1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
2 years ago
14

What set operator would you use if you wanted to see all of the Customers and the Employees including any records that may appea

r in both Customers and Employees? select firstname ,lastname ,phone from Customers select firstname ,lastname ,phone from Employees; Group of answer choices1 INTERSECT2 EXCEPT3 UNION ALL4 UNION
Computers and Technology
1 answer:
ikadub [295]2 years ago
7 0

Answer:

1. INTERSECT

Explanation:

Intersection is the set operator that gives us the information which is common to both tables. In this case the query will be:

SELECT firstname, lastname, phone FROM Customers

INTERSECT

SELECT firstname, lastname, phone FROM Employees;

You might be interested in
Which action could be used to determine if a host is compromised and flooding traffic onto the network?
timofeeve [1]

<span>Disconnect the host from the network. 
</span><u>if that doesnt work then try these options</u> 
Check the host hard drive for errors and file system issues.
<span>Examine the Device Manager on the host for device conflicts
</span>Unseat and then reconnect the hard drive connectors on the host.

4 0
3 years ago
Sleeping is an effect of _______ , but agitation may cause a person to wake up
Crank
"Sleeping is an effect of <span>Depressants, but agitation may cause a person to wake up"</span><span />
4 0
2 years ago
Read 2 more answers
Write a python function c that converts bitstring array back to an integer numpy array
tresset_1 [31]

Answer:

import numpy as np#importing numpy module with an alias np.

def c(bitstring_array):# defining function c.

   num_integer=bitstring_array.dot(2**np.arange(bitstring_array.size)[::-1])#bitstring conversion.

   return num_integer#returning integer array.

print("Enter bits")

Bit_l=input().split(" ")#enter space separated bitstring.

for i in range(len(Bit_l)):#iterating over the bitstring.

   Bit_l[i]=int(Bit_l[i])

bitstring_array=np.array(Bit_l)

print(c(bitstring_array))#function call.

Output:

Enter bits

1 1 1 0 0 1

57

6 0
3 years ago
How does Google work, why does it work that way?
Oxana [17]

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

8 0
3 years ago
Read 2 more answers
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
2 years ago
Other questions:
  • The _____ helps the project team to identify the main functions or features of the system and the different users or external sy
    15·1 answer
  • Write a class named Car that has the following member variables: - yearModel. An int that holds the car’s year model. - make. A
    6·1 answer
  • A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this servic
    7·1 answer
  • Software is giving instructions so that text is displayed on the monitor. This software is an example of _____.
    7·2 answers
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • The HTTP protocol operates at which layer?
    7·1 answer
  • HELP
    11·1 answer
  • The structure of the atmosphere based temperature changes ​
    5·1 answer
  • (Please answer both parts, please)
    8·2 answers
  • Use the drop-down menus to describe the customize ribbon dialog box.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!