2.99 See Answer

Question: What does business-enabling do? What services


What does business-enabling do? What services layer does it provide? Give six examples of business enabling services.


> The Jonesburgh County Basketball Conference (JCBC) is an amateur basketball association. Each city in the county has one team as its representative. Each team has a maximum of 12 players and a minimum of 9 players. Each team also has up to three coaches

> Create a complete ERD in Crow’s Foot notation that can be implemented in the relational model using the following description of operations. Hot Water (HW) is a small start-up company that sells spas. HW does not carry any stock. A few spas are set up in

> Use the following business rules to create a Crow’s Foot ERD. Write all appropriate connectivity’s and cardinalities in the ERD. • A department employs many employees, but each employee is employed by one department. • Some employees, known as “rovers,”

> Luxury-Oriented Scenic Tours (LOST) provides guided tours to groups of visitors to the Washington D.C. area. In recent years, LOST has grown quickly and is having difficulty keeping up with all of the various information needs of the company. The compa

> Create a Crow’s Foot notation ERD to support the following business operations: • A friend of yours has opened Professional Electronics and Repairs (PEAR) to repair smartphones, laptops, tablets, and MP3 players. She wants you to create a database to he

> Using the Crow’s Foot methodology, create an ERD that can be implemented for a medical clinic, using at least the following business rules: a. A patient can make many appointments with one or more doctors in the clinic, and a doctor can accept appointmen

> United Helpers is a nonprofit organization that provides aid to people after natural disasters. Based on the following brief description of operations, create the appropriate fully labeled Crow’s Foot ERD. • Individuals volunteer their time to carry out

> What business rule(s) and relationships can be described for the ERD in Figure QB.4? Figure QB.4 PART PART VEND VENDOR PK PART CODE PK,FK1 VEND ID PK,FK2 PART CODE PK VEND ID PART PROD PK,FK1 PART CODE PK,FK2 PROD CODE PROD_CUST PRODUCT CUSTOMER PK

> Automata Inc. produces specialty vehicles by contract. The company operates several departments, each of which builds a particular vehicle, such as a limousine, a truck, a van, or an RV. Before a new vehicle is built, the department places an order with

> What is the purpose of the conceptual design phase, and what is its end product?

> What is the difference between the database design scope and its boundaries? Why is the scope and boundary statement so important to the database designer?

> Why is the organizational structure relevant to the database designer?

> What factors relevant to database design are uncovered during the initial study phase?

> What are time-variant data, and how would you deal with such data from a database design point of view?

> When implementing a 1:1 relationship, where should you place the foreign key if one side is mandatory and one side is optional? Should the foreign key be mandatory or optional?

> What is a surrogate primary key, and when would you use one?

> Under what circumstances are composite primary keys appropriate?

> What primary key characteristics are considered desirable? Explain why each characteristic is considered desirable.

> What is an entity cluster, and what advantages are derived from its use?

> What is an entity supertype, and why is it used?

> The Hudson Engineering Group (HEG) has contacted you to create a conceptual model whose application will meet the expected database requirements for the company’s training program. The HEG administrator gives you the description (see below) of the traini

> Discuss the difference between a composite key and a composite attribute. How would each be indicated in an ERD?

> How would you (graphically) identify each of the following ERM components in a Crow’s Foot model?

> What is a recursive relationship? Given an example.

> Suppose you are working within the framework of the conceptual model in Figure Q4.5. Figure Q4.5- The Conceptual Model Given the conceptual model in Figure Q4.5: a. Write the business rules that are reflected in it. b. Identify all of the cardinalitie

> What is a composite entity, and when is it used?

> Given the business rule “an employee may have many degrees,” discuss its effect on attributes, entities, and relationships.

> The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on each team and the children that will be playing on each team and their parents. Also, data needs to be kept on the coaches

> Describe precisely the composition of the DEPENDENT weak entity’s primary key. Use proper terminology in your answer. STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> What is a strong (or identifying) relationship, and how is it depicted in a Crow’s Foot ERD?

> What two attributes must be contained in the composite entity between STORE and PRODUCT? Use proper terminology in your answer. STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> Create an ERD based on the Crow’s Foot model, using the following requirements: • An INVOICE is written by a SALESREP. Each sales representative can write many invoices, but each invoice is written by a single sales representative. • The INVOICE is writt

> Write the business rules reflected in this ERD. STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> Write the ten cardinalities that are appropriate for this ERD. FIGURE Q4.17 STORE ORDER ORDER_LINE PRODUCT places contains is written in employs ΕMPLOYEΕ DEPENDENT has

> What are multivalued attributes, and how can they be handled within the database design?

> Briefly, but precisely, explain the difference between single-valued attributes and simple attributes. Give an example of each.

> What three (often conflicting) database requirements must be addressed in database design?

> How is a composite entity represented in an ERD, and what is its function? Illustrate the Crow’s Foot model.

> Discuss two ways in which the 1:M relationship between COURSE and CLASS can be implemented.

> How is a relationship between entities indicated in an ERD? Give an example, using the Crow’s Foot notation.

> What is a derived attribute? Give an example.

> What two conditions must be met before an entity can be classified as a weak entity? Give an example of a weak entity.

> How is a database design verified, and why is such verification necessary?

> Describe the Web page development problems related to database parent/child relationships.

> Transaction management is critical to the e-commerce environment. Given the assertion made in Item 3, how is transaction management supported?

> Discuss the following assertion: The web is not capable of performing transaction management.

> Describe the basic services provided by the ColdFusion Web application server.

> What are scripts, and how are they created in ColdFusion?

> What is the definition of security? Explain why security is so important for e-commerce transactions.

> Name and explain the operation of the main building blocks of the Internet and its basic services.

> What types of services are provided by the bottom layer of the e-commerce architecture?

> Describe e-commerce architecture: then briefly describe each one of its components.

> What does normalization have to do with creating good tables, and what's the point of having to learn all these picky normalization rules?

> Describe and give an example of each of the two principal B2B forms.

> Define and contrast B2B and B2C e-commerce styles.

> Identify and briefly explain five advantages and five disadvantages of e-commerce.

> You are hired as a resource security officer for an e-commerce company. Briefly discuss what technical issues you must address in your security plan.

> Give an example of an e-commerce transaction scenario. What three things should security be concerned with in this e-commerce transaction?

> What does e-commerce mean and how did it evolve?

> Define and explain the concepts of method overriding and polymorphism. Use examples in your explanations.

> Define the concepts of class hierarchy, superclasses, and subclasses. Explain the concept of inheritance and the different types of inheritance. Use examples in your explanations.

> What is a class protocol, and how is it related to the concepts of methods and classes? Draw a diagram to show the relationship between these OO concepts: object, class, instance variables, methods, object's state, object ID, behavior, protocol, and mess

> Using an example, illustrate the concepts of class and class instances.

> Why are some table structures considered to be bad and others good and how do you recognize the difference between good and bad structures?

> Explain how encapsulation provides a contrast to traditional programming constructs such as record definition. What benefits are obtained through encapsulation? Give an example.

> Define and contrast the concepts of method and message. What OO concept provides the differentiation between a method and a message? Give examples.

> Discuss the object/relational model's characteristics.

> What are the essential differences between an RDBMS and an OODBMS?

> How would you define object orientation? What are some of its benefits? How are OO programming languages related to object orientation?

> Using a simple invoicing system as your point of departure, explain how its representation in an entity relationship model (ERM) differs from its representation in an object data model (ODM). (Hint: Check Figure G.34.)

> What are the essential differences between the relational database model and the object database model?

> Explain how OO concepts affect database design. How does the OO environment affect the DBA's role?

> What are the advantages and disadvantages of an OODBMS?

> Name and describe the 13 mandatory features of an OODBMS.

> What role does the ER diagram play in the design process?

> Compare and contrast the OODM with the ER and relational models. How is a weak entity represented in the OODM? Give examples.

> What is an object space? Using a graphic representation of objects, depict the relationship(s) that exist between a student taking several classes and a class taken by several students. What type of object is needed to depict that relationship?

> Describe the difference between early and late binding. How does each of those affect the object-oriented data model? Give examples.

> What are the five minimum attributes of an OO data model?

> Explain the concept of abstract data types. How they differ from traditional or base data types? What is the relationship between a type and a class in OO systems?

> Suppose you are currently considering the purchase of a client/server DBMS. What characteristics should you look for? Why?

> Explain what middleware is and what it does. Why would MIS managers be particularly interested in such software?

> What major network communications protocols are currently in use?

> Using the OSI network reference model, explain the communications middleware component's function.

> Describe the client and the server components of the client/server computing model. Give examples of server services.

> Use the following description of the operations of the RC_Charter2 Company to complete this exercise. The RC_Charter2 Company operates a fleet of aircraft under the Federal Air Regulations Part 135 (air taxi or charter) certificate, enforced by the FAA.

> Describe and explain the client/server architectural principles.

> Explain how client/server system components interact.

> What is client/server computing, and what benefits can be expected from client/server systems?

> Discuss and evaluate the following statement: There are no unusual managerial issues related to the introduction of client/server systems.

> Contrast client/server and traditional data processing.

> Describe and contrast the four client/server computing architectural styles that were introduced in this appendix.

> Mainframe computing used to be the only way to manage data. Then personal computers changed the data management scene. How do those two computing styles differ, and how did the shift to PC-based computing evolve?

> You read in this appendix that: An examination of the UCL's Inventory Management module reporting requirements uncovered the following problems: • The Inventory module generates three reports, once of which is an Inventory Movement Report. But the inven

> Modern businesses tend to provide continuous training to keep their employees productive in a fast-changing and competitive world. In addition, government regulations often require certain types of training and periodic retraining. (For example, pilots m

> Describe and discuss the ER model's treatment of the UCL's inventory/order hierarchy: a. Category b. Class c. Type d. Subtype

> During peak periods, Temporary Employment Corporation (TEC) places temporary workers in companies. TEC’s manager gives you the following description of the business: • TEC has a file of candidates who are willing to work. • If the candidate has worked be

> How would you verify the ER diagram shown in Figure QC.4? Make specific recommendations.

> What major factors should be addressed when database system performance is evaluated? Discuss each factor briefly.

> What steps must be completed before the database design is fully implemented? (Make sure that you list the steps in the correct sequence and discuss each step briefly.)

2.99

See Answer