Database incident table, Database Management System

Assignment Help:

The Incident table, with an auto-incrementing incident number, etc, looks like:

incident_num

reporter

date

time

incident_description

category

1

john1

2011-01-10

16:17:34

Can't remote login to AFS

network

2

bert456

2011-01-04

15:09:57

Password reset failed

system

4

john1

2010-12-29

15:10:59

DB Account requested

DB admin

Data sources:  The times and dates are internally generated by MySQL based on the data types used in the table. The remaining fields, with the exception of the Incident_num which is internally generated, are determined by the HTML form inputs.  Some form inputs are not inserted into the database but just used to guide processing [like the reporters indication as to whether they want an email copy of a submitted report,  or not].  Some inputs like the email address, and the reporter (name) and password are already in database tables, and are only accessed [retrieved] for purposes of controlling authentication or email authorization.  Some database columns, like the email limit for a reporter and their current number of sent emails, are entered manually using phpMyAdmin.  They may be accessed for decision-making [like the email limit for an address] and update by the program when an email is sent.


Related Discussions:- Database incident table

The need for three level architecture, The need for three level architectur...

The need for three level architecture The aim of the three level architecture is to divide each user's view of the database from the way the database is physically shown.

Explain the disadvantages of a file processing system, Explain the disadvan...

Explain the disadvantages of a file processing system? Ans: Disadvantages of File Processing Systems include: 1) Data Redundancy 2) Data Inconsistency 3) Difficult to acce

Data manipulation language, Question 1 Discuss about second normal form an...

Question 1 Discuss about second normal form and third normal form Question 2 Write short note on                        1) Data Manipulation Language 2) Data Definition La

Explain the term - handling boundary condition, Explain the term - Handling...

Explain the term - Handling Boundary Condition These are some circumstances that to be handled in any system initialization and termination. Describes how system is bro

What are costs to be considere when transaction is roll back, What are the ...

What are the costs to be considered when a transaction has to be rolled back when recovering from deadlock?         Ans: A few transaction will must rolled back (made a victim)

Represent the form as a relational schema, Question: This form represen...

Question: This form represents one of a number used for each sailing of a range of boats. A passenger may go on many sailings and will have the same passenger number for each.

Explain different addressing modes of 8086, 1. Explain different addressing...

1. Explain different addressing modes of 8086 Explanation of all addressing modes 2. Write a sequence of instructions to exchange two register contents using stack

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd