Write constraint definitions for the following constraints

1. Primary key in the DEPT table
2. Foreign key DeptId in the EMPLOYEE table
3. CHECK constraint for QualId in the EMPLOYEE table
4. NOT NULL constraint for the MajorDesc column in the MAJOR table
5. UNIQUE constraint for DeptName in the DEPT table


1. Primary key in the DEPT table
CONSTRAINT dept_deptid_pk PRIMARY KEY (DeptId)
2. Foreign key DeptId in the EMPLOYEE table
CONSTRAINT employee_deptid_fk FOREIGN KEY (DeptId)
REFERENCES dept (DeptId)
3. CHECK constraint for QualId in the EMPLOYEE table
CONSTRAINT employee_qualid_ck

CHECK ((QualId >= 1) AND (QualId <= 5))
4. NOT NULL constraint for the MajorDesc column in the MAJOR table
MajorDesc VARCHAR2 (25) NOT NULL
5. UNIQUE constraint for DeptName in the DEPT table
CONSTRAINT dept_deptname_uk UNIQUE (DeptName)

Computer Science & Information Technology

You might also like to view...

The process of breaking a problem down into smaller pieces is sometimes called __________.

a. the divide and conquer method b. the scientific method c. top-down programming d. whole-into-part programming

Computer Science & Information Technology

If you are working on a web site for a client, now is the time to consider navigation.

a. What organizational scheme and organizational structure will you use? Justify your answer in terms of your card sorting interviews. Include a copy of your card sorting results with your answer. b. For the organizational structure you chose in part A, choose a navigational system. Justify your answer. c. Create a sketch of the navigation bar(s) you envision for the home page. Show the correspondence between the items in the navigation bars and the results of the card sorting sessions you conducted. d. Create a sketch of the navigation system that you envision on the second level pages. Explain how it is consistent with the navigation bar(s) on the home page. Also explain how it accommodates the results of the card sorting sessions you conducted.

Computer Science & Information Technology

Exchanging data securely with an online bank requires several steps. Place the steps listed below in order:

I. Step 1 II. Step 2 III. Step 3 IV. Step 4 V. Step 5 A. Your browser sends domain name to verify legitimacy and CA sends bank's public key to your browser. B. Browser and bank's computer uses symmetric key to encrypt and continue exchanging data. C. Browser uses your computer to generate a 64 bit or 128 bit number to be used as a symmetric key. D. Browser uses bank's public key to encrypt the number to be used as the symmetric key. E. Both computers erase symmetric key when finished.

Computer Science & Information Technology

A column in an Access table is called a characteristic

Indicate whether the statement is true or false

Computer Science & Information Technology