#Cobol Assignment Solution
Explore tagged Tumblr posts
kanchanawijerathne-blog · 6 years ago
Text
Tech For Today Series - Day 1
This is first article of my Tech series. Its collection of basic stuffs of programming paradigms, Software runtime architecture ,Development tools ,Frameworks, Libraries, plugins  and JAVA.
Programming paradigms
Do you know about program ancestors? Its better to have brief idea about it. In 1st generation computers used hard wired programming. In 2nd generation they used Machine language. In 3rd generation they started to use high level languages and in 4th generation they used advancement of high level language. In time been they introduced different way of writing codes(High level language).Programming paradigms are a way to classify programming language based on their features (WIKIPEDIA). There are lots of paradigms and most well-known examples are functional programming and object oriented programming.
Main target of a computer program is to solve problem with right concept. To solve problem it required different concept for different part of the problems. Because of that its important that programming languages support many paradigms. Some computer languages support multiple programming paradigms. As example c++ support both functional programming and oop.
On this article we discuss mainly about Structured programming, Non Structured Programming and event driven programming.
Non Structured Programming
Non-structured programming is the earliest programming paradigm. Line by line theirs no additional structure. Entire program is just list of code. There’s no any control structure. After sometimes they use GOTO Statement. Non Structured programming languages use only basic data types such as numbers, strings and arrays . Early versions of BASIC, Fortran, COBOL, and MUMPS are example for languages that using non structures programming language When number of lines in the code increases its hard to debug and modify, difficult to understand and error prone.
Structured programming
When the programs grows to large scale applications number of code lines are increase. Then if non structured program concept are use it will lead to above mentioned problems. To solve it Structured program paradigm is introduced. In first place they introduced Control Structures.
Control Structures.
Sequential -Code execute one by one
Selection - Use for branching the code (use if /if else /switch statements)
Iteration - Use for repetitively executing a block of code multiple times
But they realize that control structure is good to manage logic. But when it comes to programs which have more logic it will difficult to manage the program. So they introduce block structure (functional) programming and object oriented programming. There are two types of structured programming we talk in this article. Functional (Block Structured ) programming , Object oriented programming.
Functional programming
This paradigm concern about execution of mathematical functions. It take argument and return single solution. Functional programming paradigm origins from lambda calculus. " Lambda calculus is framework developed by Alonzo Church to study computations with functions. It can be called as the smallest programming language of the world. It gives the definition of what is computable. Anything that can be computed by lambda calculus is computable. It is equivalent to Turing machine in its ability to compute. It provides a theoretical framework for describing functions and their evaluation. It forms the basis of almost all current functional programming languages. Programming Languages that support functional programming: Haskell, JavaScript, Scala, Erlang, Lisp, ML, Clojure, OCaml, Common Lisp, Racket. " (geeksforgeeks). To check how lambda expression in function programming is work can refer with this link "Lambda expression in functional programming ".
Functional code is idempotent, the output value of a function depends only on the arguments that are passed to the function, so calling a function f twice with the same value for an argument x produces the same result f(x) each time .The global state of the system does not affect the result of a function. Execution of a function does not affect the global state of the system. It is referential transparent.(No side effects)
Referential transparent - In functional programs throughout the program once define the variables do not change their value. It don't have assignment statements. If we need to store variable we create new one. Because of any variable can be replaced with its actual value at any point of execution there is no any side effects. State of any variable is constant at any instant. Ex:
x = x + 1 // this changes the value assigned to the variable x.
          // so the expression is not referentially transparent.
Functional programming use a declarative approach.
Procedural programming paradigm
Procedural programming is based on procedural call. Also known as procedures, routines, sub-routines, functions, methods. As procedural programming language follows a method of solving problems from the top of the code to the bottom of the code, if a change is required to the program, the developer has to change every line of code that links to the main or the original code. Procedural paradigm provide modularity and code reuse. Use imperative approach and have side effects.
Tumblr media
Event driven programming paradigm
It responds to specific kinds of input from users. (User events (Click, drag/drop, key-press,), Schedulers/timers, Sensors, messages, hardware interrupts.) When an event occur asynchronously they placed it to event queue as they arise. Then it remove from programming queue and handle it by main processing loop. Because of that program may produce output or modify the value of a state variable. Not like other paradigms it provide interface to create the program. User must create defined class. JavaScript, Action Script, Visual Basic and Elm are the example for event-driven programming.
Object oriented Programming
Object Oriented Programming is a method of implementation in which programs are organized as a collection of objects which cooperate to solve a problem. In here program is divide in to small sub systems and they are independent unit which contain their own data and functions. Those units can reuse and solve many different programs.
Key features of object oriented concept
Object             - Objects are instances of classes, which we can use to store data and perform actions.
Class                - A class is a blue print of an object.
Abstraction     - Abstraction is the process of removing characteristics from ‘something’ in order to reduce it to a set of essential characteristics that is needed for the particular system.
Encapsulation - Process of grouping related attributes and methods together, giving a name to the unit and providing an interface for outsiders to communicate with the unit
Information Hiding - Hide certain information or implementation decision that are internal to the encapsulation structure
Inheritance     - Describes the parent child relationship between two classes.
Polymorphism - Ability of doing something in different ways. In other words it means, one method with multiple implementation, for a certain class of action
Tumblr media
Software Runtime Architecture
Languages can be categorized according to the way they are processed and executed.
Compiled Languages
Scripting Languages
Markup Languages
The communication between the application and the OS needs additional components. Depends on the type of the language used to develop the application component. Depends on the type of the language used to develop the application component.
Tumblr media
This is how JS code is executed.JavaScript statements that appear between <script> and </script> tags are executed in order of appearance. When more than one script appears in a file, the scripts are executed in the order in which they appear. If a script calls document. Write ( ), any text passed to that method is inserted into the document immediately after the closing </script> tag and is parsed by the HTML parser when the script finishes running. The same rules apply to scripts included from separate files with the src attribute.
To run the system in different levels there are some other tools use in the industry.
Virtual Machine
Containers/Dockers
Tumblr media
Virtual Machine
Virtual machine is a hardware or software which enables one computer to behave like another computer system.
Development Tools
"Software development tool is a computer program that software developers use to create, debug, maintain, or otherwise support other programs and applications." (Wikipedia) CASE tools are used throughout the software life cycle.
Tumblr media
Feasibility Study        - First phase of SDLC. In this phase gain basic understand of the problem and discuss according to solution strategies (Technical feasibility, Economical feasibility, Operational feasibility, Schedule feasibility). And prepare document and submit for management approval
Requirement Analysis - Goal is to find out exactly what the customer needs. First gather requirement through meetings, interviews and discussions. Then documented in Software Requirement Specification (SRC).Use surveying tools, analyzing tools
Design                         - Make decisions of software, hardware and system architecture. Record this information on Design specification document (DSD). Use modelling tools
Development             - A set of developers code the software as per the established design specification, using a chosen programming language .Use Code editors, frameworks, libraries, plugins, compilers
Testing                        - Ensures that the software requirements are in place and that the software works as expected. If there is any defect find out developers resolve it and create a new version of the software which then repeats the testing phase. Use test automation tools, quality assurance tools.
Development and Maintenance - Once software is error free give it to customer to use. If there is any error resolve them immediately. To development use VMs, containers/ Dockers, servers and for maintenance use bug trackers, analytical tools.
CASE software types
Individual tools
Workbenches
Environments
Frameworks Vs Libraries Vs Plugins
Tumblr media
Do you know how the output of an HTML document is rendered?
This is how it happen. When browser receive raw bytes of data it convert into characters. These characters now further parsed in to tokens. The parser understands each string in angle brackets e.g "<html>", "<p>", and understands the set of rules that apply to each of them. After the tokenization is done, the tokens are then converted into nodes. Upon creating these nodes, the nodes are then linked in a tree data structure known as the DOM. The relationship between every node is established in this DOM object. When document contain with css files(css raw data) it also convert to characters, then tokenized , nodes are also formed, and finally, a tree structure is also formed . This tree structure is called CSSOM Now browser contain with DOM and CSSOM independent tree structures. Combination of those 2 we called render tree. Now browser has to calculate the exact size and position of each object on the page with the browser viewpoint (layout ). Then browser print individual node to the  screen by using DOM, CSSOM , and exact layout.
JAVA
Java is general purpose programming language. It is class based object oriented and concurrent language. It let application developers to “Write Once Run anywhere “. That means java code can run on all platforms without need of recompilation. Java applications are compiled to bytecode which can run on any JVM.
Tumblr media
Do you know should have to edit PATH after installing JDK?
JDK has java compiler which can compile program to give outputs. SYSTEM32 is the place where executables are kept. So it can call any wear. But here you cannot copy your JDK binary to SYSTEM32 , so every time you need to compile a program , you need to put the whole path of JDK or go to the JDK binary to compile , so to cut this clutter , PATH s are made ready , if you set some path in environment variables , then Windows will make sure that any name of executable from that PATH’s folder can be executed from anywhere any time, so the path is used to make ready the JDK all the time , whether you cmd is in C: drive , D: drive or anywhere . Windows will treat it like it is in SYSTEM32 itself.
1 note · View note
programmingsolver · 3 years ago
Text
CSCI Assignment 1 | Human Resources Management System in FORTRAN and COBOL Solution
CSCI Assignment 1 | Human Resources Management System in FORTRAN and COBOL Solution
Introduction In this assignment, you have to implement a system for processing employee attendance records. You are required to implement it once using FORTRAN and once using COBOL. Assignment Details 2.1 Company Attendance Record Processing Jimmy is designing a simple Human Resources Management System (the \System” hereafter) for the PPL corporation. He is asking you to implement the…
Tumblr media
View On WordPress
0 notes
evaluationessay · 4 years ago
Text
We Cover All Kinds Of Programming Assignments!
Title - We Cover All Kinds Of Programming Assignments!
Our team has a solution for every problem related to Programming assignments. At AllHomeworkAssignments.com , we serve intending to meet all your academic needs and provide you with extensive computer Programming Assignment Help. Whether it’s Java, C++, MATLAB, or COBOL, you name it; we have it!
C / C++
Having trouble finishing your C/C++ Programming Assignment? Looking for assignment writing help in programming? Don’t worry; give it to us. https://www.allhomeworkassignments.com/ have an experienced team of programming experts who have exceptional skills and knowledge in designing impeccable C/C++ programming assignments as per your requirements. If You need Coding assignment help, you are at right place.
Python Programming Help
“Can someone Do My Python Programming Assignment?” Yes, we can. Our Python programming solution services are handled by the skilled programmers who are well-acquainted with this form of programming. Receive supreme quality coding assignment help on various aspects of Python programming and free yourself from the pressure.
ASP.Net Programming Help
Obtain best in class ASP.Net Programming Help from our experts who are familiar with the use of this dynamic programming language. We can help you solve your ASP.Net programming assignment within the deadline with proper use of codes and framework. So, What are you waiting for? Go with Our Programming Assignment Help.
Java Programming Help
Getting confused while learning all the relevant concepts for your Java assignment? Need someone to help with your programming assignment and help you understand tricky codes? BestAssignmentSupport.com  is your safest bet. We can help you finish your programming assignment on Java with professional help. Whether it’s for a client server or based on a GUI, our team can save the day with their valuable services.
Assembly Language Programming Help
Our team of professionals has expertise in solving complicated Assembly language programming tasks and generating efficient coding assignment help services within a limited timeframe. Get premium quality assistance with our Assembly Programming Help Services and put all your assignment related stress behind.
Database
We have a unique approach in writing database assignment to ensure optimum output. https://www.bestassignmentsupport.com/  experts are quite efficient in solving all sorts of programming topics of this course, whether it’s on SQL, MySQL, ORACLE or any other convoluted topic.With our Programming Language Assignment Help, you can solve all coding issues in a jiffy.
Our programming assignment experts can provide top-notch coding help in every aspect of programming. They cover all the areas in which carry any sort of significance to your programming assignment.
Website Design & Development
Website designing allows a programmer to gather data and arrange them aesthetically for a specific purpose. If you have any queries regarding this field, connect with the online programming help experts at https://www.bestassignmentsupport.com/ Our experts can help you get a solution to any computer language problem.
0 notes
xalex123 · 4 years ago
Photo
Tumblr media
My assignment expert has a team of experts that has a solution for every problem related to Programming assignments. At My assignment experts, we serve to intend to meet all your academic needs and provide you with extensive computer programming assignment help. Whether it’s Java, C++, MATLAB, or COBOL, you name it; we have it covered. Our programming assignment experts can provide top-notch coding help in every aspect of programming. They cover all the areas in which carry any sort of significance to your programming assignment.
0 notes
mlbors · 8 years ago
Text
An overview of some Paradigms
In this article, we are going to have an overview of some programming paradigms to get a little more familiar with them.
Introduction
Here we are not going to look at each programming paradigm that exists, because it would be too complex. We are going to have an overview of some popular and common paradigms. Our aim is to define them with simple terms and try to understand them better.
What is a paradigm?
A paradigm is like a set of concepts or thought patterns that includes theories, research methods or postulates. It is a system of assumptions that serves as a model. It is a way to see the reality.
What is the relationship with programming?
In programming, paradigms are a way to classify programming languages based on their features. Each programming language follows one or more paradigms. Most of the major language paradigms were invented between the late 1960s and the late 1970s.
Some paradigms are concerned with implications for the execution model of the language, which specifies "how work takes place". So, they are concerned with such things as allowing side effects, in other words, when a function modifies the state of something else outside its own scope, or whether the sequence of operations is defined by the execution model. Other paradigms are concerned with the way that code is organized or with the style of syntax and grammar.
Imperative
Also known as Procedural Programming, Imperative Programming uses statements that change the state of a program. In a way, it is like following a recipe. The Imperative Programming is concerned with defining a linear procedure or sequence of programming statements. It consists of commands for the computer to perform. It could be summarized with the sentence "first do this, next do that".
The Imperative Programming approach is to treat any solution like a series of steps to be performed. So, it uses procedures, functions, subroutines or methods to split the program in small tasks and that makes possible to reuse the code as many times as we want in the program.
The first Imperative Languages were the machine languages and the hardware implementation of nearly all computers is Imperative because it is designed to execute machine code.
Representative programming languages that use this paradigm would be FORTRAN, COBOL or BASIC.
Declarative
In a few words, Declarative Programming describes what it does, but not how it does it. So, we program by specifying the result we want, but not how to get it. It means that the control flow is implicit. It means no loops and no assignments.
Representative languages would be HTML, CSS or SQL.
Structured
The Structured Programming paradigm removes global variables, GOTO and introduces local variables. It means that we create blocks that contain instructions that don't depend on any other. Here, the control flow is defined by nested loops, conditionals and subroutines. It also has in main traits things like structograms and indentation.
Representative programming languages that use this paradigm would be C or Pascal.
Functional
Functional Programming treats computations as the evaluation of mathematical functions and avoids changing-state and mutable data. So, it sees all subprograms as functions that have arguments and return a single solution based on the input. It means that every time a function is called with the argument x it will produce the same result f(x).
This paradigm allows to pass functions to functions and to return functions from functions. Here, the control flow is expressed by combining function calls, rather than by assigning values to variables.
Representative programming languages would be Haskell, Erlang, Scala, Scheme or Lisp.
Logic
The Logic Programming paradigm expresses a set of sentences in a logical form. It means that logical assertions about a specific situation are made, then it is checked if it still true or not. It can be viewed as controlled deduction. We focus on facts stored in memory, called the knowledge base.
It is a form a Declarative Programming and the process flow is reversed because it asserts result first.
One representative language would be Prolog.
Object-Oriented
In Object-Oriented Programming, or OOP, data is represented as objects. These objects are instances of classes that have attributes, representing data fields, and functions called methods. Objects are separate entities and have their own state which is modified built in methods. In Object-Oriented Programming, programs are based on the sending of messages to objects, that respond by performing operations. This concept also provides data encapsulation and information hiding to protect internal properties of an object.
One representative language would be Smalltalk. However, many programming languages are multi-paradigm and support some elements of OOP and combine them with an Imperative style, like Java, C++, PHP or Python.
Event-Driven
Here the control flow is determined by events, such as user actions. It means there are event emitters and listeners. It is dominant in graphical user interfaces. Nevertheless, a lot of software relies on user events for functionality, so we could argue that Event-Driven Programming is present for nearly all kinds of projects.
Representative languages would be JavaScript, ActionScript or Visual Basic.
Parallel Programming
When we talk about Parallel Programming, we mean that we use parallel hardware to execute computation more quickly. It is mainly concerned with speeding-up computation time. So, multiple actions are executed at the same time.
Parallel Programming could be achieved with C++ and OpenMP, for example.
Concurrent Programming
In Concurrent Programming several computations are executed concurrently. So, it means that only one statement is executed at any point in time, but we have no guarantee which task will be executed in the next step. One task doesn't have to wait that another one ends before starting.
Concurrent Programming could be achieved with Scala, Go, or Elixir.
Multi paradigms
Many programming languages combine multiple paradigms to get the advantages of each. This gives us more freedom and flexibility, but it could also increase the complexity of the programs themselves.
C++ and Java fit into that category.
Conclusion
Through this article, we saw what a paradigm is and how it is related to programming. We also had a brief overview of some major programming paradigms by looking at their main concept and how they apply it. We also saw that some programming languages are multi paradigms to give more freedom and to write programs that suit the nature of a specific problem. Many more paradigms exist and some depend on some major paradigms we saw.
One last word
If you like this article, you can consider supporting and helping me on Patreon! It would be awesome! Otherwise, you can find my other posts on Medium and Tumblr. You will also know more about myself on my personal website. Until next time, happy headache!
0 notes
douchebagbrainwaves · 4 years ago
Text
WHY I'M SMARTER THAN IMPRESSION
And if you want to say and ad lib the individual sentences. If you're a founder, here's a deal you can make with yourself that will both make you happy and make your company successful. If it seems like a daunting task to do philosophy, here's an encouraging thought. And starting with a crude version 1 then iterate, your solution can benefit from evolution. On the whole they've done better than the iPhone? For example, suppose you have to risk destroying your country to get a job with a big company.1 People talk so much about abstractions now that we don't realize what a leap it must have been made by every smart person who studied a little philosophy and declined to pursue it further, but for individual humans.
But for nearly everyone else, spoken language is better.2 They must hear developers complaining. I'm still not entirely sure they're correct.3 Since that seems to be vanishingly rare in the arts could tell you that the right way to write software, whether for a startup: more people are doing it. If software publishing didn't work in 1980, it works even less now that software development has evolved from a small number of big releases to a constant stream of small ones. I don't mean to give the impression that working as a sort of Valley within the Valley, terrible things happen to startups all the time and then it can take 4-8 weeks to get that bug fix approved, leaving users to think that iPhone apps sometimes just don't work. You see that variation even within the US, but startup funding doesn't only come from VC firms.
But because he's sitting astride it, he seems to be making an effort. That varies enormously, from $10,000, whichever is greater. That's why the successful ones make great things. There is a lot of people out there who have never even made an angel investment: how much money you're putting in, and the disk is surprisingly loud, but it's woven into the story instead of being pasted onto it like a label. And in any case, many technical ideas do have political implications. The best way to find startups. Even now the image of a very important meta-trend, one that Y Combinator itself has been based on from the beginning: founders are becoming increasingly powerful relative to investors. The third reason you need them is to make it easy to believe it was the cause. Or they could return to their roots and make going to the theater a treat. I hadn't read the books we were assigned carefully enough.
Really hot companies sometimes have high standards for angels. To make money the way software companies do, publishers would have to win by virtue of some appeal it had to programmers specifically. Cobol, Ada, and Java, were created for other people to use. But that turns out to be easier than I expected, and also knows all the investors. A lot of the money.4 And if that is the future, investors will increasingly be unable to offer investment subject to contingencies like other people investing.5 Investors have a deep-seated bias against hardware. But it should help.
Notes
Peter, Why Are We Getting a Divorce? But in this algorithm are calculated using a freeware OS? It will seem more interesting than random marks would be reluctant to start a startup: one kind that's called into being to commercialize a scientific discovery.
They would probably be worth starting one that had been with their company for more of the lawyers they need to circle back with a company tried to combine the hardware with an investor I saw that I didn't care about GPAs.
They live in a traditional series A termsheet with a faulty knowledge of human anatomy.
The reason this subject is so new that it's bad. The most important subject. Why Startups Condense in America. I'd appreciate hearing from you.
Anyone can broadcast a high product of some brilliant initial idea. 9999, but he refused because a it's too late to launch. They'll tell you that if he were a couple of hackers with no valuation cap.
0 notes
programmingsolver · 5 years ago
Text
Assignment 1 | Human Resources Management System in FORTRAN and COBOL Solution
Assignment 1 | Human Resources Management System in FORTRAN and COBOL Solution
Introduction
In this assignment, you have to implement a system for processing employee attendance records.
You are required to implement it once using FORTRAN and once using COBOL.
Assignment Details
2.1 Company Attendance Record Processing
Jimmy is designing a simple Human Resources Management System (the \System” hereafter) for the PPL corporation. He is asking you to implement the…
View On WordPress
0 notes
myprogrammingsolver · 5 years ago
Text
Assignment 1 | Human Resources Management System in FORTRAN and COBOL Solution
Assignment 1 | Human Resources Management System in FORTRAN and COBOL Solution
Introduction
In this assignment, you have to implement a system for processing employee attendance records.
You are required to implement it once using FORTRAN and once using COBOL.
Assignment Details
2.1 Company Attendance Record Processing
Jimmy is designing a simple Human Resources Management System (the \System” hereafter) for the PPL corporation. He is asking you to implement the…
View On WordPress
0 notes
limapb13 · 6 years ago
Text
Business Application Modernization - Opening Hidden worth
INTRO 
   Corporations have more than the years, released a varied mix of software application and hardware applications to acquire competitive benefit. Fast developments in IT, integrated with developing company requirements, have actually led to contrasting IT environments throughout business. 
   This white paper will assist companies comprehend the problems associated with efficient management of existing tradition systems. 
   At one end of the spectrum are open architecture applications that take advantage of on the capacity of the of Internet, while the other end consists of conventional, close-ended, tradition software application. business information still lives on tradition Some marketing research price quotes show that more than 70% of systems. The effective management and re-deployment of tradition systems to satisfy tomorrow’s company requirements is the significant obstacle today. 
   TRADITION APPLICATIONS 
   MEANING 
   A tradition system generally includes big applications that access large information saved in tradition database management systems working on mainframes or mid-range platforms. 
 These systems made financial sense when they were established. The performance of these systems was self-evident at the time of setup. As innovation and company requirements progressed they have actually ended up being intricate and wasteful to keep. 
 As the business has actually invested a substantial quantity of time and cash in these systems, these financial investments can not just be crossed out. 
   ISSUES ASSOCIATED WITH LEGACY APPLICATIONS 
   The mix of brand-new systems and retrofitted older ones have actually ompounded the issue. The requirement to provide application performance through brand-new channels like mobile gadgets, with varying deal methods include to the issues of effective tradition modernization. 
   In their existing state, the majority of tradition applications have actually numerous difficulties associated with their working and upkeep. Tradition systems are constructed for internal, enterprise-wide use, while today’s service needs that they be exposed to brand-new, external entities. This can lead to crashes and breakdowns in unforeseeable parts of the system. 
   ADVANTAGES OF LEGACY APPLICATIONS 
   Tradition systems were established for, and still run, mission-critical applications 
 . A big number of users make use of the system. The underlying hardware and software application of such tradition systems is reliable and really trusted. 
   These elements add to the ongoing use of tradition systems. Efficient modernization of these tradition systems will make sure that these advantages can be enhanced at very little cost. 
   ALTERING BUSINESS REQUIREMENTS AND LEGACY APPLICATIONS 
   Economic and political conditions over the last couple of years have actually resulted in numerous emerging difficulties for innovation companies 
   . With globalization and deregulation, the requirement for versatile systems that can integrate with quick service shifts has actually ended up being vital 
 . Organizations are mapping expense controls to proper service expectations. 
   Such vibrant factors to consider have actually made it crucial for companies to examine the monetary practicality of their IT portfolio, so that they can utilize the benefits of new-age languages and enhance returns on financial investment on existing applications. 
 Magnate should think about following tactical problems when developing beyond tradition systems: 
   Overall Cost of Ownership - 
   Usually, the Total Cost of Ownership (TCO) of keeping a tradition system running can be extremely high as compared to the expense of running a more updated system. 
 The TCO of a system consists of elements like operations (hardware, system software application), production assistance, and application upkeep. The lines of code, quality of paperwork, and the method the application is structured straight affects expenses of the system. 
 Market experience recommends that upkeep expenses visit as much as an element of 3 after a tradition system is changed. This is undoubtedly possible if the more recent system is much better structured, much better recorded and has actually enhanced code. 
   Efficiency - 
   A tradition system generally owes its stability, scalability and dependability to the underlying mainframe platforms on which it is released. Any technique to improving the tradition system ought to acknowledge this and establish an option appropriately. 
 Updating tradition does not suggest moving far from the mainframe platform in its existing symptom, however enhancing the existing system for boosted efficiency. 
   Versatility - 
   The innovations utilized in a tradition application frequently do not incorporate well with more recent innovation application parts that have actually been consequently established. The primary versatility loss emerges from the truth that the applications are monolithic-- unlike the more current multi-tiered architectures where the discussion and company reasoning are separated. Multi-tiered architectures enable higher versatility and modifications can be effected rapidly. 
 Architectural rigidness is among the main factors that a number of companies choose to re-architect the tradition application, even while maintaining the underlying platform and language. 
 A changed application produces a multi-tiered, versatile system, permitting simple combination of more recent innovation. 
   Understanding Availability - 
   Developers skilled at COBOL, PL/1, Assembler and numerous other tradition languages are a disappearing people. These shows languages are no longer taught in computer technology courses at schools and training institutes-- for this reason, without significant re-training, it is hard to develop these abilities internal. 
 The exact same issue applies for database innovations utilized. In the past, hierarchical and network databases were really typically utilized, whereas current applications deal with relational databases. 
 Lastly, paperwork in regard of the application’s performances is usually insufficient, and just a couple of individuals have total understanding of what the application does. 
   Extinct Vendors - 
   That leaves their clients in a really precarious position due to the fact that the majority of typically the language utilized to establish the system is currently outdated and no longer supported. In addition, the system has actually normally been greatly tailored, and there is no correct documents kept. 
 Whenever such a system has actually to be taken over for upkeep, it needs a high knowing curve. This duration can differ from 2 months to 6 months depending upon the intricacy of the system. Just after getting acquainted with the system can a third-party have the ability to perform a reliable upkeep task. 
   Positioning with Business Goals - 
   Some CIOs definitely do question whether it is rewarding to invest in preserving and updating a tradition system. In truth, such expense can produce a healthy roi must not be thought about as simple running expenses. 
 There are 3 unique kinds of upkeep expenses: preventive (e.g. Y2K, Euro), adaptive and breakdown. Preventive and breakdown upkeep costs are required to keep the system running, so the expenses assigned to these can be stated to be running expenses. 
 Adaptive upkeep typically describes improvements or updating. This upkeep, though piecemeal, does enhance the performance, availability, and offers excellent organisation worth. A lot of improvement demands take a back seat as many spending plan allotments being taken in by preventive and breakdown upkeep. 
 Enhanced rois can be acquired just by carrying out a substantial upgrade, which too when business requires it one of the most. 
 Correct preparation and Return On Investment (ROI) analysis must be provided for tradition upgrade to understand whether worth accumulates from increased returns or lowered TCO (upkeep, facilities and functional expenses). 
   OPTION SOLUTIONS 
   Organizations moving far from tradition systems need to embrace a monetary feasible option that satisfies tactical organisation requirements. There are different choices readily available to the CIO when metamorphosing from tradition systems to more modern platforms. 
   Practical Extension - 
   Practical Extension works when the tradition application has sufficient service reasoning, however requires extra performance. 
 Practical Extension describes closing the practical spaces in the tradition application by reengineering the existing application or by incorporating it with other application. 
   Technical Extension - 
   In both the practical and technical extension, the procedures and organisation guidelines are maintained while crucial elements of the application are transformed and adjusted. 
   Technical extension works when existing tradition applications have high functional expenses and there is a strong requirement to share business abilities with partners/suppliers. Among the crucial chauffeurs for technical extension is a requirement to web allow the tradition application. 
 Technical extension covers activities like: 
 . Tradition Integration 
   Migration - 
   . 
   PICKING SUITABLE SOLUTION The choice of any of these 4 choices would be based upon a comprehensive analysis of the application portfolio around numerous application specifications, a few of that include:. 
 Practical viability. 
 Schedule of numerous functions. 
 Scalability. 
 Interoperability. 
 Maintainability. 
 Dependability. 
 Alleviate of usage 
 . Level of paperwork readily available 
 . Applicability of Enterprise Architecture policies and requirements. 
   Portfolio analysis around these criteria will assist evaluate the applications based upon practical spaces and technical spaces within the applications. As soon as the portfolio analysis has actually recognized the practical and technical spaces, each application can be put in among the 9 blocks, displayed in the list below analysis grid. This will assist in determining an ideal modernization technique for the application. 
 Portfolio analysis is the most important element of the general business application modernization workout and for this reason there need to be a tool-based technique that would eliminate, to a terrific degree, subjectivity presented by a pure manual technique. 
   TRADITION EXTENSION (FUNCTIONAL AND TECHNICAL). 
   Migration ends up being a crucial modernization alternative when the tradition application has appropriate service guidelines, however needs greater scalability and interoperability. 
 This alternative is likewise helpful, when it is tough to different reasoning from consistent information and discussion layers 
 . Choice of targeted shows language/platform/database 
 . Code migration 
 Database migration 
 . Implementation migration 
   Replacement- Changing the existing tradition application with a generic off-the-shelf item or rewording it under a brand-new shows environment is another choice. 
 Replacement would accumulate advantages comparable to re-engineering and is susceptible to comparable downsides. There is likewise the risk of neglecting essential company guidelines that make up the heart of the tradition application. 
   WHAT IS LEGACY EXTENSION? 
   APPROACHES OF LEGACY EXTENSION. 
   Getting the Process Flow -. 
 1. The tool creates a procedure circulation for a deal. 
 2. It highlights the cross-reference and connection in between programs, batch tasks, modules, and so on 
 3. The graph offers a much better understanding of the system at macro and micro levels. 
   BENEFITS OF USING A TOOL. 
   TOOL-BASED APPROACH TO EXTENSION. 
   Extending a tradition system uses companies a variety of unique benefits consisting of:. 
 1. As much as 40% decrease in upkeep expenses, with improved understanding of the performance of your applications. Enhanced expense of ownership of changed system and decreased total expenses (inclusive of brand-new resources, training and upkeep). 
 2. Leveraging existing organisation procedures and contemporary innovation. 
 Better access to the system through re-deployment and re-orientation of existing hardware and software application resources. Easy access to users over the Internet because no extra hardware or software application is needed to gain access to. 
 the application. Easy to use user interface that needs very little training/ re-training. 
 4. Shifts reliance of upkeep activities from couple of people to transparent procedures and tools. Reduce of upkeep from a Programming/ Maintenance group viewpoint. 
 5. Comprehensive paperwork of system with total understanding of procedures. 
 6. Relieve in implementation and improvement of performance. 
   PATNI APPROACH. 
   BENEFITS OF LEGACY EXTENSION. 
   Retired -. 
 Applications that do not provide any tactically substantial performance, however have a high expense of retention, are bad worth for cash. system that have actually been semiretired, or are utilized for historic information referral just, would be consisted of in this classification. 
   SCOPE CUSTOMIZATION. 
   Tradition systems usually consist of billions of lines of code in myriad standard languages. The extension procedure includes scanning code, drawing out service reasoning, getting rid of dead code and organizing modules into rational elements. 
   Patni thinks that the very best method to service a consumer’s requirement is to imbibe the procedures common at the customer’s website and mix them with Patni’ s advancement tools, procedures and approaches. 
 This method makes it possible for Patni to offer the “best-fit service procedures” that include worth to the customer’s IT operations. 
 Patni has a ‘Center of Excellence’ for Legacy Modernization. The focus of this group is to:. 
 1. Offer internal consulting and set criteria for a variety of Legacy innovations. 
 2. Determine ‘value-add’ tools, procedures and approaches, and facilitate their use at customer websites. 
 3. Offer “evidence of principle” and develop services in e-Business, Legacy modernization and Application Management. 
 4. Supply affordable option transfer services to Delivery Units, utilizing a cautious mix of onsite-and offshore-based extremely knowledgeable IT specialists. 
 The Legacy Modernization Center of Excellence has knowledge in performing jobs on a range of tradition platforms such as IBM mainframe and AS/400, Vax/VMS, HP 3000/MPE. 
   Patni thinks that any extension of tradition systems must be as “non-invasive” as possible. As explained previously, Re-facing, Re-engineering and Replacement are the 3 techniques of moving from tradition to more recent platforms. These variety from the “cosmetic” to the “extremely intrusive” approaches utilized by suppliers of particular tools and innovations. 
   Update/ Replaced -. 
 Application that do provide tactically substantial performance, however have a high expense of retention, need to be kept. They are prospects for expense decrease through innovation upgrades or through exploitation of other systems. If exploitation of Quadrant 4 (Export) systems makes it possible to change these systems, these applications will efficiently move into Quadrant 1 (Retire). 
   Tool-based extensions can show to be beneficial in:. 
 1. Extraction of company reasoning - A tool can draw out business reasoning associated to the performance, from all the programs and make the whole performance offered in the type of a company guideline repository. With the automation of practical analysis, the designer can invest more time in optimization and componentization of. 
 the code. 
 2. Extraction at system and practical levels - A tool can draw out company reasoning at a system level in addition to practical level. Releasing a tool guarantees that the total company understanding is drawn out from the system, while offering a precise photo of the application( s) performance. 
 Pictorial representation of system circulation - A tool can likewise offer a pictorial representation of the system circulation, and emphasize numerous modules in the program. Tools can likewise be utilized for information migration efforts, where it is possible to design information for the target system. 
   NON-INVASIVE. 
   Baselining the Inventory - 
 . 1. Tool records a module-wise stock. 
 Program A conjures up another program B, and program B does not figure in the program stock. Program B can then be imported into the tool stock. 
 3. The cycle goes on till the stock is total. 
 4. Redundant programs, i.e. the programs that are not referenced by any other programs are recognized and overlooked. 
   Normally, a tool-based method to tradition extension includes the following actions:. 
   TRADITION APPLICATION EXTENSION PROCESS. 
   Actions:. 
 1. Tradition Understanding: Documenting existing system. 
 2. System Decomposition: Application is burglarized information, discussion and processing reasoning. 
 3. Componentization: Create and draw out recyclable parts. 
 4. Extension: Convert tradition code into Web suitable languages. 
 Any tradition extension will need the right tools and the best technique. Patni has tactical alliances with a few of the leading “tradition modernization” and “Web-enabling” tool companies in the market. Abundant experience, customer-orientation, modern advancement tools, procedures and methods make it possible for Patni to supply the “best-fit service procedures” that include worth to the customer’s IT operations. 
   Make the most of Utilization -. 
 Applications thet do provide tactically substantial performance, and likewise have a low expense retention, appearto deal great “Valu for cash” and must be made use of as thoroughly as possible. Exploitation might lead to making other (Quadrant 2 upgrade/ change) and Quadrant 3 (Retain) systems redundant, hence successfully moving them to Quadrant 1 (Retire). High Low Strategic worth High. 
   Based upon our comprehensive consultancy experience, Patni scopes out a cost-benefit category. On the basis of their research study, our experts classify applications into among the 4 classifications:. 
   Keep -. 
 Applications that do not provide any tactically considerable performance, however have a similarly low expense of retention, are best kept on an “as is” basis. There’s very little to be acquired from retiring them, as they have a low expense of retention-- nor exists much to be gotten from any more financial investment of time or effort. If exploitation of Quadrant 4 (Exploit) system makes it possible to change these systems, these applications will successfully move into Quadrant 1 (retire). 
   CONCLUSION. 
   VALUE-ADDED MAINTENANCE. 
   The need for quick application advancement, along with considerable advances in software application advancement automation, has actually resulted in the production of tools that automate and help in the procedure of tradition extension. In tradition systems, a single program carries out numerous functions, or several programs might carry out a provided function. 
   Implementation -. 
 1. The re-architected application is exposed to internal users for checking its performance. 
 2. The software application created is executed on the target platform. 
   Preparation and Scheduling -. 
 1. Imported programs are examined for their intricacy. Various tools utilize various algorithms for figuring out the intricacy. 
 2. The intricacy analysis assists in effort estimate for extension of the programs and more preparation & scheduling of needed activities. 
   Information Modeling -. 
 1. The tool creates an “as is” information design of the existing system. 
 2. This design can be more stabilized and enhanced to fit the customer’s requirements. 
 3. This information design can be exported for direct usage by basic tools such as Rational Rose, ERWIN, etc, to produce the target database. 
 4. The design can likewise be utilized to develop a DDL for the target database. This function includes more worth when changing from VSAM datasets to RDBMS. 
 5. Dependences and relationships in between the different entities can be designed utilizing visual user interfaces. 
 6. The back-end can stay the same. 
   Understanding Mining and Extension -. 
 The drawn out guidelines are evaluated and confirmed versus the code and the existing performance. Redundant code is weeded out. 
 “Use Cases” are created and proper organisation guidelines are associated with them, thus constructing up the elements that get equated into software application in the target language. A part can consist of more than one function. 
   Tradition Extension bridges the space in between tradition and tactical architectures. The extension procedure consists of understanding and recording the existing system; breaking down the application into information, discussion and processing reasoning; developing and drawing out recyclable elements; and if preferred, transforming the tradition code into Web suitable languages. 
   1. More than 70% of business information still lives on tradition systems. 
 2. Big corporations have actually invested significant resources on these systems. This financial investment can not be crossed out. 
 3. Tradition systems were established for, and still run mission-critical applications. 
 4. In their existing state, many tradition applications have actually numerous difficulties related to their operating and upkeep. 
 When progressing beyond tradition systems, company leaders should think about tactical problems such as: 
 . Overall Cost of Ownership 
 . Positioning with Business Goals. 
   Numerous alternatives are offered to the CIO when moving from Legacy systems to more modern platforms: 
 . Technical Extension 
 . Practical Extension 
 . 
   7. Any extension of tradition systems need to be “non-invasive.”. 
 8. The extension procedure includes understanding and recording the existing system; decaying the application into information, discussion and processing reasoning; developing and drawing out recyclable parts; and if wanted, transforming the tradition code into Web suitable languages.
0 notes
americajobsnet · 6 years ago
Text
[Full-time] MF COBOL software engineer located in Meriden, CT - Contract role at iAi System, LLC
Location: Connecticut Description: Hello, Greetings! We are looking for a MF COBOL software engineer for our client located in Meriden, CT. It is a Contract opportunity. If you are interested, please get back to me with the following details. Full Name (As Per Legal Doc) - Phone No - Email ID - Skype ID - Linked In - Current Location - Willing to relocate - Work Authorization - Currently on Project - Interview Availability - Availability to Join - Total Years of US Experience - Total Years of Relevant Experience - SSN# (Last 4 digits) - DOB MM/DD/YYYY - Bachelor Degree and Year of Passing - Highest Education - Immigration status: Expiry date of H1B/OPT-EAD/GC-EAD/H4-EAD/L2-EAD is mandatory 1) When did you travel to US? 2) How many years in US on H1B: 3) Did you travel to pursue Graduation or Masters? The requirement is below. Requirement Details: Position: MF COBOL software engineer Location: Meriden, CT Duration: long term contract Rate: C2C preferred (W2 is also accepted) Client: Discovery Communications Eligible visas: US Citizens, GC Holders Payroll will be on W2 | 1099 (any visa with w2 payroll) Local candidates are needed Experience not an issue Basic MF COBOL software engineer with healthcare background. Job Description: This is a long term assignment with our direct client. Job Summary/Visionary Statement: The person hired will be working on Mainframes. This position will include design, programming and certification of software components and infrastructure tools to support the development of the components produced. Strong leadership and technical mentoring abilities, programming on the Mainframe platform, utilize client's embedded software components and building automated solutions to transform and streamline manual processes. (SDLC) methodologies Responsibilities and Duties Primary Responsibilities include but are not limited to the following: • Design and architect software with an eye towards reusability • Lead design efforts, implement, and certify infrastructure tools to support release of software components and products • Document technical components and modules for technical users and user documentation • Act as a backup for other infrastructure and Component Programmers, QA Testers and Product Analysts • Construct unit test plans and procedures and execute integration testing on infrastructure and component updates ensuring consistency across department • Build, Support and maintain automated build strategy for platform specific development, with eye toward repeatability • Build cross department relationships to ensure strong collaboration between groups Required Experience and Qualifications Basic Qualifications: • Bachelor’s degree or higher from an accredited university and/or minimum of seven (7+) years of Mainframe platform programming in lieu of the education requirement • Minimum of ten (10+) years of experience in Cobol, VSAM, CICS, or JCL Programming Preferred Qualifications: • Proficient experience in TSO, ISPF, FileAid software • Proficient experience with software configuration management concepts (Source Control) • Proficient experience with MS-Office tools • Proficient experience with source code configuration management tools (TFS and GIT) • Experience in (or ability to quickly learn) 3M-HIS proprietary Domain programming language • Ability to adapt and respond quickly to new requests • Ability to work in a team environment • Ability to multi-task and adapt to changing priorities • Ability to quickly learn and apply new tools and technology • Ability to effectively communicate ideas, concepts and information • Strong sense of individual initiative and personal responsibility for quality output • Health Information Systems experience a plus • verbal and written communication skills with ability to communicate on both user and developer level • Proficient with Agile/Scrum and System Development Life Cycle I am looking forward for your response as soon as possible. Thanks & Regards, Jagadeeswari Recruitment Consultant iAi System, LLC Reference : MF COBOL software engineer located in Meriden, CT - Contract role jobs Apply to this job from America Jobs http://www.america-jobs.net/job/50944/mf-cobol-software-engineer-located-in-meriden-ct-contract-role-at-iai-system-llc/
0 notes
employmentusanet · 6 years ago
Text
[Full-time] MF COBOL software engineer located in Meriden, CT - Contract role at iAi System, LLC
Location: Connecticut Description: Hello, Greetings! We are looking for a MF COBOL software engineer for our client located in Meriden, CT. It is a Contract opportunity. If you are interested, please get back to me with the following details. Full Name (As Per Legal Doc) - Phone No - Email ID - Skype ID - Linked In - Current Location - Willing to relocate - Work Authorization - Currently on Project - Interview Availability - Availability to Join - Total Years of US Experience - Total Years of Relevant Experience - SSN# (Last 4 digits) - DOB MM/DD/YYYY - Bachelor Degree and Year of Passing - Highest Education - Immigration status: Expiry date of H1B/OPT-EAD/GC-EAD/H4-EAD/L2-EAD is mandatory 1) When did you travel to US? 2) How many years in US on H1B: 3) Did you travel to pursue Graduation or Masters? The requirement is below. Requirement Details: Position: MF COBOL software engineer Location: Meriden, CT Duration: long term contract Rate: C2C preferred (W2 is also accepted) Client: Discovery Communications Eligible visas: US Citizens, GC Holders Payroll will be on W2 | 1099 (any visa with w2 payroll) Local candidates are needed Experience not an issue Basic MF COBOL software engineer with healthcare background. Job Description: This is a long term assignment with our direct client. Job Summary/Visionary Statement: The person hired will be working on Mainframes. This position will include design, programming and certification of software components and infrastructure tools to support the development of the components produced. Strong leadership and technical mentoring abilities, programming on the Mainframe platform, utilize client's embedded software components and building automated solutions to transform and streamline manual processes. (SDLC) methodologies Responsibilities and Duties Primary Responsibilities include but are not limited to the following: • Design and architect software with an eye towards reusability • Lead design efforts, implement, and certify infrastructure tools to support release of software components and products • Document technical components and modules for technical users and user documentation • Act as a backup for other infrastructure and Component Programmers, QA Testers and Product Analysts • Construct unit test plans and procedures and execute integration testing on infrastructure and component updates ensuring consistency across department • Build, Support and maintain automated build strategy for platform specific development, with eye toward repeatability • Build cross department relationships to ensure strong collaboration between groups Required Experience and Qualifications Basic Qualifications: • Bachelor’s degree or higher from an accredited university and/or minimum of seven (7+) years of Mainframe platform programming in lieu of the education requirement • Minimum of ten (10+) years of experience in Cobol, VSAM, CICS, or JCL Programming Preferred Qualifications: • Proficient experience in TSO, ISPF, FileAid software • Proficient experience with software configuration management concepts (Source Control) • Proficient experience with MS-Office tools • Proficient experience with source code configuration management tools (TFS and GIT) • Experience in (or ability to quickly learn) 3M-HIS proprietary Domain programming language • Ability to adapt and respond quickly to new requests • Ability to work in a team environment • Ability to multi-task and adapt to changing priorities • Ability to quickly learn and apply new tools and technology • Ability to effectively communicate ideas, concepts and information • Strong sense of individual initiative and personal responsibility for quality output • Health Information Systems experience a plus • verbal and written communication skills with ability to communicate on both user and developer level • Proficient with Agile/Scrum and System Development Life Cycle I am looking forward for your response as soon as possible. Thanks & Regards, Jagadeeswari Recruitment Consultant iAi System, LLC Reference : MF COBOL software engineer located in Meriden, CT - Contract role jobs Apply to this job from employment-usa.net http://www.employment-usa.net/job/24370/mf-cobol-software-engineer-located-in-meriden-ct-contract-role-at-iai-system-llc/
0 notes
Text
MS OFFICE, TALLY, C LANGUAGE, C++, JAVA, COBOL, OLEVEL COURSE, UPTO CLASS 10TH COMPUTER HOME TUITIONS TUTORS PROVIDER IN MOHALI BY TRINITY HOME TUITIONS
TRINITY HOME TUITIONS 07888774162 provides the best home tutoring solutions all over chandigarh, zirakpur, Mohali, kharar, dera bassi, new chandigarh, mullanpur, sector 51, 7phase, 3B2, 3 PHASE, Maya garden, dhakoli, South city,
airport road, aerocity, sohana, Homeland heights & nearby. We have professionals as well as highly experienced male and female home tutors for all types of courses, for every class, every subject, all boards, all streams, degrees and
MORE. Try a demo from our specialized and highly qualified as well as experienced home tutors without any type of charges. Contact Trinity Home Tuitions at 07888774162. Our home tutors have set their own exam oriented notes and assignments for all classes and all types of streams. The notes and assignments are in the most simple content and easily understandable. TRINITY HOME TUTIONS 07888774162 Provides Customized Home Tuitions according to the suitablility of students and parents in all over Tricity, Chandigarh, Panchkula, Mohali, Zirakpur, Kharar, Sunny enclave, Nijjer road, Sohana, 7
phase, 3 phase, 2 phase, 1 phase, 5 phase, 6 phase, 3b2, nearby areas of tribune chowk, aroma, sector 35, sector 22, sector 19, sector 17, sector 34, New chandigarh, Mullanpur, Omaxe City,  swastik vihar, manimajra, Madhya marg,
HALLO MAJRA & nearby. Do you want your kid to be a topper in his/her school? Do you want your child to learn and build skill in studying rather than cramming or just mugging up the whole syllabus? Our Home Tutors are here to help your child through the
whole course with their utmost deligency, skill and knowledge. Do not wait, try our freely provided demo classes at your home and enjoy our highly experienced male and female home tutoring services at your doorstep. We provide the best Male and Female home tutor all over the tricity for all
subjects, all boards and all classes. Choose the best home faculty for your kid. TRINITY HOME TUITIONS 07888774162 provides the best home tuitions for Maths, Science, Social science, Hindi, English, Punjabi Sanskrit, Geography, History, Political Science, Economics, Accounts, Business and Labour laws, Income
tax, Indirect Tax, Business studies, Physics, Chemistry, Maths, Zoology, Botany, spoken English, French learning, Computer courses for all levels & Many More Courses and Subjects. Our highly Qualified Tutors are Professional and experienced in Teaching classes 1st , 2nd , 3rd , 4th , 5th , 6th , 7th , 8th , 9th , 10th , 11th , 12th , Competitive Exams, NEET Exam, GATE EXAM, CAT, IIT JEE, AIEEE, CET, IISER,
NISER, KVPY, CA, CS, CMA, CPA, PMT Exam, BCom, BA,  BBA, MBA, BSC(MEDICAL), BSC (NON-MEDICAL),  Btech and more. Our Specialized & Professional  Home Tutors have set up in their mind the exam pattern of CBSE Board, ICSE Board, CI Board, IGSCI Board and More Take a demo Class Comfortably at your Home. If you want your kid to gain knowledge and wants your child to be extraordinary in studies, choose the best home tutors. Change your learning skills today. We provide home tutors in all over Chandigarh, Panchkula, Mohali, Kharar, Zirakpur,  elegance, Tribune chowk road, Manimajra, Dhakoli, hallo majra, Baltana Maya Garden, VIP Road, Patiala Road, Sunny Enclave Kharar and Nearby. To choose the best teacher for your studies, Kindly Contact at 07888774162Today. Regards TRINITY HOME TUITIONS 07888774162
TRINITY HOME TUITIONS 07888774162 is one of the leading Home Tutors Providers in all over TriCity, Chandigarh, Panchkula, Mohali. Including Zirakpur, Baltana, Dhakoli, Manimajra, Kharar, Hallo majra, Madhya Marg, Dakshin marg,
Chandi path, adjoining areas of pgi,  Punjab university , Airport road,  New Chandigarh, Mullanpur, Omaxe City & Nearby. We have a Home Tutors whose profession is only teaching. Just try for a demo class once, and you will surely know the quality teaching. We are Known only by our tutors, Just give us a chance, we will never dissatisfy you. We have a Separate Home Tutors for each and Every Subject, Each and every board. They are the Result Oriented Home Tutors. Experienced and Highly Qualified Teachers are for Maths, Science, Physics, Chemistry, Biology, Geography, History, Civics, English, Hindi, French, Commerce, Accounts, Business Studies, Economics, Micro Economics, Macro Economics,
Law, Company Law, Business Law, Commercial Law, Tax, Income Tax, Indirect Tax, GST, Goods and Services Tax, Operation Research, Corporate Accounting, Advance Accounting, Cost Accounting, Stats, Statistics, Quants Specialized Teachers for Competition Level Exams Like: IIT-JEE, NEET, CAT, MAT, XAT, SNAP, NMAT, AFCAT, GMAT, HTET, CTET, PTET, CA, CS, ICWAI, CMA, CPA, CFA, CLAT, & More Specialized Home Tuitions for Government Exams: Bank PO, Banking, SSC, Railways, IAS, PCS, HCS & More Our Home Tutors Teaches Home Tuitions for Classes: Play Way, Nursery, KG, 1st , 2nd , 3rd , 4th , 5th , 6th , 7th , 8th , 9th , 10th For All Boards CBSE, ICSE, CI, ISE, IGSCI & More Professional Home Tuitions Given By Experience Home Tutors for Class: 11th , 12th , BCom, BBA, MBA, BA, BTech, BSC, MCom, MBA, MA, MTech, MSC & More Need a home tutor for your kid? We Provide Tri City’s Best Male Tutors & Female Home Tutors at your Home. We have an Experienced, highly qualified, and highly appreciated  Home Tutors not a Fresher. Choose the Best for your Son
or daughter We provide result oriented home tutors for math, science, English, Hindi, social studies SST, French, geography, history, civics, political science, commerce, accounts, economics, business studies, law, company law, business law,
mercantile law, commercial education, operation research, tax, income tax, goods and services tax, GST, fine arts subjects, physics, chemistry, biology, psychology, management, advance accounting, cost accounting, financial management,
auditing, statistics, computer courses, tally, ms office, c language, java,  and many more. Special Home tuitions for cocurricular activities like Singing, Dancing, gym training, yoga and many more. Do not wait for the better, choose the best for your kid. As we provide the best Male and Female Home Tutors at your home. We provide Best Home Tuition service for All Classes All Subjects All Boards in All Over TriCity. Choose the
best home tuition teacher for your kid. We provide experience home tutors in all areas of Chandigarh, new Chandigarh, mullanpur, omaxe city, Panchkula, Mohali, Madhya Marg, Lake side, adjoining areas of government buildings like Secretariat, High court, Manimajra, Baltana,
Dhakoli, Zirakpur, Maya Garden, VIP Road, Patiala Road, Nirmal Chaya Towers, Savitry Greens, Kharar, Sunny Enclave, Nijjer Road Sector 123, 124, 125, Amravati Enclave, Pinjore, Chandimandir, kalka and Nearby. We have a Professional Male and Female Home Tutors who are able to teach your kid in a disciplined manner, on a punctual basis and putting all the hard and smart work on your kids studies. We Have an Experience Teachers not a
freshers one. We have those teachers who are Providing Home Tuitions Only. We do appreciate our teachers performance as their results upon a kids are highly appreciable. Book your Schedule from our Professional Home Tutors for any class, any subject, any board, in any area of Tri city. Our tutors are hardworking, punctual, discipline, and well known with Exam & syllabus pattern of CBSE, ICSE, ISE, and others. We have a separate male and female home tutors for classes play way to 1st , 1st to 4th , 4th to 8th , 9th & 10th , 11th & 12th special teachers for medical, non-medical, commerce and arts. Special home tutors for government exams like bank PO SSC, SSC CGL, RAILWAYS, STATE EXAMS and others Best home tutors for CA, CS, CMA, CPA, CFA, IIT, AIEEE, CET, CAT, XAT, MAT, SNAP, NMAT NEET, and other exams. Best home tutors for spoken English,  IELTS, Singing, Dancing, Music, French learning and others TRINITY HOME TUITIONS 7888774162
0 notes
hireindianpvtltd · 6 years ago
Text
Fwd: Urgent requirements of below positions
New Post has been published on https://www.hireindian.in/fwd-urgent-requirements-of-below-positions-30/
Fwd: Urgent requirements of below positions
Please find the Job description below, if you are available and interested, please send us your word copy of your resume with following detail to [email protected] or please call me on 703-594-5490 to discuss more about this position.
Casandra Sr. Engineer——–>Bellevue, WA BA Onsite (Business Analyst)——–>Boston, MA Technical Architect———–>Boston, MA MainFrame Infrastructure——–>Boston, MA MainFrame Developer——–>Boston, MA QA Onsite- Manual Tester——–>Boston, MA Project Manager———–>Boston, MA
    Job Description Apply
Job title: Casandra Sr. Engineer
Location: Bellevue, WA
 Duration: 6 months+
Mandatory Skills: Strong experience on Casandra, and Java/J2EE
  Job Description:
Expert in Cassandra database usage
Should be aware of how to read and write into the Cassandra database from a Java Application.   Should have good knowledge Java/J2EE, Micro services and Rest APIs
Apply Job
Job Title: BA Onsite (Business Analyst)
Location: Boston, MA
Duration: Contract
Mandatory Skills: Document /Print Development Business Analyst
  Job Description:
Purpose
Responsible for analyzing customer requirements and the analysis of information/data.  Manages projects if required.  Provides input to improve overall efficiency and processes
The role holder under moderate supervision of the Senior Business Systems Analyst/BA Manager is responsible for understanding the business needs and identifying how best to meet those needs. This includes working with the business and the technology areas to gather requirements for development and management. The role analyzes, validates and documents the business and system requirements.
This role designs, modifies and creates business processes that will be used to implement the business transformation solutions. This is done through research and fact-finding combined with a basic understanding of applicable business processes, systems, and industry requirements.
The role holder adheres to the established processes and requirements management methodology and practices, while carrying out their responsibilities. This includes meeting established quality standards.
Primary Responsibilities:
Investigates operational requirements and problems, seeking effective business solutions through improvements in automated and non-automated components of new or changed business processes
Assists in the analysis of the underlying issues arising from investigations into requirements and problems and identifies available options for consideration.
Works with clients/users in defining acceptance tests.
Specifies and develops test scenarios to test that new/redesigned processes deliver improved ways of working for the end user at the same time as delivering efficiencies and planned business benefits.
Records and reports test results.
Uses test plans and outcomes to specify user instructions.
Apply Job
Job Title: Technical Architect
Location: Boston MA
Duration: Contract
Mandatory Skills: Technical Architect (Print mail)
  Job Description:
10+Year of software development experience
5+ years of relevant Technical Architect experience in an enterprise environments
Work with Product Management Group/Product Owners and the rest of the team to define the requirements and deliver the quality product that will directly impact our internal business customers
Sound knowledge in analyzing business requirements, recommending technical solutions
In-depth Knowledge of C#.NET, ASP.Net, .NET CORE, Web API, SQL Server, WCF, HTML5, JavaScript, Web services, JSON and JQuery, Angular JS , , AzurePaaS,  Kubernetes Service, Solimar  Tools etc
Hands on experience in Agile/Scrum process (SDLC)
Experience in Devops, ALM, VSTS, TFS
Knowledge in Print & Banking Domain knowledge
  Apply Job
Job Title: MainFrame Infrastructure
Location: Boston, MA
Duration: Contract
Mandatory skills: Mainframe Server to Server migration
  Job Description:
Be a team player who can work effectively in a team environment as a member of an application development and test group.
Performs analysis of existing and/or new systems.
Provides maintenance and support for existing systems.
Must be able and willing to provide backup for primary on-call contact.
Assists in defining and documenting user requirements.
Provides leadership, work guidance and training to less experienced personnel.
Interacts with customers and team members to clarify requirements Experience
7+ years of experience in Mainframe Server to Server migration
Systems programming, installation, configuration, customization and maintenance of z/OS and the supporting programs, utilizing SMP/E, TSO/E, and JES2.  This includes disaster recovery
Systems programming of z/OS and z/Series hardware definitions, using HCD in an LPAR environment.
Implementing and supporting DFSMS/DFHSM storage management system.
z/OS dump reading and analysis.
Diagnosing performance problems in WebSphere MQ for z/OS and then tuning subsystem.
Diagnosing performance problems with the Virtual Tape System (VTS) and then tuning the system.
Print & Banking Domain knowledge is preferable
Experience with application development using Agile Scrum methodology.
Special Requirements / Preferred Skills:
Strong time management, priority allocation and task management skills.
Strong interpersonal skills to interact with customers and team members.
Strong communication skills.
Ability to work both independently and as part of a team to meet project needs.
Possess drive to work through issues, seek team support and escalate issues as appropriate.
Highly customer service oriented with proven ability to work with business customers as well as other team members.
Strong organizational and multi-tasking skills.
Apply Job
Job Title: MainFrame Developer
Location: Boston, MA
Duration: Contract
Mandatory Skills: Maniframes, Cobol, DB2
  Job Description:
Be a team player who can work effectively in a team environment as a member of an application development and test group.
Performs analysis, coding, and unit testing of existing and/or new systems.
Provides maintenance and support for existing systems.
Develops design specification documents for projects.
Supports System Testing and User Acceptance Testing.
Creates Ad hoc reports.
Must be able and willing to provide backup for primary on-call contact.
Assists in defining and documenting user requirements.
Assists in developing user manuals, procedure and training documents.
Provides leadership, work guidance and training to less experienced personnel.
Interacts with customers and team members to clarify requirements
Experience:
8+ years of application development experience in IBM Mainframe environment using TSO, COBOL II, TELON, CICS, JCL, DB2, QMF, SPUFI, FILEAID, XPEDITER, ENDEVOR, etc.
Experience of Application migrations is preferable
Assessment, consulting, planning and execution experience
Print & Banking Domain knowledge is preferable
Experience with application development using Agile Scrum methodology.
Special Requirements / Preferred Skills:
Strong time management, priority allocation and task management skills.
Strong interpersonal skills to interact with customers and team members.
Strong communication skills.
Ability to work both independently and as part of a team to meet project needs.
Possess drive to work through issues, seek team support and escalate issues as appropriate.
Highly customer service oriented with proven ability to work with business customers as well as other team members.
Strong organizational and multi-tasking skills.
Apply Job
Job Title: QA Onsite- Manual Tester
Location: Boston, MA
Duration: Contract
  Job Description:
The QA resources should be able to lead the team and also do the testing.  Mandatory Skills • Regression Testing • Test Planning (Test Plan, Test Cases) • Test Execution(Test Plan and Test execution) • Tests Tracking and Monitoring • Office and Adobe • TFS/MTM • Sharepoint • Technical Background
Desirable Skills • Solimar Tools • Print and Mail Industry Knowledge
Apply Job
Job Title: Project Manager
Location: Boston, MA
Duration: Contract
  Job Description:
Mandatory Skills:
Proficient in Project management capabilities and experience
Extensive experience in Budget Tracking (for large projects)
Technical background (basic knowledge of IT processes and technologies like scripts, stored procedures, views, different types of databases, functions, classes, job schedulers, SFTP) to be able to engage with technical team
Critical thinking (needs to understand very well the critical path and be able to efficiently move forward with constraints)
Proficient in MS Project
Proficient in working on Agile teams (though not all projects are Agile)
Proficient in MS Excel (advance knowledge)
Having prior experience in .NET projects would be preferable
Desirable Skills
Knowledge of print-mail processes (Client can help close the gap but the PM needs to have a strong project management background)Communication
Accountable for project/client communication
Client level ownership
Review & Manage internal stakeholder communication (including Technology & other teams for assigned module)
Review & Manage Offshore/Onshore Interaction and Stakeholder Communication
Escalation Management to appropriate stakeholders
Client Delivery
Assist lead in managing client delivery as well as complex system requirements
Manage large & high complexity client implementations independently
Manage transitions (Ongoing vis-à-vis Implementations vis-à-vis Leveraged Shared Services)
Apply Job
  Thanks, Steve Hunt Talent Acquisition Team – North America Vinsys Information Technology Inc SBA 8(a) Certified, MBE/DBE/EDGE Certified Virginia Department of Minority Business Enterprise(SWAM) 703-594-5490 www.vinsysinfo.com
    To unsubscribe from future emails or to update your email preferences click here .
0 notes
marjoriesmith4321 · 7 years ago
Link
Do My JavaScript Homework http://ift.tt/2FbZpFQ Do My JavaScript Homework DO MY JAVASCRIPT HOMEWORK : 00:00:05 Do My JavaScript Homework 00:00:05 Do My Java Servlets Homework 00:00:05 Do My Pascal Homework 00:00:05 Do My Cobol Homework 00:00:06 Do My A Plus Homework https://youtu.be/NFXtLgeTatI Do My JavaScript Homework In the event you're not certain to commit all your strategies, you may utilize essay Do My JavaScript Homework support from professionals. Put your acquisition as well as you'll take satisfaction in the extremely best high quality essay Do My JavaScript Homework assistance! Make sure you choose a trustworthy service or essayist when you are eager to pay somebody to do your essay for you. No matter whether it's an essay, written over a duration of lots of weeks, or whether it's an essay, given up your exam. Our solution is exactly what you need if you're looking for college essay Do My JavaScript Homework assistance! Whether you own an university essay, college essay or other kind of essay to finish, you may constantly trust us for high quality assistance. Don't panic, you've already found an university essay Do My JavaScript Homework assistance which is planned to repair your issues as well as end up being a true lifesaver. It's possible to use our college essay assistance to have a top notch essay, so you're able to keep doing well at school as well as grad without any problems. Without the ideal college essay support, you can experience issues with your grades that can hold you back from your targets. If you choose to pay for essay Do My JavaScript Homework assistance, our solution is among the most appealing choices. A relied on essay Do My JavaScript Homework solution will utilize information you provide to make sure you receive material written from scratch that fulfills your demands. It is possible to get an essay written for you as you settle back as well as unwind. Then we can help you, if you've got an essay that ought to be written. Essay is the standard type of control in educational procedure. With our on the internet essay aid, you can be sure that you'll be leading a hassle-free life once it pertains to sending your homework in time! Only the best essays Do My JavaScript Homework solution teams have the capacity to hit each of their target dates. It is possible to get essays written for you currently as well as don't need to be concerned about lifting a finger. Essays could show up easy on the surface, yet it is all dependent on the kind of essay you were requested to create in addition to the subject you've been assigned. https://youtu.be/8_JS6nR2-H0
0 notes
gutcode-blog · 7 years ago
Text
Quiz for CS1101
A general process for solving a category of problems. - algorithm
An error in a program. - bug
An intermediate language between source code and object code. - byte code
To translate a program written in a high-level language into a low-level language all at once, in preparation for later execution. - compile
The process of finding and removing any of the three kinds of programming errors. - debugging
Another name for a runtime error. - exception
Another name for object code that is ready to be executed. - executable
Any one of the languages that people have designed for specific purposes, such as representing mathematical ideas or computer programs; all programming languages are this kind of languages. - formal language
A programming language like Python that is designed to be easy for humans to read and write. - high-level language
To execute a program in a high-level language by translating it one line at a time. - interpret
A programming language that is designed to be easy for a computer to execute; also called machine language or assembly language. - low-level language
Any one of the language that people speak that evolved naturally - natural language
The output of the compiler after it translates the program. - object code
To examine a program and analyse the syntactic structure. - parse
A property of a program that can run on more than one kind of computer. - portability 
An instruction that causes the Python interpreter to display a value on the screen. - print statement
The process of formulating a problem, finding a solution, and expressing the solution. - problem solving
A sequence of instructions that specifies to a computer actions and computations to be performed. - program
An interactive user interface to the Python interpreter. - Python shell
An error that does not occur until the program has started to execute but that prevents the program from continuing.  - runtime error
A program stored in a file (usually one that will be interpreted.) - script
An error in a program that makes it do something other than what the programmer intended. - semantic error
The meaning of a program. - semantics
A program in a high-level language before being compiled. - source code
The structure of a program. syntax
An error in a program that makes it impossible to parse - and therefore impossible to interpret.  syntax error
One of the basic elements of the syntactic structure of a program, analogous to a word in a natural language. - token. 
Which of the following is NOT one of the computer languages developed in the 1950’s - BASIC (Beginners All Purpose Symbolic Instruction Code)
The BASIC language was developed by John G. Kemeny at which school: - Dartmouth College 
A popular computer language developed by Dennis Ritchie and Ken Thompson at Bell Labs in the 70's is: - C
The concept of a computer ‘bug’ was first attributed to ______ who found a moth stuck in a relay that caused a failure in a computer at Harvard University. The term ‘debugging’ has since come to mean correcting errors in a computer or computer program. - Grace Murray Hopper
Fortran language was designed to process business transactions - False
The COBOL language was designed to solve business problems and was adapted to processing business transactions - True
The C language was developed at Bell Labs with the objective of being the first object oriented language - False
Perl, Python, and PHP are all compiled languages - False
A program is a sequence of instructions that specifies how to perform a computation - True
The three kinds or errors that can occur in a program are_______________ - syntax, runtime and semantic
Portability means the program is written in small chunks of code. - False
During the 1990's, a major influence on programming languages was____________________ - the Internet
Python is considered to be _______________ - an internet language
Which of the following is Not a programming language. - Kuntz
A statement that assigns a value to a name (variable). - assignment statement
Information in a program that is meant for other programmers (or anyone reading the source code) and has no effect on the execution of the program. - comment 
The ability to combine simple expressions and statements into compound statements and expressions in order to represent complex computations concisely. - composition
To join two strings end-to-end. - concatenate
A set of values. - data type
To simplify an expression by performing the operations in order to yield a single value. - evaluate
A combination of variables, operators, and values that represents a single result value. - expression
A Python data type which stores floating-point numbers. - float
A Python data type that holds positive and negative whole numbers. - int
An operation that divides one integer by another and yields an integer. - integer division
A reserved word that is used by the compiler to parse programs. - keyword
One of the values on which an operator operates. - operand
A special symbol that represents a simple computation like addition, multiplication, or string concatenation. - operator
The set of rules governing the order in which expressions involving multiple operators and operands are evaluated. - rules of precedence
An instruction that the Python interpreter can execute. - statement
A Python data type that holds a string of characters. - str
A number or string (or other things to be named later) that can be stored in a variable or computed in an expression. - value
A name that refers to a value - variable
A name given to a variable. - variable name
Programmers generally choose names for their variables that are meaningful and document what the variable is used for. - True
Variable names are not case sensitive. - False
Using keywords for variable names will result in a ________________ - syntax error
A script usually contains a sequence of statements. If there is more than one statement, the results appear one at a time as the statements execute. - True
An expression is a combination of values, variables, and operators. If you type an expression on the command line, the interpreter evaluates it and displays the result. - True
In a script, an expression all by itself is a legal statement, but it doesn't do anything. - True
The acronym PEMDAS is a useful way to remember the order of operations in Python. - True
As programs get bigger and more complicated, they get more difficult to read. This is why programmers should use Comments in their code. - True
  Which of the following is NOT one of the rules for pseudo code: - Capitalize every word
An advantage of Pseudo code is that it is a visual technique. - False
An advantage of Pseudo code is that it requires no special tools and can easily be written on a word processor. - True
Pseudo code is a newer tool and has features that make it more reflective of the structured concepts. - True
Every flowchart must have a START and STOP symbol. - True
The use of arrows in flowcharts is optional because the flow direction is obvious. - False
A flowchart with more than 15 symbols is considered poor form. - True
Pseudo code should contain the exact same statements as the programming language that will be used. - False
One of the advantages of flowcharts is that it is hard to modify. - False
One of the advantages of pseudo code is that it implements structured concepts well. - True
The C language was developed at Bell Labs with the objective of being the first object oriented language - False
Programmers generally choose names for their variables that are meaningful and document what the variable is used for. - True
Pseudo code is a newer tool and has features that make it more reflective of the structured concepts. - True
A statement that assigns a value to a name (variable). → assignment statement
Information in a program that is meant for other programmers (or anyone reading the source code) and has no effect on the execution of the program. → comment
The ability to combine simple expressions and statements into compound statements and expressions in order to represent complex computations concisely. → composition, 
To join two strings end-to-end. → concatenate, 
A set of values. → data type, 
To simplify an expression by performing the operations in order to yield a single value. → evaluate, 
A combination of variables, operators, and values that represents a single result value. → expression, 
A Python data type which stores floating-point numbers. → float, 
A Python data type that holds positive and negative whole numbers. → int, 
An operation that divides one integer by another and yields an integer. → integer division, 
A reserved word that is used by the compiler to parse programs. → keyword
One of the values on which an operator operates. → operand, 
A special symbol that represents a simple computation like addition, multiplication, or string concatenation. → operator, 
The set of rules governing the order in which expressions involving multiple operators and operands are evaluated. → rules of precedence, 
An instruction that the Python interpreter can execute. → statement, 
A Python data type that holds a string of characters. → str, 
A number or string (or other things to be named later) that can be stored in a variable or computed in an expression. → value, 
A name that refers to a value. → variable, A name given to a variable. → variable name
The use of arrows in flowcharts is optional because the flow direction is obvious. - False
Variable names are not case sensitive. - False
The COBOL language was designed to solve business problems and was adapted to processing business transactions - True
One of the advantages of a function is that it allows the programmer to alter the flow of execution in the program. - False 
A stack diagram shows the value of each variable and the function to which each variable belongs. - True
True or False: The graphical representation of a stack of functions, their variables, and the values to which they refer is called a traceback? - False
True or False: A local variable is a variable defined inside a function that can only be used inside its function. - True
The order in which statements are executed during a program run. - Flow of execution
The first part of a compound statement, begins with a keyword and ends with a colon ( : ) - header
A statement that executes a function. It consists of the name of the function followed by a list of arguments enclosed in parentheses. - function call
A variable defined inside a function that can only be used inside its function. - local variable
A graphical representation of functions, their variables, and the values to which they refer. - stack diagram
------ What will the output of this program be when it is executed? def test_function( length, width, height):    print ("the area of the box is ", length*width*height)    return length*width*height l = 12.5 w = 5 h = 2 test_function(l, w, h) print ("The area of the box is ", length*width*height) 
A NameError because a variable not defined
What will the output of the following code be? def recursive( depth ):    depth+=1    while (depth < 5):        ret = recursive(depth)    return depth ret = recursive( 0 ) print ("the recursive depth is ", ret)
None
What does the import statement in the following script do?
import StringIO
output = StringIO.StringIO() output.write('First line.\n') output.close()
It includes a Python module called StringIO into the script
The following Python script will generate an error when executed.  What is the cause of the error? def function2(param):    print (param, param)    print (cat) def function1(part1, part2):    cat = part1 + part2    function2(cat) chant1 = "See You " chant2 = "See Me " function1(chant1, chant2)
The variable cat is local to function1 and cannot be used in function2
Dot notation is reserved for variable names and cannot be used to call a function. - False
Functions always get executed first regardless to the flow of execution. - False
The 80286 microprocessor was introduced in February 1982 and was four times more powerful than the 8088. - True
What does function subroutine do? def subroutine( n ):  while n > 0:      print (n,)      n -= 1
Counts from n down to 1 and displays each number
The following code is an example of what principle? bruce = 5 print (bruce,) bruce = 7 print (bruce)
Multiple Assignment
True/False: The % or modulus operator returns the remainder present when two integers do not divide evenly into one another. - True
True/False: An algorithm is a step by step process for solving a problem. - True
Functions allow the programmer to encapsulate and generalize sections of code. - True
One way to generalize a function is to replace a variable with a value. - False
A variable name defined in a function cannot appear in the calling program because it will cause a conflict error. - False
A function that returns an integer value grater than 0 is called a boolean function. -  False
Encapsulation is the process of wrapping a piece of code in a function - True
Repeated execution of a set of programming statements is called repetitive execution. - False 
A development approach that that is intended to avoid a lot of debugging by only adding and testing small amounts of code at a time is called. -  incremental development
The statements inside of a loop are known as the ____ of the loop. - body
A loop where the terminating condition is never achieved is called an _______ - infinite loop
Functions can only return Boolean expressions. - False
With built in functions, it is generally acceptable to take a "Leap of Faith". - True
"Dead code" is code that performs calculations but never displays the results. - False
Boolean expressions control _________________ - recursion, conditional execution, alternative execution
The modulus operator is the same as the divide operator. - False
Chained conditionals are used when there are three or more possibilities. - True
A stack diagram shows the value of each variable and the function to which each variable belongs. - True
True or False: The graphical representation of a stack of functions, their variables, and the values to which they refer is called a traceback? - False
What will the output of the following code be? def recursive( depth ):    depth+=1    while (depth < 5):        ret = recursive(depth)    return depth ret = recursive( 0 ) print ("the recursive depth is ", ret)
None
Functions can only return Boolean expressions. - False
A data type in which the values are made up of components, or elements, that are themselves values is known as an object data type. - False
Given any real numbers a and b, exactly one of the following relations holds: a < b, a > b, or a = b. Thus when you can establish that two of the relations are false, you can assume the remaining one is true. This principle is known as: - Trichotomy
A parameter written in a function header with an assignment to a default value which it will receive if no corresponding argument is given for it in the function call is called an optional parameter. - True
To create a new object that has the same value as an existing object is know as creating an alias - False
The following code: for fruit in ["banana", "apple", "quince"]:    print (fruit)     will produce the following output: banana apple quince
False
A variable that has a data type of "str" cannot be a compound data type. - False
Traversal can only be accomplished with the "while" loop. - False
Strings are easily changed with string slices. - False
The elements of a list are immutable. - False
The set of modules that are included in the default installation of python are known as the: -  Standard Library
Variables that are defined inside of a module are called what? - Attributes
Creating a python script file with a .py extension on the filename and placing it in the appropriate directory is all that is required to create a module? - True
In the following Python statement, what do we call the portion of the statement before the dot ('string.')? string.capitalize('maryland') - Module
In the following segment of code what do we call the portion of the statement that follows the dot (capitalize)? string.capitalize('maryland') - Method
What will the contents of mylist be after the following code has been executed? >>> mylist = [1, 4, 2, 3] >>> mylist.append(5) 
[1,4,2,3,5]
What will the following code segment do? infile.readlines() - Read all remaining lines in a file
Memory that can maintain its state without power is know as. - Non volatile memory
Which of the following is NOT a valid mode that can be used to open a file when using the 'open' statement? - x (eXecute)
The dot operator (.) permits access to attributes and functions of a module (or attributes and methods of a class or instance). - True
Pickling is a way to _________________ - preserve data structure
Exceptions allow the programmer to _________________ - write code to handle runtime errors
The Motorola Power PC 601 microprocessor contained 2.8 million transistors. True
The first patent for a microprocessor is attributed to Gary Boone and MIchael Cochran of Texas Instruments. - True.
0 notes
edwardsherwood-blog · 7 years ago
Text
Test Bank Database Systems Design Implementation and Management 11th Edition Solution
For Order This And Any Other Test
 Banks And Solutions Manuals, Course,
 Assignments, Discussions, Quizzes, Exams,
 Contact us At: [email protected]
   Chapter 1
 Database Systems
 Discussion Focus
 How often have your students heard that “you have only one chance to make a good first impression?” That’s why it’s so important to sell the importance of databases and the desirability of good database design during the first class session.
 Start by showing your students that they interact with databases on a daily basis. For example, how many of them have bought anything using a credit card during the past day, week, month, or year? None of those transactions would be possible without a database. How many have shipped a document or a package via an overnight service or via certified or registered mail? How many have checked course catalogs and class schedules online? And surely all of your students registered for your class? Did anybody use a web search engine to look for – and find – information about almost anything? This point is easy to make: Databases are important because we depend on their existence to perform countless transactions and to provide information.
 If you are teaching in a classroom equipped with computers, give some “live” performances. For example, you can use the web to look up a few insurance quotes or compare car prices and models. Incidentally, this is a good place to make the very important distinction between data and information. In short, spend some time discussing the points made in Section 1.1, "Why Databases?" and Section 1.2 “Data vs. Information.”
 After demonstrating that modern daily life is almost inconceivable without the ever-present databases, discuss how important it is that the (database) transactions are made successfully, accurately, and quickly. That part of the discussion points to the importance of database design, which is at the heart of this book. If you want to have the keys to the information kingdom, you’ll want to know about database design and implementation. And, of course, databases don’t manage themselves … and that point leads to the importance of the database administration (DBA) function. There is a world of exciting database employment opportunities out there.
 After discussing why databases, database design, and database administration are important, you can move through the remainder of the chapter to develop the necessary vocabulary and concepts. The review questions help you do that … and the problems provide the chance to test the newfound knowledge.
  Answers to Review Questions
 1.   Discuss each of the following terms:
 a. data
 Raw facts from which the required information is derived. Data have little meaning unless they are grouped in a logical manner.
 b. field
 A character or a group of characters (numeric or alphanumeric) that describes a specific characteristic. A field may define a telephone number, a date, or other specific characteristics  that the end user wants to keep track of.
 c. record
 A logically connected set of one or more fields that describes a person, place, event, or thing. For example, a CUSTOMER record may be composed of the fields CUST_NUMBER, CUST_LNAME, CUST_FNAME, CUST_INITIAL, CUST_ADDRESS, CUST_CITY, CUST_STATE, CUST_ZIPCODE, CUST_AREACODE, and CUST_PHONE.
 d. file
 Historically, a collection of file folders, properly tagged and kept in a filing cabinet. Although such manual files still exist, we more commonly think of a (computer) file as a collection of related records that contain information of interest to the end user. For example, a sales organization is likely to keep a file containing customer data. Keep in mind that the phrase related records reflects a relationship based on function. For example, customer data are kept in a file named CUSTOMER. The records in this customer file are related by the fact that they all pertain to customers. Similarly, a file named PRODUCT would contain records that describe products – the records in this file are all related by the fact that they all pertain to products. You would not expect to find customer data in a product file, or vice versa.
 NOTE
Note: Field,  record, and file are computer terms, created to help describe how data are  stored in secondary memory. Emphasize that computer file data storage does  not match the human perception of such data storage.
  2.   What is data redundancy, and which characteristics of the file system can lead to it?
 Data redundancy exists when unnecessarily duplicated data are found in the database. For example, a customer's telephone number may be found in the customer file, in the sales agent file, and in the invoice file. Data redundancy is symptomatic of a (computer) file system, given its inability to represent and manage data relationships. Data redundancy may also be the result of poorly‑designed databases that allow the same data to be kept in different locations. (Here's another opportunity to emphasize the need for good database design!)
 3.   What is data independence, and why is it lacking in file systems?
 Data independence is a condition in which the programs that access data are not dependent on the data storage characteristics of the data.  Systems that lack data independence are said to exhibit data dependence.  File systems exhibit data dependence because file access is dependent on a file's data characteristics. Therefore, any time the file data characteristics are changed, the programs that access the data within those files must be modified.
 Data independence exists when changes in the data characteristics don't require changes in the programs that access those data. File systems lack data independence because all data access programs are subject to change when any of the file system’s data storage characteristics – such as changing a data type -- change.
 4.   What is a DBMS, and what are its functions?
 A DBMS is best described as a collection of programs that manage the database structure and that control shared access to the data in the database. Current DBMSes also store the relationships between the database components; they also take care of defining the required access paths to those components. The functions of a current-generation DBMS may be summarized as follows:
·      The DBMS stores the definitions of data and their relationships (metadata) in a data dictionary; any changes made are automatically recorded in the data dictionary.
·      The DBMS creates the complex structures required for data storage.
·      The DBMS transforms entered data to conform to the data structures in item 2.
·      The DBMS creates a security system and enforces security within that system.
·      The DBMS creates complex structures that allow multiple‑user access to the data.
·      The DBMS performs backup and data recovery procedures to ensure data safety.
·      The DBMS promotes and enforces integrity rules to eliminate data integrity problems.
·      The DBMS provides access to the data via utility programs and from programming languages interfaces.
·      The DBMS provides end-user access to data within a computer network environment.
 5.   What is structual independence, and why is it important?
 Structural independence exists when data access programs are not subject to change when the file's structural characteristics, such as the number or order of the columns in a table,  change. Structural independence is important because it substantially decreases programming effort and program maintenance costs.
6.   Explain the difference between data and information.
 Data are raw facts. Information is processed data to reveal the meaning behind the facts. Let’s summarize some key points:
·         Data constitute the building bocks of information.
·         Information is produced by processing data.
·         Information is used to reveal the meaning of data.
·         Good, relevant, and timely information is the key to good decision making.
·         Good decision making is the key to organizational survival in a global environment.
 7.   What is the role of a DBMS, and what are its advantages? What are its disadvantages?
 A database management system (DBMS) is a collection of programs that manages the database structure and controls access to the data stored in the database. Figure 1.2 (shown in the text) illustrates that the DBMS serves as the intermediary between the user and the database. The DBMS receives all application requests and translates them into the complex operations required to fulfill those requests. The DBMS hides much of the database’s internal complexity from the application programs and users. The application program might be written by a programmer using a programming language such as COBOL, Visual Basic, or C++, or it might be created through a DBMS utility program.
 Having a DBMS between the end user’s applications and the database offers some important advantages. First, the DBMS enables the data in the database to be shared among multiple applications or users. Second, the DBMS integrates the many different users’ views of the data into a single all-encompassing data repository.
 Because data are the crucial raw material from which information is derived, you must have a good way of managing such data. As you will discover in this book, the DBMS helps make data management more efficient and effective. In particular, a DBMS provides advantages such as:
·         Improved data sharing. The DBMS helps create an environment in which end users have better access to more and better-managed data. Such access makes it possible for end users to respond quickly to changes in their environment.
·         Better data integration. Wider access to well-managed data promotes an integrated view of the organization’s operations and a clearer view of the big picture. It becomes much easier to see how actions in one segment of the company affect other segments.
·         Minimized data inconsistency. Data inconsistency exists when different versions of the same data appear in different places. For example, data inconsistency exists when a company’s sales department stores a sales representative’s name as “Bill Brown” and the company’s personnel department stores that same person’s name as “William G. Brown” or when the company’s regional sales office shows the price of product “X” as $45.95 and its national sales office shows the same product’s price as $43.95. The probability of data inconsistency is greatly reduced in a properly designed database.
·         Improved data access. The DBMS makes it possible to produce quick answers to ad hoc queries. From a database perspective, a query is a specific request for data manipulation (for example, to read or update the data) issued to the DBMS. Simply put, a query is a question and an ad hoc query is a spur-of-the-moment question. The DBMS sends back an answer (called the query result set) to the application. For example, end users, when dealing with large amounts of sales data, might want quick answers to questions (ad hoc queries) such as:
Ø  What was the dollar volume of sales by product during the past six months?
Ø  What is the sales bonus figure for each of our salespeople during the past three months?
Ø  How many of our customers have credit balances of $3,000 or more?
·         Improved decision making. Better-managed data and improved data access make it possible to generate better quality information, on which better decisions are based.
·         Increased end-user productivity. The availability of data, combined with the tools that transform data into usable information, empowers end users to make quick, informed decisions that can make the difference between success and failure in the global economy.
 The advantages of using a DBMS are not limited to the few just listed. In fact, you will discover many more advantages as you learn more about the technical details of databases and their proper design.
 Although the database system yields considerable advantages over previous data management approaches, database systems do carry significant disadvantages. For example:
Increased     costs. Database systems require sophisticated     hardware and software and highly skilled personnel. The cost of     maintaining the hardware, software, and personnel required to operate and     manage a database system can be substantial. Training, licensing, and     regulation compliance costs are often overlooked when database systems are     implemented.
Management     complexity. Database systems interface with many     different technologies and have a significant impact on a company’s     resources and culture. The changes introduced by the adoption of a     database system must be properly managed to ensure that they help advance     the company’s objectives. Given the fact that databases systems hold     crucial company data that are accessed from multiple sources, security     issues must be assessed constantly.
Maintaining     currency. To maximize the efficiency of the database     system, you must keep your system current. Therefore, you must perform     frequent updates and apply the latest patches and security measures to all     components. Because database technology advances rapidly, personnel     training costs tend to be significant.
Vendor     dependence. Given the heavy investment in technology and     personnel training, companies might be reluctant to change database     vendors. As a consequence, vendors are less likely to offer pricing point     advantages to existing customers, and those customers might be limited in     their choice of database system components.
Frequent     upgrade/replacement cycles.     DBMS vendors frequently upgrade their products by adding new     functionality. Such new features often come bundled in new upgrade     versions of the software. Some of these versions require hardware     upgrades. Not only do the upgrades themselves cost money, but it also     costs money to train database users and administrators to properly use and     manage the new features.
  8.   List and describe the different types of databases.
 The focus is on Section 1.3.2, TYPES OF DATABASES. Organize the discussion around the number of users, database site location, and data use:
·         Number of users
o   Single-user
o   Multiuser
o   Workgroup
o   Enterprise
·         Database site location
o   Centralized
o   Distributed
·         Type of data
o   General-purpose
o   Discipline-specific
·         Database use
o   Transactional (production) database (OLTP)
o   Data warehouse database (OLAP)
·         Degree of data structure
o   Unstructured data
o   Structured data
 9.   What are the main components of a database system?
 The basis of this discussion is Section 1.7.1, THE DATABASE SYSTEM ENVIRONMENT. Figure 1.9 provides a good bird’s eye view of the components. Note that the system’s components are hardware, software, people, procedures, and data.
 10. What are metadata?
 Metadata is data about data. That is, metadata define the data characteristics such as the data type (such as character or numeric) and the relationships that link the data. Relationships are an important component of database design. What makes relationships especially interesting is that they are often defined by their environment. For instance, the relationship between EMPLOYEE and JOB is likely to depend on the organization’s definition of the work environment. For example, in some organizations an employee can have multiple job assignments, while in other organizations – or even in other divisions within the same organization – an employee can have only one job assignment.
 The details of relationship types and the roles played by those relationships in data models are defined and described in Chapter 2, Data Models.”. Relationships will play a key role in subsequent chapters. You cannot effectively deal with database design issues unless you address relationships.
 11. Explain why database design is important.
 The focus is on Section 1.4, WHY DATABASE DESIGN IS IMPORTANT. Explain that modern database and applications development software is so easy to use that many people can quickly learn to implement a simple database and develop simple applications within a week or so, without giving design much thought. As data and reporting requirements become more complex, those same people will simply (and quickly!) produce the required add-ons. That's how data redundancies and all their attendant anomalies develop, thus reducing the "database" and its applications to a status worse than useless. Stress these points:
·         Good applications can't overcome bad database designs.
·         The existence of a DBMS does not guarantee good data management, nor does it ensure that the database will be able to generate correct and timely information.
·         Ultimately, the end user and the designer decide what data will be stored in the database.
 A database created without the benefit of a detailed blueprint is unlikely to be satisfactory. Pose this question: would you think it smart to build a house without the benefit of a blueprint?  So why would you want to create a database without a blueprint? (Perhaps it would be OK to build a chicken coop without a blueprint, but would you want your house to be built the same way?)
 12.  What are the potential costs of implementing a database system?
 Although the database system yields considerable advantages over previous data management approaches, database systems do impose significant costs. For example:
·         Increased acquisition and operating costs. Database systems require sophisticated hardware and software and highly skilled personnel. The cost of maintaining the hardware, software, and personnel required to operate and manage a database system can be substantial.
·         Management complexity. Database systems interface with many different technologies and have a significant impact on a company's resources and culture. The changes introduced by the adoption of a database system must be properly managed to ensure that they help advance the company's objectives. Given the fact that databases systems hold crucial company data that are accessed from multiple sources, security issues must be assessed constantly.
·         Maintaining currency. To maximize the efficiency of the database system, you must keep your system current. Therefore, you must perform frequent updates and apply the latest patches and security measures to all components. Because database technology advances rapidly, personnel training costs tend to be significant.
·         Vendor dependence. Given the heavy investment in technology and personnel training, companies may be reluctant to change database vendors. As a consequence, vendors are less likely to offer pricing point advantages to existing customers and those customers may be limited in their choice of database system components.
 13.  Use examples to compare and contrast unstructured and structured data. Which type is more prevalent in a typical business environment?
 Unstructured data are data that exist in their original (raw) state, that is, in the format in which they were collected. Therefore, unstructured data exist in a format that does not lend itself to the processing that yields information. Structured data are the result of taking unstructured data and formatting (structuring) such data to facilitate storage, use, and the generation of information. You apply structure (format) based on the type of processing that you intend to perform on the data. Some data might be not ready (unstructured) for some types of processing, but they might be ready (structured) for other types of processing. For example, the data value 37890 might refer to a zip code, a sales value, or a product code. If this value represents a zip code or a product code and is stored as text, you cannot perform mathematical computations with it. On the other hand, if this value represents a sales transaction, it is necessary to format it as numeric.
Structured data are more prevalent than unstructured data in a business environment. For example, if invoices are stored as images for future retrieval and display, you can scan them and save them in a graphic format. On the other hand, if you want to derive information such as monthly totals and average sales, such graphic storage would not be useful. Instead, you could store the invoice data in a (structured) spreadsheet format so that you can perform the requisite computations.
 14.  What are some basic database functions that a spreadsheet cannot perform.
Spreadsheets do not support self-documentation through metadata, enforcement of data types or domains to ensure consistency of data within a column, defined relationships among tables, or constraints to ensure consistency of data across related tables.
 15. What common problems do a collection of spreadsheets created by end users share with the typical file system?
A collection of spreadsheets shares several problems with the typical file system.  First problem is that end users create their own, private, copies of the data, which creates issues of data ownership.  This situation also creates islands of information where changes to one set of data are not reflected in all of the copies of the data. This leads to the second problem – lack of data consistency.  Because the data in various spreadsheets may be intended to represent a view of the business environment, a lack of consistency in the data may lead to faulty decision making based on inaccurate data.  
 16. Explain the significance of the loss of direct, hands-on access to business data that users experienced with the advent of computerized data repositories.
Users lost direct, hands-on access to the business data when computerized data repositories were developed because the IT skills necessary to directly access and manipulate the data were beyond the average user's abilities, and because security precautions restricted access to the shared data.  This was significant because it removed users from the direct manipulation of data and introduced significant time delays for data access.  When users need answers to business questions from the data, necessity often does not give them the luxury of time to wait days, weeks, or even months for the required reports.  The desire to return hands-on access to the data to the users, among other drivers, helped to propel the development of database systems.  While database systems have greatly improved the ability of users to directly access data, the need to quickly manipulate data for themselves has lead to the problems of spreadsheets being used when databases are needed.
 17. Explain why the cost of ownership may be lower with a cloud database than with a traditional, company database.
Cloud databases reside on the Internet instead of within the organization’s own network infrastructure.  This can reduce costs because the organization is not required to purchase and maintain the hardware and software necessary to house the database and support the necessary levels of system performance.
  Problem Solutions
 ONLINE CONTENT
The  file structures you see in this problem set are simulated in a Microsoft  Access database named Ch01_Problems, available www.cengagebrain.com.
  Given the file structure shown in Figure P1.1, answer Problems 1 - 4.
 FIGURE P1.1 The File Structure for Problems 1-4
 1.      How many records does the file contain? How many fields are there per record?
 The file contains seven records (21-5Z through 31-7P) and each of the records is composed of five fields (PROJECT_CODE through PROJECT_BID_PRICE.)
 2.      What problem would you encounter if you wanted to produce a listing by city? How would you solve this problem by altering the file structure?
 The city names are contained within the MANAGER_ADDRESS attribute and decomposing this character (string) field at the application level is cumbersome at best. (Queries become much more difficult to write and take longer to execute when internal string searches must be conducted.) If the ability to produce city listings is important, it is best to store the city name as a separate attribute.
 3.      If you wanted to produce a listing of the file contents by last name, area code, city, state, or zip code, how would you alter the file structure?
 The more we divide the address into its component parts, the greater its information capabilities. For example, by dividing MANAGER_ADDRESS into its component parts (MGR_STREET, MGR_CITY, MGR_STATE, and MGR_ZIP), we gain the ability to easily select records on the basis of zip codes, city names, and states. Similarly, by subdividing the MANAGER name into its components MGR_LASTNAME, MGR_FIRSTNAME, and MGR_INITIAL, we gain the ability to produce more efficient searches and listings. For example, creating a phone directory is easy when you can sort by last name, first name, and initial. Finally, separating the area code and the phone number will yield the ability to efficiently group data by area codes. Thus MGR_PHONE might be decomposed into MGR_AREA_CODE and MGR_PHONE. The more you decompose the data into their component parts, the greater the search flexibility. Data that are decomposed into their most basic components are said to be atomic.
 4.      What data redundancies do you detect? How could those redundancies lead to anomalies?
 Note that the manager named Holly B. Parker occurs three times, indicating that she manages three projects coded 21-5Z, 25-9T, and 29-2D, respectively. (The occurrences indicate that there is a 1:M relationship between PROJECT and MANAGER: each project is managed by only one manager but, apparently, a manager may manage more than one project.) Ms. Parker's phone number and address also occur three times. If Ms. Parker moves and/or changes her phone number, these changes must be made more than once and they must all be made correctly... without missing a single occurrence. If any occurrence is missed during the change, the data are "different" for the same person. After some time, it may become difficult to determine what the correct data are. In addition, multiple occurrences invite misspellings and digit transpositions, thus producing the same anomalies. The same problems exist for the multiple occurrences of George F. Dorts.
 5.      Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure P1.5.
 FIGURE P1.5 The File Structure for Problems 5-8
 NOTE
It is not too early to begin discussing proper structure. For  example, you may focus student attention on the fact that, ideally, each row  should represent a single entity. Therefore, each row's fields should define  the characteristics of one entity, rather than include characteristics of  several entities. The file structure shown here includes characteristics of  multiple entities. For example, the JOB_CODE is likely to be a characteristic  of a JOB entity. PROJ_NUM and PROJ_NAME are clearly characteristics of a  PROJECT entity. Also, since (apparently) each project has more than one  employee assigned to it, the file structure shown here shows multiple occurrences  for each of the projects. (Hurricane occurs three times, Coast occurs twice,  and Satellite occurs four times.)
  Given the file's poor structure, the stage is set for multiple anomalies. For example, if the charge for JOB_CODE = EE changes from $85.00 to $90.00, that change must be made twice. Also, if employee June H. Sattlemeier is deleted from the file, you also lose information about the existence of her JOB_CODE = EE, its hourly charge of $85.00, and the PROJ_HOURS = 17.5. The loss of the PROJ_HOURS value will ultimately mean that the Coast project costs are not being charged properly, thus causing a loss of PROJ_HOURS*JOB_CHG_HOUR = 17.5 x $85.00 = $1,487.50 to the company.
 Incidentally, note that the file contains different JOB_CHG_HOUR values for the same CT job code, thus illustrating the effect of changes in the hourly charge rate over time. The file structure appears to represent transactions that charge project hours to each project. However, the structure of this file makes it difficult to avoid update anomalies and it is not possible to determine whether a charge change is accurately reflected in each record. Ideally, a change in the hourly charge rate would be made in only one place and this change would then be passed on to the transaction based on the hourly charge. Such a structural change would ensure the historical accuracy of the transactions.
 You might want to emphasize that the recommended changes require a lot of work in a file system.
 6.      Looking at the EMP_NAME and EMP_PHONE contents in Figure P1.5, what change(s) would you recommend?
 A good recommendation would be to make the data more atomic. That is, break up the data componnts whenever possible. For example, separate the EMP_NAME into its componenst EMP_FNAME, EMP_INITIAL, and EMP_LNAME. This change will make it much easier to organize employee data through the employee name component. Similarly, the EMP_PHONE data should be decomposed into EMP_AREACODE and EMP_PHONE. For example, breaking up the phone number 653-234-3245 into the area code 653 and the phone number 234-3245 will make it much easier to organize the phone numbers by area code. (If you want to print an employee phone directory, the more atomic employee name data will make the job much easier.)
  7.   Identify the various data sources in the file you examined in Problem 5.
 Given their answers to problem 5 and some additional scrutiny of Figure 1.5, your students should be able to identify these data sources:
·         Employee data such as names and phone numbers.
·         Project data such as project names. If you start with an EMPLOYEE file, the project names clearly do not belong in that file. (Project names are clearly not employee characteristics.)
·         Job data such as the job charge per hour. If you start with an EMPLOYEE file, the job charge per hour clearly does not belong in that file. (Hourly charges are clearly not employee characteristics.)
·         The project hours, which are most likely the hours worked by the employee for that project. (Such hours are associated with a work product, not the employee per se.)
 8.   Given your answer to Problem 7, what new files should you create to help eliminate the data redundancies found in the file shown in Figure P1.5?
 The data sources are probably the PROJECT, EMPLOYEE, JOB, and CHARGE. The PROJECT file should contain project characteristics such as the project name, the project manager/coordinator, the project budget, and so on. The EMPLOYEE file might contain the employee names, phone number, address, and so on. The JOB file would contain the billing charge per hour for each of the job types – a database designer, an applications developer, and an accountant would generate different billing charges per hour. The CHARGE file would be used to keep track of the number of hours by job type that will be billed for each employee who worked on the project.
 9.   Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure P1.9. (The file is meant to be used as a teacher class assignment schedule. One of the many problems with data redundancy is the likely occurrence of data inconsistencies – that two different initials have been entered for the teacher named Maria Cordoza.)
 FIGURE P1.9 The File Structure for Problems 9-10
 Note that the teacher characteristics occur multiple times in this file. For example, the teacher named Maria Cordoza’s first name, last name, and initial occur three times. If changes must be made for any given teacher, those changes must be made multiple times. All it takes is one incorrect entry or one forgotten change to create data inconsistencies. Redundant data are not a luxury you can afford in a data environment.
 10.  Given the file structure shown in Figure P1.9, what problem(s) might you encounter if building KOM were deleted?
 You would lose all the time assignment data about teachers Williston, Cordoza, and Hawkins, as well as the KOM rooms 204E, 123, and 34. Here is yet another good reason for keeping data about specific entities in their own tables! This kind of an anomaly is known as a deletion anomaly.
0 notes