Solved

Database Symbols

Posted on 2011-02-25
3
427 Views
Last Modified: 2012-05-11
This is a continuation of http://www.experts-exchange.com/Database/Miscellaneous/Q_26849128.html.

Can you help me better understand the problem? (not looking for answers of any kind)
0
Comment
Question by:JCW2
  • 2
3 Comments
 
LVL 74

Accepted Solution

by:
Jeffrey Coachman earned 500 total points
ID: 34987366
OK,

But the posts in the previous Q seemed to have explained this for the most part.

This is the thing with these "Academic" assignments....
They seek to "Challenge" you.  ...And that's a good thing, ... but in making the Q so complex, it often confuses you first.

For example, it is rare to get an entire DB schema with *No* existing relationships between tables.
Are you also to assume that this design is properly normalized for the task at hand?

It is also not clear how much you understand about this design or the task at hand.
In other words, are you saying that you read all the supporting documentation and class notes and still have no "understanding" of the question?

The purpose of this sight is to provide guidance in situations like this.
So you must demonstrate that you did some independent research of your own, and what the results were, ... and not just simply present the assignment verbatim from the text book and state that you do not "understand it".
Sound fair?

The query itself is not that difficult to get once the tables are properly related.
So the question of "Understanding" this is a bit broad.
Can you state the one *specific* thing here you are seeking to understand?
Normalization?, Keys?, Relationships?, SQL Query structure?
...as the focus of any one question here can only be one distinct topic.

Thanks

JeffCoachman
0
 

Author Closing Comment

by:JCW2
ID: 34988579
Thank you for your help.
0
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 34989333
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

This article explains all about SQL Server Piecemeal Restore with examples in step by step manner.
Read about achieving the basic levels of HRIS security in the workplace.
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now