Free Essay

Mobile Database

In:

Submitted By AdilaYouns
Words 2537
Pages 11
Mobile database
A mobile database is either a stationary database that can be connected to by a mobile computing device ( eg smartphone and PDA) over a mobile network OR
A database, which is actually stored by the mobile device this could be list of contacts, price information distance travelled or any other information
Many applications require the ability to download information from an information repository and operate on this information even when out of range or disconnected.
An EXAMPLE of this is your contacts and calendar on the phone. In this scenario a user would require access to update information from files in the home directories on a server or customer records from a database.
This type of access and work load generated by such users is different from the traditional workloads seen in client-server system of today
CONSIDERATION
• Mobile users must be able to work without a network connection due to poor or non existent connections. A cache could be maintained to hold recently accessed data and transactions so that they are not lost due to connection failure. Users might not require access to truly live data, only recently modified data, and uploading of changing might be deferred until reconnected
• Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred)
• Mobile computing devices tend to have slower CPU and limited battery life
• Users with multiple device (eg. Smartphone and tablet) need to synchronize their devices to a centralized data store. This may require application specific automaton features
This is in database theory known as replication and good mobile database system should provide tools for automatic replication that takes into account that others may have modified the same data as you while you were away, and not just the last update is kept, but also supports merge of variants.
Users may change the location geographically and on the network. Usually dealing with this is left to the operating system, which is responsible for maintaining the wireless connection.
PRODUCTS
Commercially available mobile databases include those shown on this comparison chart
Name Developer Type Description
SQL anywhere Sybase iAnywhere Relational Embedded/portable database
Can synchronize with stationary database
DB2 Everyplace IBM Relational Portable, can synchronize with stationary database
SQL Server Compact Microsoft Relational Small- footprint
Embedded/ portable database for Microsoft windows mobile devices and desktops
Supports synchronization with Microsoft SQL Server
SQL Server Express Microsoft Relational Embedded database
Free download
Oracle database lite Oracle corporation Portable
Can synchronize with stationary database
SQLite D.Richard Hipp C programming library Public Domain
SQLBase Gupta Technologies LLC of Redwood shores California
Sparksee 5 mobile Sparsity Technologies Graph database Small footprint
Embedded/portable database for android, iOS and BB10
It allows traversal of nodes, minimum distance computations, community search etc
Couchbase Lite Couchbase Inc Document Oriented database A lightweight full featured embedded JSON document store
Supports iOS, android and REST SDK
Is sync ready using couchbase Syn gateway will sync and conflict resolution built in iBox DB IBoxDB Document oriented database Embedded transactional table style document database for android windows phone
Support mono Xamarin and Unity3D mobile development platforms
Realm Realm Inc Object database A lightweight full featured embedded object store
Support iOS and android

What is mobile database
Traditionally large scale commercial databases were developed as centralized database systems. However this trend changed as more and more distributed application started to emerge. The distributed database applications involved usually a strong central database and powerful network administration. However the newer technology trends have changed this paradigm because of the following technological trends:
• The notebook and laptop computers are being used increasingly among the business community
• The development and availability of a relatively low cost wireless digital communication infrastructure. This infrastructure is based on wireless local area networks, cellular digital packet networks, and other technologies
The rapid advancements of wireless communication technology and computer miniaturizing technology have enabled users to utilize computing resources anywhere in the computer network. For example you can even connect to your internet from an aero plane. Mobile database are the database that allows the development and deployment of database applications for handheld devices, thus enabling relational database based applications in hands of mobile workers. The database technology allows employees using handheld to link to their corporate networks, download data, work offline, and then connect to the network again to synchronize with the corporate database. For example with mobile database embedded in a handheld device a package delivery worker can collect signature after each delivery and send the information to corporate database at days end.
The current database systems do no provide special facilities for specific update operations in a mobile computing environment. Some of the commercially available mobile relational database systems are:
• IBM’s DB2 everywhere 1.0
• Oracle lite
• Sybase’s SQL
The databases work on palm top and hand held devices providing a local data store for the relational data acquired from enterprise SQL databases. The main constraints for such databases are relating to the size of the programs as the handheld devices have RAM oriented constraints. The commercially available mobile database systems allow wide variety of platforms and data sources. They also allows users with handheld to synchronize with open database connectivity (ODBC) database content, and personal information management data and email from Lotus Development’s Notes or Microsoft’s exchange. These database technologies support either query by example (QBE) or SQL statement.
Mobile computing has proved useful in many applications. Many business travelers are using laptop computers to enable them to work and to access data while travelling. Delivery services may use / are using mobile computers at the disasters sites, medical emergencies, etc to access information and to provide data pertaining to the situation. Newer applications of mobile computers are also emerging.
One of the issue relating to wireless computing is that creates a situation where machines no longer have fixed locations and network addresses. This may complicate query processing for the cases where location pays a key role, since it becomes difficult to determine the optimal location at which to materialize the result of a query. This may happen only for the cases where the location of the user is parameter of the query. For example if a traveler information system provides data on hotels, roadside services, e.t.c to motorist, queries about services that are ahead on the current route must be processed based on knowledge of the user’s location, direction of motion and speed
Another issue relating to mobile computing is the energy (battery power). It is a scarce resource for mobile computers. This limitation influences many aspects of system design. Can we reduce the requirements of data transfer for the sake of energy efficiency? Yes by doing scheduled data broadcast, we may reduce the need for mobile systems to transmit queries.
But on the other side it will increase the amount of data residing on machines administered by users, rather than by database administrators. In addition these machines may at times be disconnected from the network ; thus raising the question about the consistency of data
A MODEL OF MOBILE COMPUTING
The mobile computing environment consists of mobile computers which referred to as mobile hosts and a wired network of computers. The communication between the mobile hosts and the wired network takes place through the computers referred to as mobile support stations. A mobile support station manages the mobile hosts within its cell. But what is a cell? A cell is defined as the geographical area covered by a mobile support station. Mobile hosts may move between cells, thus necessitating a transfer of control from one mobile support station to another. Since mobile hosts may at times be powered down , a host may leave one cell and re materialize later at some distant cell therefore, moves between cells are not necessarily between adjacent cells. Within a small area, such as a building, mobile host may be connected by a wireless local area network within a small area, which may provide lower cost connectivity than a wide area cellular network. This will also reduce the overhead of transfer of control.
It is possible for mobile hosts to communicate directly without the intervention of a mobile support station. However such communication can occur only between the nearby hosts.
The size and the power limitations of many mobile computers have led to alternative memory hierarchies. Flash memories may be used in such systems to save power. If the mobile host includes a hard disk, the disk may be allowed to spin down when it is not in use, to save energy.
ROUTING AND QUERY PROCESSING
The mobile computing poses typical problems from the point of view of routing and query processing. For example as per the mobile computing model, the route between a pair of hosts may change over time, if one of the 2 hosts is mobile. The simple face may have a dramatic effect at the network level, since location based network addresses are no longer constants within the system. However these networking issues are beyond the scope of this course.
The mobile computing model also directly affects database query processing. In the case of distributed query processing the communication costs play important role in query optimization process while selecting the best method of query evaluation strategy. Mobility results in dynamically changing communication costs, therefore complicates the optimization process
Some anomalous factors which need to be considered for mobile computing are
• User time is a highly valuable commodity in most of the business applications.
• Connection time is the unit of monetaty charges is assigned in most cellular systems, therefore should be minimum
• Number of bytes or packets transferred is the unit of charges is computed in digital cellular systems
• Time of day based charges may vary based on whether communication occurs during peak or off peak periods
• Energy is limited often battery power is scarce resource and should be optimized
• One of the basic principles of radio communication is that it requires less energy to receive than to transmit radio signals. Thus transmission and reception of data impose different power demand on the mobile host
BROADCAST DATA
It is often desirable for frequently requested data to be broadcast in a continuous cycle by mobile support stations, rather than transmitted to mobile hosts on demand. A typical application of broadcast data is stock market price information. There are two reasons for using broadcast data:
• The mobile host does not have to invest on the energy cost for transmitting data requests
• The broadcast data can be received by a large number of mobile hosts in a single transmission, at no extra cost, thus, ensures effective utilization of the available transmission.
Thus, the mobile hosts need to only receive data as and when those data are transmitted, rather than consuming energy by transmitting a request. The mobile host may also have the local nonvolatile storage for storing (cache) the broadcast data as and when received, for possible later use. The mobile host may optimize energy costs by determining whether a given query may be processed using only cached data. In case the cached data is not found to be appropriate for the query, then the mobile host may, either may wait for the data to be broadcast, or transmit a request for data. However in order to make this decision, the mobile host must know when the relevant data will be broadcast.
The broadcasting of data may be made according to a fixed schedule or a changeable schedule. If the schedule of data transmission is fixed then the mobile host uses the known fixed schedule to determine when the relevant data will be transmitted. In the data transmission schedule is changeable then even the broadcast schedule may itself be broadcast as a well-known frequency and time intervals.
In effect, the broadcast medium can be thought of a disk with a high latency Request for data can be thought of as being serviced when the requested data are broadcast. The transmission schedules behave like indices on the disk. This area is still evolving and research is still being conducted on broadcast data issues
DISCONNECTIVITY AND CONSISTENCY
As one of the major cost involves in wireless communication, the connectivity cost, is paid for on the basis of connection time, there is an incentive for certain mobile hosts to be disconnected for substantial periods. However, during the time of disconnection, the user may still be working on the host machine and may issue queries and updates on data on locally cached data. This situation creates several problems of the following types:
• RECOVERABILITY
Updates entered at the mobile host machine which is not connected may be lost if the machine undergoes a major failure. This problem will result from the fact that only copy of information is kept at local host and simulation of storage that takes care of failure will be difficult to do.
• CONSISTENCY
The locally cached data may become inconsistent, but the mobile host can discover this fact only when it is reconnected. Similarly, the updates occurring in the mobile host cannot be propagated until reconnection occurs. However, such updates may be propagated as and when the mobile hosts reconnects. However if the mobile host caches read only copies of data, which is being updated by other computers, the cached data may become inconsistent once a different machine updates the value. In such cases on reconnection, the mobile host may be sent with invalidation reports that my inform it about inconsistent cache entries. In case updates can occur at both the mobile host and elsewhere, detecting conflicting updates become even more difficult. Details on these issues are beyond scope of this text.
SUMMARY
In this unit, we have discussed about the basic requirement of mobile databases. We have also dealt with the issues and problems faced in case of mobile database.

Definition
A mobile database is a database that resides on a mobile device such as a PDA, a smartphone, or a laptop. Such devices are often limited in resources such as memory, computing power, and battery power.
Key Points
Due to device limitations, a mobile database is often much smaller than its counterpart residing on servers and mainframes. A mobile database is managed by a Database Management System. Again, due to resource constraints, such a system often has limited functionality compared to a full blown database management system. For example, mobile databases are single user systems, and therefore a concurrency control mechanism is not required. Other DBMS components such as query processing and recovery may also be limited.
Queries to the mobile database are usually posed by the user of the mobile device. Updates of the database may originate from the user, or from a central server, or directly from the other mobile device. Updates from the server are communicated wirelessly. Such communication takes place either via a point to point connection between mobile devices (the client) and the server, or via broadcasting by the server. Direct updates from other mobile devices may use short range wireless communication protocols such as Bluetooth or Wi-Fi.

Reference https://webservices.ignou.ac.in/virtualcampus/adit/course/cst302/block2/cst302-bl2-u1.htm http://www.cs.uic.edu/~boxu/mp2p/mobile-databases.pdf

Similar Documents

Premium Essay

Mobile Database

...Mobile Databases: a Report on Open Issues and Research Directions * Action members 1 EPFL, 2U. Grenoble, 3INRIA-Nancy, 4INT-Evry, 5U. Montpellier 2, 6U. Paris 6, 7U. Versailles Abstract This paper reports on the main results of a specific action on mobile databases conducted by CNRS in France from October 2001 to December 2002. The objective was to review the state of progress in mobile databases and identify major research directions for the French database community. This paper gives an outline of the directions in which the action participants are now engaged, namely: copy synchronization in disconnected computing, mobile transactions, database embedded in ultra-light devices, data confidentiality, P2P dissemination models and middleware adaptability. 1 ** Introduction At the end of 2001, the National Center for Scientific Research (CNRS) in France launched a number of specific actions (AS) in order to identify the most challenging issues to be investigated by the French research community (http://www.cnrs.fr/STIC/actions/as/as.htm). The impact of ubiquitous and pervasive computing in many aspects of our everyday life motivated the CNRS to fund a specific action on mobile databases, in October 2001 for an initial period of one year. This paper reports on the main results of this action. Different classes of mobile applications can be distinguished depending on the data management requirements they introduce. The most common applications...

Words: 4932 - Pages: 20

Premium Essay

Mobile Databases

...Mobile Databases Roosevelt Smith, Jr. DBM 384 November 12, 2012 Jim Cervi Mobile Databases Databases provide individuals and organizations the means to track various types of information. According to Stephens (2009), “A database is a tool that accumulates information, and lets one produce, read, revise, and remove the data in some manner.” (p. 23) A mobile databases is a databases that can be connected with by a linking with a laptop device over a mobile system. A mobile database provides a portable and physically separate system form the main system; however, it is still able to link to the main system through remote sites for various file sharing of company data. Mobile Database Platforms The incorporation of mobile databases in use throughout society today, provides the integration of various platforms devices. Some of the mobile database platforms devices include laptops, personal data assistants or (PDA’s), and cellular phones. In addition to the mobile platform devices, on must also consider the various server support for the client platforms that include: * Java * Android * Blackberry * Windows Desktop & Mobile * Linux Many programs and applications like databases require the need or capability to acquire data from an intelligence depository and conduct operations on this data even after out of area. SQL Support Sybase Inc.’s SQL Anywhere controls the mobile-database arena, surrounding 68 percent of the mobile marketplace...

Words: 506 - Pages: 3

Free Essay

Mobile Service Provider Database.

...#include typedef struct Employee { char fname[20]; char lname[20]; char sub_taken[20]; char last_edu[20]; char join_date[20]; int id; int age; float bsal; }Employee; int main(void) { int id; FILE *fp,*ft; char another,choice; Employee emp; char fname[20]; char lname[20]; long int recsize; fp=fopen("EMP.DAT","rb+"); if(fp==NULL) { fp=fopen( "EMP.DAT","wb+"); if(fp==NULL) { printf(" Can't Open File"); exit(); } } recsize=sizeof(emp); while(1) { printf(" 1.Add Records 2.Delete Records 3.Modify Records 4.List Records 5.Exit"); printf(" Enter your choice"); fflush(stdin); scanf("%c",&choice); switch(choice) { case'1': fseek(fp,0,SEEK_END); another='Y'; while(another=='Y'|| another=='y') { printf("Enter the first name,last name,age and basic salary : "); scanf("%s %d %f",emp.fname,&emp.age,&emp.bsal); printf(" Enter joining date,id,last education,subject taken"); scanf("%s %d %s %s",emp.join_date,&emp.id,emp.last_edu, emp.sub_taken); fwrite(&emp,recsize,1,fp); printf(" Add another Record (Y/N): "); fflush(stdin); another=getchar(); } break; case '2': another='Y'; while(another=='Y'|| another=='y') { printf(" Enter the id of the employee to be deleted : "); scanf("%d",&id); ft=fopen("TEMP.DAT","wb"); rewind(fp); while(fread(&emp,recsize...

Words: 381 - Pages: 2

Premium Essay

Database

...Software Requirements Specification October 28, 2013 Window App for Sending SMS to mobiles via internet from your computer Submitted by: Muhammad Gulfam Submitted to: Engr. Natasha Nigar Software Engineering Table of Contents Table of contents……………………………………………………………………. List of figures……………………………………………………………………….. 1. Introduction………………………………………………………………….3 1. Purpose……………………………………………………………...3 2. Scope of project……………………………………………………...3 3. Glossary……………………………………………………………...3 4. Overview of document……………………………………………….4 2. Overall Description……..…………………………………………………......5 2.1. System Environment...……………………………………………….5 2.2. Functional Requirement Specification ……………...……………….6 2.2.1. User use cases………………………………………………...6 2.3. User characteristics …………………………………………………….11 2.4. Non Functional Requirements ……………………………….…………11 3. Requirement Specification …………………………………………………..12 3.1 Functional Requirements ……………………………………………12 List of diagrams Fig.1 System Environment ………………………………………………………….3 1.0. Introduction 1.1. Purpose The purpose of this document is to present a detailed description of the Window App for Sending SMS to mobiles via internet from your computer. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must...

Words: 2905 - Pages: 12

Free Essay

Gtpv

...GPVS – Genuine Product Verification System Vivek Saha B.tech C.S.E, Bharath University Agaram road, selaiyur, Chennai-6000073 India viveksaha89@gmail.com I. TITLE OF INVENTION Genuine Product Verification System. II. FIELD OF INVENTION This invention relates to a new tax revenue protection and reliable product verification designed to protect government agencies or brand owners from losses of tax revenues (particularly excise tax in case of governments) from the effects of product counterfeit, illegal import of excise-liable goods and cross border trading and also to protect the consumer from the dangers of consumption of counterfeit products (particularly, counterfeit drinks, tobacco, foods, pharmaceuticals). III. OBJECTIVE OF INVENTION The main objective of the Invention is to give the benefit/power to end users to verify whether the product they have bought is genuine or not; as, the duplicate products are put-in the retailer shop directly or is distributed to retailers directly by the distributors. In particular, our aim to enable end users to verify the product what they have bought, directly from the manufacturer, through website and SMS services. /*The present invention works towards uprooting the black-marketers from India by providing third party clients a system check the genuinenty of products. In Particular, this invention relates to a new tax revenue protection and product authentication system designed to protect government agencies...

Words: 1276 - Pages: 6

Premium Essay

Case Study Lego

...LEGO - EMBRACING CHANGE BY COMBINING BUSINESS INTELLIGENCE WITH A FLEXIBLE INFORMATION SYSTEM History of LEGO Company The LEGO Group was founded in 1932 by Ole Kirk Kristiansen. The company has passed from father to son and is now owned by Kjeld Kirk Kristiansen, a grandchild of the founder.   It has come a long way over the past almost 80 years - from a small carpenter’s workshop to a modern, to a global enterprise that is now, in terms of sales, the world’s fourth-largest manufacturer of toys. The name 'LEGO' is an abbreviation of the two Danish words "leg godt", meaning "play well". The original Lego toys started with a wooden duck. But the first LEGO automatic binding brick is their most important product. The products have undergone extensive development over the years – but the foundation remains the traditional LEGO brick. The Lego Group began in the carpentry workshop of Ole Kirk Christiansen, in Billund, Denmark in 1916.  In 1961, Lego wished to expand sales to North America, but did not have the logistical capabilities to do so. Lego made an arrangement allowing Samsonite to begin producing and selling Lego products in the United States and Canada.  On 7 June 1968, the first Legoland Park was opened in Billund. This theme park featured elaborate models of miniature towns built entirely from Lego bricks. The three acre (12,000 m²) park attracted 625,000 visitors in its first year alone. During the next 20 years, the park grew to more than eight times...

Words: 1468 - Pages: 6

Free Essay

Case Study 14.1- Supply Chain Management

...Case Questions 1. A decently overseen database may help the healing center accomplish its mission by the following points: * Cost of the each treatment in similar hospital is stored in the database to compare rate with other hospital. * Physicians can gather the relevant information quickly by providing the electronic medical record for each patient. * To find which programs and methods are best, create a historical record of the treatments. * Track the important measure to provide the data and information for example, normal length of patient wait, price for each day for a patient. 3. Hospital should carefully manage some of the cost and risk of using database because in a job market, there is short supply of skills such as database designer and database administrator. Without the specific faculty, it creates a risk to manage the database. The installation and administration expenses include updating software and installing of database and hardware. The translation cost includes the converting cost of older application into database environment. Instead of converting the hospital can choose new system. There is a need for the backup and recovery because the framework expenses are connected with those strategies. A hospital must predict the data administration cost and other activities cost related to data definition, ownership and maintenance. 6. Mountain View Hospital could use web based applications in a few ways. * Internet hospital personnel uses...

Words: 410 - Pages: 2

Premium Essay

Reflection

...Week Two Student Guide This week, you will explore how databases are used in the work environment. Databases play a significant role in an organization, so it is important to know how to capitalize on database functionality. You will also learn how businesses, consumers, and the government use collaboration tools in the work environment, and how these tools have transformed the business processes of today’s organizations. Additionally, you will explore electronic commerce, and discuss the challenges this technology presents to businesses and their consumers. Databases, Network Applications, and E-Business OBJECTIVE: Describe how databases are used in the work environment. Resources: Ch. 4 and Technology Guide 2 of Introduction to Information Systems and Ch. 1 for Access in Microsoft® Office 2010 Content • Ch. 4: Data and Knowledge Management of Introduction to Information Systems o Managing Data • The Difficulties of Managing Data • The Data Life Cycle o The Database Approach • The Data Hierarchy • Designing the Database o Database Management Systems • The Relational Database Model • Databases in Action o Data Warehousing • Describing the Data Warehouse • Data Marts o Data Governance o Knowledge Management • Concepts and Definitions • Knowledge Management Systems • The Knowledge Management System Cycle • Technology...

Words: 610 - Pages: 3

Premium Essay

It Assignment

...Table Content | Content | Page | Table Content | 1 | Introduction | 2 | Analysis and Review | 3 | Evaluation | 4-6 | Recommendation | 7 | Conclusion | 7 | APA Referencing | 8 | Introduction Computer software is the set of data and instructions that tells a computer how to do and what to do it. Software provide description to your computer’s hardware. Your PC or Mac would become useless if without it. There including three main types of software, that is application software, system software and programming software. , The most important type of software for computer users is application software, because it can used to achieve many of the tasks so that we can turn to our computers in the first place, such as Web browsing, word processing, and data crunching. Application software applies the power of system software. This is why when downloading software, you have to find a version that fits with your running operating system (OS). That software draws on the OS to create a spreadsheet, PowerPoint presentation or Word document in essence. The software that it worked like in your house pipes run behind the scenes to keep things invisible is programming software, or middleware. System software includes all components of the computer's operating system (OS), including configuration files, other key system components and device drivers. This software provides a basis for the system and tell the computer’s hardware what to do. Analysis There have been debates...

Words: 1528 - Pages: 7

Premium Essay

Riordan Manufacturing Proposal

...Internet and mobile access components When designing a unified, single system intended for total company-wide access, it is important to allow for maximum access. If employees cannot access the system, data cannot be added, and the master databases will not reflect the latest data. On this same note, executives who cannot access the system will not be up to date on current numbers, which may affect current decisions and future plans. Riordan’s unified data system will be accessible through the internet via Virtual Private Network (VPN) channels. The system will not have a mobile application, though the internet portal will be accessible through smartphones and tablets. Riordan’s unified system will be hosted at the company headquarters, but employees will access the system through the internet. This is for several reasons. First, it provides a single point of access for all employees, whether they work at the company headquarters, at one of the Riordan’s outstations, or while they are at home or on travel. A single point of access means a single point of failure, which will help the IT department resolve access issues quickly. Additionally, an online access point keeps users from directly accessing the main system database, which could result in data loss or errors created by users poking around in the main system. To sign into the system at work, users will access a link on the company intranet. There is no need for additional login, because the users are already...

Words: 1120 - Pages: 5

Free Essay

Sddedwe3E3Ee12We3W23E3E

...eLibrary Project Proposal Project Name: Online Library Management System - eLibrary. Project Members: This project is done in a group of two people. Project members are. 1. Atanu Maity 2. Problem Statement: Today most of the library is using either manual system for tracking the day to day activity or they are using desktop, stand-alone system to manage the day to day activity. In this proposed online eLibrary Management System it will run in internet or intranet and user can online check the book availability, they can search the books, library staff can issue, receive book, management can check the report from different location via internet. It can be used multi location also as it can be hosted in central location. Why eLibrary? The online eLibarary Management System is used to overcome the entire problem which they are facing currently, and making complete atomization of manual or semi automatic process of library management system. • Improve the search facility and members and library staff should get all the information in a second. • Should capable to use bar code reader for easy way to do book issue and receive process. • Library member should have limited and read-only access to the system via internet. • Library member should able to view member profile and transaction data pertinent only to them. • The supervisor should be able to enter or update master information like publisher’s details, authors and book details in one...

Words: 563 - Pages: 3

Free Essay

Distributed Systems

...Server Training (16 Courses) Training on how to build and manage SQL Server databases. Our SQL Server Training Courses provide the skills needed to build a solid foundation for SQL Server development. Introduction An overview of DBMS technology * How data is accessed, organized and stored * The database development process * Query and application development tools * CASE tools for database analysis and design * Tables, attributes and relationships * Primary and foreign keys * Relational integrity constraints * Manipulating data: selection, projection, join, union, intersection, difference * An integrated, active data dictionary * The query optimizer * Developing the logical data model * Mapping the data model to the relational model * Specifying integrity constraints * Defining the data in the data dictionary * Capturing entities, attributes and identifiers * Describing relationships: one-to-one, one-to-many, many-to-many * Optional and mandatory relationships * Resolving many-to-many relationships for implementation * Generating the SQL to build the database * Reverse engineering to capture the design of an existing database * SQL Programming Language Introduction 1 Days * Write SQL code based on ANSI/ISO standards to build Microsoft SQL Server or Oracle database structures * Update database content with SQL and transaction handling * Retrieve data with filter conditions and from...

Words: 1010 - Pages: 5

Premium Essay

System Consideration in Hris

...consideration in HRIS Strayer University Dr. Sue Golabek January 25, 2015 Use the internet to research and evaluate two (2) commercial systems for your organization. Evaluate the advantages and disadvantages of each system and, based on your knowledge of human resources and database systems, propose one (1) package that would fit the needs of your organization. Suggest three (3) specific reasons why you would recommend that system over the other. The benefits of utilizing a database are substantial. In today’s revolutionary business world, it is hard to imagine a company not desiring to invest in a Software that can manage information, and offer a level of security with password protection for wondering eyes (Thomas, 2013). The advantages of a business to use Peachtree Software are rapid access to information, trouble-free reporting, good organization, and many other features. Peachtree Software is written in Microsoft Access, without problems that can rapidly track employee’s attendance, evaluations, payroll, customers’ data, training, and applicants’ data, as well as making sure the company is well informed about any changes in government regulation (HR data manager, 2013). Another database system would be Oracle PeopleSoft that offers compensation, recruiting solutions, payroll interface, time and labor record keeping, travel and expense, and general ledger/budgeting report, which is beneficial to any organization (Oracle. para 4, 2006). However, there are some disadvantages...

Words: 1309 - Pages: 6

Free Essay

Syllabus

...SCHEME OF EXAMINATION FOR MASTER OF COMPUTER APPLICATIONS (MCA) (SIX-SEMESTER Programme) |Semester – I | |Paper |Title of the Paper |Duration |Maximum Marks |Total | |No. | |Of Exam | | | | | | |Theory |Sessional* | | |MCA-101 |Computer Fundamentals and Problem Solving Using C |3 Hours |80 |20 |100 | |MCA-102 |Computer Organisation |3 Hours |80 |20 |100 | |MCA-103 |Discrete Mathematical Structures |3 Hours |80 |20 |100 | |MCA-104 |Software Engineering |3 Hours |80 |20 |100 | |MCA-105 |Computer Oriented Numerical and Statistical Methods |3 Hours |80 |20 |100 | |MCA-106 |Software Laboratory - I |3 Hours | | |100 | | |C (Based on MCA-101) |...

Words: 13848 - Pages: 56

Premium Essay

Big Data (Mongodb, Hbase and Casandra)

...Big Data [Name of Writer] [Name of Institution] Introduction The term Big Data is gaining more followers and popularity. However, despite this trend, not all organizations are clear about how to face the challenge to store, organize, display and analyze large volumes of data. The term Big Data is gaining more followers and popularity. However, despite this trend so evident, not all organizations are clear about how to face the challenge to store, organize, display and analyze large volumes of data. There are multiple techniques in terms of huge database storing approaches that can store petabytes, exabytes and may be zetabytes data. These options are Cassendara, Mongodb and HBase. We will discuss about them one by one and in a proper research method and will compare them in order to contrast their difference and efficiency. Research Background One problem in understanding the phenomenon is that the size of these data sets the volume greatly exceeds the Data warehouse. A plane collects 10 terabytes of information from sensors every 30 minutes flight, while the Stock Exchange of New York collects structured information 1 TB per day. In the context of Big Data, volumes are reaching peta bytes, exa bytes and then soon to zeta bytes. For instance, Apple has just announced that 7 trillion send daily notifications to iOS devices. The explosion of information in social networks, blogs, and emails is characterized the presence of data key...

Words: 3463 - Pages: 14