1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
9

Write an SQL statement to display full name of employees supervised by the manager whose ID is 105. Note that full name includes

first name, a space, and last name. Also note the caption/heading of the query output. Sample query output is shown below for your guidance.
Computers and Technology
2 answers:
Ghella [55]3 years ago
8 0

Answer:

SELECT CONCATENATE(FIRST_NAME, " ", LAST_NAME) as FULL_NAME FROM TABLE_NAME WHERE MANAGER_ID = 105;

Explanation:

SELECT IS THE KEYWORD TO FETCH DATA

CONCATENATE combines FIRST_NAME, " " AND LAST_NAME and displays as FULL_NAME

TABLE_NAME is the name of the table containing the data

MANAGER _ID is the name of the column containing the manager id data

goldenfox [79]3 years ago
4 0

Answer:

SQL

//////////////////////////////////////////////////////////////////////////////////

Select first_name + ' ' + last_name as [Full Name]

From Employee

Where manager_Id = 105

Explanation:

First thing is to combine the first and last name columns into one and label it as Full Name (you have to use square brackets or double quotations, if the alias or label contain spaces)<u>,</u> and select it from <em>Employee</em> table.

And lastly, place the where condition for the supervisor/manager.

<u />

You might be interested in
List down any 5 Advantages and any 5 Disadvantages of Computers
Dahasolnce [82]

Advantages

Increase your productivity. ...

Connects you to the Internet. ...

Can store vast amounts of information and reduce waste. ...

Helps sort, organize, and search through information. ...

Get a better understanding of data. ...

Keeps you connected. ...

Help you learn and keep you informed. ...

Can make you money.

Disadvantages

Too much sitting. ...

Carpal tunnel and eye strain. ...

Short attention span and too much multitasking. ...

Potential of loss of privacy. ...

Can limit learning and create a dependency. ...

Time sink and lots of distractions....

5 0
3 years ago
Read 2 more answers
Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a d
Rudik [331]

Answer:

import java.io.*;

public class Main {

   public static void main(String[] args) throws IOException {

       double baseLength = 0, baseWidth = 0, pyramidHeight = 0;

       Object[] volume;

       volume = calcPyramidVolume(baseLength, baseWidth, pyramidHeight);

   }

   public static Object[] calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight) {

       double area = calcBaseArea(baseLength, baseWidth);

       double volume = baseLength * baseWidth * pyramidHeight;

       return new Object[]{volume, area};

   }

   public static double calcBaseArea(double length, double width) {

       return length * width;

   }

}

Explanation:

The problem is flawed because it is completely inefficient for one to create two separate methods to calculate the volume and the area when they can be done at once.

The second problem is that it was never specified whether to return something from the calcBaseArea method.

I assumed it required it, so it is not advisable to initiate the method as a double, but rather create it as an Object so that it can return two values: the volume and the area.

6 0
3 years ago
If you are interested in joining the military, you can attend college _____. a. before serving b. during service c. after servic
Arturiano [62]

D .All the above.

Explanation:while in the military you can take online courses during service or you can can choose to do it before or after

6 0
3 years ago
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
3 years ago
What sentence could Lou’s granddaughter not answer? Explain the context and discuss whether you could answer this question or no
Tanya [424]
He wouldn’t answer the context for the discussion
7 0
2 years ago
Other questions:
  • In a two-sided tag, a(n) ____ tag indicates the content's end.
    7·2 answers
  • Although the original BBS system was simple, it increased people's ability to communicate
    14·1 answer
  • Given the variables isfulltimestudent and age, write an expression that evaluates to true if age is less than 19 or isfulltimest
    12·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • Using the Invert Selection tool while something is selected in Paint will __________.
    14·1 answer
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • In which table is the input and the corresponding output of a Boolean function listed? How is the output of the NAND gate determ
    9·1 answer
  • What are village by laws​
    12·1 answer
  • A folder is a collection of related of data is true or false​
    10·2 answers
  • to provide for ecmascript compatibility in older browsers, you can use group of answer choices javascript shivs javascript shims
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!