Define a table in sql known as client for store information, Database Management System

Assignment Help:

Define a table in SQL known as Client that is used to store information about the clients. Define CLIENT_NO as the primary key whose first letter must begin with ‘C'. Also ensure that the column ‘NAME' should not permit NULL values.

Column name Data type Size
CLIENT_NO Varchar2 6
NAME Varchar2 20
ADDRESS1 Varchar2 30
ADDRESS2 Varchar2 30
CITY Varchar2 15
STATE Varchar2 15
PINCODE Number 6
BAL_DUE Number 10, 2

Ans:
CREATE TABLE CLIENT
( CLIENT_NO VARCHAR2(6) PRIMARY KEY CHECK (CLIENT_NO LIKE
‘C%'),
NAME VARCHAR2(20) NOT NULL,
ADDRESS1 VARCHAR2(30),
ADDRESS2 VARCHAR2(30),
CITY VARCHAR2(15),
STATE VARCHAR2(15),
PINCODE NUMBER(6),
BAL_DUE NUMBER(10,2))


Related Discussions:- Define a table in sql known as client for store information

Explain the benefit of oom, Explain the benefit of OOM. Main benefits o...

Explain the benefit of OOM. Main benefits of object oriented modeling are development of system become fast, quality of the system get improve. It gives freedom of use of alrea

Entity set or entity type, A collection of a same kind of entities is known...

A collection of a same kind of entities is known as an Entity Set or entity type. Example: For the COLLEGE database defines earlier objects of concern are Students, Faculty,

Explain about data independence, Data Independence This brings us to ou...

Data Independence This brings us to our next topic: data independence. It is the property of the database which tries to make sure that if we make any change in any level of sc

I want a professional with strong it background, I want a professional with...

I want a professional with strong IT background who provide me timely assignments Project Description: I want a professional who can do my assignments for my major i.e. Infor

Define Fifth Normal form is concerned with, Define Fifth Normal form is con...

Define Fifth Normal form is concerned with Ans : Fifth Normal form is concerned with Join dependency.

Which method is used to key transformation, Which method is used to key tra...

Which method is used to key transformation ? A hash method is used to key transformation.

Explain the term - adjustment of inheritance, Explain the term - Adjustment...

Explain the term - Adjustment of inheritance The inheritance can be enlarged as object design progresses by changing class structure. The designer should do: i) Adjust or r

Database backup, Discuss the importance and characteristics of database bac...

Discuss the importance and characteristics of database backup and recovery procedures, then describe the actions that must be detailed in backup and recovery plan

What are the several kinds of the update operations relation, What are the ...

What are the several kinds of the update operations on relations? Also explain the constraints on these update operation. Give instance in support of your answer. There are th

Write a qbe query to display names of cs department, Consider a table stude...

Consider a table student (std_id, std_name, date_of_birth, percent_marks, dept_name). Write a QBE query to display names of Computer Science department students who have scored mo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd