Friday, June 12, 2009

MGT402 - Cost & Management Accounting SOLUTION

Case 1
1 B
2 A
3 A
4 C
5 A

case 2
6 B
7 B
8 B
9 B
10 D

Case 3
11 A
12 B
13 A
14 D
15 C

Case 4
16 C
17 C
18 B
19 D
20 C

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

MGT402 - Cost & Management Accounting SOLUTION

Case 1
1 B
2 A
3 A
4 C
5 A

case 2
6 B
7 B
8 B
9 B
10 D

Case 3
11 A
12 B
13 A
14 D
15 C

Case 4
16 C
17 C
18 B
19 D
20 C

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Thursday, June 11, 2009

Mgt211 - Introduction to Business (Assginment # 4)


Mgt211 - Introduction to Business (Assginment # 4)


Mgt411 - Assignment # 4 Solution

Dear Students,

You may download STA301 assignment's solution from the following link:

http://www.2shared.com/file/6256407/711646c5/mgt411_quiz__4.html

Best of Luck

VU Help Desk....


[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Mgt411 - Assignment # 4 Solution

Dear Students,

You may download STA301 assignment's solution from the following link:

http://www.2shared.com/file/6256407/711646c5/mgt411_quiz__4.html

Best of Luck

VU Help Desk....


[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

STA301 Solution

Dear Students,

You may download STA301 assignment's solution from the following link:

http://www.2shared.com/file/6256367/2203f7c6/STA301.html

Best of Luck

VU Help Desk....

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

STA301 Solution

Dear Students,

You may download STA301 assignment's solution from the following link:

http://www.2shared.com/file/6256367/2203f7c6/STA301.html

Best of Luck

VU Help Desk....

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Mgt613 - Operation Management Solution

  1. B
  2. B
  3. A
  4. A
  5. A
  6. c (not sure)

  7. c (not sure)

  8. A
  9. A
  10. D
  11. C
  12. C
  13. C


[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Mgt613 - Operation Management Solution

  1. B
  2. B
  3. A
  4. A
  5. A
  6. c (not sure)

  7. c (not sure)

  8. A
  9. A
  10. D
  11. C
  12. C
  13. C


[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

STA630 - Assignment Solution by VUsolutions

1. D
2. A
3. A
4. D
5. C
6. B
7. D
8. B
9. D
10. A
11. A
12. C
13. A
14. A
15. C
16. D
17. C
18. C
19. C
20. B

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

STA630 - Assignment Solution by VUsolutions

1. D
2. A
3. A
4. D
5. C
6. B
7. D
8. B
9. D
10. A
11. A
12. C
13. A
14. A
15. C
16. D
17. C
18. C
19. C
20. B

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Mgt501 - Human Resource Management (HRM) Solution

  1. B
  2. D
  3. D
  4. D
  5. C
  6. B
  7. B
  8. B
  9. B
  10. A
  11. D
  12. D
  13. D
  14. A
  15. C


[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Mgt501 - Human Resource Management (HRM) Solution

  1. B
  2. D
  3. D
  4. D
  5. C
  6. B
  7. B
  8. B
  9. B
  10. A
  11. D
  12. D
  13. D
  14. A
  15. C


[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Tuesday, June 9, 2009

Mgt502 - Organizational Behaviour, Assignment Solution by VUsolution

Question no. Question Marks Correct Option
1 1 B
2 1 C
3 1 B
4 1 B
5 1 C
6 1 A
7 1 A
8 1 A
9 1 C
10 1 A
11 1 D
12 1 A
13 1 A
14 1 C
15 1 A
16 1 A
17 1 D
18 1 B
19 1 B
20 1 C
Total Marks 20



[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Mgt502 - Organizational Behaviour, Assignment Solution by VUsolution

Question no. Question Marks Correct Option
1 1 B
2 1 C
3 1 B
4 1 B
5 1 C
6 1 A
7 1 A
8 1 A
9 1 C
10 1 A
11 1 D
12 1 A
13 1 A
14 1 C
15 1 A
16 1 A
17 1 D
18 1 B
19 1 B
20 1 C
Total Marks 20



[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Eco401 Economics Assignment's solution

Case 1
1 B
2 A
3 C
4 C
5 D
6 C
7 A
8 B
9 D
10 B
11 A

Case 2

12 B

13 C
14 A
15 C

Case 3

16 B

17 C
18 D
19 A
20 A

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

Eco401 Economics Assignment's solution

Case 1
1 B
2 A
3 C
4 C
5 D
6 C
7 A
8 B
9 D
10 B
11 A

Case 2

12 B

13 C
14 A
15 C

Case 3

16 B

17 C
18 D
19 A
20 A

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions

1. mSCOPE

Information security

means protecting information and information systems from

unauthorized access, use, disclosure, disruption, modification or destruction.

The terms information security, computer security and information assurance are

frequently incorrectly used interchangeably. These fields ar e interrelated often and share

the common goals of protecting the confidentiality, integrity and availability of

information; however, there are some subtle differences between them.

These differences lie primarily in the approach to the subject, the methodologies used,

and the areas of concentration. Information security is concerned with the confidentiality,

integrity and availability of data regardless of the form the data may take: electronic,

print, or other forms.

Governments, military, corporate, financial institutions, hospitals, and private businesses

amass a great deal of confidential information about their employees, customers,

products, research, and financial status. Most of this information is now collected,

processed and stored on electronic computers and transmitted across networks to other

computers.

Should confidential information about a businesses customers or finances or new product

line fall into the hands of a competitor, such a breach of security could lead to lost

business, law suits or even bankruptcy of the business. Protecting confidential

information is a business requirement, and in many cases also an ethical and legal

requirement.

For the individual, information security has a significant effect on privacy, which is

viewed very differently in different cultures.

The field of information security has grown and evolved significantly in recent years. As

a career choice there are many ways of gaining entry into the field. It offers many areas

for specialization including, securing network(s) and allied infrastructure, securing

applications and databases, security testing, information systems auditing, business

continuity planning and digital forensics science, to name a few.



2. Objective

An Information Security Policy usually has the following objectives:

To protect the organization's business information and any client or customer

I.

information within its custody or safekeeping by safeguarding its confidentiality,

integrity and availability.



To establish safeguards to protect the organization's information resources from

II.

theft, abuse, misuse and any form of damage.

To establish responsibility and accountability for Information Security in the

III.

organization.

To encourage management and staff to maintain an appropriate level of awareness,

IV.

knowledge and skill to allow them to minimize the occurrence and severity of

Information Security incidents.



3. Responsibilities

Monitor to a reasonable level the use of the computer so as to detect breaches of

the system's security. In the event of a serious breach being detected, especially if

network security may have been compromised, CSD should be alerted so

institutional corrective measures can be taken.

All user ids on departmental computers must be provided to the CSD to enable

such users to be traced.

Ensure that each registered user is only allowed access to positively authorized

facilities; the default on all computers should be to bar access.

Ensure that all software and/or data that are accessed via the computer are

properly licensed for such access.



4. Implementation.

To aid departments who have a real need to run their own computers in this way the CSD

will:

Provide a designated contact to liaise with departmental system administrators.

Operate a closed security mailing list that is regularly updated with the latest

national and international information on hacking attempts, tools, etc. All

departmental system-administrators who are properly appointed and are recorded

as such with the CSD will be included in this list.



Provide regular training, advice and support to the designated departmental

system administrators.

Assist a departmental system-administrator to correct a security loophole or

breach, especially where the integrity of the University network may be at risk.

Periodically carry out checks, of its own and other network connected computers,

using tools provided by the industry or similar to those known to be available to

would be hackers. This will be done to search for the various types of security

problems that might exist.

CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions

1. mSCOPE

Information security

means protecting information and information systems from

unauthorized access, use, disclosure, disruption, modification or destruction.

The terms information security, computer security and information assurance are

frequently incorrectly used interchangeably. These fields ar e interrelated often and share

the common goals of protecting the confidentiality, integrity and availability of

information; however, there are some subtle differences between them.

These differences lie primarily in the approach to the subject, the methodologies used,

and the areas of concentration. Information security is concerned with the confidentiality,

integrity and availability of data regardless of the form the data may take: electronic,

print, or other forms.

Governments, military, corporate, financial institutions, hospitals, and private businesses

amass a great deal of confidential information about their employees, customers,

products, research, and financial status. Most of this information is now collected,

processed and stored on electronic computers and transmitted across networks to other

computers.

Should confidential information about a businesses customers or finances or new product

line fall into the hands of a competitor, such a breach of security could lead to lost

business, law suits or even bankruptcy of the business. Protecting confidential

information is a business requirement, and in many cases also an ethical and legal

requirement.

For the individual, information security has a significant effect on privacy, which is

viewed very differently in different cultures.

The field of information security has grown and evolved significantly in recent years. As

a career choice there are many ways of gaining entry into the field. It offers many areas

for specialization including, securing network(s) and allied infrastructure, securing

applications and databases, security testing, information systems auditing, business

continuity planning and digital forensics science, to name a few.



2. Objective

An Information Security Policy usually has the following objectives:

To protect the organization's business information and any client or customer

I.

information within its custody or safekeeping by safeguarding its confidentiality,

integrity and availability.



To establish safeguards to protect the organization's information resources from

II.

theft, abuse, misuse and any form of damage.

To establish responsibility and accountability for Information Security in the

III.

organization.

To encourage management and staff to maintain an appropriate level of awareness,

IV.

knowledge and skill to allow them to minimize the occurrence and severity of

Information Security incidents.



3. Responsibilities

Monitor to a reasonable level the use of the computer so as to detect breaches of

the system's security. In the event of a serious breach being detected, especially if

network security may have been compromised, CSD should be alerted so

institutional corrective measures can be taken.

All user ids on departmental computers must be provided to the CSD to enable

such users to be traced.

Ensure that each registered user is only allowed access to positively authorized

facilities; the default on all computers should be to bar access.

Ensure that all software and/or data that are accessed via the computer are

properly licensed for such access.



4. Implementation.

To aid departments who have a real need to run their own computers in this way the CSD

will:

Provide a designated contact to liaise with departmental system administrators.

Operate a closed security mailing list that is regularly updated with the latest

national and international information on hacking attempts, tools, etc. All

departmental system-administrators who are properly appointed and are recorded

as such with the CSD will be included in this list.



Provide regular training, advice and support to the designated departmental

system administrators.

Assist a departmental system-administrator to correct a security loophole or

breach, especially where the integrity of the University network may be at risk.

Periodically carry out checks, of its own and other network connected computers,

using tools provided by the industry or similar to those known to be available to

would be hackers. This will be done to search for the various types of security

problems that might exist.