1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
4 years ago
11

2. (8 points) When creating the Academic Database, there were several instances of data

Computers and Technology
1 answer:
Bad White [126]4 years ago
8 0

Answer:

See explaination

Explanation:

An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.

One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.

One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.

Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.

You might be interested in
While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report
Alex_Xolod [135]

Answer: Metadata

Explanation: Metadata is a type of 'data' which summarizes or gives information about data. It is used for referencing data which can be very helpful while working with such data as it brings ease and provides understanding of the data. Metadata data harbors specific details about data files such as documents, web pages, videos, images, spreadsheets. It contains information such as author, date created, title or meaning of headers or shortened names, file size.

In the scenario above, author's name, subject and title created in the report properties are Metadata which contains basic information about her report.

4 0
4 years ago
1. PIN
bekas [8.4K]

Answer:

pin the answer you fakoma

Explanation:

4 0
3 years ago
I’m select circumstances is a permissible character on the Mac operating system
myrzilka [38]

Answer: /

Explanation: Answer

4 0
3 years ago
CHKDSK is a system utility that is commonly found in Windows. What is CHKDSK? Use the Internet to research and write about CHKDS
Alex_Xolod [135]

chkdsk is a utility that you use to check for bad sectors on a hard drive , as far as how to run it you open the start menu go to your run bar and type chkdsk then follow the instruction on the screen .

6 0
4 years ago
Read 2 more answers
Electronic type is often considered to be the latest step in the evolution of the written ______________.
Allisa [31]
It isn’t people but im really confused. I think its A but dont come at me if its wrong
4 0
3 years ago
Other questions:
  • The rubric given to them by their teacher requires that
    14·1 answer
  • A comma is also called a statement terminator. A. True B. False
    8·1 answer
  • which is a set of techniques that use descriptive data and forecasts to identify the decisions most likely to result in the best
    8·1 answer
  • Whers the main characteristic of a Peer-to-peer (P2P) network?
    14·1 answer
  • Images are available in many formats, such as tif, bmp, gif, jpeg, and ____.
    5·1 answer
  • Text and graphics that have been out of copied are stored in area called the _____
    15·2 answers
  • Jane is a full-time student on a somewhat limited budget, taking online classes, and she loves to play the latest video games. S
    14·1 answer
  • When proposing a plan in detail for video production phases, fundraising, and outreaching, which section will you use to make su
    14·2 answers
  • Which of the following statements is FALSE?
    5·1 answer
  • with the aid of your own example explain how memory,registers and secondary storage all work together​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!