List technicians data along with current_user

Assignment Help Computer Engineering
Reference no: EM132092913

A piano manufacturer employs piano technicians who are responsible for inspecting the instruments before they are shipped to the customers. Each piano is inspected by at least two technicians (identified by their employee number). For each separate inspection, the company needs to record its date and a quality evaluation grade.

Based on the following ERD

Create all relevant tables with the following constraints: *

Serial Number > 0

Employee Number > 0 and Employee Number < = 50

Quality Grades are: "Excellent", "Good", "Satisfactory", "Poor", "Unacceptable"

Enter sample data for 2 pianos - piano 1 and piano 2

List piano's data along with Current_User

Enter sample data for 2 technicians - technician 1 and technician 2

List technician's data along with Current_User

Technician 1 inspected piano 1 twice and technician 2 inspected piano 2 twice. Enter sample dates and quality grades for this case.

List all inspection dates and quality grades along with Current_User and foreign keys to pianos and technicians

Add attribute Employee Address

Enter sample addresses for 2 technicians

List technician's names and addresses along with Current_User

Remove all pianos from the database **

Confirm that that PIANO table is empty

Delete all tables

Confirm that deleted tables do not exist in your database catalog

* Hint: before creating tables map ERD to logical data model that describes tables and their primary and foreign keys.

** Hint: before deleting parent data delete their children data

Reference no: EM132092913

Questions Cloud

Calculate the mean value and standard deviation of x : For t = 0 to 8?, take discrete sample data of the function x(t) with time interval of 0.025 sec, thus forming a dataset {x}.
Compute the picking point a0 on the near plane : we can compute the picking point A0 on the near plane (Z=0) and picking point A1 on the far plane (Z=1) in the 3D camera view.
How they would be used in a network investigation : Pick two of the following network security tools and provide an 8-12 slide presentation explaining them.
Develop a checklist for assessing the physical security : Physical security is a necessity in comprehensive information security. Develop a checklist for assessing the physical security of an organization.
List technicians data along with current_user : A piano manufacturer employs piano technicians who are responsible for inspecting the instruments before they are shipped to the customers.
Can you pick a programming language which was influential : Can you pick a programming language which was the most influential to the later languages but not successful at that time?
Discuss a few polymorphic and overloaded methods : Pick a pair of concrete classes in the JDK in a parent-child relationship and discuss a few polymorphic and/or overloaded methods.
Which of philosophical position on the question of human : Which of philosophical position on the question of human freedom do you find most persuasive, which do you find least persuasive? Why?
At what phase of the software development process should : At what phase of the software development process should risk analysis be performed?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd