Q2/ Map your ER into a relational schema. All constraints must be included: Primary keys (PK) highlighted, foreign keys (FK) well referring to their PK, unique not null and other constraints also specified.
Q: What will you do to distinguish fake and factual information in the internet?
A: Solution :: Some of the best (opinions about what could or should be done about a situation) is to...
Q: Create a java program that will ask the user to input the following information for 5 employee: E...
A: Java is an object-oriented programming language that produces software for multiple platforms.
Q: A, B are two integers arrays. The base address of A and B are in register x10 and x11, respectively....
A: Let's see the solution in the next steps
Q: When converting the NFA given below to a regular expression, suppose you first decide to remove stat...
A: Regular Expression that would label the edge from qo to q3
Q: Write a program in java to input ‘+’ ,’-‘ , ‘*’ , ’/’ and two integers. Depending upon the symbols ...
A: We need to write a Java program to take input of '+', '-', '*', '/' and two integers. Then we need t...
Q: What is the minimum number of queues needed when implementing a priority queue?
A: A priority queue is a special type of queue in which each element is associated with a priority valu...
Q: What actions should a compar committing a crime? Discuss.
A: given - What actions should a company take to discourage employees from committing a crime? Discuss.
Q: gardless of how user level threads are implemented, if a programme has two or more user level thread...
A: Answer: The correct answer is True
Q: Write a Java program that will accept the amount of US Dollar and convert to Philippine Peso. The cu...
A: The given is a java program which converts American currency i.e. USD to Philippine currency peso wh...
Q: Why are credit bureaus' credit scoring algorithms kept hidden?
A: let us see the answer:- Introduction:- Credit scoring algorithms are getting more complicated and co...
Q: In the processing app (JAVA), create a variable called theta that keeps the value of it from 0 to 6....
A: logic:- use while(true) loop to run loop until condition meets. Display theta value from 0. increm...
Q: When does it make sense to break down large computer processes and programs into smaller subsystems?...
A: Answer: A procedure may be broken down into segments. There are several sizes of segments in a progr...
Q: Select all the members of the class that are accessible by an instance method in the given class bel...
A: class Bicycle { public int cadence; private int gear; protected int speed ; int id; ...
Q: Question 2 A network administrator configures the interface Gi7 on R1 with the command ip address 17...
A: Q2 what is the possible cause of problem
Q: Previous code doesn't work please provide a code that works
A: C++ Program for above : #include <bits/stdc++.h> using namespace std; int main() { sr...
Q: Why are there so many different partitioning algorithms in use by operating systems, and why are the...
A: Memory partitioning is a technique for splitting a computer's memory into parts that may be accessed...
Q: Using Divide and Conquer technique, sort the given number using quick sort 9,1,3,5,2,6,4
A: Answer is given below
Q: Question 1 : Assume that IUB students will get back to physical classes after this midterm week . Bu...
A: a ) What kind of Cloud Computing features might help to coordinate classroom & online hybrid cl...
Q: Q)write and apply porngmc inc++t) to convert Srom centigrate to fahrenleite where %3D
A: Given - We have a formula given that converts the temperature from centigrade value to Fahrenheit. T...
Q: Discuss how you determine the placement of primary keys in relational tables to link the tables to e...
A: Answer: The main key is the table's unique identification. A master key is a column (or group of col...
Q: Explain how bubble sort algorithm works.
A: Actually, bubble sort is a simple sorting algorithm.
Q: An expert system is different from a database program in that only an expert system can be used:
A: Answer: contains procedural knowledge is the correct answer
Q: What is a bubble sort, and how do you do it?
A: I have answered this question in step 2.
Q: Insert 18, 95, 29, 34, 17, 4, 2, 89 into a Splay Tree.
A: Here is the detailed explanation of the solution
Q: What Is SDILC?
A: This question comes from Software Engineering which is a paper of Computer Science. Let's discuss it...
Q: Please convert following figure into a relational schema. In each table, the primary key and foreign...
A: Here the entity BankBranch is a weak entity and therefore we need to include primary key of Bank as ...
Q: Explain what the GRANT statement is and how it pertains to the security of your system. For what kin...
A: The GRANT statement's syntax is as follows: GRANT parameter(1) ON parameter(2) TO parameter(3) [WITH...
Q: Create a flowchart in which the program gets a number from user and checks If it's a multiple of 3....
A: We need to create a flowchart. Where we take input from the user and check multiple conditions and p...
Q: Question:: When does it make sense to break down large computer processes and programs into smaller ...
A: Answer - While any large process is assigned to the computer it will divide the task into small mod...
Q: In what ways are Computer Science and Computer Engineering distinct from one another?
A: Computer Science which started as a branch of Mathematics, involves study of computing theory, progr...
Q: What are some of the algorithms that we utilise in our daily routines? Use clear notation and explai...
A: Answer : An algorithm is a precise, step-by-step set of instructions for solving a task. An algorith...
Q: What is the time complexity of the function above?
A: The domain of asymptotic analysis determines the complexity of time and space for a given algorithm....
Q: What is /0 (Zero) character
A: The zero character /0 is nothing but the ASCII starting character.
Q: II. Instructions: Below is the procedure in saving the file. Fill in the missing commands in each nu...
A: The current scenario here is to fill in the blanks with the answer in the box for the procedure in s...
Q: Question:: Write a loop to display the powers of 2 exactly as shown below: 1 4 18 16 32 64 128
A: - We need to have the values printed as the powers of 2 as expected. - We are using C++ here.
Q: Write a program that reads from an input file, given by a user, students grade information after a s...
A: Provide API documentation comments for your class(es), class constructor(s) and method(s) using the ...
Q: When does it make sense to break down large computer processes and programs into smaller subsystems?...
A: ==> Every software consists of processes/programs. ==> Breaking the process or program makes e...
Q: Why are there so many different partitioning algorithms in use by operating systems, and why they so...
A: I have answered this question in step 2.
Q: Question:: What Is SDLC?
A: The software development lifecycle(SDLC), commonly referred to as the software development process, ...
Q: An expert system is different from a database program in that only an expert system can be used
A: Defined the given statement
Q: You need to know how to add an item to an existing binary search tree
A: Insertion is used to add new value in a binary search tree at correct location. Insertion follow the...
Q: 3. Write JavaScript codes for the following program: Declare 2 variables: FirstName and LastName Get...
A: I am using prompt command to take input from usernwhich works only on browsers so I have written the...
Q: Respond to the following in a minimum of 175 words: Describe the necessary Java commands to create ...
A: Below is the code for the problem described. comments added import java.util.Random;import java.u...
Q: Write a JAVA Program to get thek largest elements in an user entered array.
A: Required:- Write a Java Program to get the k largest elements in a user-entered array. Approach:- Ta...
Q: 2. Using Divide and Conquer technique, sort the given number using quick sort 9,1,3,5,2,6,4
A: #include <bits/stdc++.h>using namespace std; void swap(int* a, int* b){ int t = *a; *a = *b; *...
Q: A single line containing a string with the three phrases "Sugar", "Spice", and "Everything Nice" in ...
A: The given program asks user to print the given phrases using print all in one line.
Q: Question:: Describe the TM that accepts the language, L = {w e {a,b,c}* | w contains equal number of...
A: We have to discribe the Turing machine that accepts the language.
Q: Discuss the future of research in data science and R
A: Future of research in Data science Data science consists of different operations of data which is ...
Q: art 1: Conceptual business model. Construct a conceptual business model for an industry or business ...
A: Question Part 1: Conceptual business model. Construct a conceptual business model for an industry...
Q: data dictornary of this for making tables
A: For 1 to many relationship , we make two tables. All relationships here are 1 to m only. All other d...
Step by step
Solved in 2 steps
- The relational schema shown below is part of a hospital database. The primary keys are highlighted in bold. Patient (patientNo, patName, patAddr, DOB)Ward (wardNo, wardName, wardType, noOfBeds)Contains (patientNo, wardNo, admissionDate)Drug (drugNo, drugName, costPerUnit)Prescribed (patientNo, drugNo, unitsPerDay, startDate, finishDate) for CONTAINS nad PRESCRIBED table , which one is primary key and how to create table ?Database Schema The schema for the Ch07_FACT database is shown below and should be used to answer the next several problems. Click this image to view it in its own tab. FIGURE P7.56 THE CH07_FACT ERD CHECKOUT PATRON PK Check Num PK Pat ID FK1 Book_Num FK2 Pat_ID Check_Out_Date Check_Due_Date Check_In_Date >0-----H- Pat_FName Pat LName Pat_Type BOOK AUTHOR PK Book_Num PK Au ID Book_Title Book_Year Book_Cost Book_Subject FK1 Pat_ID Au_FName Au_LName Au_BirthYear WRITES PK,FK1 Book Num PK,FK2 Au ID The CIS Department at Tiny College maintains the Free Access to Current Technology (FACT) library of e-books. FACT is a collection of current technology e-books for use by faculty and students. Agreements with the publishers allow patrons to electronically check out a book,The relational schema shown below is part of a hospital database. The primary keys are highlighted in bold. Patient (patientNo, patName, patAddr, DOB)Ward (wardNo, wardName, wardType, noOfBeds)Contains (patientNo, wardNo, admissionDate)Drug (drugNo, drugName, costPerUnit)Prescribed (patientNo, drugNo, unitsPerDay, startDate, finishDate) Formulate the following SQL statements: a) Find the names of all the patients being prescribed ‘Morphine’.b) What is the total cost of Morphine supplied to a patient called ‘John Smith’?c) For each ward that admitted more than 10 patients today, list the ward number, ward type and number of beds in each ward.
- The relational schema shown below is part of a hospital database. The primary and foreign keys are highlighted in bold. Patient (patientNo, patName, patAddr, DOB)Ward (wardNo, wardName, wardType, noOfBeds)Admission (patientNo, wardNo, admissionDate)Drug (drugNo, drugName, costPerUnit)Prescribed (patientNo, drugNo, unitsPerDay, startDate, finishDate) Write SQL queries based on the hospital database given above: 1. Create the above tables together with its constraints. 2. Insert some data into the tables to check that the tables created are correct. No limit on how many rows you want to add. Insert Syntax:insert into table_namevalues (col1_value, col2_value, etc.); 3. List all the patients’ details, alphabetically by name. IF YOU WANT SOME CHALLENGE4. List all the patients admitted today. (Join between Patient and Admission table)Can composite keys include composite attributes?Write SQL code for the following design schema of three tables. The tables should have the following properties: sales table has a primary key on SalesNumber and it is set to AUTO-INCREMENT.products table has a primary key on number and it is set to AUTO-INCREMENT, they is an unique index on prodidsalesdetails table has a primary key on number and it is set to AUTO-INCREMENT, they is an index on prodid. They is a one-to-many relationship between the salesdetails.SalesNumber andsales.SalesNumber fields. There is a one-to-many relationship between the products.prodid and salesdetails.prodid fields. There is to be a delete constraint on the product.prodid field a record in the product table should not be allowed to be deleted if they exist a matching prodid in the salesdetails table. Primary and foreign keys should be implemented in the appropriate tables. Referential Integrity should be enforce at the database level, where appropriate for example, if a sales record is deleted all…
- Primary keys and candidate keys may both be assigned to the same attribute.true /false The system-defined database used as a template for all “to be created” databases is the tempdb database. The entire contents of this database, including database options, are copied to the new database. Thus, if you modify this database, all databases created afterward will inherit those changes. OUTER JOIN types return only non-matching tuples. When we create a primary key (PK) some Database Management Systems (DBMS) automaticallly create a Foreign Key constraint on the attributes of the PK. SQL Server DBMS is one of these DBMSs. If a relation has more than one candidate key, we can implement this by creating a Primary Key constraint for one of the candidate keys, and a UNIQUE constraint for each and every one of the alternate keys. Using the Query Editor Window, “select TOP 1000 Rows” retrieves the first 1000 tuples of a relation (assuming that the relation has 1000 or more tuples). If there is…Implement a new independent entity phone in the Sakila database. Attributes and relationships are shown in the diagram below The diagram uses Sakila naming conventions. Follow the Sakila conventions for your table and column names: All lower case Underscore separator between root and suffix Foreign keys have the same name as referenced primary key Write CREATE TABLE and ALTER TABLE statements that: Implement the entity as a new phone table. Implement the has relationships as foreign keys in the Sakila customer, staff, and store tables. Remove the existing phone column from the Sakila address table. Step 2 requires adding a foreign key constraint to an existing table. Ex: ALTER TABLE customer ADD FOREIGN KEY (phone_id) REFERENCES phone(phone_id) ON DELETE SET NULL ON UPDATE CASCADE; Specify data types as follows: phone_id, phone_number, and country_code have data type INT. phone_type has date type VARCHAR(12) and contains strings like 'Home', 'Mobile', and 'Other'. Apply these…
- Write appropriate SQL DDL statements for declaring the database "Employee", assign admin privilege to user "AMAL" Write appropriate SQL DDL statements for declaring the table PERSONS. Specify all constraints: Field Null key PersonID No PRIMARY No LastName varchar(30) FirstName varchar(30) No Address varchar(50) YES City varchar(30) YES Type intPage - 1 DBMS - TASK 1: Draw an ERD and Map it to relational schema. Please complete reading page 1 before going to page 2. In this task, you will be given a text that describes a company (in page 2). Each student should complete the steps below to fully solve the task Represent the company description as an ER-diagram, including all relevant constraints as the following steps: - Each student should download Lucidchart app Every student should use Lucidchart to draw the ERD Edit Lucidchart Blank diagram Select View Insert Arrange Help 80 What's New Saved Start a free trial to access unlimited shapes and documents! X BIUAT- 2 px None None 408 Liberation Sans ▾ 10 pt + Shapes O Standard × T Flowchart 000 ☐ ODOT ☐ ☐ ☐ ☐ ☐☐ )>0 × TU Xx 14 << ΔΟ ▼ Shapes ΠΑ ☐ ☐ Name B Present MA when you create After each entity ID print screen, your name include your user ID should be shown university ID number Department 0190334 Dep_ID Employee 0190334 Name4 tables for the database: PATRON, BOOK_COPY, BOOK, and CHECKOUT. (Since a book may have multiple copies that may be purchased by the library at different time, it is better to have a BOOK_COPY table to avoid unnecessary data redundancy.) The data in the tables are as follows: PATRON table records a patron’s ID, name, address, phone number, and email address. BOOK table contains information such as author, title, publication date, subject, language, and a unique identifier (It can be the ISBN of the book) for each book. BOOK_COPY table records a unique identifier for each copy of a book, the date of purchase, and the identifier of the book from the BOOK table. CHECKOUT table records the date of check-out, patron’s ID, the identifier of the book copy from the BOOK_COPY table, and the due date.