quora

SQL database paper - Essay Example

Comments (0) Cite this document
Summary
The normalization process will be done in two phases i.e. First normal form (1NF) and second normal form (2NF).
The goal of conforming the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
SQL database paper
Read TextPreview

Extract of sample
"SQL database paper"

Download file to see previous pages The customerID field is a unique area because each customer will have their unique customerID thus the reason for its use as the primary key. The newly introduced tables allow us to have several booked tours associated with a customer thus increasing the flexibility of the system. It also reduces the storage space required. The tour1NF tables are added to allow customers to make several orders (“Informix Guide”, 1998).
A table that keeps tours sold and tour customer data, holds, address, customer name, city, zip code state, tour(s) selected, total amount paid and the number of persons in the tour. Therefore, the structure will be able to show the customer in case he/she books more than once.
Data modelling refers the process of examining data-oriented structures, in that you single out entity types into which attributes are assigned to. The conceptual model can be used to represent the data above.
To make the table2NF compliant we introduce the customerID field as the primary key of the customer table and the foreign key of the newly created table in 1NF tours selected table. This makes the table 2NF compliant.
Using the salesperson table that was described earlier the most appropriate trigger would be a Data Modelling Language (DML) trigger. The trigger is initiated every moment the salesperson sales a tour. In the new data model the customer information is subsidiary to sales information, the trigger is identified as “for each statement type” and is an additional data set for the salesperson each time the tour booking triggers the event.
Using the salesperson table described the appropriate trigger would be a Data Manipulation Language (DML) trigger and would be initiated each time a tour operator sells a new tour. Under the new structure in which the client information is subordinate to sales information, this trigger would be identified as “for each statement type” and would add data set for the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“SQL database paper Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
SQL database paper Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/logic-programming/1656655-sql-database-paper
(SQL Database Paper Essay Example | Topics and Well Written Essays - 750 Words)
SQL Database Paper Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/logic-programming/1656655-sql-database-paper.
“SQL Database Paper Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/logic-programming/1656655-sql-database-paper.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Database Security for Electronics Ltd
In an organization, databases store information about the client’s details, the financial information, and the details of the human resource and, all the data that may be of significant to the company. All the data that are stored in the database should be secured properly.
8 Pages(2000 words)Essay
Database in an Organisation
4 4. Uses of Database Systems in a Health Care Organization 4 5. How Do Organizations Use Database Systems? 6 6. Advantages and Disadvantage of Database Systems 6 7. Conclusion 7 References 8 Abstract Database is a record of important data, which an organization requires to run different business processes and activities.
6 Pages(1500 words)Essay
BLOBs in database
One obvious medium that is used to quickly access and store these electronic documents is the database. Many online and distributed systems require the efficient access of thousands of binary files such as music (the sample files streamed to potential customers), digital signatures, and other documents and videos that generally range in size from 10KB to SMB.
4 Pages(1000 words)Essay
Lanchester Liners Hospitality Database, SQL
5 Pages(1250 words)Essay
Ch07_AviaCo database. SQL
The required output is shown in Figure P7.15. (As you can tell, the query was run on April 15, 2007, so the ages of the employee are current as of that date.) You are also required to use a function or functions to round the Age to a whole
2 Pages(500 words)Assignment
SQL Injection Vulnerabilities
SQL injection is a class of vulnerability that poses extremely high risks in the present threat landscape. The MITRE Common Weakness Enumeration (CWE) ranked SQL injection as first in the list of top 25 most dangerous software errors. Many high-profile intrusions have demonstrated the exploitation of these vulnerabilities.
5 Pages(1250 words)Research Paper
Technical Paper: Database Administrator for Department Store
In designing, the database several necessary steps, procedures and precautions will be considered as the database should be employed to support both the accuracy,
6 Pages(1500 words)Essay
Database design and SQL Light database creation
It also has a limitation while indicating the relationships among the data entities. This diagram can be highly improved so that it illustrates clearly all the relationships. This can only be achieved through the use of the
3 Pages(750 words)Essay
SQL/PL Database project
Triggers run between the issuance of a command and database management action is performed. There are five types of the triggers which belong to Oracle database 11g. Triggers are also fired in the response to the event of database. In the
1 Pages(250 words)Essay
Methods for Database Security
Abstract Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive.
10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic SQL database paper for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us