Free Essay

Intergovernmental Relations

In:

Submitted By krudolph
Words 2635
Pages 11
Exam 3 1. According to Carl Stenberg, what are the major types of federal grants and what are the distinctions between them? How have block grants in particular evolved over time? What are the major concerns that state, local, and federal officials have regarding block grants? According to Carl Stenberg, there are two types of federal grants: categorical aid, which is specified for a specific use or program; and block grants, which are less specific and are designed to reduce the federal burden or responsibilities on certain programs. Block grants are used as a tool for redistributing power and accountably by using devolution and decentralization of authority (Conlan and Posner, 2008, 264). Sternberg has divided block grants into three distinct approaches: full devolution, partial devolution, and intergovernmental decentralization. Full devolution is the total removal and redistribution of federal policy, funding, regulatory, and administrative responsibilities (Conlan and Posner, 2008, 264). In the 1990s, this was referred to as “devolution revolution” and consisted of rhetoric proposing to push more power away from the federal government and down to the state and local levels. Full devolution was not popular and was only successful a few times, using legislative, executive, and administrative devolution to shift functional responsibilities from the federal level to state governments, for example, the regulation of marine port pilots, insurance, interstate horse racing, shipping, and boundary waters (Conlan and Posner, 2008, 264). In an attempt to be more successful than full devolution, approaches were made for partial devolution, where states could exercise more authority and discretion, but the federal government was still involved in major policy, programmatic and financial ways (Conlan and Posner, 2008, 264). With this, it was proposed to restructure categorical grant programs to reduce federal requirements and oversight, which would allow states to show more leadership and innovation than before (Conlan and Posner, 2008, 264). States, however, would still not have the final leadership role. If their performance was not up to standard, the federal government could step in and reassert authority. The federal government could withhold funds, establish funds for a particular purpose, require reimbursement for improper expenditures, or deny application approvals (Conlan and Posner, 2008, 264). The final approach, intergovernmental decentralization, gives state and local governments more responsibility and discretion, but the federal government still handles policy and standards, programs, funding, and crosscutting regulations (Conlan and Posner, 2008, 265). During the Clinton administration, a great deal of decision making authority was decentralized to regional offices of certain federal agencies. State and local officials could then negotiate with federal administrators to redirect to shift funding to certain programs (Conlan and Posner, 2008, 265). This approach was not widely adopted, but according to Stenberg, state agencies saw less intrusive national fiscal and regulatory influence in 1994 and 1998 and had continued on into the 2000s, suggesting devolution was able to make some evolutionary policy impacts (Conlan and Posner, 2008, 265). For partial devolution of federal domestic responsibilities, block grants are used as a federal aid instrument, which provides flexible funding to various programs and activities

(Conlan and Posner, 2008, 266). Stenberg has made two categories of block grants: the old style and the new style. The old style of the block was first traced in 1949 and evolved until 1995 when the new style began. The old style really began in 1966 when the first block grant was enacted. Several block grants developed in the 1970s, including the Comprehensive Employment and Training Act of 1973, the 1973 amendments to Title XX of the Social Security Act, and the Housing and Community Development Act of 1974 (Conlan and Posner, 2008, 266). In the early 1980s, nine new or restructured block grants were created. Between then and 1995, only five new block grants were added (for transportation,supstance abuse prevention and treatment, community mental health services, homelessness transitions, and child care and development) and three programs were terminated (Community Youth Activity, Criminal Justice Assistance, and Alcohol, Drug Abuse, and Mental Health Services) (Conlan and Posner, 2008, 267). The old style of block grants all shared three characteristics: they did not account for the majority of total federal aid in the functional area authorized and the black grant often stood alongside larger programs; together, they represented a small portion of federal assistance to state and localities; and they were mainly used as instruments of administrative decentralization, not devolution (Conland and Posner, 2008, 267). During the time of the old style, there was a motive shift that occurred between the Lyndon Johnson and Richard Nixon administration and the Ronald Reagan and George H. W. Bush administration. Johnson and Nixon tended to focus on administrative clean up through salivation, while Reagan and Bush placed a lot of caps on or reductions in appropriations available for consolidation programs (Conland and Posner, 2008, 268). Reagan and Bush also placed an emphasis on a governers’ role in federal-state ventures, excluding local governments from receiving most funds directly from the federal government. The post 1995 new style block grants were agents for the partial devolution of federal domestic responsibilities and decentralizing decision making (Conlan and Poshner, 2008, 268). One the most prominent block grant is this period was the Temporary Assistance for Needy Families (TANF). The Personal Responsibility and Work Opportunity Reconciliation Act was also signed in by the Bill Clinton administration during this time. In the 2000s (2001-2005), at least twelve block grant proposals were introduced to Congress, ranging from health to social welfare. This was different from the old style that focused more on transportation and community development (Conlan and Posner, 2008, 270.) Stenberg writes that the new style of block grants has eight goals: reducing the federal budget deficit; capping federal domestic spending; reduce program overlapping and improve management; remove national government from certain domestic areas; replace on-size-fits-all program design; promoting innovation through pilot programs; ensuring recipients meet performance standards; and targeting federal financial assistance on needy communities and individuals (Conlan and Posner, 2008, 270). New style block grants raise concern because they would cap spending and close previously open-ended entitlements. Another concern is the mixed federalism record of the Bush administration. Additionally, skeptics are concerned that shifting from categorical to block grants will diminish congressional oversight and control. The last concern is how desirable it actually is to turn over significant authority to the states, since in the past, states have shown their unwillingness to take responsibility. Sternberg refers to this as the “race to the bottom,”

where partial devolution will inevitably lead to interstate competition for federal dollars (Conlan and Posner, 2008, 272).

1. According to Brian Collins and Brian Gerber, in what ways are grant management and contracting out similar? What are the difficulties achieving social equity at the same time as performance and accountability in grants and contracts?

According to Brian Collins and Brian Gerber, grant management and contracting have a lot in common. Both separate the financing and delivery of goods and services to the public, which is seen in government as a plus (Collins and Gerber, 2008, 1129). From this separation, both grant management and contracting out influence the government in an indirect way. Since both are so similar, they often share the same management challenges as well (2008, 1129). Grants typically target specific populations with certain needs and delegate the delivery of a service to whichever agency can match and provide for that need. This creates a network of indirect governance. Grant programs are generally equity-based in purpose. It can be difficult to manage social equity in the distribution of grant funds because of the empirical distribution of benefits (Collins and Gerber, 2008, 1129). A standard for social equity in grant administration is to distribute funding in an unbiased fashion that is not for or against potential recipients of a grant. Management then has to filter out applicants who do not serve a target population, which questions social equity performance (Collins and Gerber, 2008, 1129). Unless a grant is a pure income transfer, grant management and contracting out are very similar. When contracting out, grantors negotiate deliverables, time tables, and the exchange of resources with grantees (Collins and Gerber, 2008, 1130). Contracting suggests that managing for social equity means two issues concerning performance accountably and social equity have to be resolved. Performance accountability is to make sure grantees use public funds as intended, and use them efficiently and effectively (Collins and Gerber, 2008, 1130). Additionally, informal asymmetries appear in contracting out, as well as in grants. To avoid adverse selection and moral hazard problems, grantors have to be sure not to select grantees that do not show the commitment or capacity to properly implement a grant to the set expectations. Not selecting the right grantees becomes very costly for managers. It can be difficult to achieve performance accountability, and commonly, if it is achieved, it is at the loss of social equity. In a formula-dominated model, the entitlement CDBG program, for example, is expected to demonstrate high levels of social equity performance but lower levels of potential performance accountability. In a competition-dominated model, like the non-entitlement CDBG program, there is an expectation to “demonstrate relatively higher levels of performance accountability than formula-dominated models” (Collins and Gerber, 2008, 1131). Collins and Gerber give two additional models: moderating hybrid and adverse hybrid. In the moderating hybrid model, characteristics of the formula model are visible and in this model, social equity performance should be better than the competition-dominated model, mainly because it targets formulas to needs and that should constrain allocative biases toward administrative capacities (Collins and Gerber, 2008, 1132). Finally, the adverse hybrid model gives low levels of social equity performance and performance accountably because relative strengths of formulas are mismatched. These additional models show that administrative

models can use formulas and competitions to ensure social equity and performance accountably (Collins and Gerber, 2008, 1132).

2. According to Jeremy Hall, what are the steps that a grant-seeking organization should take in planning and preparing a grant proposal? What is the importance of the role of “partners” in the grant proposal process?

According to Jeremy Hall, when seeking a grant, an organization should take the time to plan and prepare a draft proposal. Hall thinks it is important for the grant-seeking organization to confront the purpose of their organization and ask questions to determine what it is they are truly asking for (Hall, 2010, 75). It is important for an organization to not be greedy and to determine who would directly be affected by the proposed program. Before getting to the steps to take, there are first three models that indicate how an organization is likely to view and approach partnership proposals. The first is an organization that has altruistic motives focused on the effect of the project. This organization will be open to partnerships and will treat everyone who is involved fairly. The second is an organization that is self-serving and egocentric. This organization is only concerned with budget resources and will not work well with partners. The third organization is conniving. It realizes that it will have greater success if uses partnerships, however, it shorts those partners when funding is awarded (Hall, 2010, 75). After an organization decides what kind of organization it will be, it will start Hall’s first step: building the grant team. A team is better to approach the grant proposal process than just an individual. A team reduces workload and brings more perspectives to the table (Hall, 2010, 75). It is important for an organization to know the strengths and weaknesses of each team member and learn how those strengths can be beneficial through this process. A technique to finding the strengths and weaknesses of the team could be using the Myers-Bringgs Type Indicator. The results can allow the organization to use cognitive styles to determine team roles (Hall, 2010, 76). Once the team roles are determined, the team can start to develop a program idea. Hall writes that it is never too early to develop an idea—sometimes the program idea comes first and other times it will come up during the strategic planning process (2010, 81). When developing a program idea, it is important to always keep in mind what a given program does to further an organization’s mission (Hall, 2010, 81). The idea should reflect the culture of the organization, along with its mission and vision. The organization’s constraints are also important to consider because the team have to ensure the proposed program or active is eligible. Most program ideas will eventually need to be changed, often needing to be broadened or narrowed, and in these cases, the program idea was the impetus for a funding search (Hall, 2010, 81). It’s important for the idea to be flexible, but not so flexible that the programs goals start to mirror the funding agency’s goal rather than its own. A common approach to developing a program idea is to create a workgroup. A workgroup allows for collaboration which can be both rewarding and challenging—collaboration leads to shared power (Hall, 2010, 82). A good plan would be to start out meeting internationally before branching out to potential participants. This allows the framework to be build so that it will be more difficult to loss control of the program (Hall, 2010, 82).

When looking for partners, two types generally appear: symbolic partners and substantive partners (Hall, 2010, 83). Symbolic partnerships show support from community organizations that are an important part of the project. There partners should not be involved in the projects key activities and should not provide funding, however, they can play a big role in getting applications funded through producing letters of support. Letters of support are included in the application packet and addressed to the funding agency (Hall, 2010, 83). These letters express information about the community, applicant, and proposal, and shows the funding agency that community organizations are aware of the application, which shows the applicant has done their homework and sought community input for their plan (Hall, 2010, 84). Hall claims that symbolic partnerships are useful, but indicates that substantive partnership are essential in preparing a grant proposal (2010, 84). These partners are very involved in the project. Their letters of support contain the same information as the symbolic partner letters, but require additional information about their role in the project—what grant funds they will receive through subcontracts from the applicant, how they will use the money, and who will participate (Hall, 2010, 84). During the letter process, letters of support should not be asked for without guidance to the organization on what the letter should include and external partners should be left out of planning activities. The final steps are to agree on roles and contributions. This step is not easy because each participant wants to get the best benefit while spending the least amount of money possible and will resist participation until they feel they have that balance (Hall, 2010, 88). To agree on roles, amicable partners with use an internal program approach to figure out how to fit their needs and available contributions. To agree on contributions several forms must be filled out, for example, they could be human resource forms or financial resource forms (Hall, 2010, 89). It is important to accurately measure costs and benefits and negotiations should be very tactful, as sometimes, potential partners can become offended if certain conditions do not allow organizations to accept the amount the potential partners are affording, due to conditions of certain grants. In conclusion, preparing and planning a grant proposal and gaining partner organizations takes time and commitment. Partnerships and partner roles are essential to receiving a grant for an organization and planning and preparation can often make or break a grant application.

Similar Documents

Free Essay

Intergovernmental Relation

...INTERGOVERNMENTAL RELATIONS IN FEDERAL SYSTEMS 39 7.5| INDEPENDENCE The actions and decisions of intergovernmental relations must be free from undue influence from political or private interests. They must have high-level commitment. The Productivity Commission has a very important role in Australia’s economic competitiveness in identifying reform priorities for Australia, and conducting detailed research and making recommendations on potential solutions. The Productivity Commission’s contribution to the understanding of our federal system has been seen in a number of reports it has produced, including the recent compilation of materials from the 2006 Roundtable Proceedings in Canberra entitled Productive Reform in a Federal System. The Productivity Commission’s role in federal–state relations is limited however: + The research priorities are set by the Commonwealth Government (and therefore potentially guided by political interests of the day rather than long-term objectives) and there is limited opportunity for the Productivity Commission to set its own work priorities. + There is no ‘buy-in’ by the state governments (either in terms of the direction of the Productivity Commission’s work agenda, the funding of the Commission or the outcomes). + There is no requirement for the Commonwealth Government to respond to the reports of the Productivity Commission, and therefore less accountability for the findings. Two considerations...

Words: 6813 - Pages: 28

Premium Essay

How Does The Constitution Shape The Structure Of Intergovernmental Relations

...Intergovernmental is defined as, conducted between or involving two or more governments ("Intergovernmental." The Free Dictionary). Intergovernmental relationships are very important for a democratic society to function. Elected officials on each level have to communicate for effective legislation to be passed. Each level of government is distinct, independent, and interrelated. The levels are separate and have an up flow of power starting with local government and ending with the federal government. The effect of intergovernmental relations has fueled cooperative policy making among divided government systems. This paper will identify what shapes the structure of intergovernmental relation, their structure and importance, and the relationship between elected officials on each level. In the United States the Constitution shapes the structure of intergovernmental relationships. In other governments the society, constitutional regime and the governmental institutions shape their intergovernmental relations (Cameron, "The Structures of Intergovernmental Relations"). The population and demographics of a country also effect the shaping of intergovernmental relations. A country...

Words: 1419 - Pages: 6

Premium Essay

Banking

...and prices of a commodity for the benefit of participating countries. An agreement usually involves a consensus on quantities traded, prices, and stock management. A number of international commodity agreements serve solely as forums for information exchange, analysis, and policy discussion. USTR leads United States participation in two commodity trade agreements: the International Tropical Timber Agreement and the International Coffee Agreement (ICA). Both agreements establish intergovernmental organizations with governing councils . International Coffee Agreement The International Coffee Organization (ICO) is the main intergovernmental organization for coffee. ICO exporting members account for more than 97 percent of world coffee production, and its importing Members, are responsible for around 80 percent of world coffee consumption. The ICO makes a practical contribution to the world coffee economy and to the improvement of living standards in developing countries by facilitating intergovernmental consultation and coordination regarding coffee policies and priorities, by encouraging a sustainable world coffee economy, by initiating coffee development projects to add value and improve marketing, by increasing world coffee consumption through innovative market development activities, by promoting the improvement of coffee quality, by working closely with the global coffee industry through a 16 member Private Sector Consultative Board, and by ensuring transparency in the coffee...

Words: 759 - Pages: 4

Free Essay

Stuffington

...AC571_relational_database_005-019 Male Page 1 of 5 AC571_relational_database_005 Welcome to this refresher on relational database concepts. Understanding relational database concepts is a key to mastering a key theme, REA modeling. As we progress through this refresher, please pay close attention to the objectives being covered as you see on the screen. The objectives are as follows: problems inherent in the flat file approach to data management that gave rise to the relational database concept, relationships among the defining elements of the relational database environment, stages in database design, entity identification, data modeling, constructing the physical database, and preparing user views, features of distributive databases and issues to consider in deciding on a particular database configuration. These objectives will serve as the foundation for understanding relational database concepts and REA modeling. AC571_relational_database_006 Before we can get into the heart of relational database concepts one must understand the differences between two common database environments, flat file and relational databases. As you know, computer systems process data. This processing involves two key components, data and instructions, or programs. This occurs no matter what database environment you have. In order to process the data you need an interface. Conceptually there are two methods for designing the interface between program instructions and data. File oriented processing...

Words: 2046 - Pages: 9

Free Essay

Riordan Business-to-Business Web Site

...Riordan Business-to-Business Web Site Use Case Scenarios Analysis In deciding which way to take Riordan Manufacturing’s business-to-business web site use case studies were performed and the top two scenarios were chosen for further analysis. Both scenarios present a way for Riordan to improve raw material ordering through different means. In order to decide which path to take the two scenarios will be discussed in greater detail including a brief synopsis on the technological role involving systems analysis and design, database design, programming, networking, and the web. Use Case 1 As described before, in use case scenario 1, a Riordan employee would log into a business-to-business web site and place an order with one of our partnered vendors as Figure 1 depicts. The employee logs into the secure website, chooses a vendor from a list, selects from the common list of products purchased from the vendor, chooses a quantity and enters a required by date, the vendor receives notification of an order, verifies credit status or requests credit card information, fills the order, generates an invoice, and ships the order to our warehouse. Use Case 2 In use case scenario 2, as shown in Figure 2, the approach to replenishing key inventory levels resides with the vendor. Triggers in the database alert the vendor via email that the level is at its threshold and then the supplier logs into the secure business-to-business web site, issues an order to ship replenishment supplies...

Words: 795 - Pages: 4

Premium Essay

Database Project Documentation Guide

...Database Management System Submitted by: NAMES Date Submitted 2. Table of Contents 3. Document Scope - Describes the goal of this document in a narrative. - Introduction 4. System Overview - Provide a brief overview of the system. 5. Business Rules - Brief, precise, and unambiguous description of policy, procedure, or principle of the Company or Organization. 6. Relational Diagram - Representation of the Relational database’s entities, the attributes within those entities and the relationships between those entities. Example 7. Crow’s Foot ER Diagram - A graph/ diagram that represents the conceptual database as viewed by the end user. Example 8. ERM Components - Summarizes the ERM’s components and names the entities and their relations. Example. . 9. Data Dictionary - Provides detailed accounting of all tables found within the user/designer-created database - Contains (at least) all the attribute names and characteristics for each table in the system - Contains metadata—data about data Example 10. Database Design Decisions - Discuss the decisions that were made when designing the database for the Application, including problems, alternative solutions, and design assumptions that had to be made. - Divide this section...

Words: 367 - Pages: 2

Free Essay

Chapter 9 Review Questions and Answers

...1. a) What is a database? A database is an organized collection of related data. b) How does an RDBMS store data? An RDBMS stores related data in tables. 2. What is one benefit of dividing data into tables? Dividing data into tables eliminates unnecessary data duplication, or data redundancy. 3. a) What is a database schema? A database schema is a description of the data and the organization of the data into tables in a relational database. b) Explain the considerations for dividing data into related groups. Considerations for dividing data into related groups includes grouping information so that there is little or no data redundancy. However, each table must have data related to at least one other table, which will require data duplication. This is not considered data redundancy. A table with no relationship to any another table does not belong in the database. 4. a) What is a field? A column in a table. Used to store data. b) Explain why a field that stores more than one piece of data is considered poor design. A field that stores more than one piece of data limits the sorting and searching capabilities of the database. 5. List four guidelines to follow when choosing field names. 1. Make field names unique. 2. Choose the shortest possible...

Words: 1840 - Pages: 8

Premium Essay

Testing

...ranow, E. B. “Developing Good Data Definitions.” Database Programming & Design 2 (8) (1989): 36–39. Booch, G. Object-Oriented Analysis and Design with Applications. 2d ed. Redwood City, CA: Benjamin Cummings, 1994. Bruce, T. A. Designing Quality Databases with IDEF1X Information Models. New York: Dorset House, 1992. Chen, P. P-S. “The Entity-Relationship Model—Toward a Unified View of Data.” ACM Transactions on Database Systems 1 (March 1976): 9–36. Codd, E. F. “A Relational Model of Data for Large Relational Databases.” Communications of the ACM 13 (6) (1970): 77–87. Dutka, A. F., and H. H. Hanson. Fundamentals of Data Normalization. Reading, MA: Addison-Wesley, 1989. Finkelstein, R. “Breaking the Rules Has a Price.” Database Programming & Design 1 (June 1988): 11–14. Fleming, C. C., and B. von Halle. “An Overview of Logical Data Modeling.” Data Resource Management 1 (1) (1990): 5–15. Fowler, M. UML Distilled: A Brief Guide to the Object Modeling Language. 2d ed. Reading, MA: Addison-Wesley, 2000. Gibson, M., C. Hughes, and W. Remington. “Tracking the Trade-Offs with Inverted Lists.” Database Programming & Design 2 (January 1989): 28–34. Gottesdiener, E. “Turning Rules into Requirements.” Application Development Trends 6 (7) (1999): 37–50. Hay, D. Data Model Patterns: Conventions of Thought. New York: Dorset House, 1996. Hoffer, J. A., V. Ramesh, and H. Topi. Modern Database Management. 10th ed. Upper Saddle River, NJ: Prentice Hall, 2011. Inmon, W. H...

Words: 356 - Pages: 2

Free Essay

Computer

...1. List the advantages of a relational model specific to ACME Global Consulting. Relational models can provide some very significant advantages over other methods. First, they are very easy to read due to the nature of two-dimensional tables. Columns and row format is straightforward and consists of a collection of similar data among rows that allow for the user to easily locate what they need. One of the biggest advantages of the relational model of database design is that its foundation is formal mathematical theory. It allows its concepts to be defined and examined with great precision. In other systems, the calculations may need to be done separately prior to using the database. 2. Summarize in your own words the purpose of an E-R model specific to ACME Global Consulting. The E-R model can provide ACME Global with a specific, but open-ended design that is tailored to the company’s needs. This also allows us to sketch the design of a database informally and incorporate changes in order to avoid problems later on. The E-R model allows for growth beyond its ideas at inception. It lays the groundwork for later database relational designs. 3. List and describe essential components of the model such as entities, attributes, keys, relationships, roles, and dependencies specific to ACME Global Consulting. Entity: real-world object or thing with an independent existence and which is distinguishable from other objects. Examples are a person, car, customer, product,...

Words: 313 - Pages: 2

Free Essay

Alph

...Language, the user describes the information desired without giving a specific procedural for obtaining the information. Relational Algebra Definition It is a procedure language. It consists of a set of operations that take one or more relations as input and produce a new relation as a result. The fundamental operations of relational algebra are select, project, union, set difference, Cartesian product and rename. Other operations are: Set intersection, natural join, division and assignment. • The basic set of operations for the relational model is known as the relational algebra. These operations enable a user to specify basic retrieval requests. • The result of retrieval is a new relation, which may have been formed from one or more relations. The algebra operations thus produce new relations, which can be further manipulated using operations of the same algebra. • A sequence of relational algebra operations forms a relational algebra expression, whose result will also be a relation that represents the result of a database query (or retrieval request). Keys • Let K ( R where K is a superkey of R if values for K are sufficient to identify a unique tuple of each possible relation r(R) – by “possible r” we mean a relation r that could exist in the enterprise we are modeling. – Example: {customer-name, customer-street} and {customer-name} are both...

Words: 305 - Pages: 2

Premium Essay

Olap

...OLAP In computing, online analytical processing, or OLAP ( /ˈoʊlæp/), is an approach to answering multi-dimensional analytical (MDA) queries swiftly.[1] OLAP is part of the broader category of business intelligence, which also encompasses relational database report writing and data mining.[2] Typical applications of OLAP include business reporting for sales, marketing, management reporting, business process management (BPM),[3] budgeting and forecasting, financial reporting and similar areas, with new applications coming up, such as agriculture.[4] The term OLAP was created as a slight modification of the traditional database term OLTP (Online Transaction Processing).[5] OLAP tools enable users to analyze multidimensional data interactively from multiple perspectives. OLAP consists of three basic analytical operations: consolidation (roll-up), drill-down, and slicing and dicing.[6] Consolidation involves the aggregation of data that can be accumulated and computed in one or more dimensions. For example, all sales offices are rolled up to the sales department or sales division to anticipate sales trends. By contrast, the drill-down is a technique that allows users to navigate through the details. For instance, users can view the sales by individual products that make up a region’s sales. Slicing and dicing is a feature whereby users can take out (slicing) a specific set of data of the OLAP cube and view (dicing) the slices from different viewpoints. Databases configured...

Words: 256 - Pages: 2

Free Essay

Erter

...1. We have structure pane and class n object pane in UDT, in IDT, they have Data foundation layer (in stead of structure pane) and Business Layer (instead of Class n object pane). First of all, a project is created, then a relational or OLAP connection, then data foundation and then business layer. Then the universe is published as .unx 2. In IDT, the biggest advantage is that you have create universe based on multiple data sources. It could be different relational data sources (must be 64-bit), or different SAP BW source or them combined. 3. You can create universe based of SAP BW. The tables underneath the cube would be extracted, and would be used like any relational database. 4. They have introduced the concept of 'views' in Data Foundation Layer. If you have many tables to be used in the universe, it would be difficult to manage joins and structure. So you can create multiple windows. For ex., one view or window would be related to client and all the related tables. another window could be related to product and related tables, and another could be related to FACT and the main dimension tables. The master view would be the union of all these views. 5. In UDT, you can add a table any time and then can drag it to object pane to create objects automatically. In IDT, automatic classes and objects are created only once when you create the Business Layer for the first time. After that, if you add any table, you have to create objects based on it manually. 6...

Words: 292 - Pages: 2

Free Essay

Management Information System

...* How the Internet works * Packet-switching technology Actual data transmission takes place sporadically, rather than continuously. Data to be transmitted is divided into small packets of information and labeled to identify the sender and recipient. These are sent over a network and then reassembled at their destination. If any packet did not arrive or was not intact, original sender requested to resend the packet. -> This enables millions to transmit data at the same time. * Understand the importance of standards (protocols) * What problems are and tasks are involved in networks and why are standards important for networks to run? Computers and applications of different kinds need to use the same network. Packets could get altered/lost/out of sequence. Many computers send packets simultaneously. There are lots of different destinations, routes, and sometimes some of them ‘close down’. * Bandwidth Bandwidth is transmission capacity of a computer or communications channel, measured in bits per second (bps). * TCP/IP protocol and layered standards of the Internet * Application layer, network layer (TCP/IP) Applications layer (e.g. HTTP, FTP) specifies how application programs communicate. Network layer (e.g. TCP/IP) consists of transport layer and internet layer. Transport layer (TCP) breaks, reassembles messages into packets. Internet layer (IP) specifies the address a packet is headed to. * Internet addressing and architecture:...

Words: 2137 - Pages: 9

Premium Essay

Introduction

...Cursors A cursor is a variable that runs through the tuples of some relation. This relation can be a stored table, or it can be the answer to some query. By fetching into the cursor each tuple of the relation, we can write a program to read and process the value of each such tuple. If the relation is stored, we can also update or delete the tuple at the current cursor position. The example below illustrates a cursor loop. It uses our example relation T1(e,f) whose tuples are pairs of integers. The program will delete every tuple whose first component is less than the second, and insert the reverse tuple into T1. 1) DECLARE /* Output variables to hold the result of the query: */ 2) a T1.e%TYPE; 3) b T1.f%TYPE; /* Cursor declaration: */ 4) CURSOR T1Cursor IS 5) SELECT e, f 6) FROM T1 7) WHERE e < f 8) FOR UPDATE; 9) BEGIN 10) OPEN T1Cursor; 11) LOOP /* Retrieve each row of the result of the above query into PL/SQL variables: */ 12) FETCH T1Cursor INTO a, b; /* If there are no more rows to fetch, exit the loop: */ 13) EXIT WHEN T1Cursor%NOTFOUND; /* Delete the current tuple: */ 14) DELETE FROM T1 WHERE CURRENT OF T1Cursor; /* Insert the reverse tuple: */ 15) INSERT INTO T1 VALUES(b, a); 16) END LOOP; /* Free cursor used by the...

Words: 583 - Pages: 3

Premium Essay

Arqwdsas

...Arab Academy for Science, Technology and Maritime Transport College of Engineering and Technology Industrial and Management Engineering Department Course: IM433 – Industrial Database Systems Management Student Name: | Department: | Student Number: | Sheet #1 Given the following file structure, answer problems 1 through 6. 1. How many records does the file contain, and how many fields are there per record? 2. What problem would you encounter if you wanted to produce a listing by city? How would you solve this problem by altering the file structure? 3. If you wanted to produce a listing of the file contents by last name, are code, city, state, or zip code, how would you later the file structure? 4. What data redundancies do you detect and how could these redundancies lead to anomalies? 5. Using two relational database tables, PROJECT and MANAGER, eliminate the redundancies discovered in problem 4. Make sure you use the naming conventions and connect the two tables through an appropriate link. 6. Create the relational schema to show how the two database tables in problem 5 are linked. Given the following file structure answer problem 7 through 13. 7. Identify and discuss the serious data redundancy problems exhibited by this file structure. 8. How many different data sources are likely to be used by the file you examined in problem 7? 9. Based on your findings in problem 7 and 8, how would a relational database environment...

Words: 503 - Pages: 3