Ads

Pages

Monday, January 3, 2011

Mgt602 Assignment No. 2 Announcement

Assignment 02

Dated: Jan 03, 11

Semester “Fall 2010” “Entrepreneureship (MGT602)”

This is to inform that next Assignment (covering video lecture no. 1 to lecture no 30) will be uploaded on VULMS according to the following schedule

Schedule

Opening Date and Time

January 05, 2011 At 12:01 A.M. (Mid-Night)

Closing Date and Time

January 10, 2011 At 11:59 P.M. (Mid-Night)

Note: Only in the case of Assignment, 24 Hrs extra / grace period after the above mentioned due date is usually available to overcome uploading difficulties which may be faced by the students on last date. This extra time should only be used to meet the emergencies and above mentioned due dates should always be treated as final to avoid any inconvenience.

Important:

1. For acquiring the relevant knowledge, do not rely only on handouts but watch the course video lectures, which can be downloaded for free from Online VU Lectures, and also use other reference books.

Mgt501 Assignment No. 2

Most of the practices of the Human Resource Management are interlinked and have a profound impact on one another. The prosperity of organizations rests upon the skills of its employees. If an organization wants to prosper, it needs to take into account the existing skills of the employees and take measures to get them match with the needs of the technology. While investing in employees, the organization actually invests in it’s self. Or the development of organization is subject to the investment in its employees.

Elaborate how the investigation of skills and investment in employees can lead to the development of the organization. Word limit: 500 words

Mgt201 GDB Solution

“Discussion Question”

Given a risk-free rate of 8 percent and a market risk premium of 9.5 percent, based on the betas given in the following table:

Security Beta
A 0.95

B 1.25

1. Calculate required rate of return of each stock?
2. If Ahmed is a risk lover investor, he will prefer to invest in which stock?
3. As against it, Shahzad is a risk averse investor; he will prefer to invest in which stock?

Solution:

Required rate of return for A

Rce = rRF + (rM – rRF) (beta)
Rce = 0.08 + (0.095 – 0.08)(0.95)
Rce = 0.08+(0.015)(0.95)
Rce = 0.08 + 0.01425
Rce = 0.09425 *100
Rce = 9.425%

Required rate of return for B
Rce = rRF + (rM – rRF) (beta)
Rce = 0.08 + (0.095 – 0.08)(1.25)
Rce = 0.08+(0.015)(1.25)
Rce = 0.08 + 0.01875
Rce = 0.09875 *100
Rce = 9.875%

A risk loving person will buy if OR > 1 or = 1, but he might also buy when OR is < 1.
The degree of risk aversion increases as your income level falls, due to diminishing marginal
utility of income.

As Ahmad is Risk Lover he will like to invest in Stock B because it has Beta More Than 1 as 1.25


A risk averse person will not buy if OR < 1. He will also not buy if OR = 1. He might also not
decide to buy if OR > 1.

As Shahzad is risk averse so he will invest in Stock A because it has Beta Less Than 1 as 0.9

Friday, December 31, 2010

IT430 Assignment # 2 Solution

What are the steps involved in symmetric cryptography? Also explain key management in conventional cryptography using some example.
Solution:-
Symmetric Cryptography
With symmetric cryptography, both the sender and recipient share a key that is used to perform both encryption and decryption. Symmetric cryptography is commonly used to perform encryption. It also provides data integrity when symmetric keys are used in conjunction with other algorithms to create Message Authentication Codes (MACs). For more information about MACs, see Data Origin Authentication in Chapter 2, "Message Protection Patterns."
Figure 1 illustrates the process of encrypting and decrypting data with a shared secret key.



Figure 1. The process of symmetric encryption

As illustrated in Figure 1,
symmetric encryption involves the following steps:
The sender creates a ciphertext message by encrypting the plaintext message with a symmetric encryption algorithm and a shared key.
The sender sends the ciphertext message to the recipient.
The recipient decrypts the ciphertext message back into plaintext with a shared key.

Numerous symmetric algorithms are currently in use. Some of the more common algorithms include Rijndael (AES) and Triple DES (3DES). These algorithms are designed to perform efficiently on common hardware architectures.

Symmetric cryptography is comparatively simple in nature, because the secret key that is used for both encryption and decryption is shared between the sender and the recipient. However, before communication can occur, the sender and the recipient must exchange a shared secret key. In some cases (such as SSL), asymmetric cryptography can be used to ensure that the initial key exchange occurs over a secure channel.


Key Management and Conventional Encryption
Conventional encryption has benefits. It is very fast. It is especially useful for encrypting data that is not going anywhere. However, conventional encryption alone as a means for transmitting secure data can be quite expensive simply due to the difficulty of secure key distribution. The expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks (or small children with secret decoder rings).

Recall a character from your favorite spy movie: the person with a locked briefcase handcuffed to his or her wrist. What is in the briefcase, anyway? It's probably not the missile launch code/ biotoxin formula/ invasion plan itself. It's the key that will decrypt the secret data.

For a sender and recipient to communicate securely using conventional encryption, they must agree upon a key and keep it secret between themselves. If they are in different physical locations, they must trust a courier, the Bat Phone, or some other secure communication medium to prevent the disclosure of the secret key during transmission. Anyone who overhears or intercepts the key in transit can later read, modify, and forge all information encrypted or authenticated with that key. The persistent problem with conventional encryption is key distribution: how do you get the key to the recipient without someone intercepting it?

And the minor problem with it is the storage of keys: when you want to communicate with a lot of people and you have one key for each partner, how do you manage so many keys?




Some Examples of Conventional Cryptosystems

Captain Midnight's Secret Decoder Ring (which you may have owned when you were a kid)

Julius Caesar's cipher

DES, Data Encryption Standard

ENG301(Business Communication) - Assignment 3 (Fall 2010)

Business Communication-ENG301 Total Marks: 15



Objective
To assess the students' ability to write business messages.

Instructions:

No assignment will be accepted via e-mail after the due date.

Plagiarism will NOT be tolerated. Plagiarism occurs when a student uses work done by someone else without acknowledging the actual author. It also means copying and pasting the material from handouts and internet source without rephrasing it in his/her own words.

Q1. As a reservation manager of a hotel, write a letter to your customer reminding him that deposit is due on a reservation made for an executive suite. (10)

Q2. Complete the following statements with the correct answers related to Business Communication. (5)

1. ----------- is the reply to a claim letter.

2. Letters written to persuade the people for purchasing your product are called -----.

3. -------- is a special committee which is assigned the duty to resolve a specific problem.

4. A sales letter begins with --------------.

5. ------------ of an organization is followed in order to write a ------------.


;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;



Example
"Your company logo here"


Thursday, December 30, 2010

Dear Customer,

Please note that on your account, there are one or more invoices currently past the 30-day due date from the date of service. These invoices are itemized below for your convenience. Please remit the past due balance of $ 0,000.00 as soon as you are able, or contact our office if you have any questions regarding these. Please keep in mind that all invoices on your account carry 30-day terms unless otherwise specified.

Invoice Number Service Date Amount Due Total

87561 04/25/2005 $ 1,393.07

87591 04/27/2005 $ 170.84 $1,563.91


We appreciate your efforts in bringing the account current.

Your business is very important to us!

Thank you,


Name

Title, company name