1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
4 years ago
15

Consider the following relations:

Computers and Technology
1 answer:
ArbitrLikvidat [17]4 years ago
4 0

Answer:

Check the explanation

Explanation:

--Query 1)

SELECT ename, sal, age

FROM Emp;

--Query 2)

SELECT did

FROM Dept

WHERE floot = 10 AND budget<15000;

You might be interested in
Write an algorithm whether the given number is positive negative or zero​
Ahat [919]

Answer:

See the code below in python.

Explanation:

num = int(input("Enter a number: "))

if (num == 0):

 print("You entered 0...")

elif (num < 0):

 print("Your entered a negative number...")

else:

 print("You entered a positive number...")

Regards: Your Friendly Study Co-Pilot!

6 0
3 years ago
In python, what would the following code do..a=b=70
Afina-wow [57]

Answer:

It would assign the value of 20 to the variables a and b

Explanation:

7 0
3 years ago
Function of network security​
myrzilka [38]

Answer:ffffffffffffgggggg

Explanation:vvvc

5 0
4 years ago
Help!! me!! plsssssssssssssssssssssssssssssssssss
Maslowich

Answer:

e,f,g, and h

Explanation:

5 0
3 years ago
______ is used to ensure that data is organized most efficiently in a database. A) Consistency checking. B) Validation C) Normal
Leya [2.2K]

Answer:

C) Normalization

Explanation:

Normalization is an approach that is to be done in a systematic manner in order to remove the data duplicity and there are non-desirable attributes such as insert, update, delete, etc. In this the process should be followed in multi step that contains the data in a tabular form so that it could eliminate the repetition of data to maintain the efficiency of the data

Therefore according to the given situation, the option C is correct

6 0
3 years ago
Other questions:
  • A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's p
    9·1 answer
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • A phonebook typically lists the name, address, and telephone number of everyone living in an area. Write code defining a structu
    15·1 answer
  • Create a subclass of Person called Lecturer that has 2 variables of its own: employeeNumber and salary. As in the above scenario
    12·1 answer
  • Answer the following questions based on your readings from Module 1. Describe a time when you or someone you observed showed a p
    9·1 answer
  • 1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x &gt; y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max
    12·1 answer
  • I have this project and I can't do anything about it, I do really need help ASAP
    5·1 answer
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    5·1 answer
  • Httpsdiscord.ggBVNuFMgG link is here<br>come and join discord​
    13·1 answer
  • Where should broadheads be kept while traveling to and from the field? in a plastic bag to protect from moisture in a carrier at
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!