Design and populate tables within a database

Assignment Help Computer Engineering
Reference no: EM1335477

Create and populate tables within a database using MS Access that supports the following business rules:

Employees all have employee ID's, first names, last names, middle initials, street addresses, city, state, postal codes, and a date of birth.

Departments all have department IDs, department names, and a department description, and a department manager..

An employee can work for only one department.

Each department can have multiple employees but only one manager.

Create 5 fictional employees within the employee table.

Create 2 fictional departments within the department table of the database.

Products each have a product ID, product name, product description, weight, and vendorID.

Vendors each have a Vendor ID, Vendor name, address, city, state, and postal code.

Products can be ordered from multiple vendors and Vendors can ship multiple products. (hint: you need to resolve this many to many relationship somehow)

Create at least 4 fictional products

Create at least 3 fictional vendors.

Reference no: EM1335477

Questions Cloud

A learning curve strategy : Firms that seek a cost advantage should adopt a learning curve strategy; firms that seek to differentiate their products should not.
Involving employees in compensation decisions : What do you think about involving employees in compensation decisions and Are there any compensation decisions which employees should be involved in
What could possibly be used as a key field : I need help with doing some web search research on relational databases and define briefly how such a database works, and basic components.
One short term and one long term objective : One short term and one long term objective re: environmental and sustainability for my international business.
Design and populate tables within a database : Employees all have employee ID's, first names, last names, middle initials, street addresses, city, state, postal codes, and a date of birth.
Explaining the alternate dispute resolution : Not sure what the best choice is from a business standpoint. I sell tax services to a corporation. I sign a new client to a one-year contract.
Risk assessment in project documentation : As a project manager, the risk assessment is one of the most important pieces of project documentation.
Business portfolio presentation : Business Portfolio Presentation - Prepare a 10- to 15-slide Microsoft PowerPoint presentation of information about the Communications Company.
What is the normalization : What needs must a two-dimensional table satisfy in order to be a relation? Provide an example of a table that is a relation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Implement needham-schroeder protocol using python

Implement Needham-Schroeder symmetric key protocol, both original version and fixed version using python.

  What sorts of network servers and resources

What sorts of network servers and resources.

  How case tools improved the system development cycle

From your experiences define how CASE tools have improved the system development cycle. If you have no experience with CASE tools, how would you think they would improve the system development cycle?

  Contrast abstract classes and interfaces

evaluate and contrast abstract classes and interfaces

  Why it is important to keep the web open and free

Tim Berners-Lee is called as the father of the Web. In "The Man who Invented the Web" (2005) it states that Berners-Lee has fought to keep it open, non-proprietary and free. Why would it be important to keep the Web open and free.

  Pseudorandom numbers

In any use of the pseudorandom numbers, whether for the encryption, simulation or the statistical design.

  Process of formulating an entry strategy

Describe the process of formulating an entry strategy. The answer requires to be at least 300 words. Also include any of the references.

  Multicast routing paradigm

The data-driven multicast routing paradigm works best on the local networks which have low delay and excess capacity, however the demand driven paradigm works best in the wide are environment which has limited capacity and higher delay.

  Crypto device encryption

A foreign navy has implemented the secure communications system where submarine commanders transmit the single 5- letter message every day.

  Tools that help in the attack

When initially collecting the information on a network, that reconnaissance tool or method do you believe would generate the best results include what information could you learn utilizing this tool or method and how could this information be used..

  The normal means to give values to a function

The parameter list is the normal means to supply values to a function. Global variables are an alternate means for a function to have access to values. define what a global variable is, how it is declared, and then discuss the pros and cons of com..

  Carrying out the investigation

You work for the mid-size corporation that is known for its inventions that does the lot of work of copyright and patent. You are investigating an employee suspected of selling and distributing animations generated for your corporation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd