Answer:
Check the explanation
Explanation:
As per requirement submitted above kindly find below solution.
This demonstration is using SQL Server.
Table Names used as
department
project
works_on
SQL query :
select proj_name,dept_name,count(emp_no) as 'most employees ' from
project,department,works_on
where
project.proj_no=works_on. proj_no and
department. dept_no=works_on. dept_no
group by proj_name,dept_name
having count(emp_no)=(
select max(empCount) from (
select proj_name,dept_name,count(emp_no) empCount from project,department,works_on where project. proj_no=works_on. proj_no and department. dept_no=works_on. dept_no
group by proj_name,dept_name) as emp);
Answer:
#include <iostream>
using namespace std;
class BankAccount {
string name = name;
double balance = balance;
BankAccount( string name, double balance ) {
string name = name;
double balance = balance;
return 0;
}
string getName( ){
return name;
}
double getbalance( ) {
return balance;
void setName( string username){
name = username;
}
void setbalance( double newBalance){
balance = newBalance;
}
int main( ) {
BankAccount user1(John, 0.0);
BankAccount user2(Jane, 0.0);
user1.setbalance( 2300.00)
user2.setbalance( 4300.00)
cout << user1.getname() << user1.getbalance();
cout << user1.getname() << user1.getbalance();
}
Explanation:
The C source code above using a class to create a data structure of a bank account user name and balance. The attribute name and balance are private to the class and can be retrieved and modified through the get and set methods.
Answer:
control processes.
Explanation:
Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the information-processing system are referred to as executive/control processes.
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.