Design a database

Assignment Help Basic Computer Science
Reference no: EM131878826

Part 1: Using Microsoft Sql Server Express or Microsoft Access, design a database with one table to store the following information:

  • Student_ID - 6 digit alphanumeric string that must begin with a lowercase letter
  • Student_FirstName - must only contain valid alphabet characters and cannot be blank
  • Student_LastName -- must only contain valid alphabet characters and cannot be blank
  • Student_Major - must be a selection of the following from a dropdown combo boxBusiness Administration
  • Computer Science
  • Information Systems
  • Justice Administration
  • Psychology
  • Student_PhoneNumber - must be of the format 555-555-5555 and cannot be blank
  • Student_EmailAddress - must be of the proper email format

Reference no: EM131878826

Questions Cloud

Analyze the flow of money and goods in an economy : Using the circular flow model, explain the flow of money and goods in an economy. How the economy coordinates society's independent economic actors.
Develop the cost management plan : This Assignment is designed to evaluate your ability to research, organize, and demonstrate project data and financial information pertaining to the development
What is the fair premium for the corresponding put : Consider a European put option with the same expiration time T = 1 and same strike price K = $68, what is the fair premium for the corresponding put?
Prepare a project spend plan or budget with cumulative cost : Using the example in the ISA Project documents and using the example of building a project spend plan or budget with cumulative cost curve.
Design a database : Part 1: Using Microsoft Sql Server Express or Microsoft Access, design a database with one table to store the following information:
Operating leverage at financial break-even level of output : What is the degree of operating leverage at the financial break-even level of output?
Depreciation is straight-line to zero over life of project : Assume that depreciation is straight-line to zero over the life of the project. What are the best-case NPV and the worst-case NPV respectively?
Write a program that prints a list with separated by a comma : Write a program that prints a list with all the items separated by a comma and a space, with and inserted before the last item
What is the average accounting return for the given machine : Gallatin inc is considering an investment of 380,000 in an asset with an economic life of five years. What is the average accounting return for this machine?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the taxable income-subtract the sum

Function taxAmount: This function computes and returns the tax owed. To calculate the taxable income, subtract the sum of the standard exemption, the amount contributed to a pension plan, and the personal exemption, which is $1,500 per person. (No..

  What is the spread spectrum technique used by bluetooth

What is the modulation technique in the radio layer of Bluetooth? In other words, how are digital data (bits) changed to analog signals (radio waves)?

  Compute the shortest path

Use Dijkstra's shortest-path algorithm to compute the shortest path from x to all network nodes - computes their Distance Vector for network

  Strategic management of technological innovation

You can pick any topic you wish but it MUST be some innovative piece of technology or innovative process from history or one that you feel is innovative.

  Modify solution and categorize it using big-theta notation

Sometimes a slight change in the problem can significantly modify form of its solution. For instance, determine simple algorithm for solving following problem and categorize it using big-theta notation.

  Historical and philosophical foundations of education

Plato, Socrates, Quintillian and many others had ideas about educating. What are some of the most significant contributions of ancient philosophers.

  How enciphering of connections would affect thumbprinting

If the connection contents were enciphered using a link encipherment protocol, would thumbprinting work? Why or why not?

  Harmful effects of deforestation

The harmful effects of deforestation can reduce biodiversity and the ecological services provided by forests on a global scale.

  The two main forms of documentation

The two main forms of documentation of program design are flowcharts and pseudcode. Based on this week's text chapter and some relevant web resources, discuss the differences between flowcharts and pseudocode, as well as their merits and faults.

  Configure a computer for a proxy server

What two things are needed in order to configure a computer for a proxy server?

  Clearly labeled with a cancer warning question

In March 2012, the state of California started requiring that all packaging for food and drink with the additive 4-methylimidazole (4-MI) be clearly labeled with a cancer warning. Because of this, both Pepsi and Coke changed their formula to elimi..

  Implement the two-dimensional viewing pipeline

As an option, a viewing table could be implemented to store different sets of viewing transformation parameters.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd