Saturday, March 22, 2008

Order Acceptance System

Inventory Update Software

Order Management Database



Order Management System-Specifications

Order Management System

The name of my firm is “Angelic Beauty” which deals with soap. We generally deal with 10 varieties of soap which are in much demand in the local market. I have a team of 20 sales persons who go around the state collecting orders from our respective distributors. The central warehouse where we keep our inventories of goods requires a proper track of the orders and hence is necessary to be updated every time the orders are picked by the sales force. Care should be taken that the sales force does not pick up orders for which there is no inventory in the warehouse.

Only those orders are accepted where there is sufficient amount of inventory available and so before the acceptance of any order, the inventory needs to be checked and simultaneously the central database needs to be updated. The reduction of the inventory should be in accordance to the number of orders placed.

Details of the available inventory in the central warehouse
The maximum inventory available at any point for any product is 1050.
The following is the list of products along with their prices:

Baby Soap -Rs38
Breeze -Rs12
Lux -Rs13
Palmolive -Rs10
Hamam -Rs8
Medimix -Rs17
Santoor -Rs12
Dove -Rs35
Pears -Rs28
Liril -Rs15

Monday, February 25, 2008

How was the first compiler, compiled!

A compiler is a special type of computer program that translates a human readable text file into a form that the computer can more easily understand. At its most basic level, a computer can only understand two things, a 1 and a 0. At this level, a human will operate very slowly and find the information contained in the long string of 1s and 0s incomprehensible. A compiler is a computer program that bridges this gap. The original sequence is usually called the source code and the output called object code.

Towards the end of the 1950s, machine-independent programming languages were first proposed. Subsequently, several experimental compilers were developed. The first compiler was written by Grace Hopper, a pioneering computer scientist, in 1952, for the A-0 programming language. She said that she invented it because she was lazy and wished that "the programmer may return to being a mathematician."

The FORTRAN team led by John Backus at IBM is generally credited as having introduced the first complete compiler, in 1957. COBOL was an early language to be compiled on multiple architectures, in 1960.

In the beginning, compilers were very simple programs that could only translate symbols into the bits, the 1s and 0s, the computer understood. Programs were also very simple, composed of a series of steps that were originally translated by hand into data the computer could understand. This was a very time consuming task, so portions of this task were automated or programmed, and the first compiler was written. This program assembled, or compiled, the steps required to execute the step by step program.

These simple compilers were used to write a more sophisticated compiler. With the newer version, more rules could be added to the compiler program to allow a more natural language structure for the human programmer to operate with. This made writing programs easier and allowed more people to begin writing programs. As more people started writing programs, more ideas about writing programs were offered and used to make more sophisticated compilers. In this way, compiler programs continue to evolve, improve and become easier to use.

Monday, February 18, 2008

Sunday, February 17, 2008

SQL Assignment 3-Part B

STEPS TO EXECUTE SQL QUERY

STEP 1: Go to http://db.zoho.com and create a user ID
STEP 2: Create a table on an Excel Sheet. For Example: - It may include data like Serial Number, Name of the Customer, Brand, etc.
STEP 3: Sign in to http://db.zoho.com
STEP 4: Create a database by importing data directly from the Excel Sheet created
STEP 5: Run a query using SQL. For Example: - 3 queries were ran and were saved separately
• Query 1
SELECT "Sl. No.", "Name of the Customer", "Items Bought" FROM "Untitled-1"
• Query 2
SELECT "Sl. No.", "Name of the Customer", "Items Bought" FROM "Untitled-1" where "Quantity">2
• Query 3
SELECT "Sl. No.", "Name of the Customer", "Items Bought", "Brand", "Quantity" FROM "Untitled-1" where "Sl. No." > 7
STEP 6: Publish the following query tables on a blog

SQL Assignment 3 Query Tables





SQL Assignment 3 Main Table

Monday, February 11, 2008

Normalization of Library Information

Normalization of Library Information

Problem:

Roll Number, Name, email Address, phone number, late fine outstanding, book title, book author, book ISBN ( globally unique), book price, library catalog number ( for the copy), quality of the copy ( "perfect" / "damaged" ) date issued, date to be returned. Please arrange this information into an appropriate number of ENTITIES in THIRD NORMAL FORM

Solution:

The following solution is in the 3rd normal form


STUDENT

Roll Number- PK

Name

Phone Number

E-mail ID

Late Fine Outstanding


BOOK LIST

Library Catalog Number – PK

Issue List-FK

Quality of the Copy

No. of Copies Available


BOOK

Book ISBN – PK

Issue List-FK

Book List-FK

Book Author

Book Price

Book Title


ISSUE LIST

Issue No - PK

Library Catalog No-FK

Roll No -FK

Date Issued

Date to be Returned


PK – Primary Key

FK – Foreign Key

Wednesday, February 6, 2008

Sunday, February 3, 2008

System Architecture

Late in the evening my sister was quite confused regarding her IT project. She didn’t know where to begin and what to search and asked me for help. This is the conversation that took between us.

Aslesha : Let me start first with the topic of my project. What is this Systems Architecture?

Me : If we go by the definition, we can say that, Systems Architecture is the design or set of relations between the parts of a system.
Let me give you an example to make it more clear. Suppose we were setting out to build a home. The first thing would be to lay out the floor plans, then group each room by function and place structural items within each room according to their best utility. This is not any arbitrary process but actually is architecture.
The process does not change. It remains the same even if we move from home design to IT system design. Grouping data and processes into information systems creates the rooms of the system architecture. Arranging the data and processes for the best utility is the result of deploying the architecture.
Many of the attributes of building architecture are applicable to system architecture. Form, function, best use of resources and materials, human interaction, reuse of design, longevity of the design decisions, robustness of the resulting entities are all attributes of well designed buildings and well designed computer systems.
Aslesha : Ok. Can you tell me what is this Information Systems Engineering is?
Me : Suppose you have a set of data and you process it to get information. How you engineer this information, how you process it and get the maximum out of it explains Information Systems Engineering.
The way computer science refers to programs, the very same way information systems engineering refers to systems. In the first case, it has data structures and algorithms, while the latter has database and applications.
Aslesha : The way we have different algorithms for different programs, does it hold true for Information Systems Engineering?
Me : Yes, it holds true. Let me give you an idea regarding its types. There are basically four types on the basis of application architecture as it goes with the principle that data must be logically distinct from applications.
· Single Tier Integrated Systems – It follows the simple principle that data must be kept separate from applications even if they are on the same physical hardware, like laptop, desktop or server.
· Two Tier Integrated Systems – Here data is stored in a centralized server whose protocols can be written in certain server softwares like Oracle, mySQL, SQL server, DB2 and applications are stored on individual machines which are generally the users of this database. With the help of LAN (Local Area Network), the client machines or the users are connected to the server using TCP/IP protocols.
· Three Tier Integrated Systems – Here it distinguishes the application architecture into Business Logic and Presentation Logic.
The Business logic does not remain the same. With the changing environment and growing competition, the business rules changes due to which it is kept centrally. This helps to do any changes that are required only at one location.
With the passage of time, Presentation Logic does not undergo many changes. For example- the GUI (graphic User Interface), the window or the buttons remains the same. So it is kept locally so that data transfer over the network is minimized.
It uses WAN (Wide Area Network) to connect the users with the database.
· Multi Tier Integrated Systems – Here we introduce the application of internet in the form of web server to connect the web browsers, who are the users, with the database server.
Aslesha : Do these four types have any advantages or disadvantages?
Me : Yes all the four have same benefits as well as certain loop holes in their structure.
· Single Tier can be used if the business is small and there are no partners. There is only a single entity that uses the available database and processes it to his/her benefit.
· Two Tier can also be used in a small business because any change required can be done centrally, thus reducing the processing burden on server machine when there are considerable amount of users(say a 100).
But it requires high bandwidth when the number of users increases and thus the application might slow down or falter due to poor speed of flow of information. Moreover if the software is changed centrally, all the users have to do the same so as to access the database. Thus there is a problem of maintenance and version control of the distributed software.
· Three Tier also faces with the same problem of high bandwidth requirement and maintenance of software.
· Multi Tier does not require the implementation of a specialist software at each client location as the transfer of information occurs via the internet. It is inexpensive as we don’t have to invest in corporate network.
Internet is insecure as the competitor may try to hack the information and thus requires the implementation of security softwares and firewalls. Moreover the business requires all its applications to be web enabled.
Aslesha : All these architectures seem so complex and all of them have some lacunas. Will it be possible to get a system architecture by combining one or two?
Me : Very beautifully said Aslesha. Actually we can think of a system or an architecture which can be the combination of the Multi Tier.
We can have a consolidation of Multi Tier architecture where the Database, Application Server and the Web Server can all lie on the same machine or in different machines.
We can also have multiple applications where there would be distinct data for specific requirements which would be distributed across more than one machine. This can be developed in-house or can be bought from different vendors.
However, there is a fear of duplication of data as same data is available for different departments. Moreover the management becomes very complex.
Aslesha : Even the combination does not seem to solve our problem, rather it gets complex. How can we then get the best of the breed and also get rid of the complexity?
Me : There is always a solution to every problem.
· There is something called RDBMS or the Relational Data Base Management System. Here there is a central integrated database from where each department can access the necessary information. The problem of duplication of data can be solved and there would be consistency of data across locations and time period. Moreover it is easier to manage and a centrally security system can be employed for user authentication.
· We can also implement ERP (Enterprise Resource Planning) to manage the complexity. This will integrate all the functional areas and synchronize the data across the organization. It can be bought as a single package from reputed vendors, and hence faster to implement and easier to maintain.
· If the company goes global, we can also use internet to connect with our clients. The security problem can be solved by using firewalls at specific locations.
Aslesha : Man is always searching for a way to get rid of the problems and I don’t think it will stop unless and until it has found a way out which is perfect n unbreakable. Thanks a lot. Now I have all the necessary data to do my project.
Me : Anytime dear.