#1
| |||
| |||
![]()
I need the Indira Gandhi National Open University CIC solved assignments so please can you give me the solved assignments and provide me the page where I can download the assignments?
|
#2
| |||
| |||
![]()
As you have required the CIC assignment of Indira Gandhi National Open University here I am giving you here its assignments. 1. The approach in which information is seen as structure of the world or static relations between physical objects which may be perceived or not is 1) Meaning approach 2) Knowledge approach 3) Message approach 4) Structured approach 2. ___________ is the ultimate receiver of information who may also generate or create information 1) Source 2) Channel 3) Recipient 4) Media 3. The commercial networks are 1) ARPANET, NSFNET, NASA 2) COMPUSERVE, MCI MAIL, AMERICA ONLINE 3) ISOC, IAB 4) None of the above. If you want to see full assignment then download given below attachment:-
__________________ Answered By StudyChaCha Member |
#4
| |||
| |||
![]()
Yeah sure, here I am sharing the MBA Solved Assignment of Indira Gandhi National Open University (IGNOU) MBA Solved Assignment “Management at all levels of specialized functions, is influenced by the critical elements of the business environment”. Explain with suitable examples. Solution: Business environment influences business management. The critical elements of business environment often interact with the critical elements of business management. The critical elements of business management are planning, direction, organization, control or coordination, staffing and supervision and evaluation. Management at all the levels, top, middle as well as supervisory, is concerned with these critical elements to a certain degree. Similarly, these very critical elements are the concerns of the management that specializes in different functions such as production, finance, marketing, purchase, inventory control, personnel, public relations, research and development etc. Management, at all the levels of specialized functions, is influenced by the critical elements of economic environment. For example, when an industry faces business recession, the management may decide to cut down the rate of production or to pile up inventory accumulation. When the market is being invaded by an increasing number of closely substitutable products, the management may decide to go in for aggressive advertisement or cut-throat competition. When the financial institutions start interfering too much with the day-to-day business operations of a firm, the firm's management may decide to depend exclusively on its own internal funds rather than borrowed capital. When the government enforces minimum wage legislations and other social security measures for all permanent workers, the management may decide to recruit only casual laborers through a labor contractor. Business environment may act either as a stimulant or as a constraint for business management. If the prevailing environment is favorable to business growth and prosperity, then the management feels happy and responds positively. Small business owners are often encouraged to produce more when the government pays them subsidy. On the other hand, when the prevailing environment is unfavorable, it acts as a disincentive. Rest of the Assignment is attached in below file which is free of cost for you Address: Indira Gandhi National Open University IGNOU Road, Maidan Garhi, New Delhi, Delhi 110068 011 2957 1000 Map: |
#5
| ||||
| ||||
![]()
As you have required the CIC assignment of Indira Gandhi National Open University here I am giving you here its assignments. 1. The approach in which information is seen as structure of the world or static relations between physical objects which may be perceived or not is 1) Meaning approach 2) Knowledge approach 3) Message approach 4) Structured approach 2. ___________ is the ultimate receiver of information who may also generate or create information 1) Source 2) Channel 3) Recipient 4) Media 3. The commercial networks are 1) ARPANET, NSFNET, NASA 2) COMPUSERVE, MCI MAIL, AMERICA ONLINE 3) ISOC, IAB 4) None of the above. 4. The mailing lists that have one or more human moderators who screen all incoming mail and only redistribute a selected portion to the list are 1) Unmoderated lists 2) Moderated lists 3) Usenet 4) Newsgroups 5. Open ended decision table permits access to another ___________. 1) Master file 2) Decision table 3) Transaction file 4) All of the above. 6. STUFFIT, and PKZip are the programs to 1) Transfer a file on Internet. 2) Copy a file. 3) Compress a file. 4) None of the above. 7. The program that locates files in public FTP archives is 1) Archie 2) Veronica 3) WAIS 4) All of the above. 8. The software that allows you to join groups, read articles, post new articles, and reply to existing articles is/are 1) WIN VN 2) Trumpet 3) Both 1) and 2) 4) None of the above. 9. In the URL “http: //www.netaddress.com” the domain name is 1) www 2) http 3) netaddress 4) com 10. The MOSAIC program is written by 1) NCSA 2) America Online 3) Netscape 4) None of the above. 11. A data dictionary does not provide information about 1) Where data is stored 2) The size of the disk storage device 3) Who owns or is responsible for the data 4) How the data is used. 12. Which of the following concepts are not related to OOPS? 1) Inheritance and class 2) Object 3) Encapsulation 4) None of the above. 13. ________________ is a characterization of the time or space requirements for solving a problem by a particular algorithm 1) Computational complexity 2) Organized simplicity 3) Unorganized simplicity 4) None of the above. 14. The graphical representation of the situation results in a special kind of a graph called a 1) Flowchart 2) Data flow diagram 3) Decision tree 4) ER diagram 15. The purpose of data dictionary is to 1) Describe an item or a group of items used in the system 2) Provide documentation 3) Clarify execution of job to management people 4) Only 1) and 2). 16. The scope of Information Science includes 1) The semantic organization of messages and of channels that facilitates the identification by sources and recipients 2) The overall organization of information systems and their performance in transfer 3) Both 1) and 2) 4) Neither 1) nor 2). 17. Problems which deal with integer quantities and must necessarily have integer solutions are known as 1) Euler’s theory 2) Diophantos equations 3) Classical conundrums 4) None of the above . 18. The idea of the algorithmic machine was 1) Church’s 2) Kleene’s 3) Hilbert’s 4) Turing’s 19. A kind of decision table that permits access to another decision table is 1) Mixed entry decision table 2) Limited entry decision table 3) Open ended decision table 4) Extended entry decision table. 20. The program flowchart 1) Illustrates the various algorithms to be performed within the computer for transforming the input into output 2) Is quite helpful to programmers in organizing their programming efforts 3) Both 1) and 2) 4) None of the above. 21. Which of the following is not a range of complexity? 1) Organized simplicity 2) Disorganized simplicity 3) Disorganized complexity 4) Organized complexity. 22. Modems and Routers differ in 1) Structure 2) Purpose 3) Speed of functioning 4) None of the above. 23. The data are collected for a given period of time and the resulting is processed as a single job is 1) Online processing 2) Realtime processing 3) Batch processing 4) None of the above 24. The __________ states that "every finite set of points of span d has a spanning circle no greater than 1) Jung's theorem 2) Pythagorus theorem 3) Euler's theorem 4) None of the above. 25. OLTP stands for 1) Offline transaction processing 2) Online transaction processing 3) Any of 1) or 2) 4) None of the above. 26. Which of the following statements are false? 1) In practical terms, a NP-Complete problem is one that can be solved by the computer only by waiting an extra-ordinarily long time for its solution. 2) f(n) = O(g(n)) if there exists two constants c and no such that |f(n)| <= c| g(n)| for all n>= no. 3) If we have two algorithms, which perform the same task, and the first has a computing time, which is O (n) and the second O (n2), and then we will usually take the first as superior. The reason for this is that as n increases the time for the second algorithm will get far worse than the time for the first. 4) None of the above. 27. Following activities can be performed if one has an access to the INTERNET. 1) You can refer to the picture of an art gallery 2) You can have electronic copy of journals and magazine from the INTERNET 3) You can send mail across the boundaries in no time 4) All of the above. 28. Rules governing the construction of data dictionary are 1) Word should be defined to stand for what they mean and not the variables names by which they may be described in the program. 2) Each word must be unique; we cannot have two definitions of the same client name and self-defining words should not be decomposed. 3) Aliases, or synonyms, are allowed when two or more entries show the same meaning; a vendor number may be called a customer number. 4) All of the above. 29. Which of the following match stands false? 1) Data flow Arrow 2) Process Circle 3) Two way decision Open-ended box 4) Source of destination Square Of the system 30. Which of the following components are used in constructing the data flow diagram? 1) Circle 2) Open-ended boxes, squares 3) Only 1) and 2) 4) Triangles and shaded lines
__________________ Answered By StudyChaCha Member |