Explain the structured decomposition, Database Management System

Assignment Help:

Differentiate between the object oriented decomposition and the structured decomposition?

Process-oriented (structural) decomposition divides a complex process, function or task into easier subprocesses until they are easy enough to be dealt with. The solutions of these subfunctions then require be integrating and executing in certain sequential or parallel orders in order to obtain the solution to large complex system. On the other hand object-oriented decomposition targets at identifying individual autonomous objects which encapsulate both state and certain behaviour. Each main component of system is called subsystem. Then, communication between these objects leads to desired solutions. Object-oriented decompositions of the systems tend to be better able to cope with modification. Each subsystem has well-defined interfaces that communicate with rest of system.

 


Related Discussions:- Explain the structured decomposition

What is a security, What is a security? Securities are claims on financ...

What is a security? Securities are claims on financial assets.  They can be illustrated as "claim checks" which give their owners the right to receive funds in the future.  Sec

Update operations, The Update Operations : Update operations are used fo...

The Update Operations : Update operations are used for altering database values. The constraint violations faced by this operation are logically the similar as the problem faced

Describe all integrity constraints which are violated, Consider the two rel...

Consider the two relations given below Given that A is the primary key of R, D is the primary key of S and there is a referential integrity among S.A and R.A, discuss all

Give the limitations of sql authorization, Give the limitations of SQL auth...

Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic

Weak entity, An example of a weak entity is Staff because the availabilityI...

An example of a weak entity is Staff because the availabilityID cannot be uniquely identified unless it is used in conjunction with the foreign key known as availabilityID in the A

What are the reasons of bucket overflow, What are the reasons of bucket ove...

What are the reasons of bucket overflow? Explain any two methods for solving this problem. Ans:  It is general for file structures to be divided into equal-length partitions, k

Give an example of operations from the state actions, Give an example of op...

Give an example of operations from the State Actions and Activities. For instance, in bank the activity verify account code and verify password

Define redo logs, Redo Logs: Any database must have minimum two redo logs....

Redo Logs: Any database must have minimum two redo logs. These are the rules for the database; the redo logs record all modifies to the system objects or user objects. If any type

Write short notes on domain relational calculus, Write short notes on domai...

Write short notes on domain relational calculus The domain relational calculus uses domain variables that take on values from an attribute domain rather than values for whole t

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd