Design a set of database tables to store information

Assignment Help Computer Engineering
Reference no: EM132118930

Read chapter 24 of Big Java 6th Ed. (on the BlackBoard course website as a PDF) and provide short answers to the following questions. Submit your answers in a text document (plain text or Microsoft Word format, please).

a. Design a set of database tables to store information about classes and instructors for the classes. For this question, an instructor has a unique ID number (such as 123456), a name (such as "John Doe"), and an email address . Every class has a unique course identification number (such as "MIS307"), course name (such as "College of Business"), number of credits (such as 3), and instructor's ID number. Any one instructor can teach multiple classes.
Show the CREATE TABLE statements that could be used to create these two tables.

b. Give the SQL command to INSERT an instructor "John Doe" with ID number 123456 and email address "[email protected]" into the instructor table you showed how to create in (a) above.

c. Give the SQL command to INSERT a course number "MIS307" in the College of Business with 3 credits taught by instructor ID 123456 into the class table you showed how to create in (a) above.

Reference no: EM132118930

Questions Cloud

What is the concept of globally right source : What is the concept of Globally Right source and how can an organization use this to add value to their activities to increase their competitive positions?
Creating a strategic plan : What are some of the legal issues a company face when creating a strategic plan?
What questions would you ask the heads of the six business : What advantages would the proposed Advanced Mobile Communications and Information System provide for Whitman Price Consulting?
Risk-averse-risk-neutral and risk-seeking : Provide examples of real organizations that represent each level of risk tolerance: risk-averse, risk-neutral and risk-see
Design a set of database tables to store information : Design a set of database tables to store information about classes and instructors for the classes.
Future value and compound interest formula : Find the future value and compound interest. Use the? $1.00 future value table or the future value and compound interest formula.
Learning facilitation methods : What are the advantages of action learning sets when compared with other learning facilitation methods?
Compute the suffix array for the same string : Does this change the memory requirement of suffix array and BWT? What impact it might have on suffix trees?
Feedback on the performance of team members : How does collecting regular feedback on the performance of team members, from relevant sources assist managers in identifying the learning needs of individuals

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down functions to calculate the mean, variance

If x denotes the mean of a sequence of numbers x1, x2,.....xn, the variance is an average of the squares of the deviations of the numbers from the mean, and the standard deviation is the square root of the variance.

  Discuss the technical aspects of a random number generator

Discuss the technical aspects of a Random Number generator and Pseudo-Random Number generator to include their appropriate applications

  Explain the distinction between a type x and reference type

Explain the distinction between a type x and a reference type ref(x). Under what circumstances would you choose to use a reference type?

  Make a simple scientific calculator

make a simple scientific calculator that will allow the following functions to be calculated.

  Write a test program that prompts the user to enter

Write a test program that prompts the user to enter a, b, c, d, e, and f and displays the result.

  Write down a java program, which build a binary tree

Write down a java program, which build a binary tree

  Determine the most current maximum and minimum number

Determine the most current maximum and minimum number as the "integer" random numbers are being generated.

  Define the third criterion for a cryptographic hash function

Define the third criterion for a cryptographic hash function. State the pigeonhole principle and describe its application in analyzing hash functions.

  Create an interface called breakable

Imagine a game in which some game elements can be broken by the player and others can't. Create an interface called Breakable that has a method called break.

  Create a script that accepts a filename as argument

Write a script that accepts a filename as argument and then searches /bin and /usr/bin to determine its link count. If the file exists and has multiple links.

  What is the running time for each of the given methods

Give pseudo-code describing how to implement all the operations in the array list ADT using an array. What is the running time for each of these methods?

  How do you test whether at least one of x and y is zero

How do you test whether at least one of them is zero? How do you test whether exactly one of them is zero? What is the value of !!frozen?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd