answersLogoWhite

0

Database Design

Database design is the process of creating a detailed data model of a database. It is the next step after requirement gathering and before coding begins. A good database design can save a lot of time during the database development.

1,295 Questions

Comparative chart for 1G 2G 3G and 4G GSM technology?

Dates

Cool New Features

1G

70's to 80's

Wireless phones (cellular) are introduced, primarily for voice only.

2G

90's to 2000

Increased performance achieved by allowing multiple users on a single channel. More and more cellular phones are used for data as well as voice.

2.5G

2001-2004

The Internet turns the focus towards data transmission. Enhanced multimedia and streaming video are now possible. Phones support limited web browsing.

3G

2004-2005

Enhanced multimedia and streaming video capabilities are increased. Standards are created to allow universal access and portability across different device types (Telephones, PDA's, etc.)

4G

2006+

Speeds reach up to 40 Mbps. Enhanced multimedia, streaming video, access and portability are increased still further. Devices are equipped for world-wide roaming.

Technology

1G

Analog

CMRT

AMPS

2G

Digital Circuit Switched

D-AMPS

GSM

CDMA

2.5G

Digital Packet Switched

GPRS

EDGE

3G

Digital Packet Switched

UMTS

W-CDMA

CDMA2000

4G

Digital Broadband

802.11

Data Rate

1G

9.6 Kbps to 14.4 Kbps

2G

D-AMPS

9.6 Kbps to 14.4 Kbps

GSM

9.6 Kbps to 14.4 Kbps

IS95A

9.6 Kbps to 14.4 Kbps

IS95B

115 Kbps

2.5G

56 Kbps to 144 Kbps

3G

UMTS

2+ Mbps, up to 384 Kbps

WCDMA

384 Kbps (wide area access), 2 Mbps (local area access)

CDMA2000

614 Kbps

4G

20-40 Mbps

Frequency

Carrier

1G

800 MHz

30 kHz

2G

D-AMPS

800 MHz or 1.9 GHz

30 kHz

GSM

800 MHz or 1.9 GHz

200 kHz

IS95A/B

800 MHz or 1.9 GHz

1.25 MHz

2.5G

800 MHz or 1.9 GHz

200 kHz

3G

UMTS

2 GHz

5 MHz

WCDMA

2 GHz

5 MHz

CDMA2000

2 GHz

1.25 MHz / 3.75 MHz

4G

In Development

In Development

Primary Countries

1G

Worldwide

2G

D-AMPS

USA

GSM

Europe

IS95A/B

USA

2.5G

Europe, Asia, USA

3G

Europe, Japan, USA

4G

In Development

What is the definition for categorical data?

a type of data that does not use numbers but uses nouns.

Example of weak entity set?

an entity set may not have sufficient attribute 2 form a primary key is called weak entity set.ex entity set payment has 3 attribute pay-no,pay-date, pay-amount.pay-no is a sequential no generated 4 each loan.each payment entity is distinct,payments 4 different loans may share the same payment no.thus entity set doent have a primary key,so it is a weak entity set.

Placid04

bakhra,muzaffarpur,bihar.

Advantages of simplified representation in ProE?

With a simplified rep, less of the model data is loaded into memory. Computer performance is improved.

Idea about mini projects on DBMS?

Hi, Iam Mousumi, Iam a Bsc(Csc honours) Student.I want to do a dbms project encorporating the ideas of data mining within three months could you help me in choosing the project

What is centralized database design?

Centralized design is one of the two major methods of designing a networked database, the other being distributed design. In a centralized design, all the database table schema and the data reside in one place where all of the users access it (i.e., central to the users.) Conversely, a distributed design replicates the schema in multiple places and segments the data amongst the multiple sets of tables. Each group of users accesses a particular distributed set of tables with the data relevant to their group. This improves data security and retrieval time for the users at the cost of increased complexity of database maintenance and backup.

What kind of database exist?

The two major commercial classes of database are; relational and non-relational.

Example of non-relational databases include Informix c-isam and dbisam.

The main relational databases are; MS SQL Server, Sybase, Oracle, Progress, mySQL.

What are the characteristics of DBMS?

Database management system is full form of DBMS . Characteristics of a DBMS are following :

1) It maintains data integrity.

2) It reduces redundancy.

3) make access to data easy.

What are the similarities between oracle dbms and access dbms?

Oracle and Access are both RDBMS's (Relational Database Management Systems). Consequently they both use tables which have 'keys' to retrieve rows, and use 'foreign keys' to other tables to 'relate' those rows together. Oracle and Access also both use SQL (Structured Query Language) to allow you to use the database (for example: "select * from customer_table where customer_number = '12345'"), although you can use tools which provide a more graphical environment to produce the underlying SQL. The real difference between the two is that Oracle is an industrial strength RDBMS.

What is structural database design?

The logic structure is independent of any kind of data model,in the practical application, the general database used by theenvironment has given (such as SQL Server or Oracel or MySQL. Due to the current use of the database basically is relational database, so the first thing to the E-R diagram into relation model, and then according to the characteristics andlimitations of specific DBMS conversion for the specificsupport of DBMS data model, the final optimization

What are some Examples of time sharing operating system?

A special case of multiprogramming in which users access the computer through terminals, typically the devices with keyboards and screens. Dozens of users share the computer at once. The computer actually does not run them all simultaneously but it runs a small portion of ones user's job then moves the service to the next user providing service to each user several times and then it appears that is is actually doing all its actions at one time but it's not. After all the requests are done they all get responses about the same time.

Value set in DBMS?

Each simple attribute of an entity type is associated with a value set (or domain of values), which specifies the set of values that may be assigned to that attribute for each individual entity. If the range of ages allowed for employees is between 16 and 70, we can specify the value set of the Age attribute of EMPLOYEE to be the set of integer numbers between 16 and 70. Similarly, we can specify the value set for the Name attribute to be the set of strings of alphabetic characters separated by blank characters, and so on. Value sets are not displayed in ER diagrams, and are typically specified using the basic data types available in most programming languages, such as integer, string, Boolean, float, enumerated type, sub-range, and so on.

What design conflicts might arise in architecture where availability and security requirements are the most important functional requirements?

Fundamentally, to provide availability, you need to have (a) replicated components in the architecture so that in the event of one component failing, you can switch immediately to a backup component.

You also need to have several copies of the data that is being processed. Security requires minimizing the number of copies of the data and, wherever possible, adopting an architecture where each component only knows as much as it needs to, to do its job. This reduces the chance of intruders accessing the data.

Therefore, there is a fundamental architectural conflict between availability (replication, several copies) and security (specialization, minimal copies). The system architect has to find the best compromise between these fundamentally opposing requirements.

What is the full form of IPC in IPC standards in electronics?

The IPC was originally known as the Institute for Printed Circuits, however later became to be known as the Association Connecting Electronics Industries. The IPC is a global trade association dedicated to furthering the competitive excellence and financial success of its members, who are participants in the electronics industry. The IPC has developed a standardized set of industry developed and recognized documents for use in the electronic manufacturing process.

WHY Is a social security number qualitative?

It identifies you. It gives some information about the person. It is not a count or a total or an average, or any numeric kind of information. While it does have the word number in it, it is not counting anything. You never add social security numbers together, or get the average social security number or do any other such numerical calculation with them. You do that with quantitative data.

What are the importance of computerization?

The importance of computerization is that it improves efficiency. Information can be shared centrally in a database. Tasks are processed at a very high rate.

What is Instance Recovery?

Brand computers usually has a concealed sector where installed the original operation system. Your so-called Instant Recovery is to pretty much erase everything you have in your computer(virus included) and it loads with the the operation system just like when you first bought it.

What will be the future and Will there be any Career GROWTH ahead after working as a SAP BO..What will be SALARY. I am Fresher?

Working as a SAP BO - what? Consultant? Developer? Certainly there is a future for SAP BO, else SAP would never have purchased the technology in the first place. Therefore anyone supporting SAP BO in the marketplace will have a future. Salary? Expect an enttry level salary in the high 50K in U.S. dollars depending on geographic market. With experience, expect between $80K and $110K. Salaries assume your academic perfromance is above average and includes demonstrated STEM rigor.

Unable to install java and the installed java has corrupted and unable to uninstall.Message says files missing.The java icon appears on the addremoval panel but no remove options are displayed?

I had the same problem and managed to resolve it. You may try this too.

"Completely" cleaned up all the existing java installs: Brought up windows in safe mode, and deleted C:\Program files\Java\jre1.6 folder. Restarted in normal mode. Used "Windows Install Cleanup" and removed the Java Runtime installation. This removed the listing under Add/Remove software but the icon in control panel stayed. Then used CCleaner to clear out all the unwanted file and also to cleanout unwanted registry entries. There were plenty of entries that had to be cleaned. However, I still had to manually remove \\HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft (You may rename if you want to be cautious).

After this I restarted the machine (this is important) and reinstalled JRE6U16 from the offline installation package that I had downloaded earlier.

The installation went without a hitch and now everything is fine. The Java control panel is also behaved as expected.

Hope this helps.

How do you delete MountPointManagerRemoteDatabase?

Babies From The MoonIn Windows, in My Computer, right-click on the System Volume Information folder and pick Properties from the context menu. Uncheck Read Only and pick Apply. At the command prompt, change to the folder, change the attributes of that directory: attrib System Volume Information -s -h. Change to the directory: CD "System Volume Information" then change the attributes of the file: attrib MountPointManagerRemoteDatabase -s -h, then del MountPointManagerRemoteDatabase.

How do you make a batch file say happy birthday?

type this(with any enter or space in it):

@echo off
echo happy birthday
pause
end


you can edit the happy birthday as you like it but keep the "echo"
what happens if you run this: a CMD window will open and says:


happy birthday
press any key to continue...


if you press a key the file closes
if you typed this in notepad, save it as a .bat file (suppose you knew this)
to make it more attractive you could change the colors of the screen and the letters like this:


color 02
@echo off
echo happy birthday
pause
end


the first number (or letter) behind color is the background color, the second is the color of the letters this gives you a black background and green letters. to check all color type "color help" in CMD. it will give you the letters and numbers for the different colors

What is Three tier architecture dbms?

In 3 tier architecture, client directly interacts with intermediate server and intermediate server will directly interact with database server.