1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
3 years ago
7

Create the tables and appropriate constraints based on the following ER diagram. Use appropriate data types. Note that the size

column should only accept S, M, or L. In addition the price column should only have values greater than zero. All columns in both tables are required. ====================== CATEGORY table: Category Cid Description ====================== PRODUCT table: pid description cid (fk) Price Size (S/M/L)
Computers and Technology
1 answer:
SpyIntel [72]3 years ago
7 0

Answer:

See explaination

Explanation:

CREATE TABLE CATEGORY

(

cid int NOT NULL,

description varchar2(1000),

PRIMARY KEY (cid)

);

CREATE TABLE PRODUCT

(

pid int NOT NULL,

description varchar2(1000),

cid int,

price int,

p_size varchar2(1),

CONSTRAINT chk_price CHECK (price>0),

CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),

CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)

);

You might be interested in
When a subdomain has been delegated to a zone on another server, the DNS server hosting the parent zone maintains only an NS rec
Vedmedyk [2.9K]

Answer:

True of False?

True

Explanation:

Different sub domains can be directed to different IPs servers but a client server cannot be forced to keep looking at name servers for additional records.

To delegate a subdomain to a zone on another server, one would need to add NS-records for the sub-domain name. This would point to the host names of the DNS servers hosting the sub-domain - in the parent zone.

In the "DNS records" window right-click the parent zone in the left list and select "New NS-record":

8 0
4 years ago
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
One main advantage of CD-ROMs is that
Norma-Jean [14]
They can hold a lot of information is what you're looking for  , i can remember having this question back when i did my GCSEs <span />
6 0
3 years ago
What is the recommended size for bulleted text? 12–22 24–40 44–66 54–80
algol [13]
44–66

According to sources, the most probable answer to this query is 44–66 point size.
This is because the eyes and the illustration should match the proportion of distance and height factors.
Thank you for your question. Please don't hesitate to ask in Brainly your queries. 
5 0
4 years ago
Consider the following relation for published books: BOOK (Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher
Ivenika [448]

The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

<u>Explanation:</u>

<u> lGiven the relation </u>

<u>l</u>Book(Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher)

land the FDs

lBook_title . Publisher, Book_type

lBook_type . Listprice

lAuthorname .Author_affil

(a) The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

(b) 2NF decomposition:

lBook0(Book_title, Authorname)

lBook1(Book_title, Publisher, Book_type, Listprice)

lBook2(Authorname, Author_affil)

<u> This decomposition eliminates the partial dependencies. </u>

3NF decomposition:

lBook0(Book_title, Authorname)

lBook1-1(Book_title, Publisher, Book_type)

lBook1-2(Book_type, Listprice)

lBook2(Authorname, Author_affil)

l<u>This decomposition eliminates the transitive dependency of Listprice </u>

8 0
3 years ago
Other questions:
  • Your crt monitor flickers. what should you do
    6·1 answer
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    10·2 answers
  • To edit the text in a smartart graphic, what must be done first ?
    7·2 answers
  • The most frequently applied heuristic in problem solving is a(an) _________, which involves repeated tests for differences betwe
    13·1 answer
  • Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.
    8·1 answer
  • . Why did the designers of the Synchronous Digital Hierarchy choose unusual values for data rates instead of the exact powers of
    11·1 answer
  • Which of the following information should be included in audit documentation? a. Procedures performed. b. Audit evidence examine
    13·1 answer
  • The fill command try’s to fill or generate content for cells based on a ________.
    15·1 answer
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
  • If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/A
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!