Enforce referential integrity, Database Management System

Assignment Help:

Use Access 2007 to create a database called UniLib.mdb. - this file should be created on your personal drive at the university (or C: if you're using Access 2007 at home) and then copied onto your disk for handing in.

i) Create the following four tables; all fields must be of correct type and suitable size. The "Required" field property should be used appropriately (but sparingly).  You are required to establish correct relationships between the tables and enforce referential integrity.

BORROWER            to store data about each borrower to have 5 text fields (Student ID (primary key - 7 characters long), First Name, Last Name, Program, Study Mode)

1 Yes/No field called Suspended (to indicate whether the borrower is suspended - almost always "No"; it is only "Yes" if the borrower has committed a serious offence such as refusing to return a long-standing loan)

1 number field called Books Borrowable (the number of books the borrower is still able to borrow) indexes are to be created on the fields Student ID, Last Name, Program, Books Borrowable by using a "Lookup Field", the Program field is to be restricted to the values "BCom", "BBIT", "BEc", "BFin", "MCom", "PhD" by using a "Validation Rule", the Study Mode field is to be restricted to either "F" (for full-time) or "P" (for part-time)

Study Mode is to default to "F" (but, when you enter your data, override this default as required)

Suspended is to default to "No" (but, when you enter your data, override this default as required) the Books Borrowable field is to be restricted to an integer value between 0 and 4 (it is equal to 4 for borrowers with no current loans; the library's application software reduces it by 1 each time a borrower takes out a loan, and increases it by 1 each time a loan is returned; whenever its value reaches 0, the software blocks the borrower from taking out any more loans - none of this processing is part of this assignment). Therefore, no borrower can have more than 4 current loans

Books Borrowable is to default to 4 (but, when you enter your data, override this default as required)


Related Discussions:- Enforce referential integrity

Advantages of data distribution, Advantages of Data Distribution The pr...

Advantages of Data Distribution The primary benefit of distributed database systems is the ability to access and share data in a reliable and efficient manner.

Determine advantages of merging an association into a class, What are the a...

What are the advantages and disadvantages of merging an association into a class?  Advantages: i)  Less number of tables ii) Faster performance due to the fewer tables

What is the main goal of raid technology, What is the main goal of RAID tec...

What is the main goal of RAID technology? Describe the levels 1 through 5. RAID stands for Redundant Array of Inexpensive (or sometimes "Independent")Disks. RAID is a met

Search the salary of employees who are not ‘analyst’ , Example- Search the ...

Example- Search the salary of employees who are not 'ANALYST' but get a salary below than or equal to any people employed as 'ANALYST'. SELECT EMPNO, ENAME, JOB, SAL FROMEMP

Which is a valid sql type, Which is a valid SQL type? A valid SQL Shoul...

Which is a valid SQL type? A valid SQL Should be in CHARACTER it is should be NUMERIC and FLOAT.

Normalization, Process of normalization is the integral part of designing a...

Process of normalization is the integral part of designing a database. Justify this statement with suitable database design

Heterogeneous ddb and homogeneous ddb, Probelm: (a) A distributed datab...

Probelm: (a) A distributed database (DDB) is a collection of multiple, logically interrelated databases which are physically distributed over a computer network" (i) Give a

Basic concept of data base management system, INTRODUCTION Databases a...

INTRODUCTION Databases and database systems have become an essential part of our daily life. We encounter many activities that involve some interaction with a database almost

find a non-redundant cover and canonical cove, Given the following set of ...

Given the following set of functional dependencies {cf→ bg, g → d, cdg → f, b → de, d → c} defined on R(b,c,d,e,f,g) a. Is cf→ e implied by the FDs? b. Is dg a superkey?

What is the use of integrity constraints, What is the use of integrity cons...

What is the use of integrity constraints? Integrity constraints make sure that changes made to the database by authorized users do not result in a loss of data consistency. The

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd