VUsolutions Transferred to AchiKhasi.com

From December 2011, this blog www.VUsolutions.blogspot.com is transferred to http://achikhasi.com/vu/ . So, you may visit http://achikhasi.com/vu/ for latest study related help.

Back to home VUsolutions

VUsolutions Fans Club [join us for MORE solutions]

VUsolutions on Facebook

CS507 Assignment # 6's Solution

Friday, June 19, 2009 Posted In Edit This

MUST CHANGE IT IN YOUR OWN WORD ___ AS EVERYONE (almost 8000 students) COPIED FROM THIS SITE


VU Help Desk..

www.vusolutions.blogspot.com

______________________________________________

Question # 1


Five major phases to control over the attacks on your online business as follows:


A secure system ensures the confidentiality of data. This means that it allows individuals to see only the data that they are supposed to see. Confidentiality has several different aspects:

  • Privacy of Communications
  • Secure Storage of Sensitive Data
  • Authenticated Users
  • Granular Access Control
  • Authentication Oracle Standard Edition,
  • Oracle Enterprise
  • Edition: Passwords,
  • Password management
  • Oracle Advanced Security:
  • Tokens, smart cards,
  • Kerberos and so on.
  • PKI: X.509 Certificates
  • Unauthorized access to data Limit access to data Access control Oracle Standard Edition
  • Oracle Enterprise Edition:
  • Virtual Private Database


User Responsible for using the system for legitimate purposes, protecting sensitive data to which she has access, and managing her passwords securely. Database Administrator Responsible for creating and administering database users, granting system and object privileges, and assigning local roles to users. Operating System Administrator Responsible for maintaining the underlying security of the operating system. Network Administrator Responsible for ensuring the security of data in transmission. Application Administrators Responsible for deploying applications in such a way as to ensure security. Trusted Application Administrator Responsible for creating and administering users of trusted applications, and their associated privileges. Enterprise Security Manager Responsible for maintaining the security of the directory and for implementing centralized enterprise user security.

Question # 2


WHAT IS ENCRYPTION?


Encryption is the process used to hide our data, or the contents of a message, from prying eyes throughout the internet. During transmission (such as through a secure socket layer), the data is disguised using codes so that no one along the chain of networks that the data passes though to get to its source can understand the information being sent. When the data arrives at its destination, it is decrypted to reveal the information being transmitted. Called encryption and the process of revealing the data from its encrypted form is called decryption. Both of these are common techniques used in cryptography - the scientific discipline behind secure connections. The processes are done using mathematical logic, or algorithms.

However, it is very difficult to keep the logic behind any given algorithm truly secret, so it's prudent to also rely on alternative forms on protection for your data. Algorithms will keep your information private from anyone not interested in exerting the effort to decode the data, but encryption won't always hide your personal information from a highly motivated hacker.

HOW ENCRYPTIONS WORKS?

Encryption is the conversion of data into a form, called a cipher text, which cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals. In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm that undoes the work of the encryption algorithm. Alternatively, a computer can be used in an attempt to break the cipher. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key. Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- the better, in general. However, as the strength of encryption/decryption increases, so does the cost. In recent years, a controversy has arisen over so-called strong encryption. This refers to ciphers that are essentially unbreakable without the decryption keys. While most companies and their customers view it as a means of keeping secrets and minimizing fraud, some governments view strong encryption as a potential vehicle by which terrorists might evade authorities. These governments, including that of the United States, want to set up a key-escrow arrangement. This means everyone who uses a cipher would be required to provide the government with a copy of the key. Decryption keys would be stored in a supposedly secure place, used only by authorities, and used only if backed up by a court order. Opponents of this scheme argue that criminals could hack into the key-escrow database and illegally obtain, steal, or alter the keys. Supporters claim that while this is a possibility, implementing the key escrow scheme would be better than doing nothing to prevent criminals from freely

Question # 3


Integrate Risk Management with WATER FALL MODEL:

Enterprise risk management deals with risks and opportunities affecting value creation or preservation, defined as follows: Enterprise risk management is a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.

The definition reflects certain fundamental concepts. Enterprise risk management is:

  1. Effected by people at every level of an organization
  2. Applied across the enterprise, at every level and unit, and includes taking an entity level portfolio view of risk
  3. Designed to identify potential events that, if they occur, will affect the entity and to manage risk within its risk appetite
  4. Able to provide reasonable assurance to an entity’s management and board of directors
  5. Geared to achievement of objectives in one or more separate but overlapping

Everyone in an entity has some responsibility for enterprise risk management. The chief executive officer is ultimately responsible and should assume ownership. Other managers support the entity’s risk management philosophy, promote compliance with its risk appetite, and manage risks within their spheres of responsibility consistent with risk tolerances. A risk officer, financial officer, internal auditor, and others usually have key support responsibilities.

MKT610 - Customer Relationship Management

Friday, June 19, 2009 Posted In Edit This
If the customer management strategy is poorly designed and implemented, how does Information Technology affect CRM practices? Does technology make things better or worse? Discuss.

_________________________________

The emergence of multiple channels for interacting and transacting with customers has been a boon for CRM vendors, service providers and consultants. Consider banking. When I was a little ‘un, banks operated out of branch networks which they owned. Not only that but they closed at 3.00pm to balance the books. I remember those days well because my old man was a banker and was always home for dinner. What do we have now? Bank-owned branches, mobile service providers, internet banking, telephone banking, kiosks, remote ATM’s, franchises… and so on. Technology innovations including e-commerce and m-commerce have changed the face on retail banking.

It’s the same in many other sectors. Retailers transact through physical stores, concessions and e-stores, and service customers through call centres, and self-service technologies. Channels that were intermediated became disintermediated are now trending towards reintermediation.

Channel innovation for selling, service and marketing purposes has made the task of customer experience managers more complex. Customer often interact with one channel when they are acquired, a different channel when they buy, and yet another channel when they require service. This is not a world that my dad was familiar with. It is massively more complicated in the demands made upon managers.

My question is this. How much difference has technology made, and how much more can technology contribute to the delivery of excellent multi-channel customer experience? The tech firms tells us that customers want and value a consistent, seamless customer experience. Customers don’t want to call a customer service agent in an outsourced call centre to find that there is no record of a transaction. They don’t want to receive an offer in the mail, and go to a distributor who is not aware of the offer and therefore cannot fulfill. The holy grail, the tech firms tell us, is a well-implemented, technology-supported, customer management strategy that delivers a 360 degree view of the customer and a 360 degree view for the customer. Where is the evidence? Is this what customers want?

Has technology improved customer experience? If so, how? You can argue that self-service online allows customers to maintain have 24/7 accessibility to service, and to maintain control over their data. But is that all?

Perhaps technology is only one part of the solution. If your customer management strategy is poorly designed, if implementation is poor, does technology make things any better or worse?

Mgt301 - Introduction to Marketing Solution

Friday, June 19, 2009 Posted In Edit This
  1. B
  2. B
  3. C
  4. C
  5. D
  6. D
  7. A
  8. B
  9. C
  10. D
  11. A
  12. B
  13. C
  14. D
  15. D

[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]

MKT501 - Marketing Management online Quiz

Friday, June 19, 2009 Posted In Edit This
Which of the following is NOT a purpose of a marketing plan?
Select correct option:
It specifies how resources are to be allocated
It co-ordinates marketing and production activities
It assigns responsibilities, tasks and timing
It assists in management control


Charging more for a soft drink in a vending machine than in a supermarket is known as:
Select correct option:
Cost-oriented pricing
Price differentiation
Penetration pricing
Price discrimination


Which of the following is NOT an advantage of penetration pricing?
Select correct option:
It creates high stock turnover
It encourages the entry of competitors
It creates valuable word of mouth
It creates goodwill


Which of the following is NOT a type of vertical integration?
Select correct option:
Unbalanced vertical integration
Balanced vertical integration
Forward vertical integration
Backward vertical integration

Which of the following refers to the development of consumer awareness about a specific product or brand in hope that they will buy the product or brand?
Select correct option:
Publicity
Advertising
Mind share
Branding


The growth stage of a product life cycle is associated with:
Select correct option:
Peak sales
Rapidly rising sales
Low sales
Declining sales


Which of the following is the function performed by channel members?
Select correct option:
Negotiating with buyers
Promotion
Information gathering
All of the given options


Which of the following are the costs that do not vary with production or sales level?
Select correct option:
Fixed cost
Variable cost
Target cost
Total cost


In which of the following companies reduce price for bulk purchases?
Select correct option:
Seasonal discount
Trade discount
Quantity discount
Cash discount


A company is producing 1000 units at cost of Rs. 500000. Variable cost for the production of 1000 units is Rs. 350000. What will be fix cost?
Select correct option:
Rs. 350000
Rs. 150000
Rs. 300000
Rs. 200000


Which of the following includes all activities involved in selling goods and services to those buying for resale or business use?
Select correct option:
Discounting
Retailing
Franchising
Wholesaling


Insurance service would BEST be described as which kind of a product?
Select correct option:
Convenience
Unsought
Specialty
Durable


BATNA stands for what?
Select correct option:
The best available to a new agreement
The best available to a negotiated agreement
The best alternating to a new agreement
The best alternative to a negotiated agreement


________ is the usual, widely recognized, channel with a range of ‘middle-men’ passing the goods on to the end-user.
Select correct option:
Free-flow
Internal marketing
Vertical marketing
Single transaction


All are the functions of retailing EXCEPT:
Select correct option:
Choice
Delivery
Producing
Packing


Additional cost is associated with which of the following strategy?
Select correct option:
Market segmentation strategy
Market dominance strategy
Differentiation strategy
Cost leadership strategy


A price set by the retailer and often attached to a product with a sticker is known as:
Select correct option:
Market price
List price
Retail price
Wholesaler price


Which of the following are products and services bought by final consumers for personal consumption? These include convenience products, shopping products, specialty products, and unsought products.
Select correct option:
Material and parts
Consumer products
Industrial products
Capital items


In which of the following company specifically creates a brand to counter a competitive threat?
Select correct option:
Fighting brand
Co-brand
Family brand
Individual brand


________ is the usual, widely recognized, channel with a range of ‘middle-men’ passing the goods on to the end-user.
Select correct option:
Free-flow
Internal marketing
Vertical marketing
Single transaction


Which of the following buy mostly from producers and sell mostly to retailers and industrial consumers?
Select correct option:
Discount stores
Wholesalers
Factory outlets
Independents


Which of the following is a reduced price marked on the label or package by producer?
Select correct option:
Coupon
Price-pack deal
Sample
Cents-off deal


Which of the following is NOT a type of wholesalers market?
Select correct option:
Specialty wholesalers
Manufacturers’ sales branches and offices
Agents and brokers
Merchant wholesalers


When a firm attempts to increase sales during the maturity stage of the PLC by changing one or more marketing mix elements, it is _____.
Select correct option:
Improving advertising
Changing promotion
Modifying the marketing mix
Increasing promotion budget


Which of the following is used to segment and analyze consumer’s buying behavior?
Select correct option:
Promotional mix
Integrated marketing communication
Marketing communication
Customer database


Which of the following advertising is effective in metropolitan and high-traffic areas?
Select correct option:
Newspaper
Radio
Television
Billboards


A brand which cost more than other products is called:
Select correct option:
Premium brand
Economy brand
Co-brand
Family brand


Need becomes ________ when they are directed towards a specific object.
Select correct option:
Actual need
Want
Satisfaction
Demand


Which of the following aggressive strategy is without direction?
Select correct option:
Reactor
Analyzer
Defender
Prospector


Which of the following offers an incentive to buy a product?
Select correct option:
Direct mail
Public relations
Sales promotion
Advertising


Which of the following is the task of selecting an overall company strategy for long-run survival and growth?
Select correct option:
Mid-term planning
Short-term planning
Annual market planning
Strategic market planning

Identify which of the following is an aggressive strategy.
Select correct option:
Intensification
Diversification
Harvesting
Vertical integration

What will be the length of distribution channel for perishable goods?
Select correct option:
Short
Long
Medium
None of the given options


Which of the following is an example of indirect selling?
Select correct option:
B2B selling
Door-to-door selling
Face-to-face selling
Telemarketing


Which of the following is a major determinant of demand for the product in the market?
Select correct option:
Planning
Promotion
Price
Place


All of the following are the examples of unsought goods EXCEPT:
Select correct option:
Course books
Encyclopedia
Funeral plots
Insurance policy


Back to home VUsolutions

Shaadi.com: Just create ur account & find ur partner or EARN money, its reall & EASY

VUsolutions Followers (Join NOW and Get Extra Benefits)

Install LATEST toolbar having lot of features - GET solutions on Desktop

toolbar powered by Conduit
Caliplus 300x250 NoFlam VitoLiv 468x60 GlucoLo