Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Consider an information system designed for an online company which provides IT products and services
These include desktops, laptops, networking products, IT books, parts, and technical support etc. Purchases made through the online store can be collected from various outlets. Individual outlets are responsible for maintaining their respective stocks. The products and services are provided by contracted vendors. The information system can be viewed as a virtual shop which is capable to access all products and services in store across all outlets. Buyers are not aware of the existence of different outlets. In the virtual shop, a buyer can assemble a shopping cart and check out by paying in one transaction using Paypal. The buyer will designate a specific outlet for collection or request shipment.
Briefly describe the system you use as the basis for your analysis.
Quantitative analysis
a. Make an estimation of the size of the product catalogue in your chosen product types. It should include both the number of records and the size of an individual record. State the basis of your estimate.
b. Make an estimation of the number of queries per day, and of the number of purchases. Estimate the size of two years of history of sales including both the number of records and the size of an individual record. State the basis for your estimates.
Discuss the problem of Spurious tuples and how we may prevent it. Ans: A spurious tuple is, mainly, a record in a database that gets created while two tables are joined bad
Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to
Question: (a) Prepare an ERD for the scenario given below. (b) Convert the ER diagram produced in (a) above into its physical design. You have to choose an appropriate Pri
what is data link layer
What is meant by software and hardware RAID systems? RAID can be executed with no change at the hardware level, using only software modification. Such RAID implementations are
State the data flow diagram of functional model Any action initiated by transition in the state diagram can be extended into an entire data flow diagram in functional model. Th
what is lossless & dependency preserving decomposition ?
Define physical image of a global relation at a site
Explain the term - Handling Boundary Condition These are some circumstances that to be handled in any system initialization and termination. Describes how system is bro
What is Nested Trigger? A trigger can also having INSERT, UPDATE and DELETE logic within itself, so when the trigger is fired because of data modification it can also cause ano
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd