Virtual University VU Solved Assignments/Quizzes/GDBs, Past Solved Papers/Assignments/Online Quizzes Solutions.
Friday, June 12, 2009
MGT402 - Cost & Management Accounting SOLUTION
1 B
2 A
3 A
4 C
5 A
case 2
6 B
7 B
8 B
9 B
10 D
Case 3
11 A
12 B
13 A
14 D
15 C
Case 4
16 C
17 C
18 B
19 D
20 C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
MGT402 - Cost & Management Accounting SOLUTION
1 B
2 A
3 A
4 C
5 A
case 2
6 B
7 B
8 B
9 B
10 D
Case 3
11 A
12 B
13 A
14 D
15 C
Case 4
16 C
17 C
18 B
19 D
20 C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Thursday, June 11, 2009
Mgt411 - Assignment # 4 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256407/711646c5/mgt411_quiz__4.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt411 - Assignment # 4 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256407/711646c5/mgt411_quiz__4.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA301 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256367/2203f7c6/STA301.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA301 Solution
You may download STA301 assignment's solution from the following link:
http://www.2shared.com/file/6256367/2203f7c6/STA301.html
Best of Luck
VU Help Desk....
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt613 - Operation Management Solution
- B
- B
- A
- A
- A
- c (not sure)
- c (not sure)
- A
- A
- D
- C
- C
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt613 - Operation Management Solution
- B
- B
- A
- A
- A
- c (not sure)
- c (not sure)
- A
- A
- D
- C
- C
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA630 - Assignment Solution by VUsolutions
2. A
3. A
4. D
5. C
6. B
7. D
8. B
9. D
10. A
11. A
12. C
13. A
14. A
15. C
16. D
17. C
18. C
19. C
20. B
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
STA630 - Assignment Solution by VUsolutions
2. A
3. A
4. D
5. C
6. B
7. D
8. B
9. D
10. A
11. A
12. C
13. A
14. A
15. C
16. D
17. C
18. C
19. C
20. B
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt501 - Human Resource Management (HRM) Solution
- B
- D
- D
- D
- C
- B
- B
- B
- B
- A
- D
- D
- D
- A
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt501 - Human Resource Management (HRM) Solution
- B
- D
- D
- D
- C
- B
- B
- B
- B
- A
- D
- D
- D
- A
- C
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Tuesday, June 9, 2009
Mgt502 - Organizational Behaviour, Assignment Solution by VUsolution
| Question no. | Question Marks | Correct Option |
| 1 | 1 | B |
| 2 | 1 | C |
| 3 | 1 | B |
| 4 | 1 | B |
| 5 | 1 | C |
| 6 | 1 | A |
| 7 | 1 | A |
| 8 | 1 | A |
| 9 | 1 | C |
| 10 | 1 | A |
| 11 | 1 | D |
| 12 | 1 | A |
| 13 | 1 | A |
| 14 | 1 | C |
| 15 | 1 | A |
| 16 | 1 | A |
| 17 | 1 | D |
| 18 | 1 | B |
| 19 | 1 | B |
| 20 | 1 | C |
| Total Marks | 20 |
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Mgt502 - Organizational Behaviour, Assignment Solution by VUsolution
| Question no. | Question Marks | Correct Option |
| 1 | 1 | B |
| 2 | 1 | C |
| 3 | 1 | B |
| 4 | 1 | B |
| 5 | 1 | C |
| 6 | 1 | A |
| 7 | 1 | A |
| 8 | 1 | A |
| 9 | 1 | C |
| 10 | 1 | A |
| 11 | 1 | D |
| 12 | 1 | A |
| 13 | 1 | A |
| 14 | 1 | C |
| 15 | 1 | A |
| 16 | 1 | A |
| 17 | 1 | D |
| 18 | 1 | B |
| 19 | 1 | B |
| 20 | 1 | C |
| Total Marks | 20 |
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Eco401 Economics Assignment's solution
1 B
2 A
3 C
4 C
5 D
6 C
7 A
8 B
9 D
10 B
11 A
Case 2
12 B
13 C
14 A
15 C
Case 3
16 B
17 C
18 D
19 A
20 A
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
Eco401 Economics Assignment's solution
1 B
2 A
3 C
4 C
5 D
6 C
7 A
8 B
9 D
10 B
11 A
Case 2
12 B
13 C
14 A
15 C
Case 3
16 B
17 C
18 D
19 A
20 A
[[NOTE:- We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please.]]
CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions
| 1. mSCOPE |
| Information security |
| means protecting information and information systems from |
| unauthorized access, use, disclosure, disruption, modification or destruction. |
| The terms information security, computer security and information assurance are |
| frequently incorrectly used interchangeably. These fields ar e interrelated often and share |
| the common goals of protecting the confidentiality, integrity and availability of |
| information; however, there are some subtle differences between them. |
| These differences lie primarily in the approach to the subject, the methodologies used, |
| and the areas of concentration. Information security is concerned with the confidentiality, |
| integrity and availability of data regardless of the form the data may take: electronic, |
| print, or other forms. |
| Governments, military, corporate, financial institutions, hospitals, and private businesses |
| amass a great deal of confidential information about their employees, customers, |
| products, research, and financial status. Most of this information is now collected, |
| processed and stored on electronic computers and transmitted across networks to other |
| computers. |
| Should confidential information about a businesses customers or finances or new product |
| line fall into the hands of a competitor, such a breach of security could lead to lost |
| business, law suits or even bankruptcy of the business. Protecting confidential |
| information is a business requirement, and in many cases also an ethical and legal |
| requirement. |
| For the individual, information security has a significant effect on privacy, which is |
| viewed very differently in different cultures. |
| The field of information security has grown and evolved significantly in recent years. As |
| a career choice there are many ways of gaining entry into the field. It offers many areas |
| for specialization including, securing network(s) and allied infrastructure, securing |
| applications and databases, security testing, information systems auditing, business |
| continuity planning and digital forensics science, to name a few. |
| 2. Objective |
| An Information Security Policy usually has the following objectives: |
| To protect the organization's business information and any client or customer |
| I. |
| information within its custody or safekeeping by safeguarding its confidentiality, |
| integrity and availability. |
| To establish safeguards to protect the organization's information resources from |
| II. |
| theft, abuse, misuse and any form of damage. |
| To establish responsibility and accountability for Information Security in the |
| III. |
| organization. |
| To encourage management and staff to maintain an appropriate level of awareness, |
| IV. |
| knowledge and skill to allow them to minimize the occurrence and severity of |
| Information Security incidents. |
| 3. Responsibilities |
| • |
| Monitor to a reasonable level the use of the computer so as to detect breaches of |
| the system's security. In the event of a serious breach being detected, especially if |
| network security may have been compromised, CSD should be alerted so |
| institutional corrective measures can be taken. |
| • |
| All user ids on departmental computers must be provided to the CSD to enable |
| such users to be traced. |
| • |
| Ensure that each registered user is only allowed access to positively authorized |
| facilities; the default on all computers should be to bar access. |
| • • |
| Ensure that all software and/or data that are accessed via the computer are |
| • |
| properly licensed for such access. |
| 4. Implementation. |
| To aid departments who have a real need to run their own computers in this way the CSD |
| will: |
| Provide a designated contact to liaise with departmental system administrators. |
| • |
| Operate a closed security mailing list that is regularly updated with the latest |
| • |
| national and international information on hacking attempts, tools, etc. All |
| departmental system-administrators who are properly appointed and are recorded |
| as such with the CSD will be included in this list. |
| Provide regular training, advice and support to the designated departmental |
| • |
| system administrators. |
| Assist a departmental system-administrator to correct a security loophole or |
| • |
| breach, especially where the integrity of the University network may be at risk. |
| Periodically carry out checks, of its own and other network connected computers, |
| • |
| using tools provided by the industry or similar to those known to be available to |
| would be hackers. This will be done to search for the various types of security |
| problems that might exist. |
CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions
| 1. mSCOPE |
| Information security |
| means protecting information and information systems from |
| unauthorized access, use, disclosure, disruption, modification or destruction. |
| The terms information security, computer security and information assurance are |
| frequently incorrectly used interchangeably. These fields ar e interrelated often and share |
| the common goals of protecting the confidentiality, integrity and availability of |
| information; however, there are some subtle differences between them. |
| These differences lie primarily in the approach to the subject, the methodologies used, |
| and the areas of concentration. Information security is concerned with the confidentiality, |
| integrity and availability of data regardless of the form the data may take: electronic, |
| print, or other forms. |
| Governments, military, corporate, financial institutions, hospitals, and private businesses |
| amass a great deal of confidential information about their employees, customers, |
| products, research, and financial status. Most of this information is now collected, |
| processed and stored on electronic computers and transmitted across networks to other |
| computers. |
| Should confidential information about a businesses customers or finances or new product |
| line fall into the hands of a competitor, such a breach of security could lead to lost |
| business, law suits or even bankruptcy of the business. Protecting confidential |
| information is a business requirement, and in many cases also an ethical and legal |
| requirement. |
| For the individual, information security has a significant effect on privacy, which is |
| viewed very differently in different cultures. |
| The field of information security has grown and evolved significantly in recent years. As |
| a career choice there are many ways of gaining entry into the field. It offers many areas |
| for specialization including, securing network(s) and allied infrastructure, securing |
| applications and databases, security testing, information systems auditing, business |
| continuity planning and digital forensics science, to name a few. |
| 2. Objective |
| An Information Security Policy usually has the following objectives: |
| To protect the organization's business information and any client or customer |
| I. |
| information within its custody or safekeeping by safeguarding its confidentiality, |
| integrity and availability. |
| To establish safeguards to protect the organization's information resources from |
| II. |
| theft, abuse, misuse and any form of damage. |
| To establish responsibility and accountability for Information Security in the |
| III. |
| organization. |
| To encourage management and staff to maintain an appropriate level of awareness, |
| IV. |
| knowledge and skill to allow them to minimize the occurrence and severity of |
| Information Security incidents. |
| 3. Responsibilities |
| • |
| Monitor to a reasonable level the use of the computer so as to detect breaches of |
| the system's security. In the event of a serious breach being detected, especially if |
| network security may have been compromised, CSD should be alerted so |
| institutional corrective measures can be taken. |
| • |
| All user ids on departmental computers must be provided to the CSD to enable |
| such users to be traced. |
| • |
| Ensure that each registered user is only allowed access to positively authorized |
| facilities; the default on all computers should be to bar access. |
| • • |
| Ensure that all software and/or data that are accessed via the computer are |
| • |
| properly licensed for such access. |
| 4. Implementation. |
| To aid departments who have a real need to run their own computers in this way the CSD |
| will: |
| Provide a designated contact to liaise with departmental system administrators. |
| • |
| Operate a closed security mailing list that is regularly updated with the latest |
| • |
| national and international information on hacking attempts, tools, etc. All |
| departmental system-administrators who are properly appointed and are recorded |
| as such with the CSD will be included in this list. |
| Provide regular training, advice and support to the designated departmental |
| • |
| system administrators. |
| Assist a departmental system-administrator to correct a security loophole or |
| • |
| breach, especially where the integrity of the University network may be at risk. |
| Periodically carry out checks, of its own and other network connected computers, |
| • |
| using tools provided by the industry or similar to those known to be available to |
| would be hackers. This will be done to search for the various types of security |
| problems that might exist. |