Definition of resource sharing , Basic Computer Science

Assignment Help:
Resource sharing is a concept which has developed to contain many cooperative activities among libraries and other stakeholders. Interlibrary loan continues to be the basis of resource sharing. Conversely, union catalogue development, cooperative cataloguing, cooperative reference, cooperative gathering development and joint storage of material are all components of A Canadian Information Resource Sharing Strategy. The development of the national resource sharing infrastructure explained in the strategy depends on input from all stakeholders. The National Library consequently is making a number of consultation documents available for comment.

There are three models for resource sharing you can use:
1. Allowed: it''s up to the client to decide whether other customers can share the resource with them or if they wish to use the resource completely. An illustration where this can be used is a shuttle bus rental which normally would also take other clients but sometimes a customer may wish to use the whole shuttle van exclusively. In pricing manager you can identify a rule which would update the price in such case.
2. Sharing is disabled (use in most cases) -- this will let only one client reserve given resource at one time.
3. Constantly possible -- this forces all clients to share the resource with the others. This mode should be used whenever you sell tickets or seats or any other type of resource which is used on per-person basic (including bikes, dormitory bed, personal gear etc.). If you choose this option, two things will happen: planyo will add a new reservation form item Number of persons where the client can set the number of tickets/seats they wish to reserve. Another modification is that by selecting constantly possible the monthly price in case of Planyo PRO will be lower (for shared resources planyo counts the number of resources as a half of the overall seats/tickets available).

Related Discussions:- Definition of resource sharing

Why is the random class in the .net framework not suitable, QUESTION (a...

QUESTION (a) (i) Why is the Random class in the .NET framework not suitable for generating random bytes for cryptography purposes? (ii) Mention two characteristics required

Expert system, Develop a simple expert system to pick ten stocks to conside...

Develop a simple expert system to pick ten stocks to consider. Create seven or more rules that could be used in such an expert system. Create five cases and use the rules

Basic syntax of python language, The Python language has a lot of similarit...

The Python language has a lot of similarities to Perl, C and Java. Though, there are some specific differences between the languages. First Python Program: relative Mode Programmin

Evolution of erp , Evolution of ERP  The origin of using computers for ...

Evolution of ERP  The origin of using computers for business, traces the following line of story. Originally, they were designed to support the repetitive and time consuming fu

Time sharing, Time Sharing Time sharing allows a large number of users ...

Time Sharing Time sharing allows a large number of users at various remote terminals to simultaneously use a centrally located computer for problem solving. Each user operates

10, constant key use for in calculator

constant key use for in calculator

Wat do u do, can u write my assignment for me

can u write my assignment for me

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Comparison instructions , They are used to evaluate operators, and they hav...

They are used to evaluate operators, and they have an effect on the content of the flags. CMP CMPS (CMPSB) (CMPSW) CMP INSTRUCTION Idea: To measure up to the operators. Syntax: CMP

Some CPUs provide multiple modes of operation, even though most systems onl...

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd