State about the activity diagram, Database Management System

Assignment Help:

State about the Activity Diagram

Activity diagrams show flow from one activity to other. It is an ongoing non atomic execution within a state machine. Activity finally results in some action that is made up of executable atomic computations which result in a change in state of system, or return of a value. It consists of activity states, action states, objects and transition states. The activity diagram for encryption of a message send via e-mail is shown as:

 

2452_activity diagram.png

Figure: Activity diagram for E-mail encryption


Related Discussions:- State about the activity diagram

Non-redundant cover and canonical cover, Given the following set of functio...

Given the following set of functional dependencies {cf?bg, g?d, cdg?f, b?de, d?c} defined on R(b,c,d,e,f,g) a.Find a non-redundant cover. b.Find a canonical cover.

Generalization and specialization, design a generalization specialization h...

design a generalization specialization hierarchy for a motor vehicle sales company. the company sells motorcycles, passenger cars, vens and buses.

Database system design and Implementation, Consider a typical sales invoice...

Consider a typical sales invoice that would include the following information. Design a single table to hold all of the information required to store an invoice including this info

What is a view, What is a view?  Make a view of EMP table named DEPT 20, to...

What is a view?  Make a view of EMP table named DEPT 20, to display the employees in department 20 and their annual salary.  Ans:  View is a virtual table that does not consist

What are the dbms languages, What are the DBMS languages? Explain.  Ans...

What are the DBMS languages? Explain.  Ans: a) Data Definition Languages (DDL): It is employed to specify database schema for example CREATE DROP statements etc.     b)  Dat

When it is better to use files than a dbms, When It is better to use files ...

When It is better to use files than a DBMS? It is better to use files than a DBMS when Multiple users wish to access the data.

#, How to use Oracle

How to use Oracle

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Seeking hr searcher, Project Description: The work is about founding the...

Project Description: The work is about founding the best skilled person for the job. I will give you the job description. Skills required are Data Entry, Database Administrat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd