Database incident table, Database Management System

Assignment Help:

The Incident table, with an auto-incrementing incident number, etc, looks like:

incident_num

reporter

date

time

incident_description

category

1

john1

2011-01-10

16:17:34

Can't remote login to AFS

network

2

bert456

2011-01-04

15:09:57

Password reset failed

system

4

john1

2010-12-29

15:10:59

DB Account requested

DB admin

Data sources:  The times and dates are internally generated by MySQL based on the data types used in the table. The remaining fields, with the exception of the Incident_num which is internally generated, are determined by the HTML form inputs.  Some form inputs are not inserted into the database but just used to guide processing [like the reporters indication as to whether they want an email copy of a submitted report,  or not].  Some inputs like the email address, and the reporter (name) and password are already in database tables, and are only accessed [retrieved] for purposes of controlling authentication or email authorization.  Some database columns, like the email limit for a reporter and their current number of sent emails, are entered manually using phpMyAdmin.  They may be accessed for decision-making [like the email limit for an address] and update by the program when an email is sent.


Related Discussions:- Database incident table

What is sql profiler, What is SQL Profiler? SQL Profiler is a graphical...

What is SQL Profiler? SQL Profiler is a graphical tool that permits system administrators to monitor events in an instance of Microsoft SQL Server. You can capture and save dat

RDM & ER Modelling, #questiRegional Gardens has many nurseries, including W...

#questiRegional Gardens has many nurseries, including Wagga Wagga, Bathurst, Albury, Orange, and Dubbo. Each nursery is known by its campus code, eg WW, B, A, O and D respectively.

Explain degree of relation, Explain degree of relation? Degree of a Re...

Explain degree of relation? Degree of a Relation - The degree or arity of a relation is the number of attributes n of its relation schema.

Enforce referential integrity, Use Access 2007 to create a database calle...

Use Access 2007 to create a database called UniLib.mdb. - this file should be created on your personal drive at the university (or C: if you're using Access 2007 at home) and t

Abap/4 program, It is not possible to make an ABAP/4 program, which having ...

It is not possible to make an ABAP/4 program, which having only Subroutines. False. We can make ABAP/4 program, which having only Subroutines.

What is key, What is key ? Key - A single attribute or a combination of...

What is key ? Key - A single attribute or a combination of two or more attributes of an entity set which is used to recognize one or more instances (rows) of the set (table) is

Note gate, i want notes on this topic

i want notes on this topic

Compare three clustering algorithms in weka, Compare three clustering algor...

Compare three clustering algorithms in Weka. For this comparison, you will need to use at least two different datasets. Run the algorithms on the datasets, and use the visual

Table handling, Table Handling  In RDBMS more than one table can be tac...

Table Handling  In RDBMS more than one table can be tackled at a time by using join operation. Join operation is a relational operation that causes 2 tables with a common domai

Insertion anomaly-data redundancy, Insertion Anomaly: Inability to show ce...

Insertion Anomaly: Inability to show certain information-The primary key of the over relation be (enrolment number, Cno). Any new tuple to be inserted in the relation should have

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd