SlideShare a Scribd company logo
1 of 3
Nicole Gaehle
Leah Kinnamon
IS 3845 Dr Joshi
Tuesday2-4:40pm
Journal B – Database
1. We have two tables PCandEmployee. KeepPCasthe leftone andEmployee asthe rightone.Show hand
calculated/tabulatedresultsforthese operations astables ina worddocument,withoutusingOracle oranyotherquery
engine.
a. Showa product of the two
PC# MODEL MAKE PC.EMP# E.EMP# ENAME DEPT TEL#
29 X500 HP 111 111 TIM MKT 9121
29 X500 HP 111 115 KIM FIN 9321
29 X500 HP 111 118 JANE FIN 9432
38 GP550 HP 118 111 TIM MKT 9121
38 GP550 HP 118 115 KIM FIN 9321
38 GP550 HP 118 118 JANE FIN 9432
32 MINI202 SONY 111 111 TIM MKT 9121
32 MINI202 SONY 111 115 KIM FIN 9321
32 MINI202 SONY 111 118 JANE FIN 9432
24 DX3900 DELL 111 TIM MKT 9121
24 DX3900 DELL 115 KIM FIN 9321
24 DX3900 DELL 118 JANE FIN 9432
b. Showa joinof the two.
PC # MODEL MAKE EMP # ENAME DEPT TEL #
29 X500 HP 111 TIM MKT 9121
38 GP550 HP 118 JANE FIN 9432
32 MINI202 SONY 111 TIM MKT 9121
c. Showa leftouterjoinof the two.What doesit represent?
PC # MODEL MAKE EMP # ENAME DEPT TEL #
29 X500 HP 111 TIM MKT 9121
38 GP550 HP 118 JANE FIN 9432
32 MINI202 SONY 111 TIM MKT 9121
24 DX38900 DELL
Thisshowseverythingonthe PC table andanythingthatrelatesfromthe EMPLOYEE table to the PC table.
d. Showa rightouter joinof the two.What doesit represent?
PC # MODEL MAKE EMP # ENAME DEPT TEL #
29 X500 HP 111 TIM MKT 9121
32 MINI202 SONY 111 TIM MKT 9121
115 KIM FIN 9321
38 GP550 HP 118 JANE FIN 9432
Thisshowseverythingonthe EMPLOYEE table andanythingthat relatesfromthe PCtable to the EMPLOYEE
table.
e.Draw set diagramcirclesshowing EMP#from eachsetthat are commonand the onesthat are notcommon but
exclusivetoone setor the other.
Prepare the answerstothese forclassdiscussion –Don’t needtoturn themin.
1. List all the rulesapplicable tothe use of Group BY statementinSQLqueries. Difference betweenWhere andHaving.
2. Which differentconnectorscanbe used(listall) tolinkthe resultsof asubquerytoa mainquery(withitscolumn)?
Can youuse a columnof outerqueryinside asubqueryandvice versa,i.e., canyouuse a columnof the subqueryinthe
outerquery?
3. How wouldyouadd twocolumnsgivingatotal column?Andhow wouldyouadd the contentsof a columngivingthe
total.
PC
PC# Model Make Emp#
29 X500 HP 111
38 GP550 HP 118
32 Mini202 Sony 111
24 DX3900 Dell
Employee
Emp# Ename Dept Tel#
111 Tim MKT 9121
115 Kim FIN 9321
118 Jane FIN 9432

More Related Content

Similar to Database: PC and Employee

Edwards Signaling EGCFS2VM Installation Manual
Edwards Signaling EGCFS2VM Installation ManualEdwards Signaling EGCFS2VM Installation Manual
Edwards Signaling EGCFS2VM Installation ManualJMAC Supply
 
Gsm Wireless Intercom
Gsm Wireless IntercomGsm Wireless Intercom
Gsm Wireless Intercomnimthomas
 
Ecet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.comEcet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.comSoaps97
 
reparacion de tv sony completa y sujerencias
reparacion de tv sony completa y sujerenciasreparacion de tv sony completa y sujerencias
reparacion de tv sony completa y sujerenciasRiderlandisGainzaBer
 
Dyna109 94 8750
Dyna109 94 8750Dyna109 94 8750
Dyna109 94 8750wilmer67
 
Manual HUB SERIAL EQUINOX
Manual HUB SERIAL EQUINOXManual HUB SERIAL EQUINOX
Manual HUB SERIAL EQUINOXPablo Vera
 
Multi Conveyor Upgrade Manual
Multi  Conveyor Upgrade ManualMulti  Conveyor Upgrade Manual
Multi Conveyor Upgrade ManualNeil Kane
 
Ecet 105 Education Specialist -snaptutorial.com
Ecet 105   Education Specialist -snaptutorial.comEcet 105   Education Specialist -snaptutorial.com
Ecet 105 Education Specialist -snaptutorial.comDavisMurphyC39
 
Tele Remote Switch
Tele Remote SwitchTele Remote Switch
Tele Remote SwitchSid_007007
 
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAVHOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAVGIRISH HARMUKH
 
Presentation2 1-150523155048-lva1-app6892
Presentation2 1-150523155048-lva1-app6892Presentation2 1-150523155048-lva1-app6892
Presentation2 1-150523155048-lva1-app6892Nirav rathod
 
DTMF base Mobile controlled appliances control
DTMF base Mobile controlled  appliances controlDTMF base Mobile controlled  appliances control
DTMF base Mobile controlled appliances controlGopal Bardhan
 

Similar to Database: PC and Employee (20)

Edwards Signaling EGCFS2VM Installation Manual
Edwards Signaling EGCFS2VM Installation ManualEdwards Signaling EGCFS2VM Installation Manual
Edwards Signaling EGCFS2VM Installation Manual
 
Sua chua may lanh cua daikin
Sua chua may lanh cua daikinSua chua may lanh cua daikin
Sua chua may lanh cua daikin
 
Gsm Wireless Intercom
Gsm Wireless IntercomGsm Wireless Intercom
Gsm Wireless Intercom
 
Ecet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.comEcet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.com
 
E04834649
E04834649E04834649
E04834649
 
reparacion de tv sony completa y sujerencias
reparacion de tv sony completa y sujerenciasreparacion de tv sony completa y sujerencias
reparacion de tv sony completa y sujerencias
 
Fanucmasterboardalarms
FanucmasterboardalarmsFanucmasterboardalarms
Fanucmasterboardalarms
 
LCD WITH 8051.docx
LCD WITH 8051.docxLCD WITH 8051.docx
LCD WITH 8051.docx
 
Embedded System
Embedded SystemEmbedded System
Embedded System
 
Dyna109 94 8750
Dyna109 94 8750Dyna109 94 8750
Dyna109 94 8750
 
Manual HUB SERIAL EQUINOX
Manual HUB SERIAL EQUINOXManual HUB SERIAL EQUINOX
Manual HUB SERIAL EQUINOX
 
Multi Conveyor Upgrade Manual
Multi  Conveyor Upgrade ManualMulti  Conveyor Upgrade Manual
Multi Conveyor Upgrade Manual
 
Ecet 105 Education Specialist -snaptutorial.com
Ecet 105   Education Specialist -snaptutorial.comEcet 105   Education Specialist -snaptutorial.com
Ecet 105 Education Specialist -snaptutorial.com
 
Tele Remote Switch
Tele Remote SwitchTele Remote Switch
Tele Remote Switch
 
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAVHOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
 
13486500-FFT.ppt
13486500-FFT.ppt13486500-FFT.ppt
13486500-FFT.ppt
 
Sinamics g120 treinamento (en)
Sinamics g120 treinamento (en)Sinamics g120 treinamento (en)
Sinamics g120 treinamento (en)
 
Tài liệu đào tạo simens sinamic G120
Tài liệu đào tạo simens sinamic G120Tài liệu đào tạo simens sinamic G120
Tài liệu đào tạo simens sinamic G120
 
Presentation2 1-150523155048-lva1-app6892
Presentation2 1-150523155048-lva1-app6892Presentation2 1-150523155048-lva1-app6892
Presentation2 1-150523155048-lva1-app6892
 
DTMF base Mobile controlled appliances control
DTMF base Mobile controlled  appliances controlDTMF base Mobile controlled  appliances control
DTMF base Mobile controlled appliances control
 

More from Nicole Gaehle, MSIST

Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareNicole Gaehle, MSIST
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardNicole Gaehle, MSIST
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperNicole Gaehle, MSIST
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityNicole Gaehle, MSIST
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentNicole Gaehle, MSIST
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Nicole Gaehle, MSIST
 
Understanding Layering and Ethernet
Understanding Layering and EthernetUnderstanding Layering and Ethernet
Understanding Layering and EthernetNicole Gaehle, MSIST
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismNicole Gaehle, MSIST
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Nicole Gaehle, MSIST
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentationNicole Gaehle, MSIST
 

More from Nicole Gaehle, MSIST (19)

Lab: Basic Reconnaissance
Lab: Basic ReconnaissanceLab: Basic Reconnaissance
Lab: Basic Reconnaissance
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS Standard
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services Paper
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak Entity
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Understanding TCP and HTTP
Understanding TCP and HTTP Understanding TCP and HTTP
Understanding TCP and HTTP
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)
 
Understanding Layering and Ethernet
Understanding Layering and EthernetUnderstanding Layering and Ethernet
Understanding Layering and Ethernet
 
Virtualization and Linux
Virtualization and LinuxVirtualization and Linux
Virtualization and Linux
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
 
Cryptography
CryptographyCryptography
Cryptography
 
Networking Task
Networking Task Networking Task
Networking Task
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
 
Reverse Engineering Project
Reverse Engineering ProjectReverse Engineering Project
Reverse Engineering Project
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentation
 

Recently uploaded

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 

Recently uploaded (20)

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

Database: PC and Employee

  • 1. Nicole Gaehle Leah Kinnamon IS 3845 Dr Joshi Tuesday2-4:40pm Journal B – Database 1. We have two tables PCandEmployee. KeepPCasthe leftone andEmployee asthe rightone.Show hand calculated/tabulatedresultsforthese operations astables ina worddocument,withoutusingOracle oranyotherquery engine. a. Showa product of the two PC# MODEL MAKE PC.EMP# E.EMP# ENAME DEPT TEL# 29 X500 HP 111 111 TIM MKT 9121 29 X500 HP 111 115 KIM FIN 9321 29 X500 HP 111 118 JANE FIN 9432 38 GP550 HP 118 111 TIM MKT 9121 38 GP550 HP 118 115 KIM FIN 9321 38 GP550 HP 118 118 JANE FIN 9432 32 MINI202 SONY 111 111 TIM MKT 9121 32 MINI202 SONY 111 115 KIM FIN 9321 32 MINI202 SONY 111 118 JANE FIN 9432 24 DX3900 DELL 111 TIM MKT 9121 24 DX3900 DELL 115 KIM FIN 9321 24 DX3900 DELL 118 JANE FIN 9432 b. Showa joinof the two. PC # MODEL MAKE EMP # ENAME DEPT TEL # 29 X500 HP 111 TIM MKT 9121 38 GP550 HP 118 JANE FIN 9432 32 MINI202 SONY 111 TIM MKT 9121 c. Showa leftouterjoinof the two.What doesit represent? PC # MODEL MAKE EMP # ENAME DEPT TEL # 29 X500 HP 111 TIM MKT 9121 38 GP550 HP 118 JANE FIN 9432 32 MINI202 SONY 111 TIM MKT 9121 24 DX38900 DELL Thisshowseverythingonthe PC table andanythingthatrelatesfromthe EMPLOYEE table to the PC table.
  • 2. d. Showa rightouter joinof the two.What doesit represent? PC # MODEL MAKE EMP # ENAME DEPT TEL # 29 X500 HP 111 TIM MKT 9121 32 MINI202 SONY 111 TIM MKT 9121 115 KIM FIN 9321 38 GP550 HP 118 JANE FIN 9432 Thisshowseverythingonthe EMPLOYEE table andanythingthat relatesfromthe PCtable to the EMPLOYEE table. e.Draw set diagramcirclesshowing EMP#from eachsetthat are commonand the onesthat are notcommon but exclusivetoone setor the other.
  • 3. Prepare the answerstothese forclassdiscussion –Don’t needtoturn themin. 1. List all the rulesapplicable tothe use of Group BY statementinSQLqueries. Difference betweenWhere andHaving. 2. Which differentconnectorscanbe used(listall) tolinkthe resultsof asubquerytoa mainquery(withitscolumn)? Can youuse a columnof outerqueryinside asubqueryandvice versa,i.e., canyouuse a columnof the subqueryinthe outerquery? 3. How wouldyouadd twocolumnsgivingatotal column?Andhow wouldyouadd the contentsof a columngivingthe total. PC PC# Model Make Emp# 29 X500 HP 111 38 GP550 HP 118 32 Mini202 Sony 111 24 DX3900 Dell Employee Emp# Ename Dept Tel# 111 Tim MKT 9121 115 Kim FIN 9321 118 Jane FIN 9432