Maximum Marks: 20
Due Date: Jan 19, 2010
DON’T MISS THESE: Important instructions before attempting the solution of this assignment:
• To solve this assignment, you should have good command over 23 - 30 lectures.
• Try to get the concepts, consolidate your concepts and ideas from these questions which you learn in the 23 to 30 lectures.
• Upload assignments properly through LMS, No Assignment will be accepted through email.
• Write your ID on the top of your solution file.
• Don’t use colorful back grounds in your solution files.
• Use Math Type or Equation Editor etc for mathematical symbols.
• You should remember that if we found the solution files of some students are same then we will reward zero marks to all those students.
• Try to make solution by yourself and protect your work from other students, otherwise you and the student who send same solution file as you will be given zero marks.
• Also remember that you are supposed to submit your assignment in Word format any other like scan images etc will not be accepted and we will give zero marks correspond to these assignments.
Question 1; Mark: 10
Use Mathematical Induction to prove that
.
Question 2; Mark: 5
If is odd then is even (prove by contradiction).
Question 3; Marks: 5
Find the number of arrangements of balls having colors Red, Yellow, Blue Green and Pink such that Red and Green balls must place next to each other.
Virtual university of Pakistan assignment,quiz,projects and Much more.
VUHELP fourm search.. You can find your Assignment here.
Tuesday, January 19, 2010
Thursday, January 14, 2010
POMA assignment Solution here
MGT613 - Production / Operations Management
Assignment # 2
Find out average population proportion defective which would be the central line on p-chart (p) i.e. total defectives/ sample size*weeks
Sample-- number --No. Of Defectives (b)Sample Proportion defective (p)
1--- 16--- 0.005333333
2--- 13--- 0.004333333
3--- 20--- 0.006666667
4--- 3---- 0.001
5--- 18--- 0.006
6--- 6--- 0.002
7---- 26---- 0.008666667
8--- 9---- 0.003
9--- 8--- 0.002666667
10--- 24--- 0.008
11--- 14---- 0.004666667
12---- 5---- 0.001666667
13---- 12--- 0.004
14---- 19--- 0.006333333
15--- 18--- 0.006
211--- 0.070333333
a. Find out average population proportion defective which would be the central line on
P-chart (p) i.e. total defectives/ sample size*weeks
p = 211 / (300 * 15)
= 211 / 45000
p = 0.004688889
p = 0.00469 (Approximate)
c. Calculate standard deviation of distribution of proportion defective (σp) using the formula
σp = √ p (1– p)/n. Where n= sample size.
= √ 0.00469 (1 – 0.00469) / 3000
= √ .000001556
= .001247397
σp = .00125
d. Find out upper control limit (UCL) and lower control limit (LCL) using the formula
(UCL p = p + zσ p and LCL p = = p - zσ p )
Use three sigma control limits (z=3)
1) UCL p = p + zσ p
= .00469 + 3 (0.00125)
UCL p = .00844
2) LCL p = p - zσ p
= . 00469 - 3 (0.00125)
LCL p = .00094
e. On the basis of above data construct a p-chart taking sample numbers on x-axis and sample proportion defective (p) on y-axis.

f. Which sample number is showing the highest proportion of defective? Is the process still in control? Analyze the trend in chart.
In the above diagram the sample no.7 is the highest value and this value is out of the upper and the lower limit
UCL p = .00844 and LCL p = .00094
High proportion of the defect is Value = .0087
That’s why we can say that the process is not through the statistical process.
Monday, January 11, 2010
IT430 assignment solution
Question No. 1: Write down advantages and disadvantages of “Virtual PIN Payment System”.
Answer: Virtual PIN payment system is one of the earliest credit card based system. This system does not involve use of encryption and payment is made through credit card.
There are certain advantages and disadvantages associated with this system
Advantages:
• No special software or hardware in needed at buyer or seller side
• First Virtual has very low processing fee as compared to other Internet payment schemes or even straight credit card processing
• Purchases are essentially anonymous. The merchant is never given the buyer's name from First Virtual
• Buyers are fully protected from fraud. No charges are processed against their account without their confirmation
Disadvantages:
• Pre-registration with First Virtual in set up is mandatory for buyer and seller
• Most risk is borne by merchant because goods are delivered by merchant before actual payment
• Long waiting period between sale and actual payment made to merchant
_________________________________
Question No. 2: How stolen credit cards can be used for fraud in Virtual PIN Payment System?
Answer: Virtual PIN payment system is a credit card based payment system. Both merchant and buyer need to register with First Virtual (FV).
When the customer makes an order, they give the merchant their virtual PIN. The merchant then contacts First Virtual, quotes them the PIN and asks for the money. First Virtual send the customer an e-mail asking for their confirmation, customer either replies YES, NO or Fraud. If the answer indicates “fraud” it means that the goods were never ordered. In such an eventuality the First Virtual Internet Payment Server System (FVIPSS) immediately blacklists Virtual PIN so that it cannot be used in the future. In case of fraud indication it means buyer to whom PIN actually belongs has not made the order and somebody might have stolen the PIN and misused it. There is a said waiting period to answer the e-mail about indication of transaction and in case of no reply FV proceeds the payment, in such a case since no fraud indication is made by buyer the stolen Virtual PIN can then be used for transaction. Similarly a stolen credit card number can also be used to set up Virtual PIN associated with an email address controlled by the attacker to carry out bogus transactions.
Saturday, January 9, 2010
DBMS assignments Solution Coming Up.
DEPARTMENT
Dept_Name Dept_No Dmgr_id Dlocations
Research 10 331009596919 { Islamabad, Multan, Lahore }
Administration 4 331005678451 { Karachi }
Headquarters 1 331015685741 { Peshawar }
Convert this table to a relation in first normal form (1NF).
Question 2: Consider the following relation
COURSE INSTRUCTOR
COURSE
ID COURSE
TITLE INSTRUCTOR
NAME INSTRUCTOR LOCATION
IS 350 Database Mgt Codd B 104
IS 465 System Analysis Parsons B 137
Acctg 201 Fund Acctg Miller H 310
Mktg 300 Intro Mktg Mick B 212
The relation is in Second normal form (2NF) and there are modifications and deletion anomalies exist. You are required to convert it into third normal form (3NF).
Thursday, January 7, 2010
GDB FIN630
-------------------------
1.your right markets aren't efficient simply because you have big institutional player who control most of the flow and the smaller individual investors who trade the scraps so the market was never going to beefficientt in this kind of situation. However the efficientt market Hypothesis doesn't real say that there shouldn't be outperformance, it merely states that every one has access to the same information and therefore no one has an advantage. but of course we know that in reality there's inside information and some are able to use information more quickly than others. marlek is not perfect.
------------------------
2.an efficient market has maximum competition. which wouldnt allow for infair trades, and means everyone pays the appropriate price. that means the market is absolute and noone gets a better price than another.
the fact that we see people outperforming the market and people underperforming the market means that the market is not efficient. but only efficient with the meaning: there is no maximum competition.
------------------------
3.Markets are somewhat efficient, but it is just a theory. There are many investors and money managers who consistently and regularly beat the market. Over 10% of the mutual funds out there also beat the market in any given year. The market is not near the free-market we suppose it to be. Special groups and different individuals can tamper with the markets, postponing what might normally occur (think of central banks). Also, a prominent financial news channel may selectively expose reps from a certain industry or sector. They can pound the table on an idea or personality and lead a large group of investors around by the nose.
Wednesday, January 6, 2010
CS 302 assignment no 4
Question No. 1
Design a counter with the irregular binary count sequence shown in the state diagram given below. Use J-K flip-flops only. Write stepwise procedure to design this counter
Organization behaviour GDB
Legitimate power
Legitimate power is that which is invested in a role. Kings, policemen and managers all have legitimate power. The legitimacy may come from a higher power, often one with coercive power. Legitimate power can often thus be the acceptable face of raw power.
A common trap that people in such roles can fall into is to forget that people are obeying the position, not them. When they either fall from power or move onto other things, it can be a puzzling surprise that people who used to fawn at your feet no long do so.
Coercive power
This is the power to force someone to do something against their will. It is often physical although other threats may be used. It is the power of dictators, despots and bullies. Coercion can result in physical harm, although its principal goal is compliance. Demonstrations of harm are often used to illustrate what will happen if compliance is not gained.
Coercion is also the ultimate power of all governments. Although it is often seen as negative, it is also used to keep the peace. Parents coerce young children who know no better. A person holds back their friend who is about to step out in front of a car.
Other forms of power can also be used in coercive ways, such as when a reward or expertise is withheld or referent power is used to threaten social exclusion.
charismatic authority
as "resting on devotion to the exceptional sanctity, heroism or exemplary character of an individual person, and of the normative patterns or order revealed or ordained by him." Charismatic authority is one of three forms of authority laid out in Weber'stripartite classification of authority, the other two being traditional authority and rational-legal authority. The concept has acquired wide usage among sociologists.
GDB solution for MGT201. Financial managemnet
MGT201 GDB Solution
Your neighbor is a security analyst. He has conducted his research about some
stocks in Karachi Stock Exchange (KSE) and his findings are as follows:
Stock A will have a return of 18%, stock B will have a return of 20 % and stock C
will have a return of 22%, but his findings do not involve the CAPM (Capital
Asset Pricing Model).
You are a business graduate and when you have used CAPM, you have come to
know that:
Stock A’s expected return is 15.50%, Stock B’s expected return is 24.63% and
Stock C’s expected return is 25.39%.
In your opinion, whether the KSE has over-priced or under-priced each stock
and in the light of these results, which of these stocks are suitable for
investment?
Solution
It is just idea….do not copy it just takes
idea and makes your own….
KSE Return:
Stock A : 18% ------> 15.50%
Stock B : 20% ------> 24.63%
Stock C : 22% ------> 25.39%
for A KSE is over prized
&
for B, & C KSE has under prized.
In my opinion Stock A is more suitable for investment then B or
C. It has more return 18% then compared to 15.50%...
Friday, January 1, 2010
Solved Papers of MBA virtual University of Pakistan
Cool stuff you ever seen