Enforce referential integrity, Database Management System

Assignment Help:

Use Access 2007 to create a database called UniLib.mdb. - this file should be created on your personal drive at the university (or C: if you're using Access 2007 at home) and then copied onto your disk for handing in.

i) Create the following four tables; all fields must be of correct type and suitable size. The "Required" field property should be used appropriately (but sparingly).  You are required to establish correct relationships between the tables and enforce referential integrity.

BORROWER            to store data about each borrower to have 5 text fields (Student ID (primary key - 7 characters long), First Name, Last Name, Program, Study Mode)

1 Yes/No field called Suspended (to indicate whether the borrower is suspended - almost always "No"; it is only "Yes" if the borrower has committed a serious offence such as refusing to return a long-standing loan)

1 number field called Books Borrowable (the number of books the borrower is still able to borrow) indexes are to be created on the fields Student ID, Last Name, Program, Books Borrowable by using a "Lookup Field", the Program field is to be restricted to the values "BCom", "BBIT", "BEc", "BFin", "MCom", "PhD" by using a "Validation Rule", the Study Mode field is to be restricted to either "F" (for full-time) or "P" (for part-time)

Study Mode is to default to "F" (but, when you enter your data, override this default as required)

Suspended is to default to "No" (but, when you enter your data, override this default as required) the Books Borrowable field is to be restricted to an integer value between 0 and 4 (it is equal to 4 for borrowers with no current loans; the library's application software reduces it by 1 each time a borrower takes out a loan, and increases it by 1 each time a loan is returned; whenever its value reaches 0, the software blocks the borrower from taking out any more loans - none of this processing is part of this assignment). Therefore, no borrower can have more than 4 current loans

Books Borrowable is to default to 4 (but, when you enter your data, override this default as required)


Related Discussions:- Enforce referential integrity

Define the one-way associations, One-way Associations When an associat...

One-way Associations When an association is traversed only in the one direction, then it is implemented as a pointer i.e.an attribute which contains an object reference. If mu

How many types of views are there, How many types of Views are there? ...

How many types of Views are there? There are Four types of views:- Database View Help View Projection View Maintenance View

How can you map null values to other values while display, How can you map ...

How can you map NULL values to other values while display? IF( ) , IFNULL( ) keywords are used to do so. They are 'LIMIT' is used for the following kinds of problems: 1) Ans

Describe parameteric end users, Describe Parameteric end users? Paramet...

Describe Parameteric end users? Parametric end users might be given update access, but are commonly not permitted to change the structure of data.

List any eight applications of dbms, List any eight applications of DBMS. ...

List any eight applications of DBMS. a) Universities b) Airlines c) Banking d) Credit card transactions e) Tele communication f) Sales g)Finance h) Manufac

Create a view containing name and number of department, Create a view emp_d...

Create a view emp_dep containing e_name and number of dependents from the tables employee and dependent of (i) CREATE VIEW emp_dept AS SELECT ename, COUNT(*) FROM employee, dep

What is meant by log-based recovery, What is meant by log-based recovery? ...

What is meant by log-based recovery? The most widely used structures for recording database changes is the log. The log is a sequence of log records, recording all the update a

Cartesian product, If R1 and R2 are two relations or functions, then the re...

If R1 and R2 are two relations or functions, then the result of R3 = R1 × R2 is the combination of tuples that are in R1 and R2. The product is associative and commutative. Degr

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd