1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
13

g Write an SQL statement to list all of the names of students who have not taken a classwith an instructorwho is a faculty of th

eComputer Sciencedepartment. Constraints:-Useat least one outer join,-Use natural joins and using conditions, exclusively, as the join conditions,-Do not use any other kinds of joins (i.e no cross products etc.)
Computers and Technology
1 answer:
iogann1982 [59]3 years ago
4 0

Answer:

SELECT StudentFullname FROM Studentdata INNER JOIN Student_Class ON Studentdata.uniqueno = Student_Class.student_id LEFT JOIN Student_Instructor ON Student_Class.instructor_id = Student_Instructor.id WHERE Student_Instructor.faculty <> 'Computer Science'

Explanation:

Assume the following table names;

Studentdata - for student table

Student_Class - for each class

Student_Instructor - for student's instructors

The code first list out StudentFullname from studentdata table.

The code is the connected to Student_Class to get a list of students in class

The code is then connected to Student_Instructor table to get a list of instructors in class

Lastly, the where then filters instructors that are not from computer science department

You might be interested in
​ A wire service is also known as a ____.
charle [14.2K]
The answer is C press agency
4 0
3 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
When Kim was working in her Microsoft® Excel® spreadsheet, she accidentally placed her book on the spacebar and erased the conte
zaharov [31]

Answer:

The undo tool.

Explanation:

Microsoft Excel is a spreadsheet application developed by Microsoft, it is used for analysing data. It's worksheets are made up of columns and rows or fields and records.

There are different ways of entering data to a cell. Click on the cell and type the data, copy and paste to the target cell, double-click on the cell to correct data and click on a cell and press the spacebar key to clear the data.

Excel records the action of event, so when a mistake is made like deleting a crucial cell data value, the undo tool is used to recover the data, since it holds records of events. The redo tool is the reverse of the undo tool.

5 0
3 years ago
Just take points, this website is so weird because of all the reporting and I didn't do any thing
krok68 [10]

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

7 0
2 years ago
Read 2 more answers
What are at least three differences between a personal and non-personal blog?
qwelly [4]
The difference betweeen personal and nonpersonal blogs are that on a personal blog you give out most information you dont want people to know or it is anonomys 
4 0
2 years ago
Other questions:
  • After a normal system shutdown, when the computer is turned off, contents of the memory used to store bios settings are
    12·2 answers
  • TLO 06 Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure.a. Trueb. False
    14·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Assume we are testing a variable is_sunny in a while loop. is_sunny = “n”.
    13·1 answer
  • What is the reasoning you would write an inquiry to a company?
    5·2 answers
  • What are the names of the four major varnas in the caste system?​
    9·2 answers
  • Which century saw the development of letterpress printing?
    10·1 answer
  • Complete the steps for saving a presentation as a poi file,
    14·1 answer
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
  • Data security issues that must be addressed by hipaa implementation teams include:__________
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!