Create a database model, Database Management System

Assignment Help:

Submit the table creation statements (including constraints) for the Database Model. Submit them all in a single script file.

Also submit a document explaining what test data you used to test your constraints. This would be data that you aren't including in your insert data for this assignment because you were using it to make sure the constraints were working (that is, as long as everything is working correctly, the database won't accept it).

1) Create a database based on the below model.

199_Create a Database Model.png

Save your table creation statements as a script (you'll be submitting this script). Your script should follow the diagram exactly. Be sure to include the necessary constraints.

2) Create sample data. (See below for some sample data)  Save the scripts that load the data. Test the constraints with appropriate data. The data will be used for the reports described next.

3) Create SQL scripts for the assigned reports.


Related Discussions:- Create a database model

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Er model, There are a number of possible solutions to the open ended brief....

There are a number of possible solutions to the open ended brief. One of the simple ones is shown here without the PKs and FKs. It is important to think of how a number of tasks

Write a qbe query to display names of cs department, Consider a table stude...

Consider a table student (std_id, std_name, date_of_birth, percent_marks, dept_name). Write a QBE query to display names of Computer Science department students who have scored mo

How does the two phase protocol ensure serializability, How does the two ph...

How does the two phase protocol ensure serializability in database schedules?   Ans:  A transaction is termed to follow the two-phase locking protocol if all locking operations

Implementing a data mining algorithm, i need to implememnt a treee based mi...

i need to implememnt a treee based mining algorithm. do you have an expert that can do that?

What is called as an n-way merge, What is called as an N-way merge? The...

What is called as an N-way merge? The merge operation is a generalization of the two-way merge used by the standard in-memory sort-merge algorithm. It merges N runs, so it is k

Fundamental operations that are regular to mysql programs, What are the thr...

What are the three fundamental operations that are regular to MySQL Programs? a) Establishing a connection to the MySQL server b) Choosing a database. c) Disconnecting fr

How to deal with the authentication problem, Most computer systems authenti...

Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,

Relationship for college database, Using the concepts defined previous, we ...

Using the concepts defined previous, we have identified that strong entities in COLLEGE database are FACULTY, STUDENT, COURSE and DEPARTMENT. This database also has one weak entity

What are audit trails, What are audit trails? An audit trail is a log o...

What are audit trails? An audit trail is a log of all alters to the database along with information like which user performed the change and when the alter was performed.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd