GET SOLVED ASSIGNMENTS AT Rs.125 per subject or
Rs.600 per semester
Mail us at
assignmentsolutionshelp@gmail.com
OR
Call us at 07506193173
SMU MCA SEM 3 SUMMER 2015 ASSIGNMENTS
MCA3010-
FINANCIAL MANAGEMENT AND ACCOUNTING
1
Explain the process involved in accounting. What are the objectives of
accounting?
2
Briefly explain the role of management accounting. Also describe the functions
of management accounting.
3
What is fund flow analysis? What are the objectives of analysing flow of fund?
4
What is cash flow statement and how is the cash flow statement subdivided?
5
What are the merits of budgets?
6
Describe the essential features of budgetary control.
MCA3020-
ADVANCED DATABASE MANAGEMENT SYSTEM
1.
Differentiate between Two-Tier client/server databases and Multi-tier
client/server databases
2
Explain the physical query plan operators. What is the significance of
Iterators?
3
Differentiate between Serialisability and Recoverability.
4
Discuss about Parallel query processing. How parallel-execution works?.
5
Differentiate between homogeneous and heterogeneous Database.
6
Write short notes on ODMG standards. What are the various components of
ODMG-93?
MCA3030-LINUX
OS
1
List any ten commonly used commands along with their functions in Linux.
2
Describe about Run levels. Explain different run levels.
3
Describe the following:
a) File
encryption
b)
Email encryption
MCA3040-
TECHNICAL WRITING
1
What’s Audience Analysis? Explain its significance in Technical Communication
2
Explain the role of a technical editor. Differentiate between Micro and Macro
editing.
3
Explain the various phases involved in System Development Life Cycle (SDLC).
MCA3050-
ADVANCED COMPUTER NETWORKS
1
Describe OSI Model. List and explain its seven layers.
2
Describe about DWDM. Explain the components of a basic DWDM system
3
Describe about Peak cell rate (PCR) and Sustained cell rate (SCR).
4
Describe the following:
a)
Open Shortest Path First (OSPF) protocol
b)
Broader Gateway Routing Protocol (BGP)
5
Write short notes on:
a)
Cryptography
b)
Encryption
c)
Decryption
d)
Cryptanalysis
e)
Cryptology
No comments:
Post a Comment
Note: only a member of this blog may post a comment.