Enforce referential integrity, Database Management System

Assignment Help:

Use Access 2007 to create a database called UniLib.mdb. - this file should be created on your personal drive at the university (or C: if you're using Access 2007 at home) and then copied onto your disk for handing in.

i) Create the following four tables; all fields must be of correct type and suitable size. The "Required" field property should be used appropriately (but sparingly).  You are required to establish correct relationships between the tables and enforce referential integrity.

BORROWER            to store data about each borrower to have 5 text fields (Student ID (primary key - 7 characters long), First Name, Last Name, Program, Study Mode)

1 Yes/No field called Suspended (to indicate whether the borrower is suspended - almost always "No"; it is only "Yes" if the borrower has committed a serious offence such as refusing to return a long-standing loan)

1 number field called Books Borrowable (the number of books the borrower is still able to borrow) indexes are to be created on the fields Student ID, Last Name, Program, Books Borrowable by using a "Lookup Field", the Program field is to be restricted to the values "BCom", "BBIT", "BEc", "BFin", "MCom", "PhD" by using a "Validation Rule", the Study Mode field is to be restricted to either "F" (for full-time) or "P" (for part-time)

Study Mode is to default to "F" (but, when you enter your data, override this default as required)

Suspended is to default to "No" (but, when you enter your data, override this default as required) the Books Borrowable field is to be restricted to an integer value between 0 and 4 (it is equal to 4 for borrowers with no current loans; the library's application software reduces it by 1 each time a borrower takes out a loan, and increases it by 1 each time a loan is returned; whenever its value reaches 0, the software blocks the borrower from taking out any more loans - none of this processing is part of this assignment). Therefore, no borrower can have more than 4 current loans

Books Borrowable is to default to 4 (but, when you enter your data, override this default as required)


Related Discussions:- Enforce referential integrity

What is meant by object identifiers, What is meant by object identifiers? ...

What is meant by object identifiers? Object-oriented systems use an object identifier to recognize objects. Object identifiers are unique: that is every object has a single ide

converting eerd, Create centralized relational database using Top down met...

Create centralized relational database using Top down method- Construction of Logical Model: Translation EERD into Relational Schema: Use the 8 steps algorithm of converting EERD

Need website hacking security test, We want have a website; we need to test...

We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like

Example of sequences, Example : Create a sequence named SEQSS that starts a...

Example : Create a sequence named SEQSS that starts at 105, has a step of 1 and can take maximum value as 2000.  CREATE SEQUENCE SEQSS START WITH 105 INCREMENT BY 1 MAX VA

Improve efficiency in query evaluation, Question: AirwaysCentre, an int...

Question: AirwaysCentre, an international airline booking company currently uses a relational database system for their operations, which includes the following relations: P

What is meant by functional dependencies, What is meant by functional depen...

What is meant by functional dependencies? Consider a relation schema R and α C R and β C R. The functional dependency α ->β  holds on relational schema R if in any legal relati

Relational model, A model in database system mostly defines the organisatio...

A model in database system mostly defines the organisation of data or structure and a set of operations on that data. Relational model is a easy model in which database is represen

Design an algorithm to implement operations, Design an algorithm to impleme...

Design an algorithm to implement operations  Each and every operation specified in the functional model could be formulated as an algorithm. The algorithm indicates how operat

FIELDS, 4. Describe three ways to handle missing field values

4. Describe three ways to handle missing field values

Define deadlock prevention, Define Deadlock prevention These protocols...

Define Deadlock prevention These protocols make sure that the system will never enter a deadlock state. There are two methods to deadlock prevention. One approach makes sure t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd