https://www.google.com/contributor/welcome/?utm_source=publisher&utm_medium=banner&utm_campaign=2376261057261409

Search This Blog

Search with our Site

Custom Search

Saturday, January 21, 2012

MGT411 GDB Solution & Discussion Fall 2011

Suppose there is hyperinflation prevailing in a country. To solve this problem, the central
 bank of the country is planning either to change the bank’s minimum reserve requirement or 
resolve this issue through Open Market Operation (OMO). Which one of these two


 alternatives is best to solve the problem in the long run? Give logical reasons to support your 
answer.

Read more: MGT411 GDB Solution & Discussion Fall 2011 - Virtual University of Pakistan http://vustudents.ning.com/group/mgt411moneybanking/forum/topics/mgt411-gdb-solution-discussion-fall-2011#ixzz1kAZRaIlQ

Friday, January 20, 2012

MGT402 GDB NO 2 FALL 2011 23-01-2012 LASTE DATE


“Jet International Airlines (JIA) – a Republican Country based airliner is operating more than 1,400 flights annually with 23 planes of different ranges on domestic and international routes. With a stable stream of cash flows, the company has earned a pre tax profit of Rs. 3,450 million during the last year. Due to cost effective operations, JIA is enjoying competitive position in the industry.

The company’s Strategic Business Development Unit (SBDU) has recently discovered Green Valley - a jewel among the many beautiful valleys in the district of Northern City in the Northern area of Country and features pine forests, crystal clear lakes, cool mountain streams, Deep Cold River, and famous for its trout. SBDU has advised the top management to launch a regular daily flight from Central City to Northern City on day round trip basis. After going through some preliminary study, JIA has decided to operate this route as an independent tour operatorA new business segment in the company has been set up under the name of “Tour Entertainers” (TE).

JIA has inducted staff of 10 qualified persons and has planed to incur Rs. 0.5 million on their training. The company has signed a 3-years lease contract with Planes Lessor Incorporation (PLI) to acquire a new 100-seats “Smart Plane” to operate on this rout. PLI is also responsible for both the periodic and on-demand maintenance of this plane. The company’s SBDU head – Mr. Management Accountant has estimated the following cost figures:

Monthly Fixed Costs (FC):
Lease Rentals of the plane                  Rs. 14.28 million
Flight Crew expenses                                 2.25 million
Office Salaries etc.                                     1.78 million
Office expenses at Northern City                 0.89 million

  
After conducting meetings with various divisions, the SBDU has analyzed the following costs per person on a day round trip on this tour flight and the Management Accountant has verified these figures. They are:
Passenger boarding cost                                 Rs.   8,000
Fuels and ready-to-take-off expenses                     1,500
Meals and other services                                        350
Other value added (net, phone, movies etc)              150
           

While feeling calm upon the feedback of this new venture’s advertising campaign, the central management of JIA has approved to launch introductory price of Rs. 18,000 per day round trip ticket for each passenger.”

Required:

Keeping in view the above situation answer the following questions:
1)      Determine the number of passengers that JIA must carry each month to break even.

2)      If at breakeven determined in (1) above, JIA operates any flight at full of passengers, determine the total net income of the flight per day round trip.

3)      JIA has a promotional plan to carry 10 newly wed couples to Northern City every month free of cost by balloting. In this case, how many additional passengers, JIA must carry to break even in each month?

4)      At present break even level, each flight is left unfilled with some passenger seats. To fill these seats, the TE manager is thinking to offer 5 members group, a complete 3-day trip armed with complete boarding and lodging, 3 group dinners, and daily sight seeing with the company maintained vehicle including driver and a guide on an additional cost of Rs. 25,000 per passenger. SBDU has approved per passenger charges at Rs. 27,000 in addition to a ticket at discount price of Rs. 8,000 per passenger. You are required determine the worth of this proposal.
            


Just provide your final answers in concise manner. Avoid for providing details of formulas and calculations
 


Read more: GDB NO 2 FALL 2011 23-01-2012 LASTE DATE - Virtual University of Pakistan http://vustudents.ning.com/group/mgt402costmanagementaccounting/forum/topics/gdb-no-2-fall-2011-23-01-2012-laste-date#ixzz1k4lNhifI

MGT201 GDB Solution & Discussion Fall 2011


Case:-
Assuming that ABC Firm has an optimal capital structure; comprised of debt, preferred stock and common equity. In this scenario, Firm currently has 45 percent debt, 2 percent preferred stock and 53 percent common equity in its capital structure. Firm’s before-tax cost of debt is 10 percent and corporate tax rate is 40 percent; beta for common stock is 0.85 with market return 14% and T-bills return 10%; whereas cost of preferred stock is 10.3 percent.
Required:
1. Keeping in view the above mentioned information what would be the values of the firm’s:
§ After tax cost of debt ‘Kd(1 – T)’
§ Weighted average cost of capital ‘WACC’
Note: Detailed working is not required.

2. You need to stimulate your thought and discuss the impact (increase/ decrease) on firm’s cost of equity ‘Ks’ and weighted average cost of capital ‘WACC’ if volatility of ABC Firm’s stock is increased up to 1.8. Give logical justification of your answer.
Note: Your discussion should not exceed 50 words.


fter Tax cost of Debt = .10 (1-.40) = 6%

WACC = 0.45(0.10)(.6) + 0.02(0.103) + 0.53(0.134) = 10.008

Cost of equity and WACC both will increase because of increase in volatility of share price in market.

Read more: MGT201 GDB Solution & Discussion Fall 2011 - Virtual University of Pakistan http://vustudents.ning.com/group/mgt201financialmanagement/forum/topics/mgt201-gdb-solution-discussion-fall-2011#ixzz1k4k2e2nH

CS610 GDB Solution & Discussion Last Date:24-01-2012


GDB will remain open for two consecutive working days. For this you have choice to post your comments from 23rd January to 24th January.
Topic:
How can secure LAN network? And which technology is better for it. Argue your answer with detail reason.


Instructions:A concise, coherent and to the point comments are preferred over lengthy comment having irrelevant details. Your comments must not be more than 5-7 lines.


Read more: CS610 GDB Solution & Discussion Last Date:24-01-2012 - Virtual University of Pakistan http://vustudents.ning.com/group/cs610computernetwork/forum/topics/cs610-gdb-solution-discussion-last-date-24-01-2012#ixzz1k4iYAUPM



Helping MAterial

Ethernet LAN Security
The Ethernet LAN has many security weaknesses when facing attacks externally and internally. Security measures must be taken to ensure an secured environment for communications ever the Etehrnet LAN. The following are some key risks in an Ethernet LAN:
  • The primary weakness with Ethernet is that it is a broadcast system . Every message sent out by any computer on an Ethernet LAN segment reaches all parts of that segment and potentially could be read by any computer on the segment. Sniffing type programs can record, read and analyze all the messages on a segment. Actually others can read your password and subsequently login to any account. They can also change the information and forge totally different messages.
  • Peer-to-Peer networking systems (both Windows and Macintosh AppleTalk) for Workgroups allow people on the network to share files and printers, which open up your files to anyone using another computer in the group.
  • Some applications, such as FTP program which allows you to get files from and send files to another computer, may have an option in their configuration which allow other computers to get into your computer and have access to your files while the program is running .
  • Previligies of the operating system of a server in the Ethernet maybe incorrectly configured and users may have unintentional access to sensitive parts of the file store.
  • If the NFS (Network File System) is deployed in an Ethernet LAN and the NFS part of a file store on a remote computer, the contents of the files can be snooped when reading or writing a file to the NFS drive.
  • It is relatively easy in an Ethernet LAN to fake an Email message and other messages which purports to come from someone else. It is also possible to forge a login session by recording a legitimate one and running the recording later on.
There are many hardware and software solutions to address the above Ethernet LAN security issues:
Hardware Solutions for Ethernet LAN Security
  • Use a switched network: A switch can segregate a network into many parts which can effectively preventing snooping and sniffing on a network. These switches also reduce network traffic by limiting messages to only the parts of the network on which they are needed to improve the efficiency of the whole network.
  • Bridges and Routers: Bridges and routers are electronic filters which only pass a network message through themselves if the destination lies on the other side of the filter. Consequently if "the snooper" is on one side of a bridge or router they will not see any traffic passing between computers on the other side of the filter.
  • Lan Security Architecture (LSA): a proprietary technique where twisted pair hubs inspect incoming messages and will only transmit them unscrambled to the destination computer. All other computers on the hub receive scrambled messages.
Software Solutions for Ethernet LAN Security
  • Encryption: Encrypting the data passing between your computer and its destination. There are many encryption technologies and product available which effective protect information and data privacy. The popular encryption methods used are PGP (Pretty Good Privacy).
  • Authentication: Use user name and password to authenticate users. It is necessary to encrypt the password and implement timestamps making forgery extremely difficult.
  • Combination technologies: Many new technologies are available which doing both authentication and encryption. One of such technologies is Kerberos which uses tokens, timestamps, tickets and encryption to make transactions between computers secure.
Many n etwork security technologies at the layer 3 (the network layer) can also be deployed to address the Layer 2 (Ethernet layer) security vulnebilities.


Read more: CS610 GDB Solution & Discussion Last Date:24-01-2012 - Virtual University of Pakistan http://vustudents.ning.com/group/cs610computernetwork/forum/topics/cs610-gdb-solution-discussion-last-date-24-01-2012#ixzz1k4ifzuHP

CS606 Assignment 5 solution fall 2011


Question Statement:                                                                        [20]
How the Arabic parsing investigated by comparing the lexicalised and unlexicalised parsers? What is the relation of ATB, SBJ, OBJ and PRD functional tags in this parsing?


Arabic Penn Treebank (ATB):
The Penn Arabic Treebank (Maamouri and Bies 2004) is
a corpus of 23,611 parse-annotated sentences from Arabic
newswire text in Modern Standard Arabic (MSA). The ATB
is a fine-grained corpus, its annotation includes 22 phrasal
tags, 20 individual functional tags and 24 basic POS-tags1
(with a total of 497 different POS tags with morpholog-
ical information). In addition, the ATB involves empty
nodes to capture pro-drop as well as non-local dependen-
cies (NLDs). The full POS tagset with morphological in-
formation indicates case, mood, gender, definiteness, etc.

The ATB
treebank contains a set of labels (called functional
tags or functional labels) associated with func-
tional information, such as
-SBJ for ‘subject’ and
-OBJ for ‘object’
-PRD for predicate


Read more: CS606 Assignment 5 solution - Virtual University of Pakistanhttp://vustudents.ning.com/group/cs606compilerconstruction/forum/topics/cs606-assignment-5-solution#ixzz1k4i7NSew

CS601 GDB Solution & Discussion Fall 2011


“Both TCP/IP model and OSI model work in a very similar fashion. But they do have very slight differences too. Knowing these differences is very important in learning computer networking. In your point of view which model is best regarding usage and why? Discuss it.”

A concise, coherent and to the point comment is preferred over lengthy comment having irrelevant details. Your comment must not be more than 8-10 lines. Comments, posted on regular Lesson's MDB or sent through email will NOT be considered in any case. Any request about such an acceptance will not be catered

Assignment No. 4 Of MTH202 (Fall 2011)


Assignment No. 4 Of  MTH202 (Fall 2011)


                                                                                              Maximum Marks: 20                                                                                      
                                                                                                     Due Date: Jan 27, 2012

DON’T MISS THESE: Important instructions before attempting the solution of this assignment:
  • Don’t miss any step to get full marks.
  • To solve this assignment, you should have good command over 31-39 lectures.
  • Try to get the concepts, consolidate your concepts and ideas from these questions which you learn in the 31 to 39 lectures.
  • Upload assignments properly through LMS, No Assignment will be accepted through email.
  • Write your ID on the top of your solution file.
  • Don’t use colorful back grounds in your solution files.
  • Use Math Type or Equation Editor etc for mathematical symbols.
  • You should remember that if we found the solution files of some students are same then we will reward zero marks to all those students.
  • Try to make solution by yourself and protect your work from other students, otherwise you and the student who send same solution file as you will be given zero marks.
  • Also remember that you are supposed to submit your assignment in Word format any other like scan images, PDF etc will not be accepted and we will give zero marks correspond to these assignments.

Question 1                                                                                                            Marks 10

Four missiles are fired at a target. If the probabilities of hitting the target are 0.3, 0.4, 0.5 and 0.6 respectively and if the missiles are fired independently then what will be the probability
i)                    That all the missiles hit the target?
ii)                   That at least one of the four hits the target?
iii)                 That exactly one hits the target?
iv)                 That exactly 2 hit the target?
    







                                                            
Question 2                                                                                                            Marks 10

Find the vertex set, the number of edges, the degree of each vertex, total degree of the graph and verify handshaking theorem for the given graph


Assignment # 5 CS 506 Web Design & Developmentent fall 2011


Paper_template.doc
Title of your chosen term paper for CS506
(Write your own title)
Your Name, VU ID, Study Program, Semester, Email address, cell number
Abstract—These instructions give you guidelines for preparing papers for IEEE TRANSACTIONS and JOURNALS. Use this document as a template if you are using Microsoft Word 6.0 or later. Otherwise, use this document as an instruction set. The electronic file of your paper will be formatted further at IEEE. Define all symbols used in the abstract. Do not cite references in the abstract. Do not delete the blank line immediately above the abstract; it sets the footnote at the bottom of this column.

Index Terms — about four key words or phrases in alphabetical order, separated by commas. For a list of suggested keywords, send a blank e-mail to keywords@ieee.org or visit http://www.ieee.org/documents/2009Taxonomy_v101.pdf


I.     INTRODUCTION

T
HIS document is a template for Microsoft Word versions 6.0 or later. If you are reading a paper or PDF version of this document, please download the electronic file,
TRANS-JOUR.DOC, from the IEEE Web site at http://www.ieee.org/web/publications/authors/transjnl/index.html so you can use it to prepare your manuscript. If you would prefer to use LATEX, download IEEE’s LATEX style and sample files from the same Web page. Use these LATEX files for formatting, but please follow the instructions in TRANS-JOUR.DOC or TRANS-JOUR.PDF.
If your paper is intended for a conference, please contact your conference editor concerning acceptable word processor formats for your particular conference.
When you open TRANS-JOUR.DOC, select “Page Layout” from the “View” menu in the menu bar (View | Page Layout),

which allows you to see the footnotes. Then, type over sections of TRANS-JOUR.DOC or cut and paste from another document and use markup styles. The pull-down style menu is at the left of the Formatting Toolbar at the top of your Word window (for example, the style at this point in the document is “Text”). Highlight a section that you want to designate with a certain style, then select the appropriate name on the style menu. The style will adjust your fonts and line spacing. Do not change the font sizes or line spacing to squeeze more text into a limited number of pages. Use italics for emphasis; do not underline.
To insert images in Word, position the cursor at the insertion point and either use Insert | Picture | From File or copy the image to the Windows clipboard and then Edit | Paste Special | Picture (with “float over text” unchecked).
IEEE will do the final formatting of your paper. If your paper is intended for a conference, please observe the conference page limits.

II.     litrature review

A literature review is a body of text that aims to review the critical points of current knowledge including substantive findings as well as theoretical and methodological contributions to a particular topic. Literature reviews are secondary sources, and as such, do not report any new or original experimental work.
Most often associated with academic-oriented literature, such as a thesis, a literature review usually precedes a research proposal and results section. Its ultimate goal is to bring the reader up to date with current literature on a topic and forms the basis for another goal, such as future research that may be needed in the area.
A well-structured literature review is characterized by a logical flow of ideas; current and relevant references with consistent, appropriate referencing style; proper use of terminology; and an unbiased and comprehensive view of the previous research on the topic.

III.     Problem statement

A problem statement is a clear concise description of the issue(s) that need(s) to be addressed by a problem solving team. It is used to center and focus the team at the beginning, keep the team on track during the effort, and is used to validate that the effort delivered an outcome that solves the problem statement.

IV.     Purposed solution

Describe your solution in a sentence or two as an introduction to the paragraph. Then flesh out the paragraph with more details.
The first step in writing a proposed solution essay is to ensure that you are familiar with the problem that the proposal is addressing. This is critical when building an argument as to solution that you will be presenting is the correct solution. Understanding the nature of the problem will also help you in formulating and organizing the proposed solution.
Next in writing a proposal essay is to gather information that will help you convince the reader that the proposed solution is the correct one. The writing must take the reader from understanding the problem to accepting that the solution proposed by you is the correct solution.

V.     Conclusion

Although a conclusion may review the main points of the paper, do not replicate the abstract as the conclusion. A conclusion might elaborate on the importance of the work or suggest applications and extensions.
Acknowledgment
The preferred spelling of the word “acknowledgment” in American English is without an “e” after the “g.” Use the singular heading even if you have many acknowledgments.
References
[1]     G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),”   in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
[2]     W.-K. Chen, Linear Networks and Systems (Book style).  Belmont, CA: Wadsworth, 1993, pp. 123–135.
[3]     H. Poor, An Introduction to Signal Detection and Estimation.   New York: Springer-Verlag, 1985, ch. 4.
[4]     B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
[5]     E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.
[6]     J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.
[7]     C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.



Read more: Assignment # 5 CS 506 Web Design & Development - Virtual University of Pakistan http://vustudents.ning.com/group/cs506webdesignanddevelopment/forum/topics/assignment-5-cs-506-web-design-development#ixzz1k0mos9BH