Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Object-oriented decompositions
Object-oriented decompositions of systems better are able to cope with change. Each subsystem has a well-defined interface which communicates with remaining system. All of these interfaces define all form of interaction which is required for proper functioning of whole system, but internal implementations are left to sub-system itself. This is since they manage to encapsulate those items which are likely to change (for example functionality, sequence of behaviour and attributes) within an object and hide them from outside world. The benefit is that the outside cannot see them, and thus cannot be dependent on them and does not need to get changed if these items change. Also, object-oriented decompositions are nearer to the problem domain, because they directly represent real-world entities in their structure and behaviour. The abstraction primitives built into reuse have a massive potential of reuse as commonalities among similar objects can be factored out and then, the solutions can be reused.
Figure: OO Decomposition (OOD)
Question: (a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate exam
Partial Key : It is a group of attributes that can uniquely identify small entities and that are related to same base entity. It is sometime named as Discriminator. Altern
Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,
how can apply joins on table
A step-wise distributed database design methodology Following is a step-wise methodology for distributed database design. (1) Examine the nature of distribution. Find out wh
List two restrictions that are applied on the modification (updation, insertion or deletion) of base tables through view. Ans: The two restrictions are: 1. If a view
A domain is a set of permissible values that can be given to an attribute. So each attribute in a table has a definite domain. Values to these attributes cannot be assigned outside
" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule: If Ti requests a database resource that is held by Tj
Explain the Exec statement in SQL Ans: Exec statement has the structure EXEC SQL END-EXEC Embeded SQl statements are of a form identical to non embedded SQL statem
construct a b-tree for the following set of key values 2,3,5,7,11,17,19,23,29,31.assume that the tree is initial empty and the values are added in ascending order
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd