Enforce referential integrity, Database Management System

Assignment Help:

Use Access 2007 to create a database called UniLib.mdb. - this file should be created on your personal drive at the university (or C: if you're using Access 2007 at home) and then copied onto your disk for handing in.

i) Create the following four tables; all fields must be of correct type and suitable size. The "Required" field property should be used appropriately (but sparingly).  You are required to establish correct relationships between the tables and enforce referential integrity.

BORROWER            to store data about each borrower to have 5 text fields (Student ID (primary key - 7 characters long), First Name, Last Name, Program, Study Mode)

1 Yes/No field called Suspended (to indicate whether the borrower is suspended - almost always "No"; it is only "Yes" if the borrower has committed a serious offence such as refusing to return a long-standing loan)

1 number field called Books Borrowable (the number of books the borrower is still able to borrow) indexes are to be created on the fields Student ID, Last Name, Program, Books Borrowable by using a "Lookup Field", the Program field is to be restricted to the values "BCom", "BBIT", "BEc", "BFin", "MCom", "PhD" by using a "Validation Rule", the Study Mode field is to be restricted to either "F" (for full-time) or "P" (for part-time)

Study Mode is to default to "F" (but, when you enter your data, override this default as required)

Suspended is to default to "No" (but, when you enter your data, override this default as required) the Books Borrowable field is to be restricted to an integer value between 0 and 4 (it is equal to 4 for borrowers with no current loans; the library's application software reduces it by 1 each time a borrower takes out a loan, and increases it by 1 each time a loan is returned; whenever its value reaches 0, the software blocks the borrower from taking out any more loans - none of this processing is part of this assignment). Therefore, no borrower can have more than 4 current loans

Books Borrowable is to default to 4 (but, when you enter your data, override this default as required)


Related Discussions:- Enforce referential integrity

multiple-mode locks, Multiple-mode locks : It offers two locks: exclusive ...

Multiple-mode locks : It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that neve

Describe the definition of a transaction in sql, Describe the definition of...

Describe the definition of a transaction in SQL  Ans: The SQL transaction starts implicitly. Transactions are finished by either Commit work that commits the transaction and st

What are the kinds of strings, What are the kinds of Strings?  -A binar...

What are the kinds of Strings?  -A binary string in MySQL is one that MySQL treats as case sensitive in comparisons. -A non binary string in MySQL is one that MySQL does'nt

Economics, Economics: It is now usually accepted that it costs less to make...

Economics: It is now usually accepted that it costs less to make a system of smaller computers with the equivalent power of a one large computer. It is more cost-effective to get s

What is primary key, What is Primary key? Primary Key - Primary key i...

What is Primary key? Primary Key - Primary key is one of the candidate keys which uniquely identifies each row in the relation.

Table handling, Table Handling  In RDBMS more than one table can be tac...

Table Handling  In RDBMS more than one table can be tackled at a time by using join operation. Join operation is a relational operation that causes 2 tables with a common domai

Query evolution, what is query processing ,query optimization and performan...

what is query processing ,query optimization and performance turring?

What are the causes of bucket overflow in a hash file, What are the causes ...

What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow? When a record is inserted, the bucket to that

What is a hashing function, What is a hashing function?  What are the prope...

What is a hashing function?  What are the properties of a good hashing function?  Describe the folding technique for hashing functions.      Ans:  Hashing function is a method

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd