Answer:
A computer has a memory hierarchy, rather than just a single memory component. The lowest level is some form of secondary storage such as a magnetic disk. The next level is the main memory where a subset of the data from the hard disk is stored temporarily. The cache memory is the next level and uses SRAM to store frequently used data. Finally, the register store variables and temporary results for the current CPU computations.
Answer:
SQL queries
The command used to display the customer ID and total number of orders placed is given below
Query:
SELECT CustomerID, COUNT (orderID) AS TotalOrders
FROM Order_Table
GROUP BY CustomerID
Explanation:
SQL queries
The command used to display the customer ID and total number of orders placed is given below
Query:
SELECT CustomerID, COUNT (orderID) AS TotalOrders
FROM Order_Table
GROUP BY CustomerID
SELECT - To query the database and get back the specified fields SQL uses the select statement
CustomerID is a coloumn name
The function COUNT(OrderID) returns the number of orders
Totalorderds is a label
FROM - To query the database and get back the preferred information by specifying the table name
Order_Table is a table name
GROUP BY - The clause is used to group the result of a SELECT statement done on a table where the tuple values are similar for more than one column
The table below displays the CustomerID and total number of orders placed
CustomerID Totalorders
4 28
1 6
12 5
16 5
6 3
9 3
15 3
3 1
13 1
14 1
The table below shows the total number of orders situated for each sales person
SalesPerson_ID TotalOrders
3 16
2 3
4 3
5 3
Answer:
save as a word document (.docx) to keep editing offline then copy and paste into the google doc
Answer:
The answer is "True"
Explanation:
In the given statement some information is missing that is "True or false"
Internet security is the scope of the privacy and security of the electronic exchange of data. It's a common term that refers to something like many factors, technologies, and technology used to protect records, contact, and interests, confidential and private.
- The security of the Internet is recognized as the privacy of the User.
- It is secure and unique passphrases or two-factor authentication.