Answer:
SQL queries
The command used to display the customer ID and total number of orders placed is given below
Query:
SELECT CustomerID, COUNT (orderID) AS TotalOrders
FROM Order_Table
GROUP BY CustomerID
Explanation:
SQL queries
The command used to display the customer ID and total number of orders placed is given below
Query:
SELECT CustomerID, COUNT (orderID) AS TotalOrders
FROM Order_Table
GROUP BY CustomerID
SELECT - To query the database and get back the specified fields SQL uses the select statement
CustomerID is a coloumn name
The function COUNT(OrderID) returns the number of orders
Totalorderds is a label
FROM - To query the database and get back the preferred information by specifying the table name
Order_Table is a table name
GROUP BY - The clause is used to group the result of a SELECT statement done on a table where the tuple values are similar for more than one column
The table below displays the CustomerID and total number of orders placed
CustomerID Totalorders
4 28
1 6
12 5
16 5
6 3
9 3
15 3
3 1
13 1
14 1
The table below shows the total number of orders situated for each sales person
SalesPerson_ID TotalOrders
3 16
2 3
4 3
5 3
Okay what do you need to know
You could get a laptop for like 200 that could run well and enough space for stuff.
Answer:
Data type in Microsoft Access Database
Text
Memo
Byte
Integer
Long
Single
Double
Currency
AutoNumber
Date/Time
Yes/No
Ole Object
Hyperlink
Lookup Wizard
Explanation:
Answer:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
Explanation:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:
- It defines what is required from organization’s employees for the security of the IT systems
- Information security policies provide a means to secure the organization against external and internal threats
- Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
- Information security policies are created to hold each employee responsible with regard to information security