Explain the structured decomposition, Database Management System

Assignment Help:

Differentiate between the object oriented decomposition and the structured decomposition?

Process-oriented (structural) decomposition divides a complex process, function or task into easier subprocesses until they are easy enough to be dealt with. The solutions of these subfunctions then require be integrating and executing in certain sequential or parallel orders in order to obtain the solution to large complex system. On the other hand object-oriented decomposition targets at identifying individual autonomous objects which encapsulate both state and certain behaviour. Each main component of system is called subsystem. Then, communication between these objects leads to desired solutions. Object-oriented decompositions of the systems tend to be better able to cope with modification. Each subsystem has well-defined interfaces that communicate with rest of system.

 


Related Discussions:- Explain the structured decomposition

Develop a java application, 1 - Serial RS232 comm port comunication 2 - ...

1 - Serial RS232 comm port comunication 2 - NanoHTTPD serving a few processed pages 3 - System tray application to indicate status and access configuration forms 4 - SQLit

What is identity, What is Identity? Identity (or AutoNumber) is a colum...

What is Identity? Identity (or AutoNumber) is a column that automatically produces numeric values. A start and increment value can be set, but most DBA leave these at 1. A GUID

Give an example of enforcement in typing, Give an example of enforcement in...

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

What is relational model feature, What is relational model feature? A r...

What is relational model feature? A relational model feature is much more data independence than some other database models.

How to deal with the authentication problem, Most computer systems authenti...

Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,

Critically evaluate the bulleted list of information, Critically evaluate t...

Critically evaluate the bulleted list of information-related items in this case study. How are each contradictory to the notion of being an information-literate knowledge worker?

Example of equijoin, Example: Consider the following relations: ...

Example: Consider the following relations: ROLLNO NAME ADDRESS COURSE_ID 100 Ka

Compare the nested-loop join and block-nested loop join, Compare the Nested...

Compare the Nested-loop join and block-nested loop join Ans: Nested  loop join - It is costly as worst case cost, no. of block accesses needed is n r * b s + b r   where b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd