I want u to complete this assignment asap. Purpose: Build a new database with two database tables. 1. Create a new database entitled  CompanyX2. Create the

I want u to complete this assignment asap.

Purpose: Build a new database with two database tables.

1. Create a new database entitled  CompanyX2. Create the following database tables:

Employee- Name, Age, Address, ID,StartDate, EndDate, Phone Number, Department ID

Department-Name, Building Number, Department ID, SquareFeet, Active Status, BudgetAmount

• Set the primary key.• Be sure to set the data types accordingly.• Keep in mind that data should be stored in the optimal form for searching data.• Use camel case notation when naming the fields.• Use the caption field property for the employee table so the names in datasheet view are more user friendly.• Limit the employee’s name fields to 50 characters each.• Create a lookup datatype for the department name. Populate the lookup with four fictitious names of your choice for the user to pick from.• Join the tables. Enforce Referential Integrity.3. Define the following terms/acronyms:

a.      Primary Key

b.      Foreign Key

c.       RDBMS

d.     Referential Integrity

e.      DBMS

f.        Table

g.      Record

h.      Field

i.        Relationship

j.        Input mask

    Upload your database to NEXUS.

4. Add additional table(s) to the JSP Recruiter’s database to accommodate recruiter dependents.  It can be downloaded off the Access section of Nexus.

 It is determined for benefit purposes that we must track each Recruiters family member(s). We should store the person’s name, address, and age. 

 Each recruiter can have many different dependents. A dependent could have many recruiters associated with them to account for things like marriages/family relations.  Implement this in your database. 

Keep in mind the relationship type.Set the primary keys as required.Add foreign key.Build all relationships in the relationship window.

Create one input mask for medical number. Assume the medical number is in this format: 12345, 65665.

Set the field length property for the length of address. Use your judgment as to the proper length. Be sure to set data types accordingly.

Implement a method in the database to make it possible to determine if the relationship between the Dependent and the Recruiter is current/in good standing.

hint- It is done in the new table you should have created.

5. Build a form best suited for each of your tables.

6. Find and save the following via query:a) Find all the Clients who owe more than 10k and are from City Berridge.b) Find Recruiters without clients.c) Count the number of Clients.d) Total the amount paid for all Clients.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should demonstrate your understanding of professional and ethical responsibility in relation to cyber security operations and leadership. For this assignment, review your coursework  and identify artifacts that can

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled The Importance of Knowing Your Own Security Posture.  After reviewing the story, conduct

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled Data Breach an All-Too-Often Occurrence. After reviewing the story, conduct research online into

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your Deadline: Aug 26, 08:00 PM  Assignment Topic: How to Avoid Being a Victim of Cybercrime Subject: Internet Technology (IT) Sources: 10 sources required Citation Style: APA 7th edition

Suppose that a certain basketball superstar has a 73.1% free throw percentage (that is, they make 73.1% of the free throws they attempt). Assume free

Suppose that a certain basketball superstar has a 73.1% free throw percentage (that is, they make 73.1% of the free throws they attempt). Assume free throw shots are independent from each other.If the basketball player is about to shoot 8 free throws, what is the probability that they miss at least 1 free throw shot? Give your answer rounded to four