1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
9

Question In an existing company database, the customers table contains the following columns: CustomerId, FirstName, LastName, C

ompany, Address, City, State, Country, PostalCode, Phone, Fax, Email, and SupportRepId.
Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
7 0

Using the knowledge in computational language in SQL it is possible to write a code that  existing company database, the customers table contains.

<h3>Writting the code in SQL:</h3>

SELECT FirstName,

      LastName,

      HireDate,

      (STRFTIME('%Y', 'now') - STRFTIME('%Y', HireDate))

         - (STRFTIME('%m-%d', 'now') < STRFTIME('%m-%d', HireDate))

         AS YearsWorked

FROM Employees

WHERE YearsWorked >= 15

ORDER BY LastName ASC

See more about SQL at brainly.com/question/13068613

#SPJ1

You might be interested in
State two functions of windows environment​
Hitman42 [59]

Answer:

idonoheheheheheuhiiikv

8 0
3 years ago
a limited-access expressway. A)allows vehicles to enter or exit only at certain place.B) does not permit trucks or buses.C)has n
zepelin [54]
Hello babe I just wanted to say hello
3 0
3 years ago
2.7 code practice question 1 edhesive
Virty [35]

I will edit this if you edit your question..

Im confused. This is not a question..

8 0
4 years ago
Read 2 more answers
Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its onl
puteri [66]

Answer:

b) digital rights management

Explanation:

Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each customer with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. The set of technology being used here is digital rights management.

8 0
3 years ago
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere
maria [59]

Answer:

The correct answer is Option A (Referential integrity)

Explanation:

When a relational database table is in ​first normal form, that means it has no repeating fields or groups of fields, and hence all rows have the same columns, while if a relational database table is in second normal form, it implies that every non-key field is functionally dependent on the primary key. If can be in the third normal form if no non-key field is functionally dependent on any other non-key field.​

A relational database on its own is a universal approved database model whose data is stored in tables divided into records and fields that serve as an information unit that organizes data points for easy access.

In the relational database, foreign keys are being checked to reference the primary key and enforce referential integrity so as to ensure that the foreign key must have a matching primary key. It means the reference from a row in one table to another table must be valid. Referential integrity concerns the concept of a foreign key normally enforced by the database management system.

4 0
3 years ago
Other questions:
  • Once Raul selects a technology solution, he has completed the process. <br> a. True<br> b. False
    13·2 answers
  • Ayuda no encuentro el concepto de estas tres preguntas: ¿para qué sirve la administración en la ofimatica o informática? ¿Que so
    13·1 answer
  • Whats the relationship between cpu memory and disk​
    10·1 answer
  • What is the best strategy to avoid paying interest on your credit card
    8·1 answer
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them
    11·1 answer
  • Points! taga pilipinas ba kayo?​
    10·1 answer
  • What is the output of the following code?int *p; int *q; p = new int; *p = 43; q = p;*q = 52; p = new int; *p = 78; q = new int;
    5·1 answer
  • True or false: Because there are so many different network configurations, operating systems, and strategies, it is a challenge
    14·1 answer
  • What are the most common processes and procedures handled by data warehousing specialists? select all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!