Physical model of traffic data management, Database Management System

Assignment Help:

After the completion of the logical model the physical model is to be made. The oracle 10 G will be used as a database server and all the tables with their column are created and indexing approach also included.

The create table command are as fellows.

CUSTOMER TABLE
CREATE TABLE CUSTOMER(
CUSTOMERID NUMBER(4) PRIMARY KEY,
FIRST_NAME VARCHAR(20) NOT NULL,
LAST_NAME VARCHAR(20) ,
ADDRESS VARCHR(50) ,
CONTACT_NUMBER NUMBER(15) NOT NULL
STATE VARCHAR(10)

)

MATERIAL TABLE
CREATE TABLE MATERIAL(
MATERIALID NUMBER(4) PRIMARY KEY,
MATERIALNAME VARCHAR(10) NOT NULL,
COSTID VARCHAR(10))

LOCATION TABLE
CREATE TABLE LOCATION(
LOCATIONID NUMBER(4) PRIMARY KEY,
LOCATION NAME VARCHAR(20),
QUADRANTID NUMBER(4),
CONSTRAINT FK_LOCATIONID_SUB FOREIGN KEY(LOCATIONID)

REFERENCES LOCATION (LOCATIONID))

EMPLOYEE TABLE

CREATE TABLE EMPLOYEE(

EMPLOYEEID NUMBER(4) PRIMARY KEY,
NAME VARCHAR(20),
SALARY NUMEBR(10),
ADDRESS VARCHAR(50),
PHONE NUMBER(15))

DISTRICT TABLE
CREATE TABLE DISTRICT(
DISTRICTID NUMBER(4) PRIMARY KEY,

DISTRICTNAME VARCHAR(20))

OPERATOR TABLE
CREATE TABLE OPERATOR(
OPERATORID NUMBER(4) PRIMARY KEY,
OPERATORNAME(4) PRIMARY KEY,
))


Related Discussions:- Physical model of traffic data management

What are the uses of the information in the data dictionary, What are the u...

What are the uses of the information in the Data dictionary? The following information is directly taken from the Data dictionary: Information on fields displayed with

Give some encryption techniques, Give some encryption techniques? A)  D...

Give some encryption techniques? A)  DES  B) AES  C) Public key encryption

How to design a formal and exact model, How to design a formal and exact mo...

How to design a formal and exact model How to design a formal and exact model of real-world problems by applying findings of analysis phase of OMT. The object design phase find

I need web security expert, I need web security expert , website management...

I need web security expert , website management Project Description: i want professional for the below . website management server management database management

What are advantages of using an index and disadvantages, What are the advan...

What are the advantages of by using an index and what are its disadvantages ? In difference, if the search key of a secondary index is not a candidate key, it is not sufficient

Determine the objectives of object oriented design, Determine the Objective...

Determine the Objectives of object oriented design provide an overview of object oriented design; partitioning system to subsystems; describe how a software desig

Differentiate between various levels of data abstraction, Differentiate bet...

Differentiate between various levels of data abstraction? Data Abstraction - Abstraction is the procedure to hide the irrelevant things from the users and represent the rele

Give detail explanation about cross-section of twisted pair, The cross-sect...

The cross-section of twisted pair The cross-section of each and every strand of the twisted pair is π/4 square mm. A 10-km length of this type of material, with two strands per

Keys, #questiontypes of keys examples..

#questiontypes of keys examples..

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd