ance" in the "AdventureWorksDW2017" database and returns those amounts, organized by month, and showing a 3-month rolling average.
Q: Find the Big Oh Notation of the following
A: Defined the Big-Oh Notation of the given code
Q: A list of five common network topologies should be included. Which one do you think is the most trus...
A: 1) Mesh Topology 2) Star Topology 3) Bus Topology 4) Ring Topology 5) Hybrid Topology
Q: In the realm of cryptography, what are the three basic operations?
A: Given To know the basic three operations of cryptography.
Q: What are the two strongest justifications for using layered protocols? Provide examples to back up y...
A: The main reason behind layered protocol: 1.Providing abstraction in between layers: Layering of prot...
Q: Was it necessary to use many assessment methodologies in order to provide a more complete picture of...
A: Was it necessary to use many assessment methodologies in order to provide a more complete picture of...
Q: Write a program, in python, that checks if the last data item entered appears earlier in the list. O...
A: Answer: I have done code and also I have attached code and cod screenshot as well as output
Q: What does the first compound notation mean?
A: Notation for the 1st complement The value of a binary number's 1s complement is determined by invert...
Q: A document contains multiple sentences. Given a set of rules providing the relative ordering among t...
A: Аs shоwn in рreviоus seсtiоn, finding the орtimаl оrder fоr а given tоtаl рreferenсe i...
Q: Give an inductive definition of the function nodecount(t) which computes the number of internal node...
A: Actually, given question regarding binary tree.
Q: Asymptotic notation Prove each of the following. You can use either the definitions of the form "exi...
A: I have answered this question in step 2.
Q: Why isn't virtual memory utilised more often in embedded systems?
A: Given: We have to discuss Why isn't virtual memory utilised more often in embedded systems.
Q: amples 6+2= 8 8 is 6+2. 642 12 12 is 6*2. 6-2 4 4 is 6-2. 6-8=-2 -2 is 6-8. 6응23D3 3 is 6/2. 7+2 3 3...
A: Solution:
Q: Write a Java program to perform the following task: First define an Employee class which includes em...
A: The answer is given below:-
Q: introduction about the basic concepts of a computer
A: In the today's world, we use computers for all our daily tasks. Our day-to-day activities like payin...
Q: Write the final output generated by the following program: b. #include #include void main() { int...
A: This question comes from Programming Language in C which is a paper of Computer Science. Let's discu...
Q: What are routing metrics, and how can you utilise them to your advantage?
A: Answer: Only one sort of measure is used by routers to determine the best route.Router performance m...
Q: What are the benefits and drawbacks of caching disc write operations?
A: Disk caching reduces the time it takes to read or write data from or to a hard drive. In modern comp...
Q: 1001110, + 10101012
A: Answer : The addition of two binary numbers are as follow : 1 0 0 1 1 1 0 1 0 1 0 1 0 1 ----------...
Q: T CLASS PROVIDED,
A: What was your last question
Q: 3. How might the heap implementation of priority queues be used to solve the following problems? How...
A: According to the information given. We have to implement heap priority queue by construct a Huffman ...
Q: Need solution for DVP checker board problem 6.5
A: Оne аррrоасh is tо mаke sure yоu use а kernel size thаt is divided by yоur stride, ...
Q: What can be stated about the following first line of a user-defined function: function [x.y.z]=overl...
A: Given : First line of user defined function is : function[x,y,z]=overload(a,b) We need to choose the...
Q: ((Java)) Create two Java methods. the very first: that accepts a value and determines whether or n...
A: Given :- Create two Java methods. the very first: that accepts a value and determines whether or no...
Q: ch could harm your computer such as worms, Trojans and viruses. Discuss any FOUR (4) methods could b...
A: We have some of the methods by which we can prevent our computer- 1- We have to keep our computer up...
Q: Incident response guidelines explain the essential components of incident teams and how they are uti...
A: Answer: The following describes the procedure for handling incidents: There must be a rapid resp...
Q: in Mips how to store bytes in reverse order(0xAADDEEFF) at a memore location? . space4
A: .datainput: .space 256output: .space 256 .text .globl mainmain: li $v0, 8 # Ask the user for the ...
Q: Prove this by vsing the truth tuble ) Zェ+スjェ=まえ+お ) xyt元ス+ま =2y+正送 Ce) ey+てそ = C2+z](元+y)
A: As per our company guidelines, we are not supposed to answer more than one question per post and kin...
Q: What are the two strongest justifications for using layered protocols? Provide examples to back up y...
A: Introduction:Only the layer directly above and below is affected by any changes made. Abstraction. A...
Q: What are the two types of files, in general, that exist? In what ways do these two file formats diff...
A: A document can be characterized as an assortment of information or data. Notwithstanding, the PC dea...
Q: A approach that has not been tried is ineffective. Recognize the many testing approaches that may be...
A: Description of an employment test:- Employment tests are usually standardized measures designed to ...
Q: Convert the binary number 101011002 to its decimal (base 10) equivalent:
A: convert binary number to decimal number binary number to 10101100
Q: Explain the steps clearly about one paragraph each , about optimization in tf.data API (purpose of ...
A: The tf.data API enables you to build complex input pipelines from simple, reusable pieces. tf.data a...
Q: An 8-bit carry-select adder is given below. If the propagation delay for a gate is 2 nsec, how long ...
A: Let's see the solution in the next steps
Q: What are the disadvantages of using the SSTF disc scheduling algorithm?
A: Here in this question we have asked that what are the disadvantage of SSTF disk scheduling algorithm...
Q: Discuss possible countermeasures against Man-in-the-Middle (MITM) attacks that intercept wireless cr...
A: Answer By encrypting the traffic between the network and your device using browsing encryption softw...
Q: What are the five layers in the TCP/IP Internet protocol stack? What are the principal responsibilit...
A: Ans: The five layers of TCP/IP internet protocol stack is: 1) Application layer 2) Transport layer ...
Q: Add and multiply the following numbers without converting them to decimal. (a) Binary number 1011 a...
A: a) here 1+0=11+1 = 0 with carry 1 as 1+1=2(10) so using that while adding we get 10000 = 16 1011=...
Q: Given that F(A,B,C) = A' B' + A C' Which of the following is a correct SoM expression for F? F(A,B,C...
A: The function is F=(A'B'+AC') F=A'B'(C+C')+AC'(B+B') (Using x+x'=1 identity) =A'B'C+A'B'C'+AC'B+AC'B'...
Q: Why not divide user research?
A: given - Why not divide the overall design into multiple user viewpoints when conducting user researc...
Q: What security holes were exploited as part of the scam scheme?
A: The security flaws that were exploited as part of the scheme to commit fraud The security flaws that...
Q: Write a query to generate a report indicating the total number of sick leave days for each employee....
A: Actually, database is a used to stores the data\information.
Q: Is it easier for you to identify someone using their fingerprints, speech intonation, face features ...
A: Person Identification : Person identification is one of the most important machine learning tasks n...
Q: What would be the appropriate line of code to write the function f(x) = e* as an anonymous function?...
A: The correct option is 'D'. If you're using Python, you'll need to import the exp function from the m...
Q: Cache memory is important in today's computers. Explain how cache memory works and why there was no ...
A: Cache Memory Introduction: Cache memory is a chip-based computer component that retrieves data incre...
Q: Why are watchdog timers required in many embedded systems?
A: Introduction: When a computer processor, memory, and input/output peripheral devices are integrated ...
Q: Why not divide the overall design into multiple viewpoints when conducting user user research?
A: - We need to know why we dont divide the overall design into multiple user viewpoints when we conduc...
Q: Use a request for proposal to gather information on hardware and system software, and explain why it...
A: Request for Proposal (RFP) is an acronym for Request for Proposal. RFPs for construction and cleanin...
Q: When it comes to descriptive models, what are the fundamental aspects and attributes to look for?
A: It describes a system or other thing and its surroundings, It is used to define and/or comprehend th...
Q: If you're conducting user research, why not separate the overall design into multiple user viewpoint...
A: User reseаrсh is the methоdiс study оf tаrget users—inсluding their needs аnd раin роin...
Q: When assessing the benefits and drawbacks of distributed data processing, what aspects should you co...
A: According to the information given:- we have to define the benefits and drawback of distributed data...
SQL
SQL stands for Structured Query Language, is a form of communication that uses queries structured in a specific format to store, manage & retrieve data from a relational database.
Queries
A query is a type of computer programming language that is used to retrieve data from a database. Databases are useful in a variety of ways. They enable the retrieval of records or parts of records, as well as the performance of various calculations prior to displaying the results. A search query is one type of query that many people perform several times per day. A search query is executed every time you use a search engine to find something. When you press the Enter key, the keywords are sent to the search engine, where they are processed by an algorithm that retrieves related results from the search index. Your query's results are displayed on a search engine results page, or SER.
Use “AdventureWorksDW2017”.
Create a SQL query code used to explore the
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- SQL: Create a SQL query that uses an uncorrelated subquery and no joins to display the descriptions for products provided by a vendor in area code 615. Remember, the main difference between a correlated subquery and uncorrelated subquery is that, in a correlated subquery, the inner query is dependent upon the outer query, while, with an uncorrelated query, the inner query does not depend upon the outer query. Instead, it runs just once. You should NOT use union, minus, or intersect in this query. The outer query will use the PRODUCT table and the inner query will use the VENDOR table [hint: you should have 9 records of output]. My code: select p_descript from product where (select v_areacode from vendor where v_areacode = '615' ; I am getting this error, problem is I can't see what is missing any assistance is appreciated. ORA-00936: missing expressionHHyperion Dev STU_ STU_SNAME STU_FNAME STU_INITIAL STU_START NUM DATE 01 02 03 04 05 06 07 ● ● Snow Stark Lannister Lannister Greyjoy Tyrell Baratheon Jon Arya Jamie Cercei Theon Margaery Tommen E C с J I Y R 05-Apr-14 12-Jul-17 05-Sep-12 05-Sep-12 9-Dec-15 12-Jul-17 Review work 13-Jun-19 COURSE CODE 201 305 101 Completed the task(s)? Ask an expert to review your work! 101 402 305 201 PROJ_ NUM 6 Write the SQL code that will delete the Student table entirely. 11 2 2 14 Write the SQL code to change the course code to 304 for the person whose student number is 07. 10 Write the SQL code to delete the row of the person named Jamie Lannister, who started on 5 September 2012, whose course code is 101 and project number is 2. Use logical operators to include all of the information given in this problem. 5 Write the SQL code that will change the PROJ_NUM to 14 for all those students who started before 1 January 2016 and whose course code is at least 201. Write the SQL code that will delete all…Assignment Two: We will write three procedures on our tables, the first of which I have provided as an example. proclnsertPlayer takes one IN VARCHAR(16) paramater and returns an error code in the second SMALLINT (INOUT) parameter. The procedure checks the parameter and, if there are no errors, inserts the value into tblPlayers. Documentation of errors Condition Error code No errors 1st param Null or zero len playerID taken 1 proclnsertGame will receive two IN VARCHAR(16) interpreted as
- Create a table in your own database using the following statement. CREATE TABLE DateRange (DateID INT IDENTITY, DateValue DATE, DayOfWeek SMALLINT, Week SMALLINT, Month SMALLINT, Quarter SMALLINT, Year SMALLINT ); Write a stored procedure that accepts two parameters: A starting date The number of the consecutive dates beginning with the starting date The stored procedure then inserts data into all columns of the DateRange table according to the two provided parameters.2. Get the Groups As new students begin to arrive at college, each receives a unique ID number, 1 to n. Initially, the students do not know one another, and each has a different circle of friends. As the semester progresses, other groups of friends begin to form randomly. There will be three arrays, each aligned by an index. The first array will contain a queryType which will be either Friend or Total. The next two arrays, students1 and students2, will each contain a student ID. If the query type is Friend, the two students become friends. If the query type is Total, report the sum of the sizes of each group of friends for the two students.PYTHON CODE Using Artists.csv (link below), write a query that returns all lines that are female artists only, with begin date greater than 1950 but no greater than 2000 Write a query that will return all lines of British Male artists, who's first names starts with the letter ‘A’ and has an end date earlier than 1990 Write a query that will write to a file all lines that have Japanese Artists who’s difference of end date and begin date exceeds 100 years. I.e. if artist begins in 1900 and ends in 2005, then they would be included in the output (2005-1900 = 105 years) Write a query that will write and find to a file the artist who’s been at the Museum the longest (the widest gap between Begin Date and End Date) Artists.csv: https://media.githubusercontent.com/media/MuseumofModernArt/collection/master/Artists.csv
- In java create an application to manage your data base information the database is already created in mysql tables, the tables are fill, So the user can use your database application user friendly Retrieve all data: Given a table name, retrieve all data from the table and present it to the user. Average: Given a table name and a column name, return the average of the column. Here the assumption is that the column type will be numeric (e.g., cost column). Insert: Given a table name, your program should show the column names of that table and ask the users to input new data to the table. In case of errors, your program should directly show the MySQL errors to the users. Assumption 1: Users will enter data according to the database constraints. Assumption 2: Users will input one record at a time. Delete: Given a table name, your program should show the column names of that table and ask the users to input data that they want to delete. Assumption 1: Users will enter data according to the…Sales Database: Customers(custId, lastName, firstName, address, phone, creditLimit) Orders(ordNumber, itemNumber, qtyOrdered.) Items(itemNumber, itemName, price) For the Sales Database referenced above, write the SQL command to create the LineItem table, assuming the Orders table and items table already exist.create database GA2gouse GA2gocreate table salesman(salesman_id int primary key, name varchar(30), city varchar(20), commission varchar(30));insert into salesman (salesman_id, name, city, commission) values (5001, 'James Hoog', 'New York', 0.15); insert into salesman (salesman_id, name, city, commission) values (5002, 'Nail Knite', 'Paris', 0.13); insert into salesman (salesman_id, name, city, commission) values (5005, 'Pit Alex', 'London', 0.11); insert into salesman (salesman_id, name, city, commission) values (5006, 'Mc Lyon', 'Paris', 0.14); insert into salesman (salesman_id, name, city, commission) values (5007, 'Paul Adam', 'Rome', 0.13); insert into salesman (salesman_id, name, city, commission) values (5003, 'Lauson Hen', 'San Jose', 0.12); Create table Customer (customer_id int primary key, cust_name varchar(30), city varchar(10), grade varchar(30), salesman_id int,CONSTRAINT FK_salesman_id FOREIGN KEY (salesman_id) REFERENCES salesman(salesman_id));insert into customer…
- Create table “Cleaner” (cNo varchar2(5), cName varchar2(20), cSalary number(6,2), dNo varchar2(5)). Write a table level trigger which can tell how the restriction on ‘cSalary’ is violated. Whenever the value of ‘cSalary’ is beyond the valid range (0 – 5000), the trigger will generate an error message informing user whether it is greater than 5000 or a negative numbercreate database GA2gouse GA2gocreate table salesman(salesman_id int primary key, name varchar(30), city varchar(20), commission varchar(30));insert into salesman (salesman_id, name, city, commission) values (5001, 'James Hoog', 'New York', 0.15); insert into salesman (salesman_id, name, city, commission) values (5002, 'Nail Knite', 'Paris', 0.13); insert into salesman (salesman_id, name, city, commission) values (5005, 'Pit Alex', 'London', 0.11); insert into salesman (salesman_id, name, city, commission) values (5006, 'Mc Lyon', 'Paris', 0.14); insert into salesman (salesman_id, name, city, commission) values (5007, 'Paul Adam', 'Rome', 0.13); insert into salesman (salesman_id, name, city, commission) values (5003, 'Lauson Hen', 'San Jose', 0.12); Create table Customer (customer_id int primary key, cust_name varchar(30), city varchar(10), grade varchar(30), salesman_id int,CONSTRAINT FK_salesman_id FOREIGN KEY (salesman_id) REFERENCES salesman(salesman_id));insert into customer…create database GA2gouse GA2gocreate table salesman(salesman_id int primary key, name varchar(30), city varchar(20), commission varchar(30));insert into salesman (salesman_id, name, city, commission) values (5001, 'James Hoog', 'New York', 0.15); insert into salesman (salesman_id, name, city, commission) values (5002, 'Nail Knite', 'Paris', 0.13); insert into salesman (salesman_id, name, city, commission) values (5005, 'Pit Alex', 'London', 0.11); insert into salesman (salesman_id, name, city, commission) values (5006, 'Mc Lyon', 'Paris', 0.14); insert into salesman (salesman_id, name, city, commission) values (5007, 'Paul Adam', 'Rome', 0.13); insert into salesman (salesman_id, name, city, commission) values (5003, 'Lauson Hen', 'San Jose', 0.12); Create table Customer (customer_id int primary key, cust_name varchar(30), city varchar(10), grade varchar(30), salesman_id varchar(30),CONSTRAINT FK_salesman_id FOREIGN KEY (salesman_id) REFERENCES salesman(salesman_id)); i keep getting…