Use XML to represent the contents of the Student relation in Figure 3.2. Specify a DTD appropriate for this document. Do not use the representation proposed by the SQL/XML speci?cation discussed in Section 15.4.4.

What will be an ideal response?


Two representations are reasonable. One uses elements only:





s111111111John Doe
123 Main St.
Freshman

.... and similarly for other students ...



and the other uses attributes:



Address="123 Main St." Status="Freshman"/>
...........



The DTD for the ?rst representation is:







]>


For the second representation, the DTD can be:



Id ID #REQUIRED
Name CDATA #REQUIRED
Address CDATA #IMPLIED
Status CDATA #IMPLIED>
]>

Computer Science & Information Technology

You might also like to view...

In ActionScript 3.0, the ____ programming concept is described as a group of named, reusable statements that form a command.

A. event B. function C. methods D. objects

Computer Science & Information Technology

When you want more information about a specific color in your document, use the ____ to show the color values beneath the mouse pointer.

a. Info panel b. Color panel c. Mouse panel d. Value panel

Computer Science & Information Technology

Which type of operation writes the file system structure to the disk?

A. partitioning B. formatting C. mounting D. activating

Computer Science & Information Technology

Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSL- inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication.Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?

A. Use of OATH between the user and the service and attestation from the company domain B. Use of active directory federation between the company and the cloud-based service C. Use of smartcards that store x.509 keys, signed by a global CA D. Use of a third-party, SAML-based authentication service for attestation

Computer Science & Information Technology