System for an online furniture shop, Computer Engineering

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information:

  • The detail of the furniture shop contains shop name, address, telephone number, website address (URL), and logo (image).
  • The furniture shop has the following types of objects for sale: beds, sofas, tables, wardrobes, etc. Every item has its name, item number, description, and price.

1) A bed can be single, double or king size bed.  A bed also has information about type (like bed frames, divan bed, adjustable bed, four poster bed) materials (such as wood), manufactory, product country, optionally with mattresses, etc.

2) A sofa can be a one seat, 2 seats or 3 seats sofa, with information of manufactory, product country, size, colour and face material (such as Leather).

3) The table have type (like dining table, coffee table, nest table), materials (like Acre Oak, glass), size, manufactory, and product country. Dining table can optionally have dining chairs, etc.

4) A wardrobe can be 2 doors or 3 doors. It also has information about the size, colour, manufactory, product country, optionally with door mirrored

Task . Using the above information and your additional information,  make an XML document and name it catalog_{studentID}.xml. (e.g, catalog _03047791.xml)

 

Posted Date: 3/19/2013 1:10:02 AM | Location : United States







Related Discussions:- System for an online furniture shop, Assignment Help, Ask Question on System for an online furniture shop, Get Answer, Expert's Help, System for an online furniture shop Discussions

Write discussion on System for an online furniture shop
Your posts are moderated
Related Questions
Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a

Q. Convert the following BINARY numbers into HEXADECIMAL, double check by converting the result HEXADECIMAL to BINARY. a) 1101.0110 b) 1011.11010 c) 11110.01011

Fingerprint- Biometric computer security systems First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and the

what is batch system?how the disadvantage of batch system are overcome in multi-programming operating system?also describe how multi-programmed operating system is milestone in dev

Explain any three parsing techniques. Following are three parsing techniques: Top-down parsing: This parsing can be viewed as an attempt to get left-most derivations of an

Q. Explain Cell Spacing and Cell Padding? Couple of attributes known as CELLSPACING and CELLPADDING. Both are part of tag. CELLPADDING is the amount of space between

Types of Pipelines: Instructional pipeline  It is used where different stages of an instruction fetch and execution take place in a pipeline. Arithmetic pipeline

What is Dynamic Modelling  As you know that computer systems are built from the objects which respond to events. External events arrive at boundary of system; you understan

What are the ways to create a new form? You can make a new form in any of the following three ways: Using AutoForm: You can make a form based on a single table or query qui

How can we access the correction and transport system? Each time you make a new object or change an existing object in the ABAP/4 Dictionary, you branch automatically to the W