1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
monitta
4 years ago
13

Which of the following is a valid SQL statement? a. c.customer#, order#, orderdate, shipdate FROM customers c NATURAL JOIN order

s c; b. * FROM customers JOIN orders ON (customer#); c. c.customer#, order#, orderdate, shipdate FROM customers c, orders c WHERE c.customer# = o.customer#; d. both b and c
Computers and Technology
1 answer:
zhenek [66]4 years ago
7 0

Options A and C are valid SQL statements as JOIN is a JOIN clause that generate an implicit join based on the common columns in both tables.  

a. c.customer#, order#, orderdate, shipdate FROM customers c NATURAL JOIN orders c;

c. c.customer#, order#, orderdate, shipdate FROM customers c, orders c WHERE c.customer# = o.customer#;

<u>Explanation:</u>

In option A, there is an explicit join created between source table(customers) and the target table(orders) thus displaying the required data field names.

Option B is a JOIN clause with an ON clause. However, end-user can use the ON clause will have to be used only when there is more than one common column in both the tables.

Option C is the standard SQL statement using the WHERE clause based on the condition. Both A and C will return the same query output.

You might be interested in
An application that can be launched from my web browser is known as a _____. java applet spreadsheet cad software music applicat
SIZIF [17.4K]
An application that can be launched from my web browser is known as a java applet. Java applet is a <span>small application which users can launch from a web-page, that clearly coincides with the statement in the task. As you can see, java is the most appropriate word for the gap.
Regards.</span>
4 0
3 years ago
Rules that govern how to communicate online are known as etiquette. netiquette. Internet laws. computer rights.
azamat

Answer:

Explanation:

i think it might be netiquette

7 0
3 years ago
Read 2 more answers
Which of the following are all involved in the evaluation of the presentation of a speech?
ikadub [295]

Answer:

C.

Explanation:

The elements involved in the evaluation of the presentation of a speech includes visual aids, vocal technique, and body language.

Adding vivid pictures in the presentation makes it graphic and proficient. The visual aids in presentation also provides the succinct and clear meaning of the message to the reader.

The vocal technique is another element that adds value in presentation. A speaker's confidence is reflected through his/her tone. It is the speaker's voice that becomes an influential tool that draws the audience's attention.

Body language, like vocal technique, helps in effective delivering of the speech. Body language is a non-verbal form of communicatin that communicates a lot to the audience than one can imagine.

Therefore, option C is correct.

6 0
3 years ago
In the ( ) Model, each in a network can act as a server for all the other computers sharing files and acsess to devices
Pavel [41]

Answer:

C peer to peer

Explanation:

  • A peer to peer is a computer network in a distributed architecture that performs various tasks and workload amount themselves. Peers are both suppliers and consumers of resources. Peers do similar things while sharing resources, which enables them to engages in greater tasks.
3 0
3 years ago
Python 4.5 code practice
Arada [10]

Answer:

add the question

Explanation:

3 0
3 years ago
Other questions:
  • Ann wants to create a bookmark. She should
    9·2 answers
  • When a cache block has been modified since being read from main memory?
    10·2 answers
  • Select the correct answer.
    15·1 answer
  • Why were computer users excited by the introduction of the first Macs?
    14·1 answer
  • How do I turn of the noise canceling feature on my beats studio wireless?
    13·1 answer
  • 5. How is shutter speed generally measured? What do the measurements mean?
    7·2 answers
  • The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
    14·1 answer
  • What mistake do you think you might make related to changing the data in a cell that's used in a formula?
    14·1 answer
  • What is the final value for X ?<br><br> x= 1<br><br> x=13<br><br> x= x+3<br><br> x=0
    9·1 answer
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!