Make a list of the field names and field types

Assignment Help Basic Computer Science
Reference no: EM13824621

Microsoft Access

Every runner is required to solicit sponsors to help raise money for the event. There are two types of sponsors - corporate and personal.Design a second table that will store data about the sponsors for each runner.

1.Make a list of the field names and field types you plan to include in the table. What fields are you going to put in this table? What are their field types? Would it make sense to reduce any of the field sizes? Do you need to add captions?

2.Make sure you choose a field to act as the primary key. Remember the primary key field must uniquely identify each record (runner) in the table.

3.In addition, this table will be the "many" in a "one to many" relationship with the Runner table. Therefore, you will also need to include a common field in this table so that you can join the two tables in a one (runner) to man (sponsors) relationship. One way to achieve this is to repeat the primary key from the "one" table in the "many" table.

 

 

Reference no: EM13824621

Questions Cloud

Availability of the organization information assets : Organizational end users are generally in the background when it comes to protecting the IT infrastructure. As the chief security officer (CSO), develop a security awareness training communication plan for these users. Your plan must be in nontechnic..
Prepare a fixed overhead variance analysis : Prepare a cost variance analysis for each variable cost component for Met Towels in January 2005. Prepare a fixed overhead variance analysis for Met Towels in January 2005
Secure encrypted communications : Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbe..
The program by three-dimensional array : Write a small program that will read in 52 cards from a file, shuffle the cards, print the unshuffled deck to the screen, and print the shuffled deck into new file. The unshuffled deck of cards should be represented in the program by three-dimensiona..
Make a list of the field names and field types : 1.Make a list of the field names and field types you plan to include in the table. What fields are you going to put in this table? What are their field types? Would it make sense to reduce any of the field sizes? Do you need to add captions?
What is your plan for bringing about transformational change : What is your plan for bringing about the transformational change you envision? Why do you believe this approach will be successful?
Prepare a performance report for humphrey catalog project : Prepare a performance report for the Humphrey Catalog project. Offer a plausible explanation for SA's performance on the Humphrey project
Target cost and cost reduction to achieve target cost : Target Cost And Cost Reduction To Achieve Target Cost
Logical development of appropriate data types : Demonstrate professional presentation skills by the development of a professional business presentation to the client outlining the development process for this Database Management System project.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Public boolean chackanagram

write the anagramList() chackanagram. checkAnagram returns true if its two Word parameters have original words that are nagrams. If not, checkAnagram returns false. use the ethod header below to write checkanagram. Assume that all Word methods work a..

  Write a program that generates 5 random numbers

write a program that generates 5 RANDOM numbers between 60 and 100 and calculates the smallest of the five numbers import java.util.Random; public class RandomNumbers

  Four ring architecture of operating systems

Opinion regarding what security benefit(s) would be seen if modern operating systems followed four ring architecture.

  Explain what can-t be measured can-t be effectively managed

According to the following quote "what can't be measured can't be effectively managed." The question is can everything that is important in network security be measured using metrics or any other process? Why or Why not?

  The multiplexer and expected simulation report

Write a Verilog testbench for the multiplexer and expected Simulation Report.

  What feature in windows vista provides a permission dialog

What feature in Windows Vista provides a permission dialog for Standard Users to enter administrator credentials to accomplish various tasks reserved for the latter group

  Design a nine-step counter to count

Design a nine-step counter to count in the following sequence using D flip-flops (TTL 74704) on a breadboard

  How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns?

  Describe how concepts such as risc

In this six pages research paper, you will investigate the evolution of and current trends in improving system performance with concepts such as RISC, pipelining, cache memory, and virtual memory. In this paper you must, as part of your conclus..

  Identify the java-based technologies utilized

Five hundred words discussion paper. Identify the Java-based technologies utilized in this project and analyze each of them. Then, provide discussion on the purpose of each of the Java-based technologies utilized.

  Voluntarily gravitating to give up our real world experience

In an age of virtual worlds where people are spending inordinate amounts. Are we voluntarily gravitating to this world and giving up our real world experiences for virtual ones?

  What are some technologies and solutions

What are some technologies and solutions that can be used to reduce risk for the "Cloud" or "Cloud Data"

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd