ASSIGNMENT
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE &
NAME
MI0033- SOFTWARE ENGINEERING
BK ID B1483
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 Waterfall Model, V-Model and Spiral Model are of the software development processes.
Companies are using these models to have a systematic and defined approach in software
development. Which of the four phases are involved in the software development process?
A listing the 4 types 4
10
explaining the types 4
examples 2
2 Software estimation is the first phase of project planning and it is the process of judging a
software product and solving the problem associated with the software project. We follow
some important steps to achieve reliable cost and effort estimates. Explain the different
estimation models and estimation techniques.
A a. Explaining different estimation models 6
10 b. Explaining estimation techniques 4
3 a. You are a SCM manager in a software company. How will you establish a software
configuration management process in a company?
b. You are appointed as a software developer in a software company and you have been asked
by your project manager to check details of the bugs from the previous version. How will you
gather details associated with the various bugs in the previous version?
A a. Definition and explaining 4 procedures in
software configuration management process
5
10
b. definition and explaining typical work cycle 5
4 a. If you are a software engineer you must be expert in the field of software, hardware
and also database. It has been listed by the industry professionals that time and effort are the
most important factors in the system analysis stage. Briefly explain the steps used in in system
analysis.
b. If you are a software developer in small company, how will you conduct a
specification review?
A a. Listing the steps and its Explanation 5 10
b. Explanation of specification review 5
5 Write short note on
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
A a. Unit testing 3 10
b. System testing 3
c. Debugging 2
d. Verification and validation 2
6 What are the different methods of software prototypes and tools?
A definition of software prototype 1
10
3 types of techniques 3
Explaining tools 4
Benefits of software prototype 2
*A-Answer
ASSIGNMENT
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE &
NAME
MI0034- DATABASE MANAGEMENT SYSTEMS
BK ID B1217
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 Suppose the employee name, employee id, designation, salary, attendance and address of
any employee has to be stored in a database. You can store these data in a sequential
address book or it can be stored on a hard disk, using a computer and software like
Microsoft Excel. Using this example define a database. List and explain the various
procedures carried on in a DBMS with a detailed example of the database.
A defining a database 1
10
Listing the 3 procedures 3
Explanation 3
One examples for each of them 3
2 Level 2 cache has got higher latency than Level 1 by 2 times to 10 times in 512 KiB
or more. Its value is nearer to kilobyte. This is one of the levels of memory
hierarchy. Define memory hierarchy. What are the other levels in memory
hierarchy? Explain in one life each for each of them.
A defining memory hierarchy 1
10
listing the 6 levels 3
explanation 6
3 EMPLOYEE
EMP_ID NAME PROJECT SALARY DEPT_NUM
MUL1 Raashi PR2 30000 1
MUL2 Taashi PR1 43000 2
SMU1 Raksha PR3 25000 3
SMU2 Vidhesh PR2 50000 2
SMU3 Akhilesh PR1 83000 2
DEPARTMENT
DEPT_ID DNAME PLACE
1 HRM Bangalore
2 MIS Bangalore
3 Research Chennai
4 Finance Bangalore
Using these tables answer the following question
a. If we want to see all the employees with salary between 40000 and 50000, which
query can be used?
b. Select employee name from EMPLOYEE table, whose name starts with R
c. Explain aggregate functions and grouping in detail
A a. Query based in BETWEEN operator 2
10
b. Query based in LIKE condition 3
c. Explaining aggregate functions on select
statement, with an example, showing the
output of the query, explaining having
clause, with example
5
4 Consider a book is written by a particular author. And you have to explain to
someone about the relationship that exists between the author and the book.
Normally you can draw a diagram and show the relation. These diagrams are called
entity-relationship diagram in which book is one entity, author is one entity, and the
relationship that exists between the two entities is written. Likewise explain the
various notations used to represent the ER diagram.
A listing the notations with diagrams 5
10
explaining each one of them in one line with
example each
5
5 Consider any database of your choice (may be simple banking database/forecasting
database/project management database). Show the deduction of the tables in your database
to the different types of normal forms
A Choosing a proper database 2
10 Explaining the 5 normal forms with respect to the
database chosen
8
6 Read the following case study thoroughly and answer the following questions:
Laxmi bank is one of the largest private sector banks of India. It has an extensive network
of more than 200 branches. It offers banking services to retail as well as corporate clients.
The bank faced a challenge in integrating multi-pronged database management system into
a centralized system. The IT department of the bank also realized that the computing
capabilities of its PCs and servers were not proportionately distributed among all its
branches. Each branch had its database management system stored in a traditional way on
the disk. The total cost of operating and maintaining the current IT infrastructure was very
high and the fundamental shortcomings added to the costs. Moreover, there were also
recurrent problems due to the malfunctioning of the currently operational database
management system. Therefore, the bank’s top management decided to fix the problem and
operationalise a robust database management system. The bank hired an external database
technology consulting firm called AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail
banking vertical and the corporate banking vertical. All the individual database servers from
the individual branches were removed. The entire database system was made v irtual such
that the managers and the staff can access only the required information (related to retail
banking or corporate banking) from the respective centralised data centers. There were only
two such centralised data centers (one for retail banking and another for corporate
banking) that were managed centrally. Staff and managers could access the information
through their PCs and laptops. Centralised database management system complemented the
security system by bringing in authentication through a unified ID management server.
Managers and officers of the bank were able to process half a million transactions per
month in real time after the new implementation. There were significant savings in the cost
and also in the consumption of power. Now there were no problems with regard to
imbalances in the load across various network servers. Due to centralised data management,
top management could keep an eye on the functioning of various branches. Hence the cases
of fraud and cheating reduced considerably. The bank managers could also process the loan
applications in reduced time since the customer’s previous records could be accessed at the
click of the button and approval from the higher authorities could be obtained in real time.
Moreover the new system also brought in many applications that helped local managers in
the decision making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its centralised database
system to a distributed database system in future?
A a. Listing the uses from the from the case
study
2
10
b. Explaining about data fragmentation,
replication and allocation techniques
6
Is it possible to replicate the centralised
database management model of the bank
in a manufacturing concern? Give reasons.
2
*A-Answer
ASSIGNMENT
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME MI0035- COMPUTER NETWORKS
BK ID B1481
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN 2
10 b. Analog and digital data transmission 3
c. High level data link control 5
2 Videoconferencing is used to conduct meetings with the people who are located in
far distance. Videoconferencing is an example of which type of computer
networks? Explain in detail the different types of networks with example.
A identifying the correct type 2
10
list the different types of networks 2
explaining the types 6
3 A protocol helps in establishing the communication between two systems.
Protocols are mainly divided into asynchronous and synchronous protocols. List
and describe in detail the different types of protocols that are classified under the
two main protocols.
A list and correct differentiating of protocols
under the two main types
5 10
explanation 5
4 Integrated Services for Digital Network (ISDN) is a set of communication standards for
simultaneous digital transmission of voice, video, data, and other network services over
the traditional circuits of the public switched telephone network. It was first defined in
1988 in the CCITT red book. Explain the different types of ISDN with their features and
advantages for each one of them.
A Explaining Two different types 2
10 Features of both of them 4
Advantages of both of them 4
5 ABC company is an internet service provider. The main goal of ABC is to provide 24
X7X365 storage capacity, storage management and internet service to the customers. It
now needs a solution that will eliminate downtime. Downtime is nothing but the time
during which a computer or computer system is down, or inoperative due to hardware or
software failure. We also need the flexibility in quick response to both the development in
customer base and additional capacity and service demands of the customers.
ABC company took the help of network storage infrastructure software provider to achieve
their goals by providing support for end to end redundancy and bondless scalability.
By creating a scalable storage network with the ability to confidentially deliver the
24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the
ISP/SSP to attract and retain customers and substantially build its business. As the same
time, the solution has effectively lowered ABC company’s total cost of ownership for its
entire storage solution: the IP Stor/CNP union has enabled a painless, flexible cost
effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its
customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting
network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by
ABC company after reading the SLM
2 10
b. Listing the benefits 3
c. Listing the different classes of ISP
and their applications
5
6 How are the different topologies of computer networks arranged? Explain the
working of each of them.
A listing the different topologies with
examples
2 10
explanation 4
diagrams 4
*A-Answer
ASSIGNMENT
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME MI0036- BUSINESS INTELLIGENCE TOOLS
BK ID B1219
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 a. Emergency Medical Association (EMA) is a group of 250 board- certified
emergency physicians. They are responsible for effectively managing the emergency
departments. List out what BI values and applications they should be implementing
b. Most of the credit card companies permit a consumer to get approval for specified
amounts via mobile to ensure that the purchase is covered. This type of consumer support
which retains a customer to the bank for a longer time is real time business intelligence.
Define real time Business intelligence and the various steps involved in the process.
A a. Listing and explaining the reason behind it 5
10
b. Defining 2
List and explain the process 3
2 Today businesses largely rely on the information available and can be
communicated through various sources, both internally and externally with the
help of internet. Explain the role of Business Intelligence in modern business.
What are the three different types of decision that most business organisations
take.
A Explanation 5 10
Different types of decision 5
3 Data extraction is the act or the process of extracting data out of data sources for added
data processing or data storage or data migration. This data can be extracted from the web.
Explain the different techniques for data extraction
A Listing the various techniques 2
10 Explaining the four methods 8
4 Business Intelligence strategy summarizes the finest combination of procedures and
technologies to meet the business intelligence strategies of an organization.
a. List the main aspects of BI strategy.
b. What are the steps to be followed to implement BI framework?
A a. Listing atleast 6 main aspects of BI strategy 3 10
b. Steps for Implementing BI framework 7
5 Write short note on
a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
A a. Content Management System 2 10
b. End User Segmentation 3
c. Basic Reporting and querying 2
d. OLAP 3
6 According to a recent IDC report, knowledge management is in a state of high
growth, especially among the business and legal services industries. As the
performance metrics of early adopters are documenting the substantial benefits of
knowledge management, more organizations are recognizing the value of
leveraging organizational knowledge. Define Knowledge Management. Explain
the various characteristics of Knowledge management. What are knowledge
assets?
A definition 2 10
Characteristics 6
Definition of knowledge assets 1
Example 1
*A-Answer
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE &
NAME
MI0033- SOFTWARE ENGINEERING
BK ID B1483
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 Waterfall Model, V-Model and Spiral Model are of the software development processes.
Companies are using these models to have a systematic and defined approach in software
development. Which of the four phases are involved in the software development process?
A listing the 4 types 4
10
explaining the types 4
examples 2
2 Software estimation is the first phase of project planning and it is the process of judging a
software product and solving the problem associated with the software project. We follow
some important steps to achieve reliable cost and effort estimates. Explain the different
estimation models and estimation techniques.
A a. Explaining different estimation models 6
10 b. Explaining estimation techniques 4
3 a. You are a SCM manager in a software company. How will you establish a software
configuration management process in a company?
b. You are appointed as a software developer in a software company and you have been asked
by your project manager to check details of the bugs from the previous version. How will you
gather details associated with the various bugs in the previous version?
A a. Definition and explaining 4 procedures in
software configuration management process
5
10
b. definition and explaining typical work cycle 5
4 a. If you are a software engineer you must be expert in the field of software, hardware
and also database. It has been listed by the industry professionals that time and effort are the
most important factors in the system analysis stage. Briefly explain the steps used in in system
analysis.
b. If you are a software developer in small company, how will you conduct a
specification review?
A a. Listing the steps and its Explanation 5 10
b. Explanation of specification review 5
5 Write short note on
a. Unit testing
b. System testing
c. Debugging
d. Verification and validation
A a. Unit testing 3 10
b. System testing 3
c. Debugging 2
d. Verification and validation 2
6 What are the different methods of software prototypes and tools?
A definition of software prototype 1
10
3 types of techniques 3
Explaining tools 4
Benefits of software prototype 2
*A-Answer
ASSIGNMENT
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE &
NAME
MI0034- DATABASE MANAGEMENT SYSTEMS
BK ID B1217
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 Suppose the employee name, employee id, designation, salary, attendance and address of
any employee has to be stored in a database. You can store these data in a sequential
address book or it can be stored on a hard disk, using a computer and software like
Microsoft Excel. Using this example define a database. List and explain the various
procedures carried on in a DBMS with a detailed example of the database.
A defining a database 1
10
Listing the 3 procedures 3
Explanation 3
One examples for each of them 3
2 Level 2 cache has got higher latency than Level 1 by 2 times to 10 times in 512 KiB
or more. Its value is nearer to kilobyte. This is one of the levels of memory
hierarchy. Define memory hierarchy. What are the other levels in memory
hierarchy? Explain in one life each for each of them.
A defining memory hierarchy 1
10
listing the 6 levels 3
explanation 6
3 EMPLOYEE
EMP_ID NAME PROJECT SALARY DEPT_NUM
MUL1 Raashi PR2 30000 1
MUL2 Taashi PR1 43000 2
SMU1 Raksha PR3 25000 3
SMU2 Vidhesh PR2 50000 2
SMU3 Akhilesh PR1 83000 2
DEPARTMENT
DEPT_ID DNAME PLACE
1 HRM Bangalore
2 MIS Bangalore
3 Research Chennai
4 Finance Bangalore
Using these tables answer the following question
a. If we want to see all the employees with salary between 40000 and 50000, which
query can be used?
b. Select employee name from EMPLOYEE table, whose name starts with R
c. Explain aggregate functions and grouping in detail
A a. Query based in BETWEEN operator 2
10
b. Query based in LIKE condition 3
c. Explaining aggregate functions on select
statement, with an example, showing the
output of the query, explaining having
clause, with example
5
4 Consider a book is written by a particular author. And you have to explain to
someone about the relationship that exists between the author and the book.
Normally you can draw a diagram and show the relation. These diagrams are called
entity-relationship diagram in which book is one entity, author is one entity, and the
relationship that exists between the two entities is written. Likewise explain the
various notations used to represent the ER diagram.
A listing the notations with diagrams 5
10
explaining each one of them in one line with
example each
5
5 Consider any database of your choice (may be simple banking database/forecasting
database/project management database). Show the deduction of the tables in your database
to the different types of normal forms
A Choosing a proper database 2
10 Explaining the 5 normal forms with respect to the
database chosen
8
6 Read the following case study thoroughly and answer the following questions:
Laxmi bank is one of the largest private sector banks of India. It has an extensive network
of more than 200 branches. It offers banking services to retail as well as corporate clients.
The bank faced a challenge in integrating multi-pronged database management system into
a centralized system. The IT department of the bank also realized that the computing
capabilities of its PCs and servers were not proportionately distributed among all its
branches. Each branch had its database management system stored in a traditional way on
the disk. The total cost of operating and maintaining the current IT infrastructure was very
high and the fundamental shortcomings added to the costs. Moreover, there were also
recurrent problems due to the malfunctioning of the currently operational database
management system. Therefore, the bank’s top management decided to fix the problem and
operationalise a robust database management system. The bank hired an external database
technology consulting firm called AKPY Info systems Limited.
AKPY divided the entire IT infrastructure of the bank around two verticals. The retail
banking vertical and the corporate banking vertical. All the individual database servers from
the individual branches were removed. The entire database system was made v irtual such
that the managers and the staff can access only the required information (related to retail
banking or corporate banking) from the respective centralised data centers. There were only
two such centralised data centers (one for retail banking and another for corporate
banking) that were managed centrally. Staff and managers could access the information
through their PCs and laptops. Centralised database management system complemented the
security system by bringing in authentication through a unified ID management server.
Managers and officers of the bank were able to process half a million transactions per
month in real time after the new implementation. There were significant savings in the cost
and also in the consumption of power. Now there were no problems with regard to
imbalances in the load across various network servers. Due to centralised data management,
top management could keep an eye on the functioning of various branches. Hence the cases
of fraud and cheating reduced considerably. The bank managers could also process the loan
applications in reduced time since the customer’s previous records could be accessed at the
click of the button and approval from the higher authorities could be obtained in real time.
Moreover the new system also brought in many applications that helped local managers in
the decision making process.
a. List the uses of centralized data management
b. What steps Laxmi bank need to take if it were to change its centralised database
system to a distributed database system in future?
A a. Listing the uses from the from the case
study
2
10
b. Explaining about data fragmentation,
replication and allocation techniques
6
Is it possible to replicate the centralised
database management model of the bank
in a manufacturing concern? Give reasons.
2
*A-Answer
ASSIGNMENT
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME MI0035- COMPUTER NETWORKS
BK ID B1481
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN 2
10 b. Analog and digital data transmission 3
c. High level data link control 5
2 Videoconferencing is used to conduct meetings with the people who are located in
far distance. Videoconferencing is an example of which type of computer
networks? Explain in detail the different types of networks with example.
A identifying the correct type 2
10
list the different types of networks 2
explaining the types 6
3 A protocol helps in establishing the communication between two systems.
Protocols are mainly divided into asynchronous and synchronous protocols. List
and describe in detail the different types of protocols that are classified under the
two main protocols.
A list and correct differentiating of protocols
under the two main types
5 10
explanation 5
4 Integrated Services for Digital Network (ISDN) is a set of communication standards for
simultaneous digital transmission of voice, video, data, and other network services over
the traditional circuits of the public switched telephone network. It was first defined in
1988 in the CCITT red book. Explain the different types of ISDN with their features and
advantages for each one of them.
A Explaining Two different types 2
10 Features of both of them 4
Advantages of both of them 4
5 ABC company is an internet service provider. The main goal of ABC is to provide 24
X7X365 storage capacity, storage management and internet service to the customers. It
now needs a solution that will eliminate downtime. Downtime is nothing but the time
during which a computer or computer system is down, or inoperative due to hardware or
software failure. We also need the flexibility in quick response to both the development in
customer base and additional capacity and service demands of the customers.
ABC company took the help of network storage infrastructure software provider to achieve
their goals by providing support for end to end redundancy and bondless scalability.
By creating a scalable storage network with the ability to confidentially deliver the
24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the
ISP/SSP to attract and retain customers and substantially build its business. As the same
time, the solution has effectively lowered ABC company’s total cost of ownership for its
entire storage solution: the IP Stor/CNP union has enabled a painless, flexible cost
effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its
customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting
network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by
ABC company after reading the SLM
2 10
b. Listing the benefits 3
c. Listing the different classes of ISP
and their applications
5
6 How are the different topologies of computer networks arranged? Explain the
working of each of them.
A listing the different topologies with
examples
2 10
explanation 4
diagrams 4
*A-Answer
ASSIGNMENT
DRIVE SUMMER DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME MI0036- BUSINESS INTELLIGENCE TOOLS
BK ID B1219
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 a. Emergency Medical Association (EMA) is a group of 250 board- certified
emergency physicians. They are responsible for effectively managing the emergency
departments. List out what BI values and applications they should be implementing
b. Most of the credit card companies permit a consumer to get approval for specified
amounts via mobile to ensure that the purchase is covered. This type of consumer support
which retains a customer to the bank for a longer time is real time business intelligence.
Define real time Business intelligence and the various steps involved in the process.
A a. Listing and explaining the reason behind it 5
10
b. Defining 2
List and explain the process 3
2 Today businesses largely rely on the information available and can be
communicated through various sources, both internally and externally with the
help of internet. Explain the role of Business Intelligence in modern business.
What are the three different types of decision that most business organisations
take.
A Explanation 5 10
Different types of decision 5
3 Data extraction is the act or the process of extracting data out of data sources for added
data processing or data storage or data migration. This data can be extracted from the web.
Explain the different techniques for data extraction
A Listing the various techniques 2
10 Explaining the four methods 8
4 Business Intelligence strategy summarizes the finest combination of procedures and
technologies to meet the business intelligence strategies of an organization.
a. List the main aspects of BI strategy.
b. What are the steps to be followed to implement BI framework?
A a. Listing atleast 6 main aspects of BI strategy 3 10
b. Steps for Implementing BI framework 7
5 Write short note on
a. Content Management System
b. End User Segmentation
c. Basic Reporting and querying
d. OLAP
A a. Content Management System 2 10
b. End User Segmentation 3
c. Basic Reporting and querying 2
d. OLAP 3
6 According to a recent IDC report, knowledge management is in a state of high
growth, especially among the business and legal services industries. As the
performance metrics of early adopters are documenting the substantial benefits of
knowledge management, more organizations are recognizing the value of
leveraging organizational knowledge. Define Knowledge Management. Explain
the various characteristics of Knowledge management. What are knowledge
assets?
A definition 2 10
Characteristics 6
Definition of knowledge assets 1
Example 1
*A-Answer
No comments:
Post a Comment