Assignment 1CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1CST8333Assignment 1All material prepared for this...

1 answer below »
This is part one of three for a project I'm struggling on how to do a lot of the documentation I have included the code for the game it's self any help would be appreciated ill add more files if needed


Assignment 1 CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1 CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1 CST8333 Assignment 1 < project="" name=""> < your="" name=""> < date="" submitted=""> All material prepared for this assignment was produced by the author. Material from all third parties has been cited and referenced. CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1 CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1 2 Table of Contents 1Introduction3 1.1Objectives3 1.2Scope3 1.3Timeline3 1.3.1Milestones and Deliverables4 1.4Risks4 1.5Assumptions5 1.6Technical Constraints5 1.7Budget5 2Requirements7 2.1Introduction7 2.2Business Requirements7 2.3Technology Requirements8 2.4Compliance Requirements9 2.5Security Requirements9 2.6Requirements Traceability Matrix10 3Feasibility11 3.1Introduction11 3.2Alternative Solutions11 3.2.1Solution 111 3.3Recommendation12 3.4Conclusion12 4Design13 4.1Introduction13 4.2System Architecture13 4.2.1Network Architecture (e.g., see example below)13 4.2.2Server Architecture (e.g., see example below)13 4.2.3Process (data flow) (e.g., see example below)13 4.2.4Security (e.g., layered architecture with critical assets in inner layers)14 4.2.5Availability (e.g., include redundant components)14 4.2.6System Partitioning: (e.g., partition subsystems and optimize communication between system components, as well as users and the system)14 4.2.7Database Schemas (e.g., database structure)14 5References15 6Appendix A: Module 2 Checklist16 7Appendix B: Module 3 Checklist19 8Appendix C: Module 4 Checklist20 9Appendix D: Assignment Grading Rubric22 Introduction In this section background information on the project is provided, including the reasons for undertaking the project, specifically the business problem to be solved and how the proposed system will solve it, as well as the key stakeholders who will benefit from the project results. Objectives In this section measurable project objectives, business outcomes to be derived from achieving the objectives, and the measurement criteria to be used to confirm that an objective and the outcome have been achieved are listed. Table 1: Objectives and Business Outcomes (example) No. OBJECTIVE BUSINESS OUTCOME MEASUREMENT CRITERIA 1 Solve < state="" the="" problem="">> Users are able to < state="" user="" capabilities="">> Reduction and/or increase in < state="" criteria="">> 2 3 Scope In this section the features and functions that characterize the product, service, or result to be delivered by the project are described. That is, the major activities that must be completed to complete the project are listed. Activities that are out of scope for the project also are listed to reduce ambiguity. Table 2: Project Scope (example) ACTIVITIES IN SCOPE ACTIVITIES OUT OF SCOPE 1. Assignment 1 1. Apply for business financing 2. 2. 3. 3. Timeline In this section the project timeline is illustrated. The project duration is based on the CST8333 course calendar. Tasks included in the timeline are based on checklists included in CST8333 course modules. It is understood that unforeseen events and changes may result in revisions to the project timeline. Table 3: Project Timeline (example) Please find, below, a template for a project timeline. Milestones and Deliverables In this section significant events in the project and their associated deliverables are defined. Table 4: Project Milestones and Deliverables (example) MILESTONE DATE DELIVERABLES 1. Assignment 1 complete October 8 2020 Written report and slide presentation 2. 3. Risks Project risks are uncertain events or conditions that, if they occur, have positive effects (opportunities) or negative effects (threats) on one or more project objectives, such as scope, schedule, cost, and/or quality. In this section the principle project risk is identified (e.g., schedule slippage, requirements inflation, conflicting requirements, deliverables quality) the likelihood it will occur is estimated (high, medium, low), its impact if it occurs is estimated (high, medium, low), and mitigation strategies are described (how likelihood and impact will be minimized). Table 5: Project Risks (example) No. RISK DESCRIPTION PROBABILITY (H/M/L) IMPACT (H/M/L) MITIGATION 1. Schedule slippage M H Track project scope and timeline Assumptions Assumptions are factors that you believe to be true, although they are not confirmed to be true. Assumptions add risk to a project since it is possible that they will turn out to be false. Assumptions can impact any part of your project life cycle and resulting solution implementation, so it is important that they be documented.  In this section the principle project assumption is identified. Table 6: Project Assumptions (example) No. THE FOLLOWING IS ASSUMNED 1. Fundamentals of new programming language will be learned and put to use, timely, to complete project Technical Constraints Constraints are fixed boundary conditions or limits on what you can do. They are the things you cannot change but that you need to be aware of and manage to. Technical constraints focus on architecture decisions that may limit your solution design. They tend to be inflexible and unchanging and may impact your solution implementation. They include areas such as development languages, hardware, other infrastructure, and software that must be used for your project. In this section the principle technical constraint is identified. Table 7: Technical Constraints (example) No. TECHNICAL CONSTRAINTS 1. Programming language selected does not accommodate all of the functionality desired in the solution Budget The project budget is a tool that is used to estimate all the costs that are likely to be incurred before the project is completed. In this section a preliminary budget is estimated. Only in-scope items, as identified in section 1.3 above, are included. Out of scope items are excluded. It is understood that unforeseen events and changes may result in revisions to the project budget. Table 8: Project Budget (example) Notes 1. It is not expected that you will incur out of pocket expenses to complete the project. As such, it is acceptable that the budget includes only level of effort estimates. 2. Please find, below, a template for a project budget. Requirements Introduction Requirements define the characteristics or features of a desired solution. They must be actionable, measurable, testable, related to identified business needs or opportunities, and defined to a level of detail sufficient for solution design. Categories of requirements include the following. Business Requirements: The behaviours of the solution, including functionality, performance, and audit/reporting requirements. Technology Requirements: The architectural elements of the solution, including network connectivity, system communications, user interface, hardware specifications, and operational/support needs. Compliance Requirements: The legislation, regulations, and/or policies to which a solution is subject and with which it must comply. Security Requirements: The security features that will be implemented to mitigate attacks. Each category of requirement is discussed in the sections that follow. Requirements in each category are defined using the following parameters. 1. Number 2. Name 3. Description 4. Subcategory 5. Driver a. Mandatory b. Desired c. Optional As pertains to records retention requirements, records shall be kept in storage according to legislative, regulatory, and policy requirements, whichever is most strict. Business Requirements Business requirements mirror the business drivers of the solution. Subcategories of business requirements include functional, performance, and reporting requirements. Table 9: Business Requirements (example) NUMBER NAME DESCRIPTION SUBCATEGORY DRIVER B-01 Accept service requests Capture service request data Functional Mandatory B-02 Concurrent users Accommodate 200 concurrent users Performance Mandatory B-03 Manage service requests Post status to dashboard (active, closed, pending) Reporting Mandatory Notes 1. Performance requirements can be broken out in terms of items that include but are not limited to the following: response times; transaction volumes; remote performance; data throughput; etcetera. Technology Requirements Technology requirements are related to the information systems aspects of solutions. Subcategories of technology requirements include application, hardware, data, interface, availability, and maintenance requirements. Table 10: Technology Requirements (example) NUMBER NAME DESCRIPTION SUBCATEGORY DRIVER T-01 User interface Function across multiple platforms Application Mandatory T-02 Servers Redundancy built-in to architecture Hardware Mandatory T-03 Data format Process multiple data formats Data Mandatory T-04 Authentication Credentials must be validated to gain system access Interface Mandatory T-05 Business continuity Systems fail over immediately upon declaration of disaster Availability Mandatory S-06 Data backup Daily incremental and monthly full backups Maintenance Mandatory Notes 1. Application requirements address technical aspects of implementations including, among other things, user account management, data input, data processing, and user interfaces. 2. Hardware requirements can be itemized by specifications, configuration, and the environmental, mechanical, electrical supporting system requirements. 3. Data requirements including, but are not limited to details about data formats, file size limitations, naming conventions, access controls, and storage. 4. Interface requirements speak to the flow of data between systems (“internal” and “external”) the explanations of which may be supported using diagrams. 5. Availability requirements address not only system “up time” and outages, but also business continuity requirements. 6. Maintenance requirements include specifications around data backup, archival, restoration, and recovery. Compliance Requirements Compliance requirements articulate the legislative, regulatory, and policy requirements to which a solution is subject and with which it must comply. Individual laws and/or policies may be considered subcategories of compliance requirements Table 11: Compliance Requirements (example) NUMBER NAME DESCRIPTION SUBCATEGORY DRIVER C-01 Personal Identifiable Data (PID) consent form Users provide consent to collect PID General Data Protection Regulation (GDPR) Mandatory Notes 1. Compliance, typically, is assessed via regular, periodic, formal audits in which process documentation and artifacts are evaluated against established standards. As such, it is critical that records reflective of process implementation (e.g., documented approvals of account creation and deletion requests) be routinely generated, reviewed, and stored for the required length of time. Security Requirements Security requirements speak to the measures to be taken to protect data confidentiality, integrity, and availability (CIA). Subcategories of security requirements include physical security and logical security. Table 12: Security Requirements (example) NUMBER NAME DESCRIPTION SUBCATEGORY DRIVER S-01 Lockout User lockout after 5 failed logins Logical Mandatory Notes 1. Physical security requirements speak to controls around access to facilities, spaces within facilities, and equipment hosted in those spaces and include measures such as closed-circuit television monitoring, security guards, key card access, inactivity timeouts on workstations, and environmental controls, such are raised floors in server rooms, uninterruptable power supplies, and fire suppression systems. 2. Logical security requirements include access management controls, such as authorization, authentication, roles-based permissions, audit logging and monitoring, systems protection mechanisms (e.g., intrusion prevention and firewalls) and data protection mechanisms (e.g., anti-malware software and data encryption). Requirements Traceability Matrix This initial version of that requirements traceability matrix is the first step in the process identifying the tests that will be performed to validate whether documented requirements have been achieved. Table 13: Requirements Traceability Matrix (example) NUMBER CATEGORY REQ’T TEST EXPECTED RESULT ACTUAL RESULT PASS/FAIL COMMENTS S-01 Security User lockout after 5 failed logins Enter invalid credentials 5 times in succession Error message displayed directing user to contact support for password reset TBD TBD TBD Feasibility Introduction The objective of the feasibility study is to determine how successful the proposed project will be. Specifically, to determine if a proposed software program will work as anticipated and generate the projected revenue or anticipated cost savings. The study also will accomplish other objectives that will vary depending upon the reason for the study, but generally they will revolve around customer needs, your company's strengths and the financial viability of the project (e.g., determine if will enough customers will buy the new product at a price sufficiently high so that you can make a profit). In this section solutions to the problem that users experience with < state="" the="" problem="">> are evaluated and a preferred solution is identified. Business, technical, and cost data are presented to help answer the following questions. 1. Given the developer’s current skills and experience is it reasonable to expect? a. The project will be completed within the time allowed. b. The new system will perform adequately. 2. Are there any environmental factors that need to be considered before undertaking the project (e.g., other private and/or professional commitments)? 3. Are there sufficient knowledge and technical resources available to complete the project and then maintain the system after it goes live? 4. Will the results of the feasibility study be used as inputs in the decision to design and implement the system? Alternative Solutions In this section each alternative solution is explained in terms of its technical, operational, and economic feasibilities. < use="" the="" following="" format="" for="" each="" alternative="">> Solution 1 The first solution is __________________. Further explain the solution. Economic Feasibility The economic feasibility is the total cost of the solution, including all the costs involved: materials, staff, operating costs, etcetera Structural Feasibility The structural feasibility is the fit of the solution into the existing architecture, including servers, databases, networking, etcetera. Operational Feasibility The operational feasibility is the fit of the solution into the existing processes/operations. For instance, the need to train existing staff, or hire additional staff. Recommendation In this section recommendations are prioritized according to the results of the analysis of the alternatives, beginning with the preferred alternative (emphasize the solution’s benefits according to its technical, operational, and economic feasibilities). < use="" the="" following="" format="" for="" each="" alternative="">> My first recommendation is Solution ABC. Solution ABC is (elaborate on why you ranked the solution as your first recommendation; end with the benefits of the solution). Conclusion The purpose of this feasibility research report was to address the problem of < state="" the="" problem="">>. This report offered < state="" the="" number="">> alternative solutions to the
Answered 6 days AfterFeb 02, 2023

Answer To: Assignment 1CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1CST8333 PROGRAMMING...

Sathishkumar answered on Feb 09 2023
38 Votes
Acknowledgement
We are pleased to present “Space Shooter Combat Game Python” project and take this opportunity to express our profound gratitude to all those people who helped us in completion of this project.
We thank our college for providing us with excellent facilities that helped us to complete and present this project. We would also like to thank the staff members and lab assistants for permitting us to use computers in the lab as and when required.
We express our deepest gratitude towards our project guide for his/her valuable and timely advice during the various phases in our project. We would also like to thank him/her for providing us with all proper facilities and support as the project co-coordinator. We would like to thank him/her for support, patience and faith in our capabilities and for giving us flexibility in terms of working and reporting schedules.
We would like to thank all our friends for their smiles and friendship making the college life enjoyable and memorable and family members who always stood beside us and provided the utmost important moral support. Finally, we would like to thank everyone who has helped us directly or indirectly in our project.
Table of Contents
Acknowledgement    1
1. Introduction    2
1.1 Scope and Objective    2
1.2 Existing System VS Proposed System    3
1.2.1 Problem with the current scenario    3
1.2.2 Drawbacks of the existing system    3
2. PROPOSED SYSTEM    4
2.1 Modules and their Description    4
2.2 Game Description    4
3. Project Lifecycle Details    5

3.1 Waterfall Model    5
3.2 Description    5
4. PROJECT DESIGN    6
4.1 E-R Diagram:    6
4.2 Sequence Diagram    7
4.3 Activity Diagram    7
4.4 Data Flow Diagrams (DFD’s)    8
5. SOFTWARE REQUIREMNETS    10
5.1 Project Implementation Technology    10
Hardware Requirement    10
Software Requirement    10
6. FEASIBILITY TESTING    18
6.1 Technical Feasibility    18
6.2 Economic Feasibility    19
6.3 Operational Feasibility    19
7. TESTING    21
7.1 Levels of Testing    22
7.2 Test Cases    24
7.3 Validation Criteria    24
8. ADVANTAGES OF PROJECT    25
8.1 Advantages    25
8.2 Limitations    25
8.3 Features    26
9. Process-Gantt Chart    27
CONCLUSION    28
BIBLIOGRAPHY    29
APPENDIX    30
Code    30
1. Introduction
Reminiscent of many "shoot them up" video games from the early eighties- Space Shooter is an arcade game developed using Python as a programming language.
Although built to be simplistic, the mechanics of this game are pretty dynamic. Moreover, the game also has engaging gameplay. The player starts the game with three lives and has to constantly shoot and dodge to save themselves from being wiped out by a constant oncoming barrage of asteroids. A hit from an asteroid causes the player's health to decrease. While smaller asteroids deal lesser damage, larger asteroids will deal a heavier blow to your health bar. Once the player's health bar runs out, they lose a life.
This game also features two types of power-ups. While one boosts your defence by replenishing your health, the other improves your attack by doubling and tripling your rate of fire and increasing the damage dealt.
As a player’s score increases, the game bumps up the difficulty by increasing the frequency of the falling asteroids. Thereby, ensuring the player stays engaged and alert.
1.1 Scope and Objective
The game is developed for full-time entertainment and enthusiasm. It teaches the Gamer to be alert in every situation he/she faces because if the Gamer is not fully alert and notices the asteroids, he/she must be hit by them.
Though the proposed game is an action game, it doesn’t involve direct violence. No zombie killing, animal killing, or human killing is performed in the game. So, it can also be viewed as a non-violence game.
Kids can also play this game, because the design of the game is very simple, and controlling the game is very easy by pressing some neighboring keys of the keyboard.
1.2 Existing System VS Proposed System
1.2.1 Problem with the current scenario
· Traditionally, when it comes to gaming, it's tough to have a good time and feel relaxed.
· Playing games, especially outdoor activities, necessitates the purchase of equipment, which can be costly.
1.2.2 Drawbacks of the existing system
· The existing system needs the involvement of multiplayer
2. PROPOSED SYSTEM
2.1 Modules and their Description
The system comprises 1 major module with their sub-modules as follows:
USER:
· Main menu screen
· Introductory screen
· Logo of the app
· Start /quit options
Gameplay screen
· Playing the game
· Pause the menu screen
· You can quit the game or go to the menu screen
2.2 Game Description
· Pygame is a cross-platform set of Python modules that are used to create video games.
· It consists of computer graphics and sound libraries designed to be used with the Python programming language.
· The project basically uses the pygame module. The pygame module is mostly used in the project.
· We use images and animate them with the Pygame module. To handle button mapping and other display operations, the pygame module is used.
· We use classes to call functions after each iteration of the game level.
· In the game, the user would need to score up by moving ahead without getting hit by the barrage of asteroids.
· The bigger the asteroid, the high will be the risk of losing a life.
· The game features two power-ups. One will replenish their game life and the second will improve your attack by doubling and tripling your rate of fire and increasing the damage dealt.
· As a player’s score increases, the game bumps up the difficulty by increasing the frequency of the falling asteroids. Thereby, ensuring the player stays engaged and alert.
3. Project Lifecycle Details
3.1 Waterfall Model
Figure 1 Waterfall Model
3.2 Description
The waterfall Model is a linear sequential flow. In which progress is seen as flowing steadily downwards (like a waterfall) through the phases of software implementation. This means that any phase in the development process begins only if the previous phase is complete. The waterfall approach does not define the process to go back to the previous phase to handle changes in requirement. The waterfall approach is the earliest approach that was used for software development.
–4. PROJECT DESIGN
4.1 E-R Diagram:
Figure 2 Use Case Diagram:
Figure 3 Use Case Diagram
4.2 Sequence Diagram
Figure 4 Sequence Diagram of User
4.3 Activity Diagram
Figure 5 Activity Diagram of User
4.4 Data Flow Diagrams (DFD’s)
Figure 6 DFD Level 1
Figure 7 DFD Level 2
Figure 8 DFD: PREDICTION
5. SOFTWARE REQUIREMNETS
5.1 Project Implementation Technology
The Project is designed and developed in Django Framework. We used Django Framework for coding of the project. Created and maintained all databases into MySQL Server, in that we create tables, write query for store data or record of project.
Hardware Requirement
· Laptop or PC
· Windows 7 or higher
· I3 processor system or higher
· 4 GB RAM or higher
· 100 GB ROM or higher
Software Requirement
· Python
· Sublime text Editor
· XAMP Server
Python
    Python is a powerful multi-purpose programming language created by Guido van Rossum. It has simple easy-to-use syntax, making it the perfect language for someone trying to learn computer programming for the first time. This is a comprehensive guide on how to get started in Python, why you should learn it and how you can learn it. However, if your knowledge of other programming languages and want to quickly get started with Python. Python is a general-purpose language. It has wide range of applications from Web development (like: Django and Bottle), scientific and mathematical computing (Orange, SymPy, NumPy) to desktop graphical user Interfaces (Pygame, Panda3D). The syntax of the language is clean and length of the code is relatively short. It's fun to work in Python because it allows you to think about the problem rather than focusing on the syntax.
Features of Python Programming:
· A simple language which is easier to learn
Python has a very simple and elegant syntax. It's much easier to read and write Python programs compared to other languages like: C++, Java, C#. Python makes programming fun and allows you to focus on the solution rather than syntax.
If you are a newbie, it's a great choice to start your journey with Python.
· Free and open-source
You can freely use and distribute Python, even for commercial use. Not only can you use and distribute software’s written in it, you can even make changes to the Python's source code.
Python has a large community constantly improving it in each iteration.
· Portability
You can move Python programs from one platform to another, and run it without any changes.
It runs seamlessly on almost all platforms including Windows, Mac OS X and Linux.
· Extensible and Embeddable
Suppose an application requires high performance. You can easily combine pieces of C/C++ or other languages with Python code.
This will give your application high performance as well as scripting capabilities which other languages may not provide out of the box.
· A high-level, interpreted language
Unlike C/C++, you don't have to worry about daunting tasks like memory management, garbage collection and so on.
Likewise, when you run Python code, it automatically converts your code to the language your computer understands. You don't need to worry about any lower-level operations.
· Large standard libraries to solve common tasks
Python has a number of standard libraries which makes life of a programmer much easier since you don't have to write all the code yourself. For example: Need to connect MySQL database on a Web server? You can use MySQLdb library using import MySQLdb .
Standard libraries in Python are well tested and used by hundreds of people. So, you can be sure that it won't break your application.
· Object-oriented
Everything in Python is an object. Object oriented programming (OOP) helps you solve a complex problem intuitively.
With OOP, you are able to divide these complex problems into smaller sets by creating objects.
Web Applications
· You can create scalable Web Apps using frameworks and CMS (Content Management System) that are built on Python. Some of the popular platforms for creating Web Apps are: Django, Flask, Pyramid, Plone, Django CMS.
· Sites like Mozilla, Reddit, Instagram and PBS are written in Python.
Scientific and Numeric Computing
· There are numerous libraries available in Python for scientific and numeric computing. There are libraries like: SciPy and NumPy that are used in general purpose computing. And, there are specific libraries like: EarthPy for earth science, AstroPy for Astronomy and so on.
· Also, the language is heavily used in machine learning, data mining and deep learning.
Creating software Prototypes
· Python is slow compared to compiled languages like C++ and Java. It might not be a good choice if resources are limited and efficiency is a must.
· However, Python is a great language for creating prototypes. For example: You can use Pygame (library for creating games) to create your game's prototype first. If you like the prototype, you can use language like C++ to create the actual game.
· Python is used by many companies to teach programming to kids and newbies.
· It is a good language with a lot of features and capabilities. Yet, it's one of the easiest languages to learn because of its simple easy-to-use syntax.
Django documentation
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Built by experienced developers, it takes care of much of the hassle of Web development, so you can focus on writing your app without needing to reinvent the wheel. It’s free and open source.
Features of Django
· Rapid Development
· Secure
· Scalable
· Fully loaded
· Versatile
· Open Source
· Vast and Supported Community
Rapid Development
Django was designed with the intention to make a framework which takes less time to build web application. The project implementation phase is a very time taken but Django creates it rapidly.
Secure
Django takes security seriously and helps developers to avoid many common security mistakes, such as SQL injection, cross-site scripting, cross-site request forgery etc. Its user authentication system provides a secure way to manage user accounts and passwords.
Scalable
Django is scalable in nature and has ability to quickly and flexibly switch from small to large scale application project.
Fully loaded
Django includes various helping task modules and libraries which can be used to handle common Web development tasks. Django takes care of user authentication, content administration, site maps, RSS feeds etc.
Versatile
Django is versatile in nature which allows it to build applications for different-different domains. Now a days, Companies are using Django to build various types of applications like: content management systems, social networks sites or scientific computing platforms etc.
Open Source
Django is an open source web application framework. It is publicly available without cost. It can be downloaded with source code from the public repository. Open source reduces the total cost of the application development.
Vast and Supported Community
Django is a one of the most popular web frameworks. It has widely supportive community and channels to share and connect.
XAMPP Server 
Introduction
    WAMP is a Windows OS based program that installs and configures Apache web server, MySQL database server, PHP scripting language, phpMyAdmin (to manage MySQL database’s), and SQLiteManager (to manage SQLite database’s). WAMP is designed to offer an easy way to install Apache, PHP and MySQL package with an easy to use installation program instead of having to install and configure everything yourself. WAMP is so easy because once it is installed it is ready to go. You don’t have to do any additional configuring or tweaking of any configuration files to get it running. 
    There are usually two reasons why someone chooses to install WAMP. They are looking to install WAMP for development purposes or to run their own server.
PHP Admin
    Allows you to change or add users and for making new databases phpMyAdmin is a free software tool written in PHP, intended to handle the administration of MySQL over the World Wide Web. phpMyAdmin supports a wide range of operations with MySQL. The most frequently used operations are supported by the user interface (managing databases, tables, fields, relations, indexes, users, permissions, etc.), while you still have the ability to directly execute any SQL statement.
Features
· Intuitive web interface
· Support for most MySQL features:
· Browse and drop databases, tables, views, fields and indexes.
· Create, copy, drop, rename and alter databases, tables, fields and indexes.
· Maintenance server, databases and tables, with proposals on server configuration.
· Execute, edit and bookmark any SQL-statement, even batch-queries.
· Manage MySQL users and privileges
· Manage stored procedures and triggers.
· Import data from CSV and SQL
· Export data to various...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here