1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
3 years ago
7

Natalie wants to create a database to collect information about sales transactions. She would like to use the database to look u

p customer names and sales prices if they return a product She would like to sort the items in the database by product number. What fields should she have in her database?
Computers and Technology
1 answer:
Lynna [10]3 years ago
7 0

Answer:

Customer Table

  1. Customer name
  2. Customer id

Product Table

  1. Product id/number (primary key, auto increment)
  2. Product name
  3. Product sale price

Transactions Table

  1. Transaction Id
  2. Customer Id
  3. Product id
  4. Quantity
  5. Price
  6. Date

Explanation:

Natalie wants to fetch following information from database

  1. Look up customer name and sale price
  2. Sort items in db by product number

To lookup customer name and sale price perform a join on Transactions table and Customer table.Assuming database is build in mysql the query to fetch required results would be

select transction.productId,transaction.customerid,customer.customername from transactions join customer ON

customer.customerid=transcation.customerid

where productid="user provided product id of returned product"

For sorting products by number set produc number in product table a auto increment primary key

You might be interested in
The various online technology tools that enable people to communicate easily via the Internet to share information and resources
seropon [69]

Answer:

Social media is the correct answer for the above question.

Explanation:

  • Social media is the media that is used to communicate with the other person with the help of an internet connection. There is so much software that gives this type of facility. for example whats up and twitter.
  • The above question asked about that technology which is used to connect the people to communicate and the technology is social media which gives the features to connect and communicate all over the world with the help of the internet. Hence "Social media" is the correct answer.
8 0
2 years ago
Page No
ratelena [41]

Answer:

ila bgfffsg hqhffa hhfw ygga gha yqvvty1uh' fttyavt h5tfauv gtta76rq

5 0
3 years ago
This semester we looked at three languages (C++, Java and Python). One common rule in all three class checklists (for C++, Java
Marysya12 [62]

Answer:

The languages C++, Java, Python are Object Oriented Programming languages. What this means is that we create classes and then instantiate those classes. In C++ and Java, we use the new operator to instantiate the classes. So, if we want to display some data when we try to print the instance just like we print the variables of data types like int, double, string etc, we need to define what we need to display. It is because, class are just like data types like int, double etc. But as they are defined by the developer according to his/her needs, so the developer has to define what to print when they are printed.

5 0
3 years ago
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
10 months ago
Which payment method typically charge is the highest interest rates?
jek_recluse [69]

The highest amount is Credit. The more you wait the higher the interest, higher the interest the more you pay, and no one wants to play more. Stay safe use debit as much as you can

8 0
3 years ago
Other questions:
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • What was the ENIAC computer and how was it used/what for?
    9·1 answer
  • Writе thе dеclaration of a doublе pointеr namеd avеragе
    10·1 answer
  • A lamp outside a front door comes on automatically when it is dark, and when someone stands on the doormat outside the front doo
    7·1 answer
  • In this lab, you will create a programmer-defined class and then use it in a Java program. The program should create two Rectang
    14·1 answer
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • The function of anOR gate can best be described as a gate which provides an output of 1 only when
    10·1 answer
  • How do Brainly experts and verified users format their answers to look like this:
    12·2 answers
  • burger hut is trying to decide if it can receive money from the government for providing employees with insurance .
    6·1 answer
  • Classify computer based on signal
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!