Ads

Pages

Tuesday, January 25, 2011

MTH001 Assignment No. 2 Solution

Assignment # 2 (Lecture# 17 - 24) Of MTH001 (FALL 2010)



Maximum Marks: 30

Due Date:

January 24, 2011

INSTRUCTIONS

Please read the following instructions before attempting the solution of this assignment:

• To solve this assignment, you should have good command over 17-24 lectures.

• Try to get the concepts, consolidate your concepts and ideas from these questions which you learn in these

lectures. You should concern the recommended books for clarification of concepts.

• Upload assignments properly through LMS, No Assignment will be accepted through email.

• Write your ID on the top of your solution file.

• Do not use colorful back grounds in your solution files.

• Use Math Type or Equation Editor etc. for mathematical symbols and equations.

• You should remember that if we found the solution files of some students are same then we will reward zero marks to all those students. Therefore, try to make solution by yourself and protect your work from other students, otherwise you and the student who send same solution file as you will be given zero marks.

• Avoid copying the solution from book (or internet); you must solve the assignment yourself.

• Also remember that you are supposed to submit your assignment in Word format any other like scan images, HTML etc. will not be accepted and we will give zero marks correspond to these assignments.

Question: 01 Marks: 10

Ali decides to invest a certain sum of money in business at the end of each year in the form of an annuity. He wants to get a sum of Rs.40, 000 after 20 years. If the payments accumulate at expected profit of 8% compound annually, how much should he start investing annually?

Question: 02 Marks: 10

Find the unknown values of , , and if and are multiplicative inverses of each other. Where .

Question: 03 Marks: 10

If and are the means for the two sets and respectively and related by and . Then find the values of ‘ ’ and ‘ ’.

.................

Solution 1):


This is a Future Value of an Ordinary Annuity problem.

Future Value is 40,000. Number of periods is 20. Annual rate is 8%

From TVM table for FV of an Annuity, the Factor is 45.7625

The FV = Annuity x Factor. We know the FV is 40,000, so divide it by the factor of 45.7625 to determine the Annuity amount of 874.08

The formula is ((1+ r)^n - 1) / r, or ((1.08)^20 - 1) / .08, or 4.661 - 1 = 3.661 / .08 = 45.7625

HRM624 Assignment No. 1 Solution

Conflict Management (HRM624)

Assignment No. 1 Marks: 10

Knowledge Sharing

(Case Study)

Knowledge sharing is the blessing for any organization but specifically for research and academic institutions, where concepts, theories and knowledge generation are the best sources of Human Resource Development. Here is a case of an organization in which a very constructive and productive activity is converted into a useless and downbeat activity. All employees of this organization have started an activity of daily presentations and magazine.

The main objective of this activity is to improve the communication and presentation skill of an individual. But they have observed that the By-Product (Knowledge Sharing) of this activity becomes more fruitful and more dominating as compared to the main objective of this activity.

Now people are more concerned in attending the presentation and this builds a responsibility on presenter to make presentation more fruitful and better than before. This situation is ideal for presenter, people who are attending the presentation as well for the organization During this time, some of the culprits among employees try to deceive the management by writing their names on presentation attendance sheet but actually they left office for the entire period of session. This creates trouble and management takes a decision that nobody is allowed to get entrance in the presentation without prior intimation. For that purpose, different groups are made by the management and this division is random, without any logic and irrational. Also people are not allowed to attend any presentation of other group. Complicated procedure of intimation, emails, perplexity among supervisor, creates a chaotic situation. As a result, in the presentation of very able and senior most people, only five people were there.

All know the fact that, before the implementation of this new policy, presentation room used to jam-pack. It is very sad situation for so many people who are supporting this new idea of presentation. But some of the advisors of higher management do not want this activity to run smoothly because they don’t have the capability to participate. Now at this stage two pools are formed, one is supporting the old practice of knowledge sharing with “open doors” (comprises of more than 96% of the total work force) and second group, which is very small group of people (4% of the total work force) is in the favor of this new practice. Note that there are some people who are in favor of old practice of “open doors” but they have no courage to express their feelings. But after informal interviews and group discussions, they show their consent of being a part of larger group.

With the passage of time, majority get frustrated and they start feeling so many related which are not highlighted ever before. Like one of the employee highlighted the discrimination while selecting the best presenter. Also people start criticizing the criteria and its transparency. Some of the employees have reservation on the participation and topic selection. Some are saying that few people are manipulating whole situation in their favor and get benefited. Some are raising the issue of EEO (Equal Employee Opportunity). So there are lots of other issues raised (which did not exist ever before) after this new policy. One can say that this is the retaliation and in the response of this “Close Door” phenomena.

When people were asked about the solution of this issue, majority suggest that those culprits should be highlighted and punished rather to make new policy which is not acceptable for the majority of the people. They said that punishing whole organization due to malicious activity of few people is not fair. This creates a mind set that all employees are deceptive and they are being punished. But that’s not the intention of the higher management.

Question:

Consider yourself as the higher management of the organization, what will you do to resolve this conflict? Either to continue this practice of “Close Door” policy or go with the majority who is in the favor of “Open Door” policy. Give solid reasons to support your answer.

Note: Try to write your choice clearly (in bold) at the top and then write reasons in the bulleted form. Please note that your choice and supporting points should be rational and brief. Unnecessary details will result in marks deduction.

Schedule

Opening Date and Time January, 24, 2011 At 12:01 A.M. (Mid-Night)

Due Date and Time January, 28, 2011 At 11:59 P.M. (Mid-Night)

.............

Solution:

Consider yourself as the higher management of the organization, what will you do to resolve this conflict? Either to continue this practice of “Close Door” policy or go with the majority who is in the favor of “Open Door” policy. Give solid reasons to support your answer.

I am in the favor of open door policy.


Reasons are as follow
· In open door policy, employees have direct access to the senior executives
without going through several gatekeepers.


· In open door policy, presentation room used to jam-pack. But in close door, few peoples are attending the presentation, and employees have so many complain after that.


· Because of the close door policy, a very constructive and productive activity is
converted into a useless and downbeat activity.


· In open door policy every manager's door is open to every employee. Open door policy encourages open communication, feedback, and discussion about any matter of importance to an employee.


· This productive activity should not be restricted with close door activity because of few culprits, who deceive managers by not attending presentations.


· When a company has an open door policy, employees are free to talk with any manager at any time.


· Open door policy helps to develop employee’s trust.


· Open door policy is the best method to immediately solve the problems of the employees.


· As in the higher management of the organization, I have to think about my employee’s suggestion as most of them supported open door policy.

....................

One more Idea solution

Open-door policy
An open-door policy (as related to the business and corporate world) is a policy in which a manager, CEO, president or supervisor leaves their office door "open" in order to encourage communication with the lower employees of that company. As the term implies, employees are encouraged to stop by whenever they feel the need to speak. Such a practice is viewed as a morale booster by letting employees feel as if they're able to openly speak with their boss about numerous issues face-to-face, rather than by other means, such as e-mail or voice mail.

Close Door Policy
Time is money, and hence when you have time you want to make use of most of it as much as possible. The amounts of hours we have in a day are very limited, so those who want to achieve something in life will treat time as such, PRECIOUS. But sometimes, unforeseen occurrences happen to interrupt our activities of the day.


Even so, there are other incidences we can avoid. For example, one of your valued customers may just decide to pop in to simply say hello or a long lost friend may have arrived in town and then decides to pass by your office during working hours. While at it, some of these kinds of unexpected visitors, might have long stories of what they have been up to of late hence disrupting your schedule.


The big question is how do you avoid this and still not risk losing a valued customer or appear to be rude to a friend. The secret is to draw a line from the start by applying the closed door policy especially when you do not want disruptions. Alert the secretary or colleagues whenever you want to avoid interruptions. You can decide not to pick phone calls or attend to any visitor. During this time ask the receptionist or colleague to take down your messages, marking the urgent ones.


Note that five minutes of disruption can affect a whole days input and hence affect the general

Question:Consider yourself as the higher management of the organization, what will you do to resolve this conflict? Either to continue this practice of “Close Door” policy or go with the majority who is in the favor of “Open Door” policy. Give solid reasons to support your answer.


Note: Try to write your choice clearly (in bold) at the top and then write reasons in the bulleted

I am in the favor of Open-door policy because of the following reasons

• This style is more open, more talents are attracted to the pool. The style will flourish and enrich
• Encourage open communication, feedback, and discussion about any matter of importance to an employee
• Employees are free to talk with any manager at any time
• By helping to solve problems, managers benefit by gaining valuable insight into possible problems with existing methods, procedures, and approaches
• Company's employees have the opportunity at all times, through the open door policy, to be heard.
• Addressing grievances or complaints should be handled very carefully
• The preferred method to immediately solve the problems of the employee.
• Open door policy focuses on majorities interests
• This policy involve in devoting the full consideration on work
• It’s a very constructive and productive activity

..............

Saturday, January 22, 2011

CS410 Assignment Solution

Visual Programming (CS410)

Assignment
Total marks = 20
Deadline Date = 21-01-2011

Please carefully read the following instructions before attempting the assignment. Rules for Marking
It should be clear that your assignment would not get any credit if:
  • The assignment is submitted after due date.
  • The submitted assignment does not open or file is corrupt.
  • The assignment is copied. Note that strict action would be taken if the submitted assignment is copied from any other student. Both students will be punished severely.

1) You should concern recommended books to clarify your concepts as handouts are not sufficient.
2) You are supposed to submit your assignment in .doc format. Any other formats like scan images, PDF, Zip, rar, bmp, docx etc will not be accepted
3)
You are advised to upload your assignment at least two days before Due date.
4) This assignment file comprises of Two (2) pages.
5)
Do not send the CPP file of your code, but paste the complete code in same document (.DOC) file in which you will solve other questions.
Important Note:

Assignment comprises of 20 Marks. Note that no assignment will be accepted after due date via email in any case (whether it is the case of load shedding or emergency electric failure or internet malfunctioning etc.). Hence, refrain from uploading assignment in the last hour of the deadline, and try to upload Solutions at least 02 days before the deadline to avoid inconvenience later on.
For any query please contact: [url=mailto:CS410@vu.edu.pk]CS410@vu.edu.pk[/url]

Q1 [Marks: 4+6]
Write about edit control default message processing and describe the default action against these messages.

1.EM_CANUNDO
2.
EM_GETHANDLE
3.
EM_GETLIMITTEXT

Q2 [Marks: 5+5]

Define Dynamic Link Libraries in detail? Also explain its relation with memory management?
....................
SOLUTION:

Define Dynamic Link Libraries in detail? Also explain its relation with memory management?



Dynamic-link library (also written without the hyphen), or DLL, is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems. These libraries usually have the file extension DLL, OCX (for libraries containing ActiveX controls), or DRV (for legacy system drivers). The file formats for DLLs are the same as for Windows EXE files — that is, Portable Executable (PE) for 32-bit and 64-bit Windows, and New Executable (NE) for 16-bit Windows. As with EXEs, DLLs can contain code, data, and resources, in any combination.

In the broader sense of the term, any data file with the same file format can be called a resource DLL. Examples of such DLLs include icon libraries, sometimes having the extension ICL, and font files, having the extensions FON and FOT
Background for DLL
The first versions of Microsoft Windows ran every program in a single address space. Every program was meant to co-operate by yielding the CPU to other programs so that the GUI was capable of multitasking and could be as responsive as possible. All Operating-System level operations were provided by the underlying operating system: MS-DOS. All higher level services were provided by Windows Libraries Dynamic Link Libraries. The Drawing API, GDI, was implemented in a DLL called GDI.EXE, the user interface in USER.EXE. These extra layers on top of DOS had to be shared across all running windows programs, not just to enable Windows to work in a machine with less than a megabyte of RAM, but to enable the programs to co-operate amongst each other. The Graphics Device Interface code in GDI needed to translate drawing commands to operations on specific devices. On the display, it had to manipulate pixels in the frame buffer. When drawing to a printer, the API calls had to be transformed into requests to a printer. Although it could have been possible to provide hard-coded support for a limited set of devices (like the Color Graphics Adapter display, the HP LaserJet Printer Command Language), Microsoft chose a different approach. GDI would work by loading different pieces of code to work with different output devices—pieces of code called 'Device Drivers'.

The same architectural concept that allowed GDI to load different device drivers is that which allowed the Windows shell to load different windows programs, and for these programs to invoke API calls from the shared USER and GDI libraries. That concept was Dynamic Linking.

In a conventional non-shared, static library, sections of code are simply added to the calling program when its executable is built at the linking phase; if two programs call the same routine, the routine is included in both the programs during the linking stage of the two. With dynamic linking, shared code is placed into a single, separate file. The programs that call this file are connected to it at run time, with the operating system (or, in the case of early versions of Windows, the OS-extension), performing the binding.

For those early versions of Windows (1.0 to 3.11), the DLLs were the foundation for the entire GUI.
Display drivers were merely DLLs with a .DRV extension that provided custom implementations of the same drawing API through a unified Device Driver Interface (DDI).
The Drawing (GDI) and GUI (USER) APIs were merely the function calls exported by the GDI and USER, system DLLs with .EXE extension.

This notion of building up the operating system from a collection of dynamically loaded libraries is a core concept of Windows that persists even today. DLLs provide the standard benefits of shared libraries, such as modularity. Modularity allows changes to be made to code and data in a single self-contained DLL shared by several applications without any change to the applications themselves.

Another benefit of the modularity is the use of generic interfaces for plug-ins. A single interface may be developed which allows old as well as new modules to be integrated seamlessly at run-time into pre-existing applications, without any modification to the application itself. This concept of dynamic extensibility is taken to the extreme with the Component Object Model, the underpinnings of ActiveX.

In Windows 1.x, 2.x and 3.x, all windows applications shared the same address space, as well as the same memory. A DLL was only loaded once into this address space; from then on all programs using the library accessed it. The library's data was shared across all the programs. This could be used as an indirect form of Inter-process communication, or it could accidentally corrupt the different programs. With Windows 95 and successors every process runs in its own address space. While the DLL code may be shared, the data is private except where shared data is explicitly requested by the library. That said, large swathes of Windows 95, Windows 98 and Windows Me were built from 16-bit libraries, a feature which limited the performance of the Pentium Pro microprocessor when launched, and ultimately limited the stability and scalability of the DOS-based versions of Windows.

While DLLs are the core of the Windows architecture, they have a number of drawbacks, collectively called "DLL hell".[1] Currently, Microsoft promotes Microsoft .NET as one solution to the problems of DLL hell, although they now promote Virtualization based solutions such as Microsoft Virtual PC and Microsoft Application Virtualization, because they offer superior isolation between applications. An alternative mitigating solution to DLL hell has been the implementation of Side-by-Side Assembly.
Memory management
In Win32, the DLL files are organized into sections. Each section has its own set of attributes, such as being writable or read-only, executable (for code) or non-executable (for data), and so on.

The code in a DLL is usually shared among all the processes that use the DLL; that is, they occupy a single place in physical memory, and do not take up space in the page file. If the physical memory occupied by a code section is to be reclaimed, its contents are discarded, and later reloaded directly from the DLL file as necessary.

In contrast to code sections, the data sections of a DLL are usually private; that is, each process using the DLL has its own copy of all the DLL's data. Optionally, data sections can be made shared, allowing inter-process communication via this shared memory area. However, because user restrictions do not apply to the use of shared DLL memory, this creates a security hole; namely, one process can corrupt the shared data, which will likely cause all other sharing processes to behave undesirably. For example, a process running under a guest account can in this way corrupt another process running under a privileged account. This is an important reason to avoid the use of shared sections in DLLs.

If a DLL is compressed by certain executable packers (e.g. UPX), all of its code sections are marked as read-and-write, and will be unshared. Read-and-write code sections, much like private data sections, are private to each process. Thus DLLs with shared data sections should not be compressed if they are intended to be used simultaneously by multiple programs, since each program instance would have to carry its own copy of the DLL, resulting in increased memory consumption.

Friday, January 21, 2011

Mgt411 Assignment No. 2 solution

"Money and Banking (MGT411)"

Assignment No. 02

Marks: 20

Schedule

Opening Date and Time January 20 , 2011 At 12:01 A.M. (Mid-Night)

Due Date and Time January 26 , 2011 At 11:59 P.M. (Mid-Night)

Assignment

Question No 01

Part (A)

Calculate the impact of an increase in desired currency holdings on the money multiplier from 10% to 15% of deposits when the reserve requirement is 10 percent of deposits, and banks' desired excess reserves are 04 % of deposits.

Assumption:

If the general public held currency Rs. 109 millions and deposit are Rs. 99 millions.

Part (B)

What will be difference in deposits by following a Rs. 3 billion Open Market Purchase assuming a 5% reserve requirement

Assumptions:

1 No excess reserves are held.

2 There are no changes in the amount of currency held by the public

Question No. 2

A commercial bank has following data:

Total assets valued Rs. 1,000,000

Item Assets Liabilities

Interest rate sensitive 35% 45%

Interest rate nonsensitive 65% 55%

Initial interest rate 08 % 05%

Interest rate increase 3% both in assets and liability

Required:

What will be the increase / decrease in the amount of netprofit(interest) due to the interest rate change? Your answer should be in absolute figures.

Solution Q No. 2


MCM301 GDB Solution


Effective communication can be the key to resolving conflict. What communication barriers you can figure out that have failed all the bilateral talks between India and Pakistan for resolving the longstanding Kashmir issue? Your comments must not be more than 350 words.

Emotional barrier:One of the chief barriers to open and free communications is the emotional barrier. It is comprised mainly of fear, mistrust and suspicion. The roots of our emotional mistrust of others lie in our childhood and infancy when we were taught to be careful what we said to others.

"Mind your P's and Q's"; "Don't speak until you're spoken to"; "Children should be seen and not heard". As a result many people hold back from communicating their thoughts and feelings to others.

They feel vulnerable. While some caution may be wise in certain relationships, excessive fear of what others might think of us can stunt our development as effective communicators and our ability to form meaningful relationships.

Prime Minister Yousaf Raza Gilani said, “The impression should be dispelled that there is a lack of communication [between Pakistan and India],” adding however that there was a lack of trust.

..........

Lack of interest in solving this problem from both centuries is the big problem.
Both centuries don’t accept others point of view.
Both country leaders’ want Kashmir to be the part of their centuries.

..............

Lack of interest in solving this problem from both centuries is the big problem.
Both country leaders’ want Kashmir to be the part of their centuries.
Both centuries don’t accept others point of view.
Emotional barriers
fear of mistrust and suspicion

.............

One of the chief barriers to open and free communications is the emotional barrier. It is comprised mainly of fear, mistrust and suspicion. The roots of our emotional mistrust of others lie in our childhood and infancy when we were taught to be careful what we said to others.
other barriers are
Lack of interest in solving this problem from both centuries is the big problem.
Both country leaders’ want Kashmir to be the part of their centuries.
Both centuries don’t accept others point of view.

............

fear of war.
both countries wants kashmir to be its part.
lack of interest.