Answer:
See explaination
Explanation:
CREATE TABLE CATEGORY
(
cid int NOT NULL,
description varchar2(1000),
PRIMARY KEY (cid)
);
CREATE TABLE PRODUCT
(
pid int NOT NULL,
description varchar2(1000),
cid int,
price int,
p_size varchar2(1),
CONSTRAINT chk_price CHECK (price>0),
CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),
CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)
);
Answer:
public class SwitchCase {
public static void main(String[] args) {
int num = 0;
int a = 10, b = 20, c = 20, d = 30, x = 40;
switch (num){
case 102: a += 1;
case 103: a += 1;
case 104: a += 1;
case 105: a += 1;
break;
case 208: b += 1; x = 8;
break;
case 209: c = c * 3;
case 210: c = c * 3;
break;
default: d += 1004;
}
}
}
Explanation:
- Given above is the equivalent code using Switch case in Java
- The switch case test multiple levels of conditions and can easily replace the uses of several if....elseif.....else statements.
- When using a switch, each condition is treated as a separate case followed by a full colon and the the statement to execute if the case is true.
- The default statement handles the final else when all the other coditions are false
Answer:
Below:
Explanation:
1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.
2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.
3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.
4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.
5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.
6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.
7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.
Hope it helps.......
It's Muska...
Grace Murray Hopper invented it
Answer:
D. Low-level components are combined into clusters that perform a specific software sub-function
Explanation:
Normally, regression testing are done on a manual basis by simply re-executing a subset of the entire available test cases or it can be done automatically by utilizing playback tools or automated capture. Hence, from the options, a combination of low-level components into clusters that perform a specific sub-function does not align with how regression testing are done either manually or automatically.