Access database, Basic Computer Science

Assignment Help:
1.Add a Validation Rule for Date of Birth so no one under the age of 18 can be added to the table. Hint: subtract the DOB from today''s date and divide by 365.25 (watch the parentheses and pay attention to the arithmetic "order of operations" ) Do NOT use any functions here or in the queries that we did not discuss. (More below on using "today''s date" function)

2.Make a Validation Rule to ensure that the Check Out Date is later than the Check In Date.

3.Make a select query with a calculated field for age, to list only guests between 20 and 40 years of age! Make sure to enter a range of ages in your table so you have something to display.

4.Make a Parameter query that allows the user to choose which birth month to display. So when the user is prompted for a birth month, they might type in 3, for March, and only the records which have a Date of Birth in March, will display.

5.Make an Update Query that will add the phrase "Free Champagne for this Preferred Guest" to the Comments field, but only if the guest stays for 8 days or more.


Related Discussions:- Access database

Compare cisc with risc cpus, Question 1 Define the following terms        ...

Question 1 Define the following terms                           1) Pipelining 2) Super Pipelining 3) Dynamic Execution 4) Multiprocessing 5) Multimedia Extensions Question 2

Data mining, Process of Data mining Data mining is an iterative process t...

Process of Data mining Data mining is an iterative process that typically involves the following phases: Problem definition A data mining project starts with the understanding o

Copmurer, Classify computer systems according to capacity. How they are dif...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

List two i/o virtualization methods, Question 1 List two I/O virtualizatio...

Question 1 List two I/O virtualization methods. Based on different features compare these two methods Question 2 Discuss three areas considered by organizations to secure the

Explain what is rmi, QUESTION (a) Explain what is RMI? (b) Draw a di...

QUESTION (a) Explain what is RMI? (b) Draw a diagram showing the different parts of the Java RMI architecture. (c) What is the function of the RMI security manager and RM

Artificial intelligence research, Artificial Intelligence research: Art...

Artificial Intelligence research: Artificial Intelligence research may be describe  in terms of how the following question has been answered: "How are we going to get a comp

Fundamental of algorithm, exchanging the two variables: problem,algorithm d...

exchanging the two variables: problem,algorithm development,discription

Networking, what is computer topology .

what is computer topology .

Assignment of making a small database, assignment of making a small databas...

assignment of making a small database in C# with a back end support of MS Access. i required a form with following options : Enter a new user (user name, father name, age, d

Computer processing, Computer Processing: Most of the earliest compute...

Computer Processing: Most of the earliest computer memories have been based on physical elements which can exist in just one of the two states (on or off): such an element cor

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd