1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
5

Write ONE SQL statement for each of the following tasks. Note that you can only use conditions specified in the task description

and cannot manually look up data and add conditions. E.g., in task 1, you cannot manually look up category ID for carpet cleaner. You want to make sure your code will work regardless of what data are in the database (e.g., whether carpet cleaner has a category ID of 1 or 100).
Task 1: Return names and emails of authors of the paper titled 'A novel approach of mining EHR data'
Task 2: Return reviewer ID, review decision, and review comments of the paper titled 'Comparing big data systems'
Task 3: Return paper title and number of authors for each paper.
Task 4: Return names of authors who have at least two papers.
Task 5: List names of authors who have co-authored with Dr. Chen.
Computers and Technology
1 answer:
Furkat [3]3 years ago
4 0

Answer:

1) SELECT author.name, author.email

FROM author, paper_author, paper

WHERE author.id = paper_author.id

AND paper_author.id = paper.id

AND UPPER(paper.title) = ('A novel approach of mining EHR data');

2) SELECTpaper_review.id, paper_review. decision, paper_review.comment

FROM paper_review, Paper

WHERE paper_review.id = paper.id

AND paper.title = 'comparing big-data systems';

3) SELECT Paper.title, COUNT(Paper_author.id)

FROM Paper, Paper_author

WHERE Paper.id = Paper_author.id

GROUP BY Paper.title;

4) SELECT Author.name

FROM Author

WHERE Author.id IN (SELECT Paper_author.id

FROM Paper_author

GROUP BY Paper_author.id

HAVING COUNT(Paper_author.id) >= 2);

5) SELECT DISTINCT a.name

FROM Author AS a

INNER JOIN paper_author AS pa

ON a.id=pa.id

WHERE EXISTS (

SELECT 1

FROM Author aa

INNER JOIN  paper_author paa

ON aa.id=paa.id  

WHERE name='Dr. Chen'

AND paa.id = pa.id

AND aa.id != a.id

);

Explanation:

The SQL statements return the queries from six different tables in the database

You might be interested in
What are the benefits of using an ordered list vs. an unordered list? What are the costs?
Rashid [163]

Answer:

The main benefit of the ordered list is that you can apply Binary Search( O( n log n) ) to search the elements. Instead of an unordered list, you need to go through the entire list to do the search( O(n) ).

The main cost of the ordered list is that every time you insert into a sorted list, you need to do comparisons to find where to place the element( O( n log n) ). But, every time you insert into an unsorted, you don't need to find where to place the element in the list ( O(1) ). Another cost for an ordered list is where you need to delete an element, you have an extra cost rearranging the list to maintain the order.

6 0
3 years ago
An object completes one round of circle of radius 7m in 20 sec. Distance travelled after 10 sec is? ​
Ivanshal [37]

Answer:

distance \: travelled \:  = 2\pi \\  \\ 44cm \:  \:  \:  \:  \\ speed \:  =  \frac{44}{2.2}  \ \\ distance \: travelled \: in \: los = 10 \times 2.2 = 22cm \\  \\ total \: distance = 44 + 22 = 66metres

5 0
3 years ago
A ____ is a circuit board that contains most of a server.
8_murik_8 [283]
Motherboard






-------------------------------
6 0
3 years ago
GoInternet, Inc., is an Internet-access service provider that is being forced to manage numerous unwanted e-mail messages from a
marissa [1.9K]

Answer:

The correct answer to the following question is option b.)sends messages involving products of companies previously sued under the CAN-SPAM Act.

Explanation:

This act is an act of Controlling the Assault of Non-Solicited Marketing And Other things.

It is the law that establish the rules for the commercial message and the commercial e-mails, gives recipients right to have the business stops emailing them, and they outline the penalties incurred for those person who has violated the law.

8 0
3 years ago
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • Search engines enable you to
    9·2 answers
  • You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm
    15·1 answer
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • Create a function (prob3_6) that will do the following: Input a positive scalar integer x. If x is odd, multiply it by 3 and add
    15·1 answer
  • A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p
    13·1 answer
  • Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
    12·1 answer
  • In an MLA style citation for an image, what information should be listed first? A. The name of the creator B. The title of the i
    8·2 answers
  • 6. Python indexes lists beginning with the number 1.<br> True<br><br> False
    15·1 answer
  • Who invented the Bluetooth device​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!