O'Reilly logo

Real-time Fraud Detection Analytics on IBM System z by Lakshminarayanan Sreenivasan, Priya Ranjan, Dheeraj Reddy Chintala, Mike Ebbers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Transaction processing tables
This appendix shows the transaction processing tables that are used in our use case in Chapter 6, “Use case model” on page 35. For more information about these tables, see 6.3, “Database design” on page 37.
Table B-1 shows the customer table.
Table B-1 Customer table
Column name
Data type
Length
CUST_ID
VARCHAR
10
CUST_TYPE
CHAR
1
NAME
VARCHAR
20
ADDRESS
VARCHAR
50
CITY
VARCHAR
30
POST_CODE
VARCHAR
10
START_DATE
DATE
4
NATIONALITY
VARCHAR
20
ETHNIC
VARCHAR
10
GENDER
SMALLINT
2
DOB
DATE
4
EDU_LEV
CHAR
1
MAR_STAT ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required