Spring 2012
Master of
Business Administration- MBA Semester III
MI0024 –
Software Engineering -2 Credits
Assignment Set- 1 (30 Marks)
Note: Each Question carries
10 marks.
1. What is software? What are the applications of
software?
2. Explain
decomposition techniques
3. a. Write a
short note an project scheduling & tracking
b. How do you
define a task set for the software project?
Spring 2012
Master of
Business Administration- MBA Semester III
MI0024 –
Software Engineering -2 Credits
Assignment Set- 1 (30 Marks)
Note: Each Question carries
10 marks.
1. a. Write a
short note on software reliability
b. What are
the guideline recorded for formal technical revive in review report
2. Explain SCM
process & SCM standards
3. Explain
analysis concepts & principles in brief
Feb / Spring 2012
Master of
Business Administration- MBA Semester III
MI0025 –
Database Management System -2 Credits
(Book ID
:B1016)
Assignment Set- 1 (30 Marks)
Note: Each question carries
10 Marks. Answer all the questions.
Q1. a. Explain the various procedure
carried on in a DBMS for a student database in which the fields are student id,
student name, student class, marks
b. Write the
difference between traditional file systems Vs modern database environment
Q2
a. Explain the
following:
i. Physical data independence Vs
logical data independence
ii. DDL Vs DML
b. Explain
criterion for Database classifical
Q3. Draw an E.R diagram a school database
which should describe the following
v Weal
entity
v Identifying
relationship
v Composite
attribute
v Derined
attribute
Write an
entire diagram which explains the whole database.
Feb / Spring 2012
Master of
Business Administration- MBA Semester 3
MI0025 –
Database Management System -2 Credits
(Book ID
:B1016)
Assignment Set- 2 (30 Marks)
Note: Each question carries
10 Marks. Answer all the questions.
Q1. Explain relationships with an example.
Also show degree of relationship for that example
Q2. Explain the different operations of
relational algebra with an example each
Q3. a. Write SQL query for the
following
i. To find the
student who scored more than ‘Rashmi’ in computer Science subject.
ii. List all
the students who belongs to class II
b. Define
locks. Write a binary lock function.
Spring 2012
Master of
Business Administration-MBA Semester IV
MI0026
Computer
Networks– 2 Credits
(Book ID:
B1041)
Assignment
Set- 1 (30 Marks)
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 write
the diagram of a LAN network of your organization connecting all the peripheral
devices. Also specify what kind of topology you use to connect your organization
to the internet and why. [10 Marks]
Q.2 Explain
the different modes of data transmission. [10 marks]
Q.3 Write
short notes on
a. CSMA/CD
b. Fast
Ethernet
c. IEEE
802.11 Frame structure
d. Routing
algorithms [10 Marks]
Spring 2012
Master of
Business Administration-MBA Semester IV
MI0026
Computer
Networks– 2 Credits
(Book ID:
B1041)
Assignment
Set- 2 (30 Marks)
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 Bring
out the differences between the different topologies. [10 Marks]
Q.2 Network security is an issue at firms of all sizes.
Even the best of information-technology (IT) departments constantly face new
challenges as they try to keep their firms' systems secure. The only completely
secure computer is one that is not connected to a network or the Internet - and
we all know that is not an option in today’s workplace. With that in mind, we
need to find ways to mitigate the threats of data loss both in transition and
on digital media.
Data encryption, one of the
best and most commonly used methods of determining data theft and hacking, is
transparent to the end user. Encryption is the act of adding a cipher or string
of characters to raw data (such as binary computer files), and in doing so,
creating "ciphertext," or encoded blocks of text. In effect,
encryption takes data that is easily viewable and "translates" it
into a coded language that is very difficult to read. The computer system has
to remove the cipher to convert it back to usable data by the end user.
Encryption is used primarily in three security scenarios: SSL Web encryption,
digital media encryption and email encryption.
SSL encryption
To most users, the padlock in
the corner of their Web browser that shows up on certain Web pages is an
indication that the information they are sending or retrieving over the
Internet is secure. Any site can be encrypted by simply purchasing and applying
a Secure Socket Layer (SSL) Certificate to the site. SSL encryption allows for
the transmission of sensitive data between people and sites, eliminating the
worry about whether that information is floating around the Internet in
plain-text format.
One of the rapidly growing uses
of SSL encryption in the accounting industry is securing Web portal access.
More and more companies are allowing employees to connect to their network
remotely and are implementing SSL Virtual Private Networks (VPN), which require
individual passwords to trigger decryption of the information to secure the traffic.
Additionally, clients are logging into the network via portals to extranets
holding their secure data.
Spring 2012
This is what a complete SSL
transaction involves:
* An end user requests access
to a secure page via a Web browser, usually https:// and over port 443. Port
443 was defined by Netscape as the standard port number for secure
communications via the Web and is still used as the secure port today.
* The contacted server
transmits its public key with its certificate. The browser verifies that the
certificate was issued by a trusted party, that the certificate is valid and
that the certificate is affiliated with the site contacted.
* The browser then uses the public
key to encrypt a random symmetric encryption key and sends it to the server
with the encrypted URL required, as well as other encrypted http data.
* The Web server decrypts the
symmetric encryption key using its private key and uses the symmetric key to
decrypt the URL and http data.
* The Web server sends back the
requested Web document and http data encrypted with the symmetric key.
* The Internet browser decrypts
the data and Web page using the symmetric key and displays the information.
Here's a diagram of how that
description works for a CPA firm client:
Encrypted digital media
Traditionally, accounting firms
went to great lengths to secure client data in their office and in off-site
storage, but little attention was paid to the data traveling with the auditors
on a daily basis. That, coupled with the increased popularity of telecommuting,
has increased the necessity of encrypting digital media such as hard drives,
flash digital media drives, PDAs and smart phones to insure the security of your
firm's data. Both hardware and software manufacturers have identified the need
for such encryption, and many are including such solutions in their products.
The initial push for digital
media encryption began with the need to secure hard drives. Several technology
platforms emerged, leading to a debate between whole-disk encryption versus
encryption vaults, which finally lead to the realization that both should be
used in conjunction for optimal results. The approach of whole-disk encryption
is that the hard drive is useless without the encryption password once the
computer is shut down. The encrypted-vault model was especially useful on
computers with shared access, as each user has their own encrypted space that
cannot be accessed by other users. Each user can encrypt a folder on the
computer that no one else even realizes is there. Whole-disk encryption is the
most prevalent technology, but in many scenarios, both encryption techniques
are used together for maximum security.
This is how encrypted digital
media works in our everyday environment: Look around your desk, in your pockets
or purse. You'll probably find a USB flash drive. USBs are extremely portable,
easy to use, readily available, inexpensive and can hold large
Spring 2012
amounts of data. The same
characteristics that make these drives so popular are exacdy why they are such
a security threat. Browse the Internet, and you will find a significant number
of instances where lost drives have caused companies to lose critical and
confidential data. The chances are good that encrypted USBs, which are readily
available but more costly, can prevent such losses.
Many PDAs and smart phones can
be encrypted as well. Generally, the entire device is not encrypted; instead,
the storage digital media card is protected (similar to the encryption vault
model). Even though most devices have remote wipe capabilities that remove all
data and return the phone to factory defaults, if the phone or PDA is lost and
the person who finds it does not connect to the Web, the data could be
compromised. Current versions of Microsoft Exchange have included the ability
to encrypt the PIM. VOL (which is the information storage on a Wondows Mobile
phone) on Windows Mobile phones, which includes e-mail and calendars, temp
folders and the user's document folders. Additionally there are third-party
solutions that accomplish the same security, but will work across multiple
phone platforms, such as GaurdianEdge SmartPhone Protection which protects
iPhone, Palm and Windows Mobile phones.
The scalability of the
encryption products on the market are extremely varied, as some are targeting
an individual device while others are delivered and managed through network
policies.
Encrypted e-mail
As e-mail continues to grow and
gain vitality in corporations' communication systems, so has the need to
protect this information in transit from company to company. This is currently
the least-used area of encryption and has met with some resistance since it is
often difficult to implement and use. Companies are using encrypted e-mail and
secure file transfer technologies to protect communications between their
employees and clients, but more importantly are protecting sensitive content in
the e-mails. Clients of CPA firms have a reasonable expectation that any
financial or personal information (such as Social Security Numbers, bank
account information, pay stubs, etc.) sent via e-mail is encrypted, and
legislation is quickly catching up to the technology (see ,e.g., Personal Data
Privacy and Security Act of 2005 and Gramm-LeachBiley Act).
Currently, several different
methods are used to encrypt e-mails:
* Endpoint to Endpoint: This
means that the e-mail is encrypted from when it is sent until it is received.
This method is the most secure, but also the hardest to implement and manage.
* Gateway to Endpoint: In this
model, there is a server or appliance at the edge of the sender's network that
encrypts the e-mail as it leaves the company. This Sender may not even be aware
that the e-mail is encrypted as it requires no extra action, the only extra
work is on the recipient.
* Gateway to Gateway: This
model is ideal as there is no extra work for the sender or recipient, but to
accomplish this model, you have to implement the compatible
Spring 2012
solution on both sides, which
in many cases is not possible, especially in a client-service model.
* Gateway to Web: This model is
probably the most popular model, as it creates an e-mail as composed and a file
is attached to it. The file is stripped off and stored on a server in an
encrypted vault. The recipient receives the e-mail, which now contains a URL
pointing to the file on the secure server. After an authentication process, the
person outside the company can download the file. Typically with this method
the file is only saved on the secure server for a short period of time, and the
file has to be resent if the email is not retrieved within that time. This
solution also solves size limitation issues on e-mails as the e-mail systems do
not see the secured file as an attachment.
a. What are the other methods of determining data
theft and hacking?
b. How does encryption helps us in determining hacking?
c. What is secure socket layer?
d. What is public key? What is an encrypted Email?
e. What are the different standards for Email security
system?
[10 Marks]
Q.3 Write
short notes on
a. MIME with an example
b. CMS with an
example [10 Marks]
Feb / Spring 2012
Master of Business
Administration-MBA Semester III
MI0027- Business
Intelligence and tools – 2 Credits
Assignment Set- 1 (30
Marks)
1.
(i) What do you understand by Business Intelligence System? What are the
different steps in order to deliver the Business Value through a BI System?
(ii) List the characteristics of a
Data warehouse and analyze how the development of a Data warehouse helps you in
managing various functions in your organizations.
2.
What do you understand by Data warehouse Meta Data? What is the use of
Metadata? How can you manage Metadata?
3.
What do you understand by EIS? What are the significances of EIS? Briefly
describe the benefits of EIS.
Feb / Spring 2012
Master of Business
Administration-MBA Semester III
MI0027-Business
Intelligence and tools – 2 Credits
Assignment Set- 2 (30
Marks)
Each question carries
10 marks
1.
Describe Data Quality Types and discuss the concepts of TQDM.
2.
Explain the Visual Warehouse in detail.
3.
What do you understand by OLAP? What are the guidelines for an OLAP system?
Briefly discuss the concept of Data Mining.
Spring
2012
Master of Business Administration - MBA Semester III
OM0001
– Operations Management - 2 Credits
(Book
ID: B1073)
Assignment
- Set- 1 (30 Marks)
Note:
Each Question carries 10 marks. Answer all the questions.
1.
Do most of the principles, tools and techniques of Operations Management apply
to both manufacturing and service sectors? Justify with examples.
2.
Time taken by three machines on five jobs in a factory is tabulated below in
table below. Find out the optimal sequence to be followed to minimise the idle
time taken by the jobs on the machines.
Job
|
Machine
1 (M1)
|
Machine
2 (M2)
|
Machine
3 (M3)
|
A
|
6
|
8
|
7
|
B
|
4
|
5
|
3
|
C
|
5
|
5
|
7
|
D
|
3
|
4
|
6
|
E
|
4
|
3
|
4
|
3. Explain the method of work study and method
study in the form of a flow chart. Differentiate between work study and method
study.
Spring
2012
Master of Business Administration - MBA Semester III
OM0001
– Operations Management - 2 Credits
(Book
ID: B1073)
Assignment
- Set- 2 (30 Marks)
Note:
Each Question carries 10 marks. Answer all the questions.
1.
One of the serious drawbacks of Indian manufacturing organisations compared to
their counterparts in Japan and Korea was the ‘predominant’ domestic focus in
their approach to business. Elucidate. Site an example.
2.
List the assumptions on which Break Even Analysis is based. Explain breakeven
point with a sketch.
3.
Define Statistical Quality Control and explain the various methods associated
with it.
Spring
2012
Master of Business Administration - MBA Semester III
OM0002
– Enterprise Resource Planning - 2 Credits
(Book
ID: B1069)
Assignment
- Set- 1 (30 Marks)
Note:
Each Question carries 10 marks. Answer all the questions.
1.
How does ERP inventory module maintain inventory items? List out the different
modules under ERP Inventory management.
2.
Explain the three types of CRM. Briefly explain the functionalities of CRM sub
modules.
3.
Describe how you would go about the different phases of the ERP implementation
lifecycle, if it were being done in your company.
Master of Business Administration - MBA Semester III
OM0002
– Enterprise Resource Planning - 2 Credits
(Book
ID: B1069)
Assignment
- Set- 2 (30 Marks)
Note:
Each Question carries 10 marks. Answer all the questions.
1.
Explain the ERP selection process. List out the ERP tools and their respective
vendors available in the market.
2.
On what basis manufacturing operations are classified. Explain the different
categories.
3.
Write short notes on seven major ERP vendors—SAPAG, Baan, PeopleSoft, JD
Edwards, Oracle, QAD and SSA.
Feb
/ Spring 2012
Master of Business Administration - MBA Semester III
OM0003
– Supply Chain Management - 2 Credits
(Book
ID: B1074)
Assignment
- Set- 1 (30 Marks)
Note:
Each Question carries 10 marks. Answer all the questions.
1.
Tabulate the events of Supply Chain Management evolution according to
chronological dates starting from Ancient times to 2000 AD.
2.
“The utility of forecasts can be enhanced through collaborative forecasting
among supply chain partners.” Explain?
3.
Write short notes on the following w.r.t Supply Chain Management.
a) Bar Code
b) Radio Frequency Identification
c) Electronic Data Interchange
d) Artificial Intelligence or Expert
System
Master of Business Administration - MBA Semester III
OM0003
– Supply Chain Management - 2 Credits
(Book
ID: B1074)
Assignment
- Set- 2 (30 Marks)
Note:
Each Question carries 10 marks. Answer all the questions.
1.
Taking an example of any product, explain the 12 steps involved in procurement
process.
2.
Explain the different types of product returns. Briefly explain the impact of
Reverse Supply Chain Management on profitability.
3. List out six major computer based information
systems and explain each of them briefly with examples.
Spring 2012 (February 2012)
Master of Business
Administration- MBA Semester 3
MK0001 – Sales Distribution And
Supply Chain Management
(2 credits)
(Book ID: B1220)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
Describe the role of distribution channel. List the factors in the selection of
distribution channel.
2.
Compare and contrast the various types of sales organization structures.
3.
Describe the term “physical distribution management”. Discuss various
components of physical distribution management.
Spring 2012 (February 2012)
Master of Business
Administration- MBA Semester 3
MK0001 – Sales Distribution And
Supply Chain Management
(2 credits)
(Book ID: B1220)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
What is brand sponsorship? Explain how organizations maintain their sponsorship
positions
2.
Explain the different factors affecting cost of a warehouse. List the various
types of warehouses and their uses
3.
List the various modes of transportation available in India. List the
advantages and disadvantages.
Spring 2012 (February 2012)
Master of Business
Administration- MBA Semester 3
MK0002 – Consumer Behaviour
(2 credits)
(Book ID: B1221)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
Why is it important to consider the behaviour of consumers while deciding on
the marketing mix of the company? Elaborate with suitable examples.
2.
List the different roles that a consumer plays while making a purchase
decision.
3.
Distinguish between differentiated, undifferentiated and concentrated
marketing. Explain the concept with the help of suitable examples.
Spring 2012 (February 2012)
Master of Business
Administration- MBA Semester 3 MK0002 – Consumer Behaviour
(2 credits)
(Book ID: B1221)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
List the important factors that influence consumer perceptions
2.
List the differences between absolute threshold and differential threshold.
Discuss the implications of Weber’s Law.
3.
Recommend any three marketing situations where the principle of grouping can be
used with advantage.
Spring 2012 (February 2012)
Master of Business
Administration- MBA Semester 3 MK0003 – Retail Marketing
(2 credits)
(Book ID: B1222)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
List the different stages involved in retail environment analysis.
2.
Briefly explain GAP model of service quality
3.
Explain the various types of retail store locations. List their pros and cons
Spring 2012 (February 2012)
Master of Business
Administration- MBA Semester 3 MK0003 – Retail Marketing
(2 credits)
(Book ID: B1222)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
Define the term positioning. Discuss various positioning approaches
2.
Write a short note on- psychographic segmentation.
3.
Briefly
describe the criteria for effective segmentation.
Spring 2012 (February 2012)
Master of Business
Administration- MBA Semester 3 MK0004 – Market Research
(2 credits)
(Book ID: B1223)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
Explain the problems associated with marketing research.
2.
Explain the role of Marketing research in “decision-making” process
3.
Describe consumer research process in detail.
Spring 2012 (February 2012)
Master of Business Administration-
MBA Semester 3
MK0004 – Market Research
(2 credits)
(Book ID: B1223)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
Describe the relation between research design and marketing decision process
2.
List the factors that affect cost of a warehouse. Describe the various types of
warehouses and their uses
3.
Explain research process . Differentiate between Causal and Experimental
design.
Feb / Spring 2012
Master of Business Administration
- MBA Semester 3
“Total Quality Management”
Specialization
QM0001 – Foundations of Quality
Management
(2 credits)
(Book ID: B1079)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
Differentiate between appraisal cost and prevention cost.
2.
Explain the concept of company-wide quality.
3.
Write short notes on the following:
a. Classical theory model of organization
b. Human relations theory
Feb / Spring 2012
Master of Business
Administration - MBA Semester 3
“Total Quality Management”
Specialization
QM0001 – Foundations of Quality
Management
(2 credits)
(Book ID: B1079)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
Describe the importance of customer satisfaction.
2.
Explain the business perspective and process flow perspective of Quality.
3.
What are the barriers to Quality?
Feb / Spring 2012
Master of Business
Administration - MBA Semester 3
“Total Quality Management”
Specialization
QM0002 – Principles and
Philosophies of Quality Management
(2 credits)
(Book ID: B1080)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
Explain the concept of PDCA Cycle.
2.
Describe Philip Crosby’s contribution to Quality Management.
3.
What is meant by Cost of Quality? Differentiate between Internal failure costs
and external failure costs.
Feb / Spring 2012
Master of Business Administration
- MBA Semester 3
“Total Quality Management”
Specialization
QM0002 – Principles and
Philosophies of Quality Management
(2 credits)
(Book ID: B1080)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
Write short notes on the following:
a. ‘5S’ principles
b. Poka Yoke
2.
What is meant Quality Circle? What are its objectives and characteristics?
3.
Describe the contribution of Genichi Taguchi towards Quality improvement. What
is “design of experiment”? What are its features?
Feb / Spring 2012
Master of Business
Administration - MBA Semester 3
“Total Quality Management”
Specialization
QM0003 – Statistical Process
Control and Process Capability
(2 credits)
(Book ID: B1071)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
What is meant by process capability? How do you calculate ‘Cp’ index?
2.
Write a brief note on Six Sigma.
3.
In a capability study of a lathe used in turning a shaft to a diameter of 23.75
± 0.1 mm a sample of 6 consecutive pieces was taken each day for 8 days. The
diameters of these shafts are as given below:
1st day
|
2nd day
|
3rd day
|
4th day
|
5th day
|
6th day
|
7th day
|
8th day
|
23.77
|
23.80
|
23.77
|
23.79
|
23.75
|
23.78
|
23.76
|
23.76
|
23.80
|
23.78
|
23.78
|
23.76
|
23.78
|
23.76
|
23.78
|
23.79
|
23.78
|
23.76
|
23.77
|
23.79
|
23.78
|
23.73
|
23.75
|
23.77
|
23.73
|
23.70
|
23.77
|
23.74
|
23.77
|
23.76
|
23.76
|
23.72
|
23.76
|
23.81
|
23.80
|
23.82
|
23.76
|
23.74
|
23.81
|
23.78
|
23.75
|
23.77
|
23.74
|
23.76
|
23.79
|
23.78
|
23.80
|
23.78
|
Construct the “” and “R”
charts. X
Feb / Spring 2012
Master of Business
Administration - MBA Semester 3
“Total Quality Management”
Specialization
QM0003 – Statistical Process
Control and Process Capability
(2 credits)
(Book ID: B1071)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
Write short notes on the technique of Stem-and-Leaf plot.
2.
Explain the different quality indices for acceptance sampling plans
3.
Write a brief note on Experimental Design.
Feb / Spring 2012
Master of Business
Administration - MBA Semester 3
“Total Quality Management”
Specialization
QM0004 – Quality Management
Tools
(2 credits)
(Book ID: B1081)
ASSIGNMENT- Set 1
Marks 30
Note: Each Question carries 10 marks. Answer all the questions.
1.
What is reliability? Explain the methods of achieving reliability.
2.
What are the uses of Quality Information System?
3.
What are the objectives and features of Quality Function Deployment (QFD)?
Feb / Spring 2012
Master of Business
Administration - MBA Semester 3
“Total Quality Management”
Specialization
QM0004 – Quality Management
Tools
(2 credits)
(Book ID: B1081)
ASSIGNMENT- Set 2
Marks 30
Note: Each Question carries 10 marks
1.
Explain the concept of FMEA.
2.
Describe “Cause and Effect Diagram” with example.
3.
Write short notes on the following:
a. Control charts
b. The seven new SQC tools
Feb / Spring 2012
Master of Business
Administration – MBA Semester 3
ML0001 – Warehousing
and Supply Chain Management - 2 Credits
Assignment
Set – 1
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 How will good supply chain practices
help in retail? Justify your answer. [10 marks]
Q.2 Discuss the RFID technology and its
applicability in retail. [10 marks]
Q.3 What is CPG and demand forecast
response? [10 marks]
Feb / Spring 2012
Master of Business
Administration-MBA Semester 3
ML0001 –
Warehousing and Supply Chain Management - 2 Credits
Assignment
Set – 2
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 Explain some of the SAP best
practices for retail. [10 marks]
Q.2 Explain the following systems:
Project portfolio management, Business process management, compliance
management, business intelligences. [10 marks]
Q.3 Explain and evaluate POS systems. [10
marks]
Feb / Spring 2012
Master of Business
Administration – MBA Semester 3
ML0002 –
Buying and Merchandising - 2 Credit
Assignment
Set – 1
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 Explain
the various buying techniques. [10 marks]
Q.2
Distinguish:
a) Installment
purchase and loan method of purchasing
b) Asset sales
and entity sales [10 marks]
Q.3 Explain
merchandise concepts, technologies and systems. [10 marks]
Feb / Spring 2012
Master of Business
Administration-MBA Semester 3
ML0002 –
Buying and Merchandising - 2 Credits
Assignment
Set – 2
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 How is
product lines developed and presented in retail with relevance to buying and
merchandising? [10 marks]
Q.2 Discuss
the various buying concepts. [10 marks]
Q.3 Identify
the CRM prospects and problems involved in the context of retail environment. [10
marks]
Feb / Spring 2012
Master of Business
Administration – MBA Semester 3
ML0003
–Store Operations- 2 Credit
Assignment
Set – 1
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 Discuss
the retail pricing objectives and elements of retail pricing. [10 marks]
Q.2 Discuss
the structure organisation and layout of stores pertaining to design, spaces,
objectives and steps concerned. [10 marks]
Q.3 Mention
the different classifications of stores and different stages involved in retail
planning. [10 marks]
Feb / Spring 2012
Master of Business
Administration-MBA Semester 3
ML0003 –
Store Operations - 2 Credits
Assignment
Set – 2
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1. How to
create customer profile for stores market segmentation? Give examples. [10
marks]
Q.2 What are
the legal procedures for customer handling? [10 marks]
Q.3 Analyse
how relationship marketing has evolved and its applicability in retail. [10
marks]
Feb / Spring 2012
Master of Business
Administration – MBA Semester 3
ML0004 –
Retail IT Management - 2 Credits
Assignment
Set – 1
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 a) Give
short notes on RFID. [5 marks]
b) Give
reasons why IT is required in retail. [5 marks]
Q.2 Elaborate
as to how an e-fulfillment takes place. [10 marks]
Q.3 Discuss the
role of ERP in retail businesses. [10 marks]
Feb / Spring 2012
Master of Business
Administration-MBA Semester 3
ML0004 –
Retail IT Management - 2 Credits
Assignment
Set – 2
30 Marks
Note: Each
question carries 10 Marks. Answer all the questions.
Q.1 Present a
note on POS. [10 marks]
Q.2 Explain
the role of IT systems in retail. [10 marks]
Q.3 Discuss
the SAP best practices in retail. [10 marks]
No comments:
Post a Comment