Write constraint definitions for the following constraints
1. Primary key in the DEPT table
2. Foreign key DeptId in the EMPLOYEE table
3. CHECK constraint for QualId in the EMPLOYEE table
4. NOT NULL constraint for the MajorDesc column in the MAJOR table
5. UNIQUE constraint for DeptName in the DEPT table
1. Primary key in the DEPT table
CONSTRAINT dept_deptid_pk PRIMARY KEY (DeptId)
2. Foreign key DeptId in the EMPLOYEE table
CONSTRAINT employee_deptid_fk FOREIGN KEY (DeptId)
REFERENCES dept (DeptId)
3. CHECK constraint for QualId in the EMPLOYEE table
CONSTRAINT employee_qualid_ck
CHECK ((QualId >= 1) AND (QualId <= 5))
4. NOT NULL constraint for the MajorDesc column in the MAJOR table
MajorDesc VARCHAR2 (25) NOT NULL
5. UNIQUE constraint for DeptName in the DEPT table
CONSTRAINT dept_deptname_uk UNIQUE (DeptName)
You might also like to view...
The process of breaking a problem down into smaller pieces is sometimes called __________.
a. the divide and conquer method b. the scientific method c. top-down programming d. whole-into-part programming
If you are working on a web site for a client, now is the time to consider navigation.
a. What organizational scheme and organizational structure will you use? Justify your answer in terms of your card sorting interviews. Include a copy of your card sorting results with your answer. b. For the organizational structure you chose in part A, choose a navigational system. Justify your answer. c. Create a sketch of the navigation bar(s) you envision for the home page. Show the correspondence between the items in the navigation bars and the results of the card sorting sessions you conducted. d. Create a sketch of the navigation system that you envision on the second level pages. Explain how it is consistent with the navigation bar(s) on the home page. Also explain how it accommodates the results of the card sorting sessions you conducted.
Exchanging data securely with an online bank requires several steps. Place the steps listed below in order:
I. Step 1 II. Step 2 III. Step 3 IV. Step 4 V. Step 5 A. Your browser sends domain name to verify legitimacy and CA sends bank's public key to your browser. B. Browser and bank's computer uses symmetric key to encrypt and continue exchanging data. C. Browser uses your computer to generate a 64 bit or 128 bit number to be used as a symmetric key. D. Browser uses bank's public key to encrypt the number to be used as the symmetric key. E. Both computers erase symmetric key when finished.
A column in an Access table is called a characteristic
Indicate whether the statement is true or false