Disadvantages of the columns-to-rows design pattern

Assignment Help Computer Engineering
Reference no: EM131124977

1. Which of the following best characterizes tightly coupled systems?

a. to expensive to change

b. use of a directory to identify the participating systems

c. indirection

d. connected by a "loose" network

2. Identify the major disadvantages of the columns-to-rows design pattern, and provide steps to eliminate them:

3. The most popular technique to solve interoperability problems is to use programmers to write code in a brute force fashion. Although interoperability can be achieved, there are several disadvantages to this approach. Name these disadvantages:

4. There were several waves in IT, some are considered to be of high amplitude, while others of low amplitude. The invention of communication networks, personal computer, and the Internet are all considered to be part of:

a. High amplitude waves

b. Industrial revolution

c. Low amplitude waves

d. Agricultural revolution

5. A strategic advantage for a company is best identified by the following sequence (first to last in chronological order)

a. Data->information-> unique differentiation

b. Unique differentiation->data->information

c. Unique differentiation -> information -> data

d. Data-> unique differentiation-> information

6. Your company has just acquired a major competitor company. Now there are two IT departments in the merged company. Name and briefly describe the major options that exist in integrating the two IT departments.

7. Consider an operational database (e.g inventory database) and a specific record with information about a book, such as "adaptive information" by Pollock and Hodgson, ISBN,Wiley, etc. Which metadata layer does this belong to?

8. A promising semantic interoperability framework contains several characterisitics, some of which are:

a. dynamic highly flexible information centric

b. web services oriented, custom code, dynamic

c. adapter oriented, EAI tools, remote procedure calls

d. middleware oriented, customized program, tighly-coupled

8. The biggest difference between tightly coupled and loosely couples systems is indirection. Briefly identify how indirection works, and provide a simple example that describes indirection using DNS

9. the statement Student_ID varchar2(10) which metadata layer does it belong to schema format layer

10. You are given 2 similar databases (e.g two inventory databases) with different schemas (schema A and schema B). Both databases contain inventory items but in a different formats. For example, an item ID in schema A is defined as ItemID number and in schema b is defined as XYZcomp_object_identifier varchar2(10). You need to write queries that span both schemas but because of such incompatibilities it is quite difficult. Based on the textbook identify possible ways of mapping schema A to schema B.

12. Type the formula that defines information

13. Consider the following two table definitions:

Create table EMP1 (empID varchar2(11), empName varchar2(50), empDept number);

Create table EMP2 (employeeID number, fName varchar2(25), lName varchar2(25), empDept number);

a. what type of conflicts do you observe between fields in the two definitions, and for which fields?

b. Name the different conflict solutions that exist to alleviate the above conflicts?

c. Write a SQL statement to retrieve full names from EMP1 and EMP2

14. Why there is no layer in the metadata model called "semantic layer"?

15. why context is difficult to contain in a metadata repository?

16. Your boss just gave you a new business rule to implement. Briefly discuss how would you specify a business rule and in which languages? In the majority of existing applications, where do we find?

Attachment:- Assignment.rar

Reference no: EM131124977

Questions Cloud

How hr function support operations and operate strategically : Your mission statement should describe core values of the human resource (HR) function that will drive future policies and procedures for your company. The mission statement should include a description of how the HR function will support operati..
What are the essential elements of a partnership : Tammy Duncan began working as a waitress at a diner owned by her mother hazel Bynum and stepfather Eddie Bynum. A few weeks later, the three created an agreement in which Tammy was to assume comanager duties for her stepfather. What are the essential..
Satellite licensing rights for live broadcast of boxing : The Garden City Boxing Club hel exclusive satellite licensing rights for a live broadcast of a boxing atch between Oscar De La Hoya and Fernando Vargas. Luis Dominguez owned Antenas Enterprises, the installer of a satellite account at Mundelein Burri..
Operated a part-time consulting business : For the past several years, Jeff Horton has operated a part-time consulting business from his home. As of April 1, 2015, Jeff decided to move to rented quarters and to operate the business, which was to be known as Rosebud Consulting Company, on a..
Disadvantages of the columns-to-rows design pattern : Identify the major disadvantages of the columns-to-rows design pattern, and provide steps to eliminate them. Why there is no layer in the metadata model called "semantic layer"
Characteristic of a bernoulli process circle one : a. Which of the following is a characteristic of a Bernoulli process? Circle one. a.    In each trial, there are just two possible outcomes. b.    The probability of a success remains the same from one trial to the next.
What is the sequence of the other dna strand : If one strand of a DNA double helix has the sequence TCGAGTCCGG. what is the sequence of the other DNA strand?
Average time spent waiting in line to get to ticket window : What is the probability that thereBeate Klingenberg manages a Poughkeepsie, New York, movie theater complex called Cinema 8. Each of the eight auditoriums plays a different film; the schedule staggers starting times to avoid the large crowds that wou..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe how a sequential file is searched

suppose a sequential file contains 20,000 records and 2 seconds are required to interrogate an entry. How long will we wait when retrieving a record from the middle of the file?

  Write a python program to compute the fibonacci numbers

Write a python program to compute the Fibonacci numbers F8, F28, F48. What are the three values? What is the total number of additions needed by your program? Provide your answers as well as your source code.

  Writing down the script

Write down a script known as whichdaemon.sh that checks if the httpd and init daemons are running over your system. If an httpd is running.

  How to protect your network to keep data safe

describe how to protect your network to keep data safe from loss or damage.

  Draw the tree graph for tictactoe game

draw the tree/graph for this file (circles as nodes and lines from parents to children). The board positions in the nodes are real. The weights are not what would be in the real game

  You work for mit consulting a leading it project consulting

you work for mit consulting a leading it project consulting company. your expertise is in project management scoping a

  The aim of this project is for you to discover how to use a

the aim of this project is for you to discover how to use a spreadsheet to model a typical engineering problem in this

  What would be the last statement executed

define the output of the screen when the program executes with a value of 200.

  Question1 date consists of a month day and year frequently

question1. date consists of a month day and year. frequently we represent each of these items as integers. such as july

  Assume, a computer has 2^16 bytes of main memory

assume, a computer has 2^16 bytes of main memory. There is a direct-mapped cache of 1KB with a line size of 4 bytes. Determine which cache block will the memory reference 111Bh map to?

  Define involved in supporting data integrity in a database

define the key concepts that are involved in supporting data integrity in a database. How is integrity enforced? What are the advantages of enforcing integrity? What are the disadvantages? How do integrity constraints impact the overall applicatio..

  Your boss has just heard about some nefarious computer

your boss has just heard about some nefarious computer activities called ping sweeps and port scans. he wants to know

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd