Ignou Solved Assignments

LightBlog

Sunday 10 September 2017




Answer all the questions. Each question carries 40 marks. 20 marks are for viva-voce. You may use illustrations and diagrams to enhance the explanations. Please go through the guidelines regarding assignments given in the Programme Guide for the format of presentation.

  1. Characterize the architectural operations of SIMD and MIMD computers. Distinguish between Multiprocessors and Multicomputers based on their structures, resource sharing, and interprocessor communications. Also, explain the differences among UMA, NUMA, COMA and NORMA computers.
  2. Explain the differences between string reduction and graph reduction machines.



This assignment has eight questions. Answer all questions. Each question is of 10 marks. Rest 20 marks are for viva voce. You may use illustrations and diagrams to enhance the explanations. Please go through the guidelines regarding assignments given in the Programme Guide for the format of presentation. Answer to each part of the question should be confined to about 300 words.

  1. What is ERP? Explain different components of an ERP system. Compare ERP with other similar software solution.
  2. What is portfolio management? Discuss the uses and significance of various tools used to automate the portfolio management processes.
  3. Discuss why management needs information. Is it possible for the management of an organization to make effective decisions without the aid of an information system? Explain.
  4. How are databases used in e-business? How does e-business fit into different locations within the production chain?
  5. What is the role of OLAP in decision-making? What does the term drill mean down in an executive information system?
  6. Explain different advantages and disadvantages of Knowledge Management in Organisations.
  7. Explain some of the security threats to information systems? How does encryption ensure data security?
  8. What is total cost of ownership (TCO)? What are the different cost factors for computation of the TCO of any system? Explain.

Thursday 7 September 2017



There are eight questions in this assignment, which carried 80 marks. Rest 20 marks are for viva-voce. Answer all the questions. Please go through the guidelines regarding assignments given in the Program Guide for the format of presentation. Use diagram as part of answer wherever required for better explanation.

1. What is OOAD? Explain concepts of generalization and specialization in OOAD, with the help of examples.

2. What is class diagram ? Draw class diagram for Online Banking System.

3. Explain advantage of use case diagram? Draw use case diagram for Online Banking System.

4. Draw a sequence diagram for Online Movie Ticket Booking System.

5. (a) What is inheritance ? Explain its advantages.
    (b) What is dynamic modeling? Explain its advantages

6. Explain relation of functional model with object model and dynamic model.

7. Draw a DFD for Online Admission System of an University. Make necessary assumptions required.

8. Write short note on followings (minimum in 300 words)
     i) One –way association and two-way association
     ii) Issues in Concurrency Control 

Monday 1 February 2016

Q.1 Explain any 10 online payment systems and services.

Ans. : 10 Online payment systems and services are given below :

1. Google Wallet
This is essentially Google’s version of PayPal, complete with money transfers and a Google
Wallet Card! Since we’re all addicted to the Big G, it shouldn’t be all that difficult to spend
and receive money. Google also announced last month that it will be releasing a physical
card connected to users’ accounts so they can utilize Google Wallet at retail businesses. For
convenience, and the number of users, Google Wallet tops our list of the top 10 online
payment solutions.

2. PayPal
Obviously PayPal would be included in this list – it’s only one of the world’s most widely
used payment acquirers processing some 8 million payments every day. As of this writing,
PayPal has over 137 million active accounts in 193 markets and 26 currencies around the
world, which makes it easy to transfer and request payments. Other PayPal perks include
accepting checks through a smartphone’s camera, a card swiper, and allowing customers to
make a purchase without leaving your site.

3. Dwolla
Dwolla is a more recent competitor to PayPal with some outstanding benefits. For example,
you can transfer funds through email, phone, Facebook, LinkedIn, or Twitter. But, what
makes Dwolla so appealing is the fact that there are no fees for transactions less than $10
and $0.25 per transaction for transactions over $10.

4. Amazon Payments
Amazon Payments is a safe, easy and convenient method for users to receive money by
using Amazon’s API. Users can also send money via ACH (Automated Clearing House). Since
almost everyone has an Amazon account, all your important information has already been
stored.

5. Authorize.Net
It’s been stated that Authorize.Net is the most widely used payment gateway on the
internet – probably because it’s been around since 1996. Currently, there are over 375,000
merchants handling more than $88 billion in annual transactions safely through credit cards
and e-checks. Something’s going right over there.

6. ACH Payments
ACH Payments has several key features that make it one of the top payment systems
around. Pros include: being able to make global payments, as well as serving as a payment
gateway, merchant account, credit card processor, and mobile payment processor. It can
also handle ACH payments and can be used as a payroll system.

7. WePay
What makes WePay standout isn’t the fact that it’s a payment processor allowing internet
merchants to accept credit cards and bank account payments online, it’s the fact it’s
incredibly simple. In fact, you can begin accepting payments in under a minute. The only
drawback is that it’s only available for U.S. citizens.

8. Stripe
If you’re a developer, you should already be using Stripe. Developers use Stripe to integrate
a payment system into their projects through Stripe’s robust API. This prevents the need for
a merchant account, and also allows you to build your own payment forms that can bypass
PCI requirements.

9. WooCommerce
WooCommerce allows WordPress users to create their very own e-commerce shop. There
are several neat features that make this payment processor worth your time. Besides being
vendor and customer friendly, you can run coupon campaigns, manage your store’s daily
activities, learn about shipping and tax rules, and view your store’s overall performance.

10. 2CheckOut
2CheckOut is a payment processor which is a combination of a merchant account and
payment gateway that doesn’t require PayPal or a Merchant account. Simply register and
verify your account and you can start accepting credit card payments, and even PayPal
payments. The company also offers international payments, shopping cart stores, and a
recurring billing feature.


Q.2. How can e-commerce portals make shopping secure.

Ans. : E-commerce portals make shopping secure many ways and some ways are given
below :
  • Choose a secure ecommerce platform. "Put your ecommerce site on a platform that uses a sophisticated object-orientated programming language," says Shawn Hess, software development manager, VoIP Supply.
  • "We've used plenty of different open source ecommerce platforms in the past and the one we're using now is by far the most secure," Hess says. "Our administration panel is inaccessible to attackers because it's only available on our internal network and completely removed from our public facing servers. Additionally, it has a secondary authentication that authenticates users with our internal Windows network."
  • Use a secure connection for online checkout--and make sure you are PCI compliant. "Use strong SSL [Secure Sockets Layer] authentication for Web and data protection," says Rick Andrews, technical director, Trust Services, Symantec.
  • "It can be a leap of faith for customers to trust that your ecommerce site is safe, particularly when Web-based attacks increased 30 percent last year. So it's important to use SSL certificates "to authenticate the identity of your business and encrypt the data in transit," Andrews says. "This protects your company and your customers from getting their financial or important information stolen." Even better: "Integrate the stronger EV SSL [Extended Validation Secure Sockets Layer], URL green bar and SSL security seal so customers know that your website is safe."
  • "SSL certificates are a must for transactions," Hess agrees. "To validate our credit cards we use a payment gateway that uses live address verification services right on our checkout," he says. "This prevents fraudulent purchases by comparing the address entered online to the address they have on file with their credit card company."
  • Don't store sensitive data. "There is no reason to store thousands of records on your customers, especially credit card numbers, expiration dates and CVV2 [card verification value] codes," says Chris Pogue, director of Digital Forensics and Incident Response at Trustwave.
  • "In fact, it is strictly forbidden by the PCI Standards," Pogue says. He recommends purging old records from your database and keeping a minimal amount of data, just enough for charge-backs and refunds. "The risk of a breach outweighs the convenience for your customers at checkout," he says. "If you have nothing to steal, you won't be robbed."
  • Employ an address and card verification system. "Enable an address verification system (AVS) and require the card verification value (CVV) for credit card transactions to reduce fraudulent charges," says Colin O'Dell, lead Magento developer for Unleashed Technologies.
  • Require strong passwords. "While it is the responsibility of the retailer to keep customer information safe on the back-end, you can help customers help themselves by requiring a minimum number of characters and the use of symbols or numbers," says Sarah Grayson, senior marketing manager for the Web Security Group at McAfee. "Longer, more complex logins will make it harder for criminals to breach your site from the front-end," she says.
  • Set up system alerts for suspicious activity. "Set an alert notice for multiple and suspicious transactions coming through from the same IP address," advises Deric Loh, managing director at digital agency Vault Labs. Similarly, set up system alerts for "multiple orders placed by the same person using different credit cards, phone numbers that are from markedly different areas than the billing address and orders where the recipient name is different than the card holder name."
  • Layer your security. "One of the best ways to keep your business safe from cybercriminals is layering your security," says Grayson. "Start with firewalls, an essential aspect in stopping attackers before they can breach your network and gain access to your critical information." Next, she says, "add extra layers of security to the website and applications such as contact forms, login boxes and search queries." These measures "will ensure that your ecommerce environment is protected from application-level attacks like SQL (Structured Query Language) injections and crosssite scripting (XSS)."
  • Provide security training to employees. Employees "need to know they should never email or text sensitive data or reveal private customer information in chat sessions as none of these communication methods is secure," says Jayne Friedland Holland, chief security officer and associate general counsel at technology firm NIC Inc..
  • "Employees also need to be educated on the laws and policies that affect customer data and be trained on the actions required to keep it safe," Holland says. Finally, "use strict written protocols and policies to reinforce and encourage employees to adhere to mandated security practices."
  • Use tracking numbers for all orders. "To combat chargeback fraud, have tracking numbers for every order you send out," advises Jon West, CEO, AddShoppers, a social commerce platform for retailers. "This is especially important for retailers who drop ship."
  • Monitor your site regularly--and make sure whoever is hosting it is, too. "Always have a real-time analytics tool," says Punit Shah, director of Marketing at online jeweler My Trio Rings. "It's the real-world equivalent of installing security cameras in your shop. Tools like Woopra or Clicky allow you to observe how visitors are navigating and interacting with your website in real time, allowing you to detect fraudulent or suspicious behavior," he says. "With tools like these we even receive alerts on our phones when there is suspicious activity, allowing us to act quickly and prevent suspicious behavior from causing harm." Also, make sure whoever is hosting your ecommerce site "regularly monitors their servers for malware, viruses and other harmful software," says Ian Rogers, SEO and Web developer, Mvestor Media, an SEO and website design company. "Ask your current or potential Web host if they have a plan that includes at least daily scanning, detection and removal of malware and viruses on the website.".
  • Perform regular PCI scans. "Perform regular quarterly PCI scans through services like Trustwave to lessen the risk that your ecommerce platform is vulnerable to hacking attempts," advises West. "If you're using third-party downloaded software like Magento or PrestaShop, stay on top of new versions with security enhancements," he says. "A few hours of development time today can potentially save your entire business in the future."
  • Patch your systems. "Patch everything immediately--literally the day they release a new version," says Kyle Adams, chief software architect for Junos WebApp Secure at Juniper Networks. "That includes the Web server itself, as well as other third-party code like Java, Python, Perl, WordPress and Joomla, which are favorite targets for attackers." "Breached sites are constantly found running a three-year-old version of PHP or ColdFusion from 2007," says Pogue. So it's critical you install patches on all software: "Your Web apps, Xcart, OSCommerce, ZenCart and any of the others all need to be patched regularly."
  • Make sure you have a DDoS protection and mitigation service. "With DDoS [Distributed Denial of Service] attacks increasing in frequency, sophistication and range of targets, ecommerce sites should turn to cloud-based DDoS protection and managed DNS services to provide transactional capacity to handle proactive mitigation and eliminate the need for significant investments in equipment, infrastructure and expertise," says Sean Leach, vice president of Technology, VeriSign. "The cloud approach will help [ecommerce businesses] trim operational costs while hardening their defenses to thwart even the largest and most complex attacks," he argues. "In addition, a managed, cloud-based DNS hosting service can help deliver 100 percent DNS resolution, improving the availability of Internet-based systems that support online transactions and communications."
  • Consider a fraud management service. "Fraud does happen. And for merchants, the best resolution is to make sure you are not holding the bag when it does," says Bob Egner, vice president of Product Management at EPiServer, a .NET content management and ecommerce product company. "Most credit card companies offer fraud management and chargeback management services. This is a practical approach to take because most security experts know there is no such thing as 100 percent safe."
  • Make sure you or whoever is hosting your site is backing it up--and has a disaster recovery plan. "Results from a recent study by Carbonite revealed businesses have big gaps in their data backup plans--putting them at risk for losing valuable information in the instance of power outage, hard drive failure or even a virus," says David Friend, CEO of Carbonite. So to make sure your site is properly protected, back it up regularly--or make sure your hosting service is doing so. 

Wednesday 30 September 2015

ANSWER-1:-

1(a)(i):
In computing, a fixed-point number representation is a real data type for a number that has a fixed number of digits after (and sometimes also before) the radix point (after the decimal point '.' in English decimal notation). Fixed-point number representation can be compared to the more complicated (and more computationally demanding) floating-point number representation.

Fixed-point numbers are useful for representing fractional values, usually in base 2 or base 10, when the executing processor has no floating point unit (FPU) or if fixed-point provides improved performance or accuracy for the application at hand. Most low-cost embedded microprocessors and microcontrollers do not have an FPU.

1(a)(ii):
Roundoff error occurs because of the computing device's inability to deal with certain numbers. Such numbers need to be rounded off to some near approximation which is dependent on the word size used to represent numbers of the device.

1(a)(iii):
Floating-point number representations allow for the existence of two zeros, often denoted by −0 (negative zero) and +0 (positive zero), regarded as equal by the numerical comparison operations but with possible different behaviors in particular operations.





1(c):
Appox true value is :

3.1415926535897932384626433832795

this is called the level of accuracy or to how many significant digits places

pi appox equal 22/7 or 355/113

Depending on the Level of Accuracy desired

here some other value appox value for it

31 ^ (1/3)

54648/17395 accurate to 7 decimal places

(2143/22)^.25 or (97 9/22)^ (1/4) accurate to 9 decimal places

833009/ 265155 = pi to 10 decimal places

52163/16604 pi is accurate to the true value to six or seven decimal places

144029661/45846065

69305155/22060516

5419351/1725033


52,163/16,604 = 3.1415923873765357745121657431944

312689/99532

312689/99532

3 + 4/28 - 1/(790 + 5/6) appox PI