Definition of resource sharing , Basic Computer Science

Assignment Help:
Resource sharing is a concept which has developed to contain many cooperative activities among libraries and other stakeholders. Interlibrary loan continues to be the basis of resource sharing. Conversely, union catalogue development, cooperative cataloguing, cooperative reference, cooperative gathering development and joint storage of material are all components of A Canadian Information Resource Sharing Strategy. The development of the national resource sharing infrastructure explained in the strategy depends on input from all stakeholders. The National Library consequently is making a number of consultation documents available for comment.

There are three models for resource sharing you can use:
1. Allowed: it''s up to the client to decide whether other customers can share the resource with them or if they wish to use the resource completely. An illustration where this can be used is a shuttle bus rental which normally would also take other clients but sometimes a customer may wish to use the whole shuttle van exclusively. In pricing manager you can identify a rule which would update the price in such case.
2. Sharing is disabled (use in most cases) -- this will let only one client reserve given resource at one time.
3. Constantly possible -- this forces all clients to share the resource with the others. This mode should be used whenever you sell tickets or seats or any other type of resource which is used on per-person basic (including bikes, dormitory bed, personal gear etc.). If you choose this option, two things will happen: planyo will add a new reservation form item Number of persons where the client can set the number of tickets/seats they wish to reserve. Another modification is that by selecting constantly possible the monthly price in case of Planyo PRO will be lower (for shared resources planyo counts the number of resources as a half of the overall seats/tickets available).

Related Discussions:- Definition of resource sharing

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Graphical user interface and arrays, In this program, you are going to writ...

In this program, you are going to write a program for playing the game of Hangman. In this game, the computer will pick a word and display a sequence of blanks to be filled in; one

Hypermedia, Hypermedia: When the desired webpage loads into your brows...

Hypermedia: When the desired webpage loads into your browser you will see the text comes in, the pictures arrives, the animation gets loaded and so on. You will notice that so

Subroutine and functions, Subroutine and Functions:  In a program, it ...

Subroutine and Functions:  In a program, it is often necessary to repeat a statement or group of statements at several points to accomplish a particular task. Repeating the sa

Micro-computer, explain the function of each block in the block diagram of ...

explain the function of each block in the block diagram of micro-computer

Project management, #Assignment 1: Project Management and Information Secur...

#Assignment 1: Project Management and Information Security Write a two to three (2-3) page paper that addresses the following: Explicate in detail the importance of project managem

What are the most common forms of mixing, Question 1 What is the differenc...

Question 1 What is the difference between Variable Bit Rate and Constant Bit Rate? Question 2 Write a note on: Normalization, Reverberation, Noise Reduction, Filters, and

What is fragmentation? explain its significance, Question A What is fragme...

Question A What is fragmentation? Explain its significance Question B Briefly discuss the functions of transport layer Question C What is CIDR? Explain Question D W

Kids, how do you let kids learn on it

how do you let kids learn on it

Logic instructions , They are used to act upon logic operations on the oper...

They are used to act upon logic operations on the operators. AND OR, NEG NOT TEST XOR AND INSTRUCTION Function: It acts upon the conjunction of the operators bit by bit. Syntax: A

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd