Physical model of traffic data management, Database Management System

After the completion of the logical model the physical model is to be made. The oracle 10 G will be used as a database server and all the tables with their column are created and indexing approach also included.

The create table command are as fellows.

CUSTOMER TABLE
CREATE TABLE CUSTOMER(
CUSTOMERID NUMBER(4) PRIMARY KEY,
FIRST_NAME VARCHAR(20) NOT NULL,
LAST_NAME VARCHAR(20) ,
ADDRESS VARCHR(50) ,
CONTACT_NUMBER NUMBER(15) NOT NULL
STATE VARCHAR(10)

)

MATERIAL TABLE
CREATE TABLE MATERIAL(
MATERIALID NUMBER(4) PRIMARY KEY,
MATERIALNAME VARCHAR(10) NOT NULL,
COSTID VARCHAR(10))

LOCATION TABLE
CREATE TABLE LOCATION(
LOCATIONID NUMBER(4) PRIMARY KEY,
LOCATION NAME VARCHAR(20),
QUADRANTID NUMBER(4),
CONSTRAINT FK_LOCATIONID_SUB FOREIGN KEY(LOCATIONID)

REFERENCES LOCATION (LOCATIONID))

EMPLOYEE TABLE

CREATE TABLE EMPLOYEE(

EMPLOYEEID NUMBER(4) PRIMARY KEY,
NAME VARCHAR(20),
SALARY NUMEBR(10),
ADDRESS VARCHAR(50),
PHONE NUMBER(15))

DISTRICT TABLE
CREATE TABLE DISTRICT(
DISTRICTID NUMBER(4) PRIMARY KEY,

DISTRICTNAME VARCHAR(20))

OPERATOR TABLE
CREATE TABLE OPERATOR(
OPERATORID NUMBER(4) PRIMARY KEY,
OPERATORNAME(4) PRIMARY KEY,
))

Posted Date: 3/18/2013 2:44:39 AM | Location : United States







Related Discussions:- Physical model of traffic data management, Assignment Help, Ask Question on Physical model of traffic data management, Get Answer, Expert's Help, Physical model of traffic data management Discussions

Write discussion on Physical model of traffic data management
Your posts are moderated
Related Questions
Use Delegation to Share Implementation The delegation " Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to

Use a Set operator to create a list of academics who have written or co-written less than 5 papers and also have greater than 3 interests. List their academic number in the output.

Implementing software control To implement software control designer must redesign strategy of state event model which is present in dynamic model. There are three basic ap

Lock Based Protocol A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are t

Describe Embedded Query Language? Embedded Query Language - A query language (e.g., SQL) can be implemented in two ways. It can be used interactively or embedded within a host

2NF Normal Form : A relation schema process R is in 2NF if it is in 1NF and each non-prime attribute A in R is fully functionally related on primary key. Second normal form (2N

Question: Data Mining is the process of extracting knowledge hidden from large volumes of raw data. (a) Using a suitable example, illustrate how Data Mining can be useful t

What is the use of rename operation? Rename operation is used to rename both relations and an attributes. It uses the as clause, taking the form: Old-name as new-name.

I need a professional to prepare a database to collect and store basic information. The information can be basic info such as contact details etc. One requirement i have is f

What are the Issues when Selecting a Database Issues when Selecting a Database Storage space requirement: A database requires about triple storage space of the actua