1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
14

Fill in the blanks in the SQL statement below that will list the invoice number, invoice total and credit which is the total sum

of the payment_total and credit_total. Format the payment credit to 2 decimal places. SELECT invoice_number, invoice_total________ AS credit FROM invoices.
Computers and Technology
1 answer:
ki77a [65]3 years ago
5 0

Answer:

Following are the query and its explanation:

Explanation:

SELECT invoice_number , invoice_total , FORMAT ((payment_total +credit_total),2) AS Credit FROM invoices;

In the above given select command it selects two columns that are "invoice_number , invoice_total" in which it uses the format method that adds "payment_total  and credit_total" parameter value and divides the value, and holds its decimal point value use by the invoices table.

You might be interested in
You used a website to learn about the child-rearing practices in China. Your study is related most to which aspect
ozzi

Answer:

c. culture

Explanation:

I think your study is related to their culture

5 0
2 years ago
Read 2 more answers
Which type of network cover a large geographical area and usually consists of several smaller networks, which might use differen
nlexa [21]

Answer: WIDE AREA NETWORK (WAN)

Explanation: hopes this helps

7 0
3 years ago
Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation onc
Dmitriy789 [7]

Answer:

10 minutes

Explanation:

3 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
2 years ago
Complete the sentence.<br> A text messaging application is an example of a _____ application.
Ne4ueva [31]

Answer:

chat application

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • Sizing handles are used in Microsoft® Word® to _____.
    13·1 answer
  • How do you add text to a blank slide layout?
    5·2 answers
  • If you can log nto a website to add, edit, or delete content that has been added by you or another user , you are most likley us
    8·1 answer
  • When subjects are given two drinks but not told what they are drinking in order to get accurate results on which is the better t
    6·1 answer
  • Look at the following structure declaration.
    6·1 answer
  • This has nothing to do with anything school related, but I'm new to car audio and I was wondering, what happens or what would ha
    13·1 answer
  • your friend's parent's are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
    11·1 answer
  • A*=++a/6+b++ 3 if a=3,b=4​
    13·1 answer
  • What is ransomware<br>я​
    5·1 answer
  • Choose the correct item. Check your answers in the text.<br>3​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!