MODERN DATABASE MGMT.(PEARSON CHANNEL)
13th Edition
ISBN: 9780136709299
Author: Hoffer
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 8, Problem 8.45PAE
Program Plan Intro
To choose the oracle data types for the attributes in the normalized relations for the given figure.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The following exercises are based on the BITS database user views as designed in Your Turn 6-1 in this chapter. In each exercise, represent your answer in DBDL and with an Entity Relationship Diagram.
5. Indicate the changes you need to make to the BITS database design to support the following situation. The client address may or may not be the same as the Bill To address on the client's invoice.
For the purpose of illustrating the structure of a database, either an E-R diagram or DBDL may be used. If that's the case, which strategy do you favor, and why?
Using the relations that I attached, defined and normalized, create the SQL DDL statements necessary to implement database schema as an OpenOffice database. You may also implement your database in MySQL, IBM DB2 Express, Microsoft Access, SQL Server if you have access to these database systems. The answer should include a document that contains all of the SQL statements that you created and a screenshot that shows the structures that you implemented in the database of your choice. Your DDL statements must accommodate the following elements:
Create statements to create tables from the entities defined as part of the attachment.
Appropriate use of Null (and Not Null) parameters to ensure data validity
Appropriate use of constraint clauses to implement appropriate referential integrity
Use of data types and formats that is appropriate for the data in your database schema.
Appropriate use of keys including automatic generation of key values if appropriate
Shoulkd include:
* the…
Chapter 8 Solutions
MODERN DATABASE MGMT.(PEARSON CHANNEL)
Ch. 8 - Prob. 8.1RQCh. 8 - Prob. 8.2RQCh. 8 - Prob. 8.3RQCh. 8 - Prob. 8.4RQCh. 8 - Prob. 8.5RQCh. 8 - Prob. 8.6RQCh. 8 - Prob. 8.7RQCh. 8 - Prob. 8.8RQCh. 8 - Explain why you sometimes have to reserve much...Ch. 8 - Why are field values sometimes coded?
Ch. 8 - Prob. 8.11RQCh. 8 - Prob. 8.12RQCh. 8 - Explain why normalized relations may not comprise...Ch. 8 - Prob. 8.14RQCh. 8 - List three common situations that suggest that...Ch. 8 - Explain the reasons why some experts are against...Ch. 8 - Prob. 8.17RQCh. 8 - Prob. 8.18RQCh. 8 - Prob. 8.19RQCh. 8 - Prob. 8.20RQCh. 8 - Prob. 8.21RQCh. 8 - Prob. 8.22RQCh. 8 - One of the strongest recommendations regarding...Ch. 8 - Explain why an index is useful only if there is...Ch. 8 - Indexing can clearly be very beneficial. Why...Ch. 8 - Prob. 8.26RQCh. 8 - Prob. 8.27RQCh. 8 - Describe the role of data dictionary in the...Ch. 8 - Prob. 8.29RQCh. 8 - Prob. 8.30RQCh. 8 - Explain how creating a view may increase data...Ch. 8 - Prob. 8.32RQCh. 8 - Prob. 8.33RQCh. 8 - Prob. 8.34RQCh. 8 - Prob. 8.35RQCh. 8 - Prob. 8.36RQCh. 8 - Prob. 8.37RQCh. 8 - Prob. 8.38RQCh. 8 - Prob. 8.39RQCh. 8 - How can views be used as part of data security?...Ch. 8 - Prob. 8.41RQCh. 8 - Prob. 8.42RQCh. 8 - Consider the following two relations for...Ch. 8 - Prob. 8.44PAECh. 8 - Prob. 8.45PAECh. 8 - Prob. 8.46PAECh. 8 - Prob. 8.47PAECh. 8 - Suppose you are designing a default value for the...Ch. 8 - When a student has not chosen a major at a...Ch. 8 - Prob. 8.50PAECh. 8 - Prob. 8.51PAECh. 8 - Consider the relations in Problem and Exercise...Ch. 8 - Prob. 8.53PAECh. 8 - Prob. 8.54PAECh. 8 - Prob. 8.55PAECh. 8 - Prob. 8.56PAECh. 8 - Prob. 8.57PAECh. 8 - Consider the relations specified in Problem and...Ch. 8 - Prob. 8.59PAECh. 8 - Prob. 8.60PAECh. 8 - Prob. 8.61PAECh. 8 - Prob. 8.62PAECh. 8 - Prob. 8.63PAECh. 8 - Prob. 8.64PAECh. 8 - Problems and Exercises 8-65 through 8-68 refer to...Ch. 8 - Prob. 8.66PAECh. 8 - Problems and Exercises 8-65i5 through 8-68 refer...Ch. 8 - Refer to Figure 4-5 0. For each of the following...Ch. 8 - Prob. 8.69PAECh. 8 - Prob. 8.70PAECh. 8 - Prob. 8.71PAECh. 8 - Prob. 8.72PAECh. 8 - Prob. 8.73PAECh. 8 - Prob. 8.74PAECh. 8 - Prob. 8.75PAECh. 8 - Prob. 8.76PAECh. 8 - Prob. 8.77PAE
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- You have the option of using either an E-R diagram or a DBDL when trying to illustrate the structure of a database. Which tactic do you think is the best, and why do you think it's the best?arrow_forwardQuestion a. Normalization is an important concept for database professionals. Whether you are the designer, database analyst or administrator, it is useful for designing, situation verification as well as performance tuning. In your opinion discuss the basic issues to be aware of before carrying out the normalization process. b. Given the following relational schema and its functional dependencies: Rentallnfo custNo propertyNo custName pAddress rentStart ownerNo OName fd1 fd2 fd3 fd4 fd5 Specify candidate keys and state the primary key. Assuming that the relation is in first normal form (1NF), describe and illustrate the process of normalizing the relational schema to second (2NF) and third (3NF) normal forms. Identify the primary and foreign keys in your third normal forms. ii.arrow_forwardYou have been hired as a Database Developer and you have been given the option to use a trigger and a procedure. Discuss what triggers are and when it would be best to use them?arrow_forward
- The following tables form part of a database held in a relational DBMS: • Hotel (hotelNo, hotelName, city) • Room (roomNo, hotelNo, type, price) • Booking (hotelNo, guestNo, dateFrom, dateTo, roomNo) • Guest (guestNo, guestName, guestAddress) where Hotel contains hotel details and hotelNo is the primary key; Room contains room details for each hotel and (roomNo, hotelNo) forms the primary key; Booking contains details of bookings and (hotelNo, guestNo, dateFrom) forms the primary key; Guest contains guest details and guestNo is the primary key. 1. Identify the foreign keys in this schema. Explain how the entity and referential integrity rules apply to these relations. 2. Produce some sample tables for these relations that observe the relational integrity rules. Suggest some general constraints that would be appropriate for this schema. 3. Analyze the RDBMSS that you are currently using. Determine the support the system provides for primary keys, alternate keys, foreign keys, relational…arrow_forwardQuestion 2 UNISHOP is a company that manages equipment products, invoices from their respective vendors and sales representatives (SalesRep). UNISHOP vendors have been complaining about poor management of their product handling in the current manual system. As a result, the top management has decided that information related to the vendors should be organized using a DBMS. You have been hired to design the database. Draw an Entity Relationship Diagram (ERD) to represent the database based on the requirements given below: · An Invoice is used to keep track of the Product manage by SalesRep. customerName, customerAddress and customercity. The invoice is uniquely identified by its unique invoiceld. The invoice is written by only one salesrep but a salesrep may write zero or many invoices · SalesRep stores information about SalesRepID, SalesRepName and SalesRep Tel. · SalesRep manages the products. The Products store information such as ProductId, Productname, ProductInfo, SalesReplD and…arrow_forwardIn this part you will be to map the EER schema design to a relational database schema, and create the tables corresponding to the relational schema using the MySQL. You will add to your report a listing of the CREATE TABLE statements. Specify as many constraints (key, referential integrity) as you can in the relational schema. You should state the choices you made during the EER-to-relational mapping, and the reasons for your choicesarrow_forward
- he following tables form part of a database held in a relational DBMS:Hotel (hotelNo, hotelName, city) Room (roomNo, hotelNo, type, price) Booking (hotelNo, guestNo, dateFrom, dateTo, roomNo) Guest (guestNo, guestName, guestAddress) • where Hotel contains hotel details and hotelNo is the primary key;• Room contains room details for each hotel and (roomNo, hoteINo) forms the primary key;• Booking contains details of bookings and (hoteINo, guestNo, dateFrom) forms the primary key;• Guest contains guest details and guestNo is the primary key.a) Identify the foreign keys in this schema. Explain how the entity and referential integrity rules apply to these relations.b) Produce some sample tables for these relations that observe the relational integrity rules. Suggest some general constraints that would be appropriate for this schema.arrow_forwardTopic: Database Design It is known that can use the DBMS system to create a surrogate primary key when there is a natural key. What implications does this have on the DB performancewhen searching the table for a specific column (such as ROOM). Hint: When the table is created, the DBMS setups the table to be able to search on the primary key very quickly. What if this Event table was used by a Corporate Hotel chain to keep track of every they have hosted over the past 30 years in all of their hotels across all their chains (i.e. 8000 locations, 5 events a week avg, 30 years of data ~62.4 million events)?arrow_forwardBased on BITS database user views as designed in Your Turn 6-1 in this chapter. In each exercise, represent your answer in DBDL and with an Entity Relationship Diagram. 2. Indicate the changes you need to make to the design of the BITS database to support the following situation. There is no relationship between clients and consultants. When a client places an order (service request), it may be performed by any consultant. On the order, identify both the client placing the order and the consultant responsible for the order.arrow_forward
- BITS Corporation Exercises The following exercises are based on the BITS database user views as designed in Your Turn 6-1 in this chapter. In each exercise, represent your answer in DBDL and with a diagram. You may use any of the styles presented in this chapter for the diagram. 1. Indicate the changes you need to make to the design of the BITS database to support the following situation. A client is not necessarily represented by a single consultant but can be represented by several consultants. 2. Indicate the changes you need to make to the design of the BITS database to support the following situation. There is no relationship between clients and consultants. When a client places an order (service request), it may be performed by any consultant. On the order, identify both the client placing the order and the consultant responsible for the order. 3. Indicate the changes you need to make to the BITS database design to support the following situation. The region where clients are…arrow_forward1. What does “Normal Form” in DBMS mean? Give a simple example to make your explanation clear. 2. What does “Anomaly” in DBMS mean? Give a simple example to make your explanation clear. 3. What does “Functional Dependency” in DBMS mean? Give a simple example to make your explanation clear. 4. What is the difference(s) between “Logical Database Design” and “Physical Database Design”? Give a simple example to make your explanation clear. DATABASES MANAGMENT SYSTEM AS SOON AS POSSIBLEarrow_forwardRelational database integrity rules are especially important to good database design. Relational database management systems (RDBMSs) enforce integrity rules automatically, but it is much safer to make sure your application design conforms to the entity and referential integrity rules. As an upcoming database designer, explain in your own words, entity and referential integrity rules and comment on their importance in database designarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology PtrDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning