Create a database called wincarrentals that has all tables

Assignment Help Computer Engineering
Reference no: EM133542713

Assignment: Advance Database- Group Database Design Project

Details

Design and implement a database that support a firm involved in various activities. It must have stored functions and procedures. The database can be accessed by a specific user with suitable security and authentication facilities.

Learning Outcome

1) Model, design and implement complex database structures (including databases distributed over a network) using a relational database management system (RDBMS)

2) Apply advanced SQL programming (often as a stored procedure) to fulfill complex data/information retrievals from an RDBMS

3) Develop and apply scripts and configure web server software as part of a Web database

4) Examine how modern RDBMSs manage multiple concurrent user access to a database as well as how these RDBMSs manage online or real-time backup and recovery processes

Task

Your group has started a small consulting services business in developing databases.

WIN Car rental services is a small business in Sydney. As the name suggests they are in the business of car rentals. They approached you to develop a database for their business. Till date they are using an excel file to manage their business. The excel file is attached with this assignment document. Have a look at it before you start working on the assignment.

The entities required for the database are as follows:

1. Customer - customerId, lastName, firstName, address, postcode, state, phone, memberDate.

2. Insurance - insuranceId, insuranceType, price

3. Vehicle:rego, description, make, model, carYear, value, engineCapacity, odometer, purchaseDate, vehicleTypeId.

4. Rental: rentalId, bookingDate, bookingMethod, checkout, rentDays, checkin, dueDate, odometerIn, damage, paymentId, rego, customerId, insuranceId.

5. VehicleType: VehicleTypeID, VehicleType, Charge.

6. RentalCharge:RentalID, Rent.

7. PayType: Payment_ID, Pay_Type.

Along with the database files you were asked to submit other documentation as listed below:

Task A

I. ER Diagram in Crows Foot Notation. (Draw using Draw.io)

1. Primary keys and foreign keys must be identified.
2. All attributes must be identified.
3. All relationships (both directions) must be clearly listed.

II. Data dictionary (create in Excel)

III. Any other required information.

Task B

The following SQL files must be submitted.

I. SQL Statements to create the database and insert at least 5 records in every table.

1. Create a database called "winCarRentals" that has all the above listed tables.

2. Insert all the data shown in the excel file.

3. Create a minimum of 5 customers. You four people and me.

4. Create at least 3 rentals.

II. SQL statements to incorporate functions and triggers in the database.

1. When data is inserted in the customer table, CustomerMemberDatemustbebeforeorequaltothecurrentdate.

2. When data is inserted in the vehicle table, Vehicle's PurchaseDate, must be before or equal to the current date.

3. When data is inserted in the rental table, rental booking date, checkoutdate must be after or equal to the current date.

4. When a vehicle is checked in (the check-in filed is set to null when the record is created, when the vehicle is returned, check in date is set to the returned date), the rental must be calculated and stored in the rental charge table.

III. SQL statements to run a number of report queries.

1. Write a query to print the list of customers who did not rent a vehicle.
2. Write a query to display the cars that are currently on rent.

Reference no: EM133542713

Questions Cloud

Develop a comprehensive plan for an event : Assessment Task - Project - Develop a comprehensive plan for an event, integrating relevant business theories, knowledge and tools, and the needs
What cyber crime theory you believe applies to the case : ISSC 451- Describe a recent cybercrime and what cyber crime theory you believe applies to this case? Explain the reasons why the theory you picked applies.
Write paper about cryptography encryption and stream ciphers : ISSC 266- Write a paper about Cryptography, Encryption, Stream Ciphers, Block Ciphers, Public-Key Cryptography, RSA Cryptosystem and Digital Signatures.
What are some potential limitations to making vaccination : What are some potential limitations to making Vaccination a Default option and Implementation of Fines and Rewards?
Create a database called wincarrentals that has all tables : Create a database called winCarRentals that has all the above listed tables. Insert all the data shown in the excel file. Create a minimum of 5 customers.
Over-estimating the real-world impact of the diagnosis : A diagnosis can change a patient's life. In some cases, a patient may react with shock, over-estimating the real-world impact of the diagnosis.
Number of older people is increasing : In Australia and around the world, the number of older people is increasing. While many older people continue to live active lives,
Write a paper on cheetah chase algorithm : Write a paper on Cheetah chase algorithm (CCA): a nature-inspired metaheuristic algorithm
Discussion of the current digital health care : Discussion of the CURRENT DIGITAL HEALTH CARE TECHNOLOGIES AVAILABLE for these communities. Including if they provide quality care and service provision

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd