assignmentssolution@gmail.com

Get Assignments and Projects prepared by experts at a very nominal fee.

More than 8 years in assisting assignments and projects/dissertation/thesis of MBA,BBA,BCA,MCA,PhD and others-

Contact us at : Email : assignmentssolution@gmail.com

Help for : SMU, IIBM,IMT, NMIMS, NIBM ,KSBM, KAIZAN, ISBM, SYMBIOSIS, NIMS, IGNOU, XAVIER, XIBMS, ISM, PSBM, NSBM, NIRM, ISBM, ISMRC, ICMIND, UPES and many others.

Help in : Assignments, projects, M.Phil,Ph.D disseration & thesis,case studies

Courses,MBA,BBA,PhD,MPhil,EMBA,MIB,DMS,MMS,BMS,GDS etc

Contact us at : Email : assignmentssolution@gmail.com



Tuesday 17 April 2012

For answers contact us : assignmentssolution@gmail.com


Spring 2012


Master of Business Administration- MBA Semester III
MI0024 – Software Engineering -2 Credits
Assignment Set- 1 (30 Marks)
Note: Each Question carries 10 marks.
1. What is software? What are the applications of software?
2. Explain decomposition techniques
3. a. Write a short note an project scheduling & tracking
b. How do you define a task set for the software project?


Spring 2012


Master of Business Administration- MBA Semester III
MI0024 – Software Engineering -2 Credits
Assignment Set- 1 (30 Marks)
Note: Each Question carries 10 marks.
1. a. Write a short note on software reliability
b. What are the guideline recorded for formal technical revive in review report
2. Explain SCM process & SCM standards
3. Explain analysis concepts & principles in brief

Feb / Spring 2012


Master of Business Administration- MBA Semester III
MI0025 – Database Management System -2 Credits
(Book ID :B1016)
Assignment Set- 1 (30 Marks)
Note: Each question carries 10 Marks. Answer all the questions.
Q1. a. Explain the various procedure carried on in a DBMS for a student database in which the fields are student id, student name, student class, marks
b. Write the difference between traditional file systems Vs modern database environment
Q2
a. Explain the following:
i. Physical data independence Vs logical data independence
ii. DDL Vs DML

b. Explain criterion for Database classifical
Q3. Draw an E.R diagram a school database which should describe the following
v Weal entity
v Identifying relationship
v Composite attribute
v Derined attribute

Write an entire diagram which explains the whole database.

Feb / Spring 2012


Master of Business Administration- MBA Semester 3
MI0025 – Database Management System -2 Credits
(Book ID :B1016)
Assignment Set- 2 (30 Marks)
Note: Each question carries 10 Marks. Answer all the questions.
Q1. Explain relationships with an example. Also show degree of relationship for that example
Q2. Explain the different operations of relational algebra with an example each
Q3. a. Write SQL query for the following
i. To find the student who scored more than ‘Rashmi’ in computer Science subject.
ii. List all the students who belongs to class II
b. Define locks. Write a binary lock function.

Spring 2012


Master of Business Administration-MBA Semester IV
MI0026
Computer Networks– 2 Credits
(Book ID: B1041)
Assignment Set- 1 (30 Marks)
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 write the diagram of a LAN network of your organization connecting all the peripheral devices. Also specify what kind of topology you use to connect your organization to the internet and why. [10 Marks]
Q.2 Explain the different modes of data transmission. [10 marks]
Q.3 Write short notes on
a. CSMA/CD
b. Fast Ethernet
c. IEEE 802.11 Frame structure
d. Routing algorithms [10 Marks]

Spring 2012


Master of Business Administration-MBA Semester IV
MI0026
Computer Networks– 2 Credits
(Book ID: B1041)
Assignment Set- 2 (30 Marks)
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 Bring out the differences between the different topologies. [10 Marks]
Q.2 Network security is an issue at firms of all sizes. Even the best of information-technology (IT) departments constantly face new challenges as they try to keep their firms' systems secure. The only completely secure computer is one that is not connected to a network or the Internet - and we all know that is not an option in today’s workplace. With that in mind, we need to find ways to mitigate the threats of data loss both in transition and on digital media.
Data encryption, one of the best and most commonly used methods of determining data theft and hacking, is transparent to the end user. Encryption is the act of adding a cipher or string of characters to raw data (such as binary computer files), and in doing so, creating "ciphertext," or encoded blocks of text. In effect, encryption takes data that is easily viewable and "translates" it into a coded language that is very difficult to read. The computer system has to remove the cipher to convert it back to usable data by the end user. Encryption is used primarily in three security scenarios: SSL Web encryption, digital media encryption and email encryption.
SSL encryption
To most users, the padlock in the corner of their Web browser that shows up on certain Web pages is an indication that the information they are sending or retrieving over the Internet is secure. Any site can be encrypted by simply purchasing and applying a Secure Socket Layer (SSL) Certificate to the site. SSL encryption allows for the transmission of sensitive data between people and sites, eliminating the worry about whether that information is floating around the Internet in plain-text format.
One of the rapidly growing uses of SSL encryption in the accounting industry is securing Web portal access. More and more companies are allowing employees to connect to their network remotely and are implementing SSL Virtual Private Networks (VPN), which require individual passwords to trigger decryption of the information to secure the traffic. Additionally, clients are logging into the network via portals to extranets holding their secure data.

Spring 2012


This is what a complete SSL transaction involves:
* An end user requests access to a secure page via a Web browser, usually https:// and over port 443. Port 443 was defined by Netscape as the standard port number for secure communications via the Web and is still used as the secure port today.
* The contacted server transmits its public key with its certificate. The browser verifies that the certificate was issued by a trusted party, that the certificate is valid and that the certificate is affiliated with the site contacted.
* The browser then uses the public key to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required, as well as other encrypted http data.
* The Web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data.
* The Web server sends back the requested Web document and http data encrypted with the symmetric key.
* The Internet browser decrypts the data and Web page using the symmetric key and displays the information.
Here's a diagram of how that description works for a CPA firm client:
Encrypted digital media
Traditionally, accounting firms went to great lengths to secure client data in their office and in off-site storage, but little attention was paid to the data traveling with the auditors on a daily basis. That, coupled with the increased popularity of telecommuting, has increased the necessity of encrypting digital media such as hard drives, flash digital media drives, PDAs and smart phones to insure the security of your firm's data. Both hardware and software manufacturers have identified the need for such encryption, and many are including such solutions in their products.
The initial push for digital media encryption began with the need to secure hard drives. Several technology platforms emerged, leading to a debate between whole-disk encryption versus encryption vaults, which finally lead to the realization that both should be used in conjunction for optimal results. The approach of whole-disk encryption is that the hard drive is useless without the encryption password once the computer is shut down. The encrypted-vault model was especially useful on computers with shared access, as each user has their own encrypted space that cannot be accessed by other users. Each user can encrypt a folder on the computer that no one else even realizes is there. Whole-disk encryption is the most prevalent technology, but in many scenarios, both encryption techniques are used together for maximum security.
This is how encrypted digital media works in our everyday environment: Look around your desk, in your pockets or purse. You'll probably find a USB flash drive. USBs are extremely portable, easy to use, readily available, inexpensive and can hold large

Spring 2012


amounts of data. The same characteristics that make these drives so popular are exacdy why they are such a security threat. Browse the Internet, and you will find a significant number of instances where lost drives have caused companies to lose critical and confidential data. The chances are good that encrypted USBs, which are readily available but more costly, can prevent such losses.
Many PDAs and smart phones can be encrypted as well. Generally, the entire device is not encrypted; instead, the storage digital media card is protected (similar to the encryption vault model). Even though most devices have remote wipe capabilities that remove all data and return the phone to factory defaults, if the phone or PDA is lost and the person who finds it does not connect to the Web, the data could be compromised. Current versions of Microsoft Exchange have included the ability to encrypt the PIM. VOL (which is the information storage on a Wondows Mobile phone) on Windows Mobile phones, which includes e-mail and calendars, temp folders and the user's document folders. Additionally there are third-party solutions that accomplish the same security, but will work across multiple phone platforms, such as GaurdianEdge SmartPhone Protection which protects iPhone, Palm and Windows Mobile phones.
The scalability of the encryption products on the market are extremely varied, as some are targeting an individual device while others are delivered and managed through network policies.
Encrypted e-mail
As e-mail continues to grow and gain vitality in corporations' communication systems, so has the need to protect this information in transit from company to company. This is currently the least-used area of encryption and has met with some resistance since it is often difficult to implement and use. Companies are using encrypted e-mail and secure file transfer technologies to protect communications between their employees and clients, but more importantly are protecting sensitive content in the e-mails. Clients of CPA firms have a reasonable expectation that any financial or personal information (such as Social Security Numbers, bank account information, pay stubs, etc.) sent via e-mail is encrypted, and legislation is quickly catching up to the technology (see ,e.g., Personal Data Privacy and Security Act of 2005 and Gramm-LeachBiley Act).
Currently, several different methods are used to encrypt e-mails:
* Endpoint to Endpoint: This means that the e-mail is encrypted from when it is sent until it is received. This method is the most secure, but also the hardest to implement and manage.
* Gateway to Endpoint: In this model, there is a server or appliance at the edge of the sender's network that encrypts the e-mail as it leaves the company. This Sender may not even be aware that the e-mail is encrypted as it requires no extra action, the only extra work is on the recipient.
* Gateway to Gateway: This model is ideal as there is no extra work for the sender or recipient, but to accomplish this model, you have to implement the compatible

Spring 2012


solution on both sides, which in many cases is not possible, especially in a client-service model.
* Gateway to Web: This model is probably the most popular model, as it creates an e-mail as composed and a file is attached to it. The file is stripped off and stored on a server in an encrypted vault. The recipient receives the e-mail, which now contains a URL pointing to the file on the secure server. After an authentication process, the person outside the company can download the file. Typically with this method the file is only saved on the secure server for a short period of time, and the file has to be resent if the email is not retrieved within that time. This solution also solves size limitation issues on e-mails as the e-mail systems do not see the secured file as an attachment.
a. What are the other methods of determining data theft and hacking?
b. How does encryption helps us in determining hacking?
c. What is secure socket layer?
d. What is public key? What is an encrypted Email?
e. What are the different standards for Email security system?

[10 Marks]
Q.3 Write short notes on
a. MIME with an example

b. CMS with an example [10 Marks]

Feb / Spring 2012


Master of Business Administration-MBA Semester III
MI0027- Business Intelligence and tools – 2 Credits
Assignment Set- 1 (30 Marks)
1. (i) What do you understand by Business Intelligence System? What are the different steps in order to deliver the Business Value through a BI System?

(ii) List the characteristics of a Data warehouse and analyze how the development of a Data warehouse helps you in managing various functions in your organizations.
2. What do you understand by Data warehouse Meta Data? What is the use of Metadata? How can you manage Metadata?
3. What do you understand by EIS? What are the significances of EIS? Briefly describe the benefits of EIS.


Feb / Spring 2012


Master of Business Administration-MBA Semester III
MI0027-Business Intelligence and tools – 2 Credits
Assignment Set- 2 (30 Marks)
Each question carries 10 marks
1. Describe Data Quality Types and discuss the concepts of TQDM.
2. Explain the Visual Warehouse in detail.
3. What do you understand by OLAP? What are the guidelines for an OLAP system? Briefly discuss the concept of Data Mining.


Spring 2012


Master of Business Administration - MBA Semester III
OM0001 – Operations Management - 2 Credits
(Book ID: B1073)
Assignment - Set- 1 (30 Marks)
Note: Each Question carries 10 marks. Answer all the questions.
1. Do most of the principles, tools and techniques of Operations Management apply to both manufacturing and service sectors? Justify with examples.

2. Time taken by three machines on five jobs in a factory is tabulated below in table below. Find out the optimal sequence to be followed to minimise the idle time taken by the jobs on the machines.

Job
Machine 1 (M1)
Machine 2 (M2)
Machine 3 (M3)
A
6
8
7
B
4
5
3
C
5
5
7
D
3
4
6
E
4
3
4

3. Explain the method of work study and method study in the form of a flow chart. Differentiate between work study and method study.


Spring 2012


Master of Business Administration - MBA Semester III
OM0001 – Operations Management - 2 Credits
(Book ID: B1073)
Assignment - Set- 2 (30 Marks)
Note: Each Question carries 10 marks. Answer all the questions.
1. One of the serious drawbacks of Indian manufacturing organisations compared to their counterparts in Japan and Korea was the ‘predominant’ domestic focus in their approach to business. Elucidate. Site an example.

2. List the assumptions on which Break Even Analysis is based. Explain breakeven point with a sketch.

3. Define Statistical Quality Control and explain the various methods associated with it.


Spring 2012


Master of Business Administration - MBA Semester III
OM0002 – Enterprise Resource Planning - 2 Credits
(Book ID: B1069)
Assignment - Set- 1 (30 Marks)
Note: Each Question carries 10 marks. Answer all the questions.
1. How does ERP inventory module maintain inventory items? List out the different modules under ERP Inventory management.

2. Explain the three types of CRM. Briefly explain the functionalities of CRM sub modules.

3. Describe how you would go about the different phases of the ERP implementation lifecycle, if it were being done in your company.

Master of Business Administration - MBA Semester III
OM0002 – Enterprise Resource Planning - 2 Credits
(Book ID: B1069)
Assignment - Set- 2 (30 Marks)
Note: Each Question carries 10 marks. Answer all the questions.
1. Explain the ERP selection process. List out the ERP tools and their respective vendors available in the market.

2. On what basis manufacturing operations are classified. Explain the different categories.

3. Write short notes on seven major ERP vendors—SAPAG, Baan, PeopleSoft, JD Edwards, Oracle, QAD and SSA.


Feb / Spring 2012


Master of Business Administration - MBA Semester III
OM0003 – Supply Chain Management - 2 Credits
(Book ID: B1074)
Assignment - Set- 1 (30 Marks)
Note: Each Question carries 10 marks. Answer all the questions.
1. Tabulate the events of Supply Chain Management evolution according to chronological dates starting from Ancient times to 2000 AD.

2. “The utility of forecasts can be enhanced through collaborative forecasting among supply chain partners.” Explain?

3. Write short notes on the following w.r.t Supply Chain Management.

a) Bar Code
b) Radio Frequency Identification
c) Electronic Data Interchange
d) Artificial Intelligence or Expert System
Master of Business Administration - MBA Semester III
OM0003 – Supply Chain Management - 2 Credits
(Book ID: B1074)
Assignment - Set- 2 (30 Marks)
Note: Each Question carries 10 marks. Answer all the questions.
1. Taking an example of any product, explain the 12 steps involved in procurement process.

2. Explain the different types of product returns. Briefly explain the impact of Reverse Supply Chain Management on profitability.

3. List out six major computer based information systems and explain each of them briefly with examples.


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3
MK0001 – Sales Distribution And Supply Chain Management
(2 credits)
(Book ID: B1220)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. Describe the role of distribution channel. List the factors in the selection of distribution channel.
2. Compare and contrast the various types of sales organization structures.

3. Describe the term “physical distribution management”. Discuss various components of physical distribution management.


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3
MK0001 – Sales Distribution And Supply Chain Management
(2 credits)
(Book ID: B1220)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. What is brand sponsorship? Explain how organizations maintain their sponsorship positions
2. Explain the different factors affecting cost of a warehouse. List the various types of warehouses and their uses

3. List the various modes of transportation available in India. List the advantages and disadvantages.


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3
MK0002 – Consumer Behaviour
(2 credits)
(Book ID: B1221)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. Why is it important to consider the behaviour of consumers while deciding on the marketing mix of the company? Elaborate with suitable examples.
2. List the different roles that a consumer plays while making a purchase decision.

3. Distinguish between differentiated, undifferentiated and concentrated marketing. Explain the concept with the help of suitable examples.


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3 MK0002 – Consumer Behaviour
(2 credits)
(Book ID: B1221)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. List the important factors that influence consumer perceptions
2. List the differences between absolute threshold and differential threshold. Discuss the implications of Weber’s Law.

3. Recommend any three marketing situations where the principle of grouping can be used with advantage.


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3 MK0003 – Retail Marketing
(2 credits)
(Book ID: B1222)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. List the different stages involved in retail environment analysis.
2. Briefly explain GAP model of service quality

3. Explain the various types of retail store locations. List their pros and cons


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3 MK0003 – Retail Marketing
(2 credits)
(Book ID: B1222)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. Define the term positioning. Discuss various positioning approaches
2. Write a short note on- psychographic segmentation.

3. Briefly describe the criteria for effective segmentation.


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3 MK0004 – Market Research
(2 credits)
(Book ID: B1223)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. Explain the problems associated with marketing research.
2. Explain the role of Marketing research in “decision-making” process

3. Describe consumer research process in detail.


Spring 2012 (February 2012)


Master of Business Administration- MBA Semester 3
MK0004 – Market Research
(2 credits)
(Book ID: B1223)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. Describe the relation between research design and marketing decision process
2. List the factors that affect cost of a warehouse. Describe the various types of warehouses and their uses

3. Explain research process . Differentiate between Causal and Experimental design.


Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0001 – Foundations of Quality Management
(2 credits)
(Book ID: B1079)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. Differentiate between appraisal cost and prevention cost.

2. Explain the concept of company-wide quality.

3. Write short notes on the following:
                a. Classical theory model of organization
                b. Human relations theory


Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0001 – Foundations of Quality Management
(2 credits)
(Book ID: B1079)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. Describe the importance of customer satisfaction.

2. Explain the business perspective and process flow perspective of Quality.

3. What are the barriers to Quality?


Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0002 – Principles and Philosophies of Quality Management
(2 credits)
(Book ID: B1080)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. Explain the concept of PDCA Cycle.

2. Describe Philip Crosby’s contribution to Quality Management.

3. What is meant by Cost of Quality? Differentiate between Internal failure costs and external failure costs.


Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0002 – Principles and Philosophies of Quality Management
(2 credits)
(Book ID: B1080)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. Write short notes on the following:
                a. ‘5S’ principles
                b. Poka Yoke

2. What is meant Quality Circle? What are its objectives and characteristics?

3. Describe the contribution of Genichi Taguchi towards Quality improvement. What is “design of experiment”? What are its features?


Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0003 – Statistical Process Control and Process Capability
(2 credits)
(Book ID: B1071)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. What is meant by process capability? How do you calculate ‘Cp’ index?

2. Write a brief note on Six Sigma.

3. In a capability study of a lathe used in turning a shaft to a diameter of 23.75 ± 0.1 mm a sample of 6 consecutive pieces was taken each day for 8 days. The diameters of these shafts are as given below:

1st day
2nd day
3rd day
4th day
5th day
6th day
7th day
8th day
23.77
23.80
23.77
23.79
23.75
23.78
23.76
23.76
23.80
23.78
23.78
23.76
23.78
23.76
23.78
23.79
23.78
23.76
23.77
23.79
23.78
23.73
23.75
23.77
23.73
23.70
23.77
23.74
23.77
23.76
23.76
23.72
23.76
23.81
23.80
23.82
23.76
23.74
23.81
23.78
23.75
23.77
23.74
23.76
23.79
23.78
23.80
23.78

Construct the “” and “R” charts. X



Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0003 – Statistical Process Control and Process Capability
(2 credits)
(Book ID: B1071)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. Write short notes on the technique of Stem-and-Leaf plot.

2. Explain the different quality indices for acceptance sampling plans

3. Write a brief note on Experimental Design.


Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0004 – Quality Management Tools
(2 credits)
(Book ID: B1081)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1. What is reliability? Explain the methods of achieving reliability.

2. What are the uses of Quality Information System?

3. What are the objectives and features of Quality Function Deployment (QFD)?


Feb / Spring 2012


Master of Business Administration - MBA Semester 3
“Total Quality Management” Specialization
QM0004 – Quality Management Tools
(2 credits)
(Book ID: B1081)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1. Explain the concept of FMEA.

2. Describe “Cause and Effect Diagram” with example.

3. Write short notes on the following:
                a. Control charts
                b. The seven new SQC tools


Feb / Spring 2012


Master of Business Administration – MBA Semester 3
ML0001 – Warehousing and Supply Chain Management - 2 Credits
Assignment Set – 1
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 How will good supply chain practices help in retail? Justify your answer. [10 marks]
Q.2 Discuss the RFID technology and its applicability in retail. [10 marks]
Q.3 What is CPG and demand forecast response? [10 marks]

Feb / Spring 2012


Master of Business Administration-MBA Semester 3
ML0001 – Warehousing and Supply Chain Management - 2 Credits
Assignment Set – 2
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 Explain some of the SAP best practices for retail. [10 marks]
Q.2 Explain the following systems: Project portfolio management, Business process management, compliance management, business intelligences. [10 marks]
Q.3 Explain and evaluate POS systems. [10 marks]

Feb / Spring 2012


Master of Business Administration – MBA Semester 3
ML0002 – Buying and Merchandising - 2 Credit
Assignment Set – 1
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 Explain the various buying techniques. [10 marks]
Q.2 Distinguish:
a) Installment purchase and loan method of purchasing
b) Asset sales and entity sales [10 marks]
Q.3 Explain merchandise concepts, technologies and systems. [10 marks]

Feb / Spring 2012


Master of Business Administration-MBA Semester 3
ML0002 – Buying and Merchandising - 2 Credits
Assignment Set – 2
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 How is product lines developed and presented in retail with relevance to buying and merchandising? [10 marks]
Q.2 Discuss the various buying concepts. [10 marks]
Q.3 Identify the CRM prospects and problems involved in the context of retail environment. [10 marks]

Feb / Spring 2012


Master of Business Administration – MBA Semester 3
ML0003 –Store Operations- 2 Credit
Assignment Set – 1
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 Discuss the retail pricing objectives and elements of retail pricing. [10 marks]
Q.2 Discuss the structure organisation and layout of stores pertaining to design, spaces, objectives and steps concerned. [10 marks]
Q.3 Mention the different classifications of stores and different stages involved in retail planning. [10 marks]

Feb / Spring 2012


Master of Business Administration-MBA Semester 3
ML0003 – Store Operations - 2 Credits
Assignment Set – 2
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1. How to create customer profile for stores market segmentation? Give examples. [10 marks]
Q.2 What are the legal procedures for customer handling? [10 marks]
Q.3 Analyse how relationship marketing has evolved and its applicability in retail. [10 marks]

Feb / Spring 2012


Master of Business Administration – MBA Semester 3
ML0004 – Retail IT Management - 2 Credits
Assignment Set – 1
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 a) Give short notes on RFID. [5 marks]
b) Give reasons why IT is required in retail. [5 marks]
Q.2 Elaborate as to how an e-fulfillment takes place. [10 marks]
Q.3 Discuss the role of ERP in retail businesses. [10 marks]

Feb / Spring 2012


Master of Business Administration-MBA Semester 3
ML0004 – Retail IT Management - 2 Credits
Assignment Set – 2
30 Marks
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 Present a note on POS. [10 marks]
Q.2 Explain the role of IT systems in retail. [10 marks]
Q.3 Discuss the SAP best practices in retail. [10 marks]


No comments:

Post a Comment