Data integrity, Database Management System

Assignment Help:

You are required to implement integrity constraints within the database to enforce the following requirements: 
For Projects:

Start date must be supplied.
Start date cannot be in the past.
Finish date must be on or later than the start date.
Must have a supervisor value (supervised by cannot be null).
For Activities
Location must be supplied.
Finish time can be no later than 11.00pm.
Number of volunteers required must be greater than zero.
Date cannot be in the past.
Information requests

Create queries to answer the following information requests. Note: Do not use the Access query builder (QBE) to create your queries - you should type the queries in manually using SQL view.

1. List details (type, name) of all assets with a type of "Skill". Sort the list in alphabetical order of asset name.
2. List all details of projects that have been finished in the last ten days.
Hint: Use DateDiff function.
3. List the name and contact details of any members who have not yet volunteered for an activity. Note: It is not possible to answer this query with an inner join.
4. List the name of each member who may be able to contribute a trailer to a project.
5. How many members are able to provide cooking skills? Your result should be a single column with the heading ‘Number of Cooks'.
6. For each project, show the project name and the total number of volunteers required for all activities associated with that project.


Related Discussions:- Data integrity

Mis, explain various steps uses in evaluation and maintenance of MIS.

explain various steps uses in evaluation and maintenance of MIS.

What is known as sequential file organization, What is known as sequential ...

What is known as sequential file organization? In the sequential file organization, the records are kept in sequential order, according to the value of a "search key" of every

Deadlock and its prevention, Deadlock And Its Prevention: As seen earlier,...

Deadlock And Its Prevention: As seen earlier, though two phase locking protocol handles the trouble of serialisability, but it causes some troubles also. For instance, consider th

Illustrate the view of software architecture, Illustrate the view of softwa...

Illustrate the view of software architecture A model is a semantically closed abstraction of system composes of elements. It can be visualized using any of the following five v

What is the meaning of data independence, What is the meaning of Data indep...

What is the meaning of Data independence? Data independence means a programs that are not dependent on the physical attributes of data and a programs that are not dependent on

Illustration of implementation of inheritance, Illustration of implementati...

Illustration of implementation of inheritance Let us take the illustration of implementation of inheritance. Suppose that we are about to implement the Stack class and by now w

What are the benefits of decomposing a system, What are the benefits of dec...

What are the benefits of decomposing a system? The benefits of decomposing a system into subsystems are that after decomposition, each individual component become smaller and e

Relational schema, crete a data base relationship model Entity: ...

crete a data base relationship model Entity: Students; Professors; Dormitories buildings; Attributes of students: Name; Address; Dorm;

Explain the two constraints check and foreign key in sql, Explain the two c...

Explain the two constraints, check and foreign key in SQL along with an example for each. Give the syntax. CHECK constraint - CHECK constraint specifies an expression which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd