Physical model of traffic data management, Database Management System

After the completion of the logical model the physical model is to be made. The oracle 10 G will be used as a database server and all the tables with their column are created and indexing approach also included.

The create table command are as fellows.

CUSTOMER TABLE
CREATE TABLE CUSTOMER(
CUSTOMERID NUMBER(4) PRIMARY KEY,
FIRST_NAME VARCHAR(20) NOT NULL,
LAST_NAME VARCHAR(20) ,
ADDRESS VARCHR(50) ,
CONTACT_NUMBER NUMBER(15) NOT NULL
STATE VARCHAR(10)

)

MATERIAL TABLE
CREATE TABLE MATERIAL(
MATERIALID NUMBER(4) PRIMARY KEY,
MATERIALNAME VARCHAR(10) NOT NULL,
COSTID VARCHAR(10))

LOCATION TABLE
CREATE TABLE LOCATION(
LOCATIONID NUMBER(4) PRIMARY KEY,
LOCATION NAME VARCHAR(20),
QUADRANTID NUMBER(4),
CONSTRAINT FK_LOCATIONID_SUB FOREIGN KEY(LOCATIONID)

REFERENCES LOCATION (LOCATIONID))

EMPLOYEE TABLE

CREATE TABLE EMPLOYEE(

EMPLOYEEID NUMBER(4) PRIMARY KEY,
NAME VARCHAR(20),
SALARY NUMEBR(10),
ADDRESS VARCHAR(50),
PHONE NUMBER(15))

DISTRICT TABLE
CREATE TABLE DISTRICT(
DISTRICTID NUMBER(4) PRIMARY KEY,

DISTRICTNAME VARCHAR(20))

OPERATOR TABLE
CREATE TABLE OPERATOR(
OPERATORID NUMBER(4) PRIMARY KEY,
OPERATORNAME(4) PRIMARY KEY,
))

Posted Date: 3/18/2013 2:44:39 AM | Location : United States







Related Discussions:- Physical model of traffic data management, Assignment Help, Ask Question on Physical model of traffic data management, Get Answer, Expert's Help, Physical model of traffic data management Discussions

Write discussion on Physical model of traffic data management
Your posts are moderated
Related Questions
courier company er-diagram

How the time stamps are implemented Use the value of the system clock as the time stamp. That is a transaction's time stamp is equivalent to the value of the clock when the tra

find the name of supplier who supply some red part

With the linear commit protocol, sites are connected in a chain, and the subtransaction at the left-hand end of the chain initiates the protocol. Propose a crash recovery protocol

Evaluate, compare and contrast the two methods of relational database design namely top down method and Bottom up method. What will be your choice if you are asked to select a meth

#question. Draw a picture of a moving source and the waves surrounding it according to what you observed in this experiment. How does the spacing of the wave-fronts in front of the

Hi I have got an assignment for making an er diagram for market management software can any budy help me?

Concurrency issues Data integrity: Threads accessing same object need to be synchronized, such as: banking account. Deadlock: One or more threads in system are perman

There are three main sources of utilities and applications for a DBMS: a. Vendor applications and utilities are given for working with or maintaining the database, and generally

Differentiate between a unique key and a primary key. - By default, clustered index on column are created by primary key while nonclustered index are created by unique key.