Answer:
The correct option is option 4 from the options indicated below:
Explanation:
The options are as given below
1-SELECT customer# FROM customers
UNION
SELECT customer# FROM orders;
2-SELECT customer# FROM orders
MINUS
SELECT customer# FROM customers;
3-SELECT customer# FROM orders
INTERSECT
SELECT customer# FROM customers;
4-SELECT customer# FROM customers
MINUS
SELECT customer# FROM orders;
Option 1 is not correct as it will provide the list of all the customers whether they have placed order or not.
Option 2 is not correct as it will provide the list of customers who have placed order but are not in the customers table. This will return the empty records.
Option 3 is not correct as it will provide the list of customers who have placed the order.
Option 4 is correct as it will provide the list of customers from the CUSTOMERS table which are not in the Orders table. thus the list of customers who have not placed the order yet.
Answer:
A. troubleshooting
Explanation:
Troubleshooting is the process of trying to detect problems with a software or hardware component so as to apply solutions to it.
Therefore, Sarah would need troubleshooting skills to help her test her program to detect all bugs and fix it.
Answer:
Macintosh.
Explanation:
Macintosh refers to a set of computers designed, developed and manufactured by Apple Inc. Apple officially began the sales of Macintosh on the 24th of January, 1984. The first designs of Macintosh are considered to be personal computers and had a mouse, in-built screen with a graphical user interface (GUI).
Macintosh developed the first design technology program which had a mouse and allowed for photo manipulation. This technology or software program used for photo manipulation is known as MacPaint, it was a raster graphics editor which was originally coded by Bill Atkinson using a Pascal programming language while its graphical user interface was designed by Susan Kare.
<span>You cannot advance slides during the slide show by pressing the PAGE DOWN key.
This is a true statement.
</span>
Answer:
d. To help security professionals better understand and protect against threats to the system
Explanation:
The main purpose of a honeypot is to attract potential hackers and allow them to have access to a network system that is not the actual live network with close monitoring. This is done so as to learn and understand the intentions of the hacker and how they execute an attack. With this knowledge security professional are in a better position to deal with potential threats and keep the network secure.