Physical model of traffic data management, Database Management System

Assignment Help:

After the completion of the logical model the physical model is to be made. The oracle 10 G will be used as a database server and all the tables with their column are created and indexing approach also included.

The create table command are as fellows.

CUSTOMER TABLE
CREATE TABLE CUSTOMER(
CUSTOMERID NUMBER(4) PRIMARY KEY,
FIRST_NAME VARCHAR(20) NOT NULL,
LAST_NAME VARCHAR(20) ,
ADDRESS VARCHR(50) ,
CONTACT_NUMBER NUMBER(15) NOT NULL
STATE VARCHAR(10)

)

MATERIAL TABLE
CREATE TABLE MATERIAL(
MATERIALID NUMBER(4) PRIMARY KEY,
MATERIALNAME VARCHAR(10) NOT NULL,
COSTID VARCHAR(10))

LOCATION TABLE
CREATE TABLE LOCATION(
LOCATIONID NUMBER(4) PRIMARY KEY,
LOCATION NAME VARCHAR(20),
QUADRANTID NUMBER(4),
CONSTRAINT FK_LOCATIONID_SUB FOREIGN KEY(LOCATIONID)

REFERENCES LOCATION (LOCATIONID))

EMPLOYEE TABLE

CREATE TABLE EMPLOYEE(

EMPLOYEEID NUMBER(4) PRIMARY KEY,
NAME VARCHAR(20),
SALARY NUMEBR(10),
ADDRESS VARCHAR(50),
PHONE NUMBER(15))

DISTRICT TABLE
CREATE TABLE DISTRICT(
DISTRICTID NUMBER(4) PRIMARY KEY,

DISTRICTNAME VARCHAR(20))

OPERATOR TABLE
CREATE TABLE OPERATOR(
OPERATORID NUMBER(4) PRIMARY KEY,
OPERATORNAME(4) PRIMARY KEY,
))


Related Discussions:- Physical model of traffic data management

Pl/SQL, I need solution of the question posted at http://www.expertsmind.c...

I need solution of the question posted at http://www.expertsmind.com/questions/sql-query-for-testing-triggers-and-stored-procedures-30140149.aspx

Dirty reads-problems of concurrent transactions, Dirty Reads: T10 reads a ...

Dirty Reads: T10 reads a value which is updated by T9. This update has not been committed and T9 aborts. T9 T10 Value of x old value = 200

What are the failures of controlling events between objects, What are the f...

What are the failures of Controlling Events Between Objects  Failure Unintentional termination of system. Several possible causes: failure of system hardware, o

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Determine the types of methods for retrieving rows in python, Describe the ...

Describe the two types of methods for retrieving rows in Python? Fetchone()- Returns the next row as a sequence Fetch all()- Returns the entire result set like a strin

Keys, #questiontypes of keys examples..

#questiontypes of keys examples..

What are the different approaches for database design, What are the differe...

What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att

Creating a view-data control, Creating a view: A query can be embed...

Creating a view: A query can be embedded within the CREATE VIEW STATEMENT A query can have complex select statements containing join, groups and sub- queries A quer

List some instances of collection types, List some instances of collection ...

List some instances of collection types? a) sets b) arrays c) multisets

Remove all transitive dependencies - dependency diagram, 1. Use the Invoice...

1. Use the Invoice table structure shown below to answer the following questions: a)  Draw the dependency diagram and identify the primary key and all dependencies, including al

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd