1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
3 years ago
9

For each of the following SQL queries, for each relation involved,list the attributes that must be examined to compute the answe

r. All queries refer to the following relations:Emp(eid: integer, did: integer, sal: integer, hobby: char(20))Dept(did: integer, dname: char(20), floor: integer, budget: real)1. SELECT * FROM Emp E2. SELECT * FROM Emp E, Dept D3. SELECT * FROM Emp E, Dept D WHERE E.did = D.did4. SELECT E.eid, D.dname FROM Emp E, Dept D WHER
Computers and Technology
1 answer:
Vlada [557]3 years ago
7 0

Answer:

1. E.eid ,E.hobby, E.sal, E.did

2.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

3.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

4.E.eid , D.dname

Explanation:

The attributes that are examined for the query are the attributes of the table that are mentioned in the select statement and where clause.

So according to first query we are working on all attribues of Emp table so all of the attributes of Emp table are examined.In second query we selecting all attributes of both the tables hence all attributes of both the table and same in the next query.

In fourth query though the query is not complete where clause is missing but we have eid from Emp and dname from Dept tables for sure and the attributes mentioned in where clause will also be present.

You might be interested in
Match each keyboard command with its result.
BlackZzzverrR [31]

Answer:

The answer to this question is given below in the explanation section

Explanation:

The following are the correct match according to the keyboard command with its result.

  • Control + End  - jumps to the end of a document
  • Control + Home  - jumps to the beginning of a document
  • Page Up  - moves backward in a document
  • Page Down - moves forward in a document

3 0
4 years ago
a ____ consists of wires connecting the cpu and other parts of the computer. The _____ transfers data between CPU and memory uni
geniusboy [140]

Answer:

A power supply consists of wires connecting the cpu and other parts of the computer. The data bus transfers data between CPU and memory unit.

Explanation:

4 0
3 years ago
1. Write a method to measure sortedness of an array. The method header is:
Licemer1 [7]
ㄴㄱㄷㅂㄷㅈ븟ㅈㅂㅈㅂㅈㄱㅅㄱㅈㅂㄷㅅㄷㅈㄱㅅㄱㅅㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅈㅂㅈㅂㅈㄱㅈㄴㅈㄴㄱㅆㅅㄱㅈㅂㄷㅅㅈㅂㅈㅅㄱ싲ㄱㅈㅂㄷㅂㅅㅇㄱㅇㄱㅅㅂㄷㅈㄱㅇㄱㅇㄱㄷㄱㅅㄱㅇㄱㄷㅈㄱㅇㅈㄱㅂㅈㅂㄷㅇㄷㅅㅆㄱㅇㄱㅅㅈㄱㅈㄱㅇㄱㅇㅂㅇㄱㅁㄱㅇㄱㅇㄱㅇㄱㅇㄱㅁㅋㅁㄱㅇㄱㅇㄱㅇㄱㄴㅁㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅅㄱㅈㄱㅈㅅ?...
7 0
3 years ago
The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, in
irina [24]

Answer:

sentence = "hello wow a stores good"

same_letter_count = 0

sentence_list = sentence.split()

for s in sentence_list:

   if s[0] == s[-1]:

       same_letter_count += 1

print(same_letter_count)

Explanation:

*The code is in Python.

Initialize the sentence with a string

Initialize the same_letter_count as 0

Split the sentence using split method and set it to the sentence_list

Create a for loop that iterates through the sentence_list. If the first and last of the letters of a string are same, increment the same_letter_count by 1

When the loop is done, print the same_letter_count

4 0
3 years ago
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
Other questions:
  • In dt.py, you will implement a basic decision tree classifier for
    5·1 answer
  • How do humans feel about being abducted?
    12·2 answers
  • Multiple Choice
    6·1 answer
  • How do i delete an account for brainly how do i delete everything
    7·2 answers
  • Write a Python program segment, using a loop, to calculate and print the sum of the odd integers from 20 to 120. (Hint: 21 23 25
    13·1 answer
  • What is the best way of farming exotics in destiny?
    12·2 answers
  • Can somebody tell me the Minecraft command to clear an entire world and destroy every block if u Dunno please don’t answer >-
    13·1 answer
  • You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
    8·1 answer
  • _____ oversee the work of various types of computer professionals and must be able to communicate with people in technical and n
    5·1 answer
  • PLEASE HELP ME
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!