Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Which of the following best characterizes tightly coupled systems?

a. to expensive to change

b. use of a directory to identify the participating systems

c. indirection

d. connected by a "loose" network

2. Identify the major disadvantages of the columns-to-rows design pattern, and provide steps to eliminate them:

3. The most popular technique to solve interoperability problems is to use programmers to write code in a brute force fashion. Although interoperability can be achieved, there are several disadvantages to this approach. Name these disadvantages:

4. There were several waves in IT, some are considered to be of high amplitude, while others of low amplitude. The invention of communication networks, personal computer, and the Internet are all considered to be part of:

a. High amplitude waves

b. Industrial revolution

c. Low amplitude waves

d. Agricultural revolution

5. A strategic advantage for a company is best identified by the following sequence (first to last in chronological order)

a. Data->information-> unique differentiation

b. Unique differentiation->data->information

c. Unique differentiation -> information -> data

d. Data-> unique differentiation-> information

6. Your company has just acquired a major competitor company. Now there are two IT departments in the merged company. Name and briefly describe the major options that exist in integrating the two IT departments.

7. Consider an operational database (e.g inventory database) and a specific record with information about a book, such as "adaptive information" by Pollock and Hodgson, ISBN,Wiley, etc. Which metadata layer does this belong to?

8. A promising semantic interoperability framework contains several characterisitics, some of which are:

a. dynamic highly flexible information centric

b. web services oriented, custom code, dynamic

c. adapter oriented, EAI tools, remote procedure calls

d. middleware oriented, customized program, tighly-coupled

8. The biggest difference between tightly coupled and loosely couples systems is indirection. Briefly identify how indirection works, and provide a simple example that describes indirection using DNS

9. the statement Student_ID varchar2(10) which metadata layer does it belong to schema format layer

10. You are given 2 similar databases (e.g two inventory databases) with different schemas (schema A and schema B). Both databases contain inventory items but in a different formats. For example, an item ID in schema A is defined as ItemID number and in schema b is defined as XYZcomp_object_identifier varchar2(10). You need to write queries that span both schemas but because of such incompatibilities it is quite difficult. Based on the textbook identify possible ways of mapping schema A to schema B.

12. Type the formula that defines information

13. Consider the following two table definitions:

Create table EMP1 (empID varchar2(11), empName varchar2(50), empDept number);

Create table EMP2 (employeeID number, fName varchar2(25), lName varchar2(25), empDept number);

a. what type of conflicts do you observe between fields in the two definitions, and for which fields?

b. Name the different conflict solutions that exist to alleviate the above conflicts?

c. Write a SQL statement to retrieve full names from EMP1 and EMP2

14. Why there is no layer in the metadata model called "semantic layer"?

15. why context is difficult to contain in a metadata repository?

16. Your boss just gave you a new business rule to implement. Briefly discuss how would you specify a business rule and in which languages? In the majority of existing applications, where do we find?

Attachment:- Assignment.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91881533

Have any Question?


Related Questions in Computer Engineering

The data reflects student enrollment at a college in

The data reflects student enrollment at a college in Southern California. Traditional math pathwayAccelerated math pathwayRow totalsFemale12441161360Male1054541108Column totals22981702468 We want to determine if the prob ...

A security system is used to monitor doors and windows of a

A security system is used to monitor doors and windows of a residence. This system uses several components, including photodiodes and contact switches to detect intruders. Circuits associated with contact switches provid ...

Let x denote the body temperature measured in degrees

Let x denote the body temperature (measured in degrees Fahrenheit) of a human being. Suppose that across all humans, x follows some unknown distribution with mean u and standard deviation o. You want to know u. You colle ...

The rate of inflation in year 1 is expected to be 14 year

The rate of inflation in year 1 is expected to be 1.4%, year two is 1.8%, and years three through five is expected to be 2%. Assume the real risk-free rate, r*, is 3% for all maturities. What should the yield to maturity ...

A recent study reported that the prevalence of

A recent study reported that the prevalence of hyperlipidemia is 30% in children 2 to 6 years of age. If 12 children are analyzed what is the probability that at least 3 are hyperlipidemic?

What would be examples of valid selection methods used by

What would be examples of valid selection methods used by the human resource department to ensure selecting the appropriate candidate for a job.

Tasks1 what options does personal trainer have for

Tasks: 1. What options does Personal Trainer have for developing a new system? What are some specific issues and options that Susan should consider in making a decision? 2. Susan has been asked to prepare a system requir ...

Explain the risk of having hacking tools installed on your

Explain the risk of having hacking tools installed on your computer and why you should contact local law enforcement agencies before installing those tools.

One-year treasury bills currently earn 225 percent you

One-year Treasury bills currently earn 2.25 percent. You expected that one year from now, 1-year Treasury bill rates will increase to 2.75 percent and that two years from now, 1-year Treasury bill rates will increase to ...

Take the case in which all individuals are risk averse so

Take the case in which all individuals are risk averse, so that marginal costs slope down. In that case, why might it be optimal (socially efficient) for insurance take up to be less than 100%?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As