Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
I need ERP system
We are selling automotive spare parts on the internet and we require ERP software, which would sync with our e-shop. Our e-shop doesn't use any e-commerce platform. It is self made.
ERP will use "ready-platform", but I will tell you already on the starting, that we will draw our own modules in excel, and we want that this software has same or the same layout and options. If you can have any suggestions, e.g. ready software, we will take a look on it and show.
Here is list with basic features we want in our ERP:
Skills required are Database Administration, MySQL, Microsoft, PHP, Software Architecture
Consider employee table of (i) and list names of department(s) for which average salary for department is more than 10,000. (SELECT d_name FROM dept WHERE d_code IN (SELECT d_c
Event Occurrence of a process is called event. In other words, the object can receive many input instructions. The changes which occur due to these instructions are known as e
what is relationship inheritance and attribute inheritance
Mappings between Levels and Data Independence The 3 levels of abstraction in the database do not exist separately of each other. There must be some correspondence, or mapping
to develop elrctronic database from manual forms
Compare the two log-based recovery schemes in terms of ease of implementation and overhead cost. Ans: There are two types of log based recovery techniques: deferred update
Write a program within embedded SQL to associative the total trip expenses of the salesman named ‘John' for the relations. EXEC SQL BEGIN DECLARE SECTION; long total_expenses;
What are the Issues when Selecting a Database Issues when Selecting a Database Storage space requirement: A database requires about triple storage space of the actua
Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many
Explain the following functions of Oracle with suitable examples: (i) To_Char( ) (ii) Count( ) (iii) Trim( ) (iv) Length( ) Ans: (i) To_char( ): The TO_CHAR function conver
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd