Reference no: EM1379133
Question: Construct a table for consumer. The manager tells me that this table needs to track the following data: all customers' social security number, first and last name, address, city, state and zip code, email, phone number, birth date, and date of applying for a library card. Your task is to first "sketch" a customer table (basically what data items or columns should be included in the table) using the Customer_information table at background section as an example. The table should contain the following:
- Column heading include all the attributes that need to be in this table.
- Populate the table with five records of data
Design one more table: Customer checkout table to track the books and CDs that the customer has checked out from the library. Customers and Customer Checkout table are related to one another.
The Customer table contains the basic data on each customer and the primary key is customer number. There is one row for each customer.
The Customer Checkout table contains the data for each book. The primary key consists of two pieces of data: Checkout number and customer number. One customer can check out 1 or more books/CDs at a time, but only one customer on a check out order.
If I were to draw an ER diagram of my complete design for the community library, I could use Visio, or Microsoft word feature to draw the chart, or write down the table schemata and describe the relationships among them.
Asymmetric encryption algorithm
: Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:
|
Program of law of total probability
: Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.
|
Design several security awareness posters
: With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.
|
Maximum utilisation of the corporate intranet link
: Determine the maximum utilisation of the corporate intranet link which can be permitted if the mean delay through the mux for voice calls is to be kept below 11.755 ms during the busy hour.
|
Creating er diagram
: Construct a table for consumer. The manager tells me that this table needs to track the following data: all consumers' social security number, first and last name, address, city,
|
Java program editing
: Prompt the user for the student's score and put that value into an object
|
Finding java code error
: Indicate in the given code segment if an error occurs. If so, point to whether it is syntax, runtime or logic and how you would fix it.
|
Write the bubble sort
: The village of Marengo conducted a census and collected records that have household data, including the number of occupants in each household.
|
Describe an example of an equity investment
: Describe an example of an equity investment that can also produce income and describe a real or made up but realistic situation that could cause you or someone you know to have to use money from a financial reserve.
|