Give examples, different from those in the text, of syntactic and semantic transforma- tions that might have to be made while loading data into a data warehouse.

What will be an ideal response?

Syntactic transformation: one database schema use one string to representing a
student’s name, while another might use two strings (last name and first name).
Semantic transformation: One schema might store grades as A, B, C, D, and F,
while another might allow + and - grades, such as B+ or C-.

Computer Science & Information Technology

You might also like to view...

Modify the selection sort algorithm so it avoids the element move step if the element is already in the correct position. On what basis would you decide that the cost of this extra check outweighs the cost of not doing the check?

What will be an ideal response?

Computer Science & Information Technology

All of the following are additional methods of Web security EXCEPT:

A) restrict the number of users on the Web server. B) restrict access to the Web server. C) remove unneeded programs. D) blacklist bad users.

Computer Science & Information Technology