Enforce referential integrity, Database Management System

Assignment Help:

Use Access 2007 to create a database called UniLib.mdb. - this file should be created on your personal drive at the university (or C: if you're using Access 2007 at home) and then copied onto your disk for handing in.

i) Create the following four tables; all fields must be of correct type and suitable size. The "Required" field property should be used appropriately (but sparingly).  You are required to establish correct relationships between the tables and enforce referential integrity.

BORROWER            to store data about each borrower to have 5 text fields (Student ID (primary key - 7 characters long), First Name, Last Name, Program, Study Mode)

1 Yes/No field called Suspended (to indicate whether the borrower is suspended - almost always "No"; it is only "Yes" if the borrower has committed a serious offence such as refusing to return a long-standing loan)

1 number field called Books Borrowable (the number of books the borrower is still able to borrow) indexes are to be created on the fields Student ID, Last Name, Program, Books Borrowable by using a "Lookup Field", the Program field is to be restricted to the values "BCom", "BBIT", "BEc", "BFin", "MCom", "PhD" by using a "Validation Rule", the Study Mode field is to be restricted to either "F" (for full-time) or "P" (for part-time)

Study Mode is to default to "F" (but, when you enter your data, override this default as required)

Suspended is to default to "No" (but, when you enter your data, override this default as required) the Books Borrowable field is to be restricted to an integer value between 0 and 4 (it is equal to 4 for borrowers with no current loans; the library's application software reduces it by 1 each time a borrower takes out a loan, and increases it by 1 each time a loan is returned; whenever its value reaches 0, the software blocks the borrower from taking out any more loans - none of this processing is part of this assignment). Therefore, no borrower can have more than 4 current loans

Books Borrowable is to default to 4 (but, when you enter your data, override this default as required)


Related Discussions:- Enforce referential integrity

Boyce-codd normal form (bcnf), Boyce-Codd Normal Form (BCNF) The relati...

Boyce-Codd Normal Form (BCNF) The relation NEWSTUDENT (Enrolmentno, Sno, Sname, Cname, Cno,) has every attributes participating in candidate keys as all the attributes are assu

Advantages and drawbacks of ddbms, Advantages And Drawbacks Of Ddbms  T...

Advantages And Drawbacks Of Ddbms  There are various reasons for building distributed database systems, with sharing of data, reliability and availability, and speedup of query

Describe the primary key functions, Describe the primary key functions? ...

Describe the primary key functions? Primary Key : The primary key is an attribute or a set of attributes in which uniquely identify a specific example of an entity. Every entit

The data of a view is not physically stored, The data of a view is not phys...

The data of a view is not physically stored, but derived from one or more tables. True the data of a view is not physically stored

Illustrate the state model for the atm class, Illustrate the State model fo...

Illustrate the State model for the ATM class let us take state model for the ATM class given below in Figure showing state model of the ATM class and the pseudo code derived fr

Explain the term- query, Explain the term- Query. Queries are used to re...

Explain the term- Query. Queries are used to repossess and show specific records in a table. They can also be used to show specific fields of specific records, which meet the co

Define a relation schema, A Relation Schema represented by R(A1, A2, .....

A Relation Schema represented by R(A1, A2, ..., An) is made up of the relation name the list of attributes and R Ai that it contains. A relation is described as a set of tuples

Define deadlock recovery measures, Define Deadlock recovery measures       ...

Define Deadlock recovery measures                   To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollbac

What are the benefits of decomposing a system, What are the benefits of dec...

What are the benefits of decomposing a system? The benefits of decomposing a system into subsystems are that after decomposition, each individual component become smaller and e

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd