Barriers to Effective Communication: At each stage in the process of communication – encoding, transferring, and decoding, there is the possibility of interference. This may hinder the communication process. Such interference is known as ‘noise.’ Often, a comparison is made between communication and a leaky bucket. If you carry water in a leaky bucket, you will lose water at various points in your journey from the water tap to your
Q2. Elaborate upon the significance and purpose of reading for a graduate of Computer Applications. 5+5 10
Ans:
Significance of reading for a graduate of Computer Applications:
Self-esteem is the ability to believe in yourself: This may be the most crucial aspect of all. Students gain ground in the categories listed below the sooner they establish reading abilities. This gives individuals more confidence in how they talk and write, as well as the certainty of a larger knowledge foundation.
Concentration Enhancement: Reading and student literacy are emphasised, which aids in the development of greater
Q3. What are the qualities of a business letter? Discuss its various types. 4+6 10
Ans:
The following are some qualities of a good business letters:
Simple and unambiguous language must be utilised during the communication process. The meaning of a term is unclear when it is unfamiliar.
1. a) Discuss about different protocols used on the Internet.
b) Explain tags to insert hyperlink and images in the HTML document. 5+5
Ans (a).
Different protocols used on the Internet: TCP (Transmission Control Protocol): The TCP corresponds to the transport layer of OSI reference model, The TCP is known as a connection-oriented protocol, which means that a connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged.
IP (Internet Protocol)
IP is the protocol that controls how data Its Half solved only
2. a) Explain different ways of inserting a style sheet.
b) What do you understand by DHTML? Explain differences between HTML & DHTML. 5+5 10
Ans (a).
There are three ways of inserting a style sheet:
1. External style sheet
2. Internal style sheet
3. Inline styles
External Style Sheet:
If you have to give same look and feel to many pages then it is a good idea to keep all the style sheet rules in a single style sheet file and include this file in all the HTML pages. HTML allows authors to associate any number of external style sheets with a document. You can include a style sheet file into HTML document using <link
3. a) Explain various events used in DHTML.
b) What is XML? Explain features and applications of XML. 5+5 10
Ans (a):
There are various DHTML events that will be helpful for us to understand event handling in DHTML:
1. Onclick Event: If the user clicks the left mouse button, the onclick event for an object occurs only if the mouse pointer is over the object, but if the user clicks the mouse on the object but moves the mouse pointer away from the object before releasing, no onclick event occurs.
In line HTML syntax
SET-II
4. a) What is AJAX? How does it work? Explain its advantages.
b) How do you handle Dynamic HTML with Ajax? 5+5 10
Ans:
AJAX: AJAX can be used for interactive communication with a database. Database allows web applications to store information in a systematic way, and retrieve that information later through the use of structured query. Database also allows many clients to access and save information concurrently. It is becoming more sophisticated
Ans (b).
Handling Dynamic HTML with Ajax
DHTML is a powerhouse of option for the Ajax programmer. Like CSS, DHTML offers ways to update and manage your web page. In many ways, DHTML is more powerful than CSS, because by using DHTML, we can alter the HTML in a page. DHTML allows authors to add effects to their pages that are otherwise difficult to
5. a) How can you load XML Data into an HTML Page? Explain with example.
b) Write a PHP script that retrieve data from database table and return the XML string. 5+5
Ans (a):
Loading XML Data into an HTML Page: The process of fetching data from an XML files to be filled in an HTML table, using DSO (Data Source Object) and JavaScript. DSO is an object that operates like a database on the client side. It will accept information that is organized in a certain way and will manipulate it with its own database engine.
DSO allows data binding
6. a) Explain different operators used in PHP.
b) Explain ASP AdRotator Component with example. 5+5 10
Ans (a)
PHP Operators: In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make
Q1. A. What is time complexity and space complexity? Analyze the performance of Binary Search using time and space complexities. 5
Ans:
An algorithm is a step by step procedure for solving a particular problem. One major purpose of this text is to develop efficient algorithms for the processing of our data. The efficiency of the algorithm is depending on the time and space it uses. The complexity of an algorithm is the function which gives the running time and/ or space in terms of the input size. Each of our algorithms will involve a particular data structure. The data structure which we choose will depend on many things, including the data and the frequency with which various data operation are applied. Sometimes the choice of data structure involves a time- space tradeoff by increasing the amount of space for storing the data, one may be able to reduce the time needed for processing the data, or vice versa. So, we may not always be able to use the
B. Write an algorithm/pseudocode to delete the node following a given node in linked list. 5
Ans:
Deletion Algorithm: We have algorithms for deletion from linked list in various situations. The first one deletes the node following a given node and the second one deletes the node with a given ITEM of information.All of our deletion algorithms will return the memory space of the deleted node N to the beginning of the AVAIL list. Accordingly, all of our algorithms will include the following pair of assignments, where LOC is
Q2. What are the applications of stack? 10
Ans:
Applications of Stack:
Arithmetic Expression
Generally in all arithmetic expression the operators are placed in between the operands, this is called infix notation.
A+B and (X+Y)* Z
In some type of notation the operator is placed before its two operands, this is called prefix notation or polish notation. Its Half solved only
Q3A. Explain the postorder traversals on binary tree. 5
Ans (a).
Postorder traversals on binary tree:
In postorder traversal, traversal starts with the left most subtree then proceeds with right sub tree and print the parent of those nodes.
1) Traverse the
B. What is a binary search tree? What are the common operations that can be performed on binary search trees? 5
Ans (b).
Binary Search Tree: T is a binary tree. Then T is called binary search tree if each node of n of T has the following property. The value at n is greater than every value in the left subtree of n and is less than every value in the right subtree of n. We can say one of the most important data structure is binary search tree. This enables one to search for and find an element with an average running time f(n)=O(log2 n). It
SET-II
Q4 A. What is static memory allocation and dynamic memory allocation? 5
Ans (a).
Static Memory Allocation: Static Memory Allocation, also known as Compile-time Memory Allocation, is used for the allocation of memory during the process of compilation of data in a fixed size. The compiler allocates memory
5. What is an AVL tree. How do you perform search operation in an AVL tree? Explain with the help of an example. 10
Ans (5).
AVL tree: An AVL tree is another balanced binary search tree named after their inventors, Adelson-Velskii and Landis. An empty binary tree is an AVL tree. A non empty binary tree T is an AVL tree if given TL and TR to be the left and right subtrees of T and h(TL) and h(TR) to be the heights of subtrees TL and TR
Q6 A. Give algorithm/pseudocode for DFS. Demonstrate DFS using suitable example? 5
Ans (a):
Depth first search (DFS) algorithm starts with the initial node of the graph G, and then goes to deeper and deeper until we find the goal node or the node which has no children. The algorithm, then backtracks from the dead end towards the most recent node that is yet to be completely unexplored.
B. Design an algorithm/ pseudocode for selection sort. 5
Ans (b):
Selection sort: Selection sort is one of the sorting techniques that is typically used for sequencing small lists. It starts by comparing the entire list for the lowest item and moves it to the #1 position. It then compares the rest of the list for the next-lowest item and places it in the #2 position and so on until all items
Q1 a. Discuss the three Operating System Structures.
b. What is Deadlock avoidance? Discuss Banker’s algorithm for the same. 5+5
Ans 1(a).
Three Operating System Structures:
Layered approach: Dijkstra suggested the layered approach to lessen the design and implementation complexities of an operating system. The layered approach divides the operating system into several layers. The functions of operating system are divided among these layers. Each layer has well-defined functionality and input-output interfaces with the two adjacent layers. Typically, the bottom layer is concerned with machine hardware and the top layer is concerned Its Half solved only
Q2 a. What do you understand by Virtual Environment & Machine Aggregation?
b. What is a Process Control Block? What information is stored in it? 5+5 10
Ans (a).
Virtual Environment & Machine Aggregation: A virtual environment (otherwise referred to as Virtual private server) is another kind of a virtual machine. In fact, it is a virtualized environment for running user-level programs (i.e. not the operating system kernel and drivers, but applications). Virtual environments are created using the software implementing operating system-level
Q3. Discuss the CPU scheduling algorithms 10
Ans (3).
CPU- I/O Burst Cycle: Process execution consists of alternate CPU (Central Processing Unit) execution and I/O (Input / Output) wait. A cycle of these two events repeats till the process completes execution (Figure). Process execution begins with a CPU burst followed by an I/O burst and
Set – II
Q4 a. What is Page replacement? Discuss it’s FIFO algorithm with an example.
b. What is Thrashing? What are its causes? 5+5 10
Ans (a):
Page Replacement: Initially, execution of a process starts with none of its pages in memory. Each of its pages will have page fault at least once when it is first referenced. But it may so happen that some of its pages are never used. In such a case those pages which are not referenced even once will never be brought into memory. This saves load time and memory space. If this is so, the degree of multi-programming can be increased so that more ready processes can be loaded and executed. Now, we may come across a situation wherein all of sudden, a process hitherto not accessing certain pages starts accessing those pages. The degree of multi-
Q5 a. Discuss the different File Access Methods.
b. What are I/O Control Strategies? 5+5 10
Ans (a).
File Access Methods: Information is stored in files. Files reside on secondary storage. When this information is to be used, it has to be accessed and brought into primary main memory. Information in files could be accessed in many ways. It is usually dependent on an application. Access
Q6. Discuss about Distributed processing and parallel processing. State the similarities and differences amongst them. 10
Ans (6).
Parallel and Distributed Processing: Operating systems have moved from single process systems to single processor, multi-user, and multitasking systems. Today the trend is towards multiprocessor, multitasking systems. Distributed processing and parallel processing are two
Q1. What is Operations Research (O.R.)? Discussed the significance and scope of O.R. 3+3+4 10
Ans.
Operations Research (O.R.): Churchman, Aackoff, and Aruoff defined operations research as “the application of scientific methods, techniques and tools to the operation of a system with optimum solutions to the problems” where ‘optimum’ refers to the best possible alternative.
The objective of OR is to provide a scientific basis to the decision-makers for solving problems involving interaction with various components of the organisation. This can be achieved by employing a Its Half solved only
Q2. a) Solve the following linear programming problem:
Max. Z = 20×1 + 10×2
Subject to: x1 + x2 = 150
x1 ≤ 40
x2 ≥ 20
where x1, x2 ≥ 0 5 marks
Ans:
Solution: Problem is
Max Z = 20 x1 + 10 x2
subject to
x1 + x2 = 150 x1 ≤ 40 x2 ≥ 20
b) Discuss in brief “Duality” in linear programming problems. How to interpret the primal-dual relationship? 2+3
Ans:
Duality: Every Linear Programming Problem (LPP) is associated with another linear programming problem involving the same data and optimal solutions. The two problems are said to be duals of each
3. a) A car hire company has one car at each of the five depots D1, D2, D3, D4 & D5.
Customers in each of the five towns A, B, C, D & E requires a car. The distance (in miles)
between the depots (origins) and the towns (destinations) where customers are given in the following distance matrix:
Depots 5 10
D1 D2 D3 D4 D5
A 160 130 175 190 200
B 135 120 130 160 175
Person C 140 110 155 170 185
D 50 50 80 80 110
E 55 35 70 80 105
How should the cars be assigned to the customers so as to minimize the distance
travelled?
Ans 3a.
This problem could be solved using the transportation technique. However, only five of the routes will be used and so an additional four routes would have to be included at zero level in order to determine shadow costs and thus test for optimality. The problem is to select five elements from the matrix of Table 1 such that there is one element in each row, one in each column, and the sum is the
b) Solve the following transportation problem using Vogel’s Approximation Method:
Destination 5
D1 D2 D3 D4 Supply
Source S1 7 3 8 6 60
S2 4 2 5 10 100
S3 2 6 5 1 40
Demand 20 50 50 80
Ans:
Solution: TOTAL number of supply constraints : 3 TOTAL number of demand constraints : 4 Problem Table is
D1
D2
D3
D4
Supply
S1
7
3
8
6
60
S2
4
2
5
10
100
S3
2
6
5
1
40
Demand
20
50
50
80
Table-1
Set – II
Q4.a) Solve the following Integer programming problem using Gomory’s Fractional
Algorithms:
Maximize Z = 5×1 + 7×2
Subject to: -2×1 + 3×2 ≤ 6
6×1 + x2 ≤ 30
where x1, x2 ≥ 0 are integers.
Answer:
Solution: Problem is
Max Z = 5 x1 + 7 x2
subject to
– 2 x1 + 3 x2 ≤ 6 6 x1 + x2 ≤ 30
b) Solve the following game using Dominance rule:
Player B
B1 B2 B3
A1 5 20 -10
Player A A2 10 6 2
A3 20 15 18
Solution:
Q5. Write short notes on the following concepts:
a) Erlang M/M/1: ∞/FCFS Queuing Model
b) Program Evaluation and Review Technique [PERT] 5+5 10
Ans:
a) Erlang M/M/1: ∞/FCFS Queuing Model:
The queueing system where the distribution of arrival and the departure both are assumed to be Poisson or the distribution of inter-arrival time and service time are assumed to be Exponentially distributed are called as the Poisson queuing system. The main Poisson queuing
Q 6. The Cargo Honda Ltd. Manufactures around 150 scooters. The daily production
varies from 146 to 154 depending upon the availability of raw materials and other working conditions:
Production 146 147 148 149 150 151 152 153 154
Per day
Probability 0.04 0.09 0.12 0.14 0.11 0.10 0.20 0.12 0.08
The finished scooters are transported in a specially arranged lorry accommodating
150 scooters. Using following random numbers: 80, 81, 76, 75, 64, 43, 18, 26, 10,
12, 65, 68, 69, 61, 57. Simulate the process to find out:
i) the average number of scooters waiting in the factory. ii) the average number of empty spaces on the lorry. 10
Q2A) Explain Operating leverage and financial leverage with their application. 5+2+2+1
B) Shivam Ltd. has Total Capital of ₹ 60 Lakh. Out of which ₹ 20 Lakh is Equity Capital and ₹ 40 lakh is debt. Rate of interest payable on debt is 12%. The Sales Revenue of YZ Ltd is ₹ 100 lakh. Variable cost is 20% of Sales revenue and ₹ 30 lakh is the fixed cost of operation.
Required: Calculate Financial, Operating and Combined Leverages.
Ans 2a.
Operating Leverage
Operating leverage arises due to the presence of fixed operating expenses in the firm’s income flows. It has a close relationship to business risk. Operating leverage affects business risk factors, which can be viewed as the uncertainty inherent in estimates of future operating income.
The operating leverage takes place when a change in revenue produces a greater change in Earnings Before Interest and Taxes (EBIT). It indicates the impact of changes in sales on operating income. A firm with a high operating leverage has a relatively greater effect on EBIT for small changes in sales. A small rise in sales may enhance profits considerably,
Q 3. Write short note on (any two) 5+5 10
1. Profit Maximization Vs. Wealth maximization
2. Time value of Money- Compounding and Discounting technique
3. Cost of different sources of Finance
Ans:
Wealth maximisation vs. profit maximisation
Wealth maximisation is superior to profit maximization:
Wealth maximisation is based on cash flow. It is not based on the accounting profit as in the case of profit maximisation.
Through the process of discounting, wealth maximisation takes care of the quality of cash flow. Converting uncertain distant cash
Set – II
Q 4a. Explain various inventory management techniques in detail.
b. Describe relevant model of Dividend policy in detail by explaining Walter and Gordon Model. 5+5
Ans 4a.
Inventory Management Techniques:
The importance of effective inventory management is directly influenced by the size of investment in inventory. While the total ordering costs can be decreased by increasing the order size. The carrying cost increases with the increase in order size indicating the need for proper balancing of these two types of costs behaving in opposite directions with changes in size of order.
There are many techniques of management of
Ans 4b.
Dividend relevance models support the view that the dividend policy of the firm has a bearing on share valuation.
Under this section we examine two theories:
Walter Model
Gordon Model
Walter model
Prof. James E. Walter considers that dividend pay-outs are relevant and have a bearing on the share prices of the firm. He further states
Q 5 A limited company is considering investing a project requiring a capital outlay of 2,00,000. Forecast for annual income after depreciation but before tax is as follows: 2+2+2+2+2
Year
Rs.
1
100000
2
100000
3
80000
4
80000
5
40000
Depreciation may be taken as 20% on original cost and taxation at 50% of net income.
You are required to evaluate the project according to each of the following methods:
a) Pay-back method
b) Average Rate of return on original investment method
c) Net present value index method at 10% discount factor
d) Profitability index
e) Internal rate of return method.
Ans 5.
Q 6. a) Describe in detail the factors that need to be taken into consideration while estimating working capital requirements by an organization.
b) How working capital requirements can be estimated by an organization? 5+5
Ans A.
A large number of factors influence working capital needs of a firm. The basic objective of a firm’s working capital management is to ensure that the firm has adequate working capital for its operations, neither too much nor too little. Figure depicts factors that determine the working
Q1. What is project management? Explain the phases of project management life cycle. 4+6
Ans:
Project management: Project management is a valuable means to administer and develop any kind of infrastructure which is required to meet the growing requirements of Indian economy across various sectors like Power, Roads, Ports, IT and so on. In current scenario, it a method vital to the success of both public and private sector projects in India.
Q2. What do you mean by work breakdown structure? Explain with the help of suitable format. 4+6
Ans:
Work Breakdown Structure (WBS): The entire project may be considered to be made up of a number of tasks and sub-tasks placed in different stages called the Work Breakdown Structure (WBS).The format for WBS design is used differently by different organizatiions. Mostly graphics is used to display the project components as a hierarchical tree structure or diagram. Figure depicts the WBS
Q3. Differentiate between PERT and CPM. 10
Ans:
Differences Between PERT and CPM:
The two fundamental network techniques are: PERT and CPM. PERT, an acronym for Programme Evaluation Review Technique was originally developed to facilitate the planning and scheduling of the Polaris Fleet Ballistic Missile Project of the US government. Designed to handle risk and uncertainty, PERT is quite suitable for research and development programmes, aerospace projects, and other projects relating to new technology. In such projects, there exists variability
SET – II
Q4. Explain the tools and techniques of quality planning along with its outcome. 5+5
Ans:
Quality planning is the process of identifying the quality standards that are related to the project and determining how to these standards can be achieved. It is one of the significant processes of project planning and should be performed on a continuous basis and in parallel with the other project planning processes.
A good quality planning process starts with a clear definition of the goals of the project. What is the product or deliverable likely to achieve? What does the product look like? What functions will it perform? How do you
Q5. What is contract management? What are its Phases? 3+7
Ans:
Contract management: Contract management is the management of contracts which is entered with clients, sellers, partners, or employees. It comprises of negotiating the terms and conditions and ensuring the compliance with the terms and conditions,with documenting and approving on any changes or amendments that may occur during its implementation or execution. As we discussed in the previous section, a purchase order becomes a legal contract
Q6. Project termination has negative impact, how can we avoid it? 10
Ans:
Project termination is one of the most serious decisions of a project management team and its control board. The decision of project termination affects all the stakeholders of the project and can put some negative impact on the organisation’s growth. So it is important to critically evaluate all the aspects before taking the decision. The project manager and his or her team members will feel that they personally failed. It can also put a negative impact on the team member’s motivation level and their productivity.
Q 1 a. What are Information Systems? Distinguish between Information Technology and Information Systems with the help of an example.
b. Explain evolution of computing over decades with diagram. How does the internet and web differ? 5+5
Ans a.
Information Systems: Information systems are collections of computers, networks, software, and people who create, store, modify, and distribute data and information in any organisation. Computers and information technology (IT) are key ingredients of modern information systems (IS). Information technology includes comput- ing devices such as personal computers, notebook computers, personal digital assistants, mobile phones, and various types of networks that allow the comput- ing devices to connect and to communicate.
Q2. Discuss IT Interaction model with diagram. How Information Systems are proved to be a positive outcome for organizations? 3+7
Ans:
The IT interaction model:
Managing IS in organisations is a highly challenging and complex task. One reason for this complexity is that neither organisations nor the IS they use remain static over time – both change continuously, and it is the job of management to ensure that the systems remain useful and relevant for their organizational goals at all times. Organisations change to respond to the needs of the business and economic environment in which they thrive. They may have to change their services, their products, their internal structure, and the manner in which they do their business to
Q3. What are the three components of a modern information technology infrastructure of an organization? Explain with the help of diagram. 3+7
Ans:
Types of Information Technology
Historically, information systems were created for specific functions in the organisation and for particular levels of personnel in the hierarchy. Systems for accounting, operations, marketing, and other functions were largely designed, built, and maintained independently with little sharing of data among them. Each system supported the function for which it was designed. It was in this function that the data for the systems originated and the information and reports originat- ing
Set – II
Q4. Discuss the following management systems:
a. Supply chain management systems (SCM)
b. Customer Relationship Management Systems (CRM) 5+5
Ans:
Supply Chain Management Systems
Supply chain management (SCM) systems evolved alongside MRP and ERP. The basic purpose of such systems is to integrate suppliers and vendors of the host organisation that will allow processes to be integrated across organ- isational boundaries. A supply chain of an organisation consists of the vendors and suppliers who provide materials, parts, and services to the organisation. In a
Q5. What is E-Commerce and Mobile Commerce? Explain Electronic Data Interchange (EDI) with an example. 5+5
Ans:
E-commerce: Electronic commerce, or e-commerce for short, is a phrase that was coined to designate businesses that were created to use the Internet technologies as a basis for transactions. The first
Q6. Discuss the major goals of database systems, emphasizing the need and challenges of data management. 10
Ans:
Goals of Database Management System
(1) To remove problem of data redundancy and inconsistency- Different programmers create files and application programs over a long period and these files are likely to have different format and programs are written in different languages. Same information may be duplicated in various files. E.g. address and telephone number of a particular customer may appear in a file that consist of savings- account record and in a file that consist of checking account records,
Q 1. What are the various marketing concepts? Explain. 5+5
Ans 1.
A marketing manager must formulate strategies that can build profitable relationships with the target consumers. Things are continuously changing in terms of business and social changes, customer-related changes, and changes in manufacturing and marketing organisations. Therefore, the organisations should select their marketing orientation Its Half solved only
Q 2. What is Marketing Information Systems? Write down the characteristics of MIS. 5+5
Ans 2.
Marketing Information Systems: The importance of marketing information is particularly evident as the economy continues to accentuate services as a primary source of value.
Services depend on information to a great extent. Information is speedily becoming a service in its own right. Mass customisation, often depicted as “one-to-one” marketing or the customising of products and services for individual customers, is heavily dependent on compre
Q 3. Discuss various buying motives. What are the influences of these motives on the purchase process? 4+6
Ans:
Buying Motives: To begin with, let us understand the different motives that consumers pursue while initiating their decision process. Consumers have different kinds of needs and they do not pursue all their needs at all points of time. Whenever a need gets a direction or goal and all the energies of consumer are targeted towards achieving the goal, it takes the shape of a buying motive
Set – II
Q 4. Define Brand Equity. Elaborate its components. 4+6
Ans:
Brand Equity
Brand equity is the added value that the consumer assigns to the products and services. It is an arrangement of brand assets and liabilities linked to a brand, its name, and symbol that put in or subtract the value provided by a product or service to an organisation and/or to that
Q 5. Discuss the various types of advertisement. 10
Ans:
Types of advertisements:
Advertising can be classified into various forms as mentioned below.
Brand advertising – This is the most popular form of advertising. All possible media including television is flooded with brand advertising. Brands like Surf Excel, Pepsi, and Coke in India are shown more frequently on Indian televisions.
National advertising –These advertisements are uniform across the nation and are released through
Q 6. Describe any four international market entry strategies. 10
Ans:
International Market Entry Strategies: There are two methods to entry into foreign markets. They are indirect exporting and direct exporting. In the first method, the manufacturers take the help of merchant exporters to get products exported to foreign markets. Indirect exporting, the manufacturers decide to export themselves. Thus, the
Q 1. Is there a difference between the terms “production management” and “operations management”? If yes, what is it? 2+8
Ans:
Production management:
Production management encompasses all those activities that enable conversion of a set of inputs into outputs which are useful to meet the human needs. It is also important to have a feedback loop connecting the information from output to input stages to ensure that the desired type of output has been produced. This also ensures the right quantity and the right quality.
Production management involves the Its Half solved only
Q 2. Write a note on (a) Delphi technique of demand forecasting (b) Moving Averages Method of demand forecasting. 4+6
Ans:
Delphi method:
In the Delphi method, the experts give their opinions which are collected by the coordinator and several rounds of discussion may be held before a consensus is reached. This forms the basis for forecasting.
In a Delphi technique, the group facilitator or the change agent aggregates all the anonymous opinions received through the questionnaires, sent two or three times to the same set of experts. The experts are required to give justification for the answers given in the first questionnaire and on the basis of it
Q 3. What is the Deming approach to the Total Quality Management? 10
Ans:
Total quality management is viewed from many angles – as a philosophy, as an approach and as a journey towards excellence. The main thrust is to achieve customer satisfaction by involving everybody in the organisation, across all functions with continuous improvement driving all
SET – II
Q 4. Differentiate between logical and physical database modelling. 10
Ans:
Logical vs. Physical Database Modelling:
Models are constructed to represent the proposed database in the visual form, so that, business requirements can be easily associated with database objects. Diagrams are produced to illustrate business processes, organisational units, rules, and entities. An Entity Relationship Diagram (ERD) represents the entities or clusters of information and their relationships maintained for the business. Process flow diagrams represent various processes and the flow of information, within and between different processes and entities. These are called database
Q 5. What is Just-In-Time production? What are its aims and advantages? 5+5
Ans:
Just-In-Time production:
Toyota Motor Corporation, with annual sales of over 9 million cars and trucks, is the largest vehicle manufacturer in the world. Two techniques, just-In-Time (JIT) and the Toyota Production System (TPS), have been instrumental in this post-world war II growth. Toyota, with a wide range of vehicles, competes head-to-head with successful and long-established companies in
Q 3. Explain the factors which should be considered before scheduling an operation. How could you schedule a service? 5+5
Ans:
Scheduling is basically a day-to-day planning of operations with details of a) which work centre will do which Job, b) When should an operation/job be started and ended, c) On which equipment should it be done and by whom, and d) What is the sequence in which job operations need to be