Pages

Tuesday, June 30, 2009

DOWNLOAD --- OLD PAPERS / PAST PAPERS

Dear Students,



Thanks to visit us.



Please download OLD PAPERS/PAST PAPERS from the following links:


__________________________________



http://www.2shared.com/file/6507910/93e8a9d9/ACC501_-_BUSINESS_FINANCE_.html

http://www.2shared.com/file/6507916/7a8b0cec/CS601_past_papers.html

http://www.2shared.com/file/6507918/9d3321eb/CS602_past_papers.html

http://www.2shared.com/file/6507933/38d79ae1/CS604_Past_Papers.html

http://www.2shared.com/file/6507934/a6b30f42/CS607_Past_Papers.html

http://www.2shared.com/file/6507935/d1b43fd4/CS609_Past_Papers.html

http://www.2shared.com/file/6507940/ee9f5d9c/CS610_Past_Papers.html

http://www.2shared.com/file/6507945/9ef5a913/CS614_Past_Papers.html

http://www.2shared.com/file/6507946/7fcf8a9/CS615_Past_Papers.html

http://www.2shared.com/file/6507955/87ee9852/ECO401_Past_Papers.html

http://www.2shared.com/file/6507960/dca93f1e/ENG101_Past_Papers.html

http://www.2shared.com/file/6507962/32a75e32/ENG201_Past_Papers.html

http://www.2shared.com/file/6507963/45a06ea4/ENG301_Past_Papers.html

http://www.2shared.com/file/6507965/acc3cb91/FIN622_Past_Papers.html

http://www.2shared.com/file/6507982/ac2473bc/CS302-Digital_Logic_Design.html

http://www.2shared.com/file/6507989/3bf6aa34/CS403_past_papers.html

http://www.2shared.com/file/6508023/767e8079/CS501_past_papers.html

http://www.2shared.com/file/6508187/8a3ec6dd/CS602_past_papers.html

http://www.2shared.com/file/6508190/d41623f/CS604_Past_Papers.html

http://www.2shared.com/file/6508192/e34f0313/CS605_Past_Papers.html

http://www.2shared.com/file/6508193/94483385/CS606_Past_Papers.html

http://www.2shared.com/file/6508199/749dda9b/CS607_Past_Papers.html

http://www.2shared.com/file/6508200/dec5672f/CS609_Past_Papers.html

http://www.2shared.com/file/6508207/40a1f28c/CS610_Past_Papers.html

http://www.2shared.com/file/6508208/d01eef1d/CS614_Past_Papers.html

http://www.2shared.com/file/6508209/a719df8b/CS615_Past_Papers.html

http://www.2shared.com/file/6508210/c7de566e/ECO401_Past_Papers.html

http://www.2shared.com/file/6508212/29d03742/ECO402_Past_Papers.html

http://www.2shared.com/file/6508215/b7b4a2e1/ENG101_Past_Papers.html

http://www.2shared.com/file/6508216/2ebdf35b/ENG201_Past_Papers.html

http://www.2shared.com/file/6508218/c905de5c/ENG301_Past_Papers.html

http://www.2shared.com/file/6508220/ecf305ad/FIN622_Past_Papers.html

http://www.2shared.com/file/6508221/9bf4353b/FIN623_Past_Papers.html

http://www.2shared.com/file/6508222/2fd6481/ISL201_Past_Papers.html

http://www.2shared.com/file/6508224/eb9ec1b4/IT430_Past_Papers.html

http://www.2shared.com/file/6508225/9c99f122/MCM301_Past_Papers.html

http://www.2shared.com/file/6508227/7297900e/MCM404_Past_Papers.html

http://www.2shared.com/file/6508229/952fbd09/MGMT623_Past_Papers.html

http://www.2shared.com/file/6508233/6ce16556/MGT101_Past_Papers.html

http://www.2shared.com/file/6508234/f285f0f5/MGT111_Past_Papers.html

http://www.2shared.com/file/6508237/6b8ca14f/MGT201_Past_Papers.html

http://www.2shared.com/file/6508238/fb33bcde/MGT301_Past_Papers.html

http://www.2shared.com/file/6508239/8c348c48/MGT401_Past_Papers.html

http://www.2shared.com/file/6508243/23a0f391/MGT402_Past_Papers.html

http://www.2shared.com/file/6508246/53ca071e/MGT411_Past_Papers.html

http://www.2shared.com/file/6508248/b4722a19/MGT501_Past_Papers.html

http://www.2shared.com/file/6508250/a3b2936a/MGT502_Past_Papers.html

http://www.2shared.com/file/6508328/e3eae7a8/MGT503_Past_Papers.html

http://www.2shared.com/file/6508329/94edd73e/MGT510_Past_Papers.html

http://www.2shared.com/file/6508334/f3479ac2/MGT601_Past_Papers.html

http://www.2shared.com/file/6508338/faf1d6e9/MGT602_Past_Papers.html

http://www.2shared.com/file/6508340/bb6bc81c/MKT501_Past_Papers.html

http://www.2shared.com/file/6508342/5565a930/MTH101_Past_Papers.html

http://www.2shared.com/file/6508344/bc060c05/MTH202_Past_Papers.html

http://www.2shared.com/file/6508346/52086d29/MTH401_Past_Papers.html

http://www.2shared.com/file/6508350/a270f95d/MTH601_Past_Papers.html

http://www.2shared.com/file/6508351/d577c9cb/MTH603_Past_Papers.html

http://www.2shared.com/file/6508352/4c7e9871/PAK301_Past_Papers.html

http://www.2shared.com/file/6508354/a51d3d44/PSY101_Past_Papers.html

http://www.2shared.com/file/6508356/4b135c68/PSY502_Past_Papers.html

http://www.2shared.com/file/6508358/acab716f/STA301_Past_Papers.html

http://www.2shared.com/file/6508359/dbac41f9/STA630_Past_Papers.html



BEST OF LUCK



VU Help Desk..

Friday, June 26, 2009

Handouts + Old Papers + Old Assignments Solutions

Dear students,

Thanks to visit us.

It is to inform you that due to some technical problems, some uploaded data is not working properly, thats why students facing problem when they try to download the data.

DONT WORRY, we are sorting out the problem and hopefully very soon will provide you updated material without any error.

Inconvenience regretted please.

Thanks for your continuous appreciation.

Keep visiting us and BEST OF LUCK for your EXAMS.

VU Help Desk..

Eng 301 - Assignment 5 Solutions by VUsolutions

Question No.1

1. “It is the instrument which enables manufacturers, producers, retailers and consumers to obtain goods at a time when they can be used or sold even if ready cash is not available.” Match the statement with one of the following.

Correct option
b) Credit letter

2. Collection letter must be:

Correct option
b) Demanding

3. The purpose of a_______ letter is to get money, to keep the customer and future business and to build goodwill.

Correct option
c) Collection

4. CSP stands for:

Correct option
b)Central Selling Point

5. According to Psychologists, 50 percent of an interview’s decision is made within how many seconds?

Correct option
c) 30 to 60 seconds



Question No.2

What is five W and one H approach?

The five W's (who, what, when, where and why) and one H (how) are used to understand the system in the analysis and design phases.

1. What - Understanding the Concept
It helps improve the performance of an organization by reducing the variations in the services and products and providing good quality products. It is a tool to improve the efficiency and the effectiveness of the organization.

2. Why - The Objective of the Project
Achieving Six Sigma is the objective of the project. It means that the goal is to improve the processes and products to the extent of delivering defect free products and services. It requires listening to internal and external customers of the process to bring about the best product, which meets customer requirements.

3. Who - The People Involved
Six Sigma requires the involvement of all members of the organization, from the senior management to those in charge of the processes. Top management decides and appoints sponsors, who in turn will select the Champions, Master Black Belts, Black Belts and Green Belts.

4. Where - Location for Implementation
Six Sigma is applied to all processes of the business. Initially, it can be aimed at a strong problem area, but with the advantages of the project visible to everyone, it can be implemented in all the processes and products as well.
The entire organization will thus undergo a change to ensure increased profits due to improved quality and customer satisfaction.

5. When - When to Apply Six Sigma
Initially, Six Sigma can be applied to problem areas where customer satisfaction is lacking. It can be applied when the need is felt to improve and retain the organization's leadership position in the industry, as well as market share.

6. How - How to Apply Six Sigma
Six Sigma projects are aimed at improving existing processes and eliminating the defects using the DMAIC roadmap. They can also achieve success by bringing about an entire process redesign or new product development using the DFSS roadmap. Process management is useful when existing process improvements need to be sustained.

Wednesday, June 24, 2009

CS201- Introduction to Programming Solution

Problem Statement:

Write a c++ program which consists of two classes:

1. Date

2. Student

First class Date should contain three data members:

Day

Month

Year

Date also contain following member functions:

Setter function

Getter function

showdate()



Now second class Student should have following three data members:

ST_ID

Name

Ad_date

Where ID and Name are char pointer while Ad_date (Date of Admission) is of type Date.



Student class should contain two member functions:

Display()

setdate()

Now in main function create an object of Class Student and call the member functions with it.

=========================================================

Sample output:



Name: Ali

ID: BC020400000

Admission Date: 12-08-2008



==========================================================





__________________________________________



SOLUTION:



// header file section


#include

#include

using namespace std;



class Date

{

public: int day;

int month;

int year;



public://Constructor

Date()

{

day=0;

month=0;

year=0;

}

//Member function declaration

//Mutator functions

void setDay(int);

void setMonth(int);

void setYear(int);

//Accessor functions

int getDate();

int getMonth();

int getYear();

//show date function

void showDate();

}

//member function definitions



void Date::setDate(int d)

{

//input validation

if (d<1>31)

{

cout<<"Invalid month please reenter it";

cin>>d;

}//end if

day=d;

}//end set day



void Date::setMonth(int m)

{

//input validation

if(m<1>12)

{

cout<<"invalid month please reenter it";

cin>>m;

}//end if

month=m;

}//end set month



void Date::setYear(int y)

{

year=y;

}//end set year



int Date::getDay()

{

return day;

}//end get day



int Date::getMonth()

{

return month;

}//end get month



int Date::getYear()

{

return year;

}//end get year



void Date:: showDate()

{

cout<

}

class Student

{

public:

char *ST_ID;

char *Name;

Date Ad_date;

public:

student()

{

Name=new char[20];

ST_ID=new char[10];

cout<<"Enter name:";

cin.getline(Name,20);

cout<<"Enter ID:";

cin.getline(ST_ID,10);

}

void setdate()

{

cout<<"Enter Day:";

cin>>Ad_date.day;

cout<<"Enter Month:";

cin>>Ad_date.month;

cout<<"Enter Year:";

cin>>Ad_date.year;

}

void Display()

{

cout<<"Name:"<

cout<<"ID:"<

cout<<"Admission Date:";

Ad_date.showDate();

}

};

main()

{

object.setDate();

object.display();

//pause system for a while

system("pause");

}//end main

Tuesday, June 23, 2009

Past Papers for all MS & BS levels

www.VUsolutions.blogspot.com
ACC501 - Business Finance
Download

www.VUsolutions.blogspot.com
CS101 - Introduction to Computing
Download

www.VUsolutions.blogspot.com
CS301 - Data Structures
Download

www.VUsolutions.blogspot.com
CS302 - Digital Logic Design
Download

www.VUsolutions.blogspot.com
CS304 - Object Oriented Programming
Download

www.VUsolutions.blogspot.com
CS402 - Theory of Automata
Download

www.VUsolutions.blogspot.com
CS403 - Database Management Systems
Download

www.VUsolutions.blogspot.com
CS408 - Human Computer Interaction
Download

www.VUsolutions.blogspot.com
CS501 - Advance Computer Architecture
Download

www.VUsolutions.blogspot.com
CS502 - Fundamentals of Algorithms
Download

www.VUsolutions.blogspot.com
CS504 - Software Engineering – I
Download

www.VUsolutions.blogspot.com
CS506 - Web Design and Development
Download

www.VUsolutions.blogspot.com
CS508 - Modern Programming Languages
Download

www.VUsolutions.blogspot.com
CS601 - Data Communication
Download

www.VUsolutions.blogspot.com
CS602 - Computer Graphics
Download

www.VUsolutions.blogspot.com
CS604 - Operating Systems
Download

www.VUsolutions.blogspot.com
CS605 - Software Engineering-II
Download

www.VUsolutions.blogspot.com
CS606 - Compiler Construction
Download

www.VUsolutions.blogspot.com
CS607 - Artificial Intelligence
Download

www.VUsolutions.blogspot.com
CS609 - System Programming
Download

www.VUsolutions.blogspot.com
CS610 – Computer Network
Download

www.VUsolutions.blogspot.com
CS614 – Data Warehousing
Download

www.VUsolutions.blogspot.com
CS615 – Software Project Management
Download

www.VUsolutions.blogspot.com
ECO401 - Economics
Download

www.VUsolutions.blogspot.com
ECO402 - Microeconomics
Download

www.VUsolutions.blogspot.com
ENG101 - ENGLISH COMPREHENSION
Download

www.VUsolutions.blogspot.com
ENG201 - Business and Technical English Writing
Download

www.VUsolutions.blogspot.com
ENG301 - Business Communication
Download

www.VUsolutions.blogspot.com
FIN622 - Corporate Finance
Download

www.VUsolutions.blogspot.com
FIN623 - Taxation Management
Download

www.VUsolutions.blogspot.com
ISL201 - ISLAMIC STUDIES
Download

www.VUsolutions.blogspot.com
IT430 – Commerce
Download

www.VUsolutions.blogspot.com
MCM301 - Communication skills
Download

www.VUsolutions.blogspot.com
MCM404 - Globalization of Media
Download

www.VUsolutions.blogspot.com
MGMT623 - Leadership & Team Management
Download

www.VUsolutions.blogspot.com
MGT101 - Financial Accounting
Download

www.VUsolutions.blogspot.com
MGT111 - Introduction to Public Administration
Download

www.VUsolutions.blogspot.com
MGT201 - Financial Management
Download

www.VUsolutions.blogspot.com
MGT301 - Principles of Marketing
Download

www.VUsolutions.blogspot.com
MGT401 - Financial Accounting II
Download

www.VUsolutions.blogspot.com
MGT402 - Cost & Management Accounting
Download

www.VUsolutions.blogspot.com
MGT411 - Money & Banking
Download

www.VUsolutions.blogspot.com
MGT501 - Human Resource Management
Download

www.VUsolutions.blogspot.com
MGT502 - Organizational Behaviour
Download

www.VUsolutions.blogspot.com
MGT503 - Principles of Management
Download

www.VUsolutions.blogspot.com
MGT510 - Total Quality Management
Download

www.VUsolutions.blogspot.com
MGT601 - SME Management
Download

www.VUsolutions.blogspot.com
MGT602 - Entrepreneurship
Download
www.VUsolutions.blogspot.com

MKT501 - Marketing Management
Download
www.VUsolutions.blogspot.com

MTH101 - Calculus And Analytical Geometry
Download
www.VUsolutions.blogspot.com

MTH202 - Discrete Mathematics
Download
www.VUsolutions.blogspot.com

MTH401 - Differential Equations
Download
www.VUsolutions.blogspot.com

MTH601 - Operations Research
Download
www.VUsolutions.blogspot.com

MTH603 - Numerical Analysis
Download
www.VUsolutions.blogspot.com

PAK301 - Pakistan Studies
Download
www.VUsolutions.blogspot.com

PSY101 - Introduction to Psychology
Download
www.VUsolutions.blogspot.com

PSY502 - History & Systems of Psychology
Download
www.VUsolutions.blogspot.com

STA301 - Statistics and Probability
Download
www.VUsolutions.blogspot.com

STA630 - Research Methods
Download
www.VUsolutions.blogspot.com

Download Handouts + Old Papers + old Assignments

.

-----------------Past Papers----------------

IT430 papers
Download

Eco-401
Download

Human Relation HRM-611
Download

Conflict Management HRM-624
Download

Research Method (STA-630)
Download

Business Communication
Download

Cost and Management Accounting
Download

Economics
Download

Financial Management
Download

Money and Banking
Download

Organizational Behaviour
Download


----------------Assignments-------------

CS-507
Download

E-Commerece
Download

Eco-401
Download

Human Relation HRM-611
Download

Research Method STA-630
Download

Conflict Management HRM 624
Download

----------------Handouts----------------

CS-507
Download

Research Method
Download

Strategic Management
Download

Financial Statement Analysis (Fin-612)
Download

Conflict Management
Download

Human Relation
Download

Marketing Management (Mkt-501)
Download

E-Commerce(IT-430)
Download

Production and Operations Management (Mgt-613)
Download

Economics (Eco-401)
Download

Human Resource Management (Mgt-501)
Download

Eng 301 - Assignment 4 Solutions by VUsolutions

SOLUTION # 1

ENG301 (Business Communication)
Spring 2009
Assignment # 4 Total Marks: 20
Objectives:
To asses students’ knowledge of the subject and to motivate them towards conceptual knowledge and practical application of the subject.
Question No.1 (10)
Write a detailed note on resume in general from employer’s point of view.

Answer

Despite their terrific academic success, many well-qualified candidates lack the confidence to write their own professional resume. Some are unsure how to market themselves, while others have difficulty quantifying their professional achievements. Many job hunters brainstorm for weeks, only to produce a vague first draft that doesn't convey their unique strengths and talents.

For these candidates, we offer comprehensive, start-to-finish assistance through all phases of the resume and cover letter writing process. We will collect relevant personal information about you and organize a resume that markets your unique strengths and accomplishments.
Our writers are all Ivy League graduates with 20 + years experience in human resource management. We know how to draft a resume and cover letter from the employer's point of view, emphasizing the skills and talents essential in a competitive marketplace. Your carefully crafted resume will generate an enthusiastic response in the typical 15 - 30 second screening period.
For one low price, clients will receive:
1) a well-designed resume that showcases your marketable skills
2) a personalized cover letter
3) a post-interview thank you letter



Question No.2 Describe dos and don’ts of writing an effective cover letter.

Answer (2)

Most people are familiar with the importance of a well-constructed resume, and put a fair amount of time into creating one. But just as important is the cover letter that accompanies and introduces your resume
In an extremely competitive job market, neglecting your cover letter is a big mistake. Why? A cover letter is your first opportunity to tell a prospective employer about yourself, and to do so in your own words. Like a written interview, a cover letter gives you the opportunity to point out applicable experience and qualities that make you right for the job. And just like any other important job searching tool, there are definite dos and don'ts to follow to make sure your cover letter is an asset, not a hindrance.

Do personalize your letter.
Nobody likes to receive impersonal mail. Cover letters that begin with phrases like "To Whom it May Concern," sound like random junk or bulk mail, rather than an important correspondence. You expect the company to take the time to read through your material, so you too need to take some time to research the correct addressee. Call the company, look on its Web site or talk to others to find the correct contact.

Don't send a generic cover letter to many different companies.
Hiring managers can spot a mass mailing a mile away. What gets their attention are letters that address the company -- and its needs -- specifically. Research the company prior to writing the letter. Check out recent news and read through the company's Web site, and then incorporate what you learned into your letter. Doing so will demonstrate to employers that you are informed, motivated and willing to go the extra mile.

Do address the specific position advertised.
Companies that post openings are making your life easier by telling you the qualities they are seeking. Show the company that you paid attention. If a company advertises that it is looking for sales experience, make sure you address your sales experience. One way to do this is by making a table for yourself before writing your letter. List the company's stated needs in one column, and your corresponding experience and qualifications in another column. You can then use that information to write a letter that tells them exactly what they want to know.

Don't make the reader work too hard to see that you are right for the position.
Include specific examples about your past successes and experience. If you are looking for a marketing position, give the reader detailed information about a marketing campaign you successfully executed. Don't just tell the reader that you are motivated. Give an example that shows your motivation. You need to lay all of your pertinent information out in a way that lets the person making the hiring decision easily see how your experience and qualities fit the company's needs.

Do get to the point.
Hiring managers receive letters and resumes from dozens and even hundreds of applicants, and often just don't have the time to read lengthy, wordy letters. Be direct. In the first paragraph, include the title of the position you are interested in and then move on to your specific qualifications immediately.
(b)
What do you know about methods of negotiation? Comment on each briefly. (5)

ANSWER

Negotiation is crucial in all organisations and in virtually every aspect of life. In essence, negotiating is deciding what to agree on and persuading the other party to agree. In order to decide and persuade, you need to gather the right information and determine what is of highest value and what is of lowest cost to both you and the other side. Often standard approaches fail and innovative thinking is required. Once made, agreements must be implemented and enforced to succeed. These five skills – information-gathering, rational decision-making, persuasion, innovation, and implementation – constitute the negotiator’s tool kit. We also include a session on ethics in negotiation, an element which we believe to be critically important to building trust among negotiators.
This programme, over five days at Oxford’s Saïd Business School, is designed to develop and strategically orchestrate these five skills, and to help you realise your full potential as a negotiator, enabling you effectively to reach agreements and resolve disputes. Past participants have included a rich mix of senior people from the public and private sectors.
Please feel free to contact me directly if you have questions about the programme.

/////////////////////////////////////////////////
SOLUTION # 2

Question No.1


Write a detailed note on resume in general from employer’s point of view.
A resume is an outline of your accomplishments that contains the strengths and enthusiasms that make you a unique individual. So you must decide what to include and what format to use keeping in mind the employer’s point of view that how can your resume depict the information what the employer wants.

From employer’s point of view:
• What can you do for me? The most effective way to show employers the value you offer is to show them how you've contributed to an employer's success elsewhere. Examples must be specific, measurable accomplishments that cite numbers and other details.

• Do you have the skills I'm looking for? Scan job ads and job descriptions to discover which skills are most relevant to the employers and recruiters receiving your resume. Then strategically place them throughout your résumé to ensure it makes it past computer scans and into the hands of employers and recruiters.

• Where have you worked before? Employers want to know where you worked, for how long and which job titles you've held that may indicate how prepared you are for a role at their organization.

• Is your experience relevant to my needs? Sometimes it's necessary to expand upon a job title or job description to truly demonstrate that you have experience that applies to the job you're seeking. Consider using bullets to present brief and interesting information that is relevant to the employer.

• Do you have the right education and credentials? If you have the education, credentials and training needed to qualify for the job, be sure to say so! Use commonly accepted terminology and keywords in this section to ensure your information isn't misinterpreted or overlooked by employers or resume scanners.

• What kind of person are you? "Adding insightful information about what makes you special can be a definite plus on your resume and help decision-makers discriminate between you and another candidate, even before you've met in person. Include "extras," such as a branding statement and relevant information about foreign languages you speak, computer proficiencies, etc.

• Do I see any "red flags" in your background? Gaps in employment (an indication of job hopping), spending too much time in the same job or resume errors may alert employers and recruiters that you are not the type of candidate they're looking for in their organization. To avoid drawing attention to "red flags" on your resume, make sure you make your accomplishments and skills stand out as strongly as possible.

• Can I easily get in touch with you? After all you’re hard work in putting together a powerful resume, don't forget the essentials! It doesn't matter how great your resume is, if you don't include a phone number, address and e-mail address somewhere on the resume, you'll never hear from the employer or recruiter.

One of the most important factors that employers weigh heavily is maturity. Employers will also want to know whether or not you have a professional demeanor. Your professionalism is something you need to prove to employers as soon as you contact their firm. Proving you can do a certain job is not enough? Companies, especially those hiring for management training programs, also want to see that you are going to grow within the company. What's more, you will have to project the image of a business-oriented person by showing an interest in the industry and in the business world in general. To be sure, employers also want to see that you can perform the job.

Question No.2

(a) Describe dos and don’ts of writing an effective cover letter.

Here are the keys to writing successful and dynamic cover letters. Follow these simple rules and we should achieve success in this important phase of job-hunting.

Dos for writing an effective cover letter:

• Address your letter to an appropriate individual with hiring power.

• Use simple language and uncomplicated sentence structure. Ruthlessly eliminate all unnecessary words. Follow the journalist's credo: Write tight!

• Write cover letters that are unique and specific to you.

• Keep your letter brief. Never, Never more than one page and it's best to keep it well under a full page. Each paragraph should have no more than one to three sentences.

• Tell the employer how you can meet his or her needs and contribute to the company.

• Distinguish your cover letter from those of other job-seekers by quantifying and giving examples that amplify and prove the claims you make in your letter.

• Try to answer the question that the employer will be asking while reading your letter:

• Avoid negativity. Negativity never has a place in a cover letter.

• Be sure the potential employer can reach you..

• Use e-mailed cover letters, but keeps them shorter and more concise.

Don’ts of writing an effective cover letter:

• Don't ever send your resume without a cover letter.

• Don't use a sexist salutation, such as "Gentlemen" when answering a blind ad.

• Don't waste your first paragraph by writing a boring introduction. Use the first paragraph to grab the employer's attention, give the employer the reasons you are qualified for the position.

• Don't use such clichés as "Enclosed please find my resume" or "As you can see on my resume enclosed here with." Employers can see that your resume is enclosed; they don't need you to tell them. Such trite phrases just waste precious space. And don’t use wordy phrases, which also waste space.

• Don't depend on the employer to take action. Request action. Request an interview, and tell the employer when you will follow up to arrange it. Then, Do So. It is imperative that you follow up. You will greatly increase your chances of getting interviews if you call the employer after writing instead of sitting back and waiting for a call. Those who wait for the employer to call them will generally have a long wait indeed.

• Don't send a cover letter that contains any typos, misspellings, incorrect grammar or punctuation, smudges, or grease from yesterday's lunch.

• Don't rehash your resume. You can use your cover letter to highlight the aspects of your resume that are relevant to the position, but you're wasting precious space -- and the potential employer's time -- if you simply repeat your resume.

• Don't forget to personally sign the letter, preferably in blue ink.

**********************************************

(b) What do you know about methods of negotiation? Comment on each briefly. (5)

Negotiating methods

In the negotiating process, the parties involved may choose one of five different negotiation methods. A skilful negotiator is able to identify them and recognize which one is being used by the other person.

1. Compromise
2. Collaboration
3. Competition
4. Accommodation
5. Withdrawal or avoidance

Compromise
It means to settle differences through concessions made by one or both parties and to arrive at expedient solutions under time pressure; and as a backup when collaboration or competition is unsuccessful. A compromise usually produces win-win or win-lose results. When the settlement meets the needs and goals of both parties (win-win), both are satisfied with the outcome. When the solution meets the needs and goals of only one party (win-lose), the other party is dissatisfied with the outcome.

Collaboration

It means to find an integrative solution when both sets of concerns are too important to be compromised; when your objective is to learn; to merge insights from people with different perspectives; to gain commitment by incorporating concerns into a consensus; and to work through feelings that have interfered with a relationship. On the other hand, it is time-consuming and demands good negotiating skills on each side.

Competition

Often leads to one party gaining advantage over the other, if it can negotiate at the expense of the other’s needs. Since the competitive approach usually produces a win-lose result, it is bad for personal relationships. The solution is likely to be temporary as there is no commitment from the losing party, so the problem will occur again. It also leaves the losing side in a difficult situation.

Accommodation

Means that only one party is willing to oblige or adapt to meet the needs of the other. It produces a win-lose outcome. However, this method is useful for negotiating on minor matters. The result can go one way or the other. It is suitable if the accommodating party does not really care about the loss.
However, the negotiating parties may not bother to look for creative solutions. With this negotiations method, points of view are easily swayed.

Withdrawal or avoidance

Withdrawal (avoidance) is a negotiation method that makes both parties lose, because one party retracts their point of view or backs away form the situation. Such dissatisfaction may lead to conflict in the future. The choices you make are influenced by the context in which you negotiate and by your range of personal communication and negotiation skills.

IT430 - Ecommerce Assignment solution

Question : [10 Marks]
“In strategy assessment phase, you can learn from your mistakes and do your future planning”. Do you agree or not? Justify your reply precisely.

Can you provide a real world example taken form any reputed organization or at government level, in which a long term strategic plan was formulated? assessed
(Whether strategy was delivered?) and found many issues in it, they again formulate a new strategy or set of strategies in light of the company’s main objective or its mission
_____________________
In strategy assessment phase, you can learn from your mistakes and do your future planning. Because, for the strategy assessment, you can conduct surveys, collect information and receive feedback from different groups of people coming from a variety of background. Using this information we can identity the problems and try to remove them by taking some preventive measures. Some of these corrective measures can be used further to properly train the team.


For any company the strategic planning process is done in three stages
1. Where are we and who are we?
Before doing anything, we have to have a thorough understanding our company’s potential and the environment that surrounds us.
2. Where do we want to be?
The second point we must define is what we want to do in the international market. We will therefore set the strategic objectives we intend to achieve in each market.
3. How are we going to get there?
Once we have decided where we want to go and what we want to do, we will have to study how to do it.
In addition to this company’s goals and policies must be kept in mind while developing the strategic plan for a company.
Now by various surveys done by meeting people or through a questionnaire or some other means like discussions in forums, blogs etc., the feedback will be known. Depending on the results obtained we should have a new understanding of the challenges we need to overcome. We should now have greater insights into the problems that are being faced and the events and issues behind them.
Hope this will help you to build and assess a strategy plan for a company !!!

Saturday, June 20, 2009

CS302 - Solution

Dear students,

download assignment from the following link:

http://www.2shared.com/file/6384737/c1b874c0/cs302.html

Best of Luck

VU Help Desk..
www.vusolutions.blogspot.com

Friday, June 19, 2009

CS507 Assignment # 6's Solution

MUST CHANGE IT IN YOUR OWN WORD ___ AS EVERYONE (almost 8000 students) COPIED FROM THIS SITE



VU Help Desk..

www.vusolutions.blogspot.com

______________________________________________

Question # 1



Five major phases to control over the attacks on your online business as follows:



A secure system ensures the confidentiality of data. This means that it allows individuals to see only the data that they are supposed to see. Confidentiality has several different aspects:

  • Privacy of Communications
  • Secure Storage of Sensitive Data
  • Authenticated Users
  • Granular Access Control
  • Authentication Oracle Standard Edition,
  • Oracle Enterprise
  • Edition: Passwords,
  • Password management
  • Oracle Advanced Security:
  • Tokens, smart cards,
  • Kerberos and so on.
  • PKI: X.509 Certificates
  • Unauthorized access to data Limit access to data Access control Oracle Standard Edition
  • Oracle Enterprise Edition:
  • Virtual Private Database



User Responsible for using the system for legitimate purposes, protecting sensitive data to which she has access, and managing her passwords securely. Database Administrator Responsible for creating and administering database users, granting system and object privileges, and assigning local roles to users. Operating System Administrator Responsible for maintaining the underlying security of the operating system. Network Administrator Responsible for ensuring the security of data in transmission. Application Administrators Responsible for deploying applications in such a way as to ensure security. Trusted Application Administrator Responsible for creating and administering users of trusted applications, and their associated privileges. Enterprise Security Manager Responsible for maintaining the security of the directory and for implementing centralized enterprise user security.

Question # 2



WHAT IS ENCRYPTION?



Encryption is the process used to hide our data, or the contents of a message, from prying eyes throughout the internet. During transmission (such as through a secure socket layer), the data is disguised using codes so that no one along the chain of networks that the data passes though to get to its source can understand the information being sent. When the data arrives at its destination, it is decrypted to reveal the information being transmitted. Called encryption and the process of revealing the data from its encrypted form is called decryption. Both of these are common techniques used in cryptography - the scientific discipline behind secure connections. The processes are done using mathematical logic, or algorithms.

However, it is very difficult to keep the logic behind any given algorithm truly secret, so it's prudent to also rely on alternative forms on protection for your data. Algorithms will keep your information private from anyone not interested in exerting the effort to decode the data, but encryption won't always hide your personal information from a highly motivated hacker.

HOW ENCRYPTIONS WORKS?

Encryption is the conversion of data into a form, called a cipher text, which cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals. In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm that undoes the work of the encryption algorithm. Alternatively, a computer can be used in an attempt to break the cipher. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key. Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- the better, in general. However, as the strength of encryption/decryption increases, so does the cost. In recent years, a controversy has arisen over so-called strong encryption. This refers to ciphers that are essentially unbreakable without the decryption keys. While most companies and their customers view it as a means of keeping secrets and minimizing fraud, some governments view strong encryption as a potential vehicle by which terrorists might evade authorities. These governments, including that of the United States, want to set up a key-escrow arrangement. This means everyone who uses a cipher would be required to provide the government with a copy of the key. Decryption keys would be stored in a supposedly secure place, used only by authorities, and used only if backed up by a court order. Opponents of this scheme argue that criminals could hack into the key-escrow database and illegally obtain, steal, or alter the keys. Supporters claim that while this is a possibility, implementing the key escrow scheme would be better than doing nothing to prevent criminals from freely

Question # 3



Integrate Risk Management with WATER FALL MODEL:

Enterprise risk management deals with risks and opportunities affecting value creation or preservation, defined as follows: Enterprise risk management is a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.

The definition reflects certain fundamental concepts. Enterprise risk management is:

  1. Effected by people at every level of an organization
  2. Applied across the enterprise, at every level and unit, and includes taking an entity level portfolio view of risk
  3. Designed to identify potential events that, if they occur, will affect the entity and to manage risk within its risk appetite
  4. Able to provide reasonable assurance to an entity’s management and board of directors
  5. Geared to achievement of objectives in one or more separate but overlapping



Everyone in an entity has some responsibility for enterprise risk management. The chief executive officer is ultimately responsible and should assume ownership. Other managers support the entity’s risk management philosophy, promote compliance with its risk appetite, and manage risks within their spheres of responsibility consistent with risk tolerances. A risk officer, financial officer, internal auditor, and others usually have key support responsibilities.

Is this blog is useful for you?

Powered by Blogger.