The Student Registration System is to be integrated with an existing student billing system (which also bills for meal plans, dorm rooms, etc.). The databases for the two systems reside on different servers, so the integrated system is distributed. Using your imagination,
a. Give examples of two global integrity constraints that might exist for the global
database of this system.
b. Give examples of two transactions that access both databases.
a. IC1: The amount the student is billed for corresponds to the courses she is registered for.
IC2: A student is allowed in the dorm only if she is registered for at least 1 course.
b. The dorm registration transaction (to check constraint); the billing transaction.
You might also like to view...
Discuss the advantage gained by an effective, organization-wide training program.
What will be an ideal response?
Characters such as spaces and tabs that display on your screen, but do not appear in the printed document are called ________
Fill in the blank(s) with correct word
You cannot select multiple values on a slicer.
Answer the following statement true (T) or false (F)
When a user disables System Protection (found in__), you can run anti-malware software in the System Volume Information folder However, if System Protection is disable, all the system restore points will be lost. With System Protection enabled, restore points can be automatically or manually created.
What will be an ideal response?