Saturday, 12 November 2016

BCA - SEMESTER - 4 - FALL - 2016


PROGRAM – BCA - SEMESTER - 4
SUBJECT CODE & NAME - BCA4010, COMPUTER NETWORKING


1.  What is OSI model? Explain all its layers with diagram.

OSI model:

Before  1990’s  data  communication  model  had  been  used,  in  1990’s  open system  Interconnection  (OSI)  was  used.  Later  TCP/  Ip  protocol  suit  has been  developed  such  that  it  was  easy  to  use  and  efficient  to  other. Established  in  1947,  the  International  Standards  Organization  (ISO)  is  a multinational  body  dedicated  to  worldwide  agreement  on  International standards.  An  ISO  standard  that  covers  all  aspects  of  network communications is the OSI model, which was first introduced in 1970s. Open System:  A set of protocols that allows any two different systems to communicate regardless of their underlying architecture.

Purpose of OSI Model:  It shows how to facilitate communication between different  systems  without  requiring  changes  to  the  logic  of  underlying hardware and software.

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com




2. What is Message and Packet switching?

Message switching

Message switching was the precursor of packet switching, where messages were routed in their entirety and one hop at a time. It was first introduced by Leonard  Kleinrock  in  1961.  Message  switching  systems  are  nowadays mostly implemented over packet-switched or circuit-switched data networks. Hop-by-hop Telex forwarding are examples of message switching systems. E-mail is another example of a message switching system. When this form of switching is used, no physical path is established in advance in between sender  and  receiver.  Instead,  when  the  sender  has  a  block  of  data  to  be sent, it is stored in the first switching office (i.e. router) then forwarded later at one hop at a time.

Each  block  is  received  in  its  entity  form,  inspected  for  errors  and  then forwarded or re-transmitted. It is a form of store-and-forward network. Data is transmitted into the network and stored                                                  
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com




3. What is Stop-and-Wait Automatic Repeat Request? Briefly explain.

Stop-and-Wait Automatic Repeat Request

This  protocol  adds  a  simple  error  control  mechanism  to  the  stop-and-wait protocol.  To  detect  and  correct  corrupted  frames,  we  need  to  add redundancy bits to our data frame. When the frame arrives at the receiver site, it is checked and if it is corrupted, it is silently discarded. The detection of errors in this protocol is manifested by the silence of the receiver. Lost frames are more difficult to handle than corrupted ones. The corrupted and lost  frames  need  to  be  resent  in  this  protocol.  If  the  receiver  does  not respond when there is an error, how can the sender know which frame  to resend?  To  remedy  this  problem,  the  sender  keeps  a  copy  of  the  sent frame. At the same time it starts a timer. If the  timer expires and there is no acknowledgement for the sent frame, the frame is                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com

4. What is the role of Internet Protocol version 4 (IPV4) in addressing and routing packets between hosts? Briefly explain the structure of an IPV4 packet.

Role of Internet Protocol version 4 (IPV4)

IPV4 is a datagram protocol primarily responsible for addressing and routin g packets  between  hosts.  IPV4  is  connectionless,  which  means  that  it  does not  establish  a  connection  before  exchanging  data,  and  unreliable,  which means  that  it  does  not  guarantee  packet  delivery.  IPV4  always  makes  a “best  effort”  attempt  to  deliver  a  packet.  An  IPV4  packet  might  be  lost, delivered out of sequence, duplicated, or delayed. IPV4  does not attempt to recover from these types of errors. A higher-layer protocol, such as TCP or an  application  protocol,  must  acknowledge  delivered  packets  and  recover lost packets if needed. IPV4 is defined in RFC 791. An IPV4 packet consists of an IPV4  header and an IPV4  payload. An IPV4  payload, in turn, consists of  an  upper  layer  protocol  data  unit,                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com



5. Discuss about different DNS Resource Record Types.

Resource Record Types

The  DNS  standards  define  many  types  of  resource  records.  The  most commonly used resource records are the following:

•  SOA:  Identifies the start of a zone of authority. Every zone contains an SOA  resource  record  at  the  beginning  of  the  zone  file,  which  stores information about the zone, configures replication behavior, and sets the default TTL for names in the zone.

•  A: Maps an FQDN to an IPv4 address.

•  AAAA: Maps an FQDN to an IPv6 address.

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com





6. Briefly explain five parts of Multipurpose Internet Mail Extensions.

Multipurpose Internet Mail Extensions (MIME)

Electronic  mail  is  probably  the  most  widely  used  TCP/IP  application. However, SMTP is limited to 7-bit ASCII text, with a maximum line length of 1000 characters. This results in a number of limitations, including:

•  SMTP cannot transmit executable files or other binary objects. There are ad hoc methods of encapsulating binary items in SMTP mail items, such as:

–  Encoding the file as pure hexadecimal
–  The UNIX uuencode and uudecode utilities, used to encode binary data in the UNIX-to-UNIX Copy (UUCP) mailing system

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com



 PROGRAM – BCA - SEMESTER  4
SUBJECT CODE & NAME - BCA 4020 -  JAVA PROGRAMMING


1.  Explain any five features of Java. 

Features of Java

Below are the features of Java

(1) Simple : - Java was designed to be easy for the professional programmer to learn and use effectively. Assuming that you have some programming experience, you will  not  find  Java  hard  to  master.  If  you  already  understand  the  basic concepts of object-oriented programming, learning Java will be even easier. Best of all, if you are an experienced C++ programmer, moving to Java will require very little effort. Because Java inherits the C/C++ syntax and many of the object-oriented features of C++, most programmers have little trouble learning  Java.  Also,  some  of  the  more  confusing  concepts  from  C++  are either  left  out  of  Java  or  implemented  in  a  cleaner,  more  approachable manner. Beyond its similarities with C/C++, Java has another attribute that makes it easy to learn: it makes an effort not                                                                                 
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com


2.  Describe main () method in Java. What are the rules for writing  a main () method?

The main() Method

In  a  Java  application,  you  may  have  many  classes. Within  those  classes, you  may  have  many  methods. The  method that  you  need  to  execute first should be the main() method.

Syntax for the main() method:
public static void main(String args[])
{
}
The main () method should exist in a class that is declared as public.

A Java application (like DateApp in the code listed above) must contain a main() method whose signature looks like this

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com


3.  Differentiate between packages and Interfaces.

Packages

To create a package is quite easy: simply include a package command as the first statement in a Java source file. Any classes declared within that file will  belong  to  the  specified  package.  The  package  statement  defines  a name space in which classes are stored. If you omit the package statement, the class names are put into the default package, which has no name. (This is  why  you  haven't  had  to  worry  about  packages  before  now.)  While  the default package is fine for short, sample  programs, it is inadequate for real applications. Most of the time, you will define a package for your code. This is the general form of the package statement: package pkg;
Here, pkg is the name of the package. For example, the following statement creates a package called           


                                                                  
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com

4.  What  are  Applets?  What  are  the  restrictions  of  Applets?  Describe about applet class.


Applets : -

An  applet  is  a  Java  program  that  can  be  embedded  in  a  web  page. Java applications  are  run  by  using  a  Java  interpreter.  Applets  are  run  on  any browser  that  supports  Java.  Applets  can  also  be  tested  using  the appletviewer  tool included in the Java Development Kit. In order to run an applet it must be included in a web page, using HTML tags. When a user browses  a  web  server  and  it  runs  applets  on  the  user’s  system. 


Applets have certain restrictions put on them :

·         They can not read or write files on the user’s system.
·         They can not load or run any programs stored on the user’s system.
All applets are subclasses of the  Applet  class in the  java.applet  package. Applets do not have main() method. All applets must be declared public. An applet displays information on the screen by using the paint method. This method  is  available  in  java.awt.Component  class.  This  method  takes  an instance          


                                                                            
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com

5.  Compare JDBC and ODBC.

Java Data Base Connectivity (JDBC)

The  JDBC  API  (Java  Data  Base  Connectivity  Application  Program Interface)  can access any kind of tabular data, especially data stored in a Relational  Database.  It  works  on  top  of  ODBC  (Open  Data  Base Connectivity)  which was the driver for database connectivity since  age old days  but  since  ODBC  was  implemented  in  C  so  people  from  the  VB background  had  some  problems  in  understanding  the  implementation intricacies. Since JDBC works on top of ODBC we have something called as a  JDBC-ODBC  bridge  to  access  the  database.  JDBC  helps  you  to  write Java  applications  that  manage                                  

                                                                            
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com


6.  Describe about:
a)  Swing
b)  JFC

a)  Swing

Swing is the next-generation GUI toolkit that  Sun  Microsystems created to  enable  enterprise  development  in  Java. By  enterprise development, we mean that programmers can use Swing to create  large-scale  Java  applications  with  a  wide  array  of  powerful components.  Swing  components  are  an  enhancement  to  the  existing Abstract Window Toolkit (AWT) components and are not intended to replace AWT  components.  Both  types  of  components  can  be  used  in  the  same interface.  Swing  components  range  from  basic  controls  such  as  buttons, check boxes, scrollbars, and sliders to complex widgets like text panes and editor  panes.  Unlike  AWT  components,  Swing  components  are  not implemented by platform-specific code; instead, they are written entirely in Java and, therefore, are                                                                                      
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com


 PROGRAM – BCA - SEMESTER - 4
SUBJECT CODE & NAME - BCA 4030 - SYSTEM SOFTWARE

1.  What is binding time? Write short on static and dynamic binding.

Binding Times:

Binding  time  is  the  time  at  which  a  binding  is  performed.  Thus  the  type attribute of variable  var  is bound to  typ  when its declaration is processed. The size attribute of  typ  is bound to a value sometime prior to this binding. We are interested in the following binding times:

1.  Language Definition time of L
2.  Language implementation time of L
3.  Compilation time of P
4.  Execution init time of proc
5.  Execution time of proc.

Where L is a programming language, P is a program written in L and proc is a procedure in P. Note that language implementation time  is the time when a language translator is designed. The preceding list of                                                                              
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com





2.  What is Language Processor? Explain the two Language processing activities.

A language processor is a hardware device designed or used to perform tasks, such as processing program code to machine code. Language processors are found in languages such as Fortran and COBOL.

Mainly,  computer  programming languages  are  classified  in  three  categories,  they  are,  machine  language, assembly language and high level language. Machine language is machine readable language that is a pattern of bits (binary representation) and can directly  executable  by  the  CPU  (Central  Processing  Unit).  Assembly language  uses  mnemonic  codes  to  represent  the  low-level  machine operations. These instructions should be converted into machine instruction for  further  processing.  For  this,  one  of  the  language  processor  called Language  translator  is  used.  Assembler  is  the                                                                                       
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com



3.  What is an assembly language? Explain its basic features. State the advantage and disadvantages of coding in assembly language.


Assembler  is  a  program,  which  translates  Assembly  Language  Program (ALP) into machine language program (object program). It places the object program in the secondary memory.

An  assembly  language  is  a  machine  dependent,  low  level  programming language  which  is  specific  to  a  certain  computer  system  ( or  a  family  of computer  systems).  Compared  to  the  machine  language  of  a  computer system, it provides three basic features which simplify programming:

1.  Mnemonic  operation  codes:  Use of mnemonic operation codes (also called  mnemonic opcodes) for machine instructions eliminates the need to memorize numeric operation codes. It also enables the assembler to provide  helpful  diagnostics,  for  example  indication  of  misspell  of operation codes.

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com



4. List and explain the devices which are distinguished and classified by UNIX/Linux OS and are attached to the computer devices

Classes of Devices

UNIX/Linux OS distinguishes  and classifies devices that  are  attached to the computer  devices  into  three  fundamental  device  types. 

They  are :

(i) Character devices
(ii)  Block devices
(iii) Network interfaces.

The modules developed as a device driver are usually implemented for one of these types of devices.  Depending upon the device types, the modulesfor device driver can  be  classified  as :

(i)  a  char  module 
(ii)  a  block  module 
(iii)  a  network module

Although the modules are programmed and divided into classes, it is  the  freedom  of  programmer  to  either  build  huge  modules  implementing different  drivers  in  a  single  chunk  of  code  or  build  into                                                                                       
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com





5.  Explain briefly Android Architecture Libraries.

Android Architecture Libraries

On  top  of  the  kernel  are  the  libraries.  Android  includes  a  set  of  C/C++ libraries  written  as  modules  of  code  that  are  compiled  down  to  native machine  code.  It  controls  the  device  to  handle  different  kinds  of  data efficiently.  These  libraries  tell  the  device  how  to  handle  different  kinds  of data  and  are  exposed  to  Android  developers  via  Android  application framework.  It  provides  some of the common services that are available for applications and  various components of the Android system. It  exposes its capabilities through Android application framework.

Libraries  in  Android  architecture  include  the  Surface  Manager,  Media Framework,  WebKit,  SQLite,  OpenGL/ES,  FreeType,  SGL,  SSL,  Libc. These native libraries run as processes within the underlying                                                                                      
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com





6.  Write the Steps for addressing UPnP device with proper flowchart.


The Steps for UPnP device addressing with proper flowchart are as follows:

Step1: Try to obtain an address via DHCP

First, a UPnP device must try to get an address from a DHCP server. If the device  successfully  acquires  an  address,  it  is  ready  to  continue  with subsequent UPnP phases.

Step2: Failing DHCP, proceed with Auto-IP

If the UPnP device fails to acquire an address from a DHCP server, it begins the process of selecting and testing an IP address.

                                           

                                                                            
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com



PROGRAM – BCA - SEMESTER - 4
SUBJECT CODE & NAME - BCA 4040 - PRINCIPLES OF FINANCIAL ACCOUNTING AND MANAGEMENT


1.  What are the elements of financial statements? Explain, in brief, the recognition criteria of elements of financial statements.

Elements of Financial Statements

Financial  statements  are  the  end  products  of  the  accounting  process. Financial statements are prepared and presented for external users. The scope of financial statements is different in different countries. In India, the term  ‘Financial  Statements’  consists  of  Balance  Sheet,  Profit  and  Loss Account and the Schedules and Notes forming part thereof. The Conceptual Framework  developed  by  the  International  Accounting  Standards Committee  (IASC)  defines  the  objective  of  financial  statements  as  ‘to provide information about the financial position, performance and changes in financial position of an enterprise that is useful to a wide range of users in making economic decisions’.

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com




2.  What is rectification of errors? List and explain the stages where the errors are deducted for rectification.

Rectification of errors :

In financial accounting, every single event occurring in monetary terms is recorded. Sometimes, it just sohappens that some events are either not recorded or it is recorded in the wrong head of account or wrongfigure is recorded in the correct head of account.Whatever the reason may be, there is always a chance of error in the books of accounts. These errors inaccounting require rectification. The procedure adopted to rectify errors in financial accounting is called"Rectification of error"

Rectification  of  errors  depends  on  the  stage  at  which  the  errors  are detected.   There  are  mainly  two  stages  in  the  accounting  process  when errors can be detected:

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com






3.  What are the objectives of financial management?

Objectives of Financial Management

The firm’s investment rationale and financing decisions are continuous. It is generally  agreed  that  the  financial  goal  of  the  firm  should  be  the maximization  of  the  owners’  economic  welfare.  The  owners’  economic welfare  can  be  maximized  by  maximizing  the  shareholders’  wealth  as reflected  in  the  market  value  of  shares.  Profit  maximization  and  wealth maximization are two important aspects.

1. Profit Maximization

Profit maximization means increasing the rupee income of firms. Pricing of goods is a very important function and is determined by the type of economy in  which  the  firm  is  functioning.  This  may  be                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com






4.  What is inventory management and explain the following:
a.  Economic Order Quantity
b.  Reorder Point

Inventory Management

The term ‘inventory’ refers to the stockpile of products. Inventory comprises of  those  assets  which  will  be  sold  off  in  the  near  future  and  moneys recovered. Inventory consists of three types of assets  –  raw materials, semi -finished  goods  (work  in  progress)  and  finished  goods.  Raw  material inventory  consists  of  those  items  which  are  purchased  by  the  firm  to  be converted  into  finished  goods.  Work  in  progress  inventory  consists  of partially  complete  goods,  that  is,  items  currently  being  used  in  the production  process.  Finished  goods  stock  represent  completed  products ready to be sold.

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com





5.  Explain different steps involved in preparation of Fund Flow Statements.

Steps in Preparation of Fund Flow Statement

1.  Preparation of schedule changes in working capital (taking current items only).

2.  Preparation of adjusted profit and loss account (to know fund from [or] fund lost in operations).

3.  Preparation  of  accounts  for  non-current  items  (Ascertain  the  hidden information).

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com



6.  State merits and demerits of Marginal Costing.


Merits of Marginal Costing

Merits of Marginal Costing are as follows: -

1.  Constant in nature :
Marginal cost remains the same per unit of output whether there is increase or decrease in production.

2.  Realistic :
It is realistic as fixed cost is eliminated. Inventory is valued at marginal cost. Therefore, it is more realistic and uniform. No fictitious profit arises.

3.  Simplified overhead Treatment :
There  is  no  complication  of  over-absorption  and  under-absorption  of overheads.

4.  Facilitates control :
Classification of cost as fixed and variable helps to have greater control over costs.

                                                                                     
READY MADE SOLVED ASSIGNMENTS, PROJECT REPORTS, MODEL QUESTION PAPERS, GUIDE, SYNOPSIS ETC. OF SIKKIM MANIPAL UNIVERISTY
Call : - +91 – 9540358147, Whatsapp: +91 - 8285115522
Website: - www.smudoc.in, Email ID : smudoc@gmail.com