Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question

Configuring a Database

There are two parts to this work. The first part is to generate a database and some tables which will be appropriate for Batty League Flea Market. That portion of the assignment has to be completed from MySQL console command line. The second part of the assignment is to write down a PHP script which will show information about the database tables created in the first part and save that information in a file. A complete submission will include both the script - solution07.php - and the text file generated by the script - solution07.txt.

Use command-line interface to create a new user named "script" for your database. Grant that user all permissions on everything controlled by DBMS.

Create a database named "fleamarket".

Within that database, create two tables:

The first table should be named "items". Give it three fields:

VARCHAR of length 10 named "itemID"
FLOAT named "itemPrice"
VARCHAR of length 30 named "description"
The second table should be named "sales". Give it five fields:
VARCHAR of length 10 named "itemID"
FLOAT named "itemPrice"
VARCHAR of length 10 named "firstName"
VARCHAR of length 10 named "lastName"
DATE named "purchaseDate"

generate a script file named solution07.php. Within that script, connect to your DBMS using the "script" identity. Select the "fleamarket" database, and then obtain a listing of tables.

Apply the file-creation techniques we learned in previous classes to save the results of your queries into a file named solution07.txt.

Submit both solution07.php and solution07.txt.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9719113

Have any Question?


Related Questions in Computer Engineering

Question 1 war driving is a wireless attack describe at

Question: 1. War driving is a wireless attack. Describe at least four war driving tools and the purpose of each. Your response should be at least 150 words in length. 2. Name and describe the four major access control mo ...

Koh aq cuno32 aq precipitatekbr aq srno32 aq no

KOH (aq)+ Cu(NO3)2 (aq) = precipitate KBr (aq) + Sr(NO3)2 (aq) = no precipitate a) What are the possible products when solutions of KOH and Cu(NO3)2 are mixed? b) What are the possible products when solutions of KBr and ...

Systems analysis and design project 11 can you answer these

Systems analysis and design project 11: can you answer these 3 questions please 1. Design a generic test plan that describes the testing for an imaginary system. 2. Design a generic post-implementation evaluation form. T ...

Question consider a problem that you think can be addressed

Question: Consider a problem that you think can be addressed using AI/ML. Provide a detailed 1200-1500 words report that explains the problem and solution. And then explains the challenges associated with adoption of tha ...

Sometimes during the manufacturing of an integrated circuit

Sometimes during the manufacturing of an integrated circuit, wires-including control signal wires-are accidentally connected to +V or GND, resulting in a control signal that is stuck-at-1 (when connected to +V) or stuck- ...

Question suppose you are constructing a 3-bit counter using

Question : Suppose you are constructing a 3-bit counter using three D flip-flops and some selection of gates. The inputs to the system are Reset (sets every output to zero) and Inc (a signal to increment the counter). Th ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

Access your browsers security settings and configure the

Access your browser's security settings and configure the browser to refuse all cookies or to prompt you before allowing a cookie. Restart the browser; then visit several different Web sites. Be sure to visit popular sit ...

Will anyone help me with this and give me the explain how

Will anyone help me with this and give me the explain how did you get the answer? No coding necessary. Give truth tables for each the following Boolean expressions. a) not (P and Q) b) (not P) and Q c) (not P) or (not Q) ...

The formulas a rarr b and c and a rarr b and a rarr c are

The formulas A → (B ∧ C) and (A → B) ∧ (A → C) are logically equivalent. For this problem, you are going to prove that they are equivalent in two different ways. Prove that A → (B ∧ C) ≡ (A → B) ∧ (A → C) by writing two ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As