Thursday, 3 September 2015

BCA - SEMESTER - 6 - SUMMER - 2015

PROGRAM  BCA
SUBJECT CODE & NAME BCA6013– Cloud Computing

1  Write short notes on:
  Infrastructure-as-a-Service (IaaS),
  Platform-as-a-Service (PaaS)
  Software-as-a-Service (SaaS).

Ans- Infrastructure-as-a-Service  like  Amazon  Web  Services  provides  virtual

server  instance  API  (Application  programming  interface)  to  start,  stop, access  and  configure  their  virtual  servers  and  storage.  In  the  enterprise,  cloud computing allows a company to pay for only as much capacity as is  needed, and bring more online as soon as required. Because this pay-forwhat-you-use  model  resembles  the  way  electricity,  fuel  and  water  are  consumed, it's sometimes referred to as utility computing.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2  What are the governing bodies for cloud services and what are their  roles and responsibilities?

Ans- Establishment of the governance body

You need your own group of people who understand your business to dealwith  the  business  of  the  cloud.  This  governance  board  might  consist  of  representatives  of  corporate,  departmental,  and  IT  management  to  help  encourage  communication  the  kind  necessary  to  link  IT  management  and
the  business.  This  board  may  also  create  other  groups  responsible  for  different aspects of                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




3.What  is  cloud  client  in  cloud  computing technology?  Explain  three  different types of hardware clients.

Ans- Clients

A  cloud  client  consists  of  computer  hardware  and/or  computer  software  which relies on cloud  omputing for application delivery, it embraces the use  of  cloud  computing  architectures  but  adds  a  client  technology  that  runs  locally  on  a  computer  or  device  and  can  interact  with  local  applications  and resources. It also  acts as  an  interface  between  cloud  and  the common computer user  through  web  browsers  and  thin  computing  terminals.  So  the  term  cloud  client  describes  a  piece  of  hardware,  a  piece  of  software  or  both,  that  is  specifically designed for a cloud service.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4  Write the merits and demerits of cloud storage.

Ans- Merits and Demerits of Cloud Storage

There  are  several  advantages  of  the  cloud  storage  model  compared  to  networked online storage and  individual storage.  The data stored in the end  user device cannot be accessed easily by others whereas the cloud storage  data is with third party. In cloud storage since it is with third party there are
more  prone  to  loss  or  theft.  Networked  storage  devices  addressing  those  Bproblems, but they still require both human and physical resources that an  individual  or  a  corporation  may  not  possess.  For  example,  creating  a  redundant  storage  array  and  backing  it  up  is  outside  the  skill  set  of  most
people,  while  building  and  maintaining  a  data  center  is  beyond  the  core capabilities  of  most                                                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



5.  Explain why companies prefer private cloud than the public cloud?

Ans- Reasons  why companies prefer private cloud than the public cloud.

  Your organization has a huge, well-run data center with a lot of spare  capacity. It would be more  expensive to use a public cloud even if you  have to add new software to transform that data center into a cloud.

  Your organization offers IT services to a large ecosystem of partners as  part  of  your  core  business.  Therefore,  a  private  cloud  could  be  a  revenue source.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



  
                    PROGRAM  BCA (REVISED FALL 2012)
SUBJECT CODE &  NAME BCA6021 – KNOWLEDGE MANAGEMENT
1.  What  are  the  internal  and  external  forces  that  drive  Knowledge Management? Explain in brief.
The Future of Knowledge Management
The future of knowledge management can be analyzed by three continuing  trends:
(1)  Benefit  to  KM  due  to  progress  in  information  technologies:  KM  will  benefit  from  continual  and  dynamic  progress  in  information  technologies.  Since  cost  of  digitizing  information  has  become  very  minimal due to improvements in cost/performance ratios of IT, KM will  become  inevitable.  The  cost  of  coordination  across  individuals,  organizational  sub-units,  or  organizations                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





2.  Define data, information and knowledge. How are they related?
Data, information and knowledge
In the previous unit, you have already read about the data, information and  knowledge. Let us discuss  the same in different  perspectives. We can read  data, we grasp information, and we acquire knowledge. We can also store  data, information, and knowledge in the computer. So we must differentiate  these  terms  –  data,  information  and  knowledge  in  the  perceptual  and  cognitive space and be able to differentiate them in the computational space.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




3.  What are the key differences between conventional  system lifecycle and KM system lifecycle?

Key differences between conventional system lifecycle and KM system lifecycle:
The main objective of the conventional system lifecycle and the KM system  lifecycle is same, i.e., to enable the project to be accomplished   more easily  and  efficiently.  But  there  are  some  differences  between  both  the  system  lifecycle in the way both the system accomplish any task or project. The key
differences between both the conventional system lifecycle and KM system  lifecycle are shown in table 4.1 in terms of phases through whic h both the  system passes for the development of software project.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  Explain Nonaka’s Model of Knowledge Creation &  Transformation.
Nonaka’s Model of Knowledge Creation & Transformation
In 1995,  Ikujiro Nonaka,  a  Japanese organizational theorist and Professor Emeritus at the Graduate School of International Corporate Strategy of the Hitotsubashi  University,  coined  the  terms  tacit  knowledge  and  explicit  knowledge  as  the  two  main  types  of  human  knowledge.  The  key  to
knowledge  creation  lies  in  the  way  it  is  mobilized  and  converted  through  technology. In the earlier unit, knowledge management has been defined as performing  the  activities  involved  in  discovering,  capturing,  sharing,  and  applying  knowledge  so  as  to  enhance,  in  a  cost-effective  fashion,  the  impact  of  knowledge on the unit’s goal achievement.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



5.  What are the indicators of expertise? List all of them.  [10]  10
The indicators of expertise are as follows:
  The expert commands genuine respect.
  The expert is found to be consulted by people in the organization, when  some problem arises.
  The  expert  possess  self-confidence  and  he/she has  a  realistic  view  of  the limitations.
  The expert avoids irrelevant information, uses facts and figures.
  The expert is able to explain  properly and he/she can customize his/her  presentation according to the level of the audience.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



6.Write the steps involved in using the Delphi method survey.

Steps involved in using the Delphi method:
  Identify issue or question that needs to be addressed; typically this will  be a complex issue requiring expert advice.
  Form  Delphi  team  of  voluntary  participants  to  undertake  in  project  as  well as monitor research activities. Select appropriate participants who  are experts with matter at hand.
  Create  first  set  of  Delphi  question,  pilot  questionnaire  to  avoid  using  improper wording that is ambiguous or vague
  Distribute first questionnaire to panelist
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



BCA - SEMESTER - 3 - SUMMER - 2015

PROGRAM  - BCA
SEMESTER - 3
SUBJECT CODE & NAME - BCA3020 – Data Base Management System(DBMS)
1.  Explain the functions of the following
(a)  Entities
(b)  Attributes
(c)  Relationships

(a)  Entities

The entity-relationship (E-R) data model based on a perception of real world that consists of a set of basic objects called  entities, and of  relationships among  these  objects.  It  was  developed  to  facilitate  database  design  by  allowing  the  specification  of  an  enterprise  schema,  which  represents  the  overall  logical                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


here  employee,  department,  division,  project,  skill,  and  location are all examples of entities.

(b)  Attributes

Attributes are characteristics of entities that provide descriptive details about them. A particular occurrence of an attribute within an entity or relationshipis called an attribute value. Attributes of an entity such as  Employee may include                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




(c) Relationships

Relationships represent real-world associations among one or more entities, and,  as  such,  have  no  physical  or  conceptual  existence,  other  than  that which depends upon their entity associations. Relationships are described in terms of degree, connectivity, and existence. These terms are defined in the sections that                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  Write the functions of the following
(a)  Storage Manager
(b)  Buffer Manager

The Storage Manager: 

The Storage Manager interfaces with the operating system  (OS)  to  write  data  to  the  disk  efficiently.  Because  the  storage functions reside in a separate subsystem, the MySQL engine operates at a level of abstraction away from the operating system. This means that if you port to a different operating system that                                                         
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



The  Buffer  Manager

This  subsystem  handles  all  memory  management issues  between  requests  for  data  by  the  Query  Engine  and  the  Storage Manager.  MySQL  makes  aggressive  use  of  memory  to  cache  result  sets that  can  be  returned  as-is                                                        
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




3.  List and explain the important responsibilities of database manager.  


The important responsibilities of database manager are as follows :

·        Interaction with file manager: The raw data is stored on the disk using the  file  system  which  is  usually  provided  by  a  conventional  operating system.  The database manager translates the various DML statements into  low-level  file  system  commands.   Thus  the  database  manager  is responsible for the actual storing, retrieving and updating of data in the database.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



4.  Explain the Sequential File Organization with the help of diagrams.

A  sequential  file  is  designed  for  efficient  processing  of  records  in  sorted  order  based  on  some  search-key.  A  search  key  is  any  attribute  or set  of attributes; it need not be the primary key, or even a superkey. To permit fast retrieval  of  records  in  search-key  order,  we  chain  together  records  by                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




5.  Explain basic operations of Relational algebra?

Basic  operations  are  the  traditional  set  operations:  union,  difference, intersection  and  Cartesian  product.  Three  of  these  four  basic  operationsunion, intersection, and difference  –  require that operand relations be union compatible. Two relations are union compatible if they have the same                                                                
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





6.  What are the disadvantages of Data Distribution.

The  primary  disadvantage  of  distributed  database  systems  is  the  added complexity  required  to  ensure  proper  coordination  among  the  sites.  This increased complexity takes the form of:

Software development cost:  It is more difficult to implement a distributed database system and, thus, more costly.

Greater  potential  for  bugs:  Since  the  sites  that  comprise  the  distributed                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




7.  Write a note on the following
a)  SUBSET Mapping
b)  SUPERSET Mapping

SUBSET Mapping:

This type of mapping is used when all the attributes of a persistent  class  are  mapped  to  the  same  table.  It  is  also  used  when  apersistent class is not concerned with some of the columns (not part of the business model) of its corresponding table in the database. The attributes of a persistent class with a                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



SUPERSET Mapping:

This is done when a  persistent class with a superset mapping  contains  attributes  derived  from  columns  of  multiple  tables.  This type of mapping is also known as                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  BCA REVISED 2012
SEMESTER  III
SUBJECT CODE & NAME - BCA3030 - UNDERSTANDING PC & TROUBLE SHOOTING

1  What are processor modes? Explain the three types of processor modes

Before we proceed to the CPU concepts and its architecture, it would help  you  to  have  a  brief  introduction  to  some  of  the  concepts  of  processor  modes. In generic term, mode is a way that creates a system for itself for its  processor  creation  and  operations.  Processor  mode  is  responsible  for  managing and controlling the system memory and its use. Processor modes  are classified into three types as:

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  List the different PCI signals along with their functions 

PCI signals
There  are  various  signals  which  serve  different  functions  in  the  PCI  Bus.  The  PCI  configuration  is  differentiated  as  asynchronous  and  synchronous  based  on  the  dependence  of  the  FSB  speed.  FSB  stands for  Front  sided

Bus which is responsible for data transfer between CPU and one of the two  chips  of  the  Core  logic  chipset  on  the  mother  board.  An  asynchronous  configuration is found in the latest motherboards                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




3.  Define the following


a.  Front Sided Bus

FSB stands for Front Sided Bus and used to connect CPU to the computer  system and CPU with the various other components of the system. FSB is  two directional flows of data. It means various components send and receive the data from the processor. FSB is also called as processor Bus because
its acts as a main path for the data flow from processor to other parts of the  motherboard. The speed of                                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




4 . What is POST? What are the various steps performed by the POST to check for resource availability

Power-On-Self-Test (POST)
Power-On-Self-Test is a routine that is run to ensure that all the components  and  functions  of  the  computer  are  working  correctly  to  start  the  computer  successfully. The POST only checks the system for availability of resources;  however, POST also manages the initialization of computer system entirely.  It  performs  the  following  steps,  along  with  a  check  for  availability  of  resources.




                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM





5.  Discuss any five guidelines that we need to follow while troubleshooting the hardware problem

Guidelines that we need to follow while troubleshooting the hardware problem

o  Hardware  failures  or  Configuration  problems:  There  may  be  some  hardware  problems  such  as  high  or  low  power,  limited  bandwidth,  malfunctioning,  etc.  In  this  case,  make  sure  that  the  root  is  working  properly through the Device Manager. If you find an exclamation mark in  a  yellow  circle  or  triangle  along  with  root  hub  then  it  means  there  is  some  error.  USB  Root  Hubs  are  both   hysical  and  virtual  installation  ports that can be found on your computer that are used for implementing  and                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




6  List the steps involved in installation of software in modem.

Modem Installation

Step One: Prepare for installation

Uninstall all other modems that are installed on your computer. For instructions, refer to the ocumentation for your previous modem. Unplug all telephone and power cords connected to your previous modems. Step Two: Install the Hardware

Use the provided telephone cord to connect the phone jack on the modem to an analogue telephone wall jack. insert phone

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  BCA
SUBJECT CODE & NAME  BCA 3040 – DATA COMMUNICATION

1.  Draw the block diagram of communication system and briefly explain each block.
Basic Block Diagram of a Communication System:
Block diagram is a diagram of a  communication  system  shown in below figure consists of information source, transmitter, channel and receiver blocks. The detailed explanation of the blocks is discussed below.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM








2.  Briefly  explain  the  communication  channel  with  an  example.

Ans- Communication channel

Communication channel means  a medium through which electrical signals can be transmitted.  A communication  channel (or  simply  channel), refers  either  to  a  physical  transmission  medium  such  as  a  wire,  or  to  a  logical  connection  over a  multiplexed  medium such as a radio channel. A channel
is  used  to  convey  an  information  signal,  for  example  a  digital  bit  stream,  from  one  or  several  senders  (or  transmitters)  to  one  or  several  receivers.  Signals  transmitted  may  be  either  analog  or              


                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




3  What is modulation? Explain why modulation is required.

Ans- Modulation

Modulation  is  the  process  of  varying  one  of  characteristics  (either  amplitude  or  frequency  or  phase)  of  a  high-frequency  periodic  waveform,  called the carrier signal, with a modulating signal which typically contains  information to be transmitted. If we look at a general function for a sinusoid:

We  can see that this sinusoid has 3 parameters  or characteristics  that can  be altered  to transmit data.  .  The first term, A, is called the  magnitude, or  amplitude of the sinusoid. The next term,   is known as                                                                                       
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




4  What is Coaxial cable? Briefly explain the structure of Coaxial cable with a supported diagram.

Ans- Coaxial cable

Coaxial cable has traditionally been an important part of the long distance  telephone  network.  Using frequency-division  multiplexing  (FDM),  a  coaxial  cable can carry over 10,000 voice channels simultaneously. Coaxial Cable  consists of 2 conductors. The inner conductor is held inside  an insulator with the other conductor woven around it providing a shield. An  insulating protective coating called a jacket covers the outer conductor.  The  outer shield protects the inner conductor from outside electrical signals. The physical  description  is  shown  in  figure  3.3.  A  single  coaxial  cable  has  a                                                                              
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



5.Briefly  explain  Nyquist  theorem  with  mathematical  representation.

Ans- Nyquist theorem

The Nyquist theorem states that “a signal must be sampled at least twice as  fast as the bandwidth of the signal to accurately reconstruct the waveform” In other words, the sampling frequency should be at least twice the highest frequency contained in the signal. It is mathematically represented as fs ≥ 2fm

Where  fs is  the  sampling  frequency  and  fm is  the  maximum  or  highest  frequency contained in the                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



6  What  are  the  advantages  of  packet  switching  over  circuit  switching?

Ans- This approach has a number of advantages over circuit switching:

•  Line  Efficiency  is  greater,  because  a  single  node-to-node  link  can  be  dynamically shared by many packets over time. The packets are queued  up  and  transmitted  as  rapidly  as  possible  over  the  link.  But  in  circuit  switching, time on a node-to-node link is preallocated using synchronous
time  division  multiplexing.  Much  of  the  time,  such  a  link  may  be  idle  because a portion of its time is dedicated to a connection that is idle.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  BCA(REVISED FALL 2012)
SUBJECT CODE & NAME  BCA 3050 – Soft Skill - Personality Development


1.  (a)  Explain any two personality characteristics in an organization.
(b)  Explain the POSEC method of time management.

Ans-a. Personality Characteristics in Organizations

Managers should learn as much as possible about personality in order to  understand  their  employees.  Hundreds  of  personality  characteristics  have  been  identified.  We  have  selected  eight  characteristics  because  of  their  particular influences on individual behaviour in organizations. They are:

1.  Locus of Control
2.  Machiavellianism
3.  Self-esteem
4.  Self-efficacy
5.  Self-monitoring
6.  Positive / Negative Affect
7.  Risk Taking
1.  Locus of Control

Some people believe they are masters of their own fate. Other people see  themselves as pawns of fate, believing that what happens to them in their  lives  is  due  to  luck  or  chance.  An  individual's  generalized  belief  about  internal (self) versus external (situation or others) control is called locus of
control.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



b. POSEC Method

POSEC  is  an  acronym  for  Prioritize  by  Organizing,  Streamlining,  Economizing and Contributing.

The method dictates a template which emphasizes an average individual's  immediate  sense  of  emotional  and  monetary  security.  It  suggests  that  by  attending  to  one's  personal  responsibilities  first,  an  individual  is  better  positioned to shoulder collective responsibilities Prioritize:  Your time and define your life goals by:

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  Why are goals important? Why should they be SMART? 


Goals  give  a  sense  of  direction.  People  confuse  goals  with  dreams  and wishes.  Dreams  and  wishes  are  nothing  more  than  desires.  However, desires become strong when they are supported by,
·         Direction
·         Dedication
·         Determination
·         Discipline
·         Deadlines
That  is  what  differentiates  a  desire from  a goal.  Goals  are  dreams  with  a deadline and an action plan. Goals can be worthy. It is passion, not wishing that turns dreams into reality.

                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3. What is self-image? How is it created?

The  ‘self-image’  is  derived  from  Carl  Roger’s  ‘Self -Theory.’   According  to him, the ‘self’ consists of all the perceptions, ideas, values and features that characterize ‘I’ or ‘Me’. It includes ‘what I am’ and ‘What I can do.’ Roger defines  the  self  concept  as  “an  organised,  consistent,  conceptual  gestalt composed  of  perceptions  of  the  characteristics  of  the  I  or  Me  and  the perceptions  of  the  relationships  of  I  or  Me  to  these  perceptions.”  An individual with a strong, positive self -concept is                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM