1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
1 year ago
7

Given the tables PRODUCT (ProductID. Description. Cost) SUPPLIER (Supplier D. ContactName, Phone Number) as shown in the figure

below, which of the following would represent the correct placement of foreign keys? PRODUCT SUPPLIER ProductD Supplier Description Contact Name Cost Phone Number PRODUCT (ProductiD. Description. Cost) SUPPLIER (Supplier D. ContactName PhoneNumber, Productio) PRODUCT (ProductID. Description, Cost ContactName) SUPPLIER (Supplier D. ContactName, PhoneNumber) PRODUCT (ProductID. Description. Cost) SUPPLIER (Supplier D. ContactName, PhoneNumber) PRODUCT (Product Description, CostSupplier) SUPPLIER (Supplieri. ContactName, Phone Number, ProductID) PRODUCT (ProductID. Description Cost Supplieri) SUPPLIER (Supplierib. ContactName, PhoneNumber)

Computers and Technology
1 answer:
Anon25 [30]1 year ago
6 0

CREATE PROCEDURE sp_Q1

"at"country1 NVARCHAR(15),

"at"country2 NVARCHAR(15)

SELECT SupplierID, CompanyName, Phone, Country FROM suppliers where Country in ("at"country1,"at"country2)

 SELECT ProductID, ProductName, UnitPrice, SupplierID FROM Product

     where SupplierID in(

 SELECT SupplierID FROM suppliers

where Country in ("at"country1,"at"country2)) ORDER BY SupplierID

<h3> What is product supplier?</h3>

PRODUCT SUPPLIER ProductD Supplier Description Contact Name Cost Phone Number PRODUCT (ProductiD. Description. Cost) SUPPLIER (Supplier D. ContactName PhoneNumber, Productio) PRODUCT (ProductID. Description, Cost ContactName) SUPPLIER (Supplier D. ContactName, PhoneNumber)

PRODUCT (ProductID. Description. Cost) SUPPLIER (Supplier D. ContactName, PhoneNumber) PRODUCT (Product Description, CostSupplier) SUPPLIER (Supplieri. ContactName, Phone Number, ProductID) PRODUCT (ProductID. Description Cost Supplieri) SUPPLIER (Supplierib. ContactName, PhoneNumber)

Therefore,  SELECT ProductID, ProductName, UnitPrice, SupplierID FROM Product

     where SupplierID in(

 SELECT SupplierID FROM suppliers

where Country in ("at"country1,"at"country2)) ORDER BY SupplierID

Learn more about SupplierID on:

brainly.com/question/15698840

#SPJ1

You might be interested in
.Although SQL is a language, you donât use it to write applications? (true, false)
Evgen [1.6K]

Answer:

True

Explanation:

SQL stands for structured  query language , which is used to query Relational Database Management systems like SQLServer. This is not for writing applications like business layer where we use some programming languages.SQL is meant for data layer to perform CRUD operations against database.

CRUD operations :

Create

Read

Update

Delete

we can perform above operations on database by using SQL query language

6 0
3 years ago
A(n) _____ is a Web address that specifies the exact location of a Web page using letters and words
Ahat [919]
A Uniform Resource Locator (URL)
5 0
3 years ago
Explain what the color range ( green and red ) in this interactive map represents
katrin2010 [14]

Answer:

You should send a picture of the map so people can answer directly.

Explanation:

3 0
3 years ago
How can the storage model assist in the design of storage networks?
kupik [55]

Answer:

 The storage model basically used for protecting the confidential data and information. It is important for the security purpose during the accessing of the data to make it more easy.

There are basically different types of storage model that used to assign in the designing of the storage network are:

  • Hard drive storage is basically used for the data storage in the local hard drive which is used by the sever.
  • Online storage is one of the most secure and most secure choices, the information is put away on various framework which help in protected and secure exchange of the information regardless of whether one of the framework is fizzled. it is also known as cloud storage device.
  • The network storage is also used fr storing the data in the server.

7 0
3 years ago
__________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
umka21 [38]

Answer: Lattice-based, non-discretionary

Explanation: Lattice-based access control is a form of non-discretionary access control in which users are assigned a matrix of authorizations for particular areas of access. Lattice-based access control are usually used to restrict or define the level of authorization granted to a subject which may be an individual, organization or group or the that given to the object which may include applications and computers.It utilizes a non-discretionary approach whereby the defined access is uniformly enforced across all subjects and objects within the confines of an information system.

3 0
3 years ago
Other questions:
  • Make a class Employee with a name and salary. Make a class Manager inherit from Employee. Add an instance variable, named depart
    14·1 answer
  • Multibeam sonar technology uses _____.
    14·2 answers
  • Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
    14·1 answer
  • When creating an ad, how does Greg know what it will look like to his potential customers?
    15·1 answer
  • Name some technologies that engineers create
    13·1 answer
  • the control programs managing computer hardware and software use the ______ function to control and prioritize tasks performed b
    8·1 answer
  • What will the following loop display? 0 1 2 3 4 5 0 1 2 3 4 0 1 2 3 4 The loop will display numbers starting at 0, for infinity.
    8·1 answer
  • If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 1 2 5
    13·1 answer
  • Cultural differences may make it difficult for team members to _____. Select 4 options.
    14·1 answer
  • Wht is RAM called Random Access memory and ROM IS called Read only memory​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!