1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
13

Calculated fields can be entered in queries. What row should you type a calculated field in?

Computers and Technology
1 answer:
Nana76 [90]3 years ago
7 0

Computed columns in SQL are calculated columns where the value of the column will be automatically inserted according to the formula specified.  

Suppose Net salary = Gross_salary – PF, so this can be created as,

Create table Employee(empno, empname, Basic, HRA, PF, Gross_Sal = Basic+HRA,Net_salary = Gross_salary-PF)

When you query Select * from Employee, all the fields along with the calculated column values will get displayed. Even if you update on the field, changes will be automatically done in calculated column.

You might be interested in
Activity #2
Firlakuza [10]

Answer:

1. sum(B2,B3) , OR =B3+B2

2. =C4*C5

3. =F2/F3

Explanation:

Use the = operator to do any basic math using numbers or the respective cells. each also have respective functions as shown first in problem 1.

4 0
3 years ago
In the Microsoft Excel spreadsheet how many choices are possible when using a single IF statement​
cricket20 [7]

Answer:

An if statement can have only two choices. However the choices can be extended by using multiple if else statements within the first if statement.

Explanation:

Best Regards: Your Friendly Study Co-Pilot

8 0
3 years ago
You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
GalinKa [24]

Pre-production is vital to all members of the crew. It ensures that the entire crew knows exactly what's going on. If they need to know why we're shooting in a certain way, or why we're shooting in a certain place, they can see the entire process that we've gone through in order to get to where we are.

7 0
3 years ago
What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
Aneli [31]
<span>Some causes of the number of bytes on the wire exceeding the number of bytes being captured is that </span>not everything is being captured or that partial packets may be captured which could lead to incorrect analysis. If there are regularly more bytes on the wire than captured, then, it is possible that the computer on which Wireshark is running is not able to keep up with the interface.
7 0
3 years ago
Read 2 more answers
You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
Bezzdna [24]

You can use the Home key if your cursor is at the end of the word. Use the End key if you place the cursor on the left side of the word.

The Home and End keys are called the function keys. They act as functions and do not produce characters when pressed. Function keys move the cursor when you are creating or editing a document. The Home key moves the cursor at the beginning of a line in a word or a sentence and the End Key place the cursor at the end of the line.


8 0
3 years ago
Other questions:
  • What does the rule of five say?
    12·2 answers
  • Linux would be a good example of?
    6·1 answer
  • Data flow is not a major consideration when building an analytics model. T/F
    13·1 answer
  • This morning when Paul turned on his computer at work, it would not boot. Instead, Paul reported that he heard a loud clicking n
    15·1 answer
  • What is human data,
    8·1 answer
  • Along a road lies a odd number of stones placed at intervals of 10 metres. These stones have to be assembled around the middle s
    12·1 answer
  • What code do I have to use in my php if i don’t want my $_SESSION[“variablex”] to destroy? But i already have a session_destroy(
    6·1 answer
  • 1. Describe data and process modeling concepts and tools.
    9·2 answers
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • IM a bit confused on what this is asking for exactly.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!