Data integrity, Database Management System

You are required to implement integrity constraints within the database to enforce the following requirements: 
For Projects:

Start date must be supplied.
Start date cannot be in the past.
Finish date must be on or later than the start date.
Must have a supervisor value (supervised by cannot be null).
For Activities
Location must be supplied.
Finish time can be no later than 11.00pm.
Number of volunteers required must be greater than zero.
Date cannot be in the past.
Information requests

Create queries to answer the following information requests. Note: Do not use the Access query builder (QBE) to create your queries - you should type the queries in manually using SQL view.

1. List details (type, name) of all assets with a type of "Skill". Sort the list in alphabetical order of asset name.
2. List all details of projects that have been finished in the last ten days.
Hint: Use DateDiff function.
3. List the name and contact details of any members who have not yet volunteered for an activity. Note: It is not possible to answer this query with an inner join.
4. List the name of each member who may be able to contribute a trailer to a project.
5. How many members are able to provide cooking skills? Your result should be a single column with the heading ‘Number of Cooks'.
6. For each project, show the project name and the total number of volunteers required for all activities associated with that project.

Posted Date: 2/26/2013 4:17:14 AM | Location : United States







Related Discussions:- Data integrity, Assignment Help, Ask Question on Data integrity, Get Answer, Expert's Help, Data integrity Discussions

Write discussion on Data integrity
Your posts are moderated
Related Questions
Describe the algorithm for updating indices for a single level index when a record is    (i) Inserted  (ii)  deleted What will be the modification if there are multilevel in

What is a shadow copy scheme? It is simple, but efficient, scheme known as the shadow copy schemes. It is based on making copies of the database called shadow copies that singl

Question: (a) Prepare an ERD for the scenario given below. (b) Convert the ER diagram produced in (a) above into its physical design. You have to choose an appropriate Pri

Demonstrate the Design of associations During object design phase we must design a strategy to implement associations. Association may be unidirectional or bi-directional. Wha

The Database MySQL scripts cars_for_sale.sql and car_details.sql containing the data to use for this task have been supplied. To complete this task, you need to first create

The Third Normal Form (3NF) Even though, transforming a relation that is not in 2NF into a number of relations that are in 2NF take out many of the anomalies, it does not neces

Problem : (b) A deductive database system is essentially the outcome of applying mathematics logic to database management, where logic is used for both data representation and

Describe briefly models which define the operations on classes. The three models which are used to define operations on classes are as: Object Model = data dictionary + Obje

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

Explain how the associations are implemented as classes. A general approach in this case is to transform an association class into a simple class linked to two original classes