2.99 See Answer

Question: How would you define object orientation? What


How would you define object orientation? What are some of its benefits? How are OO programming languages related to object orientation?


> The Hudson Engineering Group (HEG) has contacted you to create a conceptual model whose application will meet the expected database requirements for the company’s training program. The HEG administrator gives you the description (see below) of the traini

> Discuss the difference between a composite key and a composite attribute. How would each be indicated in an ERD?

> How would you (graphically) identify each of the following ERM components in a Crow’s Foot model?

> What is a recursive relationship? Given an example.

> Suppose you are working within the framework of the conceptual model in Figure Q4.5. Figure Q4.5- The Conceptual Model Given the conceptual model in Figure Q4.5: a. Write the business rules that are reflected in it. b. Identify all of the cardinalitie

> What is a composite entity, and when is it used?

> Given the business rule “an employee may have many degrees,” discuss its effect on attributes, entities, and relationships.

> The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on each team and the children that will be playing on each team and their parents. Also, data needs to be kept on the coaches

> Describe precisely the composition of the DEPENDENT weak entity’s primary key. Use proper terminology in your answer. STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> What is a strong (or identifying) relationship, and how is it depicted in a Crow’s Foot ERD?

> What two attributes must be contained in the composite entity between STORE and PRODUCT? Use proper terminology in your answer. STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> Create an ERD based on the Crow’s Foot model, using the following requirements: • An INVOICE is written by a SALESREP. Each sales representative can write many invoices, but each invoice is written by a single sales representative. • The INVOICE is writt

> Write the business rules reflected in this ERD. STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> Write the ten cardinalities that are appropriate for this ERD. FIGURE Q4.17 STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> What are multivalued attributes, and how can they be handled within the database design?

> Briefly, but precisely, explain the difference between single-valued attributes and simple attributes. Give an example of each.

> What three (often conflicting) database requirements must be addressed in database design?

> How is a composite entity represented in an ERD, and what is its function? Illustrate the Crow’s Foot model.

> Discuss two ways in which the 1:M relationship between COURSE and CLASS can be implemented.

> How is a relationship between entities indicated in an ERD? Give an example, using the Crow’s Foot notation.

> What is a derived attribute? Give an example.

> What two conditions must be met before an entity can be classified as a weak entity? Give an example of a weak entity.

> How is a database design verified, and why is such verification necessary?

> Describe the Web page development problems related to database parent/child relationships.

> Transaction management is critical to the e-commerce environment. Given the assertion made in Item 3, how is transaction management supported?

> Discuss the following assertion: The web is not capable of performing transaction management.

> Describe the basic services provided by the ColdFusion Web application server.

> What are scripts, and how are they created in ColdFusion?

> What is the definition of security? Explain why security is so important for e-commerce transactions.

> What does business-enabling do? What services layer does it provide? Give six examples of business enabling services.

> Name and explain the operation of the main building blocks of the Internet and its basic services.

> What types of services are provided by the bottom layer of the e-commerce architecture?

> Describe e-commerce architecture: then briefly describe each one of its components.

> What does normalization have to do with creating good tables, and what's the point of having to learn all these picky normalization rules?

> Describe and give an example of each of the two principal B2B forms.

> Define and contrast B2B and B2C e-commerce styles.

> Identify and briefly explain five advantages and five disadvantages of e-commerce.

> You are hired as a resource security officer for an e-commerce company. Briefly discuss what technical issues you must address in your security plan.

> Give an example of an e-commerce transaction scenario. What three things should security be concerned with in this e-commerce transaction?

> What does e-commerce mean and how did it evolve?

> Define and explain the concepts of method overriding and polymorphism. Use examples in your explanations.

> Define the concepts of class hierarchy, superclasses, and subclasses. Explain the concept of inheritance and the different types of inheritance. Use examples in your explanations.

> What is a class protocol, and how is it related to the concepts of methods and classes? Draw a diagram to show the relationship between these OO concepts: object, class, instance variables, methods, object's state, object ID, behavior, protocol, and mess

> Using an example, illustrate the concepts of class and class instances.

> Why are some table structures considered to be bad and others good and how do you recognize the difference between good and bad structures?

> Explain how encapsulation provides a contrast to traditional programming constructs such as record definition. What benefits are obtained through encapsulation? Give an example.

> Define and contrast the concepts of method and message. What OO concept provides the differentiation between a method and a message? Give examples.

> Discuss the object/relational model's characteristics.

> What are the essential differences between an RDBMS and an OODBMS?

> Using a simple invoicing system as your point of departure, explain how its representation in an entity relationship model (ERM) differs from its representation in an object data model (ODM). (Hint: Check Figure G.34.)

> What are the essential differences between the relational database model and the object database model?

> Explain how OO concepts affect database design. How does the OO environment affect the DBA's role?

> What are the advantages and disadvantages of an OODBMS?

> Name and describe the 13 mandatory features of an OODBMS.

> What role does the ER diagram play in the design process?

> Compare and contrast the OODM with the ER and relational models. How is a weak entity represented in the OODM? Give examples.

> What is an object space? Using a graphic representation of objects, depict the relationship(s) that exist between a student taking several classes and a class taken by several students. What type of object is needed to depict that relationship?

> Describe the difference between early and late binding. How does each of those affect the object-oriented data model? Give examples.

> What are the five minimum attributes of an OO data model?

> Explain the concept of abstract data types. How they differ from traditional or base data types? What is the relationship between a type and a class in OO systems?

> Suppose you are currently considering the purchase of a client/server DBMS. What characteristics should you look for? Why?

> Explain what middleware is and what it does. Why would MIS managers be particularly interested in such software?

> What major network communications protocols are currently in use?

> Using the OSI network reference model, explain the communications middleware component's function.

> Describe the client and the server components of the client/server computing model. Give examples of server services.

> Use the following description of the operations of the RC_Charter2 Company to complete this exercise. The RC_Charter2 Company operates a fleet of aircraft under the Federal Air Regulations Part 135 (air taxi or charter) certificate, enforced by the FAA.

> Describe and explain the client/server architectural principles.

> Explain how client/server system components interact.

> What is client/server computing, and what benefits can be expected from client/server systems?

> Discuss and evaluate the following statement: There are no unusual managerial issues related to the introduction of client/server systems.

> Contrast client/server and traditional data processing.

> Describe and contrast the four client/server computing architectural styles that were introduced in this appendix.

> Mainframe computing used to be the only way to manage data. Then personal computers changed the data management scene. How do those two computing styles differ, and how did the shift to PC-based computing evolve?

> You read in this appendix that: An examination of the UCL's Inventory Management module reporting requirements uncovered the following problems: • The Inventory module generates three reports, once of which is an Inventory Movement Report. But the inven

> Modern businesses tend to provide continuous training to keep their employees productive in a fast-changing and competitive world. In addition, government regulations often require certain types of training and periodic retraining. (For example, pilots m

> Describe and discuss the ER model's treatment of the UCL's inventory/order hierarchy: a. Category b. Class c. Type d. Subtype

> During peak periods, Temporary Employment Corporation (TEC) places temporary workers in companies. TEC’s manager gives you the following description of the business: • TEC has a file of candidates who are willing to work. • If the candidate has worked be

> How would you verify the ER diagram shown in Figure QC.4? Make specific recommendations.

> What major factors should be addressed when database system performance is evaluated? Discuss each factor briefly.

> What steps must be completed before the database design is fully implemented? (Make sure that you list the steps in the correct sequence and discuss each step briefly.)

> Why must a conceptual model be verified? What steps are involved in the verification process?

> What is a module interface, and what does it accomplish?

> What is a module, and what role does a module play within the system?

> Write the connectivity and cardinality for each of the entities shown in Question 4. Details from Question 4: PART PART VEND VENDOR PK PART CODE PK,FK1 VEND ID PK,FK2 PART CODE PK VEND ID PART PROD PK,FK1 PART CODE PK,FK2 PROD CODE PROD_CUST PRODUCT

> What is a partial dependency? With what normal form is it associated?

> The dependency diagram in Figure Q6.8 indicates that a patient can receive many prescriptions for one or more medicines over time. Based on the dependency diagram, create a database whose tables are in at least 2NF, showing the dependency diagram for ea

> The dependency diagram in Figure Q6.7 indicates that authors are paid royalties for each book that they write for a publisher. The amount of the royalty can vary by author, by book, and by edition of the book. Figure Q6.7 Book royalty dependency diagr

> The administrators of Tiny College are so pleased with your design and implementation of their student registration/tracking system that they want you to expand the design to include the database for their motor vehicle pool. A brief description of opera

> Given the dependency diagram shown in Figure Q6.6, answer items 6a-6c: FIGURE Q5.6 Dependency Diagram for Question 6  a. Identify and discuss each of the indicated dependencies. b. Create a database whose tables are at least in 2NF, showing the depen

> When is a table in BCNF?

> When is a table in 3NF?

> When is a table in 2NF?

> When is a table in 1NF?

> Suppose that someone tells you that an attribute that is part of a composite primary key is also a candidate key. How would you respond to that statement?

> How would you describe a condition in which one attribute is dependent on another attribute when neither attribute is part of the primary key?

> Why is a table whose primary key consists of a single attribute automatically in 2NF when it is in 1NF?

> What is a surrogate key, and when should you use one?

> Define and discuss the concept of transitive dependency.

> What are the client/server's infrastructure requirements and how do they function?

> What actions are taken during the database initial study, and why are those actions important to the database designer?

2.99

See Answer