Saturday, January 22, 2011

CS615 GDB solution

Graded Moderated Discussion Board (Graded MDB)
Dear students a Graded Moderated Discussion Board will be opened for "Software Project Management (CS615)" from July 27, 2010 to July 28, 2011, in which you have to post your comments on the topic given below and it will have weight-age of 5% of your total subject marks. Your comments will be graded based on the logic you have used to support your answer.

"MONITORING AND CONTROLLING USING MEETINGS, REVIEWS AND REPORTS FOR COMMUNICATION WITH IN TEAM AND THE OUTSIDE WORLD IS BEst TECHNIQUE IN SOFTWARE PROJECT MANAGEMENT" Either you agree or disagree with given statement , justify your reply with sound arguments".

Note:
1. Books, websites and other reading material may be consulted before posting your comments. (Do not copy the material as it is from internet and other resources.) If any one found copying the answer of other students or from any web site will get zero marks for his/her attempt.
2. Your comments must not exceed more than 7 lines.
3. Try to come up with your own arguments so that you could get maximum benefit from this exercise.
4. Short and to the point comments will be preferred over lengthy comments.
5. You should post your comments on the Graded MDB & not on the Regular MDB. Both will run parallel to each other during the time specified above. Do not post multiple comments.
6. Be careful for you may loose GMDB comments due to electricity load shedding and internet problems. You cannot participate in the discussion after the due date or through e-mail with in specified time.
7. Your answer should contain important points. Also follow the instructions given in announcement.
You can start preparing your comments now. In case of any query mail at[url=mailto:CS615@vu.edu.pk]CS615@vu.edu.pk[/url]
......................
SOLUTION:
Project Management Monitoring and Controlling Tools & Techniques
Monitoring and Controlling a project is the process or activities whereby the project manager tracks, reviews and revises the project activities in order to ensure the project creates the deliverables in accordance with the project objectives. Because of the unique and temporary nature of projects, they require active control. Unlike a process where the same set of activities have been performed repeatedly so that habits and expectations are stable, a project is inherently unstable. The activities are unique to the project or the sequence of activities and resources are only temporarily assigned associated with the project and are redeployed when the project completes. Habits and patterns are not established before everything changes.

The primary results of the Monitoring and Controlling processes are the project performance reports and implementing project changes. The focus for project management is the analysis of project performance to determine whether a change is needed in the plan for the remaining project activities. In my experience, almost every project will require a change to the plan at some point in time. Traditional projects are the most stable projects because the requirements and the activities are clear and well understood. Adaptive and Extreme projects are the least stable. They require very close control and will require numerous changes - if for no other reason the project manager will need to refine the activities of later phases based upon the results of early activities.

Tools and techniques that are used by project managers to conduct the Monitoring and Controlling of a project fall into one of four general categories. The first is the collection of project performance information. Techniques supporting this category are Pulse Meetings, Variance Reports, and Program Reviews. The second category is the analysis of the project performance to determine whether a project change is needed. Techniques that are used in this category are Project Forecasting and Problem Solving. The third category is reporting on project performance. Techniques that support this activity include the use of a Project Management Information System, Management Reviews, and Dashboards. The final category is the management of project change. The technique I commonly use in this category is the maintenance of a Change Management Log. There are two areas of project management tools and techniques that closely support the Monitoring and Controlling process but are also used more broadly throughout the project lifecycle. These are important enough to justify their own page.
...............
Program Reviews

Program Reviews are meetings with the project team members that review the current status of the project as compared to the original project plan. These are most often used on Full-scale and Complex projects. Unlike the Pulse Meetings which focus on day-to-day activities, the Program Reviews focus on the big picture and emphasize the integration between activities and between sub-projects encompassed within the project. The question being asked is whether the project activities and the sub-projects are likely to interfere with each other. In addition, when I have a supplier who is a major contributor on the project and is performing customized work on this project, I will conduct Program Reviews with the supplier for their portion of the project. Program Reviews are sometimes combined with Management Reviews. The danger with this approach is that key stakeholders and managers may intimidate some project team members from providing a frank and honest appraisal of status.
...........

Friday, January 21, 2011

CS301 Assignment No. 4 Solution

Assignment No. 04
SEMESTER Fall 2010
CS301- Data Structure


Total Marks: 15

Due Date: 24/01/2011


Question:  

                                                                     

Write a program in c++ that takes any no of elements through command prompt from user and saves it in an array. Then convert it into sorted format with minimum heap sort using your own coded implementation.

  

Note: You can't use built-in library function or templates for heap functions. All the source code should be written manually.

Solution:

#include<iostream.h>
#include<conio.h>

void restoreHup(int*,int);
void restoreHdown(int*,int,int);

void main()
{
int a[20],n,i,j,k;
printf("
Enter the number of elements to sort : ");
scanf("%d",&n);

printf("
Enter the elements : 
");
for(i=1;i<=n;i++){
scanf("%d",&a[i]);
restoreHup(a,i);
}


j=n;
for(i=1;i<=j;i++)
{
int temp;
temp=a[1];
a[1]=a[n];
a[n]=temp;
n--;
restoreHdown(a,1,n);
}

n=j;

printf("
Here is it...
");
for(i=1;i<=n;i++)
printf("%4d",a[i]);
}



void restoreHup(int *a,int i)
{
int v=a[i];

while((i>1)&&(a[i/2]<v))
{
a[i]=a[i/2];
i=i/2;
}
a[i]=v;
}

void restoreHdown(int *a,int i,int n)
{
int v=a[i];
int j=i*2;
while(j<=n)
{
if((j<n)&&(a[j]<a[j+1]))
j++;
if(a[j]<a[j/2]) break;

a[j/2]=a[j];
j=j*2;
}
a[j/2]=v;
}

CS301 Assignment No. 4 announced

Assignment No. 04
SEMESTER Fall 2010
CS301- Data Structure


Total Marks: 15

Due Date: 24/01/2011


Question:  

                                                                     

Write a program in c++ that takes any no of elements through command prompt from user and saves it in an array. Then convert it into sorted format with minimum heap sort using your own coded implementation.

  

Note: You can't use built-in library function or templates for heap functions. All the source code should be written manually.

Thursday, January 20, 2011

Mgt411 Assignment No. 2 Announced

"Money and Banking (MGT411)"
Assignment No. 02 
Marks: 20

Schedule
Opening Date and Time January 20 , 2011 At 12:01 A.M. (Mid-Night)
Due Date and Time January 26 , 2011 At 11:59 P.M. (Mid-Night)

Assignment

Question No 01
Part (A)

Calculate the impact of an increase in desired currency holdings on the money multiplier from 10% to 15% of deposits when the reserve requirement is 10 percent of deposits, and banks' desired excess reserves are 04 % of deposits.

Assumption:
If the general public held currency Rs. 109 millions and deposit are Rs. 99 millions.

Part (B)
What will be difference in deposits by following a Rs. 3 billion Open Market Purchase assuming a 5% reserve requirement

Assumptions:
1 No excess reserves are held.
2 There are no changes in the amount of currency held by the public

Question No. 2

A commercial bank has following data:

Total assets valued Rs. 1,000,000
Item Assets Liabilities
Interest rate sensitive 35% 45%
Interest rate non‐sensitive 65% 55%
Initial interest rate 08 % 05%
Interest rate increase 3% both in assets and liability

Required:
What will be the increase / decrease in the amount of net‐profit(interest) due to the interest rate change? Your answer should be in absolute figures.

Wednesday, January 19, 2011

Fin622 Online Quiz 4 Announced

Quiz No.4
Dated: Jan 17, 11

On-Line Quiz (No.04) Announcement Quiz will cover video lecture no. 01 to 35

Schedule
Opening Date and Time:  January 19, 2011 At 12:01 AM (Mid-Night)
Closing Date and Time:  January 21, 2011 At 11:59 PM (Mid-Night)

The Quiz will remain open for "72 Hours" 24 hours extra time is not available

HRM627 GDB Announced

Semester "Fall 2010"
"Human Resource Development (HRM627)"

This is to inform you that Graded Discussion Board (GDB) has been opened according to the following schedule
Schedule
Opening Date and Time:  19th January , 2011 At 12:01 A.M. (Mid-Night)
Closing Date and Time:  21stJanuary , 2011 At 11:59 P.M. (Mid-Night)
Note: No extra or bonus/grace period is available for attempting GDB.

Discussion Question:

Empowerment of women seems to be a red alert to men's leadership in Pakistan. Discuss?
Be precise while answering.

IT430 Online Quiz Announcement

QUIZ III will be held on 24th Jan 2011 and will also remain open on 25th Jan 2011, 

It is advised that you attempt it as early as possible once it is available to you. 

Lecture # 32 to 37 will be included in the quiz.

Mgt301 GDB Announced

Semester "Fall 2010"
"Principles of Marketing (MGT301)" 

This is to inform you that Graded Discussion Board (GDB) has been opened according to the following schedule.

Schedule
Opening Date and Time: 19th January 2011 At 12:01 A.M. (Mid-Night)
Closing Date and Time: 21st January 2011 At 11:59 P.M. (Mid-Night)

Note: No extra or bonus/grace period is available for attempting GBD.

Discussion Question: 

"Nokia starts campaign for their mobile phone and want intensive advertising for acquiring consumer demand. If you are the part of that campaign, then which type of promotion strategy you will suggest to NOKIA?"

CS507 Assignment No. 4 Announced

Assignment No. 04 SEMESTER Fall 2010 CS507- Information Systems
Total Marks: 10
Due Date: 24/1/2011

Instructions
Please read the following instructions carefully before solving & submitting assignment:
It should be clear that your assignment will get zero marks if:
o The assignment is submitted after due date.
o The submitted assignment does not open or file is corrupt.
o The assignment is copied (from other student or ditto copy from handouts or internet).
o Student ID is not mentioned in the assignment File or name of file is other than student ID.

Note:
Your answer must follow the below given specifications. You will be assigned zero marks if you do not follow these instructions.
• Font style: "Times New Roman"
• Font color: "Black"
• Font size: "12"
• Bold for heading only.
• Font in Italic is not allowed at all.
Do not put any query at MDB about this assignment, if you have any query then contact at cs507@vu.edu.pk

Deadline
Your assignment must be uploaded/submitted at or before Monday, January 24, 2011.
Marks: 10

Web application security

Dear Student
You have learned in this course about the system security risks and vulnerabilities.
That when any system goes online so it is more likely be attacked by hackers.
Hackers try to attack at the application layer of network system. Just to get into the database of system, as application layer is the bottom layer from which any computer can access to let the data traffic comes in.
You have learned about the various technical controls that ensure security like:

• Firewall
• Antivirus software
• Network security scanners etc

From the figure, it is clear that the network firewall do not protect a web application they are only designed for network level security. It blocks unwanted traffic and activity and allow legitimate traffic in.
Antivirus software detects system level issues, not the browser.
Whereas, network security scanners are a good choice to secure network services. But they do not launch any security checks to check the vulnerabilities in web applications.

Hackers can easily hack web application firewalls as they won't fix security holes in web applications and are not immune to attacks. Common attacks are:
1) Cross site scripting (XSS)
2) Cross site request forgery (CSRF)
3) SQL injection (SQL)
4) Buffer overflow etc

Question:
What are the challenges faced by WAFs (Web Application Firewalls) in order to secure the web applications? Write only five challenges. [ 10 marks]

Note: Write only precise answer and avoid giving extra details.
Firewall
Database server
Web application server
Hacker
Internet

Tuesday, January 18, 2011

Mgt401 GDB No. 2 Announced

"Financial Accounting II (MGT401)"

This is to inform that your 2nd Graded Discussion Board (GDB) covering Lecture # 1 to Lecture # 34 Times New Roman]will be opened according to the following schedule

GDB Schedule

Opening Date and Time: 17th Jan, 2011 At 12:01 A.M. (Mid-Night)
Closing Date and Time: 19th Jan, 2011 At 11:59 P.M. (Mid-Night)
Topic/Area for Discussionn
"Memorandum of Association (MOA)"

Note:The discussion question will be from the area/topic mentioned above. So start learning about the topic now.
....................

Scenario

A loan provided company limited by shares named "ABC (private) Ltd." was established on 15th March, 2001, with registered office situated in Lahore under section 16 of Companies Ordinance 1984. At the time of establishment, a memorandum of association (MOA) was signed with mutual consent of promoters in which the objectives of the company was to provide all kind of loan facilities (i.e. car loans, home loans, short & long term business loans etc. ) at competitive market interest rates to both of its corporate and household clients. After a half decade, the company conducted a customer survey about financial services. They realized that the most of customers to whom they are providing services currently, also want vault services for their important documents and precious goods.

After analyzing the results of survey, ABC (Pvt.) Ltd. started to provide vault services for their clients which were not the true reflection of the objectives of company enlisted in MOA at the time of establishment.

Required:

Identify what kind of violation the company had made according to Companies Ordinance 1984. Your answer must be confined in two to three lines.
...........