1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
3 years ago
15

Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table

s? Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum) Employee (EmployeeNum, LastName, FirstName, Street, City, State, PostalCode)
Computers and Technology
1 answer:
oee [108]3 years ago
4 0

Answer:

The result of combining the both tables is:

Employee(EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

Since the EmployeeNum is the primary and it is available in both tables, what happens is that, it will not list the primary key column twice. It will list the primary key first then all the other attribute in the first table followed by the attribute in the second table. And it will take note so as not to repeat attribute that already occur in the first table.

For instance; in this case, besides EmployeeNum, LastName and FirstName also appear in the both tables but only one instance of them were listed in the resulting table.

You might be interested in
If I wanted to add code so that the costume of my sprite would change, what menu would I look under to find the "change costume"
Damm [24]

Answer:

D.) Looks

the costume is technically the look of your sprite, so looks is the correct answer

7 0
3 years ago
Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor
Juliette [100K]

The troubleshooting step that you should take next is to Question User.

<h3>What is Troubleshooting?</h3>

This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.

Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.

Read more about troubleshooting here:

brainly.com/question/13818690

#SPJ1

3 0
2 years ago
Steps to customize theme of desktop
Gnom [1K]

Answer:

Choose Start > Control Panel > Appearance and Personalization > Personalization. Right-click an empty area of the desktop and choose Personalize. Select a theme in the list as a starting point for creating a new one. Choose the desired settings for Desktop Background, Window Color, Sounds, and Screen Saver

Explanation:

4 0
3 years ago
Read 2 more answers
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
In which part of a professional email should you try to be brief, but highly descriptive
aev [14]
The correct answer is the Subject line

The subject line is usually just a very short sentence that presents the problem briefly and straight to the point.
4 0
4 years ago
Other questions:
  • Which futures would work well for text entered into cells check all that apply
    7·1 answer
  • If you commit license fraud by using an altered or unlawful license:
    11·2 answers
  • What is the symbol for the relational operator 'equal to'?
    8·1 answer
  • Big data: options:
    8·1 answer
  • I need help, please and thank you.
    7·2 answers
  • In Windows, which menu allows you to view file characteristics?
    14·1 answer
  • Radio waves can be used to transmit energy. What is an advantage of this method in computer technology
    7·2 answers
  • Internet is an interconnected networks <br> o true <br> o false
    5·1 answer
  • How do open online courses help with independent learning
    6·2 answers
  • Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!