Consider the following relational schema, where the primary keys are Bold,
Students(sid, sname, address, dept_id)
Courses(cid, cname, dept_id)
Departments(dept_id, dname, college)
Grades(sid, cid, year, semester, grade)
Write the following queries in SQL. Only use the tables that are absolutely needed for the corresponding query.
1. Find the sids and snames of students who took "Database" course (i.e., cname = ‘Database’) in Fall 2019.
2. Find the average grade of all the students who took "CS327" (i.e., cid=‘CS327’) in Fall 2019. You can assume grade is a numerical attribute.
3. Find the number of distinct courses offered by each department in Fall 2019.
4. Find the sids of students who have taken at least 10 different courses offered by "Computer Science" department (i.e., dname = ‘Computer Science’).

Answers

Answer 1

Answer:

The queries for each question are explained.

1. Find the sids and snames of students who took "Database" course (i.e., cname = ‘Database’) in Fall 2019.

 The columns sid and sname are taken from students table.

The course name belong to the courses table.

The semester and year belong to the grades table.

To get the final query, all these tables need to be joined in the FROM clause using JOIN ON keywords.

select s.sid, sname

from students s join grades g on g.sid = s.sid

join courses c on g.cid = c.cid

where cname like 'database%'

and semester like 'Fall'

and year=2019

2. Find the average grade of all the students who took "CS327" (i.e., cid=‘CS327’) in Fall 2019. You can assume grade is a numerical attribute.

The grade column is taken from grades table.

The course id belongs to the grades table.

The semester and year also belong to the grades table.

The final query is formed using the grades table only.

 select avg(grade)

from grades

where cid like 'CS327'

and semester like 'Fall'

and year=2019

 3. Find the number of distinct courses offered by each department in Fall 2019.

 The department id belongs to the courses table.

The course id belongs to the grades table.

The semester and year also belong to the grades table.

To get the final query, the courses and the grades tables are joined in the FROM clause using JOIN ON keywords.

select dept_id, count(distinct g.cid)

from courses c join grades g on c.cid = g.cid

where semester like 'Fall'

and year=2019

group by dept_id


Related Questions

The intent of a Do query is to accomplish a goal or engage in an activity on a phone.

Answers

False. The intent of a Do query is to accomplish a goal or engage in an activity on a phone.

The intent of a Do query

A computer query is a request for information or data made to a computer system or a database. It involves specifying specific criteria or conditions to retrieve relevant information from a database or perform a specific action.

Queries are commonly used in database management systems, where they allow users to search, filter, and sort data based on specific criteria. A query typically consists of a structured query language (SQL) statement that defines the desired data and any conditions or constraints to be applied.

Read mroe on  query here query

#SPJ1

The index used by the OS to manage computer files is called _____.


RAM

API

GUI

FAT

Answers

Answer:

GUI

Explanation:

Answer:

FAT

Explanation:

Hope this helps!!!

Which of the following vendors offers the largest variety of editions for its operating system?

Answers

Answer:

Microsoft Windows offers the largest variety of editions for its operating system.

You need to deploy virtual machines in the cloud to support big data processing. The virtual machines must not be reachable from the Internet. Data processing summaries will be uploaded from the virtual machines to an on-premises database server. The on-premises network is already configured to allow incoming connections from the Internet. What should you do to allow the required functionality while maximizing security

Answers

On-site servers have virtualization deployed. A server is essentially running in your own server on your own premises when you virtualize it. Your establishment's server.

What virtual machines to an on-premises database server?

It is possible to host solutions either on-premises (private cloud), on the public cloud (such as AWS, Azure, or Rackspace). Or with a combination of both, which is known as the hybrid cloud, thanks to the flexibility given by various virtualization solutions.

Therefore, You enter, launch virtualization on it, and create as many sessions on that system as you desire or are able.

Learn more about virtual machines here:

https://brainly.com/question/29535108

#SPJ1

RAM requires a power source to store data.

Question 10 options:
True
False

Answers

RAM  is a type of memory which requires a power source to store data is referred to as a true statement.

What is RAM?

This is referred to as Random Access Memory and is a volatile memory which is used in the storage of working data and machine codes.

This type of memory requires a power source for the data to be retrieved or stored at that point in time which is why True was chosen as the most appropriate choice in this context.

Read more about RAM here https://brainly.com/question/13748829

#SPJ1

Answer:

true

Explanation:

took test

Reynold is writing a news story about the government handling a health epidemic. He reads a report from a different news organization to use as a reference. His deadline for the story is coming up soon, so Reynold heavily paraphrases parts from the other organization's report to help him write. While Reynold's story also includes some of the same quotes as the other report, he forgets to attribute the sources at the end. Reynold says that since no one can copyright the facts of world news, he is not plagiarizing.

a) What unethical or illegal actions has Reynold taken in writing his news article? (3 points)

b) What kind of consequences might result from Reynold's actions? (2 points)

Answers

Answer:

1. He was plagiarizing

2. He might get sued, bad reputation, and he might get fired.

Explanation:

If he Paraphrasing from something online and doesn't cite the website he is plagiarizing.

Question #9
Long Text (essay)
Consider what you have learned about Internet regulation and deregulation. Take a position and argue for or
against regulating the use of the Internet. Your answer should be at least 150 words.
B. IU 13 á
I
< PREVIOUS
O Word(s)
NEXT >
SA

Answers

Answer: Check Below

Explanation:

 The internet is a vital tool for communication, commerce, and entertainment, but it is not without its downsides. The internet can be used to spread false information, cyberbully, and promote illegal activity. This is why there has been a growing call for the regulation of the internet to curb these negative effects. While there are some who argue that regulating the internet would infringe on free speech, there are many benefits to regulating internet use.

 One of the main benefits of regulating the internet is that it can help prevent cyberbullying and other forms of online harassment. By requiring social media companies to monitor and remove harmful content, the internet can be a safer space for everyone. Regulating the internet can also help prevent the spread of fake news and misinformation, which has become a significant problem in recent years. By holding websites accountable for the content they host, we can prevent the spread of propaganda and conspiracy theories that harm public health and democratic institutions.

 Another benefit of regulating the internet is that it can help protect children from online predators and inappropriate content. By requiring age verification and limiting access to certain sites, we can ensure that children are not exposed to harmful content. Regulating the internet can also help prevent illegal activities like piracy and online scams. By holding websites and individuals accountable for these crimes, we can protect consumers and prevent economic harm.

 In conclusion, while there are concerns about infringing on free speech, there are many benefits to regulating the internet. By preventing cyberbullying, limiting the spread of fake news, protecting children, and preventing illegal activities, we can create a safer and more secure internet for everyone to use. The regulation of the internet is not a perfect solution, but it is an important step towards ensuring that the internet remains a valuable resource for communication and commerce while protecting individuals and society as a whole.

Name a wireless technology tat may work with one device and not another?

Answers

Answer:

WPAN/Bluetooth, Coexistence, High Rate WPAN, Low Rate WPAN,  mesh Networking, Body Area Networks, and Visible Light Communication.

A web administrator notices a few security vulnerabilities that need to be addressed on the company Intranet site. The portal must force a secure browsing connection, mitigate script injection, and prevent caching on shared client devices. Determine the secure options to set on the web server's response headers.

Answers

Answer: Set a Cache-Control header to 0 to prevent caching on client browsers. Set a Strict-Transport-Security header to 31536000 (1 year) to force the client to remember to only connect to the server with HTTP(S) secure. Lastly, set a Content Security Policy(CSP) HTTP header to tell the client what sources it can load scripts or images from and how to handle the execution of JS that is on the page which can allow to mitigate script injection.

Explanation:

Cache-Control is a server response header that controls how long a browser should have cache for before it becomes stale. Setting it 0 tells the browser that it should never cache.

Strict-Transport-Security is a server response header that tells the client that after the first initial visit; that the browser should remember to only connect to it via HTTPS for the time that was set by header.

Content Security Policy (CSP) is a policy and also a header that can be in the response of a server that explains to the browser the limitations of content that can be loaded. Examples include: images, videos, JS sources, etc. The policy can also tell the browser that only an ad analytics software should be the only script that can run thus mitigating any other scripts that may be injected onto the site.  

which one is exit controllefd loop ?
1.while loop
2. for loop
3. do loop
4. none

Answers

Answer:

2 is the ans

Explanation:

bye bye, gonna go to studyy

Choose the correct option.
Which of the following infection types can send information on how you use your computer
to a third party without you realizing it?

Answers

Spyware accumulates your personal information and passes it on to curious third parties without your knowledge or consent.

Spyware is also learned for installing Trojan viruses.

What is spyware?

Spyware is a type of malicious software or malware that is established on a computing device without the end user's knowledge. It plagues the device, steals exposed information and internet usage data, and relays it to advertisers, data firms, or external users.

How do hackers utilize spyware?

Spyware monitors and logs  computer use and activity. It celebrates the user's behavior and finds vulnerabilities that allows the hacker to see data and other personal details that you'd normally consider confidential or sensitive.

To learn more about Spyware, refer

https://brainly.com/question/7126046

#SPJ9

Which of the following is a positional argument?
a) ABOVE
b) MIN
c) AVERAGE
d) MAX

Answers

D) MAX is a positional argument

why computer known as tool of information​

Answers

Answer:

because it has the ability to capture the whole information you need or downloaded

What is one lighting technique that is used to simulate a strong sun?

Answers

Answer:

Heat lamp.

Explanation:

Like the sun, a heat lamp gives off light and heat, mimicking the actions of a sun. To simulate a strong sun, turn the heat lamp up higher to create brighter light and warmer heat.

Hope this helps!


Online education students need to be taught

the reasons why they should be ethical
how to be friends with their instructors
how to waive their right to privacy
how to communicate professionally
how to commit academic fraud

Answers

Online education is a teaching practice delivered through the internet. The students learning from online platforms must be taught to be ethical.

What is the importance of ethics and integrity?

In the online education system, the students should learn to be ethical and integral as it enables the students and their teachers to be creative, free to create ideas, and acknowledge others' work.

Ethics teaches the students to develop their personalities and behavior. Students' integrity allows them to be honest, responsible, and fair towards their work and instructor.

Therefore, option A. online learning students must be taught to be ethical.

Learn more about online learning here:

https://brainly.com/question/14708323

#SPJ1

Answer:

-the reasons why they should be ethical

-how to communicate professionally

Explanation:

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?

Answers

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .

A sandbox is known as a holding area for website or .

Answers

Answer:

blog

Explanation:



..........answer is above or below me lol

some context free languages are undecidable

Answers

yess they are and have been for awhile although they’re already

how convert ac to dc in computer​

Answers

The same way anything converts AC to DC. It rectifies it and smooths the ripple using diodes and capacitor(s).

G00gle DC rectifier.

you need to determine the hash file of several files that you will be sending to a u.s. government agency. you need to use a hash function that is approved. which algorithm should you use?

Answers

If one needs to determine the hash file of several files that are to be sent to a U.S. government agency. The authorized hash functions that can be used are:

SHA-1 (Secure Hash Algorithm-1), and the. SHA-2 family of hash algorithms: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.

What does a Hash Function do?

When you hash a message, you take any length string of data as input and run it through a mathematical method that produces an output of a set length.

Some hashing algorithms divide the original data input into smaller chunks of equal size. If there isn't enough data in any of the blocks to fill it up, padding (1s and 0s) can be used to fill it out. The separate blocks of data are then passed through a hashing algorithm, which produces a hash value as an output.

Learn more about Hash Functions:
https://brainly.com/question/13106914
#SPJ1

Write short notes on the different elements of a multimedia.

Answers

Answer:

There are five basic elements of multimedia: text, images, audio, video and animation. Example - Text in fax, Photographic images, Geographic information system maps, Voice commands, Audio messages, Music, Graphics, Moving graphics animation, Full-motion stored and live video, Holographic image

(⁠◔⁠‿⁠◔⁠)(⁠◔⁠‿⁠◔⁠)(⁠◔⁠‿⁠◔⁠)

Audio: alludes to a sound or spoken content, including music, exchange, and audio effects.

Video: alludes to a moving visual substance, including true to life film, movement, and embellishments.

Text: alludes to composed or composed content, including inscriptions, captions, and composed portrayals.

Images: alludes to static visual substance, including photos, representations, and illustrations.

Interactive elements: alludes to components that permit the client to cooperate with the media, like buttons, connections, and route menus.

Animation: alludes to the utilization of moving pictures and designs to make the deception of movement.

Hypertext: alludes to the utilization of connections inside the media that permit the client to explore to other sight and sound or website pages.

Streaming Technology: alludes to innovation that permits mixed media to be played progressively over the web without the need to download the whole document.

These components can be utilized in different blends to make a media piece that is connecting with, educational and intelligent.

Could anyone help :)

Could anyone help :)

Answers

Answer:

2

Explanation:

This code segment iterates through the array checks to see if each element equals y if so, increments the counter variable count

Essentially, this code is taking in two parameters an array x and an integer y and counting the number of times y appears in the array x

look(numList, 1) counts the number of times the integer 1 appears in numList

1 appears two times and therefore 2 is the value returned by the function and therefore the answer

Cryptography is an example of which part of the CIA triad?

Availability
Confidentiality
Integrity
Truthfulness

Answers

Cryptography is an example of ensuring Confidentiality in the CIA triad. (Option B)

How  is this so?

Cryptography is an essentialcomponent of ensuring Confidentiality within the CIA triad.

It involves the use of  encryption techniques to protect sensitive information from unauthorized access.

By converting data into an unreadable format, cryptography ensures that only authorized individuals   with the necessary decryption keys can access and understand the information,preserving its confidentiality and preventing unauthorized disclosure.

Learn more about Cryptography at:

https://brainly.com/question/88001

#SPJ1

3. A year contains 365 days normally, so on
what number day does Christmas fall on?

Answers

Answer:

359 is December 25 in a 365 day year.

Explanation:

Answer:

For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.

What software programming language was first
used to power the Internet (.com, .net)?

Answers

Answer:

the answer should be .com, because the very first domain was Symbolics.com

Explanation:

hope this helps, have a great day.

Can someone please help me figure this out and let me know what I'm missing. It is on CodeHs and it's 1.3.8 Freely Falling Bodies

Can someone please help me figure this out and let me know what I'm missing. It is on CodeHs and it's

Answers

The code is in Java.

It calculates the height and velocity of a dropped pebble using the given formulas.

Comments are used to explain the each line.

//FallingBodies.java

public class FallingBodies

{

public static void main(String[] args) {

    //Declare the g as a constant

    final double g = 9.8;

   

    //Declare the other variables

    double t, height, velocity;

   

    //Set the time

    t = 23;

   

    //Calculate the height using the given formula

    height = 0.5 * g * t * t;

   

    //Calculate the velocity using the given formula

    velocity = g * t;

   

    //Print the height and velocity

    System.out.println("The height is " + height + " m");

 System.out.println("The velocity is " + velocity + " m/s");

}

}

You may read more about Java in the following link:

brainly.com/question/13153130

The small flash memory used in
protable device like Laptop

Answers

Answer: flash drive

Explanation:

Flash drives are refered to as small, portable storage devices which makes use of a USB interface in order to be connected to a laptop.

Flash cards are removable and rewritable. They are mainly used to store data. Flash cards can be found in computers, laptops, digital cameras etc.

You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative

Answers

Answer:

The answer is:

A) Absolute cell reference

Explanation:

An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.

Hope this helped you!! Have a good day/night!!

Answer:

A is the right option absolute

Assignment
Write a assembly program that can display the following shapes:

Rectangle
Triangle
Diamond
The program will read an input from the user. The input is terminated with a period. So the program will continue to run until a period is read.

The data the program reads is as follows:

A shape command followed by parameters.

R stands for Rectangle. The parameters are height (rows) and width (columns)

T stands for Triangle. The parameters is base width

D stands for Diamond. The parameters

Your program needs to read the input and based on the input do the following:

Print your name
Then print the name of the shape
Then the shape below it.
Sample input:
R 03 10
T 05
D 11
.
Output:
Loay Alnaji
Rectangle
**********
**********
**********
Triangle
*
***
*****
Diamond
*
***
*****
*******
*********
***********
*********
*******
*****
***
*

Requirements
Your main should only be the driver. It should only read the "shape type", based on that, call the proper function to read the parameters and draw the shape.
Example of your main (just example, pseudocode):

loop:
read shape
if shape is '.' then exit
if shape is 'R'
call Rectangle Function
if shape is 'D'
call Diamond Function
if shape is 'T'
Call Triangle Function
go to loop

Answers

The program above is one that begins with the _begin name, which is the passage point of the program.

What is the program  about?

The program uses framework call int 0x80 to print your title on the screen utilizing the compose framework call. It loads the suitable values into the registers (eax, ebx, ecx, edx) to indicate the framework call number, record descriptor, buffer address (where the title is put away), and length of the title.

It checks in case the shape input may be a period (.), which demonstrates the conclusion of input. In case so, it bounced to the exit name to exit the program.

Learn more about program  from

https://brainly.com/question/23275071

#SPJ1

AssignmentWrite a assembly program that can display the following shapes:RectangleTriangleDiamondThe
AssignmentWrite a assembly program that can display the following shapes:RectangleTriangleDiamondThe
AssignmentWrite a assembly program that can display the following shapes:RectangleTriangleDiamondThe
Other Questions
Use the concept of the definite integral to find the total area between the graph off(x) and thex-axis, by taking the limit of the associated right Riemann sum. Write the exact answer. Do not round. (Hint: Extra care isneeded on those intervals wheref(x) < 0. Remember that the definite integral represents a signed area.)f(x) = 3x + 3 on [0, 2] The immediate transfer of a bacteria or virus by direct contact between an infected and a susceptible individual is What is the tone of a literary text?O the surface-level events or ideas of the textO the attitude of the text toward the theme or subjectO the reader's feelings about the textthe emotions the text creates in the reader How were the dunes form in Rub al Khali, Arab for the Empty Quarter, of the Arabian Peninsula? Which type of chemical reaction results in the absorption of energy? (1 point)O combustionO exothermicreplacementO endothermic What is 52 percent of 210? Select the correct answer.Quadrilateral ABCD is reflected across the x-axis and then reflect across the y-axis to form quadrilateral A'B'C'D'. If the coordinates of vertex Aare (-7,3), what are the coordinates of vertex A?OA (7,3)OB. (-7, -3)Oc. (7.-3)OD. (-7,3)OE. (3.7) Questions 16: The sentences below contain adjectives and pronouns that are spelled alike. This exercise will help you determine if you know the difference between adjectives and pronouns.*Identify the adjectives and the nouns they modify.*Identify the demonstrative, indefinite, and interrogative pronouns.1. Many people, especially those who grew up before the age of the personal computer, dont understand how computers store information.2. That information is stored in electronic files. Those files function much like file folders.3. Each file is given a name. The name given to each, its filename, should represent the information found in the file.4. What is the difference between the way a computer stores information and that used to store information in a conventional filing cabinet?5. That explanation isnt as clear as the one all of us heard at the lecture yesterday.6. Which flowers are the most beautiful? These lilies are very nice, but theyre less interesting than those.Questions 712: List the adjectives you find in the following sentences. After each adjective, write the noun it modifies. Be sure to include articles as adjectives.7. A strange light shone in the western sky.8. Our friend took a small boat down the turbulent river.9. By late August, the brief northern summer had ended.10. Stinging snow and strong winds lashed the brave rescuers.11. Quick and efficient workers cleared the long runway.12. Violent storms have affected the radio signals. (Please answer Quickly)Part (a) is divided into two parts (i) (ii):(i) Suppose you are the newly appointed Chief Risk Officer (CRO) of Sovereign Bank. The bank has 300 million of assets which have an average duration of four years and 270 million of liabilities which have an average duration of seven years. The current interest rate is 10 percent annually. Conduct a duration analysis for the Sovereign Bank and show what will happen to the equity of the Sovereign Bank if interest rates suddenly falls by 5 percentage points. Show all calculations.(ii) Based on your answer for (i), does Sovereign Bank face failure? As CRO, list two actions you could take to reduce the Sovereign Banks interest-rate risk exposure. The process of __________ is important both at the beginning of a new group and at intervals as the group evolves as they are met. Select the correct answer.Using refusal skills involves taking all of the following steps EXCEPT:A. State your position simply but firmly.B. Back up your words with your actions.C. If nessessary, be hostile to show you mean what you say.D. Suggest alternatives to the behavior being proposed. Jasmine wants to use her savings of $1,128 to buy video games and movies. The total price of the movies she bought was $72. The video games cost $43 each. Choose the inequality that would be used to solve for the maximum number of video games Jasmine can buy with her savings. 43 + 72x 1,128 43 + 72x 1,128 43x + 72 1,128 43x + 72 1,128 Write a function that represents the relationship between X and y shown in the graph below if the school is havinng a pizza party they have 6,847 each kid will have 3 slices of the pizza how many slices of pizza the school need to order so each kid can have 3 slices help pls i got class at 8:30 Capture-recapture studies are common in ecology. One form of the study is conducted as follows. Suppose we have a population of N deer in a study area. Initially n deer from this population are captured, marked so that they can be identified as having been captured, and returned to the population. After the deer are allowed to mix together, m deer are captured from the population and the number k of these deer having marks from the first capture is observed. Required:Assuming that the first and second captures can be considered random selections from the population and that no deer have either entered or left the study area during the sampling period, what is the probability of observing k marked deer in the second sample of m deer? ...................... Kamal, who is 38 years old, is single, itemizes his deductions, and has AGI of $100,000. Kamal provided the following information about his cash expenditures for 2019: Mortgage interest payments on $250,000 principal amount. Real estate taxes 11,800 6,100 State income taxes 5,400 Charitable Contribution to United Way 5,200 Interest on American Express card 1,200 Points to refinance his home for 10 years at the end of December 2,600 If Kamal itemize his deduction, what are his total itemized deductions in 2019: A.S18,100 B.$21,000 C.$24,200 D.$27,000 E. None of these answers. our sun and any star far away in another galaxy are too distant to feel a gravitational force between them a. there is no main effect on temperature (cold vs hot) b. there is no main effect of food type (ice cream vs pancakes) c. whether one likes ice cream or pancakes more depends on the temperature in which the food is served. d. whether one likes ice cream or pancakes more does not depend on the temperature in which the food is served. The federal government is responsible for enforcing laws and carrying out policies. Compare the role each branch of government plays in this process and explain which branch plays the most important role in enforcing laws and carrying out policies.PLS HELP ASAP !!