Design and implement schemasusing xml schema, Programming Languages

Assignment Help:

You are to build a Schema in XML Schema Language that will be used to support the development of the new central course information management system and other supporting applications in the Mohawk College Registrar'sOffice. After a lot of discussion, the Registrar has the following information for you: 

1. A course is uniquely identified by a department prefix (4 letter code such as "COMP") and a course number (5 digit number such as "10078").

2. Each course has a human-readable title, up to 40 characters long. Thetitle appears on course schedules and transcripts but is not the unique identifier for the course.

3. Each course is offered for a certain number of credits, with 3being the default value.

4. The Registrar makes a distinction between the generalized description of a course and a "course offering" which is a specific instance of a course. That is, a course offering is a particular course and section number offered in a particular semester, taught in a specific room by a specific faculty member at a specific time.

5. A student has a name, an email address and a student ID number (and lots of other information which we will ignore.) A student also has an IDREF to her transcript.

6. A transcript has an IDREF to a student via the student ID, a gpa decimal, a list of 0-3 majors, and a list of up to 16 semester records. You may simplify your life by making the majors be same as the department prefixes.

7. A semester record has a list of 0-6 course enrollment records (see below).

8. An enrollment record tabulates the information for each course a student has enrolled in --- the course information and (for courses now completed) the grade received.

9. A class list has the course offering info and a list of the students by IDREF.

a) Design and implement schemasusing XML Schema Language for:

a. a course catalog

b. a list of courses offered in a semester

c. a student transcript

d. Create sample XML instance documents for schemas a,b,cas described above.Use your own name, email, student id, class list, etcin your examples.

Include suitable annotations (documentation) in your schema(s)and comments in your xml to explain your design and implementation choices. You may use a schema editor / design tool and/or instance generation tool - if you do, you must mention it in your comments. Ensure that your instance document validates against your schema document. Include all files in your submission.


Related Discussions:- Design and implement schemasusing xml schema

Assembly language, I need help with having a user input a year, and my prog...

I need help with having a user input a year, and my program to spit out what day of the week Christmas is on.... any helping hands on this?

Write a shell script to find the factorial of a given number, W.A.S.S to fi...

W.A.S.S to find the factorial of a given number. Program # W.A.S.S to find the factorial of a given number.    echo -e "enter number:\c"            #  \c Suppress trailing n

Visual logic, how much it will cost? i need learn how to make rightsided tr...

how much it will cost? i need learn how to make rightsided triangle in forloop

Python: returning one dimensional list from strings , How to build one dime...

How to build one dimensional list from string and build string from a list? Suppose input string is: STACKOVERFLOW then the output list should be outputList = [S,T,A,C,K,O,V,E,R,F

Retrive unicode text using vb.net ado.net, How Can I Retrive Unicode CSV Fi...

How Can I Retrive Unicode CSV File the ADO.net VB.net

Multi-targeting .net structure, Support for Multi-Targeting The multi-targe...

Support for Multi-Targeting The multi-targeting function of Vision Facilities allows you specify the particular edition or account of the .NET Structure that is required for your p

Explain the booch methodology, Problem 1 Explain the Booch Methodology ...

Problem 1 Explain the Booch Methodology 2 Why does every interaction diagram need a written description? Explain 3 Explain the five core workflows of the Unified Process

What is an authentication subsystem, Question: (i) All Security authen...

Question: (i) All Security authentication mechanism that run on the TRU64 Unix Operating system run under the Security Integration Architecture (SIA ) layer. Explain with di

Implement a program that can draw graphs, 1. Implement a program where an e...

1. Implement a program where an ellipse follows the perimeter of the window. 2. Implement a program that can draw graphs, possibly following your plan from last week. Have it gr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd