On SQL Managment studioThis lab is all about database normalizatio.pdfinfomalad
On SQL Managment studio
This lab is all about database normalization. Download, from DocShare, and run Week 6
Normalizing.sql to create the four databases, UNF (Unnormalized Form), FNF (First Normal
Form), SNF (Second Normal Form), and TNF (Third Norma Form) used in this lab. Each of the
following will be executed against all four databases. This will require a use and go statement
between each query. All four queries should be able to run at one time. The goal of this lab is to
show how the different normalization change how data is queried. Note: The same result set will
be returned from each database. This is a good check to see that each query is correct.
Write a select statement that returns the project code, project name, and project manager.
List each Employee’s name, department, and department name.
List employee by project.
List each employee, project name, hourly rate, and department name.
the database is
Use master
GO
--
-- Unnormalized Database
--
CREATE DATABASE UNF;
GO
USE UNF;
GO
CREATE TABLE Unnormalized
(
ProjectCode varchar(100),
ProjectName varchar(100),
ProjectManager varchar(255),
ProjectBudget Decimal(10,2),
EmployeeNumber varchar(10),
EmployeeName varchar(100),
DepartmentNumber varchar(10),
DepartmentName varchar(100),
HourlyRate Decimal(10,2)
);
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC010\', \'Reservation System\', \'Mr. Jones\', 120500.00, \'S100\', \'John\', \'D03\',
\'Database\', 21.00)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC010\', \'Reservation System\', \'Mr. Jones\', 120500.00, \'S101\', \'George\',
\'D02\', \'Testing\', 16.50)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC010\', \'Reservation System\', \'Mr. Jones\', 120500.00, \'S102\', \'Bob\', \'D01\',
\'IT\', 22.00)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC011\', \'HR System\', \'Mrs. Smith\', 500500.00, \'S103\', \'Jack\', \'D03\',
\'Database\', 18.50)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC011\', \'HR System\', \'Mrs. Smith\', 500500.00, \'S104\', \'Jane\', \'D02\',
\'Testing\', 17.00)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC011\', \'HR System\', \'Mrs. Smith\', 500500.00, \'S315\', \'Dave\', \'D01\', \'IT\',
23.50)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, Project.
On SQL Managment studioThis lab is all about database normalizatio.pdfinfomalad
On SQL Managment studio
This lab is all about database normalization. Download, from DocShare, and run Week 6
Normalizing.sql to create the four databases, UNF (Unnormalized Form), FNF (First Normal
Form), SNF (Second Normal Form), and TNF (Third Norma Form) used in this lab. Each of the
following will be executed against all four databases. This will require a use and go statement
between each query. All four queries should be able to run at one time. The goal of this lab is to
show how the different normalization change how data is queried. Note: The same result set will
be returned from each database. This is a good check to see that each query is correct.
Write a select statement that returns the project code, project name, and project manager.
List each Employee’s name, department, and department name.
List employee by project.
List each employee, project name, hourly rate, and department name.
the database is
Use master
GO
--
-- Unnormalized Database
--
CREATE DATABASE UNF;
GO
USE UNF;
GO
CREATE TABLE Unnormalized
(
ProjectCode varchar(100),
ProjectName varchar(100),
ProjectManager varchar(255),
ProjectBudget Decimal(10,2),
EmployeeNumber varchar(10),
EmployeeName varchar(100),
DepartmentNumber varchar(10),
DepartmentName varchar(100),
HourlyRate Decimal(10,2)
);
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC010\', \'Reservation System\', \'Mr. Jones\', 120500.00, \'S100\', \'John\', \'D03\',
\'Database\', 21.00)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC010\', \'Reservation System\', \'Mr. Jones\', 120500.00, \'S101\', \'George\',
\'D02\', \'Testing\', 16.50)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC010\', \'Reservation System\', \'Mr. Jones\', 120500.00, \'S102\', \'Bob\', \'D01\',
\'IT\', 22.00)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC011\', \'HR System\', \'Mrs. Smith\', 500500.00, \'S103\', \'Jack\', \'D03\',
\'Database\', 18.50)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC011\', \'HR System\', \'Mrs. Smith\', 500500.00, \'S104\', \'Jane\', \'D02\',
\'Testing\', 17.00)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, ProjectBudget, EmployeeNumber,
EmployeeName, DepartmentNumber, DepartmentName, HourlyRate)
VALUES (\'PC011\', \'HR System\', \'Mrs. Smith\', 500500.00, \'S315\', \'Dave\', \'D01\', \'IT\',
23.50)
INSERT INTO Unnormalized
(ProjectCode, ProjectName, ProjectManager, Project.
SQL FILE FROM MOODLEUSE [master]GO Object Databa.pdfarrowit1
***SQL FILE FROM MOODLE***
USE [master]
GO
/****** Object: Database [PVF] Script Date: 6/17/2013 1:07:19 PM ******/
CREATE DATABASE [PVF]
ALTER DATABASE [PVF] SET COMPATIBILITY_LEVEL = 110
GO
IF (1 = FULLTEXTSERVICEPROPERTY(\'IsFullTextInstalled\'))
begin
EXEC [PVF].[dbo].[sp_fulltext_database] @action = \'enable\'
end
GO
ALTER DATABASE [PVF] SET ANSI_NULL_DEFAULT OFF
GO
ALTER DATABASE [PVF] SET ANSI_NULLS OFF
GO
ALTER DATABASE [PVF] SET ANSI_PADDING OFF
GO
ALTER DATABASE [PVF] SET ANSI_WARNINGS OFF
GO
ALTER DATABASE [PVF] SET ARITHABORT OFF
GO
ALTER DATABASE [PVF] SET AUTO_CLOSE OFF
GO
ALTER DATABASE [PVF] SET AUTO_CREATE_STATISTICS ON
GO
ALTER DATABASE [PVF] SET AUTO_SHRINK OFF
GO
ALTER DATABASE [PVF] SET AUTO_UPDATE_STATISTICS ON
GO
ALTER DATABASE [PVF] SET CURSOR_CLOSE_ON_COMMIT OFF
GO
ALTER DATABASE [PVF] SET CURSOR_DEFAULT GLOBAL
GO
ALTER DATABASE [PVF] SET CONCAT_NULL_YIELDS_NULL OFF
GO
ALTER DATABASE [PVF] SET NUMERIC_ROUNDABORT OFF
GO
ALTER DATABASE [PVF] SET QUOTED_IDENTIFIER OFF
GO
ALTER DATABASE [PVF] SET RECURSIVE_TRIGGERS OFF
GO
ALTER DATABASE [PVF] SET DISABLE_BROKER
GO
ALTER DATABASE [PVF] SET AUTO_UPDATE_STATISTICS_ASYNC OFF
GO
ALTER DATABASE [PVF] SET DATE_CORRELATION_OPTIMIZATION OFF
GO
ALTER DATABASE [PVF] SET TRUSTWORTHY OFF
GO
ALTER DATABASE [PVF] SET ALLOW_SNAPSHOT_ISOLATION OFF
GO
ALTER DATABASE [PVF] SET PARAMETERIZATION SIMPLE
GO
ALTER DATABASE [PVF] SET READ_COMMITTED_SNAPSHOT OFF
GO
ALTER DATABASE [PVF] SET HONOR_BROKER_PRIORITY OFF
GO
ALTER DATABASE [PVF] SET RECOVERY SIMPLE
GO
ALTER DATABASE [PVF] SET MULTI_USER
GO
ALTER DATABASE [PVF] SET PAGE_VERIFY CHECKSUM
GO
ALTER DATABASE [PVF] SET DB_CHAINING OFF
GO
ALTER DATABASE [PVF] SET FILESTREAM( NON_TRANSACTED_ACCESS = OFF )
GO
ALTER DATABASE [PVF] SET TARGET_RECOVERY_TIME = 0 SECONDS
GO
ALTER DATABASE [PVF] SET READ_WRITE
GO
USE [PVF]
CREATE TABLE Customer_T
(CustomerID NUMERIC(11,0) NOT NULL,
CustomerName VARCHAR(25) NOT NULL,
CustomerAddress VARCHAR(30) ,
CustomerCity VARCHAR(20) ,
CustomerState CHAR(2) ,
CustomerPostalCode VARCHAR(10) ,
CONSTRAINT Customer_PK PRIMARY KEY (CustomerID));
CREATE TABLE Territory_T
(TerritoryID NUMERIC(11,0) NOT NULL,
TerritoryName VARCHAR(50) ,
CONSTRAINT Territory_PK PRIMARY KEY (TerritoryID));
CREATE TABLE DoesBusinessIn_T
(CustomerID NUMERIC(11,0) NOT NULL,
TerritoryID NUMERIC(11,0) NOT NULL,
CONSTRAINT DoesBusinessIn_PK PRIMARY KEY (CustomerID, TerritoryID),
CONSTRAINT DoesBusinessIn_FK1 FOREIGN KEY (CustomerID) REFERENCES
Customer_T(CustomerID),
CONSTRAINT DoesBusinessIn_FK2 FOREIGN KEY (TerritoryID) REFERENCES
Territory_T(TerritoryID));
CREATE TABLE Employee_T
(EmployeeID VARCHAR(10) NOT NULL,
EmployeeName VARCHAR(25) ,
EmployeeAddress VARCHAR(30) ,
EmployeeBirthDate DATE ,
EmployeeCity VARCHAR(20) ,
EmployeeState CHAR(2) ,
EmployeeZipCode VARCHAR(10) ,
EmployeeDateHired DATE ,
EmployeeSupervisor VARCHAR(10) ,
CONSTRAINT Employee_PK PRIMARY KEY (EmployeeID));
CREATE TABLE Skill_T
(SkillID VARCHAR(12) NOT NULL,
SkillDescription.
Details introduction of the SQL Queries & basics of SQL queries like creating table, inserting values, updating values are discussed in this presentation.
Use this script for the assignment.Please follow instructions as t.docxgarnerangelika
Use this script for the assignment.
Please follow instructions as to what to turn in.
USE MYSQL ONLY.
# orderentrydbScript.sql
# REV 3 Updated 05/15/2017 Added employee comm pct to employee name Theresa Beck
# Script to build the Order Entry Database
# Creates tables and inserts data for this assignment
# into an already open database.
#
# Drop database if exists for a clean copy
Drop database if exists orderentrydb;
# Assumes student has created a database and activated it.
# Create Database before you begin to populate data
Create Database orderentrydb;
Use orderentrydb;
# Remove tables if they already exist
# Useful if it's not your first time trying this script
DROP TABLE if exists ordline ;
Drop TABLE if exists OrderTBL ;
DROP TABLE if exists Customer ;
DROP TABLE if exists Employee ;
DROP TABLE if exists Product ;
# Create the Product Table
CREATE TABLE Product
( ProdNo CHAR(8),
ProdName VARCHAR(50) NOT NULL,
ProdMfg varchar(20) NOT NULL,
ProdQOH decimal(10,2),
ProdPrice DECIMAL(12,2),
ProdNextShipDate DATE,
PRIMARY KEY (ProdNo) );
# Put data into the Product Table
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P0036566','17 inch Color Monitor','ColorMeg, Inc.',12,'2007-02-20',169.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P0036577','19 inch Color Monitor','ColorMeg, Inc.',10,'2007-02-20',319.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1114590','R3000 Color Laser Printer','Connex',5,'2007-01-22',699.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1412138','10 Foot Printer Cable','Ethlite',100,null,12.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1445671','8-Outlet Surge Protector','Intersafe',33,null,14.99);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1556678','CVP Ink Jet Color Printer','Connex',8, '2007-01-22',99.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P3455443','Color Ink Jet Cartridge','Connex',24,'2007-01-22',38.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P6677900','Black Ink Jet Cartridge','Connex',44,null,25.69);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P9995676','Battery Back-up System','Cybercx',12,'2007-02-01',89.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P4200344','36-Bit Color Scanner','UV Components',16,'2007-01-29',199.99);
# Create the Employee Table
CREATE TABLE Employee
( EmpNo varCHAR(8),
EmpFirstName varchar(20) NOT NULL,
EmpLastName varchar(30) NOT NULL,
EmpPhone varCHAR(15),
EmpEMail ...
SQL (Structured Query Language) is a domain-specific language used for managing and manipulating relational databases. It serves as a standardized way to communicate with and interact with databases, enabling users to create, modify, retrieve, and manipulate data stored in structured tables.
Key points about SQL:
1. **Database Management**: SQL is used to manage databases, which are organized collections of structured data stored in tables with rows and columns.
2. **Data Manipulation**: SQL provides commands for querying, inserting, updating, and deleting data within databases. This allows users to extract specific information from large datasets.
3. **Data Definition**: SQL is also used to define the structure of the database, including creating tables, defining their attributes (columns), specifying data types, and setting constraints.
4. **Querying**: The core strength of SQL lies in its querying capabilities. Users can write complex queries to filter, sort, join, and aggregate data to generate meaningful insights.
5. **Relational Databases**: SQL is primarily associated with relational databases, where data is organized into tables with defined relationships between them. This ensures data integrity and reduces redundancy.
6. **Standardized Language**: SQL is an industry-standard language, supported by most relational database management systems (RDBMS), including MySQL, PostgreSQL, Microsoft SQL Server, Oracle, and SQLite.
7. **SQL Variants**: While the core syntax remains consistent across databases, different database systems might have slight variations and extensions in their SQL implementations.
8. **Data Integrity**: SQL allows the specification of various constraints, such as primary keys, foreign keys, and unique constraints, to maintain data integrity and enforce relationships between tables.
9. **Transactions**: SQL supports transaction management, allowing users to group multiple operations into a single transaction that can be rolled back if an error occurs.
10. **Administration**: Database administrators (DBAs) use SQL to manage database users, permissions, backups, and other administrative tasks.
11. **Non-Relational Databases**: While SQL is mainly associated with relational databases, there are also versions of SQL adapted for non-relational databases like NoSQL databases.
In summary, SQL is a powerful language used to interact with and manage structured data stored in databases. It's essential for tasks ranging from data retrieval to database design and administration.
Dives into how MySQL indexes work under the hood, and provides strategies for efficiently indexing your data to reduce query times.
Presented at Western Slope Tech Meetup in Montrose, CO 3/29/17
Why are the mass extinctions followed by a burst of speciation in .pdffazilfootsteps
Why are the mass extinctions followed by a burst of speciation in the taxa that survive?
Name three types of key adaptations of early mammals that may have allowed them to survive
the dominance of dinosaurs.
Why are the mass extinctions followed by a burst of speciation in the taxa that survive?
Name three types of key adaptations of early mammals that may have allowed them to survive
the dominance of dinosaurs.
Name three types of key adaptations of early mammals that may have allowed them to survive
the dominance of dinosaurs.
Solution
Mass extinctions are generally followed by a burst of speciation in the taxa that survive as the
earth system succession that may follow in this case drives the ever-changing ecological stage on
which species evolve, restructuring ecosystems and setting long-term evolutionary trajectories.
The lifestyles of mammals might have given them; the advantage about 65 million years ago;
when the asteroid struck; leading to mass destruction. Mammals that lived in burrows or in
aquatic environments; might have been shielded from the intense heat of the impact of the
asteroid. After the impact was over these mammals might have come back and led a normal life.
Scarcity of food might have been the limiting factor for dinosaurs after the impact but the more
generalized tastes of mammals might have allowed them to hang on. The diversity of mammals
might have also supported their chances of survival and adaptation..
Why is African American history important What challenges have Afri.pdffazilfootsteps
Why is African American history important? What challenges have African American scholars
and historians faced as they attempted to establish African American history as a legitimate
discipline? How has African American history evolved throughout the 20th century and what is
the difference between Black history and Negro history?
Solution
African American History at various times in United States is referred to as colour, African,
Negro, and Afro- American history. The African American part of history throws light on the
black Americans ethnic parts of the society, Most African American are the descendants of
African bought to America forcefully to be held captive from the time period of 1555 to 1865.
Importance of African American History.
Challenges of African American history.
The negro history describes the accomplishments of Africans in the evolution of their society,
the contribution which were made by African leaders and revolutionist to remake the Africa or
make it a better place to live, while black history refers to the African – American history, the
history which introduced slavery, the history which discusses the living conditions of Africans in
America, the political revolutions which took place that time Black history, Afro- American
history are the same thing as Shakespeare said “what’s in the name.”.
More Related Content
Similar to Here is the company database for the problem--commen.pdf
SQL FILE FROM MOODLEUSE [master]GO Object Databa.pdfarrowit1
***SQL FILE FROM MOODLE***
USE [master]
GO
/****** Object: Database [PVF] Script Date: 6/17/2013 1:07:19 PM ******/
CREATE DATABASE [PVF]
ALTER DATABASE [PVF] SET COMPATIBILITY_LEVEL = 110
GO
IF (1 = FULLTEXTSERVICEPROPERTY(\'IsFullTextInstalled\'))
begin
EXEC [PVF].[dbo].[sp_fulltext_database] @action = \'enable\'
end
GO
ALTER DATABASE [PVF] SET ANSI_NULL_DEFAULT OFF
GO
ALTER DATABASE [PVF] SET ANSI_NULLS OFF
GO
ALTER DATABASE [PVF] SET ANSI_PADDING OFF
GO
ALTER DATABASE [PVF] SET ANSI_WARNINGS OFF
GO
ALTER DATABASE [PVF] SET ARITHABORT OFF
GO
ALTER DATABASE [PVF] SET AUTO_CLOSE OFF
GO
ALTER DATABASE [PVF] SET AUTO_CREATE_STATISTICS ON
GO
ALTER DATABASE [PVF] SET AUTO_SHRINK OFF
GO
ALTER DATABASE [PVF] SET AUTO_UPDATE_STATISTICS ON
GO
ALTER DATABASE [PVF] SET CURSOR_CLOSE_ON_COMMIT OFF
GO
ALTER DATABASE [PVF] SET CURSOR_DEFAULT GLOBAL
GO
ALTER DATABASE [PVF] SET CONCAT_NULL_YIELDS_NULL OFF
GO
ALTER DATABASE [PVF] SET NUMERIC_ROUNDABORT OFF
GO
ALTER DATABASE [PVF] SET QUOTED_IDENTIFIER OFF
GO
ALTER DATABASE [PVF] SET RECURSIVE_TRIGGERS OFF
GO
ALTER DATABASE [PVF] SET DISABLE_BROKER
GO
ALTER DATABASE [PVF] SET AUTO_UPDATE_STATISTICS_ASYNC OFF
GO
ALTER DATABASE [PVF] SET DATE_CORRELATION_OPTIMIZATION OFF
GO
ALTER DATABASE [PVF] SET TRUSTWORTHY OFF
GO
ALTER DATABASE [PVF] SET ALLOW_SNAPSHOT_ISOLATION OFF
GO
ALTER DATABASE [PVF] SET PARAMETERIZATION SIMPLE
GO
ALTER DATABASE [PVF] SET READ_COMMITTED_SNAPSHOT OFF
GO
ALTER DATABASE [PVF] SET HONOR_BROKER_PRIORITY OFF
GO
ALTER DATABASE [PVF] SET RECOVERY SIMPLE
GO
ALTER DATABASE [PVF] SET MULTI_USER
GO
ALTER DATABASE [PVF] SET PAGE_VERIFY CHECKSUM
GO
ALTER DATABASE [PVF] SET DB_CHAINING OFF
GO
ALTER DATABASE [PVF] SET FILESTREAM( NON_TRANSACTED_ACCESS = OFF )
GO
ALTER DATABASE [PVF] SET TARGET_RECOVERY_TIME = 0 SECONDS
GO
ALTER DATABASE [PVF] SET READ_WRITE
GO
USE [PVF]
CREATE TABLE Customer_T
(CustomerID NUMERIC(11,0) NOT NULL,
CustomerName VARCHAR(25) NOT NULL,
CustomerAddress VARCHAR(30) ,
CustomerCity VARCHAR(20) ,
CustomerState CHAR(2) ,
CustomerPostalCode VARCHAR(10) ,
CONSTRAINT Customer_PK PRIMARY KEY (CustomerID));
CREATE TABLE Territory_T
(TerritoryID NUMERIC(11,0) NOT NULL,
TerritoryName VARCHAR(50) ,
CONSTRAINT Territory_PK PRIMARY KEY (TerritoryID));
CREATE TABLE DoesBusinessIn_T
(CustomerID NUMERIC(11,0) NOT NULL,
TerritoryID NUMERIC(11,0) NOT NULL,
CONSTRAINT DoesBusinessIn_PK PRIMARY KEY (CustomerID, TerritoryID),
CONSTRAINT DoesBusinessIn_FK1 FOREIGN KEY (CustomerID) REFERENCES
Customer_T(CustomerID),
CONSTRAINT DoesBusinessIn_FK2 FOREIGN KEY (TerritoryID) REFERENCES
Territory_T(TerritoryID));
CREATE TABLE Employee_T
(EmployeeID VARCHAR(10) NOT NULL,
EmployeeName VARCHAR(25) ,
EmployeeAddress VARCHAR(30) ,
EmployeeBirthDate DATE ,
EmployeeCity VARCHAR(20) ,
EmployeeState CHAR(2) ,
EmployeeZipCode VARCHAR(10) ,
EmployeeDateHired DATE ,
EmployeeSupervisor VARCHAR(10) ,
CONSTRAINT Employee_PK PRIMARY KEY (EmployeeID));
CREATE TABLE Skill_T
(SkillID VARCHAR(12) NOT NULL,
SkillDescription.
Details introduction of the SQL Queries & basics of SQL queries like creating table, inserting values, updating values are discussed in this presentation.
Use this script for the assignment.Please follow instructions as t.docxgarnerangelika
Use this script for the assignment.
Please follow instructions as to what to turn in.
USE MYSQL ONLY.
# orderentrydbScript.sql
# REV 3 Updated 05/15/2017 Added employee comm pct to employee name Theresa Beck
# Script to build the Order Entry Database
# Creates tables and inserts data for this assignment
# into an already open database.
#
# Drop database if exists for a clean copy
Drop database if exists orderentrydb;
# Assumes student has created a database and activated it.
# Create Database before you begin to populate data
Create Database orderentrydb;
Use orderentrydb;
# Remove tables if they already exist
# Useful if it's not your first time trying this script
DROP TABLE if exists ordline ;
Drop TABLE if exists OrderTBL ;
DROP TABLE if exists Customer ;
DROP TABLE if exists Employee ;
DROP TABLE if exists Product ;
# Create the Product Table
CREATE TABLE Product
( ProdNo CHAR(8),
ProdName VARCHAR(50) NOT NULL,
ProdMfg varchar(20) NOT NULL,
ProdQOH decimal(10,2),
ProdPrice DECIMAL(12,2),
ProdNextShipDate DATE,
PRIMARY KEY (ProdNo) );
# Put data into the Product Table
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P0036566','17 inch Color Monitor','ColorMeg, Inc.',12,'2007-02-20',169.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P0036577','19 inch Color Monitor','ColorMeg, Inc.',10,'2007-02-20',319.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1114590','R3000 Color Laser Printer','Connex',5,'2007-01-22',699.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1412138','10 Foot Printer Cable','Ethlite',100,null,12.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1445671','8-Outlet Surge Protector','Intersafe',33,null,14.99);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P1556678','CVP Ink Jet Color Printer','Connex',8, '2007-01-22',99.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P3455443','Color Ink Jet Cartridge','Connex',24,'2007-01-22',38.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P6677900','Black Ink Jet Cartridge','Connex',44,null,25.69);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P9995676','Battery Back-up System','Cybercx',12,'2007-02-01',89.00);
INSERT INTO product
(ProdNo, ProdName, ProdMfg, ProdQOH, ProdNextShipDate, ProdPrice)
VALUES ('P4200344','36-Bit Color Scanner','UV Components',16,'2007-01-29',199.99);
# Create the Employee Table
CREATE TABLE Employee
( EmpNo varCHAR(8),
EmpFirstName varchar(20) NOT NULL,
EmpLastName varchar(30) NOT NULL,
EmpPhone varCHAR(15),
EmpEMail ...
SQL (Structured Query Language) is a domain-specific language used for managing and manipulating relational databases. It serves as a standardized way to communicate with and interact with databases, enabling users to create, modify, retrieve, and manipulate data stored in structured tables.
Key points about SQL:
1. **Database Management**: SQL is used to manage databases, which are organized collections of structured data stored in tables with rows and columns.
2. **Data Manipulation**: SQL provides commands for querying, inserting, updating, and deleting data within databases. This allows users to extract specific information from large datasets.
3. **Data Definition**: SQL is also used to define the structure of the database, including creating tables, defining their attributes (columns), specifying data types, and setting constraints.
4. **Querying**: The core strength of SQL lies in its querying capabilities. Users can write complex queries to filter, sort, join, and aggregate data to generate meaningful insights.
5. **Relational Databases**: SQL is primarily associated with relational databases, where data is organized into tables with defined relationships between them. This ensures data integrity and reduces redundancy.
6. **Standardized Language**: SQL is an industry-standard language, supported by most relational database management systems (RDBMS), including MySQL, PostgreSQL, Microsoft SQL Server, Oracle, and SQLite.
7. **SQL Variants**: While the core syntax remains consistent across databases, different database systems might have slight variations and extensions in their SQL implementations.
8. **Data Integrity**: SQL allows the specification of various constraints, such as primary keys, foreign keys, and unique constraints, to maintain data integrity and enforce relationships between tables.
9. **Transactions**: SQL supports transaction management, allowing users to group multiple operations into a single transaction that can be rolled back if an error occurs.
10. **Administration**: Database administrators (DBAs) use SQL to manage database users, permissions, backups, and other administrative tasks.
11. **Non-Relational Databases**: While SQL is mainly associated with relational databases, there are also versions of SQL adapted for non-relational databases like NoSQL databases.
In summary, SQL is a powerful language used to interact with and manage structured data stored in databases. It's essential for tasks ranging from data retrieval to database design and administration.
Dives into how MySQL indexes work under the hood, and provides strategies for efficiently indexing your data to reduce query times.
Presented at Western Slope Tech Meetup in Montrose, CO 3/29/17
Why are the mass extinctions followed by a burst of speciation in .pdffazilfootsteps
Why are the mass extinctions followed by a burst of speciation in the taxa that survive?
Name three types of key adaptations of early mammals that may have allowed them to survive
the dominance of dinosaurs.
Why are the mass extinctions followed by a burst of speciation in the taxa that survive?
Name three types of key adaptations of early mammals that may have allowed them to survive
the dominance of dinosaurs.
Name three types of key adaptations of early mammals that may have allowed them to survive
the dominance of dinosaurs.
Solution
Mass extinctions are generally followed by a burst of speciation in the taxa that survive as the
earth system succession that may follow in this case drives the ever-changing ecological stage on
which species evolve, restructuring ecosystems and setting long-term evolutionary trajectories.
The lifestyles of mammals might have given them; the advantage about 65 million years ago;
when the asteroid struck; leading to mass destruction. Mammals that lived in burrows or in
aquatic environments; might have been shielded from the intense heat of the impact of the
asteroid. After the impact was over these mammals might have come back and led a normal life.
Scarcity of food might have been the limiting factor for dinosaurs after the impact but the more
generalized tastes of mammals might have allowed them to hang on. The diversity of mammals
might have also supported their chances of survival and adaptation..
Why is African American history important What challenges have Afri.pdffazilfootsteps
Why is African American history important? What challenges have African American scholars
and historians faced as they attempted to establish African American history as a legitimate
discipline? How has African American history evolved throughout the 20th century and what is
the difference between Black history and Negro history?
Solution
African American History at various times in United States is referred to as colour, African,
Negro, and Afro- American history. The African American part of history throws light on the
black Americans ethnic parts of the society, Most African American are the descendants of
African bought to America forcefully to be held captive from the time period of 1555 to 1865.
Importance of African American History.
Challenges of African American history.
The negro history describes the accomplishments of Africans in the evolution of their society,
the contribution which were made by African leaders and revolutionist to remake the Africa or
make it a better place to live, while black history refers to the African – American history, the
history which introduced slavery, the history which discusses the living conditions of Africans in
America, the political revolutions which took place that time Black history, Afro- American
history are the same thing as Shakespeare said “what’s in the name.”.
Using the phase diagram of polydstyrene and DOP below, would you ex.pdffazilfootsteps
Using the phase diagram of polydstyrene and DOP below, would you expect a single phase
solution or a two phase solution at i. 1 °C? ii. 15 °C? 20- 15- 10 -10 0.00 0.05 0.10 Volume
Fraction of Polymer
Solution
Above the binodal curve, a one phase solution exists and below it, a two phase solution.
Hence, at 0 0C two phase and at 15 0C one phase.
What does it mean to say that individuals as a group are net supplier.pdffazilfootsteps
What does it mean to say that individuals as a group are net suppliers of funds for financial
institutions? What do you think the consequences might be in financial markets if individuals
more of their incomes and thereby reduced the supply of funds available to financial institutions?
What does it mean to say that individuals as a group are net suppliers of funds for tinancial
institutions? (Select the best answer below) A. tndviduals, as a whole, spend less than they make
The excess is invested, making it available for businesses and goverments O B. Individuals, as a
whole, spend more than they make. The excess is provided for by financial instftutions O C.
Individuals, as a whole, spend more than they make The excess is provided for by businesses. O
D. Indviduats, as a whole spend less than they make. The amount that hey spend is made
available to businesses through Inancial netutors What do you think the consequences mignt be
in financual markets if indviduats consumed more of their incomes and thereby reduced the
suply of funds avalable to financial institutions? (Select the best answers from the drop-down
menus If individuals consume more i.e, required return of investors to buy bonds) Over time,
employment salaries, and gross domestic product would oolirs wis be avatlabie tor nestent The
the amount of money available for new projects and drive the required return vailabd ae
Solution
Individuals as a group are net suppliers of funds for Financial Institutions.
Generally individuals spend according to their requirement and invest there surplus Into The
Financial Institutions. That is the difference between income and spending is saving. These
savings directly goes to the financial institutions which they utilize in financing the businesses.
Individuals as a whole, spend less than they make. The excess is invested, making it available for
businesses and governments. Option A.
If individuals consume more less dollar will be available for investment. This would reduce the
amount of money availablefor new projects and drive up/high the required rate of return. Over
time, employment, salaries and GDP would decline..
True or False Statement The DNS namespace is hierarchical. Protocols.pdffazilfootsteps
True or False Statement The DNS namespace is hierarchical. Protocols at the transport layer
make use of the service offered by the network layer UDP provides reliable data transfer Both
TCP and UDP use a checksum to detect errors. Clark\'s algorithm can sometimes help reduce
bandwidth usage when TCP is used. With Selective Repeat, the sender and receiver always agree
on what packets have been received/not received at all times. DNSSEC can use TCP An IP
address and a port number are important components of a socket Port numbers are important to
addressing at the transport layer. TCP is a connection-oriented protocol. SMTP is an important
protocol pertaining to email. Persistent connections can improve the performance of HTTP. One
situation where packet switching performs well is when network traffic is bursty and
independent. Consider two song files, both by the artist Beyoncé. Since they are by the same
artist, these files will always be stored very near to each other in the identifier space of Chord.
Encapsulation occurs as data is handed down the protocol stack. True or False?
Solution
1-true
2-true
3-false
4-true
5-false
6-false
7-true
8-true
9-true
10-true
11-true
12-false
13-true
14-false
15-true.
Thoughts on this Rule by the people is the main idea behind dem.pdffazilfootsteps
Thoughts on this: \"Rule by the people\" is the main idea behind democracy. Ideally, in a
democratic society, we either elect our representatives, who, in theory, govern as the people see
fit, or directly vote on issues. The procedural side of democracy guides the electoral processes of
our society such as deciding who should vote, the weight that vote should carry, and how
decisions are made using those votes. The substantive side of \"rule by the people\" delves into
the core of governmental policies and how they affect the population. This theory is more
concerned with civil rights and liberties such as freedom of speech and the right to bear arms as
set forth in the Bill of Rights and other Constitutional Amendments. Whether it be from a
majoritarian (majority rules) or pluralist viewpoint (often minority rules), the core idea is that of
government by the people.
Solution
Democracy is the form of governance which can be characterized as \"Rule by the people\". In
any democratic society, the government is selected by the citizens in the form of elected
representatives who are chosen on the basis of a certain topic or issue. There are mainly some
concerns related to the procedural side of democracy which governs the procedural side of
democratic electoral processes are who should vote, what weight that vote should carry and what
process has to be adopted for the decision making on the basis of these votes.
Each action of the government is governed by the philosophy of \"Rule by the people\" and how
these decisions have the impact on the lives of common citizens. These factors are more closely
associated with the concepts of civil rights and liberties such as freedom of speech and the right
to bear arms as set forth in the Bill of Rights and other Constitutional Amendments. But the basic
concept is government by the people. Irrespective of majoritarian (majority rules) or pluralist
viewpoint (often minority rules). Thus in any democracy, it is the public which has the deciding
voice..
The symmetry properties of the plane figure formed by the four point.pdffazilfootsteps
The symmetry properties of the plane figure formed by the four points at the corners of a
rectangle (not a square) can be described in terms of four symmetry operations: the identity
operation and three rotations. (i) Describe these symmetry operations. (ii) Construct the group
multiplication table
Solution.
QUESTION 12 (Learning Outcome 3) Which of the following flawed uses o.pdffazilfootsteps
QUESTION 12 (Learning Outcome 3) Which of the following flawed uses of diction appears in
the given sentence? John played with such intensity; he was on fire, and drowned the audience
with his emotion.\" Wordiness O Ambiguity O Euphemisms O Mixed Metaphors QUESTION 13
Click Save and Submit to save and submit. Click Save All Answers to save all answers
Solution
Option C Euphemism
not drowned with emotion - lit up with excitement
So when a player is playing good and performing for his country or county the audience of that
county are generally excited not emotional..
Robbinsdale Hospital is one of two hospitals among the six facilitie.pdffazilfootsteps
Robbinsdale Hospital is one of two hospitals among the six facilities in the city to have an
intensive care (Level III) nursery. This facility is tailored to treat infants suffering from severe
medical complications upon delivery. The program director is deciding whether to use an
emotional or rational appeal in advertising copy.
(a) What are the considerations in this decision?
(b) Support your position with facts and examples.
Solution
Making a rational appeal in the advertising copy is more relevant.The considerations in making a
decision regarding use of the correct appeal in advertising copy include -
1. The sensibilities of the public which include patients and their family, general public.
2. The level of competition in the area and the number of patients visiting the competitor\'s
facility
3. The additional facilities and care offered by the hospital in comparison with competitors
4. The availability of skilled neonatologists to address the health issues of infants
5. Affordability of the patients to complex treatments that require higher spending
6. Availability of public and private health insurance programs..
Research excise taxes in other states besides North Carolina. Report.pdffazilfootsteps
Research excise taxes in other states besides North Carolina. Report on 2 different type of excise
taxes in 3 different states.
Solution
The discussion below illustrates the excise taxes on two different commodities in 3 different
states:
Commodity: Cigarretes (tax in US$)
Washington: $ 3.025
California: $2.87
Nevada: $1.80
Commodity: Beer (tax in US$ per gallon)
Washington: $ 0.26
California: $0.20
Nevada: $0.16.
Prove that E X is not connected if and only if there exist open sets.pdffazilfootsteps
Prove that E X is not connected if and only if there exist open sets A, B X such that E A Union
B, A Intersection B = theta), and E Intersection A and E Intersection B are both nonempty.
Solution
Let E be connected. Also, let there be disjoint/open sets A, B X , such that (EA)(EB)=E. This
implies that E is a union of its two open subsets. This is a contradiction as E is connected. Hence
E is not connected.
Conversely, if E is not equal to (EA)EB) for any two disjoint/open sets A and B which are
subsets of X, then it implies that we also cannot express E as a union of any two of its open
subsets , as, by the definition of a topological subspace, (EA) and(EB) together comprise the
entire topological subspace E..
potential benefits of sustainability strategySolutionpotential.pdffazilfootsteps
potential benefits of sustainability strategy
Solution
potential benefits of sustainability strategy are discussed as below :
1. Attract and retain top talent: A well-developed sustainability strategy is extremely appealing
criteria for attracting and retaining the best employees. Employees feel proud to be part of a
organisation that has a positive impact on the environment and society.
2. Access to investment capital : investors are satisfied by investing ahuge pool of money in
companies that have been found to be sustainable. It is easy for companies who has sustainable
strategy to get investment from the market for their success and growth.
3. Operational efficiency : Running a responsible business and achieving high levels of growth
and profitability do not have to work against each other. Reduced use of energy, water and
materials consumption, as well as decreased emissions and waste generation contributes to lower
operating and manufacturing costs, which will directly improve the company’s bottom line.
4. Enhance Image, Reputation and Brand Recognition: A sustainability strategy has a positive
impact on company’s reputation and brand image. It demonstrates that the company is taking
responsibility for its actions and embracing change for the greater good. The vital part of a
company’s success is the engagement and development of strong relationships with internal and
external stakeholders based on trust, respect, and cooperation.
5. Increased product/service differentiation : It is possible for companies to gain an entire new
class of loyal customers by offering environmentally and socially responsible products.
Therefore, it is easily possible for them to increase market share and tap new markets..
Please write a code in JAVA to do line editor..Your program will b.pdffazilfootsteps
Please write a code in JAVA to do line editor..
Your program will be a line editor. A line editor is an editor where all operations are performed
by entering commands at the command line. Commands include displaying lines, inserting text,
editing lines, cutting and pasting text, loading and saving files. For example, a session where the
user enters three lines of text and saves them as a new file may appear as:
The file created is:
The editor will first display a menu after which it will prompt for commands with \"-> \". The
commands which can be entered can be seen in the menu appearing in the example.
This web page was written with the line editor described here.
The Commands
If you run the program with no command line arguments it will begin with an empty document.
If you give the name of an existing file as a command line argument it will open and load the
contents of that file. You can exit the program with either the quit, q, or write and quit, wq,
command.
Displaying the menu
The menu is displayed when the program starts. It can be displayed with the command m.
Reading and writing files
The load file command l will ask the user for a file name, open the file for reading, read the file
contents into the editor and close the file. If there is already text in the editor it is discarded. The
write file command w will write the contents of the editor to a file. If a file has previously been
opened with the read file command that same file is used for writing. Otherwise, the program
will prompt the user for a file name. For either the read or write file commands if the requested
file cannot be opened an appropriate error message is displayed.
Displaying text
Text can be displayed with three commands: show all (sa), show range (sr), and show line (sl).
All three commands display text with line numbers. Show all displays the entire document. Show
range will ask the user a range of lines (\"from\" and \"to\") and will display the lines in that
range. If the \"to\" line number is greater than the number of lines in the document lines up to the
end of the document will be displayed. Show line will ask the user for a line number and display
that line.
Entering new lines of text
New lines of text are entered using the new line command nl. Before entering a new line the
program will ask type line? (y/n). If the user chooses yes the line will be accepted after the line
number is displayed. If the document is empty the new line will be the first line (line 1) of the
document. If the document is notempty the program will prompt the user to enter the line after
which the new line will be placed. If the line number is out of range the program will not accept
a new line. A new first line can be added by asking to add a line after (the non-existent) line 0.
After the user has entered a line the program will continue asking for new lines until the user
answers no. As the new lines are being entered they are added sequentially to the document. As
the user be.
Nessus is a network security tool- write a pragraph describe itsto.pdffazilfootsteps
Nessus is a network security tool
- write a pragraph describe itstool\'sfeatures,
what it provides?
Note: provide relaiblerefrences for your answer.
Solution
Nessus:Nessus is the vunerability scanner.Which is devloped by tenable network security.It is
free of charg fo the personal use.
The following type of vunerabilities are allowed to scan by nessus:
1)Misconfiguration(such as open mail relay)
2)Denial of services against TCP
3)Dictionary attacks
4)Default password,absent passwords orfew common passwords
5)PCI DSS audits
Nessus has two main component one is nessus daemon ,whih is esponsible for scan and other is
nessus client which ctrols the scan and provide the result to client. But nes does not provide the
complete security solution but its a small part complete security solution.
Good things of nessus over other
1) Nessus does not have of system configuration or make any kind of assumption
2)Provide the plugin interface and extension is alos availble.
3)Nessus is open source
4) when provide the detail of vunerability the aso provides the way using which you can mitigate
vuneability.
Nessus s availble in three version 1)desktop
2)cloud
3)Nessus manager
Rerences :Tenable official website and cmu education website..
Module 01 Discussion - Dominant CultureDefine the .pdffazilfootsteps
Module 01 Discussion - Dominant Culture
Define the term \"dominant culture\", and in your own words give an example of an aspect of
dominant culture in current American society. How does this feature of dominant culture
function within our society? How did it function during the postwar era in the United States?
What are some of the values or mores present within this aspect of dominant culture?
Please respond to students post!!!!!!
By. Mr. Watson
Dominant Culture is defined as a culture that is the most powerful, widespread, or influential
within a social or political entity in which multiple cultures are present. In today\'s current
American society, hip-hop culture is by far the most dominant culture and can also be seen in
other countries as well. During the postwar era of the 1950\'s, young and old alike followed
group norms rather than striking out on their own. once the war was over, traditional roles were
reaffirmed. Men expected to be the breadwinners; women, even when they worked, assumed
their proper place was at home.Television contributed to the homogenizing trend by providing
young and old with a shared experience reflecting accepted social patterns. Some of the values
and mores in a dominant culture are time and control, self-sufficiency, status, language, and
individualism.
Module 01 Discussion - Dominant Culture
Define the term \"dominant culture\", and in your own words give an example of an aspect of
dominant culture in current American society. How does this feature of dominant culture
function within our society? How did it function during the postwar era in the United States?
What are some of the values or mores present within this aspect of dominant culture?
Please respond to students post!!!!!!
By. Mr. Watson
Dominant Culture is defined as a culture that is the most powerful, widespread, or influential
within a social or political entity in which multiple cultures are present. In today\'s current
American society, hip-hop culture is by far the most dominant culture and can also be seen in
other countries as well. During the postwar era of the 1950\'s, young and old alike followed
group norms rather than striking out on their own. once the war was over, traditional roles were
reaffirmed. Men expected to be the breadwinners; women, even when they worked, assumed
their proper place was at home.Television contributed to the homogenizing trend by providing
young and old with a shared experience reflecting accepted social patterns. Some of the values
and mores in a dominant culture are time and control, self-sufficiency, status, language, and
individualism.
Module 01 Discussion - Dominant Culture
Define the term \"dominant culture\", and in your own words give an example of an aspect of
dominant culture in current American society. How does this feature of dominant culture
function within our society? How did it function during the postwar era in the United States?
What are some of the values or mores present within this asp.
List and explain the states of process in a specific operating syste.pdffazilfootsteps
List and explain the states of process in a specific operating system, such as; windows XP,
windows 2000, Unix …
Solution
Process:Process is an instance of a computer program that is being executed.It contains the
program code and it\'s current ativity.
Process states in wwindows 2000:
At the highest level of abstraction windows2000 process comprises the folowing
->A private virtual addressspace
->An executable program
->A list of open handles to various system resources that are accessible to all threads in the
process.
->A security context called an access token.
->A unique identifier called a process Id
->At least on thread of execution.
windows 2000 is a symmetric multiprocessing operating system.There is no master processor.
->windows2000 incorporates several features that are crucial to it success as a multiprocessor
operating system.
->The ability to run operating system code on any available processor and on multiple processor
at the same time.
->Multiple threads of execution within a single process.
->Fine-grained synchronization within the kernel as well as within device drivers and servers
processmwhich allows more components to run cuncurrently on multiple processors.
Process in unix and windows XP:
Process in unix and windows are contain an address space.usually protected and virtual mapped
into memory.the code for the running prigram.
->The data for the running program.
- execution stack and stack pointer and also heap
->The program counter(PC)
->A set of processor rigisters.that are general purpose and stsu registers.
->A set of system resources that are files, network connections,pipes.
process procedure:
->To users a process is identified by it process Id(PID).inthe os processes ar represented by
entries in a process table.
->pid is index to a process table entry was process table entry=Process control block.
->Process control block is a larg data structure that contains al information abbout the process.
->Linux-defined in task_struct_over
->windows xp-define in EPROCESS
Process in Process control block:
Process control block contains the below info
->execution state,pc,sp&processor register stored when process is not in running state.
->memory management info and priviliges and owner information,scheduling priority an
resource information and accounting information.
Process are created :
•when the system boot
•By the action prformed by user
•by the action of a batch manager an etc
Process terminattes
•Normally-exit,voluntarily on a error
•involuntarily on an error
•Terminated by the action a user (or) a process
Process states:
Process states are execution state,ready state,running state and waiting state.
Process creation in unix and linux:
Creates a new process for();
•allocate new process control block
•clones the calling process
•copy of the parent process address space
•copying the resources in kernel
Placess process control block on ready queue and return from fork() call
O for child and child pid for parent.
Process c.
Most integer types are directly supported by hardware, but some are n.pdffazilfootsteps
Most integer types are directly supported by hardware, but some are not, such as An integer
type of arbitrary size Unsigned integer types Word-length integer types Byte-length integer
types
Solution
Most integer types are directly supoorted by hardware
but some are not such as
the answer is
an integer type of arbitrary size.
Introduction to Philosophy 101 HomeworkSection 3 Deductive Argum.pdffazilfootsteps
Introduction to Philosophy 101: Homework
Section 3: Deductive Arguments and Standard Form/Short Answer
Directions: Put the following deductive arguments into standard form and determine whether the
arguments are of the form modus ponens, modus tollens, disjunctive syllogism, or hypothetical
syllogism.
1. If it is true that everyone lies to serve their own interest, then no one can be trusted. But,
obviously I know many people who can be trusted. Therefore, it cannot be true that everyone lies
to serve their own interest.
1.
2.
___________________________________________________
3.
Form:
2. If large cattle farms are more harmful to the environment than driving automobiles, then
eating beef is morally wrong. Large cattle farms are more harmful than driving automobiles.
Thus, this must mean that eating beef is morally wrong.
1.
2.
_____________________________________________________
3.
Form:
3. If determinism is true then no human being can ever be responsible for any of their actions. If
human beings cannot be responsible for their actions, then there is no such thing as universal
ethics. Therefore, if determinism is true, then there is no such thing as universal ethics.
1.
2.
________________________________________________________
3.
Form:
4. Explain Sophistic rhetoric. What is its purpose?
5. Why does Socrates claim that he is the wisest in all of Athens?
6. Explain Socrates’ idea of truth. Does truth exist?
7. Explain Dqescartes’ method of doubt and the rational truth he discovers.
8. According to Berkeley, “if a tree falls in the woods, does it make a sound?” Explain this in
terms of his philosophy.
9. When referring to the theory of Dualism, what is the problem of interaction?
10. Briefly define Physicalism.
Solution
2. If large cattle farms are more harmful to the environment than driving automobiles, then
eating beef is morally wrong. Large cattle farms are more harmful than driving automobiles.
Thus, this must mean that eating beef is morally wrong.
Form: modus ponens
P: Large cattle farms are more harmful than driving automobiles
Q: that eating beef is morally wrong.
If P Q and P are true, then Q is true, by modus ponens.
3. If determinism is true then no human being can ever be responsible for any of their actions. If
human beings cannot be responsible for their actions, then there is no such thing as universal
ethics. Therefore, if determinism is true, then there is no such thing as universal ethics.
Form:disjunctive syllogism.
1. If it is true that everyone lies to serve their own interest, then no one can be trusted. But,
obviously I know many people who can be trusted. Therefore, it cannot be true that everyone lies
to serve their own interest.
Form: modus tollens
4. Explain Sophistic rhetoric. What is its purpose?
The Sophists were orators, public speakers, mouths for hire in an oral culture. They were gifted
with speech. They were skilled in what becomes known as Rhetoric. They were respected,
feared and hated. They had a gift.
Indian Institute of Management Kashipur Executive Post Graduate Pro.pdffazilfootsteps
Indian Institute of Management Kashipur Executive Post Graduate Programme PART B Total
20Marks) Test 20 Q1. You are eval elements in the BI corresponding four questions to ask the
vendor in order to determine how their software will interplay with uating Business Intelligence
software from a variety of vendors. Identify at least four environment. Use your understanding of
the importance of these elements to formulate (5 marks) your needs.
Solution
Actually what are theelements of business intelligence environment
1.Availability to work, Is it work without a fatigue 24/7 ? is it accessible at any time ?
2.How accurate the work it was ?
3.Data processed and finalised ,capacity of work performance and storage space and facility and
availability of data ?
4.Service Warranty and Maintenance of business Intelligence whose responsibility in case
privacy theft ?
5.is there any charges for implementation and maintenance ?
6.Is it designed by trusted and qualified experienced Professionals ?
FourQuestions to ask the vendor in order to meet the business Needs ?
1.Is it consistently worked ? How long it is work and Is there any need of maintenance or
observe the work of Business intelligence ,is it meet the present and future changes too ??if
modification is required then what are details like cost, time, maintenance, replacement cost ?
2.Is the data generated by BI is believable and accurate ,How actually, the process will work and
how many times you tested it before bring into existence of business intelligence ? how the
information is supported , whether for Jquery, Decision support system, Management
Information System, Executive support system how the data is going to deliver, mode of delivery
while accessing the data, is it support all formats, operating system and is it easy to use and
retrieve ?
3.Where the data will be stored and what is capacity of storage space or can we add external data
storage devices like servers, Is there any privacy to the data ? is there any actions or steps are
taken for privacy or not to disclose information unless it is authorised ? is it offiline or online ?
and how safe it was ?
4.Is Both the hardware and software is made by you, in case is there any difficulty or stoppage
or destructions, privacy theft, happen what steps that you taken for immediate redressal, is the
skilful staff available immediately to address the relevant issue ,and what is guarantee and
warranty provided by you with regard to the Business Intelligence ?.
implemement the game.cpp by the header file given. And create main.c.pdffazilfootsteps
implemement the game.cpp by the header file given. And create main.cpp to make the program
work.
The game is called the game of life, https://en.wikipedia.org/wiki/Conway\'s_Game_of_Life
game.h:
#include // Provides ostream
#include // String operations
#include // Randomizer
namespace csci2312
{
using std::string;
using std::ostream;
using std::istream;
class Cell
{
friend class GameOfLife;
public:
static const char alive =\'o\'; // alive image
static const char dead = \'-\'; // dead image
// Default constructor sets the cell\'s state to false
Cell();
// Custom constructor sets the cell\'s state as per argument
Cell(bool state);
// Empty destructor
~Cell();
// Accessors have no intention to modify the object, so it is a good practice to make them
\'const\' functions
bool getState() const;
// Mutator to change cell\'s state
void setState(bool newState);
// Accessor to see the \'face\'
char getFace() const;
private:
bool state;
char face;
};
class GameOfLife
{
public:
static const unsigned int MAX_BOARD = 30;
GameOfLife();
GameOfLife(size_t boardSize);
~GameOfLife();
int seedBoard(string fileName);
void seedBoard(size_t seeds);
void run();
void run(unsigned int numberOfIterations);
// ADVANCED
// A const(!) accessor method that returns a handle to the private currentLife array.
// The return type must also be \'const\' because we return a pointer to a static array, and
these are fixed
// It is just an example. It is not needed if we have a friend operator.
const Cell(*getCurrentLife() const )[MAX_BOARD+2] { return currentLife; };
///////////////////////////////////////////////////////
// friend operator can access private members of GameOfLife
friend ostream& operator << (ostream& out, const GameOfLife& board);
friend istream& operator >> (istream& in, const GameOfLife& board);
private:
bool executeRules(unsigned int countAlive, bool currentState);
// With \"Halo\" approach we need a bigger board
Cell currentLife[MAX_BOARD + 2][MAX_BOARD + 2];
Cell nextLife[MAX_BOARD + 2][MAX_BOARD + 2];
// ADVANCED
// Example how to declare variable cl as a pointer/handle to our array of Cells of size
HALO_BOARD
// The accessor method getCurrentLife() above uses the same syntax for the return type
const Cell(*cl)[MAX_BOARD + 2] = currentLife;
////////////////////////////////////////////////////////
size_t boardSize; // Board size requested in the constructor
};
// NON-MEMBER OUTPUT FUNCTIONS
// Display cell\'s state with alive/dead face
ostream& operator << (ostream& out, const Cell& cell);
}
Solution
Answer:
#include
#include
#include
#include
using namespace std;
void copy(int input1[52][102], int input2[52][102])
{
for(int j = 0; j < 52; j++)
{
for(int i = 0; i < 102; i++)
input2[j][i] = input1[j][i];
}
}
void lifegame(int input[52][102], char option)
{
int support[52][102];
copy(input, support);
for(int j = 1; j < 51; j++)
{
for(int i = 1; i < 101; i++)
{
if(option == \'m\')
{
int increment = 0;
increment = input[j-1][i] +
input[j-1][i-1] +
input[j][i-1] .
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Here is the company database for the problem--commen.pdf
1. Here is the company database for the problem
--comments can be added
DROP TABLE works_on;
DROP TABLE dependent;
DROP TABLE project;
DROP TABLE dept_location;
ALTER TABLE department DROP CONSTRAINT fk_mgrssn CASCADE;
ALTER TABLE employee DROP CONSTRAINT fk_dno CASCADE;
DROP TABLE department;
DROP TABLE employee;
CREATE TABLE employee
(fnameVARCHAR2(12),
minitCHAR(1),
lnameVARCHAR2(12),
ssnCHAR(9) NOT NULL,
bdateDATE,
addressVARCHAR2(40),
sexCHAR(1),
salaryNUMBER(7) NOT NULL,
superssnCHAR(9) references employee(ssn),
/*superssnCHAR(9),*/
/*either way, but need to know superssn is from ssn*/
CONSTRAINT pk_ssn PRIMARY KEY (SSN));
ALTER TABLE employee ADD (dno NUMBER(2) NOT NULL);
2. INSERT INTO employee VALUES ('Wolons', 'E', 'Aimee', '888665555',
'10-NOV-1927', '450 Stone, edsion, NJ', 'F', 55000, null,1);
INSERT INTO employee VALUES ('Ramirez', '', 'Damian', '987654321',
'20-JUN-1931', '291 Berry, albany, NY', 'M', 43000, '888665555',4);
INSERT INTO employee VALUES ('Hall', '', 'Nathan', '333445555',
'09-DEC-1945', '638 bruce, Oneonta, NY', 'M', 40000, '888665555',5);
INSERT INTO employee VALUES ('Kelly', '', 'David', '999778888',
'19-JUL-1958', '3321 central ave, New York, NY', 'M', 25000, '987654321',4);
INSERT INTO employee VALUES ('Philip', '', 'Dolensek', '123456789',
'09-JAN-1955', '731 clinton, Oneonta, NY', 'M', 30000, '333445555',5);
INSERT INTO employee VALUES ('Reale', '', 'Michael', '666884444',
'15-SEP-1952', '975 Fire Oak, Newark, NJ', 'M', 38000, '333445555',5);
INSERT INTO employee VALUES ('Smith', '', 'Jason', '453453453',
'31-JUL-1962', '5631 Rice, Harrison, NJ', 'F', 25000, '333445555',5);
INSERT INTO employee VALUES ('Warren', 'V', 'Samantha', '987987987',
'29-MAR-1959', '908 Dallas, albany, NY', 'F', 25000, '987654321',4);
select e.fname, e.lname, s.fname, s.lname
from employee e, employee s
where e.superssn=s.ssn;
3. CREATE TABLE department
(dnameVARCHAR2(20) NOT NULL,
dnumberNUMBER(2) NOT NULL,
mgrssnCHAR(9) NOT NULL,
mgrstartdateDATE,
CONSTRAINT pk_dnumber PRIMARY KEY (DNUMBER),
CONSTRAINT fk_mgrssn FOREIGN KEY (mgrssn) REFERENCES employee (ssn));
INSERT INTO department VALUES ('Research',5 , '333445555', '22-MAY-1978');
INSERT INTO department VALUES ('Administration',4 , '987654321', '01-JAN-1985');
INSERT INTO department VALUES ('Computing Service', 1, '888665555', '19-JUN-1971');
ALTER TABLE employee ADD (CONSTRAINT fk_dno FOREIGN KEY (dno)
REFERENCES department(dnumber));
CREATE TABLE dept_location
(dnumberNUMBER(2) ,
dlocationVARCHAR2(20),
CONSTRAINT pk_num_loc PRIMARY key (dnumber, dlocation),
CONSTRAINT fk_dnumber FOREIGN KEY (dnumber) REFERENCES department(dnumber));
4. INSERT INTO dept_location VALUES (1,'Fitzelle');
INSERT INTO dept_location VALUES (4,'Hunt union');
INSERT INTO dept_location VALUES (5,'Natza');
INSERT INTO dept_location VALUES (5,'Hunt union');
INSERT INTO dept_location VALUES (5,'Fitzelle');
CREATE TABLE project
(pnameVARCHAR2(15),
pnumberNUMBER(2) NOT NULL,
plocationVARCHAR2(15) ,
dnumNUMBER(2),
CONSTRAINT pk_pnumber PRIMARY KEY (PNUMBER),
CONSTRAINT fk_dnum FOREIGN KEY (dnum) REFERENCES department(dnumber));
INSERT INTO project VALUES ('ProductX', 1,'library',5);
INSERT INTO project VALUES ('ProductY', 2,'Fitzelle hall',5);
INSERT INTO project VALUES ('ProductZ', 3,'Library',5);
INSERT INTO project VALUES ('Computerization', 10,'IRC',4);
INSERT INTO project VALUES ('Reorganization', 20,'IRC',1);
INSERT INTO project VALUES ('Newbenefits', 30,'Hunt Union',4);
CREATE TABLE dependent
(essnCHAR(9) NOT NULL,
dependent_name VARCHAR(9) NOT NULL,
sexVARCHAR2(1),
bdateDATE,
relationshipVARCHAR(8),
5. CONSTRAINT pk_essn PRIMARY KEY (essn, dependent_name),
CONSTRAINT fk_essn FOREIGN KEY (essn) REFERENCES employee(ssn) ON DELETE
CASCADE);
INSERT INTO dependent VALUES ('333445555','Alice', 'F','05-APR-1976','Daughter');
INSERT INTO dependent VALUES ('333445555','Theodore', 'M','10-OCT-1973','Son');
INSERT INTO dependent VALUES ('333445555','Joy', 'F','03-MAY-1948','Spouse');
INSERT INTO dependent VALUES ('987654321','Abner', 'M','29-FEB-1932','Spouse');
INSERT INTO dependent VALUES ('123456789','John', 'M','01-JAN-1978','Son');
INSERT INTO dependent VALUES ('123456789','Alice', 'M','31-DEC-1978','Daughter');
INSERT INTO dependent VALUES ('123456789','Elizabeth', 'F','05-MAY-
1957','Spouse');
CREATE TABLE works_on
(essnCHAR(9) NOT NULL,
pnoNUMBER(2) NOT NULL,
hoursNUMBER(3,1),
CONSTRAINT pk_essn_pno PRIMARY KEY (essn, pno),
CONSTRAINT fk_pno FOREIGN KEY (pno) REFERENCES project(pnumber));
INSERT INTO works_on VALUES ('123456789',1,32.5);
INSERT INTO works_on VALUES ('123456789',2,7.5);
INSERT INTO works_on VALUES ('666884444',3,40.0);
INSERT INTO works_on VALUES ('453453453',1,20.0);
INSERT INTO works_on VALUES ('453453453',2,20.0);
INSERT INTO works_on VALUES ('333445555',2,10.0);
INSERT INTO works_on VALUES ('333445555',3,10.0);
6. INSERT INTO works_on VALUES ('333445555',10,10.0);
INSERT INTO works_on VALUES ('333445555',20,10.0);
INSERT INTO works_on VALUES ('999887777',30,30.0);
INSERT INTO works_on VALUES ('999887777',10,10.0);
INSERT INTO works_on VALUES ('987987987',10,35.0);
INSERT INTO works_on VALUES ('987987987',30,5.0);
INSERT INTO works_on VALUES ('987654321',30,20.0);
INSERT INTO works_on VALUES ('987654321',20,15.0);
INSERT INTO works_on VALUES ('888665555',20,null);
--comments can be added
DROP TABLE works_on;
DROP TABLE dependent;
DROP TABLE project;
DROP TABLE dept_location;
ALTER TABLE department DROP CONSTRAINT fk_mgrssn CASCADE;
ALTER TABLE employee DROP CONSTRAINT fk_dno CASCADE;
DROP TABLE department;
DROP TABLE employee;
CREATE TABLE employee
(fnameVARCHAR2(12),
minitCHAR(1),
lnameVARCHAR2(12),
ssnCHAR(9) NOT NULL,
bdateDATE,
addressVARCHAR2(40),
sexCHAR(1),
salaryNUMBER(7) NOT NULL,
superssnCHAR(9) references employee(ssn),
/*superssnCHAR(9),*/
/*either way, but need to know superssn is from ssn*/
CONSTRAINT pk_ssn PRIMARY KEY (SSN));
ALTER TABLE employee ADD (dno NUMBER(2) NOT NULL);
7. INSERT INTO employee VALUES ('Wolons', 'E', 'Aimee', '888665555',
'10-NOV-1927', '450 Stone, edsion, NJ', 'F', 55000, null,1);
INSERT INTO employee VALUES ('Ramirez', '', 'Damian', '987654321',
'20-JUN-1931', '291 Berry, albany, NY', 'M', 43000, '888665555',4);
INSERT INTO employee VALUES ('Hall', '', 'Nathan', '333445555',
'09-DEC-1945', '638 bruce, Oneonta, NY', 'M', 40000, '888665555',5);
INSERT INTO employee VALUES ('Kelly', '', 'David', '999778888',
'19-JUL-1958', '3321 central ave, New York, NY', 'M', 25000, '987654321',4);
INSERT INTO employee VALUES ('Philip', '', 'Dolensek', '123456789',
'09-JAN-1955', '731 clinton, Oneonta, NY', 'M', 30000, '333445555',5);
INSERT INTO employee VALUES ('Reale', '', 'Michael', '666884444',
'15-SEP-1952', '975 Fire Oak, Newark, NJ', 'M', 38000, '333445555',5);
INSERT INTO employee VALUES ('Smith', '', 'Jason', '453453453',
'31-JUL-1962', '5631 Rice, Harrison, NJ', 'F', 25000, '333445555',5);
INSERT INTO employee VALUES ('Warren', 'V', 'Samantha', '987987987',
'29-MAR-1959', '908 Dallas, albany, NY', 'F', 25000, '987654321',4);
select e.fname, e.lname, s.fname, s.lname
from employee e, employee s
where e.superssn=s.ssn;
8. CREATE TABLE department
(dnameVARCHAR2(20) NOT NULL,
dnumberNUMBER(2) NOT NULL,
mgrssnCHAR(9) NOT NULL,
mgrstartdateDATE,
CONSTRAINT pk_dnumber PRIMARY KEY (DNUMBER),
CONSTRAINT fk_mgrssn FOREIGN KEY (mgrssn) REFERENCES employee (ssn));
INSERT INTO department VALUES ('Research',5 , '333445555', '22-MAY-1978');
INSERT INTO department VALUES ('Administration',4 , '987654321', '01-JAN-1985');
INSERT INTO department VALUES ('Computing Service', 1, '888665555', '19-JUN-1971');
ALTER TABLE employee ADD (CONSTRAINT fk_dno FOREIGN KEY (dno)
REFERENCES department(dnumber));
CREATE TABLE dept_location
(dnumberNUMBER(2) ,
dlocationVARCHAR2(20),
CONSTRAINT pk_num_loc PRIMARY key (dnumber, dlocation),
CONSTRAINT fk_dnumber FOREIGN KEY (dnumber) REFERENCES department(dnumber));
9. INSERT INTO dept_location VALUES (1,'Fitzelle');
INSERT INTO dept_location VALUES (4,'Hunt union');
INSERT INTO dept_location VALUES (5,'Natza');
INSERT INTO dept_location VALUES (5,'Hunt union');
INSERT INTO dept_location VALUES (5,'Fitzelle');
CREATE TABLE project
(pnameVARCHAR2(15),
pnumberNUMBER(2) NOT NULL,
plocationVARCHAR2(15) ,
dnumNUMBER(2),
CONSTRAINT pk_pnumber PRIMARY KEY (PNUMBER),
CONSTRAINT fk_dnum FOREIGN KEY (dnum) REFERENCES department(dnumber));
INSERT INTO project VALUES ('ProductX', 1,'library',5);
INSERT INTO project VALUES ('ProductY', 2,'Fitzelle hall',5);
INSERT INTO project VALUES ('ProductZ', 3,'Library',5);
INSERT INTO project VALUES ('Computerization', 10,'IRC',4);
INSERT INTO project VALUES ('Reorganization', 20,'IRC',1);
INSERT INTO project VALUES ('Newbenefits', 30,'Hunt Union',4);
CREATE TABLE dependent
(essnCHAR(9) NOT NULL,
dependent_name VARCHAR(9) NOT NULL,
sexVARCHAR2(1),
bdateDATE,
relationshipVARCHAR(8),
10. CONSTRAINT pk_essn PRIMARY KEY (essn, dependent_name),
CONSTRAINT fk_essn FOREIGN KEY (essn) REFERENCES employee(ssn) ON DELETE
CASCADE);
INSERT INTO dependent VALUES ('333445555','Alice', 'F','05-APR-1976','Daughter');
INSERT INTO dependent VALUES ('333445555','Theodore', 'M','10-OCT-1973','Son');
INSERT INTO dependent VALUES ('333445555','Joy', 'F','03-MAY-1948','Spouse');
INSERT INTO dependent VALUES ('987654321','Abner', 'M','29-FEB-1932','Spouse');
INSERT INTO dependent VALUES ('123456789','John', 'M','01-JAN-1978','Son');
INSERT INTO dependent VALUES ('123456789','Alice', 'M','31-DEC-1978','Daughter');
INSERT INTO dependent VALUES ('123456789','Elizabeth', 'F','05-MAY-
1957','Spouse');
CREATE TABLE works_on
(essnCHAR(9) NOT NULL,
pnoNUMBER(2) NOT NULL,
hoursNUMBER(3,1),
CONSTRAINT pk_essn_pno PRIMARY KEY (essn, pno),
CONSTRAINT fk_pno FOREIGN KEY (pno) REFERENCES project(pnumber));
INSERT INTO works_on VALUES ('123456789',1,32.5);
INSERT INTO works_on VALUES ('123456789',2,7.5);
INSERT INTO works_on VALUES ('666884444',3,40.0);
INSERT INTO works_on VALUES ('453453453',1,20.0);
INSERT INTO works_on VALUES ('453453453',2,20.0);
INSERT INTO works_on VALUES ('333445555',2,10.0);
INSERT INTO works_on VALUES ('333445555',3,10.0);
11. INSERT INTO works_on VALUES ('333445555',10,10.0);
INSERT INTO works_on VALUES ('333445555',20,10.0);
INSERT INTO works_on VALUES ('999887777',30,30.0);
INSERT INTO works_on VALUES ('999887777',10,10.0);
INSERT INTO works_on VALUES ('987987987',10,35.0);
INSERT INTO works_on VALUES ('987987987',30,5.0);
INSERT INTO works_on VALUES ('987654321',30,20.0);
INSERT INTO works_on VALUES ('987654321',20,15.0);
INSERT INTO works_on VALUES ('888665555',20,null); 3. (20 points) In Oracle, tables,
procedures etc. are called objects. Each object has an owner. For example, if you create a table,
you are the owner of the table. Therefore, by default, your account is the owner of all the objects
created by you your account. Whenever you retrieve information from a table named as
tablename, Oracle will automatically append your account name as the prefix to the table name
ending with imiter. Then check table tablen exists or not. yes Oracle certainly allows you to
retrieve information from that table. For example, when I say select from employee: it actually is
equivalent to saying that select from sl4zhangs. employee: where my account name. therwise, if
you want to use a table owned by another account, you have to explicitly use owner account of
the table. For example, your account name is tom, but you want to retrieve information from a
table ti created by Kathy in the same database, you have to use select from Kathy. ti instead of
select from t1 a. List the result of the select from zhangsfallo5. employee: hint you will be shown
that ORA-00942: table or view does not exist, but the reason is that you have no privilege to do
so b. st the result of select from employee: if you have no employee table, create that table by
running the company script, then redo this query c. list the result of select from youraccount.
employee: note that you need to use your oracle account in the query. The result should be the
same as b) d. show script how to create a synonym for employee table, and then select all from
both the original table and the synonym just created by you to compare the result. The result
should be the same as b and c create synonym s for employee e. show script how to create a
public synonym for employee table. Hint, you will find that you have no privilege to create
public synonym. create public synonym ps for employee ERROR at line 1: ORA-00942: table or
view does not exist you need explicit GRANT select privilege grant select on ps to yourpartnerid
Solution
Output of select * from employee is below :
fname minit lname ssn bdate address sex salary superssn
12. Wolons E Aimee 888665555 10-NOV-1927 450 Stone, edsion, NJ F 55000
null
Ramirez Damian 987654321 20-JUN-1931 291 Berry, albany, NY M
43000 8886655550
Hall Nathan 333445555 09-DEC-1945 638 bruce, Oneonta, NY M 40000
888665555
Kelly David 999778888 19-JUL-1958 3321 central ave, New York, NY M
25000 987654321
Philip Dolensek 123456789 09-JAN-1955 731 clinton, Oneonta, NY M 30000
333445555
Reale Michael 666884444 15-SEP-1952 975 Fire Oak, Newark, NJ M 38000
333445555
Smith Jason 453453453 31-JUL-1962 5631 Rice, Harrison, NJ F 25000
333445555
Warren V Samantha 987987987 29-MAR-1959 908 Dallas, albany, NY F
25000 987654321
Please let me know what else is required.