List technicians data along with current_user

Assignment Help Computer Engineering
Reference no: EM132092913

A piano manufacturer employs piano technicians who are responsible for inspecting the instruments before they are shipped to the customers. Each piano is inspected by at least two technicians (identified by their employee number). For each separate inspection, the company needs to record its date and a quality evaluation grade.

Based on the following ERD

Create all relevant tables with the following constraints: *

Serial Number > 0

Employee Number > 0 and Employee Number < = 50

Quality Grades are: "Excellent", "Good", "Satisfactory", "Poor", "Unacceptable"

Enter sample data for 2 pianos - piano 1 and piano 2

List piano's data along with Current_User

Enter sample data for 2 technicians - technician 1 and technician 2

List technician's data along with Current_User

Technician 1 inspected piano 1 twice and technician 2 inspected piano 2 twice. Enter sample dates and quality grades for this case.

List all inspection dates and quality grades along with Current_User and foreign keys to pianos and technicians

Add attribute Employee Address

Enter sample addresses for 2 technicians

List technician's names and addresses along with Current_User

Remove all pianos from the database **

Confirm that that PIANO table is empty

Delete all tables

Confirm that deleted tables do not exist in your database catalog

* Hint: before creating tables map ERD to logical data model that describes tables and their primary and foreign keys.

** Hint: before deleting parent data delete their children data

Reference no: EM132092913

Questions Cloud

Calculate the mean value and standard deviation of x : For t = 0 to 8?, take discrete sample data of the function x(t) with time interval of 0.025 sec, thus forming a dataset {x}.
Compute the picking point a0 on the near plane : we can compute the picking point A0 on the near plane (Z=0) and picking point A1 on the far plane (Z=1) in the 3D camera view.
How they would be used in a network investigation : Pick two of the following network security tools and provide an 8-12 slide presentation explaining them.
Develop a checklist for assessing the physical security : Physical security is a necessity in comprehensive information security. Develop a checklist for assessing the physical security of an organization.
List technicians data along with current_user : A piano manufacturer employs piano technicians who are responsible for inspecting the instruments before they are shipped to the customers.
Can you pick a programming language which was influential : Can you pick a programming language which was the most influential to the later languages but not successful at that time?
Discuss a few polymorphic and overloaded methods : Pick a pair of concrete classes in the JDK in a parent-child relationship and discuss a few polymorphic and/or overloaded methods.
Which of philosophical position on the question of human : Which of philosophical position on the question of human freedom do you find most persuasive, which do you find least persuasive? Why?
At what phase of the software development process should : At what phase of the software development process should risk analysis be performed?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Computer analysis of the laminar momentum boundary layer

Computer analysis of the laminar momentum boundary layer over a flat plate with a pressure gradient based on u8 = Cxm arid constant properties.

  Design a basic jsp page

Submit your JSP page along with your screenshots that show what your code has produced

  Calculate the development of the velocity profile

Consider steady, laminar, constant-property flow in a duct formed by two parallel planes. Let the velocity be uniform at the duct entrance.

  Find user allowed to purchase particular restricted product

I need to create a simple age calculator to find if a user is allowed to purchase a particular restricted product. I need to model an abstract class to represent generic restricted product and concrete classes to represent alcohol, tobacco, R-rate..

  Initialize the array with the appropriate number of values

Initialize the array with the appropriate number of values - What is the value in the array element when the index contains 2

  What is the time efficiency class of the algorithm

Write down an algorithm for finding the largest key in the binary search tree. What is the time efficiency class of your algorithm in the worst case?

  Determine similarity and subtle difference among conditions

Determine the similarities and subtle differences among the conditions on sequential consistency imposed by Lamport (1979), by Dubois et al.

  Express e as a function of n-r-l-h-and-c

Assume each processor is multithreaded to handle N contexts simultaneously. Assume context-switching overhead of C. Express E as a function of N, R, L, h and C.

  What classification systems and descriptions are used

What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS

  Examine instances where security conflicted with ease of use

Examine at least two (2) instances where security conflicted with ease of use. Propose a solution to the conflicts you have indicated.

  Describe an ofdm system

Suppose a communication channel having a bandwidth W = 10 kHz is characterized as a multipath channel with multipath spread Tm = 10 ms and a Doppler spread.

  Develop intellectual property infringement ramifications

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd