This document provides instructions for a lab involving creating relationship diagrams from database table definitions. Students are asked to draw relationship diagrams connecting tables for customer, order, employee and product data, and to analyze whether a foreign key column should allow null values. The deliverable is a Word document with the diagrams, an analysis of allowing null values, and lists of entities and attributes identified from a database project specification.
Find Top SQL Developers today. Toptal can match you with the best engineers to finish your project. Or, match you with the best companies that need your SQL skills today!
Find Top SQL Developers today. Toptal can match you with the best engineers to finish your project. Or, match you with the best companies that need your SQL skills today!
C (/ˈsiː/, as in the letter c) is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations. By design, C provides constructs that map efficiently to typical machine instructions, and therefore it has found lasting use in applications that had formerly been coded in assembly language, including operating systems, as well as various application software for computers ranging from supercomputers to embedded systems.
C was originally developed by Dennis Ritchie between 1969 and 1973 at Bell Labs,[5] and used to re-implement the Unix operating system.[6] It has since become one of the most widely used programming languages of all time,[7][8] with C compilers from various vendors available for the majority of existing computer architectures and operating systems. C has been standardized by the American National Standards Institute (ANSI) since 1989 (see ANSI C) and subsequently by the International Organization for Standardization (ISO).
COMP 2213X2 Assignment #2 Parts A and BDue February 3 in cla.docxdonnajames55
COMP 2213X2 Assignment #2 Parts A and B
Due February 3 in class
PLEASE HAND IN PARTS A AND B SEPARATELY!!!!
For “written” questions, please type your answers, use your very best English, and carefully
consider the material from the chapters. I am usually only looking for a few sentences for each
question, not an essay that goes on for pages. So choose your words carefully and thoughtfully.
PART A
[1] Does a computer need data registers (like D0–D7 in an M68K)? Defend your answer!
[2] Textbook question 5.35. If your student number is even, do parts (a), (c), (e) and (g). Otherwise do
parts (b), (d), (f) and (h). Note that (b) should read “[[[4]]]”, (c) should read “[[[0]]]” and
(h) should start with “[0]”.
[3] Explain why the following assembly language and RTL constructs are incorrect.
a. MOVE D3,#4
b. MOVE [D3],D2
c. MOVE (D3),D2
d. [D3] A0 + 3
e. [D3] #3
f. 3 [D3]
[4] Create a simple M68K program called ADDER. Your program should add together the numbers:
6, 4, 12, 16, 17, and 50. The program should leave the answer in register D0 when it terminates.
The program is to be assembled with the M68K cross-assembler and then run on the M68K simu-
lator. You can either install the cross-assembler and simulator given with the textbook (windows)
or you can use the Linux one available on the course web site. Doing a trace (to hand in) with the
windows version is much more painful than the Linux version, so make your choice carefully (and
you have to figure out the windows one without my help).
To use the Linux assembler (“68kasm”) and simulator (“bsvc”), follow the instructions in my
mail message of January 26, if you have not already done so.
IMPORTANT NOTE: if you are using the Linux simulator, the instructions for creating a program
are slightly different than those in the book. You should have the following at the start of each
program:
ORG $0
DC.L $8000 This is the stack pointer value after a "reset"
DC.L START This is the first instruction to execute
You can then follow that with something like
1
ORG $1000
START MOVE ...
You should still have a STOP instruction and END assembler directive, as described in the book,
but also use a BREAK instruction right before your STOP instruction.
Create your program (ADDER.s) in your (for example) comp2213/bsvc-master directory using
your favourite text editor and assemble it with the command 68kasm -l ADDER.s. If you had no
assembly errors you should now have a file called ADDER.h68 (which is your executable program)
and ADDER.lis (your program listing). Then start up the simulator by typing bsvc. Select
File/Open Setup, drill down to samples/m68000, select serial.setup and click Open; a
new window should pop up on your screen. Now choose File/Load Program, come back up to
your bsvc-master directory, and open your ADDER.h68 program. Now click the GUI’s Reset
button and then the Run button. (Alternatively, instead of Run click Single Step and watch the
result of each instruction..
Page 5 of 7Delete this text and type your name hereThis fi.docxalfred4lewis58146
Page 5 of 7
Delete this text and type your name here
This file will become rather large due to your screen shots. I encourage you to compress this file (zip) before submitting it.
Lab 6: 40 Total Points Possible
You will need to log into Apex at https://iacademy.oracle.com" https://iacademy.oracle.com in order to complete this assignment.
Sections 7-8--Programming with SQL
Section 7-8 Objectives: Working with DML and DDL Statements
Creating and Modifying TablesUsing Data Types
Vocabulary:
Directions: Identify the vocabulary word(s) for each definition below. (1 Point each)
1. Command used to make a new table.
Answer:
2. A collection of objects that are the logical structures that directly refer to the data in the database. Answer:
3. Specifies a preset value if a value is omitted in the INSERT statement.
Answer:
4. Stores data; basic unit of storage composed of rows and columns.
Answer:
5. Created and maintained by the Oracle Server and contains information about the database.
Answer:
Try It / Solve It:
Log into Apex. Execute the following CREATE TABLE SQL statement:
CREATE TABLE grad_candidates
(student_id NUMBER(6),
last_name VARCHAR2(15),
first_name VARCHAR2(15),
credits NUMBER (3),
graduation_date DATE);
After executing the above SQL statement, you should receive a ‘Table Created ‘message.
1. Create an SQL statement that will describe the structure of the table object called grad_candidates. Provide a screen shot of your table properties as shown below. (2 Points):
Select Statement You Used:
My example of table structure results from Apex (copy): YOU MUST DELETE MY SCREEN SHOT BELOW AND INSERT YOUR OWN. YOUR SCREEN SHOW MUST SHOW YOUR WORSPACE IN ORDER TO RECEIVE CREDIT. (1 Point)
2. Create a new table using a subquery. Name the new table your last name – e.g., herbert_table. Using a subquery, copy grad_candidates into herbert_table. Provide a screen shot of the table structure. (2 Points)
Select Statement You Used:
My example of table structure results from Apex (copy): YOU MUST DELETE MY SCREEN SHOT BELOW AND INSERT YOUR OWN. YOUR SCREEN SHOW MUST SHOW YOUR WORSPACE IN ORDER TO RECEIVE CREDIT. (1 Point)
3. Insert your personal information into the HERBERT_TABLE (or whatever name you gave it). Hint: DATE and VARCHAR2 data type values need to have an apostrophe surrounding each value ('). (2 Points)
Select Statement You Used:
My example of table content results from Apex (copy): YOU MUST DELETE MY SCREEN SHOT BELOW AND INSERT YOUR OWN. (1 Point)
3. Create an SQL statement using the ALTER TABLE command. Alter the HERBERT_TABLE (or whatever name you gave it) and insert a new column called e_mail_address with a VARCHAR2 data type that will hold 80 characters. (2 Points)
Select Statement You Used:
4. Create an SQL statement that will describe the structure of the table object you just inserted the e_mail_address column into. Provide a screen shot of the table structure. (2 Point)
Select Statement You Used:
My ex.
C (/ˈsiː/, as in the letter c) is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations. By design, C provides constructs that map efficiently to typical machine instructions, and therefore it has found lasting use in applications that had formerly been coded in assembly language, including operating systems, as well as various application software for computers ranging from supercomputers to embedded systems.
C was originally developed by Dennis Ritchie between 1969 and 1973 at Bell Labs,[5] and used to re-implement the Unix operating system.[6] It has since become one of the most widely used programming languages of all time,[7][8] with C compilers from various vendors available for the majority of existing computer architectures and operating systems. C has been standardized by the American National Standards Institute (ANSI) since 1989 (see ANSI C) and subsequently by the International Organization for Standardization (ISO).
COMP 2213X2 Assignment #2 Parts A and BDue February 3 in cla.docxdonnajames55
COMP 2213X2 Assignment #2 Parts A and B
Due February 3 in class
PLEASE HAND IN PARTS A AND B SEPARATELY!!!!
For “written” questions, please type your answers, use your very best English, and carefully
consider the material from the chapters. I am usually only looking for a few sentences for each
question, not an essay that goes on for pages. So choose your words carefully and thoughtfully.
PART A
[1] Does a computer need data registers (like D0–D7 in an M68K)? Defend your answer!
[2] Textbook question 5.35. If your student number is even, do parts (a), (c), (e) and (g). Otherwise do
parts (b), (d), (f) and (h). Note that (b) should read “[[[4]]]”, (c) should read “[[[0]]]” and
(h) should start with “[0]”.
[3] Explain why the following assembly language and RTL constructs are incorrect.
a. MOVE D3,#4
b. MOVE [D3],D2
c. MOVE (D3),D2
d. [D3] A0 + 3
e. [D3] #3
f. 3 [D3]
[4] Create a simple M68K program called ADDER. Your program should add together the numbers:
6, 4, 12, 16, 17, and 50. The program should leave the answer in register D0 when it terminates.
The program is to be assembled with the M68K cross-assembler and then run on the M68K simu-
lator. You can either install the cross-assembler and simulator given with the textbook (windows)
or you can use the Linux one available on the course web site. Doing a trace (to hand in) with the
windows version is much more painful than the Linux version, so make your choice carefully (and
you have to figure out the windows one without my help).
To use the Linux assembler (“68kasm”) and simulator (“bsvc”), follow the instructions in my
mail message of January 26, if you have not already done so.
IMPORTANT NOTE: if you are using the Linux simulator, the instructions for creating a program
are slightly different than those in the book. You should have the following at the start of each
program:
ORG $0
DC.L $8000 This is the stack pointer value after a "reset"
DC.L START This is the first instruction to execute
You can then follow that with something like
1
ORG $1000
START MOVE ...
You should still have a STOP instruction and END assembler directive, as described in the book,
but also use a BREAK instruction right before your STOP instruction.
Create your program (ADDER.s) in your (for example) comp2213/bsvc-master directory using
your favourite text editor and assemble it with the command 68kasm -l ADDER.s. If you had no
assembly errors you should now have a file called ADDER.h68 (which is your executable program)
and ADDER.lis (your program listing). Then start up the simulator by typing bsvc. Select
File/Open Setup, drill down to samples/m68000, select serial.setup and click Open; a
new window should pop up on your screen. Now choose File/Load Program, come back up to
your bsvc-master directory, and open your ADDER.h68 program. Now click the GUI’s Reset
button and then the Run button. (Alternatively, instead of Run click Single Step and watch the
result of each instruction..
Page 5 of 7Delete this text and type your name hereThis fi.docxalfred4lewis58146
Page 5 of 7
Delete this text and type your name here
This file will become rather large due to your screen shots. I encourage you to compress this file (zip) before submitting it.
Lab 6: 40 Total Points Possible
You will need to log into Apex at https://iacademy.oracle.com" https://iacademy.oracle.com in order to complete this assignment.
Sections 7-8--Programming with SQL
Section 7-8 Objectives: Working with DML and DDL Statements
Creating and Modifying TablesUsing Data Types
Vocabulary:
Directions: Identify the vocabulary word(s) for each definition below. (1 Point each)
1. Command used to make a new table.
Answer:
2. A collection of objects that are the logical structures that directly refer to the data in the database. Answer:
3. Specifies a preset value if a value is omitted in the INSERT statement.
Answer:
4. Stores data; basic unit of storage composed of rows and columns.
Answer:
5. Created and maintained by the Oracle Server and contains information about the database.
Answer:
Try It / Solve It:
Log into Apex. Execute the following CREATE TABLE SQL statement:
CREATE TABLE grad_candidates
(student_id NUMBER(6),
last_name VARCHAR2(15),
first_name VARCHAR2(15),
credits NUMBER (3),
graduation_date DATE);
After executing the above SQL statement, you should receive a ‘Table Created ‘message.
1. Create an SQL statement that will describe the structure of the table object called grad_candidates. Provide a screen shot of your table properties as shown below. (2 Points):
Select Statement You Used:
My example of table structure results from Apex (copy): YOU MUST DELETE MY SCREEN SHOT BELOW AND INSERT YOUR OWN. YOUR SCREEN SHOW MUST SHOW YOUR WORSPACE IN ORDER TO RECEIVE CREDIT. (1 Point)
2. Create a new table using a subquery. Name the new table your last name – e.g., herbert_table. Using a subquery, copy grad_candidates into herbert_table. Provide a screen shot of the table structure. (2 Points)
Select Statement You Used:
My example of table structure results from Apex (copy): YOU MUST DELETE MY SCREEN SHOT BELOW AND INSERT YOUR OWN. YOUR SCREEN SHOW MUST SHOW YOUR WORSPACE IN ORDER TO RECEIVE CREDIT. (1 Point)
3. Insert your personal information into the HERBERT_TABLE (or whatever name you gave it). Hint: DATE and VARCHAR2 data type values need to have an apostrophe surrounding each value ('). (2 Points)
Select Statement You Used:
My example of table content results from Apex (copy): YOU MUST DELETE MY SCREEN SHOT BELOW AND INSERT YOUR OWN. (1 Point)
3. Create an SQL statement using the ALTER TABLE command. Alter the HERBERT_TABLE (or whatever name you gave it) and insert a new column called e_mail_address with a VARCHAR2 data type that will hold 80 characters. (2 Points)
Select Statement You Used:
4. Create an SQL statement that will describe the structure of the table object you just inserted the e_mail_address column into. Provide a screen shot of the table structure. (2 Point)
Select Statement You Used:
My ex.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
1. CIS 336 Week 1 iLab 1 Devry University
Click this link to get the tutorial:
http://homeworkfox.com/tutorials/general-
questions/4148/cis-336-week-1-ilab-1-devry-university/
LABOVERVIEW
Scenario/Summary
This lab will introduce you to the processes involved in defining one of the key components of a
data model; the relationship diagram (RD). In this lab, you will draw a relationship diagram for
two of the steps shown. Keep in mind when you are trying to decide which side of the
relationship should be the "one" side and which should be the "many" that you must first decide
which side has the primary key, or unique identifier. Once you have decided the primary key of
the relationship, you have identified the "one" side of the relationship. Note that for an RD, the
foreign key "many" side of the relationship points to the primary key "one" side. The "one" side
should have the arrowhead point of the connecting line. This is different than an
entity/relationship diagram (ERD) that we will draw next week, where the "many" side has
crow's feet.
This will familiarize you with how to set up MS Visio to draw database diagrams. Steps 1 - 3
below use the Customer, Order, and Employee tables of a simplified Order Entry database. The
Customer table records clients who have placed orders. The Order table contains the basic facts
about customer orders. The Employee table contains facts about employees who take orders. The
primary keys of the tables are CustNo for Customer, EmpNo for Employee, and OrdNo for
Order.
The following are the TABLE definitions for the first three tables showing the PRIMARY KEY
constraints.
TABLE Customer has the following attributes
CustNo NUMBER(5)
CustFirstName VARCHAR2(20)
CustLastName VARCHAR2(30)
CustCity VARCHAR2(30)
CustState CHAR(2)
CustZip CHAR(10)
CustBal NUMBER(12,2)
CustNo is the PRIMARY KEY
2. TABLE Employee has the following attributes
EmpNo NUMBER(5)
EmpFirstName VARCHAR2(20)
EmpLastName VARCHAR2(30)
EmpPhone CHAR(15)
EmpNo is the PRIMARY KEY
TABLE Order has the following attributes
OrdNo NUMBER(5)
OrdDate DATE
CustNo NUMBER(5)
EmpNo NUMBER(5)
OrdNo is the PRIMARY KEY
Your task for this lab is to create the required relationship diagram for steps 1 and 2 using
Microsoft Visio. Step 3 will require you to analyze the scenario given and present your own
resolution to the question. Step 4 is an individual assignment that will introduce you to the group
project and the process of identifying entities and attributes. When finished with the lab, you
should have a complete diagram using all 5 entities, a written explanation for #3, and two lists
(entities and attributes) for Step 4.
Deliverables
The deliverable for this lab is a single MS Word document named "Lab1_solution_yourname"
with the diagram for problems 1 and 2, the written answer for the question in Step 3, and the lists
of entities and attributes for the Initial Project Exercise (Step 4). You should copy and paste the
diagram from MS Visio into a Word document and use this document for Steps 3 and 4.
LABSTEPS
STEP 1: Drawing your first ER diagram Title
Identify the foreign key columns in the table structures above and draw a relationship diagram
depicting the relationships between the tables. In the Order table , the CustNo column references
the Customer table and the EmpNo column references the Employee table. For each relationship,
identify the table on the "1" side of the relationship and the table on the "Many" side.
3. STEP 2: Extending the ER diagram
Extend your relationship diagram from problem 1 by adding two tables (OrdLine and Product).
Table definitions for the table structures and primary keys constraints are shown below. You will
need to identify the FOREIGN KEY(s) to complete this problem. When finished you should
have a total of 5 tables represented in your diagram for this problem. To copy and paste the
diagram into Word, select Edit from the menu and then Copy Diagram. Open a Word document
and use CTRL-V to paste the diagram.
TABLE Product has the following attributes
ProdNo CHAR(8)
ProdName VARCHAR2(20)
ProdNo is the PRIMARY KEY
TABLE OrdLine has the following attributes
OrdNo CHAR(8)
ProdNo CHAR(8)
Qty NUMBER(5)
The combination of OrdNo and Prodno is the PRIMARY KEY
STEP 3: Should a NULL be allowed?
From examination of the sample data and your current understanding of businesses in which
orders could be placed either in person, over the phone, or over the Internet, determine if it
would be permissible for null values to be allowed for the foreign key EmpNo in the Order table.
This column would reference back to the EmpNo column in the employee table. Why or why
not?
OrdNo OrdDate CustNo EmpNo
O1656777 02/11/2000 C8543321
O7959898 02/19/2000 C8543321 E8544399
STEP 4: Initial Project Exercise
Although the overall project itself will be done as a group, this first exercise is designed as an
individual effort and is intended to; (1) get you to read the project specifications, and; (2)
introduce you to the first step in designing a database from scratch. This little exercise will have
4. you see how many entities and attributes you can find in the project specifications. In week three,
you will work with your assigned project team and compare notes on what you have found. This
is not rocket science here so remember, you are looking for people, places, things, and events
(entities) and the attributes that describe them.