We are Permanently Move to vupk.net Please Join us there.

CS614 GDB Solution Spring 2012

 CS614 GDB Solution Spring 2012

Topic:
“Data warehousing always leads towards the huge data storage and query intensive format to support analytical decisions”. Justify the given statement either right or wrong with strong arguments.
Solution:
Strategic decision for large companies require historical data.Data Warehouse are large storage systems which stores historical data that can be used for strategic decision making. The main source of the data is cleaned, transformed, cataloged and made available for use by managers and other business professionals for data mining, online analytical processing, market research and decision support.

CS101 GDB Solution Spring 2012

 CS101 GDB Solution Spring 2012

Semantic Web is an extension of current web in which information is given in well-defined manner and provides better environment enabling computers and people to work in cooperation. Semantic web makes the data process able for machines or computers.
Question:
In your opinion, can semantic web fit into the “future evolution of internet”? Justify your answer.
Solution:
The Semantic Web currently exists as a vision, albeit a promising and captivating one. Similar to the current Web, the Semantic Web will be formed through a combination of open standard and proprietary protocols, frameworks, technologies, and services. The W3C-approved standards – XML, RDF, and OWL – form the base protocols. New data schemas and contract mechanisms, built using these new protocols, will arise around communities of interest, industry, and intent; some will be designed carefully by experienced data architects and formally recognized by established standards bodies; others will appear from out of nowhere and gain widespread acceptance overnight. A host of new technologies and services will appear such as semantically-aware content publishing tools; context modeling tools; mediation, inference, and reputing engines; data-cleansing and thesaurus services; and new authentication and verification components. Although various elements of the vision already exist, rollout of these technologies, coordination amidst competitive forces, and fulfillment of the vision will take many years.

CS410 Assignment No 4 Spring 2012 solution

CS410 Assignment No 4 Spring 2012 solution

Task 1: (Marks = 2)
Draw a simple Window using ‘windows.h’

Task 2: (Marks = 8 (1 + 1 + 2 + 2 + 2))
When program will execute,
1 – Windows Title Bar has text as your VU ID.
2 – In client area, first line of the windows have your name as Name = XYZ       *Replace XYZ with your Name
3 – In next line, a Solid line would be appeared.
4 – After that, Text ‘Current Semester Registered Courses’ will appear. And in next line to that, there will be a dash line.
5 – After step 4, Courses ID with Course names would be displayed (One Course Code and Name per line).
6 – At last, a line is drawn with pattern brush to finish your task.

Sample output screen shot is provided below;


Solution:
#include <windows.h>
LRESULT CALLBACK WndProc(
HWND hWnd,
UINT msg,
WPARAM wParam,
LPARAM lParam ) {
switch( msg ) {
case WM_PAINT: {
POINT pntArray[2];
pntArray[0].x=05;
pntArray[0].y=30;
pntArray[1].x=625;
pntArray[1].y=30;
POINT pntArraySec[2];
pntArraySec[0].x=05;
pntArraySec[0].y=90;
pntArraySec[1].x=625;
pntArraySec[1].y=90;
POINT pntArrayThird[2];
pntArrayThird[0].x=05;
pntArrayThird[0].y=250;
pntArrayThird[1].x=625;
pntArrayThird[1].y=250;
PAINTSTRUCT ps;
HDC hDC = BeginPaint( hWnd, &ps );
HPEN PenSolid=CreatePen(PS_SOLID, 2, RGB(0,0,0));
HPEN PenDash=CreatePen(PS_DASH, 1, RGB(0,0,0));
HPEN PenDastDot=CreatePen(PS_DASHDOT, 1, RGB(0,0,0));
TextOut(hDC, 20, 05, “Name: XYZ”, 9);
SelectObject(hDC,PenSolid);
Polyline(hDC, pntArray, 2);
TextOut(hDC, 20, 60, “Current Semester Registered Courses”, 35);
SelectObject(hDC,PenDash);
Polyline(hDC, pntArraySec, 2);
TextOut(hDC, 20, 120, “CS410 Visual Programming”, 34);
TextOut(hDC, 20, 140, “CS410 Visual Programming”, 34);
TextOut(hDC, 20, 160, “CS410 Visual Programming”, 34);
TextOut(hDC, 20, 180, “CS410 Visual Programming”, 34);
TextOut(hDC, 20, 200, “CS410 Visual Programming”, 34);
TextOut(hDC, 20, 200, “CS410 Visual Programming”, 34);
SelectObject(hDC,PenDastDot);
Polyline(hDC, pntArrayThird, 2);
EndPaint( hWnd, &ps );
}
break;
case WM_DESTROY:
PostQuitMessage(0);
break;
default:
return DefWindowProc( hWnd, msg, wParam, lParam);
}
return 0;
}
int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance,
LPSTR lpCmdLine, int nCmdShow) {
WNDCLASSEX wce;
wce.cbSize = sizeof(wce);
wce.style = CS_VREDRAW | CS_HREDRAW;
wce.lpfnWndProc = (WNDPROC) WndProc;
wce.cbClsExtra = 0;
wce.cbWndExtra = 0;
wce.hInstance = hInstance;
wce.hIcon = LoadIcon((HINSTANCE) NULL, IDI_APPLICATION);
wce.hCursor = LoadCursor((HINSTANCE) NULL, IDC_ARROW);
wce.hbrBackground = (HBRUSH) GetStockObject(WHITE_BRUSH);
wce.lpszMenuName = 0;
wce.lpszClassName = “createClass”,
wce.hIconSm = 0;
if (!RegisterClassEx(&wce)) return 0;
HWND hWnd = CreateWindowEx(
0,
“createClass”,
“ABC123 (WRITE YOUR ROLL NUMBER HERE)”,
WS_OVERLAPPEDWINDOW,
CW_USEDEFAULT,
CW_USEDEFAULT,
650,
500,
NULL,
NULL,
hInstance,
NULL
);
ShowWindow( hWnd, nCmdShow );
MSG msg;
int r;
while ((r = GetMessage(&msg, NULL, 0, 0 )) != 0) {
if (r == -1) {
;
}
else {
TranslateMessage(&msg);
DispatchMessage(&msg);
}
}
return msg.wParam;
};

MTH301 Assignment # 3 Idea Solution Spring July 2012

MTH301 Assignment # 3 Idea Solution Spring July 2012



MTH301 Assignment # 3 Solution Spring 2012 -

CS507 Assignment Current Idea Solution Spring July 2012


CS507 Assignment Current Idea Solution Spring July 2012

Question 1: (5 Marks)
Suppose you are appointed as a Network manager in ABC Insurance Company. Your first task is to analysis the security measures for software and data management. You are required to suggest at least five security measures that should be implemented for the company.

 1. Establish strong passwords
Implementing strong passwords is the easiest thing you can do to strengthen your security.
2. Put up a strong firewall
In order to have a properly protected network, “firewalls are a must,
3. Install antivirus protection
Antivirus and anti-malware software are essentials in your arsenal of online security weapons, as well.
4. Backup regularly
Scheduling regular backups to an external hard drive, or in the cloud, is a painless way to ensure that all your data is stored safely.
5. Educate employees
Teaching your employees about safe online habits and proactive defense is crucial.

Question 2: (10 Marks)
Consider an accounting system for an XYZ organization. As the system maintains the accounts of the company, therefore it should be highly secure. Different measures have been taken to implement the security and one is to maintain a detailed log of each activity performed by the user.

Suggest the structure (schema) of this log i.e. the information contained in the log and the exact field names that will be used to store this information. (You are required to give information about each field in one or two lines).

Solution:

Log File Structure
The transaction log file is a standard comma-delimited ASCII file with the following fields:
    Date/Time, as a numeric string in GMT.
    Name of client who performed the transaction (for example, updating a value in a cube).
    Transaction type: Currently always a “C”to indicate a cube cell change.
    Old value (value before update).
    New value (value after update).
    Name of the cube updated.
Dimension elements that define the intersection updated.