Built online transaction processing, Database Management System

Assignment Help:

Question:

A DBMS built for Online Transaction Processing (OLTP) is generally regarded as unsuitable for data warehousing. Each system is designed with a different set of requirements.

(i) Give example of how OLTP systems differ from data warehousing systems.

(ii) Illustrtae any problems that are associated with developing and managing a data warehouse.

(iii) Explain what is meant by Metadata and what are the purposes of a Metadata in data warehouse architecture.

(iv) Show how data marts differ from data warehouses and identify any two reasons for implementing a data mart.


Related Discussions:- Built online transaction processing

Sources of utilities for a dbms, There are three main sources of utilities ...

There are three main sources of utilities and applications for a DBMS: a. Vendor applications and utilities are given for working with or maintaining the database, and generally

Normalise data to third normal form, A software contract and consultancy fi...

A software contract and consultancy firm maintains details of all the various projects in which its employees are currently involved. These details comprise: Employee Numbe

Example of grant create session to mca12, Example -GRANT CREATE SESSION TO ...

Example -GRANT CREATE SESSION TO MCA12; (This command gives system level permission on creating a session - not portable) GRANT SELECT ON EMP TO MCA12; (Object level permi

Reflects organisational structure, Reflects organisational structure: Many ...

Reflects organisational structure: Many organizations are distributed over various locations. If an organisation has many offices in dissimilar cities, databases used in such an ap

Define two-phase locking protocol, Define two-phase locking protocol. A...

Define two-phase locking protocol. Ans: Two-phase locking is significance in the context of ensuring that schedules are serializable. The two-phase locking protocol defines a p

Define deadlock detection, Define Deadlock detection If a system does ...

Define Deadlock detection If a system does not employ a few protocols that make sure deadlock freedom, after that a detection and recovery scheme should be used. An algorithm

Data mining objective, State your technical objectives for mining the data....

State your technical objectives for mining the data. Data Understanding. Describe the data For each attribute, give its description and data type. For numeric attributes

Benefits and drawbacks of heap files, Benefits of heap files 1.   This i...

Benefits of heap files 1.   This is a easy file Organisation method. 2.   Insertion is somehow capable. 3.   Good for bulk-loading data into a table. 4.   Best if file

Discuss the concept of data independence, Question: a) Discuss the conc...

Question: a) Discuss the concept of data independence, explaining its importance in a database environment. b) To address the issue of data independence, the ANSI-SPARC t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd