Access database, Basic Computer Science

Assignment Help:
1.Add a Validation Rule for Date of Birth so no one under the age of 18 can be added to the table. Hint: subtract the DOB from today''s date and divide by 365.25 (watch the parentheses and pay attention to the arithmetic "order of operations" ) Do NOT use any functions here or in the queries that we did not discuss. (More below on using "today''s date" function)

2.Make a Validation Rule to ensure that the Check Out Date is later than the Check In Date.

3.Make a select query with a calculated field for age, to list only guests between 20 and 40 years of age! Make sure to enter a range of ages in your table so you have something to display.

4.Make a Parameter query that allows the user to choose which birth month to display. So when the user is prompted for a birth month, they might type in 3, for March, and only the records which have a Date of Birth in March, will display.

5.Make an Update Query that will add the phrase "Free Champagne for this Preferred Guest" to the Comments field, but only if the guest stays for 8 days or more.


Related Discussions:- Access database

Some CPUs provide multiple modes of operation, even though most systems onl...

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy.

Historical background of computers, Historical Background The br...

Historical Background The brief history of the growth of computers is given below: Abacus:   It was the first mechanical device developed approximately 3,000 year

Artificial intelligence-specifying search problems, Specifying Search Probl...

Specifying Search Problems In our agent expressions, a problem to be solved is a specific task where the agent starts with the atmosphere in a given state and acts upon the env

What is the importance of using digital certificates, QUESTION a) Crypt...

QUESTION a) Cryptography is a set of techniques and mathematical algorithms. Describe four important areas where cryptography must be applied b) What is the importance of us

Copmurer, Classify computer systems according to capacity. How they are dif...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

Java programming, Write a program that lets the user play the game Rock, Pa...

Write a program that lets the user play the game Rock, Paper, Scissors against the computer. The program should work as follows: ? When the program begins, the results of the prev

Primary or foreign key, QUESTION Your Library is currently offering acc...

QUESTION Your Library is currently offering access to the Internet for its subscribers on a fee paying basis. Subscribers should make a booking for each slot of one hour in adv

Depth first search-artificial intelligence, Depth First Search-Artificial i...

Depth First Search-Artificial intelligence: Depth first search is  similar to breadth first, except that things are added to the top of the plan rather than the bottom. In our

Diskless workstations, Diskless workstations:    Most people assume th...

Diskless workstations:    Most people assume that the operating system is stored on a disk that is connected directly to the computer, but this is not necessarily true. If the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd