Ask Question, Ask an Expert


Ask Computer Engineering Expert

In addition to the textbook chapters, you may use any online reference such as:

• XML Introduction,
• Starting with XML (Lessons 1-7),
• Chapter 15: XML,
• XQL Tutorial,
• XQuery Tutorial,

XML Publishing. Consider the following relational data:


pid     Name         Price     Description
323    gizmo        22.99    great
233    gizmoplus  99.99    morefeatures
312    gadget      59.99    goodvalue


Sid       Name          Phone
s282    Wiz             555-1234
s521    Econo-Wiz  555-6543


Pid    Markup    sid
323    10%    s521
233    25%    s282
233    15%    s521

A) Use and submit a text file (.txt) to prepare your information for the following. You want to export this data into an XML file. prepare a Document Type Definition (DTD)describing this structure for the XML file.

a) There is one root element called products

b) The products element contains a sequence of product sub-elements, one for each product in the database

c) Each product element contains one name, one price, and one description sub-element, and a sequence of store sub-elements, one for each store that sells that product.

d) Each store element contains one name, one phone, and one markup sub-element.

B) At the bottom of your .txt file, use an underscore line (_________) to separate the answer to this problem from B. above.

Assuming that you have an XML document with the structure given in A., prepare an XQuery expression that returns the names and prices of all products that are sold at least at one store with a markup of 25%.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9268

Have any Question? 

Related Questions in Computer Engineering

1 a network consists of n hosts assuming that cryptographic

1. A network consists of n hosts. Assuming that cryptographic keys are distributed on a per-hostpair basis, compute how many different keys are required. 2. One cryptographic checksum is computed by applying the DES in C ...

In the fourth lab we investigate smtp protocol in action we

In the fourth lab, we investigate SMTP protocol in action. We send an e-mail and, using Wireshark, we investigate the contents and the format of the SMTP packet exchanged between the client and the server. We check that ...

1 if a label in a connection-oriented service is 8 bits how

1. If a label in a connection-oriented service is 8 bits, how many virtual circuits can be established at the same time? 2. List the three phases in the virtual-circuit approach to switching. 3. Do we have any of the fol ...

1 what is intellectual property ip is it afforded the same

1. What is intellectual property (IP)? Is it afforded the same protection in every country of the world? What laws currently protect it in the United States and Europe? 2. How does the Sarbanes-Oxley Act of 2002 affect i ...

Give your suggestion on by using an extra table that stored

Give your suggestion on: By using an extra table that stored space positions it would be possible to significantly improve the efficiency of the expansions loop.

We consider the long-term security of the advanced

We consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time. ...

1 some of the application programs can use the services of

1. Some of the application programs can use the services of two transport-layer protocols (UDP or TCP). When a packet arrives at the destination, how can the computer find which transport layer is involved? 2. A client r ...

1 using a different measurer object process a set of

1. Using a different Measurer object, process a set of Rectangle objects to find the rectangle with the largest perimeter. 2. Enhance the DataSet class so that it can either be used with a Measurer object or for processi ...

You are managing an insurance claim processing process and

You are managing an insurance claim processing process, and you have just been informed that the repairer, Chris Gray, will not be available for work after June 7, 2011, for several days. You need to set a constraint on ...

Application jurisdictional aspects of cybercrimeyou are

Application: Jurisdictional Aspects of Cybercrime You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds late ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen