Assignment, Database Management System

Assignment Help:
Birla Institute of Technology & Science, Pilani
Work-Integrated Learning Programmes Division
Second Semester 2012-2013

EC-1 Assignment 2 (7.5% of the grade)

Course No. : SS ZG515
Course Title : DATA WAREHOUSING
Due Date : 31st March, 2013
************************************************************************

1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictorial form so that it is easy to understand.
a. Finance cube (3 hours to build)
b. Warranty cube (4 hours to build)
c. Order cube (2 hours to build)
d. Customer master data (30 min run time)
e. Vendor master data (60 min run time)
f. Product master data (60 min run time)
g. Other Master data (2 hour run time)
Finance and Order cubes cannot run together.


2) Above cubes are used by NA and EU users, NA users will only use NA data and EU users will use only EU data but Master data is common for both NA and EU. The requirement of availability stays same for NA (6AM CST) and for EU reports/cubes should be available by 6am CET.

What changes you need to make to the job scheduling proposal of Question 1 to meet the requirement of Question 2?

CST – NA Central Standard Time.
CET - EU Central European Time.

Related Discussions:- Assignment

Describe the nested-loop join and block-nested loop join, Describe the nest...

Describe the nested-loop join and block-nested loop join.   Ans:   The block nested- loop join algorithm is as described below:     for every block B r of relation R do beg

What are the authentication modes in sql server, What are the authenticatio...

What are the authentication modes in SQL Server? How can it be changed? Windows mode and Mixed Mode - SQL and Windows. To alter authentication mode in SQL Server click Start, P

Difference between operating system and database security, Difference betwe...

Difference between Operating System and Database Security Security within the operating system can be executed at various levels ranging from passwords for access to system, t

Gui interfaces, Draw the database using the ER approach and then make the t...

Draw the database using the ER approach and then make the tables accordingly. Populate the tables so that every table have at least 10 tuples. Then using Java and SQL, execute the

What is icr, What is ICR? A. ICR (Intelligent Character Recognition) is...

What is ICR? A. ICR (Intelligent Character Recognition) is a technology that gives scanning and imaging systems the ability to identify images of hand-printed or script charact

Create table to evaluating websites-reasoning, Have a look around the site,...

Have a look around the site, and at some of the sites they have featured. These are all examples of bad design, and also offer an explanation about why they fall into this category

ERD, online eductional management system ke diagram

online eductional management system ke diagram

Clinic, Need a sample of a clinic database relationships

Need a sample of a clinic database relationships

What three major types of actions includes databases, What three major type...

What three major types of actions includes databases? Briefly discuss these The three major types of actions including databases are: (i) Defining: It includes specifyin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd