1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
4 years ago
6

The CUSTOMERS and SALES tables contain these columns:

Computers and Technology
1 answer:
ella [17]4 years ago
6 0

Answer:

Using join on both table against column CUST_ID will return customer ID, company and total sales

Explanation:

select

CUSTOMERS.CUST_ID,

CUSTOMERS.COMPANY,

SALES.TOTAL_SALES

from CUSTOMERS JOIN SALES

ON

CUSTOMERS.CUST_ID=SALES.CUST_ID

Above query selects required customer id and company table from customers table and total sales from sales table and apply join against customer id

JOIN in sql returns all the row where for a value in first table there is a matching value in second table.

You might be interested in
Ten 9600-bps lines are to be multiplexed using TDM. a. Ignoring overhead bits in the TDM frame, what is the total capacity requi
lukranit [14]

Answer:

a.

<u>Given Data :</u>

Data rate of each Line (Channel) = 9600 bps

Total lines need to be multiplexed = 10

<u>Solution:</u>

Total Capacity of Synchronous TDM = Data rate of each line x Total Lines

                                                            =  9600 bps x 10

                                                            = 96,000 bps

                                                            = 96 Kbps

Explanation:

In time division multiplexing, multiple channels (Lines) can transmit data over the medium on different time slots. In synchronous TDM, equal time has been allocated to each channel to transmit their data over the medium. so the total capacity required for 10 lines synchronous TDM is 96Kbps.

Answer:

b.

<u>Given Data:</u>

Data rate for each line (Channel) = 9600 bps

Total lines need to be multiplexed = 10

Average TDM link utilization = 80% = 0.8

Each link busy for the time = 50% = 0.5

<u>Solution:</u>

Capacity of Statistical TDM = data rate x number of Lines x each channel duration/Average utilization of TDM

Capacity of Statistical TDM = 9600 bps x 10 x 0.5/0.8

                                               =60,000 bps

                                               = 60 kbps

Explanation:

In TDM, if we want to limit the capacity of TDM and each channel that need to be multiplexed. we can limit the utilization of the TDM by limiting its transmission time of each channel and also the capacity of TDM.

3 0
3 years ago
A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
Zigmanuir [339]

The technology that would be useful to look into the activities of the team member is the computer forensics

<h3>How to determine the technology?</h3>

Usually, when there is a case of data breach; the technology used to tackle the problem is the use of computer forensics.

This  is so because computer forensics involves identifying the storage of data on a computer system

Hence, the manager should make use of computer forensics

Read more about computer technology at:

brainly.com/question/1538272

#SPJ4

3 0
2 years ago
Read 2 more answers
An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks every
Natali [406]

Answer:

The answer is "Option B"

Explanation:

In the given-choices, the only option B is correct because by reassessing instantly, the team loses is its advantage of debating its projections and how it chose those assessments, and the wrong choice can be defined as follows:

  • In choice A, Mostly as a unit for the projections, respondents should not use the ideal days.  
  • In choice C, Whenever the procedure should've been anonymous, no cards were released.
  • In choice D, Its mediator was incorrect and the laws were followed.
4 0
3 years ago
If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the l
OLEGan [10]

Answer:

<u>/var</u>

Explanation:

The /var subdirectory contains files to which the system writes data during the course of its operation. Hence, since it serves as a system directory, it would prevent log files from consuming a large amount of data.

7 0
3 years ago
Read 2 more answers
Which event represents an example of social media being used in an
Semmy [17]
Hello!

The answer is:
-D. Communication with friends and family after other systems were disabled by a major earthquake.

I hope this helps you! :)
7 0
2 years ago
Other questions:
  • In the dewey decimal sysytem, the call number 800 notes which section
    10·1 answer
  • Examples of apps include pop-up windows, validation of webform inpts and images that change when a cursor passes over them
    12·1 answer
  • 3. The combination of keys that we should press to select all document is
    14·1 answer
  • Atms typically use single factor authentication. <br> a. True <br> b. False flashcard
    5·1 answer
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    6·1 answer
  • You can view information for the individual people who will perform the tasks on theproject in the
    7·1 answer
  • What does the somaliland high population density <br>​
    15·1 answer
  • Please help with attached file
    8·2 answers
  • WILL MARK BRAINIEST
    12·1 answer
  • Under which menu option of a word processing program does a callout appear?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!