Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

A. Lab 4 of 7 : Exception Handlers

B. Lab Overview - Scenario / Summary:

You have been asked to implement exception handlers to cater to various errors and conditions. 

Upon the completion of this lab, students will have hands-on experience coding and using exceptions.

C. Deliverables:

Lab Steps (all in IBM System z) Points
Step 1 Aggregate Functions 15 Pts.
Step 2 Parent Key Not Found Exception Handler 15 Pts.
Step 3 Referential Integrity Exception Handler 15 Pts.
Step 4 Duplicate Key Found Exception Handler 15 Pts.
Total Lab Points 60 Pts.

D. Lab Steps:
Each program is independent of any other programs and is to be executed using the related database objects in the student database schema.

Step 1: Aggregate Functions
a) Code an SQL PL Procedure that will accept a student ID and count the number of courses in which that student is enrolled. (Count the number of records in the Enrollment table that correspond to the student.)
b) Output the message: [student_id] is enrolled in [tot_sec] courses. 
c) For those students not enrolled in any courses, output the message: [student_id] is not enrolled in any courses. 
d) Test your procedure with the following values: 102, 124, 292.

Step 2: Parent Key Not Found Exception Handler
a) Code an SQL PL Procedure to add a record to the Section table. 
b) The procedure should accept the Section ID and Course No as parameters. 
c) Include the following for the other columns:

Attribute Value
Section number 5
Instructor identification 106
Start date Today's date
Location Null
Capacity Null

d) Use USER and CURRENT DATE for the auditing columns (Created By, Created Date, Modified By, Modified Date). 
e) When a record can successfully be inserted, output the message: Section [section_id] of course number [course_no] was inserted. 
f) Use an exception to handle the error when the course parent does not exist; in that case, output the message: The INSERT was not successful. You must insert the course parent first. 
g) Execute your procedure with the following values: 

• section id 77 with course number 10
• section id 78 with course number 400 
Step 3: Referential Integrity Exception Handler

a) Create a stored procedure to delete Student records; the student ID should be passed into the procedure as a parameter.
b) Use an exception handler to trap the errors that arise when the procedure tries to delete a student who is still in the enrollment table. 
c) For successful deletions, output a message which says:
Student id [student_id] has been deleted
d) For unsuccessful deletions, output a message which says:
The delete was not successful. Delete the student from enrollment first. 
e) Execute the procedure for students 124 and 158.

Step 4: Duplicate Key Found

a) Create a stored procedure to insert Student records; the student ID should be passed into the procedure as a parameter. Default values can be used to set the other fields in the table.
b) Use an exception handler to trap the errors that arise when the procedure tries to insert a student with a number that is already in the table.
c) For successful insertions, output a message which says:
Student id [student_id] has been inserted
d) For unsuccessful insertions, output a message which says:
Student id [student_id] is already in the table 
e) Execute the procedure using student ids of 110 and 190.

END OF LAB 4

For Submission into Week 4 iLab Dropbox:
Zipped file containing:
• SQL PL code for each task
• Output screenshots from executing each task

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9123166

Have any Question?


Related Questions in Computer Engineering

Suppose that you need to create two-table database to

Suppose that you need to create two-table database to record information for a DVD rental kiosk. The following information needs to be recorded. For all movies: Movie number, title, category, rental rate, and whether or ...

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

Is there any difference in terms of the information that

Is there any difference in terms of the information that could be provided to the decision maker by an IS that was created using HSM and an IS that was created using SSM?

Serial port assignmentdesign write and debug an mc8051

Serial Port Assignment Design, write, and debug an MC8051 assembly program which does the following: Configure the serial port to mode 1 with enabled reception and 9600 BAUD rate for the DS89S420 microcontroller. Also co ...

Display the employee titles whose department is located in

Display the employee titles whose department is located in a secret cave.

In a software design meeting in your company your manager

In a software design meeting in your company, your manager says that one of the most important engines of the Record Keeping System you are developing is the Index Sorting Engine. Your coworker quickly jumps in and says ...

On microsoft word what would be the advantage of using the

On Microsoft word, what would be the advantage of using the dialog box over setting various tabs directly on the ruler line? In what types of typing tasks would you find using the ruler line helpful?

Assume the following for the town of boone it has a total

Assume the following for the town of Boone: it has a total population of 40,000 people, of which 1,000 are under 16 years of age or are institutionalized; 8,000 are full-time students who are not employed and are not see ...

Sql transactions exercisesfor the universal relation rwxyz

SQL Transactions Exercises For the universal relation R(w,x,y,z), consider the decomposition D consisting of R1(w,y,z) and R2(x,y), and the set F of functional dependencies { y->xz ; yz->w ; x->w }. Recall that the proje ...

Question a topic related to database securityyou must pick

Question: A topic related to Database Security. You must pick one topic after reading at least 5 articles. You must provide a list of those articles you read and you must annotate each one. That is, you must write at lea ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As