of financial analysis. It is the process of understanding the
change in position with respect to
cash in the current year and the reasons responsible for such a
change. Incidentally, the analysis also helps us to understand whether
the investing and financing decision taken by the company during the year are
appropriate are not.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. What are the merits of
budgets?
Merits of Budgetary Control
The merits of budgetary
control are as follows:
1. It aims at the maximisation of profits.
2. Budgets fix the goals and targets without
which operations lack direction.
3. It reduces the cost and eliminates
inefficiencies.
4. It
facilitates to make ordered effort and brings about overall efficiency
in the results.
5. It
ensures that the capital employed
at a particular level is kept at a minimum level.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Describe the essential
features of budgetary control.
Essential Features of Budgetary Control
An effective budgeting
system should have essential features to get the best results. In this
direction, the following may be considered as essential features of an
effective budgeting.
·
Business policies defined – The
top management of an organisation should have
an action plan for every activity and
department. Every budget should reflect the business policies formulated
from time to time. The policies should be precise, clearly defined, and the same must be communicated to the
persons involved in the execution.
Forecasting –
Business forecasts are the foundation of budgets. Time and
again, discussions should be arranged to
derive the most profitable combinations of forecasts.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
·
PROGRAM - MCA
SUBJECT CODE & NAME - MCA3020- ADVANCED DATABASE
MANAGEMENT SYSTEM
1. Differentiate between Two-Tier
client/server databases and Multi-tier client/server databases.
Two-Tier client/server databases
Personal database
is restricted to
a single user
only. However there
are numerous circumstances when the clients or workgroup want the data
to be distributed or shared
between them. For
this, the most
frequent method used for
sharing data is
the creation of
two-tier client/server databases which we have shown in below figure as below.
All the
links in a
workgroup are the
computer workstations. These computers are
linked to each
other through network
which can be
either wired LAN or
wireless LAN. Mostly,
all computers uses
a particular application (client)
providing the user
an interface and
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Explain the
physical query plan
operators. What is the
significance of Iterators?
Physical-Query-Plan Operators
Physical query
strategy is made
from operators. Each
of these operators implements one step of the plan.
The physical operators are often specific implementations for one of the
operators of the relational algebra, although we also
require physical operators
for other tasks
that do not
involve an operator of the
relational algebra.
For instance, we often
need to "scan" a table. In other words, we need to bring into the
main memory, each tuple of some relation that is an operand of a
relational-algebra expression.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Differentiate between
Serialisability and Recoverability.
In transaction
processing, serialisability is considered as the property of a serialisable
schedule. Serialisability is the main criterion for the accuracy of
simultaneous transactions executions and a main objective for concurrency
control. In the context of data storage
and communication, serialisability is the process of converting a data
structure into a format that can be stored.If
every transaction is
accurate by itself,
then any sequential
execution of these transactions
is accurate.
Notable examples
are banking transactions that debit
and credit accounts with money. If the associated
schedules are not serialisable, then the total sum of money may not be
maintained. Money could vanish, or be produced from nowhere. This does not take
place if serialisability is
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Discuss about Parallel
query processing. How
parallel-execution works?
Parallel query processing
In
parallel query processing, multiple processes together at the same time to
handle one individual SQL statement. The Database server can handle the
statement more swiftly in comparison to a single server by segregating the work
necessary to process a statement among various multiple servers. The feature
helps to dramatically
enhance functioning for
data intensive operations related
with decision-support applications
and even extremely big
database environments. Parallel
query feature is most
useful for SMP (Symmetric
multiprocessing), clustered or MPP (massively parallel systems) because of the
fact that in such
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Differentiate between homogeneous
and heterogeneous Database.
Homogeneous and Heterogeneous Database
When the database
technology is the same at each of the locations and the data at
the several locations
are also compatible,
that data is
known as homogenous database.
The following conditions
should exist for homogeneous database:
• The
operating system used
at each of the
locations is the
same or at least they should be extremely compatible.
• The data models used at every
location should be the same.
• The database
management systems used
at every location
should be the same or
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Write short notes on ODMG standards. What are the various components
of ODMG-93?
Object Data Management
Group (ODMG)
Object Data
Management Group (ODMG)
represents an association
of ODBMS vendors. It was formulated
to provide a
standard for various ODBMS products.
The objectives of ODMG
association are as follows:
·
To persist to develop the ODMG standard,
·
To train the developer community regarding the
standard,
·
To advance its use, and
·
To offer official recognition of conformity to
the standard.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
SEMESTER -
THIRD
SUBJECT CODE & NAME - MCA3030 - LINUX OS
1. List any ten commonly used
commands along with their functions in Linux.
Commonly Used Commands
In normal Linux
installation, we can find hundreds of commands and utilities along with
thousands of support files. In spite of their overpowering number and often
cryptic names and more cryptic options, several commands are very useful.
There are many
scripts present throughout
the system that
contain
most of these commands. Some of the commonly used commands are as below:
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Describe about Run levels. Explain different run levels.
Runlevels
Runlevels come
into picture when a user wants to run some or all installed services. Runlevels
are used to
define different configurations of
running services.
A
runlevel is a state of init and the whole system that specifies what system
services are running.
Runlevels are represented
using numbers. Linux supports seven
different runlevels. Below table
lists all these
seven runlevels.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Describe the following:
a) File encryption
b) Email encryption
a) File encryption
File encryption
–Files can be
encrypted using the
following two approaches:
o EncFS – ncFS is an encrypted pass-through
filesystem implemented in
user-space. It performs
encryption on a
file-by-file basis and is
modeled after CFS
- the original
Cryptographic Filesystem
introduced by Matt
Blaze, published in 1993. No special permissions are required to run EncFS. It uses
the FUSE library and Linux kernel module
to create the
filesystem interface. It
is an open
source
service licensed
by the GPL.
The website http://arg0.net/wiki/encfs provides more
information on this.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
b) Email encryption
E-mail encryption
– E-mails can
be protected from
hacking by encrypting them. This
allows only the recipient to view them.
On Linux, the most commonly used public key encryption tool is the
GnuPG. It was introduced as the open source descendant of Open Pretty Good Privacy
(OpenPGP). GnuPG is now a popular encryption tool entirely compatible with PGP.
Basically, GnuPG is a text-only command-line application, but various frontends
like kGpg can
also be used
for it. Once
GPG is installed, you
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
SUBJECT CODE & NAME - MCA3040- TECHNICAL WRITING
1. What’s Audience Analysis? Explain its significance in Technical
Communication
Audience Analysis
It's important to
determine which of the four categories just discussed the potential readers of
your document belong to, but that's not the end of it. Audiences, regardless of
category, must also be analyzed in terms of characteristics such as the following:
Background-knowledge,
experience, training: One of your most
important concerns is just how much knowledge, experience, or training you can
expect in your readers. If you expect some of your readers to lack certain background,
do you automatically supply it in your document?
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2 Explain the role of a technical
editor. Differentiate between Micro and Macro editing.
Role of a Technical Editor
A technical document,
to be effective, requires not only a good writer, but also a good editor. The
chief duties of a technical editor are realized when the sections of a technical document are submitted to him.
The main duties that he performs include:
Improving text
material: The editor determines how
appropriate the content and
organization are for
the purpose and
audience. He is
instrumental in making the
verbose material into concise and clear. In doing this he should be cautious
because he needs
to retain the
tone and words
used by the
writer.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain the various phases involved in System Development Life Cycle
(SDLC).
The Systems Development Life Cycle (SDLC)
is a conceptual model used in project
management that describes
the stages involved
in an information system development
project from an
initial feasibility study
through maintenance of the
completed application. Various
SDLC methodologies
have been
developed to guide the processes involved including the waterfall model (the
original SDLC method),
rapid application development
(RAD), joint application development
(JAD), the fountain
model and the
spiral model. Mostly, several
models are combined
into some sort
of hybrid methodology. Documentation
is crucial regardless
of the type
of model chosen or devised for
any
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
SUBJECT CODE & NAME - MCA3050- ADVANCED COMPUTER
NETWORKS
1. Describe OSI Model. List and
explain its seven layers
Open Systems Interconnection (OSI)
The Open
Systems Interconnection (OSI) reference model was defined by the International
Standards Organization (ISO)
as a first
step towards international
standardization. In 1995, it was revised and known as ISO OSI (Open System
Interconnection) because it deals with systems that are openfor communication
with other system.
The model has
seven layers. They are:
physical layer, data
link layer, network
layer, transport layer,
session layer, presentation
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. Describe about DWDM. Explain
the components of a basic DWDM system.
DWDM refers
to the wavelength
spacing proposed in
the ITU-T G.692 standard. The term DWDM implies the use of more
channels, more closely spaced, than ordinary WDM. In general, a channel spacing
of 200 GHz or less could be considered dense.
Dense wavelength-division multiplexing
revolutionized data transmission technology by
increasing the signal
capacity of embedded
fibre. This increase means
that the incoming
optical signals are
assigned to specific wavelengths within a designated
frequency band, and
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Describe about Peak cell rate (PCR) and Sustained cell rate (SCR).
Peak cell rate (PCR)
This is
the maximum amount of traffic that can be submitted by a source to an ATM
network, and is expressed as ATM cells per second. Due to the fact the transmission
speeds are expressed
in bits per
second. It is
more convenient to talk
about the peak
bit rate of
a source, i.e.,
the maximum number of bits per
second submitted to an ATM connection,
rather than its peak cell rate. The peak bit rate can be translated to the peak
cell rate, and vice versa, if we know which ATM adaptation layer is used. The
peak cell rate was standardized by both the
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Describe the following:
a) Open Shortest Path First (OSPF)
protocol
b) Broader Gateway Routing
Protocol (BGP)
a) Open Shortest Path First
(OSPF) protocol
OSPF is
a commonly deployed
link-state routing protocol.
It views the Internet as a star configuration. OSPF
incorporates the following concepts to manage the complexity of large
internets.
• Area
– This is
a collection of
contiguous networks and
hosts, and incorporates routers
that have interfaces
to any of
the included networks.
• Backbone – This
is a contiguous collection of networks not included in any area,
their attached routers
and the routers
belonging to many areas.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
b) Broader Gateway Routing
Protocol (BGP)
Routing involves
identification of optimal
routing paths and
the transportation of information
groups (packets) through
an internetwork. Although the
transportation of packets
through an internetwork
is not complex, identification of
optimal paths is very complex. A
protocol that we can use for path determination in networks is the Border
Gateway Protocol (BGP). The current version of BGP is BGP-4.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Write short notes on:
a) Cryptography
b) Encryption
c) Decryption
d) Cryptanalysis
e) Cryptology
a) Cryptography
Most initial computer
applications had no or at best, very little security. This continued for
a number of
years and until
the importance of
data is truly realized. Until
then, computer data
was considered to
be useful, but
not something to be protected. When computer applications were developed to handle financial
and personal data,
the real need
for security was
felt. People realized that data on computers was an extremely important
aspect
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
b) Encryption
Encryption is
the process of
encoding a message (plain text) to cipher text so that an
unauthorized person cannot access
it.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
c) Decryption
The reverse
process of transforming
cipher text (encrypted message) messages back to plain
text (original text) messages is called asdecryption.
The original
form of a
message is known
as plaintext, and
the encrypted form is
called cipher text.
This relationship is
shown in below figure . For convenience in
explanation, we
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
d) Cryptanalysis
This is
the technique of
decoding messages from
a nonreadable format
back to readable
format without knowing
how they were initially converted from readable format
to non-readable format. This is the
responsibility of a
cryptanalyst. A cryptanalyst
can do any
or all of six
different things:
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
e) Cryptology
It is a
combination of cryptography and cryptanalysis. Here two
main aspects of
encryption and decryption
process are the algorithm
and the key
used for encryption
and decryption. To
understand this better, let us take the example of a combination lock,
which we
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Differentiate between Single
server queue and
Multi-server queue.
Single server queue
The
important element in a single server queue is the server, which provides
services to packets. Different packets arrive at the system to be served. If
the server is
idle at the
time of packet
arrival, the packet
is served immediately.
Otherwise arriving packets enter into a
waiting queue. When the server completes serving a packet, the served packets
depart from the server. If there
are packets waiting
in the queue,
one packet immediately enters into the server. Below
figure depicts the single server queue. The following assumptions are made in
single
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
No comments:
Post a Comment