Friday, June 12, 2009
MGT402 - Cost & Management Accounting SOLUTION
1 B
2 A
3 A
4 C
5 A
case 2
6 B
7 B
8 B
9 B
10 D
Case 3
11 A
12 B
13 A
14 D
15 C
Case 4
16 C
17 C
18 B
19 D
20 C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
MGT402 - Cost & Management Accounting SOLUTION
1 B
2 A
3 A
4 C
5 A
case 2
6 B
7 B
8 B
9 B
10 D
Case 3
11 A
12 B
13 A
14 D
15 C
Case 4
16 C
17 C
18 B
19 D
20 C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Thursday, June 11, 2009
Mgt411 - Assignment # 4 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256407/711646c5/mgt411_quiz__4.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt411 - Assignment # 4 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256407/711646c5/mgt411_quiz__4.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA301 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256367/2203f7c6/STA301.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA301 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256367/2203f7c6/STA301.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt613 - Operation Management Solution
- B
- B
- A
- A
- A
- c (not sure)
- c (not sure)
- A
- A
- D
- C
- C
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt613 - Operation Management Solution
- B
- B
- A
- A
- A
- c (not sure)
- c (not sure)
- A
- A
- D
- C
- C
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA630 - Assignment Solution by VUsolutions
2. A
3. A
4. D
5. C
6. B
7. D
8. B
9. D
10. A
11. A
12. C
13. A
14. A
15. C
16. D
17. C
18. C
19. C
20. B
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA630 - Assignment Solution by VUsolutions
2. A
3. A
4. D
5. C
6. B
7. D
8. B
9. D
10. A
11. A
12. C
13. A
14. A
15. C
16. D
17. C
18. C
19. C
20. B
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt501 - Human Resource Management (HRM) Solution
- B
- D
- D
- D
- C
- B
- B
- B
- B
- A
- D
- D
- D
- A
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt501 - Human Resource Management (HRM) Solution
- B
- D
- D
- D
- C
- B
- B
- B
- B
- A
- D
- D
- D
- A
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Tuesday, June 9, 2009
Mgt502 - Organizational Behaviour, Assignment Solution by VUsolution
Question no. | Question Marks | Correct Option |
1 | 1 | B |
2 | 1 | C |
3 | 1 | B |
4 | 1 | B |
5 | 1 | C |
6 | 1 | A |
7 | 1 | A |
8 | 1 | A |
9 | 1 | C |
10 | 1 | A |
11 | 1 | D |
12 | 1 | A |
13 | 1 | A |
14 | 1 | C |
15 | 1 | A |
16 | 1 | A |
17 | 1 | D |
18 | 1 | B |
19 | 1 | B |
20 | 1 | C |
Total Marks | 20 |
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt502 - Organizational Behaviour, Assignment Solution by VUsolution
Question no. | Question Marks | Correct Option |
1 | 1 | B |
2 | 1 | C |
3 | 1 | B |
4 | 1 | B |
5 | 1 | C |
6 | 1 | A |
7 | 1 | A |
8 | 1 | A |
9 | 1 | C |
10 | 1 | A |
11 | 1 | D |
12 | 1 | A |
13 | 1 | A |
14 | 1 | C |
15 | 1 | A |
16 | 1 | A |
17 | 1 | D |
18 | 1 | B |
19 | 1 | B |
20 | 1 | C |
Total Marks | 20 |
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Eco401 Economics Assignment's solution
1 B
2 A
3 C
4 C
5 D
6 C
7 A
8 B
9 D
10 B
11 A
Case 2
12 B
13 C
14 A
15 C
Case 3
16 B
17 C
18 D
19 A
20 A
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Eco401 Economics Assignment's solution
1 B
2 A
3 C
4 C
5 D
6 C
7 A
8 B
9 D
10 B
11 A
Case 2
12 B
13 C
14 A
15 C
Case 3
16 B
17 C
18 D
19 A
20 A
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions
1. mSCOPE |
Information security |
means protecting information and information systems from |
unauthorized access, use, disclosure, disruption, modification or destruction. |
The terms information security, computer security and information assurance are |
frequently incorrectly used interchangeably. These fields ar e interrelated often and share |
the common goals of protecting the confidentiality, integrity and availability of |
information; however, there are some subtle differences between them. |
These differences lie primarily in the approach to the subject, the methodologies used, |
and the areas of concentration. Information security is concerned with the confidentiality, |
integrity and availability of data regardless of the form the data may take: electronic, |
print, or other forms. |
Governments, military, corporate, financial institutions, hospitals, and private businesses |
amass a great deal of confidential information about their employees, customers, |
products, research, and financial status. Most of this information is now collected, |
processed and stored on electronic computers and transmitted across networks to other |
computers. |
Should confidential information about a businesses customers or finances or new product |
line fall into the hands of a competitor, such a breach of security could lead to lost |
business, law suits or even bankruptcy of the business. Protecting confidential |
information is a business requirement, and in many cases also an ethical and legal |
requirement. |
For the individual, information security has a significant effect on privacy, which is |
viewed very differently in different cultures. |
The field of information security has grown and evolved significantly in recent years. As |
a career choice there are many ways of gaining entry into the field. It offers many areas |
for specialization including, securing network(s) and allied infrastructure, securing |
applications and databases, security testing, information systems auditing, business |
continuity planning and digital forensics science, to name a few. |
2. Objective |
An Information Security Policy usually has the following objectives: |
To protect the organization's business information and any client or customer |
I. |
information within its custody or safekeeping by safeguarding its confidentiality, |
integrity and availability. |
To establish safeguards to protect the organization's information resources from |
II. |
theft, abuse, misuse and any form of damage. |
To establish responsibility and accountability for Information Security in the |
III. |
organization. |
To encourage management and staff to maintain an appropriate level of awareness, |
IV. |
knowledge and skill to allow them to minimize the occurrence and severity of |
Information Security incidents. |
3. Responsibilities |
• |
Monitor to a reasonable level the use of the computer so as to detect breaches of |
the system's security. In the event of a serious breach being detected, especially if |
network security may have been compromised, CSD should be alerted so |
institutional corrective measures can be taken. |
• |
All user ids on departmental computers must be provided to the CSD to enable |
such users to be traced. |
• |
Ensure that each registered user is only allowed access to positively authorized |
facilities; the default on all computers should be to bar access. |
• • |
Ensure that all software and/or data that are accessed via the computer are |
• |
properly licensed for such access. |
4. Implementation. |
To aid departments who have a real need to run their own computers in this way the CSD |
will: |
Provide a designated contact to liaise with departmental system administrators. |
• |
Operate a closed security mailing list that is regularly updated with the latest |
• |
national and international information on hacking attempts, tools, etc. All |
departmental system-administrators who are properly appointed and are recorded |
as such with the CSD will be included in this list. |
Provide regular training, advice and support to the designated departmental |
• |
system administrators. |
Assist a departmental system-administrator to correct a security loophole or |
• |
breach, especially where the integrity of the University network may be at risk. |
Periodically carry out checks, of its own and other network connected computers, |
• |
using tools provided by the industry or similar to those known to be available to |
would be hackers. This will be done to search for the various types of security |
problems that might exist. |
CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions
1. mSCOPE |
Information security |
means protecting information and information systems from |
unauthorized access, use, disclosure, disruption, modification or destruction. |
The terms information security, computer security and information assurance are |
frequently incorrectly used interchangeably. These fields ar e interrelated often and share |
the common goals of protecting the confidentiality, integrity and availability of |
information; however, there are some subtle differences between them. |
These differences lie primarily in the approach to the subject, the methodologies used, |
and the areas of concentration. Information security is concerned with the confidentiality, |
integrity and availability of data regardless of the form the data may take: electronic, |
print, or other forms. |
Governments, military, corporate, financial institutions, hospitals, and private businesses |
amass a great deal of confidential information about their employees, customers, |
products, research, and financial status. Most of this information is now collected, |
processed and stored on electronic computers and transmitted across networks to other |
computers. |
Should confidential information about a businesses customers or finances or new product |
line fall into the hands of a competitor, such a breach of security could lead to lost |
business, law suits or even bankruptcy of the business. Protecting confidential |
information is a business requirement, and in many cases also an ethical and legal |
requirement. |
For the individual, information security has a significant effect on privacy, which is |
viewed very differently in different cultures. |
The field of information security has grown and evolved significantly in recent years. As |
a career choice there are many ways of gaining entry into the field. It offers many areas |
for specialization including, securing network(s) and allied infrastructure, securing |
applications and databases, security testing, information systems auditing, business |
continuity planning and digital forensics science, to name a few. |
2. Objective |
An Information Security Policy usually has the following objectives: |
To protect the organization's business information and any client or customer |
I. |
information within its custody or safekeeping by safeguarding its confidentiality, |
integrity and availability. |
To establish safeguards to protect the organization's information resources from |
II. |
theft, abuse, misuse and any form of damage. |
To establish responsibility and accountability for Information Security in the |
III. |
organization. |
To encourage management and staff to maintain an appropriate level of awareness, |
IV. |
knowledge and skill to allow them to minimize the occurrence and severity of |
Information Security incidents. |
3. Responsibilities |
• |
Monitor to a reasonable level the use of the computer so as to detect breaches of |
the system's security. In the event of a serious breach being detected, especially if |
network security may have been compromised, CSD should be alerted so |
institutional corrective measures can be taken. |
• |
All user ids on departmental computers must be provided to the CSD to enable |
such users to be traced. |
• |
Ensure that each registered user is only allowed access to positively authorized |
facilities; the default on all computers should be to bar access. |
• • |
Ensure that all software and/or data that are accessed via the computer are |
• |
properly licensed for such access. |
4. Implementation. |
To aid departments who have a real need to run their own computers in this way the CSD |
will: |
Provide a designated contact to liaise with departmental system administrators. |
• |
Operate a closed security mailing list that is regularly updated with the latest |
• |
national and international information on hacking attempts, tools, etc. All |
departmental system-administrators who are properly appointed and are recorded |
as such with the CSD will be included in this list. |
Provide regular training, advice and support to the designated departmental |
• |
system administrators. |
Assist a departmental system-administrator to correct a security loophole or |
• |
breach, especially where the integrity of the University network may be at risk. |
Periodically carry out checks, of its own and other network connected computers, |
• |
using tools provided by the industry or similar to those known to be available to |
would be hackers. This will be done to search for the various types of security |
problems that might exist. |