Showing posts with label university. Show all posts
Showing posts with label university. Show all posts

Tuesday, August 21, 2007

Assignment Sollution MCS-035

Q1 : Consider developing a system for Tickets Reservation for Commonwealth Games and perform the followings:
(a) Suggest the most appropriate Software Engineering model for developing this project with appropriate justification.
(b) Write at least two functional and non functional requirements.
(c) Develop a test plan for the system. You can make necessary assumptions and specify them.
(d) Write the risk management plan for the system.
(e) Estimate the efforts of software projects. Make necessary assumptions.
(f) Suppose it was revealed that the poor knowledge of the tool is responsible for the problems that are being encountered for timely completion of the project. Write type of remedies do you suggest for such type of problem ? justify your answer.
(g) Suppose there exists some old systems and wants to replace it, suggest the changes with respect to the software and hardware requirements.
(h) Describe what types of testing strategies/ techniques can be followed for a web based Ticket Reservation System.
(i) Develop a design review plan for the system. Also, list the deficiencies, if any, in the SRS for the same.
Ans :- 1 a
(a) The Linear sequential model re waterfall model is appropriate for Tickets Reservation system. It suggest a systematic, sequential approach to software Develop that begins at the system level and progresses through analysis, design, Coding and testing and support. These steps can be applied in Ticket reservation system in the following manner :

Software requirement analysis : to understand the nature of the program to be Built, the software engineer must understand the information domain for the Software, as well as the required function, behavior, performance and interface.

In a Ticket reservation system, various requirements of the whole system are Viewed. It is determined what are the requirements of the system, who are the users of the system, what are various functions in the system etc. then ER – diagram, Data flow diagram etc are prepared.

Design : Software design is actually a multistep process that focuses on four distinct attributes of a program : data structure, software architecture, interface representations and procedural detail.

Code generation : The code generation the design into machine readable form. If design performed in a detailed manner, code generation can be accomplished mechanically.

Testing : Once the code has been generated, program testing begins. The testing process focuses on the logical internals of the software, ensuring that all statements have been tested and on the functional externals.

Support : Software will undoubtedly undergo change after it is delievered to the customer. Software supports reapplies each of the preceding phases to an exiting program rather than a new one.

The linear sequential model is appropriate for Tickets Reservation system as it follows all the steps necessary for the development of Ticket reservation system. In this system project planning can be made in advance and Ticket reservation system require comparatively less changes at later stage. Moreover in a Ticket reservation system most of the requirements can be stated in earlier stages. It provides templates for which method for analysis, design coding, testing and support can be placed. There is less need to make changes after the system is developed. Therefore waterfall model is appropriate for tickets reservation system.

Ans 1 (b)
A collection of elements which are assembled to fulfill some defined purpose. Elements may be hardware or software components, organizational policies and procedures and operational processes.
Systems have properties which are emergent i.e. they only come to light when the parts are put together, they have structure and mechanisms for communication and control.

Important emergent properties of a system are :-
Ø Performance
Ø Reliability
Ø Safety
Ø Security
Ø Usability
These are non functional properties they do not relate to any specific functionality of the system. Some or all of these properties are usually more important than detailed system functionality,
Physical environment
What are the characteristics of the physical environment in which the system will be installed, what other systems must coexist with it ?
User environment
Will the system be used by training or untrained users; will it be used as part of an individual or a group process ?
Ans 1c
Test plan for student Admission System (SAS) :-
We consider “Logical Module for our purpose :- Since this is a human & Computer interface the number of test associated can be estimate by :
Number of transitions contained in the state transition representation
Number of data object that move across the interface.
number of data element that input or output
As we were testing only one module so unit testing will be performed on the module.
White Box Testing fundas will be applied during modules testing like :-
Module interface test to check proper data in flaw and outflow like username and passport is properly accepted.
Local data structure which is common source of error.
Boundary conditions testing.
Independent path testing.

All error handling paths are tested

Ans 1 (d)
Risk management is the process of measuring or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disasters or fires, accidents, death, and lawsuits). Financial risk management, on the other hand, focuses on risks that can be managed using traded financial instruments.

In ideal risk management a prioritization process is followed whereby the risks with the greatest loss and greatest probability of occurring are handled first, and risks with lower probability of occurrence and lower loss are handled later. In practice the process can be very difficult, and balancing between risks with a high p Risk management also faces difficulties allocating resources. This is the idea of opportunity cost. Resources spent on risk management could have been spent on more profitable activities. Again, ideal risk management minimizes spending while maximizing the reduction of the negative effects of risks.

Establish the context
Establishing the context involves
Panning the remainder of the process.
Mapping out the following the scope of the exercise, the identity and objectives of stakeholders, and the basis upon which risks will be evaluated.
Defining a framework for the process and an agenda for identification.
Developing an analysis of risk involved in the process.
After establishing the context, the next step in the process of managing risk is to identify potential risks. Risks are about events that, when triggered, cause problems. Hence, risk identification can start with source of problems, or with problem itself.

Source analysis Risk sources may be internal or external to the system that is the target of risk management. Examples of risk sources are : stakeholders of a project, employees of a company or the weather over an airport.
Problem analysis Risk are related to identify threats. For example : the threat of losing money, the threat abuse of privacy information or the threat of accidents and casualties. The threats may exist with various entities, most important with shareholder, customers and legislative bodies such as the government.
Decide on the combination of methods to be used for each risk. Each risk management decision should be recorded and approved by the appropriate level of management . for example, a risk control implementation and responsible persons for those actions . the risk management concept is old but is still not very effectively measured.

Implementation

Follow all of the planned methods for mitigating the effect of the risks. Purchase insurance policies for the risks that have been decided to be transferred to an insurer, avoid al risks that have been decided to be transferred to an insurer, avoid all that can be avoided without sacrificing the entity’s goals, reduce others, and retain the rest.

Review and evaluation of the plan
Initial risk management plans will never be perfect. Practice, experience, and actual loss results will necessitate changes in the plan and contribute information to allow possible different decisions to be made in dealing with the risks being faced.

Risk analysis results and management plans should be updated periodically. There are two primary reasons for this :
1. to evaluate whether the previously selected security controls are still applicable and effective, and
2. to evaluate the possible risk level changes in the business environment. For example, information risks are a good example of rapidly changing business environment.

To properly adopt software Inspections practices, each participant is trained in the structured review process, defined roles of participants, system of process and product checklists, and forms and reports. The lost opportunity cost to acquire the knowledge, skills, and behaviors is twelve hours per practitioner. In addition, each manager is trained in the responsibilities for rolling out the technology and the interpretation and use of measurements taken. The management training is accomplished in four hours.

The cost of performing software Inspections includes the individual preparation effort of each participant before the session and the conduct effort of participants in the inspections session. Typically, 4-5 people participate and expend 1-2 hours of preparation and 1-2 hours of conduct each. This cost of 10 to 20 hours of total effort per session results in the early detection of 5- 10 defects in 250-5—lines of new development code or 1000-1500 lines of legacy.

Ans 1 (f)
The knowledge of all tools required white making of project. Review of the project analysis before starting the project. Before starting the project. Before starting the making project software engineer should the person who is going to make is well aware that the all tools which required making the project. Cost estimated should be under the control. Time limitation should be there so that software will complete on time.

Ans :- 1 (g)
Software Requirements :-
Operating System.
Ms office
The required s/w which we make in platform the s/w


Hardware Requirement :-
Inter P1v Dual core processor
Intel p 1 V Motherboard
Ram 512 MB
HDFD 80 GB
ATX Cabinet
Keyboard
Optical Mouse

Ans 1 (h)
When components are being connected to create large components they have to pass through integration testing, whose main purpose is to detect any inconsistency between the connected components. Once the integration test is completed , a component test will have to be performed on the new component, consisting of several smaller ones. Some properties, however, can be said to belong to the system as a whole, like certain quality attributes. The system, beings a huge component, will hence be tested in its entirety to verify that these requirements are met in a satisfactory way, and this is what is referred to a system testing. Starting with unit testing, then moving on to integration testing before component testing can be performed. Finally, a system test is executed.

Black Box and White Box Testing
When a tester wants to test an application or a particular part of it to detect bugs, he can look at the system from a user’s perspective and expose it to different types of input, and then check whether or not the resulting output is in accordance with the specification. This is know as functional testing or black box testing. With this type of testing, any type of error can be detected, but it would take an infinite amount of time to do so.

Distinctions and elements of Web Applications
15 types of error and refers to memory leaks as a typical example of an error that will escape functional testing.

Web server
Browser
Client Database server
Application code
White box
Black box
Testing
Application data


Structural testing or white box testing, on the other hand, implies studying the program code and testing the different parts of it. This type of testing is not capable of finding all kinds of errors, but to its advantage it is easier to determine when you have tested enough
That white box testing is capable all lines of code when given an finite amount of time, but points out that such testing might not uncover errors with respect to component integration Seem to contradict each other. In spite of this, our interpretation suggests that both of them find a combination of white box and black box testing.

Ans 1 (i)
Software Inspections are a disciplined engineering practice for detecting and correcting defects in software artifacts, and preventing their leakage into filed operations

Experienced software practitioners and managers understand that software development is a process of experimentation involving the continuous discovery of technical information associated with the function, form, and fit of the software product. Software Inspections are an integral practice in the process of experimentation.

Software inspections provide value in improving reliability, availability, and maintainability






Technical Detail
Software Inspections are strict and close examinations conducted on requirements, specifications, architectures, designs, code, test plan and procedures, and other artifacts. Leading software indicators of excellence for each artifact type provide the exit criteria for the activities of the software life cycle. For example, these indicators include completeness, correctness, style, rules of construction, and multiple views.

Completeness is based on traceability of the requirements to the code, essential for maintainability. Correctness is based on the clear specification of intended function and its faithful elaboration in code, essential for reliability and availability. Style is based on consistency of resorting, essential for maintainability. Rules of construction are based on the software application architecture and the specific protocols, templates, and conventions used to carry it out, essential for reliability and availability. Multiple views are based on the various perspectives and viewpoints required to be reflected in the software product, essential for maintainability. By detecting defects early and preventing their leakage into subsequent activities, the need for later detection and work (which is essential for reduced cycle time and lower cost ) is eliminated.

Software inspections are a reasoning activity performed by practitioners playing the defined roles of moderator, recorder, reviewer, reader, and producer. Each role carries with it the specific behaviors, skills, and knowledge needed to achieve the expert practice of Software Inspections.

The adoption of software Inspections practice is competency enhancing and meet little resistance among practitioners trained in their use. The adopting organization benefits by improved predictability in cost and schedule performance, reduced cost of development and maintenance, reduced defects, in the filed, increased customer satisfaction, and improved morale among practitioners.

Dependencies
In order for Software Inspections to be systematically used in statistical process control, there must be a life cycle model with defined software artifacts. In this context, software Inspections provide the exit criteria for each life cycle activity. Furthermore, the standard of excellence of leading indicators for each type of artifact must be specified and used in practice.



Q2 : (a) You are browsing a web based application but it is taking too much to open, list
Any five reasons for the same.

Ans 2(a)
To many temporary file can lead the show speed.
Bad Connection.
Pink Break
Site is running slowly for everyone.
Site has too many views so it is being bogged down.
Server Busy
Small bandwidth
RAM size small
Client System busy.
Internet speed slow.


(a) Do you anticipate any situation where usage of Clean room Software Engineering for application development is not appropriate ? Explain your answer.

Clean room software engineering is an engineering and managerial process for like development of high quality software with certified reliability. The name “Clean room” was taken from the electronics industry, where a physical clear room exists to prevent introduction of defects during hardware fabrication. Clean room software engineering reflects the same emphasis on defect prevention rather than defect removal , as well as certification of reliability for the intended environment of use.

The focus of Clean room involves moving from traditional, craft based software development practices to rigorous, engineering based practices. Clean room software engineering yields software that is correct by mathematically sound design, and software that is certified by statistically valid testing. Reduced cycle time results from an incremental development strategy and the avoidance of rework.

Clean room reduces the cost of errors during development and the incidence of failures during operation; thus the overall life cycle cost of software developed under Clean room can be expected to be far lower than industry average.
The following ideas form the foundation for clean room based development :
Incremental development under statistical quality control (SQC). Incremental development as practiced in Clean room provides a basis for statistical quality control of the development process. Each increment is a complete iteration of the process, and measures of performance in each increment are compared with reestablished standards to determine whether or not the process is in control. If quality standards are not met, testing of the increment ceases and development return to the design stage.

Software development based on mathematical principles. In clean room development a key principle is that a computer program is an expression of a mathematical function. The Box Structure method is used for specification and design and functional verification is used to confirm that the is a correct implementation of the specification.

Software testing based on statistical principal. In clean room, software testing is viewed as a statistical experiment. A representative subset of all possible uses of the software is generated, and performance of the subset is used as a basis for conclusion about general operational performance.

Usage considerations
Clean room has been documented to be very effective in new development and reengineering (whole system or major subunits) contexts. The following discussion highlights areas where Clean room affects or differs from more conventional practice :

Team based development. A Clean room project team is small typically six to eight persons, and works in a disciplined fashion to ensure the intellectual control of work in progress. Clean room teamwork involves peer review of individual work, but does not supplant individual creativity. Once the system architecture has been established and the interfaces between subunits have been defined, individuals typically work alone on a given system component. Individual designs are working drafts that then reviewed by the team. In a large project, multiple small teams may be formed, with one for the development of each subsystem, thus enabling concurrent engineering after the top level architecture has been established.

Time allocation across life cycle phases. Because one of the major objectives of clean room is to prevent errors from occurring, the amount of time spent in the design phase of a clean room development is likely to be greater than the amount of time traditionally development to design. Clear room, however, is not a more time consuming development methodology, but its greater emphasis on design and verification often yields that concern. Management understanding and acceptance of this essential point that quality will be achieved by design rather than through testing must be reflected in the development schedule. Design and verification will require the greatest portion of the schedule. Testing may being later and be allocated less time than is ordinarily the case. In large clean room projects, where historical data has enabled comparison of traditional and clean room development schedules, the clean room schedule has equaled or improved upon the usual development time.

Costs and Limitations
Using clean room to accomplish piecemeal, isolated changes to a system not development using clean room is not considered an effective use of this technology. Training is required and commercially available. Available courses range from overviews to a detailed focus on particular aspects of clean room . for some training classes, it is most productive if software manager and technical staff take the training together. Manager need a thorough understanding of clean room imperatives, and a core group of practitioners needs sufficient orientation in clean room practices to be able to adapt the process to the local environment (this includes establishing a local design language, local verification standards, etc.)

2 (c) for what types of applications is the approach of Re Engineering applied ? Explain
your answer.

“Reengineering” is the fundamental rethinking and radical redesign of business professes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality service, and speed.

Seven principles of reengineering
1. Organize around outcomes not tasks.
2. Identify all processes in an organization and prioritize them in order of redesign urgency.
3. integrate information processing work into the real work that produces information.
4. Tread geographically dispersed resources as though they are centralized.
5. Link parallel activities in the workflow instead of just integrating their results.
6. Put the decision point where the work is performed, and build control into the process.
7. Capture information once and at the source.

The Benefits of Reengineering
The hard task of re examining mission and how it is being delivered on a day to day basis will have fundamental impacts on an organization, especially in terms of responsiveness and accountability to customers and stakeholders. Among the many rewards, reengineering :
Empowers employees
Eliminates waste, unnecessary management overhead, and obsolvte or inefficient processes.
Produces often significant reductions in cost and cycle times.
Enables revolutionary improvement in many business processes as measured by quality and customer service
Helps top organizations stay on top and low achievers to become effective competitors.
The Benefits of Reengineering
The hard task of reexamining mission and how it is being delivered on a day to day basis will have fundamental impacts on an organization, especially in terms of responsiveness and accountability to customers and stakeholders. Among the many rewards, reengineering.

Empower employees
Eliminates water, unnecessary management overhead, and obsolete or inefficient processes.
Enables revolutionary improvements in many business processes as measured by quality and customer service.
Help top organizations stay on top and low achievers to become effective competitors.
DOD has suggested that the following six tasks be part of any functional management approach to reengineering projects:
Define the framework . define functional objectives; determine the management strategy to be followed in streamlining and standardizing processes; and establish the process, data and information systems baselines from which to being process improvement.
Analyze. Analyze business process to eliminate non value added processes; simplify and streamline processes of little value; and identify more effective and efficient alternatives to the process, data, and system baselines.
Evaluate. Conduct a preliminary, functional, economic analysis to evaluate alternatives to baseline processes and select a preferred course of action.
Plan. Develop detailed statement of requirements, baseline impacts, costs, benefits, and schedules to implement the planned course of action.
Approve. Finalize the functional economic analysis using information from the planning data, and present to senior management for approval tp proceed with proposed process improvement and any associated data or system changes.
Execute. Execute the approved process process and data changes, and provide functional management oversight of any associated information system changes.

Wednesday, August 15, 2007

Assignment Sollution ( MCS-035 )


Session-1

Create the necessary Ledger and Groups to maintain the accounts as follows:
(Maintain Company as “Accounts only”)
Balance Sheet for the Year Ending 31-03-02
Test1 (User’s name)




Details of Creditors bill wise:

Yahoo India
i) Bill No: Yahoo/001/390
Rs. 25000
Dated 01-10-01
ii) Bill No: Yahoo/001/391
Rs. 45000
Dated 01-11-01

Gama India
i) Bill No: Gama/002/400
Rs. 17250
Dated 02-09-01
ii) On Account:
Rs. 12750


Square India
i) Bill No: Square/003/500
Rs. 20000
Dated 02-12-01

Details of Debtors bill wise:

BNP Traders
i) Bill No: Bnp/001/401
Rs. 25000
Dated 01-01-02
ii) Bill No: Bnp/001/402
Rs. 15000
Dated 31-03-02

Electronic India
i) Bill No: Elec/002/301
Rs. 30000
Dated 02-02-02


Smart India
i) Bill No: Smart/003/401
Rs. 10000
Dated 02-08-01
ii) Bill No: Smart/003/402
Rs. 35,000
Dated 02-10-01
iii) On Account
Rs. 15,000


Set the credit days for all debtors is 45 days.


Session 2
Open the Test1 Company and now onwards maintain the Company as “Accounts with Inventory”. Go to Company Feature (F11) > turn on the option “Allow Integrate with Accounts”. Put the details of the following products




Note: After putting the opening balances of products see the final accounts.


Session 3

Open “Test 1” Company and pass the following Transactions:
1. General expenses has been paid Rs. 2500 in cash dated 01-04-02
2. Outstanding salary paid Rs. 8000 dated on 02-04-02 from UTI, cheque no. 740521
3. Stationary paid Rs. 1200 dated on 02-04-2 by cash (Category: stationary, Centre: Paper, Pencil, Rubber; amount will be equally distributed among the centers)
4. Rs. 20,000 paid to Yahoo India against their Bill No. Alfa/001/390 by cheque issued from UTI on 01-05-02 cheque no. 740522
5. Smart India paid Rs. 50,000 for their Bill Nos, Smart/003/401, Smart/003/402 respectively and rest from on account balance on 01-05-02 cheque deposited into SBI Bank (Cheque No. 239309)
6. Machinery has been purchased Rs. 35000 from ABC Ltd. Dated on 02-05-02, Bill no. Abc/004/001
7. Cash withdrawn from SBI Rs. 10,000 dated on 02-05-02 cheque no. 150934.
8. Amount paid Rs. 28,000 to Gama Ltd. against their full dues through SBI cheque no. 150935 dated on 01-06-02
9. Cash deposited into UTI Rs. 13000 dated on 01-06-02.
10. Full amount paid to SquareLtd. with a discount @ 5% dated on 02-06-02.
11. General expenses paid Rs. 1200 from cash dated on 02-07-02 (category: Mis. Exp., Center: Postage, Tiffin divide the amount 40% and 60% respectively).
12. Furniture purchased from Raj & Raj. Rs. 15500 with sales tax @ 10% and freight Rs. 230 on 02-07-02 Bill no. Raj/005/001
13. Rs. 27500 received from Electronic India against their full dues and deposited into UTI on 02-07-02; cheque no: 450987.
14. Paid Rs. 48500 to Yahoo India against Bill no. Alfa/001/390 and Alfa/001/391 through cheques of UTI Rs. 39500 (ch. No: 740523) and SBI Rs. 9000 (ch no.: 150936), rest part of the bill will be treated as discount on 02-07-02.

Session-4

Open the Test 1 Company and enter the following transactions:

Turn off Cost Centre allocation from Sales and Purchase account.

1. Placed a purchase order to TVS & Co. for 15 pcs. Keyboard (Group: Hardware, Category: Input/Output) on 02-07-02: Order no: Tvs/02-03/001
Note: Use “Allow 0 valued entries in Voucher” from Company Feature (F11)
2. Received 10 pcs. Keyboard from TVS & Co. against the order (Tvs/02-03/001) on 01-08-02, Challan no. Tvs/ch/001 store at Malda godown.
3. Received another challan against it order Tvs/02-03/001 for the ret goods from TVS & Co. on 02-08-02 and store it at same godown. Challan no. Tvs/ch/002.
4. Received an invoice against challan nos. Tvs/ch/001 & Tvs/ch/002, with rate @ 750 including W.B.S.T. @ 10% on 01-09-02 bill no. Tvs/006/001
5. Purchased 10 pcs Mouse (Group: Hardware Category: Input/Output) @ Rs. 2.30 from TC Ltd. and get another 2 pieces as free samples on 01-09-02, keep it within Malda godown (Bill No.- Tc/007/001)
6. Returned 5 Pcs. Keyboard to TVS Co. on 02-09-02. (Against Bill no. Tvs/006/001, Debit note no. Tvs/006-ret/001)
Note: W.B.S.T @ 10% will be adjusted with return
7. On 02-09-02 the full dues paid to TVS & Co. with 5% discount.

Session-5

Do the following entries:
1. Sales order received from Milind Agency for 8 pcs. Keyboard on 02-09-02; Order no. Mil/02-03/001
2. Opened a new Bank A/c, City Bank A/c with Rs. 10000 on 01-09-02.
3. 5 Pcs Keyboard delivered from Malda godown to Milind Agency against order no. Mil/02-03/001 on 01-10-02 (challan no. Mil/ch/001).
4. The rest goods against order no Mil/02-03/001 delivered from the same godown on the next day (challan no. Mil/ch/002).
5. Earned 4% interest on IDBI investment for last six months on 01-10-02.
6. Furniture purchased for office use on 01-10-02 of Rs. 5000 from Furnishes & Co. (Bill no. Fur/008/001).
7. Returned 2 pcs Keyboard by Milind Agency from their first challan due to manufacturing defect on 01-10-02 (Ref. no. Mil/004-ret/001) (Use Rejection In). Immediately send the Keyboards to TVS & Co. for future replacement.
Note: Use Stock Journal to give the effect as Stock Outward.
8. Send a bill (Bill no. Mil/004/001) against the pending challans Mil/ch/001 & Mil/ch/002 @ 900 each with the following billing terms on 02-11-02
Trade Discount 2%
Sales Tax 10%
Delivery Charge Rs. 120
9. Paid advertisement bill Rs. 1000 from new City bank (ch. No. 920531) on 01-12-02.
10. Received from Milind Agency 50% due amount against the bill no. Mil/004/001 through cheque (ch. No. 110234) on 01-12-02 and deposited to City bank on the same day.
11. Transfer 12 pcs Mouse from Malda godown to Saithia godown with current stock rate on 01-12-02.
Session-6
Prepare the following Voucher Classes only for sales voucher:
1. Name of voucher sales: Sales-WBST @ 5%
Allow 95% of sale value to Sales A/c and 5% of sale value to Sales Tax A/c.
2. Name of voucher class: Sales- WBST @ 4% Sur@ 1%
Allow 100% of Sale value to Sales A/c
Additional charges will be as follows:
Sale Tax- @4% on total sales
Surcharge- @1% as Surcharge
Freight (Sale)- Rs. 5 based on quantity.
3. Name of Voucher class: Sales-No tax
No additional charges will be added.
4. Do the following entries appropriate Voucher Class
i. Sold 3 Pcs. Floppy Drive @1200, 10 Pcs Picture Tube @ 2500 to Pinak & Co. with Sales Tax 4%, Surcharge 1% and Freight Rs. 5 per quantity from Malda godown on 01-12-02 (Bill no. Pnk/005/001, order/challan is not required).
ii. Sold 500 Ltr Pepsi (300 ml) @22 including Sales Tax 5% to Cola House on 01-12-02 from Saithia godown (Bill no. Cola/006/001).
iii. Sold 800 Ltr Cock (1.5 ltr) @23 to Pine & Co. on 01-12-02 from Malda godown. (Bill no.Pine/007/001)
iv. 300 Ltr Cock (1.5 ltr) distributed as free among school students to get the market on 01-12-02 from Malda godown.
v. BNP Traders paid Rs. 39000 for full settlement of their dues through cheque (Ch. No. 230897) on 01-12-02 and the cheque deposited into SBI on the next day.
vi. Paid Rs. 35000 to ABC Ltd. against Bill no. ABC/004/001 from SBI (ch no. 150937) on 01-12-02.
vii. Raj & Raj charged 5% interest p.a. on their due amount on 01-12-02.
viii. Cola house returned 100 Ltd. Pepsi (300 ml) at Saithia godown on 02-12-02 (Bill no. Cola/006-ret/001), sales tax will be adjusted accordingly.

Session-7

1. Purchased the following items from Gama Ltd. with WBST @ 5% on 01-01-03 and stored into Saithia godown (Bill no. Gama/002/401):




1. Produce 8 Pcs Radio and store to Malda godown Aditional cost: Labor charges Rs. 100 per Radio, Power Rs. 210, Carriage Rs. 120.
Note: Make all payment entries for Additional cost from cash.
2. Salary paid to Mr. Aniket (employee) Rs. 6000 for the month of December 2002, through SBI (ch. No. 150938) dated on 01-01-03.
3. Received Rs. 20000 from Pinak & Co. on full settlement through cheque (ch. No. 450258) on 02-01-03 and deposit the amount to SBI.
4. Paid Rs. 43000 to Gama Ltd. through cheque issued from SBI (ch no. 150939) to clear all dues on 02-02-03.
5. Received 2 Pcs. Keyboard at Malda godown from TVS & Co. as replacement on 01-02-03.
6. Rs. 8800 received from Cola House on 01-02-03.
7. Sold 5 Pcs. Radio to Sony & Co. at 5% profit on the manufacturing price including WBST @5% (Bill no: Sony/008/001).
8. Sony & Co. paid a cheque (ch no. 458023) on full settlement and discount allowed by Rs. 500 duly deposited into UTI on 02-02-03.

End of April Month send Bank Statement of UTI



Session-8

Do the following using Optional voucher mode and check all possible effects using Scenario:

Company wants to check the written down value of the existing assets right now without affecting the account. [charge depreciation @ 40% p.a.]
If a sale occurs for 5 CD of Tally 6.3 with a 10% profit margin, then show what will be the effect on Gross Profit? But don’t give the effect on the Books of Accounts.
Show the Scenario result at the end of March 2003 before providing the salary of Rs. 25000 from UTI for the month of March 2003.
Make two Price Levels for (i) Retailer and (ii) Wholesaler. [Turn on “Set/Modify other Company Features?” from Company Features (F1), then go for the option “Use Multiple Price Levels for Invoicing”]
Set the following ranges of pepsi (300 ml) for Retailer:

Sold of 60 Ltr Pepsi (200 ml) to Pepsi House (Wholesaler) based on Price Levels on 02-02-03 (Bill no. Pep/009/001).

Thursday, August 9, 2007

Term-End Examination, Dec -2005 ( CS-13 )

Term-End Examination, December, 2005

CS13 : Operating Systems

Time: 3 hoursMaximum Marks: 75

Note : Question No. 1 is compulsory. Answer any three questions from the rest.


1. (a) Write an algorithm to explain the producer/consumer problem with an unbounded buffer in concurrent programming. (7)

(b) Expiain the functional specifications for partition allocation of memory in a system with static partitioning. List the advantages and disadvantages of it. Also describe the necessary hardware support for protection. (9)

(c) When does a page fault occur ? Describe the action taken by the operating system when a page fault occurs. (6)

(d) What is process migration in a distributed system ? List its advantages. Write the step-by-step procedure to migrate a process to the destination node. (8)


2. (a) A file system, resident on the disk should have the following characteristic features:(i) The file records should be read sequentially as well as randomly.(ii) There should be a practical limit of the file size.(iii) The file space allocated, should neither be under-utilized nor over-utilized.Explain the most suitable file space allocation scheme keeping in mind the features above. Justify your answer. (4)

(b) Explain tbe Flynn's classification of parallel computer architecture. Also, give the classification of shared memory multiprocessors on the basis of memory architecture and access delays. (7)

(c) What is the data structure that records all the information about a particular process in an O/S ? List a the fields for recording various aspects of process execution and resource usage. (4)


3. (a) What is a process ? How is it different from a program ? What are the different states of a process ? How does a process change from one state to another ? (5)

(b) Write, and explain, the deadlock detection algorithm. (6)

(c) List at least four common responsibilities of the file management system in an O/S. (4)


4. (a) What is the primary goal of Authentication ? How can you achieve this goal through (i) the password mechanism, and (ii) artifact-based mechanism ? (7)

(b) Wlth the help of a block diagram explain the client/server division of labour of file system in a workstation based model of distributed computing. (8)


5. (a) Write an algorithm for implementing Dining philosophers problem using semaphores. (7)

(b) Explain the principles of operation of virtual memory. Write any two distinct replacement algorithms. (8)

Wednesday, August 8, 2007

Term-End Examination JUNE, 2007 (CS-06)

Term-End Examination JUNE, 2007

CS-06 : DATABASE MANAGEMENT SYSTEM

Time : 3 hours...............Maximum Marks : 75

Note : question number 1 is compulsory. Answer any three questions from the rest.

1.(a) A Bank maintains information about customers and their accounts. Each customer has a name, address (ouse number, area, city and state code) and telephone number. Account has number, type and balance. We need to record customers who own an account. Account can be operated individually or jointly.
Design and draw an ER diagram, clearly indicating the attributes, keys, the cardinality ratio and participation constraints. [ 7 ]

(b). What is meant by data abstraction? Explain the differences between physical level, conceptual level and view level of data abstraction. [ 6 ]

(c). Explain at least five important characteristics of OORDBMS. [ 5 ]

(d). For the relation R and S given below, compute natural join and outer join, [ 6 ]

R
A.... B.... C
1.... 2.... 3
4.... 5.... 6
7.... 8.... 9

S

B.... C.... D
2.... 3.... 10
2.... 3.... 11
6.... 7.... 12

(e). Given the following relations: [ 6 ]
Vehicle (reg_no, colour, type)
Person (eno, name, address)
Owner (eno,reg_no)
Write expressions in the relational algebra to answer the following queries:
(i). List the reg_no of vehicles owned by “Sandeep”.
(ii). List the names of persons who own “Indica” cars.
(iii). List details of the black coloured vehicles.


2.(a) Describe DROP TABLE command of SQL with both the options CASCADE and RESTRICT. [ 5 ]

(b). Explain the recovery process after system failure, using checkpoint. [ 5 ]

(c). How is the knowledge representation done through semantic network? Give an example of semantic network.[ 5 ]


3.(a) How does data fragmentation support the distributed a\databses? Explain horizontal and vertical Project (Project_name, Emp_no, Emp_name, Job_class, Emp_location, Salary) [ 6 ]
Note: Assume the suitable data.

(b). What is NULL? Give an example to illustrate testing for NULL in SQL. [ 4 ]

(c). Define and differentiate between ordered indexing and hashing. [ 5 ]


4.(a) Construct a B+ tree for the following set of key values where the number of key values that fit in a node is 3. [ 8 ]
Key Values : (12,2,15,4,123,45,6,7,9,1,3)
Show the steps involved in the deletion of key values 7 and then 6.

(b). Why is BCNF a more desirable normal form than any of the lower order normal forms? Give an example of a relational schema that is in 3NF but not in BCNF. [ 7 ]


5.(a) Define the following with respect to SQL. Also give an example of each. [ 6 ]
(i). UNIQUE function
(ii). ORDER-BY clause
(iii). LIKE predicate

(b). Explain different methods of implementing the following data models: [ 6 ]
(i). Hierarchical Data Model
(ii). Network Data Model
(c). What is the difference between a data base schema and a database state? [ 3 ]

Monday, August 6, 2007

Examination Fees Applicable from DEC2007

Important Notice! IGNOU finally has declare examination fees from TERM END DEC2007 for all its courses. And also change the schedule of submission of form. Now its Rs. 50/- per paper. So if you want to give 10 papers then you have to submit Rs. 50*10= Rs. 500 as examination fees. In their website give it details. They also have change the format of examination form, so now this time when you are filling the examination form be sure that it is new one.
DATE OF SUBMISSION OF EXAMINATION
FORMS FOR DEC TEE---------------------------LATE FEE

1ST SEPTEMBER TO 30TH SEPTEMBER------------NIL
1ST OCTOBER TO 20TH OCTOBER-------------------RS.100/-
21ST OCTOBER TO 15TH NOVEMBER-----------------RS.500/-
16TH NOVEMBER TO 28TH NOVERBER----------------RS.1000/-

Term-End Examination JUNE, 2007 ( CS-09 )

Term-End Examination JUNE, 2007

CS-09 : DATA COMMUNICATION AND NETWORKS

Time : 3 hours Maximum Marks : 75

Note : question number 1 is compulsory. Answer any three questions from the rest.

1.(a) Draw the waveforms of (i) ASK, (ii) FSK and (iii) PSK for the data 110101100. [ 6 ]

(b) What is the prupose of multiplexing? Differentiate between time division multiplexing and frequency division multiplexing. [ 4 ]

(c) Compare Ethernet, token ring and FDDI on following parameters : [ 4 ]
(i) access method
(ii) Signalling
(iii) Data rate
(iv) Error control

(d) Discuss the functioning of Internet Control Message Protocol. [ 4 ]

(e) Explain distance vector routing algorithm with the help of suitable examble. [ 4 ]

(f) For what purpose is leaky bucket algorithm used? Explain any other algorithm used for the same purpose. [ 4 ]

(g) An analog signal is limited to 4 KHz. It is converted to a PCM signal using 8 bit/sample. What is the bit rate on the transmission line? [ 4 ]


2.(a) Differentiate between Baseband Signal and Broadband Signal. [ 5 ]

(b) Explain the following terms with respect to TCP : [ 10 ]
(i) stream data transfer
(ii) Reliable service
(iii) Window size
(iv) Urgent pointer
(v) Checksum


3.(a) At what layer is sliding window protocol used? Explain the protocol and also discuss the issues which are considered while deciding the window size. [ 9 ]

(b) Construct a systematic (7,4) cyclic code using generator polynomial
g(x)=x^3 + x^2 + 1
consider the data vector d=1010. [ 6 ]

4.(a) Enlist the parameters to measure the efficiency of the network and explain in brief. [ 4 ]

(b). What are various signal encoding techniques, used at physical layer of LAN? [ 4 ]

(c). Calculate the number of networks that can exist in class A, B, C IP addresses. Also calculate the number of hosts a network in each class can have. [ 7 ]


5.(a) Explain using diagrams, how the process of formation and pruning of a spanning tree takes place in multicast routing. [ 5 ]

(b). What is the application of Network Address Translation Box? Also explain its operation. [ 5 ]

(c). If signal to noise ration is 7 dB and bandwidth is 10 kHz, find [ 5 ]
(i). the capacity of a channel.
(ii). What should the signal to noise ratio be in dB to increase the capacity by 20% f calculated capacity.

Friday, August 3, 2007

Term-End Examination JUNE, 2007 ( CS-15 )

Term-End Examination JUNE, 2007

CS-15 : RELATIONAL DATABASE MANAGEMENT SYSTEM

Time : 3 hours Maximum Marks : 75


Note : Question number 1 is compulsory. Answer any three questions from the rest.

1.( a ) In an organization several projects are undertaken. Each project can employ one or more employees. Each employee can work on one or more projects. Each project is undertaken on the request of a client. A client can request for several projects. Each project has only one client. A project can use a number of items and an item may be used by several projects. Draw an ER-diagram and convert it into a Relational Schema. [ 8 ]


( b ) Describe the multi-version technique for Concurrency Control. [ 7 ]

( c ) How is the check-pointing information used in the recovery operation following a system crash ? [ 7 ]

( d ) Describe two phase commit protocol in distributed databases. [ 8 ]


2.( a ) ( i ) The following relations are used to store data about students, courses and enrolment of students in courses and teachers of courses. (Primary key in relation is marked by *)
Students (rollno*, sname, saddr)
Enrol (rollno, cno*, grade)
Teach (tno*, tname, cno*)
Write Create Table statements for defining the above tables.
Further write SQL statements to get rollno and names of students who have got an ‘A’ grade in a course taught by “Rohan”. [ 9 ]

( ii ) What is QBE ? [ 3 ]

( b ) Why are certain functional dependencies called “trivial functional dependencies” ? Explain. [ 3 ]


3.( a ) Consider the following relations :
ITEM (I#, INAME)
ORDER (O#, ONAME, CNAME)
ORDERITEM (I#,O#)
Write the relational algebra queries for the following :
(i ) Get the details of items ordered by the customer “Sohan”.
( ii ) Get the Item Nos. of items which are included in all orders. [ 6 ]

( b ) Discuss “Wait-die” and “Wound-wait” approaches of deadlock avoidance. Compare these approaches of deadlock avoidance with a deadlock avoidance approach in which data items are locked in a particular order (according to their rank). [ 9 ]


4.( a ) What are the relative advantages and disadvantages of Record-level logging. Page level logging and Query language logging ? [ 9 ]

( b ) describe normalization using join dependency with the help of an example. [ 6 ]


5. Explain the following terms : [ 15 ]
( i ) Physical data independence
( ii ) Sequential data retrieval in hierarchical model
( iii ) Content dependent access control
(iv ) Distributed locking
( v ) Domain integrity

 

Subscribe in a reader

Add to Technorati Favorites