1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
12

1. Write a query in SQL to list the following information of the artists in movie industry. Limit this information to only 5 art

ists. Sort the information by age descending order. Full name : first name and last name separated by space Age: Current age Address: State that he resides Contact number: Phone number
Computers and Technology
1 answer:
Rudik [331]3 years ago
6 0

Answer:

1) SQL Server

SELECT  Top 5 concate(first name,' ',last name) AS Full name, Current age AS Age, state AS Address, Phone number AS Contact number from actor ORDERBY Current age DSC ;

2) MySQL

SELECT  concate(first name,' ',last name) AS Full name, Current age AS Age, state AS Address, Phone number AS Contact number from actor ORDERBY Current age DSC limit 5;

Explanation:

There two queries first having syntax works fine in SQL server and later with MySQL. All bold faced words are sql keywords. I assumed the tablename is actor as table name is not given if table name is any other replace actor with that name.

You might be interested in
When working with arrays, most programming languages perform ________, which means they do not allow programs to use invalid sub
Allisa [31]

Answer:

The answer is "Option 2"

Explanation:

In the given question the answer is "array bounds checking", It Checks the limits by providing a way, that Specifies whether a value is inside those limits has been used. It is a variable, that falls into a given class or function called as an array index of array, that's why all option are wrong, that is explained as follows:

  • In option 1, It uses provides security, that's why it is wrong.
  • In option 3, It works on the bits, that's why it is not correct.
  • In option 4, It uses two thing that is "array bound checks and sub-script of bond", that's why it is wrong.

8 0
3 years ago
Which of the following items is not found on a web page?
navik [9.2K]
The answer is B. book mark definitely
7 0
3 years ago
TO Cloud
scoray [572]

The type of situation would it make sense to use edge computing is   where critical decisions must be made on a split-second basis.

<h3>What is edge computing?</h3>

Edge computing is known to be a kind of computing which often occur on site or near a specific data source, it reduces the need for data to be processed in a distance data center.

Note that The type of scenario  that would it make sense to use edge computing is  when critical decisions must be made on a split-second basis as it requires urgency.

Learn more about edge computing from

brainly.com/question/23858023

7 0
2 years ago
"So far this month you have achieved $100.00 in sales, which is 50% of your total monthly goal. With only 5 more workdays this m
Rus_ich [418]

Answer:

$20 per day for next 5 working days.

Explanation:

if 50% is $100.00 another $100 need to achieve in 5 days.

100/5=20

3 0
3 years ago
Read 2 more answers
How does an object look during its Stopped animation?
Gre4nikov [31]

Answer:

i think its either B or C

sorry if its wrong :(

7 0
3 years ago
Other questions:
  • Which were important characteristics of Sparta's government? Select the two correct answers. A. Oligarchs were able to hold a lo
    12·2 answers
  • ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
    9·1 answer
  • What is the best way to set up the spreadsheet? List each expense in a row. List each income source in a column. List each expen
    15·2 answers
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • What would your leadership style be?
    14·1 answer
  • Horizontal and vertical flips are often used to create ___.
    12·1 answer
  • How do i delete peoples comments
    14·2 answers
  • What problems might scientists encounter in using this ethod in the field that you would not have encountered in the simunlation
    13·1 answer
  • Explain how power surges can affect computers and how this problem can be minimised or removed<br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!